An ongoing wave of malware attacks targeting hospitality, hotel, and travel organizations has been tied to a financially motivated cybercrime group.
Read details: https://thehackernews.com/2022/08/cybercrime-group-ta558-targeting.html
Read details: https://thehackernews.com/2022/08/cybercrime-group-ta558-targeting.html
π8π₯1
CISA has updated its Known Exploited Vulnerabilities Catalog with 7 new vulnerabilities based on evidence of active exploitation.
Read details: https://thehackernews.com/2022/08/cisa-adds-7-new-actively-exploited.html
CVE-2017-15944, CVE-2022-21971, CVE-2022-26923, CVE-2022-2856, CVE-2022-32893, CVE-2022-32894, CVE-2022-22536
Read details: https://thehackernews.com/2022/08/cisa-adds-7-new-actively-exploited.html
CVE-2017-15944, CVE-2022-21971, CVE-2022-26923, CVE-2022-2856, CVE-2022-32893, CVE-2022-32894, CVE-2022-22536
π6π₯2
A new Grandoreiro banking trojan campaign has been spotted targeting manufacturers in Spanish-speaking countries such as Spain and Mexico.
Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
π11π€―3
Researchers have uncovered multiple vulnerabilities in ultra-wideband (UWB) real-time location systems (RTLS) that allow threat actors to launch adversary-in-the-middle (AitM) attacks and manipulate location data.
Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
π19π€―1
Researchers have discovered counterfeit Android phones of popular smartphone brands are pre-infected with multiple trojans designed to target WhatsApp and WhatsApp Business.
Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
π19π€―3
U.S. cybersecurity agency CISA warns of active exploitation of a high-severity reflected/amplified DoS attack vulnerability (CVE-2022-0028) in Palo Alto Networks' PAN-OS.
Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
π25π±5π4π₯2π1
Researchers have developed a new Air-Gap attack in which attackers can exfiltrate sensitive information from air-gapped computers to smartphones located a few meters away via Speakers-to-Gyroscope covert channel.
Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
π30π±28π€3π2π₯1
Iranian hackers (UNC3890) have been linked to a series of attacks aimed at Israeli shipping, government, energy, and healthcare organizations as part of an espionage-focused campaign.
Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
π60π€―15π11π₯9π±6π€3
Hackers have updated the nasty XCSSET malware to add support for macOS Monterey by updating the source code components to Python 3.
Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
π₯27π19π€―11π5π±5π€2
Google reveals a new malicious tool used by Iranian government-backed hackers to retrieve user data from compromised Gmail, Yahoo! and Microsoft Outlook accounts.
Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
π45π₯24π±16π€―13π€8π4
DevOps platform GitLab releases patches to fix a critical vulnerability in its software that could lead to the execution of arbitrary code on affected systems.
Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
π€―32π23π₯7π±5
Researchers discovered another large-scale adversary-in-the-middle (AiTM) campaign targeting Google Workspace enterprise users with advanced phishing kits that bypass multi-factor authentication.
Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
π30π€―14π₯7π±5π€1
Researchers uncover a widespread campaign in which hackers use compromised WordPress sites to display fraudulent Cloudflare DDoS protection pages and spread malware such as NetSupport RAT and Raccoon Stealer.
Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
π19π14π±11π€―8π5
Researchers have demonstrated a new AIR-GAP data exfiltration technique in which malware uses network interface card (NIC) LEDs to transmit covert Morse code signals that can be decoded from tens to hundreds of meters away.
Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
π€―45π19π₯8π±7π4
A growing number of cybercriminals have begun using the peer-to-peer instant messaging service Tox as a command-and-control method for cryptocurrency mining #malware.
Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
π±38π€12π10π₯9π5π€―5π1
PyPI repository has sounded the alarm about an ongoing phishing campaign aimed at stealing developers' credentials and injecting malicious updates into legitimate Python packages.
Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
π38π€―11π₯9π€6
Microsoft uncovered βMagicWeb,β a new "highly-targeted" post-exploitation malware used by the Nobelium APT hackers to maintain persistent access to compromised environments.
Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
π29π€―7π₯6π±2
Researchers uncover malware and infrastructure of North Korean Kimusky hackers targeting South Korean politicians and diplomats.
Read details: https://thehackernews.com/2022/08/researchers-uncover-kimusky-infra.html
Read details: https://thehackernews.com/2022/08/researchers-uncover-kimusky-infra.html
π36π€7
Okta Hackers behind the cyberattacks on Twilio and Cloudflare earlier this month have been linked to a broader campaign that compromised 9,931 accounts at 136 organizations.
Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
π39π€6π±1
Nation-state threat actors are increasingly adopting and integrating the "Sliver" command-and-control (C2) framework into their intrusion campaigns as a replacement for Cobalt Strike.
Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
π43π€11π5