Researchers discover vulnerabilities in Xiaomi's mobile payment mechanism affecting smartphone devices powered by MediaTek chips.
Read details: https://thehackernews.com/2022/08/xiaomi-phones-with-mediatek-chips-found.html
Read details: https://thehackernews.com/2022/08/xiaomi-phones-with-mediatek-chips-found.html
π3
Researchers have discovered new UEFI Secure Boot bypass vulnerabilities affecting 3 Microsoft-signed boot loaders that could allow attackers to modify the OS on load, install backdoors, and disable security controls.
Read: https://thehackernews.com/2022/08/researchers-uncover-uefi-secure-boot.html
Read: https://thehackernews.com/2022/08/researchers-uncover-uefi-secure-boot.html
π6π₯2
Researchers have uncovered a new malware campaign in which Chinese "Lucky Mouse" hackers backdoor the chat app MiMi to compromise Windows, Linux, and macOS systems.
Read details: https://thehackernews.com/2022/08/chinese-hackers-backdoored-mimi-chat.html
Read details: https://thehackernews.com/2022/08/chinese-hackers-backdoored-mimi-chat.html
π2
A developer of Tornado Cash has been arrested in the Netherlands on suspicion of concealing criminal financial flows and facilitating money laundering, just days after the U.S. sanctioned the decentralized cryptocurrency mixing service.
Details: https://thehackernews.com/2022/08/tornado-cash-developer-arrested-after.html
Details: https://thehackernews.com/2022/08/tornado-cash-developer-arrested-after.html
π1
Researchers discover a new Python package distributed via the PyPI repository that drops fileless crypto-mining malware onto Linux systems.
Read details: https://thehackernews.com/2022/08/newly-uncovered-pypi-package-drops.html
Read details: https://thehackernews.com/2022/08/newly-uncovered-pypi-package-drops.html
π9
Researchers discover a new variant of SOVA Android banking trojan with upgraded capabilities i.e. intercepting two-factor authentication codes, stealing cookies & data, taking screenshots, and preventing it from being removed by its victims.
https://thehackernews.com/2022/08/sova-android-banking-trojan-returns-new.html
https://thehackernews.com/2022/08/sova-android-banking-trojan-returns-new.html
π2π₯1
Russian state-sponsored actors continue to attack Ukrainian entities with information-stealing malware in what appears to be a cyber espionage campaign.
Read details: https://thehackernews.com/2022/08/russian-state-hackers-continue-to.html
Read details: https://thehackernews.com/2022/08/russian-state-hackers-continue-to.html
π6
Microsoft has taken action to disrupt phishing attacks from SEABORGIUM, a "highly persistent threat actor" whose goals closely align with the interests of the Russian state.
Read details: https://thehackernews.com/2022/08/microsoft-warns-about-phishing-attacks.html
Read details: https://thehackernews.com/2022/08/microsoft-warns-about-phishing-attacks.html
π2
Researchers have developed a novel attack technique, dubbed βEvil PLC,β that weaponizes PLCs to gain an initial foothold in technical workplaces and penetrate operational technology networks.
Read details: https://thehackernews.com/2022/08/new-evil-plc-attack-weaponizes-plcs-to.html
Read details: https://thehackernews.com/2022/08/new-evil-plc-attack-weaponizes-plcs-to.html
π3
Researchers have uncovered details of the ΓPIC and SQUIP vulnerabilities in Intel and AMD processors that allow attackers to obtain encryption keys and other secret information.
Read: https://thehackernews.com/2022/08/pic-and-squip-vulnerabilities-found-in.html
Read: https://thehackernews.com/2022/08/pic-and-squip-vulnerabilities-found-in.html
North Korea-backed Lazarus Group has been observed attacking job seekers with #macOS malware that can run on Apple Macs with Intel and M1 chipsets.
Read details: https://thehackernews.com/2022/08/north-korea-hackers-spotted-targeting.html
Read details: https://thehackernews.com/2022/08/north-korea-hackers-spotted-targeting.html
The Hacker News
North Korea Hackers Spotted Targeting Job Seekers with macOS Malware
North Korea-backed Lazarus Group has been observed attacking job seekers with malware that can run on Apple Macs with Intel and M1 chipsets.
π3
Nearly 1.31 million users have been targeted by malicious or unwanted web browser extensions at least once during this year.
Read details: https://thehackernews.com/2022/08/malicious-browser-extensions-targeted.html
Read details: https://thehackernews.com/2022/08/malicious-browser-extensions-targeted.html
π5
RubyGems, the official Ruby package manager, now requires popular package maintainers to use multi-factor authentication (MFA).
Read: https://thehackernews.com/2022/08/rubygems-makes-multi-factor.html
Read: https://thehackernews.com/2022/08/rubygems-makes-multi-factor.html
Google releases an important update for the Chrome browser for Mac, Linux, and Windows systems to patch several new vulnerabilities, including a zero-day that is being exploited for attacks.
Read details: https://thehackernews.com/2022/08/new-google-chrome-zero-day.html
Read details: https://thehackernews.com/2022/08/new-google-chrome-zero-day.html
π4
Researchers have spotted a new Android dropper trojan that's currently in development, designed to bypass Google's new security mechanisms introduced with the latest Android 13.
Details: https://thehackernews.com/2022/08/cybercriminals-developing-bugdrop.html
Details: https://thehackernews.com/2022/08/cybercriminals-developing-bugdrop.html
Apple releases security updates for iOS, iPadOS, and macOS platforms to fix two new zero-day vulnerabilities that are exploited by threat actors to compromise users.
Read: https://thehackernews.com/2022/08/apple-releases-security-updates-to.html
Read: https://thehackernews.com/2022/08/apple-releases-security-updates-to.html
π4
Hackers associated with BazarLoader, TrickBot, and IcedID are increasingly using the Bumblebee malware loader in their campaigns to breach target networks for post-exploitation activities.
Read: https://thehackernews.com/2022/08/hackers-using-bumblebee-loader-to.html
Read: https://thehackernews.com/2022/08/hackers-using-bumblebee-loader-to.html
π4
Researchers confirm that Chinese APT41 hackers attacked at least 13 organizations in the U.S., Taiwan, India, Vietnam, and China during four separate campaigns in 2021.
Read details: https://thehackernews.com/2022/08/china-backed-apt41-hackers-targeted-13.html
Read details: https://thehackernews.com/2022/08/china-backed-apt41-hackers-targeted-13.html
π3π1
Researchers detail DarkTortilla, an evasive crypter used by hackers to spread a broad array of commodity malware and targeted payloads such as Cobalt Strike and Metasploit, likely since 2015.
Read details: https://thehackernews.com/2022/08/researchers-detail-evasive-darktortilla.html
Read details: https://thehackernews.com/2022/08/researchers-detail-evasive-darktortilla.html
π3
Researchers have discovered a new high-severity vulnerability in the Amazon Ring app for Android, allowing rogue apps to access sensitive information.
Read details: https://thehackernews.com/2022/08/new-amazon-ring-vulnerability-could.html
Read details: https://thehackernews.com/2022/08/new-amazon-ring-vulnerability-could.html
π10
Google says it has fended off the largest ever HTTPS-based distributed denial of service (DDoS) attack to date, which peaked at 46 million requests per second.
Read details: https://thehackernews.com/2022/08/google-cloud-blocks-record-ddos-attack.html
Read details: https://thehackernews.com/2022/08/google-cloud-blocks-record-ddos-attack.html
π€―14π₯3π1