Tag:
Malware analysis
Cryptocurrency hack
PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner
Researchers observed a URL attempts to exploit a server-side vulnerability by executing multiple commands through PHP's system() function.It downloads a malicious executable from...
Cyber Security News
EAGERBEE Malware Updated It’s Arsenal With Payloads & Command Shells
The Kaspersky researchers investigation into the EAGERBEE backdoor revealed its deployment within Middle Eastern ISPs and government entities of novel components, including a service...
Cyber Security News
Weaponized Python Scripts Deliver New SwaetRAT Malware
The Python script leverages low-level interactions with the Windows operating system, which imports crucial libraries like `System.Reflection`, `ctypes`, and `wintypes`, enabling it to directly...
cyber security
Lumma Stealer Attacking Users To Steal Login Credentials From Browsers
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised EXE installer, as analysis revealed a parent-child relationship between...
Botnet
DigiEver IoT Devices Exploited To Deliver Mirai-based Malware
A new Mirai-based botnet, "Hail Cock Botnet," has been exploiting vulnerable IoT devices, including DigiEver DVRs and TP-Link devices with CVE-2023-1389.The botnet, active since...
Cyber Security News
Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware
Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign. A link that was disguised as...
Cyber Security News
Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files
Recent research has linked a series of cyberattacks to The Mask group, as one notable attack targeted a Latin American organization in 2022, where...
Cyber Security News
Google’s New XRefer Tool To Analyze More Complex Malware Samples
XRefer, an IDA Pro plugin, enhances binary analysis with a persistent companion view by employing Gemini-powered cluster analysis to decompose binaries into functional units,...