The number of malware strains coded in the Go programming language has seen a sharp increase of around 2,000% over the last few years, since 2017, cybersecurity firm Intezer said in a report published this week. The company’s findings highlight and confirm a general trend in the malware ecosystem, where malware authors have slowly moved away from […]
Old Foe Or New Enemy? Here’s How Researchers Handle APT Attribution
Malwarebytes’ exposé of LazyScripter revealed that the group has operated since at least 2018, targeting International Air Transport Association (IATA) members, airlines and immigrants seeking employment in Canada. (Scazon/CC BY 2.0) With cybercriminals commonly sharing tactics and techniques on underground forums, and with digital adversaries frequently leveraging many of the same commodity malwares and commercially […]
Oxford Lab With COVID-19 Research Links Targeted By Hackers
An Oxford University lab conducting research into the coronavirus pandemic has been compromised by cyberattackers. Oxford University, one of the most prominent educational institutions in the UK, was made aware of the security breach on Thursday. The university confirmed that a security incident took place at the Division of Structural Biology lab, also known as […]
Chart Shows Connections Between Cybercrime Groups
Cybersecurity reports often talk about threat actors and their malware/hacking operations as self-standing events, but, in reality, the cybercrime ecosystem is much smaller and far more interconnected than the layperson might realize. Cybercrime groups often have complex supply chains, like real software companies, and they regularly develop relationships within the rest of the e-crime ecosystem […]
Ukraine Says Russia Planted Malware In Its Document Portal
reader comments 52 with 30 posters participating Share this story Ukraine has accused the Russian government of hacking into one of its government Web portals and planting malicious documents that would install malware on end users’ computers. “The purpose of the attack was the mass contamination of information resources of public authorities, as this system […]
Cisco Warns Of Critical Auth Bypass Security Flaw
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. Source
McDonald’s Has An Intel Team Spying On Workers
Hacking. Disinformation. Surveillance. CYBER is Motherboard’s podcast and reporting on the dark underbelly of the internet. For years, McDonald’s has internally labeled activists and employees working with the Fight for $15 campaign a security threat and has spied on them, Motherboard has learned. McDonald’s says that this work is designed to identify protests that “could […]
Four New Hacking Groups Are Targeting Critical Infrastructure
More hacking groups than ever before are targeting industrial environments as cyber attackers attempt to infiltrate the networks of companies providing vital services, including electric power, water, oil and gas, and manufacturing. Threats include cyber-criminal groups looking to steal information or encrypt systems with ransomware, as well as nation-state-backed hacking operations attempting to determine the […]
Bombardier Data Posted On Ransomware Site Following FTA Hack
Image: SAAB Canadian airplane manufacturer Bombardier has disclosed today a security breach after some of its data was published on a dark web portal operated by the Clop ransomware gang. “An initial investigation revealed that an unauthorized party accessed and extracted data by exploiting a vulnerability affecting a third-party file-transfer application, which was running on […]
SolarWinds Hackers Also Went After NASA And The FAA
Photo: Mark Wilson (Getty Images) Apparently not content with having penetrated the networks of such piddling federal agencies as the U.S. State Department, the Department of Homeland Security, and that agency that maintains our nuclear stockpile, the hackers of the “SolarWinds” affair also went after NASA and the Federal Aviation Administration, according to a new […]
SolarWinds Hearing Announced By House Committees
Two House committees are holding a hearing on the SolarWinds attack. James Martin/CNET The US House committees on homeland security and on oversight and reform will host a hearing on the SolarWinds hack this week, they announced Monday. The hearing on Feb. 26 will see SolarWinds CEO Sudhakar Ramakrishna, former SolarWinds CEO Kevin Thompson, Microsoft […]
Hackers Are Selling Network Logins To The Highest Bidder
A growing class of cyber criminal is playing an important role on underground marketplaces by breaching corporate networks and selling access to the highest bidder to exploit however they please. The buying and selling of stolen login credentials and other forms of remote access to networks has long been a part of the dark web […]
Bitcoin Blockchain Helps Botnet From Being Taken Down
reader comments 46 with 29 posters participating Share this story When hackers corral infected computers into a botnet, they take special care to ensure they don’t lose control of the server that sends commands and updates to the compromised devices. The precautions are designed to thwart security defenders who routinely dismantle botnets by taking over […]
10K Microsoft Email Users Hit In FedEx Phishing Attack
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. Source
Hunting For Bugs In Telegram’s Animated Stickers Remote Attack Surface
Introduction At the end of October ‘19 I was skimming the Telegram’s android app code, learning about the technologies in use and looking for potentially interesting features. Just a few months earlier, Telegram had introduced the animated stickers; after reading the blogpost I wondered how they worked under-the-hood and if they created a new image […]