publicvoit, to windows
@publicvoit@graz.social avatar

So, #Windows will not come with #Recall #spyware activated, just Recall spyware pre-installed.

What a relief. Not. 🙄

https://www.theverge.com/2024/6/7/24173499/microsoft-windows-recall-response-security-concerns

If I'd own a company which is still using #Microsoft, I'd have a migration path to #Linux worked out meanwhile.

#malware #FOSS #trust

br00t4c, to random
@br00t4c@mastodon.social avatar
dubbel, to python
@dubbel@mstdn.io avatar

Reported 5 malicious packages to : numberpy, tqmmd, pandans, openpyexl, reqwestss all by the same user leemay1782.

All with the same "functionality", getting commands via a socket from dzgi0h7on1jhzdg0vknw9pp9309rxjl8.oastify[.]com and executing it.
I don't think I saw the setup.py entry_points being used as a trigger mechanism before?

kubikpixel, to random
@kubikpixel@chaos.social avatar

Mystery malware destroys 600,000 routers from a single ISP during 72-hour span:

An unknown threat actor with equally unknown motives forces ISP to replace routers.
One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them.

🔓 https://arstechnica.com/security/2024/05/mystery-malware-destroys-600000-routers-from-a-single-isp-during-72-hour-span/


#password #hack #pwhack #isp #mystery #malware #routers #unknown #october

ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar

Wow, someone deployed malware in October of 2023 which bricked 600,000 Internet routers -- owned by a SINGLE ISP.

"over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP). The incident took place over a 72-hour period between October 25-27, rendered the infected devices permanently inoperable, and required a hardware-based replacement."

https://blog.lumen.com/the-pumpkin-eclipse/

TalosSecurity, to random
@TalosSecurity@mstdn.social avatar

A new threat actor known as #LilacSquid is using several different pieces of #malware to silently infiltrate networks and steal sensitive data. Read more about this group and the TTPs they share with some North Korean state-sponsored actors https://blog.talosintelligence.com/lilacsquid/

nikita, to random German
@nikita@social.tchncs.de avatar

Fast 150.000 Android-Smartphones mit Banking- infiziert

In den vergangenen Monaten wurden einer neuen Untersuchung zufolge mehr als fünf Millionen Android-Smartphones mit infiziert. Darunter ist auch ein äußerst gefährlicher Banking-Trojaner.

TECHBOOK zeigt, welche betroffenen Apps Sie umgehend löschen sollten.

https://www.techbook.de/mobile-lifestyle/apps/anatsa-banking-trojaner

redhotcyber, to Software Italian
@redhotcyber@mastodon.bida.im avatar

Attacco agli ATM riuscito! Un Tasso del 99% di Efficacia Spaventa tutte le Banche Europee

Nello spazio #digitale si sta diffondendo attivamente un nuovo tipo di #malware #ATM. Il suo tasso di successo, secondo i suoi autori, raggiunge il 99%.

Questo #software dannoso, chiamato “EU ATM Malware”, è in grado di #hackerare quasi tutti gli sportelli #bancomat in #Europa e circa il 60% degli sportelli bancomat in tutto il mondo, il che rappresenta una #minaccia significativa per la sicurezza bancaria globale..

#redhotcyber #online #it #ai #hacking #innovation #privacy #cybersecurity #technology #engineering #cybercrime #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity

https://www.redhotcyber.com/post/attacco-agli-atm-riuscito-un-tasso-del-99-di-efficacia-spaventa-tutte-le-banche-europee/

brume, to android French
@brume@piaille.fr avatar

via @techbot

Un logiciel malveillant distribué via le PlayStore

Les auteurs distribuent le logiciel malveillant Anatsa via le PlayStore en le déguisant en applications telles que des lecteurs de PDF et des scanners de QRcode. Une fois installé, Anatsa télécharge sa charge utile et vole des infos bancaires sensibles à l'aide de superpositions. Anatsa a ciblé des applications bancaires en Europe et s'est étendu aux US, à la Corée et à Singapour.

Pulse ID : 6655bb0af84356806f384f5a
Lien Pulse : https://otx.alienvault.com/pulse/6655bb0af84356806f384f5a
Pulse Author : AlienVault
Créé : 2024-05-28

aarbrk, to Help Spanish
@aarbrk@mstdn.mx avatar

Hi folks, I need with a possible infection in on . After accidentally visiting a spammy website I am getting suspicious and short-lived windows with a grey border in the corner of the screen. Their text seems to always starts with (A). The first one was ostensibly about Norton, this one McAfee. Tough to verify any fix since they only appear once in a while; I did get a photo of one:

Please advise me!

jsrailton, to poland
@jsrailton@mastodon.social avatar

NEW: second judge in reportedly confirmed as spyware victim.

Appeals court judge told reporter her responsibilities included classified cases where wiretapping was used.

Poland's spyware reckoning continues.

