Fake Trading Apps Target Victims Globally via Apple App Store and Google Play – OfficialSarkar

Fake Trading Apps Target Victims Globally via Apple App Store and Google Play – OfficialSarkar

A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well as phishing sites, to defraud victims, per findings from Group-IB. The campaign is part of a consumer investment fraud scheme that’s also widely known as pig butchering, in which prospective victims are lured into making…

Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals – OfficialSarkar

Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals – OfficialSarkar

Oct 02, 2024Ravie LakshmananCybercrime / Threat Intelligence A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent efforts to single out the sector under the guise of fake job applicant lures. “A sophisticated spear-phishing lure tricked a recruitment officer into downloading and executing a malicious file disguised as…

China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration – OfficialSarkar

China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration – OfficialSarkar

Oct 02, 2024Ravie LakshmananCyber Espionage / Cloud Security A previously undocumented threat actor called CeranaKeeper has been linked to a string of data exfiltration attacks targeting Southeast Asia. Slovak cybersecurity firm ESET, which observed campaigns targeting governmental institutions in Thailand starting in 2023, attributed the activity cluster as aligned to China, leveraging tools previously identified…

Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities – OfficialSarkar

Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities – OfficialSarkar

Oct 02, 2024Ravie LakshmananVulnerability / Network Security A little over a dozen new security vulnerabilities have been discovered in residential and enterprise routers manufactured by DrayTek that could be exploited to take over susceptible devices. “These vulnerabilities could enable attackers to take control of a router by injecting malicious code, allowing them to persist on…

Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit – OfficialSarkar

Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit – OfficialSarkar

Oct 02, 2024Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by malicious actors by exploiting a security vulnerability dubbed CosmicSting. Tracked as CVE-2024-34102 (CVSS score: 9.8), the critical flaw relates to an improper restriction of XML external entity reference (XXE) vulnerability that…

5 Must-Have Tools for Effective Dynamic Malware Analysis – OfficialSarkar

5 Must-Have Tools for Effective Dynamic Malware Analysis – OfficialSarkar

Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program in the isolated environment of a malware sandbox to monitor its behavior and gather actionable indicators. Effective analysis must be fast, in-depth, and precise. These five tools will help you achieve it with ease. 1….

Andariel Hacking Group Shifts Focus to Financial Attacks on U.S. Organizations – OfficialSarkar

Andariel Hacking Group Shifts Focus to Financial Attacks on U.S. Organizations – OfficialSarkar

Oct 02, 2024Ravie LakshmananCyber Threat / Malware Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-sponsored threat actor called Andariel as part of a likely financially motivated attack. “While the attackers didn’t succeed in deploying ransomware on the networks of any of the organizations affected, it is likely…

PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data – OfficialSarkar

PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data – OfficialSarkar

Oct 02, 2024The Hacker NewsSupply Chain Attack / Cryptocurrency A new set of malicious packages has been unearthed in the Python Package Index (PyPI) repository that masqueraded as cryptocurrency wallet recovery and management services, only to siphon sensitive data and facilitate the theft of valuable digital assets. “The attack targeted users of Atomic, Trust Wallet,…

Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw – OfficialSarkar

Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw – OfficialSarkar

Oct 02, 2024The Hacker NewsEmail Security / Vulnerability Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacor’s Zimbra Collaboration. Enterprise security firm Proofpoint said it began observing the activity starting September 28, 2024. The attacks seek to exploit CVE-2024-45519, a severe security flaw in Zimbra’s postjournal service that…

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition – OfficialSarkar

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition – OfficialSarkar

The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence (AI) for optical character recognition (OCR) as part of what’s called “Seed Phrase Image Recognition.” “This allows Rhadamanthys to extract cryptocurrency wallet seed phrases from images, making it a highly potent threat for anyone dealing…