Hacking Page 4

GhostTouch Compromise Touchscreen Smartphone Devices

GhostTouch can compromise the touchscreen of smartphone devices

New research revealed that hackers could use GhostTouch to execute several cybercriminal actions, such as downloading malware and initiating calls. Any entity could utilise electromagnetic interference to activate arbitrary behaviour on mobile touchscreens. Modern tablets and smartphones take advantage of capacitive touchscreens that give multi-touch capabilities and can measure minimal electric fields. However, the charger...
Continue Reading

Roblox gaming platform leveraged by threat actors to sell decryptors

A new ransomware operation has been found with a unique method of selling its decryptors through Roblox, a gaming platform that uses its in-game currency, Robux. Roblox is a game designed for kids, and one of its features is that it allows its members to develop their games and monetise them by selling ‘Game Passes.’...
Continue Reading
Analysts Hello XD Ransomware Malware Babuk MicroBackdoor

Analysts uncover new features established for the Hello XD ransomware

A surge in the malicious activities of the Hello XD ransomware was recently identified, with new ransomware samples deployed to execute stronger encryption on the compromised networks. Experts explained that the ransomware variant has stemmed from the leaked source code of the Babuk ransomware. Based on its first observed activities last November, Hello XD had...
Continue Reading
SVCReady Newest Addition Malicious Malware Family MS Word Phishing Email

SVCReady is the newest addition to the malicious malware family

Researchers have monitored spam attacks spread by a new malware variant called SVCReady. The campaign has been operating since April, utilising an unorthodox malware delivery method via MS Word. According to the researchers, the operators behind it deployed numerous updates in May and noticed that the malware appears to be in the development stage and...
Continue Reading
Qbot Black Basta Hackers TTPs

Qbot and Black Basta joined forces to establish new TTPs

The Qbot hacking group and the Black Basta ransomware have joined forces to gain initial access to numerous targets such as corporate environments. Qbot is notorious for stealing banking credentials and Windows domain and launching additional payloads. Researchers have reported the ongoing partnership between the two groups after the traces of them were found present...
Continue Reading
Russia Law Firm RKP Law Victim Anonymous Gang Hacktivist

Russian law firm RKP Law is the newest victim of the Anonymous gang

The most recent activity of the notorious hacktivist gang, Anonymous, involves their strike against Russia, leaking about 1TB of data from a Russian law firm called Rustam Kurmaev and Partners or RKP Law. The well-known law firm, RKP Law, has worked with the Russian government and other big-time Russian corporations from different sectors, such as...
Continue Reading
LuoYu Chinese Hackers Espionage Campaign App Updates

The LuoYu hackers spread an espionage campaign through app updates

LuoYu, a China-based hacking group, deployed the WinDealer infostealer malware by swapping legit applications updates with compromised payloads to organise a cyberespionage campaign. Reports revealed that the group monitored its target’s network traffic for application update requests connected to well known Asian apps such as WeChat, WangWang, and QQ. The threat actors then replace the...
Continue Reading
Hackers Ransom Notes Ransomware Victims Dark Web Threat Group Industrial Spy SATT Sud-Est France

Hackers now post ransom notes publicly to urge victims to cooperate

Ransomware gangs may have been upgrading their extortion tactics after starting to hack corporate websites to post their ransom notes for the public to see, adding more pressure for their victims to pay up. Industrial Spy, a ransomware threat group, was the first that has been identified using this new extortion tactic. Initially, the threat...
Continue Reading
Digital Driving Licenses Australia Digital Risks Users Security NSW DDL

The digital driving licenses in Australia pose risks to users’ security

In 2019, New South Wales in Australia launched a digital driver’s license (DDL) program to replace the physical driving licenses of drivers from the state. The officials who implemented the project claimed that the DDL is more secure, but security experts say otherwise. As of 2021, over half of the state’s population has used the...
Continue Reading
Anonymous Hacktivists Belarus Russians Ukraine Hacking

The Anonymous hacktivists hit Belarus after siding with the Russians

An Anonymous affiliated hacking group claimed that they had completed an attack against the Belarusian government websites. The group commenced the attack after the latter announced their support for Russia’s invasion of Ukraine. The hacktivist group announced on Twitter that various websites linked to the Belarus state are shut down because of them. They shared...
Continue Reading
1 2 3 4 5 6 39