The suspicious ad for Slack appeared legitimate but was likely malicious. Clicking on it would initially redirect to slack.com. However, after several days, it started redirecting to a click tracker, showing signs of a potentially malicious campaign.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-23 10:06:332024-08-23 10:06:33Fraudulent Slack Ad Shows Malvertiser’s Patience and Skills
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-23 10:06:332024-08-23 10:06:33Russian Member of Karakurt Cyber Extortion Gang Charged in US
A PoC exploit has been released for a critical vulnerability (CVE-2024-41992) found in the Arcadyan FMIMG51AX000J model, as well as other devices using the same firmware version.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-23 10:06:322024-08-23 10:06:32PoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-23 10:06:322024-08-23 10:06:32FBI Fails to Secure Sensitive Storage Media Destined for Destruction, Audit Reveals
This latest Log4j exploitation-based attack uses obfuscated LDAP requests to evade detection and executes malicious scripts, establishing persistence and exfiltrating data through encrypted channels.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-23 09:07:012024-08-23 09:07:01New Opportunistic Campaign Exploit Log4j Vulnerability for Cryptomining and System Compromise
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-23 09:07:012024-08-23 09:07:01When War Came to Their Country, They Built a Map
In these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into clicking on malicious links that can lead to data theft or malware infection.
Researchers from Quarkslab found a hardware backdoor in the FM11RF08S RFID cards manufactured by Shanghai Fudan Microelectronics, enabling attackers to compromise user-defined keys within minutes.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-23 08:06:482024-08-23 08:06:48Hardware Backdoor in Millions of Shanghai Fudan Microelectronics RFID Cards Allows Cloning
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-23 08:06:482024-08-23 08:06:48SolarWinds Leaks Credentials in Hotfix for Exploited Web Help Desk Flaw
GitHub disclosed three security vulnerabilities in GitHub Enterprise Server (GHES), including CVE-2024-6800, CVE-2024-6337, and CVE-2024-7711. The most severe, CVE-2024-6800, allowed attackers to forge a SAML response, granting site admin privileges.
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Fraudulent Slack Ad Shows Malvertiser’s Patience and Skills
/in General NewsThe suspicious ad for Slack appeared legitimate but was likely malicious. Clicking on it would initially redirect to slack.com. However, after several days, it started redirecting to a click tracker, showing signs of a potentially malicious campaign.
Cyware News – Latest Cyber News – Read More
Russian Member of Karakurt Cyber Extortion Gang Charged in US
/in General NewsDeniss Zolotarjovs was charged in a US court for extorting victims and laundering cryptocurrency as part of the Karakurt cyber extortion group.
The post Russian Member of Karakurt Cyber Extortion Gang Charged in US appeared first on SecurityWeek.
SecurityWeek – Read More
PoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model
/in General NewsA PoC exploit has been released for a critical vulnerability (CVE-2024-41992) found in the Arcadyan FMIMG51AX000J model, as well as other devices using the same firmware version.
Cyware News – Latest Cyber News – Read More
FBI Fails to Secure Sensitive Storage Media Destined for Destruction, Audit Reveals
/in General NewsAudit finds weaknesses in FBI’s inventory management and disposition procedures for drives containing sensitive information.
The post FBI Fails to Secure Sensitive Storage Media Destined for Destruction, Audit Reveals appeared first on SecurityWeek.
SecurityWeek – Read More
New Opportunistic Campaign Exploit Log4j Vulnerability for Cryptomining and System Compromise
/in General NewsThis latest Log4j exploitation-based attack uses obfuscated LDAP requests to evade detection and executes malicious scripts, establishing persistence and exfiltrating data through encrypted channels.
Cyware News – Latest Cyber News – Read More
When War Came to Their Country, They Built a Map
/in General NewsThe Telegram channel and website Deep State uses public data and insider intelligence to power its live tracker of Ukraine’s ever-shifting front line.
Security Latest – Read More
Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks
/in General NewsIn these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into clicking on malicious links that can lead to data theft or malware infection.
Cyware News – Latest Cyber News – Read More
Hardware Backdoor in Millions of Shanghai Fudan Microelectronics RFID Cards Allows Cloning
/in General NewsResearchers from Quarkslab found a hardware backdoor in the FM11RF08S RFID cards manufactured by Shanghai Fudan Microelectronics, enabling attackers to compromise user-defined keys within minutes.
Cyware News – Latest Cyber News – Read More
SolarWinds Leaks Credentials in Hotfix for Exploited Web Help Desk Flaw
/in General NewsSolarWinds has issued a Web Help Desk hotfix to remove hardcoded credentials from last week’s hotfix for a critical-severity vulnerability.
The post SolarWinds Leaks Credentials in Hotfix for Exploited Web Help Desk Flaw appeared first on SecurityWeek.
SecurityWeek – Read More
Critical GitHub Enterprise Server Flaw Patched, Admin Access at Risk
/in General NewsGitHub disclosed three security vulnerabilities in GitHub Enterprise Server (GHES), including CVE-2024-6800, CVE-2024-6337, and CVE-2024-7711. The most severe, CVE-2024-6800, allowed attackers to forge a SAML response, granting site admin privileges.
Cyware News – Latest Cyber News – Read More