The Russian government and IT organizations are the target of a new campaign that delivers a number of backdoors and trojans as part of a spear-phishing campaign codenamed EastWind.
The attack chains are characterized by the use of RAR archive attachments containing a Windows shortcut (LNK) file that, upon opening, activates the infection sequence, culminating in the deployment of malware such
Cybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library from the Solana blockchain platform but is actually designed to steal victims’ secrets.
“The legitimate Solana Python API project is known as ‘solana-py’ on GitHub, but simply ‘solana’ on the Python software registry, PyPI,” Sonatype researcher Ax Sharma
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-11 03:07:142024-08-11 03:07:14Donald Trump’s Campaign Says Its Emails Were Hacked
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-10 23:07:002024-08-10 23:07:00Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
Allan “dwangoAC” has made it his mission to expose speedrunning phonies. At the Defcon hacker conference, he’ll challenge one record that’s stood for 15 years.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-10 22:06:482024-08-10 22:06:48The Hacker Who Hunts Video Game Speedrunning Cheaters
On the hunt for corporate devices being sold secondhand, a researcher found a trove of Apple corporate data, a Mac Mini from the Foxconn assembly line, an iPhone 14 prototype, and more.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-10 20:06:382024-08-10 20:06:38Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
As many as 10 security flaws have been uncovered in Google’s Quick Share data transfer utility for Android and Windows that could be assembled to trigger remote code execution (RCE) chain on systems that have the software installed.
“The Quick Share application implements its own specific application-layer communication protocol to support file transfers between nearby, compatible devices,”
An ongoing, widespread malware campaign has been observed installing rogue Google Chrome and Microsoft Edge extensions via a trojan distributed via fake websites masquerading as popular software.
“The trojan malware contains different deliverables ranging from simple adware extensions that hijack searches to more sophisticated malicious scripts that deliver local extensions to steal private data
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-10 12:07:052024-08-10 12:07:05Russian Midnight Blizzard Breached UK Home Office via Microsoft
Cisco has issued a warning about critical remote code execution zero-days affecting the web-based management interface of the Small Business SPA 300 and SPA 500 series IP phones, which are no longer supported.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-08-10 09:06:382024-08-10 09:06:38Cisco Warns of Critical RCE Zero-Days in End of Life IP Phones
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK Files
/in General NewsThe Russian government and IT organizations are the target of a new campaign that delivers a number of backdoors and trojans as part of a spear-phishing campaign codenamed EastWind.
The attack chains are characterized by the use of RAR archive attachments containing a Windows shortcut (LNK) file that, upon opening, activates the infection sequence, culminating in the deployment of malware such
The Hacker News – Read More
Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys
/in General NewsCybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library from the Solana blockchain platform but is actually designed to steal victims’ secrets.
“The legitimate Solana Python API project is known as ‘solana-py’ on GitHub, but simply ‘solana’ on the Python software registry, PyPI,” Sonatype researcher Ax Sharma
The Hacker News – Read More
Donald Trump’s Campaign Says Its Emails Were Hacked
/in General NewsTrump campaign spokesperson Steven Cheung blamed the hack on “foreign sources hostile to the United States.”
The post Donald Trump’s Campaign Says Its Emails Were Hacked appeared first on SecurityWeek.
SecurityWeek – Read More
Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
/in General NewsSecurity researcher Bill Demirkapi found more than 15,000 hardcoded secrets and 66,000 vulnerable websites—all by searching overlooked data sources.
Security Latest – Read More
The Hacker Who Hunts Video Game Speedrunning Cheaters
/in General NewsAllan “dwangoAC” has made it his mission to expose speedrunning phonies. At the Defcon hacker conference, he’ll challenge one record that’s stood for 15 years.
Security Latest – Read More
Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
/in General NewsOn the hunt for corporate devices being sold secondhand, a researcher found a trove of Apple corporate data, a Mac Mini from the Foxconn assembly line, an iPhone 14 prototype, and more.
Security Latest – Read More
Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share
/in General NewsAs many as 10 security flaws have been uncovered in Google’s Quick Share data transfer utility for Android and Windows that could be assembled to trigger remote code execution (RCE) chain on systems that have the software installed.
“The Quick Share application implements its own specific application-layer communication protocol to support file transfers between nearby, compatible devices,”
The Hacker News – Read More
New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions
/in General NewsAn ongoing, widespread malware campaign has been observed installing rogue Google Chrome and Microsoft Edge extensions via a trojan distributed via fake websites masquerading as popular software.
“The trojan malware contains different deliverables ranging from simple adware extensions that hijack searches to more sophisticated malicious scripts that deliver local extensions to steal private data
The Hacker News – Read More
Russian Midnight Blizzard Breached UK Home Office via Microsoft
/in General NewsRussian hacking group Midnight Blizzard breached the UK Home Office, stealing sensitive data. Learn how they exploited supply…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Cisco Warns of Critical RCE Zero-Days in End of Life IP Phones
/in General NewsCisco has issued a warning about critical remote code execution zero-days affecting the web-based management interface of the Small Business SPA 300 and SPA 500 series IP phones, which are no longer supported.
Cyware News – Latest Cyber News – Read More