Vulnerabilities in Lenovo’s UEFI Firmware Affect Millions of Laptops

Three high-impact UEFI security vulnerabilities have been discovered in multiple Lenovo consumer laptop models, allowing malicious actors to deploy and execute firmware implants on the afflicted devices. According to ESET researcher Martin Smolár, the CVE-2021-3970, CVE-2021-3971, and CVE-2021-3972 vulnerabilities “affect firmware drivers originally supposed to be utilised solely during the production process of Lenovo consumer […]

Vulnerabilities in Lenovo’s UEFI Firmware Affect Millions of Laptops Read More »

The Haskers gang freely distributes ZingoStealer malware to other cybercriminals.

Haskers Gang, a crimeware-related threat actor, has distributed ZingoStealer, an information-stealing malware, for free on the internet, allowing other criminal groups to use it for nefarious purposes. In a study posted with The Hacker News, Cisco Talos researchers Edmund Brumaghin and Vanja Svajcer noted, “It features the capacity to collect personal information from users and

The Haskers gang freely distributes ZingoStealer malware to other cybercriminals. Read More »

The Browser-in-the-Browser (BITB) Attack Enabling Easier Phishing Attack

New phishing technique called browser-in-the-browser (BitB) attack can be xploited to act like a browser window within the browser in order to spoof a legitimate domain, which makes it possible to stage convincing phishing attacks. The method makes use of the third-party single sign-on (SSO) options embedded on websites such as “Sign in with Google”

The Browser-in-the-Browser (BITB) Attack Enabling Easier Phishing Attack Read More »

Access:7 Supply Chain Vulnerability Impacting ATMs, Medical and IoT Devices

As many as seven vulnerabilities have been disclosed in PTC’s Axeda software which could be weaponized to access medical and IoT devices without authorization. Popular known as Access:7, with weaknesses of which 3 are rated Critical in severity with the potential of affecting over 150 device models spanning over 100 different manufacturers which makes it

Access:7 Supply Chain Vulnerability Impacting ATMs, Medical and IoT Devices Read More »

Xenomorph Android Banking Trojan Now Spreading on Google Play Store

A new Android trojan has been observed to be distributed via the official Google Play Store with the goal of targeting 56 European banks and carrying out harvesting sensitive information from compromised devices. The trojan has been nicknamed Xenomorph and its noticed to share overlaps with another banking trojan tracked under the moniker Alien while

Xenomorph Android Banking Trojan Now Spreading on Google Play Store Read More »

Taiwanese Financial Trading Sector Suffers Cyber Attack by Chinese Hackers

Hackers aligned with objectives of the Chinese government have been linked to an organized supply chain attack on Taiwan’s financial sector. These attacks first commenced at the end of November 2021, with the intrusions attributed to a threat actor tracked as APT10, also known as Stone Panda, the MenuPass group and Bronze Riverside, and known

Taiwanese Financial Trading Sector Suffers Cyber Attack by Chinese Hackers Read More »

Microsoft Takes Steps to Disable Macros in Office Apps by Default to Block Malware Attacks

Microsoft announces plans to disable Visual Basic for Applications (VBA) macros by default across its products, including Word,Excel, PowerPoint, Access and Visio for documents downloaded from the web in an attempt to eliminate an entire class of attack vector. “Bad actors send macros in Office files to end users who unknowingly enable them, malicious payloads

Microsoft Takes Steps to Disable Macros in Office Apps by Default to Block Malware Attacks Read More »

New Techniques Adopted By SolarMarker To Maintain Presence On Hacked Systems

As threat actors continuously change pattern, the operators of the SolarMarker information stealer and backdoor have been discovered to be leveraging stealthy tricks to establish long-term persistence on compromised systems. This was spotted by Sophos a cybersecurity firm, wherein they observed that the remote access implants are still being detected on targeted networks despite the

New Techniques Adopted By SolarMarker To Maintain Presence On Hacked Systems Read More »

Secret Backdoors Discovered In WordPress Plugins and Themes

In another software supply chain attack, dozens of WordPress themes and plugins hosted on a developer’s website were backdoored with malicious code in September 2021 with the goal of infecting further sites. This gave attackers full administrative control over websites that used 40 themes and 53 plugins belonging to AccessPress Themes, a Nepal-based company that

Secret Backdoors Discovered In WordPress Plugins and Themes Read More »