Cybercriminals Deploy 100K+ Malware Android Apps to Steal OTP Codes – OfficialSarkar

Cybercriminals Deploy 100K+ Malware Android Apps to Steal OTP Codes – OfficialSarkar

Jul 31, 2024Ravie LakshmananMobile Security / Malware A new malicious campaign has been observed making use of malicious Android apps to steal users’ SMS messages since at least February 2022 as part of a large-scale campaign. The malicious apps, spanning over 107,000 unique samples, are designed to intercept one-time passwords (OTPs) used for online account…

Meta Settles for $1.4 Billion with Texas Over Illegal Biometric Data Collection – OfficialSarkar

Meta Settles for $1.4 Billion with Texas Over Illegal Biometric Data Collection – OfficialSarkar

Jul 31, 2024Ravie LakshmananPrivacy / Social Media Meta, the parent company of Facebook, Instagram, and WhatsApp, agreed to a record $1.4 billion settlement with the U.S. state of Texas over allegations that it illegally collected biometric data of millions of users without their permission, marking one of the largest penalties levied by regulators against the…

New Mandrake Spyware Found in Google Play Store Apps After Two Years – OfficialSarkar

New Mandrake Spyware Found in Google Play Store Apps After Two Years – OfficialSarkar

Jul 30, 2024Ravie LakshmananMobile Security / Spyware A new iteration of a sophisticated Android spyware called Mandrake has been discovered in five applications that were available for download from the Google Play Store and remained undetected for two years. The applications attracted a total of more than 32,000 installations before being pulled from the app…

The Power and Peril of RMM Tools – OfficialSarkar

The Power and Peril of RMM Tools – OfficialSarkar

As more people work remotely, IT departments must manage devices distributed over different cities and countries relying on VPNs and remote monitoring and management (RMM) tools for system administration. However, like any new technology, RMM tools can also be used maliciously. Threat actors can establish connections to a victim’s device and run commands, exfiltrate data,…

Illuminating the Deep, Dark Cybercriminal Underground – OfficialSarkar

Illuminating the Deep, Dark Cybercriminal Underground – OfficialSarkar

Jul 30, 2024The Hacker NewsDark Web Intelligence Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. The deep and…

Cybercriminals Target Polish Businesses with Agent Tesla and Formbook Malware – OfficialSarkar

Cybercriminals Target Polish Businesses with Agent Tesla and Formbook Malware – OfficialSarkar

Jul 30, 2024Ravie LakshmananMalware / Cyber Threat Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during May 2024 that led to the deployment of several malware families like Agent Tesla, Formbook, and Remcos RAT. Some of the other regions targeted by the campaigns include Italy and Romania, according…

New SideWinder Cyber Attacks Target Maritime Facilities in Multiple Countries – OfficialSarkar

New SideWinder Cyber Attacks Target Maritime Facilities in Multiple Countries – OfficialSarkar

Jul 30, 2024Ravie LakshmananCyber Espionage / Malware The nation-state threat actor known as SideWinder has been attributed to a new cyber espionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. The BlackBerry Research and Intelligence Team, which discovered the activity, said targets of the spear-phishing campaign include countries like Pakistan,…

OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script – OfficialSarkar

OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script – OfficialSarkar

Jul 30, 2024Ravie LakshmananMalware / Email Security Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim of executing a malicious PowerShell script. “This campaign heavily relies on social engineering tactics to deceive users into executing a PowerShell script, thereby compromising their systems,” Trellix security researcher Rafael Pena…

VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access – OfficialSarkar

VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access – OfficialSarkar

A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by “several” ransomware groups to gain elevated permissions and deploy file-encrypting malware. The attacks involve the exploitation of CVE-2024-37085 (CVSS score: 6.8), an Active Directory integration authentication bypass that allows an attacker to obtain administrative access to the host. “A malicious actor…

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild – OfficialSarkar

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild – OfficialSarkar

Jul 29, 2024Ravie LakshmananEnterprise Security / Data Protection Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 (CVSS score: 9.8), concerns a case of remote code execution that stems from the use of default passwords. The…