Uncategorized

Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown

Two people have been detained in Australia and the United States in relation to a purported plan to create and disseminate the remote access trojan known as Hive RAT (formerly Firebird). According to the U.S. Department of Justice (DoJ), the virus “gave the malware purchasers control over victim computers and enabled them to access victims’ […]

Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown Read More »

Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets

Between January and October 2023, more than 225,000 logs with compromised OpenAI ChatGPT credentials were put up for sale on dark web marketplaces, according to recent research from Group-IB. These login credentials were discovered in information theft records connected to the Raccoon, RedLine, and LummaC2 malware. “The number of infected devices grew significantly between August

Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets Read More »

CISA Warning: Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability

Following reports that it’s likely being exploited in Akira ransomware attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a now-patched security flaw affecting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defence (FTD) software to its list of known exploited vulnerabilities (KEV) on Thursday. The high-severity information disclosure flaw in question is CVE-2020-3259

CISA Warning: Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability Read More »

3,500 Arrested in Global Operation HAECHI-IV Targeting Financial Criminals

Over the course of a six-month worldwide police investigation known as HAECHI-IV, approximately 3,500 people have been arrested and $300 million worth of assets have been seized from 34 different nations. Targeting a variety of financial crimes, including voice phishing, romance scams, online extortion, investment fraud, money laundering connected to illicit online gambling, business email

3,500 Arrested in Global Operation HAECHI-IV Targeting Financial Criminals Read More »

New ESXiArgs Ransomware Variant Emerges After CISA Releases Decryptor Tool

The threat actors have responded with an upgraded version of ESXiArgs ransomware that encrypts more data after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a decryptor for affected victims to recover from ESXiArgs ransomware attacks. A system administrator posted information on the new variant on an online forum where another user said that

New ESXiArgs Ransomware Variant Emerges After CISA Releases Decryptor Tool Read More »

$100 Million in Cryptocurrency Gets Stolen by Hackers from Binance Bridge

An exploit on a cross-chain bridge that stole about $100 million in digital assets was discovered by BNB Chain, a blockchain connected to the Binance cryptocurrency exchange. BSC Token Hub, a native cross-chain bridge connecting BNB Beacon Chain (BEP2) and BNB Smart Chain (BEP20 or BSC), was impacted by an exploit, it was reported last

$100 Million in Cryptocurrency Gets Stolen by Hackers from Binance Bridge Read More »

Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks

To protect the ecosystem against supply chain threats, Google on Monday unveiled a new bug bounty program for its open source projects that offers rewards ranging from $100 to $31,337 (a reference to eleet or leet). One of the first open source-specific vulnerability programs is known as the Open Source Software Vulnerability Rewards Program (OSS

Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks Read More »

The Browser-in-the-Browser (BITB) Attack Enabling Easier Phishing Attack

New phishing technique called browser-in-the-browser (BitB) attack can be xploited to act like a browser window within the browser in order to spoof a legitimate domain, which makes it possible to stage convincing phishing attacks. The method makes use of the third-party single sign-on (SSO) options embedded on websites such as “Sign in with Google”

The Browser-in-the-Browser (BITB) Attack Enabling Easier Phishing Attack Read More »

Garrett Walk-Through Metal Detector Vulnerability Discovered

Security flaws have been uncovered in a networking component in Garrett Metal Detectors which could allow remote attackers bypass authentication requirements, tamper with metal detector configurations and even execute arbitrary code on the devices. Cisco Talos noted in a disclosure publicized that “An attacker could manipulate this module to remotely monitor statistics on the metal

Garrett Walk-Through Metal Detector Vulnerability Discovered Read More »