Category: Cyber Attacks

Top Software Testing Services

Malware Attacks Discovered By Researchers Performed On The Columbian Companies And Government

A continuous reconnaissance crusade coordinated against Colombian government foundations and privately owned businesses in the energy and metallurgical industries has been discovered by Cybersecurity researchers. ESET (Essential Security against Evolving Threats) is a Slovak internet security company, who on Tuesday, published a report in which attacks on Columbian Companies and government were mentioned as the…
Read more

RokRat Trojan Used By North Korean Attackers To Target South Korea

A North Korean group of attackers has been discovered sending the RokRat Trojan in another lance-phishing effort focusing on the South Korean government. Connecting the assault to APT37 (otherwise known as Starcruft, Ricochet Chollima, or Reaper), Malwarebytes stated that they recognized a vindictive doc earlier in December that, when clicked and opened, a macro is…
Read more

Another Malware Named Sunspot Discovered That Was Used To Insert Sunburst Malware (Backdoor) In SolarWinds Cyber Attack

CrowdStrike – a cybersecurity firm that found another malware utilized by the SolarWinds attackers to infuse the backdoor in Orion software during the supply chain assault that prompted the trade-off of a few organizations and government offices. As the research moves deeper concerning the SolarWinds supply chain attack, cybersecurity specialists have uncovered a third malware…
Read more

Links Found By Researchers Between Sunburst And Russian Malware Kazuar

It’s the first time when cybersecurity researchers have discovered a likely association between the backdoor that was utilized in the SolarWinds Supply Chain Attack and a formerly known malware strain. In a new examination that was published by Kaspersky scientists, the online protection firm said it found a few highlights that are quite similar with…
Read more

Attackers Can Clone Google Titan 2FA Keys Via a Key-Recovery-Attack Using A Side Channel in NXP Chip

The most secure intends to protect one’s account from breaches, takeover, and phishing attacks is considered to be the hardware security keys likewise served by Yubico and Google. An examination that was published on Thursday explained how an attacker in control of a gadget with two-factor authentication (2FA) can mirror it by misusing the side-channel…
Read more

SolarWinds Cyber Attack Is Likely A Russian Origin Intelligence Gathering Effort

SolarWinds supply chain attack that was detected in the previous month is now blamed officially on the Russian government by the U.S. government (on Tuesday) for planning and execution of this cyber attack. A joint statement released togetherly by the FBI (Federal Bureau of Investigation), the CISA (Cybersecurity and Infrastructure Security Agency), the ODNI (Office…
Read more

Attackers Using ElectroRAT Malware To Target Cryptocurrency Users

Network safety scientists today uncovered a wide-running fraud focusing on cryptographic money clients that started as ahead of schedule as of January a year ago to spread trojanized applications to introduce a formerly undetected remotely accessible tool on targeted devices. The RAT is composed by a ground-up in Golang and intended to focus on various…
Read more

Cyber Attacks Related To Covid19 Vaccine Shouldn’t Be Seen Mildly

Pretty much every country is in a competition to create a profoundly viable vaccine to control the pandemic. Notwithstanding, there have been a few misfortunes and dangers affecting this situation, cyberattacks are one of them. Coronavirus antibody-related cyberattacks and misrepresentation occurrences are happening almost every single day. This is the time to begin dealing with…
Read more

Microsoft’s Source Code Accessed By the Hackers Included In SolarWinds Cyber Attack, Claims Microsoft

Microsoft revealed on Thursday, that the hacker group responsible for the cyberattack on SolarWinds was somehow able to cut in their corporation and viewed some of its source codes. Microsoft also mentioned that they have discovered some form of unusual activities in some of their internal accounts and when investigated, they were able to detect…
Read more

Pune-Headquartered Engineering Company Defrauded By A “Man-In-The-Middle” Cyber Attack

A Pune-based multinational engineering company was tricked and lost 56,000 euros i.e. more than Rs 50 Lakh via a cyber attack in which officials of the company becomes victim via fraudulent emails termed as the “man-in-the-middle” cyber attack. A “man-in-the-middle” cyber attack generally takes place in a business transaction where email accounts of either both…
Read more