Australian Hacker Arrested for Selling Spyware to Cyber Criminals

A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use by domestic violence perpetrators and child sex offenders. Jacob Wayne John Keen, who currently resides at Frankston, Melbourne, is said to have created the remote access trojan (RAT) when he was 15, while also administering […]

Australian Hacker Arrested for Selling Spyware to Cyber Criminals Read More »

Dark Utilities Lets Hackers Create C2 Centers In Few Seconds

Cybercriminals can now establish a command and control (C2) hub for their malicious actions using a new service called Dark Utilities. In 2022, Dark Utilities was developed as a platform for C2-as-a-Service. The platform offers a wide range of features, such as cryptomining, DDoS protection, and remote access options. Currently, there are about 3,000 users

Dark Utilities Lets Hackers Create C2 Centers In Few Seconds Read More »

Hackers Distribute PLC and HMI Password Cracking Tool to Attack Industrial Systems

A new campaign that uses password cracking software to grab control of Programmable Logic Controllers (PLCs) and coax the devices into becoming part of a botnet is aimed at industrial engineers and operators. According to Dragos security researcher Sam Hanson, the malware “exploited a flaw in the firmware which allowed it to extract the password

Hackers Distribute PLC and HMI Password Cracking Tool to Attack Industrial Systems Read More »

FBI Seizes Cryptocurrency and $500,000 in Ransomware Payments from North Korean Hackers

The U.S. Department of Justice (DoJ) has announced the capture of $500,000 worth of Bitcoin from North Korean hackers who used a new ransomware strain known as Maui to extort digital payments from multiple companies. In a press release published on Tuesday, the DoJ stated that “the recovered money include ransoms paid by healthcare providers

FBI Seizes Cryptocurrency and $500,000 in Ransomware Payments from North Korean Hackers Read More »

Joker, Facestealer, and Coper Malware Distribution Found in Several New Play Store Apps

Numerous bogus programmes that were discovered spreading the Joker, Facestealer, and Coper malware families through the online store have been removed by Google  (SEE: HOW HACKERS HACK ANDROID PHONES). Although the Android shop is regarded as a reliable resource for finding and installing apps, malicious actors have frequently found ways to get around Google’s security

Joker, Facestealer, and Coper Malware Distribution Found in Several New Play Store Apps Read More »

Ukrainian Authorities Arrested Phishing Gang That Stole $3.37 Million USD

In a campaign to take advantage of the ongoing crisis, hundreds of phishing sites purported to offer financial aid to Ukrainian civilians. Nine members of a criminal gang were detained by the Cyber Police of Ukraine after they stole 100 million hryvnias from them. According to a press release from the organization last week, “criminals

Ukrainian Authorities Arrested Phishing Gang That Stole $3.37 Million USD Read More »

Update Google Chrome Browser to Patch New Zero-Day Exploit Detected in the Wild

Google released security upgrades on Monday to fix a high-severity zero-day bug in its Chrome web browser that the company claimed is already being used in the wild. The issue, designated CVE-2022-2294, pertains to a heap overflow vulnerability in the WebRTC component, which enables real-time audio and video communication in browsers without the need to

Update Google Chrome Browser to Patch New Zero-Day Exploit Detected in the Wild Read More »

A New Trending Hacking Technique Called “Account Pre-Hijacking”

According to new research, malicious actors can get illegal access to users’ online accounts via a new approach known as “account pre-hijacking.” The assault targets the account creation process, which is common on websites and other online platforms, allowing an adversary to carry out a series of operations before an unwary victim establishes an account

A New Trending Hacking Technique Called “Account Pre-Hijacking” Read More »