Security News

CISA orders agencies to patch vulnerability used in Stuxnet attacks
2022-09-16 16:29

The U.S. Cybersecurity and Infrastructure Security Agency has added half a dozen vulnerabilities to its catalog of Known Exploited Vulnerabilities and is ordering federal agencies to follow vendor's instructions to fix them. CISA is giving federal agencies until October 6th to patch security vulnerabilities that have been reported between 2010 and 2022.

Eastern European org hit by second record-smashing DDoS attack
2022-09-16 06:04

Akamai says it has absorbed the largest-ever publicly known distributed denial of service attack - an assault against an unfortunate Eastern European organization that went beyond 700 million packets per second. For comparison, the July attack peaked at 659.6 Mpps with the organization coming under attack 75 times at its primary data center.

S3 Ep100: Browser-in-the-Browser – how to spot an attack  [Audio + Text]
2022-09-15 18:50

If you open something in the current window, then you're significantly limited as to how exciting and "System-like" you can make it look, aren't you? You can't write anything outside the browser window, so you can't sneakily put a window that looks like wallpaper on the desktop, like it's been there all along.

Akamai stopped new record-breaking DDoS attack in Europe
2022-09-15 18:28

A new distributed denial-of-service attack that took place on Monday, September 12, has broken the previous record that Akamai recorded recently in July. The cybersecurity and cloud services company Akamai reports that the recent attack appears to originate from the same threat actor, meaning that the operators are in the process of empowering their swarm further.

Relay Attack against Teslas
2022-09-15 15:28

Radio relay attacks are technically complicated to execute, but conceptually easy to understand: attackers simply extend the range of your existing key using what is essentially a high-tech walkie-talkie. One thief stands near you while you're in the grocery store, intercepting your key's transmitted signal with a radio transceiver.

Building the barricades against identity-based attacks
2022-09-15 13:42

The first six months of this year have been characterized by relentless cyber security attacks whether state-induced, or incidents of criminal extortion and data theft. In such a threatening environment it is vital that organizations and enterprises defend themselves from internet and identity-based attacks.

Webworm Hackers Using Modified RATs in Latest Cyber Espionage Attacks
2022-09-15 10:14

A threat actor tracked under the moniker Webworm has been linked to bespoke Windows-based remote access trojans, some of which are said to be in pre-deployment or testing phases. "The group has developed customized versions of three older remote access trojans, including Trochilus RAT, Gh0st RAT, and 9002 RAT," the Symantec Threat Hunter team, part of Broadcom Software, said in a report shared with The Hacker News.

Webworm hackers modify old malware in new attacks to evade attribution
2022-09-15 10:00

The Chinese 'Webworm' hacking group is experimenting with customizing old malware in new attacks, likely to evade attribution and reduce operations costs. Using older RATs that are in wide circulation and deployed by various random hackers helps Webworm disguise their operations and blend with the activities of others, making the work of security analysts much harder.

U.S. Charges 3 Iranian Hackers and Sanctions Several Others Over Ransomware Attacks
2022-09-15 06:49

The U.S. Treasury Department's Office of Foreign Assets Control on Wednesday announced sweeping sanctions against ten individuals and two entities backed by Iran's Islamic Revolutionary Guard Corps for their involvement in ransomware attacks at least since October 2020. What's more, independent analyses from the two cybersecurity firms as well as Google-owned Mandiant has revealed the group's connections to two companies Najee Technology and Afkar System, both of which have been subjected to U.S. sanctions.

WordPress-powered sites backdoored after FishPig suffers supply chain attack
2022-09-15 02:12

Infosec outfit Sansec raised the alarm this week that FishPig's software was acting weird: when a deployment's control panel was visited by a logged-in Magento staff user, the code would automatically fetch and run from FishPig's back-end systems a Linux binary that turned out to be Rekoobe. Free versions of FishPig modules available on GitHub were likely clean.