Category: Cyber Attacks

Top Software Testing Services

Going Rogue – A Different Level Of Malware Development Package

Smartphones, especially Android have remained an appealing subject for threat actors and cybercriminals for a very long period of time. There are more than 3.5 billion active users of smartphones, out of which 3 billion smartphones are Android-based. This massive worldwide use of smartphones is what makes cybercriminals target them for malicious activities. However, the…
Read more

Undocumented Chinese Malware Used In Recent Attacks Has Been Discovered By Cybersecurity Researchers

A progression of cyberattacks by a bad actor of Chinese root focused on associations in Russia and Hong Kong with malware that included a formerly undocumented backdoor was unveiled by Cybersecurity researchers. Linking the mission to Winnti (also known as APT41), Positive Technologies dated the primary assault to 12 May 2020, when the APT utilized…
Read more

Malware Attacks Discovered By Researchers Performed On The Columbian Companies And Government

A continuous reconnaissance crusade coordinated against Colombian government foundations and privately owned businesses in the energy and metallurgical industries has been discovered by Cybersecurity researchers. ESET (Essential Security against Evolving Threats) is a Slovak internet security company, who on Tuesday, published a report in which attacks on Columbian Companies and government were mentioned as the…
Read more

RokRat Trojan Used By North Korean Attackers To Target South Korea

A North Korean group of attackers has been discovered sending the RokRat Trojan in another lance-phishing effort focusing on the South Korean government. Connecting the assault to APT37 (otherwise known as Starcruft, Ricochet Chollima, or Reaper), Malwarebytes stated that they recognized a vindictive doc earlier in December that, when clicked and opened, a macro is…
Read more

Another Malware Named Sunspot Discovered That Was Used To Insert Sunburst Malware (Backdoor) In SolarWinds Cyber Attack

CrowdStrike – a cybersecurity firm that found another malware utilized by the SolarWinds attackers to infuse the backdoor in Orion software during the supply chain assault that prompted the trade-off of a few organizations and government offices. As the research moves deeper concerning the SolarWinds supply chain attack, cybersecurity specialists have uncovered a third malware…
Read more

Links Found By Researchers Between Sunburst And Russian Malware Kazuar

It’s the first time when cybersecurity researchers have discovered a likely association between the backdoor that was utilized in the SolarWinds Supply Chain Attack and a formerly known malware strain. In a new examination that was published by Kaspersky scientists, the online protection firm said it found a few highlights that are quite similar with…
Read more

Attackers Can Clone Google Titan 2FA Keys Via a Key-Recovery-Attack Using A Side Channel in NXP Chip

The most secure intends to protect one’s account from breaches, takeover, and phishing attacks is considered to be the hardware security keys likewise served by Yubico and Google. An examination that was published on Thursday explained how an attacker in control of a gadget with two-factor authentication (2FA) can mirror it by misusing the side-channel…
Read more

SolarWinds Cyber Attack Is Likely A Russian Origin Intelligence Gathering Effort

SolarWinds supply chain attack that was detected in the previous month is now blamed officially on the Russian government by the U.S. government (on Tuesday) for planning and execution of this cyber attack. A joint statement released togetherly by the FBI (Federal Bureau of Investigation), the CISA (Cybersecurity and Infrastructure Security Agency), the ODNI (Office…
Read more

Attackers Using ElectroRAT Malware To Target Cryptocurrency Users

Network safety scientists today uncovered a wide-running fraud focusing on cryptographic money clients that started as ahead of schedule as of January a year ago to spread trojanized applications to introduce a formerly undetected remotely accessible tool on targeted devices. The RAT is composed by a ground-up in Golang and intended to focus on various…
Read more

Cyber Attacks Related To Covid19 Vaccine Shouldn’t Be Seen Mildly

Pretty much every country is in a competition to create a profoundly viable vaccine to control the pandemic. Notwithstanding, there have been a few misfortunes and dangers affecting this situation, cyberattacks are one of them. Coronavirus antibody-related cyberattacks and misrepresentation occurrences are happening almost every single day. This is the time to begin dealing with…
Read more