U.K. National Crime Agency has disrupted Russian money laundering networks, leading to 84 arrests and the seizure of Β£20 million in cash and #cryptocurrency.
These networks werenβt just about moneyβthey funded Russian espionage and connected to cybercriminal gangs across the globe.
π Read more: https://thehackernews.com/2024/12/nca-busts-russian-crypto-networks.html
These networks werenβt just about moneyβthey funded Russian espionage and connected to cybercriminal gangs across the globe.
π Read more: https://thehackernews.com/2024/12/nca-busts-russian-crypto-networks.html
π18π10β‘4
MirrorFace, a China-linked group, is deploying the dormant ANEL backdoorβunused since 2018βin a new spear-phishing campaign targeting Japan.
Explore how these tactics are bypassing security measures: https://thehackernews.com/2024/12/anel-and-noopdoor-backdoors-weaponized.html
Explore how these tactics are bypassing security measures: https://thehackernews.com/2024/12/anel-and-noopdoor-backdoors-weaponized.html
π28π5π1
π¨ Chinese hackers launched a stealthy four-month-long cyberattack targeting a major U.S. organization, harvesting emails and stealing sensitive data.
The attackers exploited Exchange Servers and used advanced tools like FileZilla and PowerShell.
Read the full story π https://thehackernews.com/2024/12/researchers-uncover-4-month-cyberattack.html
The attackers exploited Exchange Servers and used advanced tools like FileZilla and PowerShell.
Read the full story π https://thehackernews.com/2024/12/researchers-uncover-4-month-cyberattack.html
π24π€8π5π5β‘2π€―1
π¨ Earth Minotaur is using an advanced toolkit, MOONSHINE, to deploy the DarkNimbus backdoor across Android and Windows devices, targeting vulnerable communities like Tibetans and Uyghurs.
Find details here βhttps://thehackernews.com/2024/12/hackers-target-uyghurs-and-tibetans.html
Find details here βhttps://thehackernews.com/2024/12/hackers-target-uyghurs-and-tibetans.html
π19π3π€2
π¨ A critical vulnerability (CVE-2024-41713) in Mitel MiCollab could let attackers access sensitive system files and potentially perform unauthorized administrative actions without authentication.
Full details here: https://thehackernews.com/2024/12/critical-mitel-micollab-flaw-exposes.html
Full details here: https://thehackernews.com/2024/12/critical-mitel-micollab-flaw-exposes.html
π15β‘3π3
Europol has shut down Manson Market, a notorious marketplace facilitating large-scale online fraud, seizing over 50 servers and arresting two suspects.
Learn more: https://thehackernews.com/2024/12/europol-shuts-down-manson-market-fraud.html
Learn more: https://thehackernews.com/2024/12/europol-shuts-down-manson-market-fraud.html
π21π13π€3
π¨ 77 banks and crypto exchanges under attack...
DroidBot, a new Android malware, is wreaking havoc across Europe. This $3,000/month malware-as-a-service disguises itself as popular apps to infiltrate devices.
Discover how this hidden threat operates and which countries are under attack: https://thehackernews.com/2024/12/this-3000-android-trojan-targeting.html
DroidBot, a new Android malware, is wreaking havoc across Europe. This $3,000/month malware-as-a-service disguises itself as popular apps to infiltrate devices.
Discover how this hidden threat operates and which countries are under attack: https://thehackernews.com/2024/12/this-3000-android-trojan-targeting.html
π30π8π±6π1
β οΈ Gamaredon threat actor is leveraging Cloudflare Tunnels and DNS fast-fluxing to hide malware delivery systems, targeting Ukrainian entities with GammaDrop malware.
Learn about these advanced tactics: https://thehackernews.com/2024/12/hackers-leveraging-cloudflare-tunnels.html
Learn about these advanced tactics: https://thehackernews.com/2024/12/hackers-leveraging-cloudflare-tunnels.html
π13π6π₯4π€―3π2π±1
π¨ New Malware Alert! Passwords, cookies, and moreβgone in seconds.
The RevC2 backdoor, part of the More_eggs operation, is now stealing browser data using WebSockets.
Read the full story here: https://thehackernews.com/2024/12/moreeggs-maas-expands-operations-with.html
The RevC2 backdoor, part of the More_eggs operation, is now stealing browser data using WebSockets.
Read the full story here: https://thehackernews.com/2024/12/moreeggs-maas-expands-operations-with.html
π±15π9π4π€―4π₯2
π¨ New vulnerabilities in MLflow, H2O, PyTorch, and MLeap expose open-source machine learning (ML) tools and AI frameworks to the risk of remote code execution.
Read the full story for more details: https://thehackernews.com/2024/12/researchers-uncover-flaws-in-popular.html
Read the full story for more details: https://thehackernews.com/2024/12/researchers-uncover-flaws-in-popular.html
π19π±18π5π₯2β‘1π1
A Russian programmer's Android phone was secretly implanted with spyware by the FSB after his detention for allegedly donating to Ukraine.
The spyware could record phone calls, track location, log keystrokes, and even extract encrypted messages.
Learn how this spyware operates: https://thehackernews.com/2024/12/fsb-uses-trojan-app-to-monitor-russian.html
The spyware could record phone calls, track location, log keystrokes, and even extract encrypted messages.
Learn how this spyware operates: https://thehackernews.com/2024/12/fsb-uses-trojan-app-to-monitor-russian.html
π36π€―19π13π4β‘3π₯2
π When democracy doesnβt go your wayβ¦ Just Resetβ’
Romaniaβs Constitutional Court annulled the presidential election after the losing government cried foul over Russian interference, claiming 25,000 TikTok accounts and 85,000 cyberattacks swayed the results.
Read the details: https://thehackernews.com/2024/12/romania-cancels-presidential-election.html
Romaniaβs Constitutional Court annulled the presidential election after the losing government cried foul over Russian interference, claiming 25,000 TikTok accounts and 85,000 cyberattacks swayed the results.
Read the details: https://thehackernews.com/2024/12/romania-cancels-presidential-election.html
π20π14π€9π8π€―7π₯3π±3
π¨ Cybercriminals are luring Web3 professionals into traps using fake video conferencing apps.
These apps deliver "Realst," an information stealer targeting sensitive data like #cryptocurrency wallets and Telegram credentials.
Read here: https://thehackernews.com/2024/12/hackers-using-fake-video-conferencing.html
These apps deliver "Realst," an information stealer targeting sensitive data like #cryptocurrency wallets and Telegram credentials.
Read here: https://thehackernews.com/2024/12/hackers-using-fake-video-conferencing.html
π22π₯9
π¨ Software supply chain attack alert!
Two popular Python AI library versions, Ultralytics 8.3.41 & 8.3.42, were compromised to deliver cryptocurrency miners.
Read details here: https://thehackernews.com/2024/12/ultralytics-ai-library-compromised.html
Two popular Python AI library versions, Ultralytics 8.3.41 & 8.3.42, were compromised to deliver cryptocurrency miners.
Read details here: https://thehackernews.com/2024/12/ultralytics-ai-library-compromised.html
π21π₯7π6β‘2π€―1
π¨ A botnet named Socks5Systemz has infected over 85,000 machines worldwide, transforming them into anonymous proxy servers marketed on PROXY[.]AM for as much as $700/month.
Learn more: https://thehackernews.com/2024/12/socks5systemz-botnet-powers-illegal.html
Learn more: https://thehackernews.com/2024/12/socks5systemz-botnet-powers-illegal.html
π€―20π7π6π5π₯3
π Identity isnβt enough. Privileged access needs extra layers of security.
From privilege elevation to quantum-safe connections, here are 7 bolt-ons IAMs like Entra ID need now.
Secure your critical sessions. Read more: https://thehackernews.com/2024/12/seven-bolt-ons-to-make-your-entra-id.html
From privilege elevation to quantum-safe connections, here are 7 bolt-ons IAMs like Entra ID need now.
Secure your critical sessions. Read more: https://thehackernews.com/2024/12/seven-bolt-ons-to-make-your-entra-id.html
π12π₯6π±5
π Researchers uncover DeepSeekβs XSS vulnerability and Anthropicβs Claudeβs βZombAIsβ technique, revealing how prompt injection can hijack user accounts and execute malicious commands.
Learn how these attacks work: https://thehackernews.com/2024/12/researchers-uncover-prompt-injection.html
Learn how these attacks work: https://thehackernews.com/2024/12/researchers-uncover-prompt-injection.html
π15β‘4π€―4π3π₯1
Exabyte-scale data is here, and traditional methods canβt handle the challenges of securing it across multi-cloud environments.
Learn how Sentraβs Data Security Platform helps organizations tackle these challenges.
Read: https://thn.news/sentra-exabyte-data-security
Learn how Sentraβs Data Security Platform helps organizations tackle these challenges.
Read: https://thn.news/sentra-exabyte-data-security
www.sentra.io
Achieve Exabyte Scale Enterprise Data Security | Sentra
Enterprise data security is harder with growing data and multi-cloud environments. Discover how Sentraβs DSP offers smart, scalable solutions to protect it.
π7π€―4π2π€2π₯1
π¨ Black Basta ransomware operators have adopted new social engineering tricks, targeting victims with email bombs and impersonating IT staff on Microsoft Teams.
Click for insights π https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
Click for insights π https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
π21π5π±4π₯1
β οΈ A Russia-linked group, UAC-0185, is ramping up phishing attacks targeting Ukraine's defense forces. These attacks use malware delivered through malicious links, leveraging PowerShell scripts and HTML applications to install remote control tools like MeshAgent, giving attackers full access to compromised systems.
Full details: https://thehackernews.com/2024/12/cert-ua-warns-of-phishing-attacks.html
Full details: https://thehackernews.com/2024/12/cert-ua-warns-of-phishing-attacks.html
π₯24π11π9β‘2π€2π±2