VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access – OfficialSarkar

VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access – OfficialSarkar

A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by “several” ransomware groups to gain elevated permissions and deploy file-encrypting malware. The attacks involve the exploitation of CVE-2024-37085 (CVSS score: 6.8), an Active Directory integration authentication bypass that allows an attacker to obtain administrative access to the host. “A malicious actor…

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild – OfficialSarkar

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild – OfficialSarkar

Jul 29, 2024Ravie LakshmananEnterprise Security / Data Protection Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 (CVSS score: 9.8), concerns a case of remote code execution that stems from the use of default passwords. The…

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails – OfficialSarkar

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails – OfficialSarkar

An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoint’s defenses to send millions of messages spoofing various popular companies like Best Buy, IBM, Nike, and Walt Disney, among others. “These emails echoed from official Proofpoint email relays with authenticated SPF and…

How Searchable Encryption Changes the Data Security Game – OfficialSarkar

How Searchable Encryption Changes the Data Security Game – OfficialSarkar

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must encrypt their most valuable, sensitive data to prevent data theft and breaches. They also understand that organizational data exists to be used. To be searched, viewed, and modified to keep businesses running. Unfortunately, our Network…

‘Stargazer Goblin’ Creates 3,000 Fake GitHub Accounts for Malware Spread – OfficialSarkar

‘Stargazer Goblin’ Creates 3,000 Fake GitHub Accounts for Malware Spread – OfficialSarkar

A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service (DaaS) that propagates a variety of information-stealing malware and netting them $100,000 in illicit profits over the past year. The network, which comprises over 3,000 accounts on the cloud-based code hosting platform, spans thousands of…

Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site – OfficialSarkar

Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site – OfficialSarkar

Jul 29, 2024NewsroomCybersecurity / Cyber Espionage The remote access trojan known as Gh0st RAT has been observed being delivered by an “evasive dropper” called Gh0stGambit as part of a drive-by download scheme targeting Chinese-speaking Windows users. These infections stem from a fake website (“chrome-web[.]com”) serving malicious installer packages masquerading as Google’s Chrome browser, indicating that…

French Authorities Launch Operation to Remove PlugX Malware from Infected Systems – OfficialSarkar

French Authorities Launch Operation to Remove PlugX Malware from Infected Systems – OfficialSarkar

Jul 27, 2024NewsroomMalware / Cyber Intelligence French judicial authorities, in collaboration with Europol, have launched a so-called “disinfection operation” to rid compromised hosts of a known malware called PlugX. The Paris Prosecutor’s Office, Parquet de Paris, said the initiative was launched on July 18 and that it’s expected to continue for “several months.” It further…

Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials – OfficialSarkar

Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials – OfficialSarkar

Jul 27, 2024NewsroomCybersecurity / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems with the goal of stealing users’ Google Cloud credentials from a narrow pool of victims. The package, named “lr-utils-lib,” attracted a total of 59 downloads before it was taken down….

This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps – OfficialSarkar

This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps – OfficialSarkar

A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking malware-as-a-service (MaaS) offerings to the next level. Singaporean cybersecurity company Group-IB, which has been tracking the e-crime actor since January 2023, described the crimeware solution as a “sophisticated AI-powered phishing-as-a-service platform” capable of targeting users of more…

The Sine Qua Non of Cybersecurity – OfficialSarkar

The Sine Qua Non of Cybersecurity – OfficialSarkar

Jul 26, 2024The Hacker NewsDigital Warfare / Cybersecurity Training “Peace is the virtue of civilization. War is its crime. Yet it is often in the furnace of war that the sharpest tools of peace are forged.” – Victor Hugo. In 1971, an unsettling message started appearing on several computers that comprised ARPANET, the precursor to…