Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware https://firewall.firm.in/wp-content/uploads/2024/12/malware.png Dec 17, 2024Ravie LakshmananMalware / Credential Theft A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate. “An attacker used social engineering via a Microsoft Teams call to impersonate a user’s client and gain remote access to ...
Read More »Vulnerabilities & Exploits
The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal
The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal https://firewall.firm.in/wp-content/uploads/2024/12/mark.png Dec 17, 2024Ravie LakshmananCyber Espionage / Mobile Security A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. “The Mask APT is a legendary threat actor that has been performing ...
Read More »DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages
DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages https://firewall.firm.in/wp-content/uploads/2024/12/adclick.png Dec 16, 2024Ravie LakshmananMalvertising / Threat Intelligence Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. “Entirely reliant on a single ad ...
Read More »Why you take phone chargers from unknown people? Hackers can steal data. Tips to stay safe – ET CISO
Why you take phone chargers from unknown people? Hackers can steal data. Tips to stay safe – ET CISO https://etimg.etb2bimg.com/thumb/msid-116354721,imgsize-39436,width-1200,height=765,overlay-etciso/data-breaches/why-you-take-phone-chargers-from-unknown-people-hackers-can-steal-data-tips-to-stay-safe.jpg We’ve all been there — scrambling to find a charger when our phone’s battery is running low, only to settle for using someone else’s cable. But this simple act of sharing a charger could expose you to significant cybersecurity risks. ...
Read More »NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool
NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool https://firewall.firm.in/wp-content/uploads/2024/12/spyware.png A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. “NoviSpy allows for capturing sensitive personal data from a target’s phone after infection and provides the ...
Read More »Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques https://firewall.firm.in/wp-content/uploads/2024/12/malware.png Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. “The target of the threat actors were Thailand officials based on the nature of ...
Read More »Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action https://firewall.firm.in/wp-content/uploads/2024/12/badbox.png Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed ...
Read More »How to Generate a CrowdStrike RFM Report With AI in Tines
How to Generate a CrowdStrike RFM Report With AI in Tines https://firewall.firm.in/wp-content/uploads/2024/12/main.png Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform. Their bi-annual “You Did What with ...
Read More »Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms
Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms https://firewall.firm.in/wp-content/uploads/2024/12/exploit.png Dec 13, 2024The Hacker NewsIoT Security / Operational Technology Iran-affiliated threat actors have been linked to a new custom malware that’s geared toward IoT and operational technology (OT) environments in Israel and the United States. The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to ...
Read More »Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection
Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection https://firewall.firm.in/wp-content/uploads/2024/12/openwrt.png Dec 13, 2024The Hacker NewsLinux / Vulnerability A security flaw has been disclosed in OpenWrt’s Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages. The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating ...
Read More »