14 Dec 2018

Operation Sharpshooter Takes Aim at Global Critical Assets

“Operation Sharpshooter uses a new implant to target mainly English-speaking nuclear, defense, energy and financial companies. Researchers have detected a widespread reconnaissance campaign using a never-before-seen implant framework to infiltrate global defense and critical infrastructure players — including nuclear, defense, energy and financial companies. The campaign, dubbed Operation Sharpshooter, began

Read More
12 Dec 2018

Hackers Steal Over 40k Logins for Gov Services in 30 Countries

“More than 40,000 users victims of phishing attacks had their credentials for unlocking online accounts for government services stolen…the login data offered access to services in 30 countries around the world. Most of the victims are in Europe. More than half of the victims are from Italy (52%), followed by

Read More
07 Dec 2018

Infected WordPress Sites Are Attacking Other WordPress Sites

“WordPress sites are being targeted in a series of attacks tied to a 20,000 botnet-strong army of infected WordPress websites. Behind the WordPress-on-WordPress assault is a widespread brute-force password attack leveraged through a Russian proxy provider and targeting a developer application program interface (API). The attacks, first identified by the

Read More
06 Dec 2018

FBI: Watch out for Iranian SamSam malware

DHS and the FBI shared a joint alert on December third regarding the critical infrastructure threat posed by the Iranian SamSam virus. The ultimate purpose of the virus is the successful intrusion and takeover of a network for the purpose of extorting a ransom (ransomware). The alert recommended strong passwords,

Read More
20 Nov 2018

Ukraine’s Foreign Intelligence Service helps thwart another massive cyber attack

“A joint effort of the Computer Emergency Response Team of Ukraine (CERT-UA) and the Foreign Intelligence Service of Ukraine revealed new modifications of Pterodo malware in computers used in Ukraine’s state agencies, which indicates that preparations are likely underway for a massive cyber attack. ‘The malware collects data about the

Read More
17 Oct 2018

Czech intelligence service shuts down Hezbollah hacking operation

“The Czech Security Intelligence Service (BIS) has intervened and taken down servers that have been used by Hezbollah operatives to target and infect users around the globe with mobile malware. ‘I can not comment on the details, but I can confirm that BIS has played a significant role in identifying

Read More
15 Oct 2018

This Malware Pretends to Be a Flash Update But Is Really Mining Cryptocurrency

Updating Adobe Flash is apparently such a regular task for computer users that hackers are able to take advantage of the familiarity and slip in cryptocurrency mining malware into fake Flash updates. Once installed, the malware works in the background, using the computer’s processing power to mine cryptocurrency (Monero, in

Read More
03 Oct 2018

Fileless Malware Attacks on the Rise, Microsoft Says

“Fileless malware attacks, or incidents where the malicious payload doesn’t touch the disk, but is executed directly in memory instead, are on the rise, Microsoft says. Attacks that leverage fileless techniques are not new, but were recently adopted by a broader range of malware. A couple of years ago, the

Read More
19 Sep 2018

Researchers: Users allowed to access infected sites found through search engines

“Users are largely allowed to access infected websites found through search engines, according to new research published Tuesday. Security firm SiteLock scanned more than 6 million of their clients’ sites during the second quarter of 2018. The firm found only 17 percent of infected sites are blacklisted by search engines like

Read More
16 Aug 2018

India’s Cosmos Bank loses $13.5 mln in cyber attack

Cyber thieves stole $13.5 million by using malware to withdraw cash in 14,849 transactions in 28 countries, all within 2 hours. The malware attack redirected payments to a proxy switching system responsible for processing payment requests. This proxy approved the fraudulent requests. Police are pursuing the matter, but with little

Read More