‘Konfety’ Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins – OfficialSarkar

‘Konfety’ Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins – OfficialSarkar

Jul 16, 2024NewsroomMobile Security / Online Security Details have emerged about a “massive ad fraud operation” that leverages hundreds of apps on the Google Play Store to perform a host of nefarious activities. The campaign has been codenamed Konfety – the Russian word for Candy – owing to its abuse of a mobile advertising software…

Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks – OfficialSarkar

Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks – OfficialSarkar

The Iranian nation-state actor known as MuddyWater has been observed using a never-before-seen backdoor as part of a recent attack campaign, shifting away from its well-known tactic of deploying legitimate remote monitoring and management (RMM) software for maintaining persistent access. That’s according to independent findings from cybersecurity firms Check Point and Sekoia, which have codenamed…

Threat Prevention & Detection in SaaS Environments – OfficialSarkar

Threat Prevention & Detection in SaaS Environments – OfficialSarkar

Identity-based threats on SaaS applications are a growing concern among security professionals, although few have the capabilities to detect and respond to them. According to the US Cybersecurity and Infrastructure Security Agency (CISA), 90% of all cyberattacks begin with phishing, an identity-based threat. Throw in attacks that use stolen credentials, over-provisioned accounts, and insider threats,…

Malicious npm Packages Found Using Image Files to Hide Backdoor Code – OfficialSarkar

Malicious npm Packages Found Using Image Files to Hide Backdoor Code – OfficialSarkar

Jul 16, 2024NewsroomOpen Source / Software Supply Chain Cybersecurity researchers have identified two malicious packages on the npm package registry that concealed backdoor code to execute malicious commands sent from a remote server. The packages in question – img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy – have been downloaded 190 and 48 times each. As of writing, they have…

Void Banshee APT Exploits Microsoft MHTML Flaw to Spread Atlantida Stealer – OfficialSarkar

Void Banshee APT Exploits Microsoft MHTML Flaw to Spread Atlantida Stealer – OfficialSarkar

Jul 16, 2024NewsroomData Security / Vulnerability An advanced persistent threat (APT) group called Void Banshee has been observed exploiting a recently disclosed security flaw in the Microsoft MHTML browser engine as a zero-day to deliver an information stealer called Atlantida. Cybersecurity firm Trend Micro, which observed the activity in mid-May 2024, the vulnerability – tracked…

CISA Warns of Actively Exploited RCE Flaw in GeoServer GeoTools Software – OfficialSarkar

CISA Warns of Actively Exploited RCE Flaw in GeoServer GeoTools Software – OfficialSarkar

Jul 16, 2024NewsroomVulnerability / Infrastructure Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting OSGeo GeoServer GeoTools to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. GeoServer is an open-source software server written in Java that allows users to share and edit geospatial…

Kaspersky Exits U.S. Market Following Commerce Department Ban – OfficialSarkar

Kaspersky Exits U.S. Market Following Commerce Department Ban – OfficialSarkar

Jul 16, 2024NewsroomNational Security / Data Security Russian security vendor Kaspersky has said it’s exiting the U.S. market nearly a month after the Commerce Department announced a ban on the sale of its software in the country citing a national security risk. News of the closure was first reported by journalist Kim Zetter. The company…

GitHub Token Leak Exposes Python’s Core Repositories to Potential Attacks – OfficialSarkar

GitHub Token Leak Exposes Python’s Core Repositories to Potential Attacks – OfficialSarkar

Jul 15, 2024NewsroomSupply Chain Attack / Cyber Threat Cybersecurity researchers said they discovered an accidentally leaked GitHub token that could have granted elevated access to the GitHub repositories of the Python language, Python Package Index (PyPI), and the Python Software Foundation (PSF) repositories. JFrog, which found the GitHub Personal Access Token, said the secret was…

CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool – OfficialSarkar

CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool – OfficialSarkar

Jul 15, 2024NewsroomSaaS Security / Vulnerability A threat actor that was previously observed using an open-source network mapping tool has greatly expanded their operations to infect over 1,500 victims. Sysdig, which is tracking the cluster under the name CRYSTALRAY, said the activities have witnessed a 10x surge, adding it includes “mass scanning, exploiting multiple vulnerabilities,…

Infostealer Garden of Low-Hanging Fruit – OfficialSarkar

Infostealer Garden of Low-Hanging Fruit – OfficialSarkar

Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn’t it? Or exciting, depending on which side of the cybersecurity barricade you are on. Well, that’s basically the state of things today. Welcome to the infostealer garden of low-hanging fruit. Over the last few…