Researchers discovered that a solar grid responsible for 20% of the world’s solar power output, enough to power the entire United States, is at risk of being hijacked due to vulnerabilities in PV plant management platforms.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-12 09:06:452024-08-12 09:06:45Vulnerabilities in Solar Power Management Platform can Lead to Blackouts
The malware attack flow involves luring users with fake websites imitating popular downloads, then executing PowerShell scripts to download and install malicious extensions that steal private data and control browser settings.
Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root privileges to the devices and stage follow-on attacks.
The elevated access could then be weaponized to decrypt encrypted firmware files and encrypted data such as passwords in configuration files, and even get correctly signed X.509 VPN certificates for foreign
Recent findings indicate that the 7777 botnet (aka Quad7) has likely expanded, adding new bots with open port 63256, primarily including Asus routers. As of August 5, 2024, the total number of active bots stood at 12,783.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-12 08:06:352024-08-12 08:06:35Botnet 7777: Are You Betting on a Compromised Router?
A fraudulent site resembling the official WinRar distribution platform is spreading malware. The fake website, win-rar[.]co, utilizes typosquatting to trick users who mistype the URL.
Quorum Cyber Incident Response team recently identified a new malware called SharpRhino utilized by the threat actor group Hunters International during a ransomware incident. The malware, written in C#, was distributed through a typosquatting domain posing as Angry IP Scanner.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-12 07:06:532024-08-12 07:06:53New Malware Strains Pop Up in Threat Landscape
The Russian government and IT organizations are the target of a new campaign that delivers a number of backdoors and trojans as part of a spear-phishing campaign codenamed EastWind.
The attack chains are characterized by the use of RAR archive attachments containing a Windows shortcut (LNK) file that, upon opening, activates the infection sequence, culminating in the deployment of malware such
Cybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library from the Solana blockchain platform but is actually designed to steal victims’ secrets.
“The legitimate Solana Python API project is known as ‘solana-py’ on GitHub, but simply ‘solana’ on the Python software registry, PyPI,” Sonatype researcher Ax Sharma
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-11 03:07:142024-08-11 03:07:14Donald Trump’s Campaign Says Its Emails Were Hacked
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-10 23:07:002024-08-10 23:07:00Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Vulnerabilities in Solar Power Management Platform can Lead to Blackouts
/in General NewsResearchers discovered that a solar grid responsible for 20% of the world’s solar power output, enough to power the entire United States, is at risk of being hijacked due to vulnerabilities in PV plant management platforms.
Cyware News – Latest Cyber News – Read More
New Widespread Extension Trojan Malware Campaign
/in General NewsThe malware attack flow involves luring users with fake websites imitating popular downloads, then executing PowerShell scripts to download and install malicious extensions that steal private data and control browser settings.
Cyware News – Latest Cyber News – Read More
Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks
/in General NewsSecurity vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root privileges to the devices and stage follow-on attacks.
The elevated access could then be weaponized to decrypt encrypted firmware files and encrypted data such as passwords in configuration files, and even get correctly signed X.509 VPN certificates for foreign
The Hacker News – Read More
Botnet 7777: Are You Betting on a Compromised Router?
/in General NewsRecent findings indicate that the 7777 botnet (aka Quad7) has likely expanded, adding new bots with open port 63256, primarily including Asus routers. As of August 5, 2024, the total number of active bots stood at 12,783.
Cyware News – Latest Cyber News – Read More
Fake WinRar Websites Distributing Malware Payloads Hosted on GitHub
/in General NewsA fraudulent site resembling the official WinRar distribution platform is spreading malware. The fake website, win-rar[.]co, utilizes typosquatting to trick users who mistype the URL.
Cyware News – Latest Cyber News – Read More
New Malware Strains Pop Up in Threat Landscape
/in General NewsCyware News – Latest Cyber News – Read More
EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK Files
/in General NewsThe Russian government and IT organizations are the target of a new campaign that delivers a number of backdoors and trojans as part of a spear-phishing campaign codenamed EastWind.
The attack chains are characterized by the use of RAR archive attachments containing a Windows shortcut (LNK) file that, upon opening, activates the infection sequence, culminating in the deployment of malware such
The Hacker News – Read More
Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys
/in General NewsCybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library from the Solana blockchain platform but is actually designed to steal victims’ secrets.
“The legitimate Solana Python API project is known as ‘solana-py’ on GitHub, but simply ‘solana’ on the Python software registry, PyPI,” Sonatype researcher Ax Sharma
The Hacker News – Read More
Donald Trump’s Campaign Says Its Emails Were Hacked
/in General NewsTrump campaign spokesperson Steven Cheung blamed the hack on “foreign sources hostile to the United States.”
The post Donald Trump’s Campaign Says Its Emails Were Hacked appeared first on SecurityWeek.
SecurityWeek – Read More
Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
/in General NewsSecurity researcher Bill Demirkapi found more than 15,000 hardcoded secrets and 66,000 vulnerable websites—all by searching overlooked data sources.
Security Latest – Read More