[PL, machine trans.]
Story: https://oko.press/wiemy-o-drugim-polskim-sedzi-inwigilowanym-pegasusem-to-sedzia-apelacyjna-z-krakowa-news-oko-press

gtbarry, to Canada
@gtbarry@mastodon.social avatar

LockBit says they stole data in London Drugs ransomware attack

the LockBit ransomware gang claimed they were behind the April cyberattack on Canadian pharmacy chain London Drugs and is now threatening to publish stolen data online after allegedly failed negotiations

https://www.bleepingcomputer.com/news/security/lockbit-says-they-stole-data-in-london-drugs-ransomware-attack/

helma, to random
@helma@mastodon.social avatar

Heaven for domestic abuse: a new spywaretool just up for grabs. It's like having Pegasus at home. What could possibly go wrong? Microsoft knows most families share their accounts or at least can easily log into eachothers accounts. They just choose to ignore it.

.

https://arstechnica.com/gadgets/2024/05/microsofts-new-recall-feature-will-record-everything-you-do-on-your-pc/

nschont, to linux French
@nschont@mastodon.mim-libre.fr avatar
gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Black Basta ransomware group's techniques evolve, as FBI issues new warning in wake of hospital attack.

Read more in my article on the Exponential-e blog: https://www.exponential-e.com/blog/black-basta-ransomware-groups-techniques-evolve-as-fbi-issues-new-warning-in-wake-of-hospital-attack

gtbarry, to microsoft
@gtbarry@mastodon.social avatar

Windows vulnerability reported by the NSA exploited to install Russian malware

Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attacks that targeted a vast array of organizations with a previously undocumented tool, the software maker disclosed

https://arstechnica.com/security/2024/04/kremlin-backed-hackers-exploit-critical-windows-vulnerability-reported-by-the-nsa/

gtbarry, to security
@gtbarry@mastodon.social avatar

Boeing confirms attempted $200 million ransomware extortion attempt

The cybercriminals who targeted Boeing using the LockBit ransomware platform in October 2023 demanded a $200 million extortion payment.

Boeing reportedly did not pay any ransom to LockBit after roughly 43 gigabytes of company data was posted to LockBit’s website in early November.

https://cyberscoop.com/boeing-confirms-attempted-200-million-ransomware-extortion-attempt/

Mensh123, to Minecraft

Low severity [#malware incident] A #minecraft mod called "Windows Borderless" on #Modrinth was taken down yesterday. It contained #spyware wich stole credentials from Chrome and Chromium-Based browsers. Only Windows users were affected. The mod was not found in any modpacks and was not uploaded to other platforms. A detection tool can be found in the official blog post. According to @modrinth, ~372 IPs downloaded the mod.
https://blog.modrinth.com/p/windows-borderless-malware-disclosure

parigotmanchot, to wordpress French
@parigotmanchot@mastodon.social avatar

#Shaarli: WPCode keeps reappearing as a malware after deleting | WordPress.org - Options à insérer dans le fichier wp-config (racine d'une installation de WordPress) pour empêcher la modification des fichiers via l'éditeur interne et désactiver l'ajout d'extensions.

Contexte : un hackeur a réussit à faire en sorte que l'extension WP Code s'installe automatiquement même si on efface ladite extens… : https://wordpress.org/support/topic/wpcode-keeps-reappearing-as-a-malware-after-deleting/#post-17115537 #wordpress #injection #extension #malware #hack

mima, to security

Permission-based systems are bad. See getting replaced by for example. It didn't stop from getting into the or the extension store. On the contrary, the malware problem only got worse after the complete replacement of XUL extensions, which is often disparaged as "insecure" because it allowed users to pretty much change how their browser fundamentally works.

Who knew that distrusting your users and not giving them control leads to more malicious software and user being broken more often. ​:seija_coffee:​

RE: https://mamot.fr/users/gnomelibre/statuses/112371181710549606

SomeGadgetGuy, to tech
@SomeGadgetGuy@techhub.social avatar

Premiering now! Had a great conversation with Shannon Morse about my issues reviewing some mini PCs that came pre-loaded with malware. https://www.youtube.com/watch?v=oH2R3o-EbTA
She offers some GREAT tips and tricks for folks interested in keeping their home networks secure and their data safe!

#tech #technology #interview #geek #privacy #windows #windows11 #bbtg #microsoft #malware #security #cybersecurity

techhelpkb, to random
@techhelpkb@mastodon.social avatar

A new malware named 'Cuttlefish' has been spotted infecting enterprise-grade and small office/home office (SOHO) routers to monitor data that passes through them and steal authentication information.


https://tchlp.com/3woKabl

whydoesnothingwork, to linux
estherschindler, to random
@estherschindler@hachyderm.io avatar

#Malware attacks against millions of #DockerHub repositories have been discovered. Assume all the content you host on a publicly accessible repository might be compromised.
https://cloudnativenow.com/topics/cloudnativedevelopment/docker/jfrog-reveals-docker-hub-compromise-spanning-millions-of-repositories/

kagan, to security
@kagan@wandering.shop avatar

Oh, great. Computer security researchers have developed a proof-of-concept for a type of ransomware that would act when you try to upload a file. It would be able to encrypt any files in the folder you uploaded from, and any subfolders of it.

This is a proof-of-concept; the researchers have not seen any such attacks in the wild. But stay careful out there, okay?

Affects Chrome and Edge, but not Firefox or Safari!

https://theconversation.com/cybersecurity-researchers-spotlight-a-new-ransomware-threat-be-careful-where-you-upload-files-219560

#security #cybersecurity #malware #ransomware

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines