A new Grandoreiro banking trojan campaign has been spotted targeting manufacturers in Spanish-speaking countries such as Spain and Mexico.
Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
π11π€―3
Researchers have uncovered multiple vulnerabilities in ultra-wideband (UWB) real-time location systems (RTLS) that allow threat actors to launch adversary-in-the-middle (AitM) attacks and manipulate location data.
Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
π19π€―1
Researchers have discovered counterfeit Android phones of popular smartphone brands are pre-infected with multiple trojans designed to target WhatsApp and WhatsApp Business.
Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
π19π€―3
U.S. cybersecurity agency CISA warns of active exploitation of a high-severity reflected/amplified DoS attack vulnerability (CVE-2022-0028) in Palo Alto Networks' PAN-OS.
Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
π25π±5π4π₯2π1
Researchers have developed a new Air-Gap attack in which attackers can exfiltrate sensitive information from air-gapped computers to smartphones located a few meters away via Speakers-to-Gyroscope covert channel.
Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
π30π±28π€3π2π₯1
Iranian hackers (UNC3890) have been linked to a series of attacks aimed at Israeli shipping, government, energy, and healthcare organizations as part of an espionage-focused campaign.
Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
π60π€―15π11π₯9π±6π€3
Hackers have updated the nasty XCSSET malware to add support for macOS Monterey by updating the source code components to Python 3.
Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
π₯27π19π€―11π5π±5π€2
Google reveals a new malicious tool used by Iranian government-backed hackers to retrieve user data from compromised Gmail, Yahoo! and Microsoft Outlook accounts.
Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
π45π₯24π±16π€―13π€8π4
DevOps platform GitLab releases patches to fix a critical vulnerability in its software that could lead to the execution of arbitrary code on affected systems.
Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
π€―32π23π₯7π±5
Researchers discovered another large-scale adversary-in-the-middle (AiTM) campaign targeting Google Workspace enterprise users with advanced phishing kits that bypass multi-factor authentication.
Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
π30π€―14π₯7π±5π€1
Researchers uncover a widespread campaign in which hackers use compromised WordPress sites to display fraudulent Cloudflare DDoS protection pages and spread malware such as NetSupport RAT and Raccoon Stealer.
Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
π19π14π±11π€―8π5
Researchers have demonstrated a new AIR-GAP data exfiltration technique in which malware uses network interface card (NIC) LEDs to transmit covert Morse code signals that can be decoded from tens to hundreds of meters away.
Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
π€―45π19π₯8π±7π4
A growing number of cybercriminals have begun using the peer-to-peer instant messaging service Tox as a command-and-control method for cryptocurrency mining #malware.
Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
π±38π€12π10π₯9π5π€―5π1
PyPI repository has sounded the alarm about an ongoing phishing campaign aimed at stealing developers' credentials and injecting malicious updates into legitimate Python packages.
Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
π38π€―11π₯9π€6
Microsoft uncovered βMagicWeb,β a new "highly-targeted" post-exploitation malware used by the Nobelium APT hackers to maintain persistent access to compromised environments.
Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
π29π€―7π₯6π±2
Researchers uncover malware and infrastructure of North Korean Kimusky hackers targeting South Korean politicians and diplomats.
Read details: https://thehackernews.com/2022/08/researchers-uncover-kimusky-infra.html
Read details: https://thehackernews.com/2022/08/researchers-uncover-kimusky-infra.html
π36π€7
Okta Hackers behind the cyberattacks on Twilio and Cloudflare earlier this month have been linked to a broader campaign that compromised 9,931 accounts at 136 organizations.
Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
π39π€6π±1
Nation-state threat actors are increasingly adopting and integrating the "Sliver" command-and-control (C2) framework into their intrusion campaigns as a replacement for Cobalt Strike.
Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
π43π€11π5
Iranian state-sponsored hacker 'MERCURY' are leaving no stone unturned to exploit unpatched systems with Log4j to target Israeli entities, suggesting that the vulnerability's long tail for remediation.
Read details: https://thehackernews.com/2022/08/iranian-hackers-exploiting-unpatched.html
Read details: https://thehackernews.com/2022/08/iranian-hackers-exploiting-unpatched.html
π₯49π27π€14π±11π7π€―5π4
CISA has added 10 actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including flaws in dotCMS, CouchDB, WebRTC, iOS, macOS, and Delta Electronics' industrial automation #software.
Details: https://thehackernews.com/2022/08/cisa-adds-10-new-known-actively.html
Details: https://thehackernews.com/2022/08/cisa-adds-10-new-known-actively.html
π20π±15π6π€1
Twilio says hackers also gained access to the two-factor authentication (2FA) Authy accounts of 93 users in a recent security breach.
Read details: https://thehackernews.com/2022/08/twilio-breach-also-compromised-authy.html
Read details: https://thehackernews.com/2022/08/twilio-breach-also-compromised-authy.html
π±35π20π16π€1