Category: Cyber Attacks

Top Software Testing Services

Microsoft’s Source Code Accessed By the Hackers Included In SolarWinds Cyber Attack, Claims Microsoft

Microsoft revealed on Thursday, that the hacker group responsible for the cyberattack on SolarWinds was somehow able to cut in their corporation and viewed some of its source codes. Microsoft also mentioned that they have discovered some form of unusual activities in some of their internal accounts and when investigated, they were able to detect…
Read more

Pune-Headquartered Engineering Company Defrauded By A “Man-In-The-Middle” Cyber Attack

A Pune-based multinational engineering company was tricked and lost 56,000 euros i.e. more than Rs 50 Lakh via a cyber attack in which officials of the company becomes victim via fraudulent emails termed as the “man-in-the-middle” cyber attack. A “man-in-the-middle” cyber attack generally takes place in a business transaction where email accounts of either both…
Read more

Hackers Using Smart Home Devices To Live Stream Swatting Attacks

The US FBI (Federal Bureau of Investigation) recently stated that the attackers have now started to take control over smart home devices and security systems via breached emails and passwords and are using them to live stream the Swatting events. Swatting is a hoax call (a call made to trick someone for malicious purposes) made…
Read more

US And Canadian Banking Customers Being Targeted By AutoHotKey-Based Credential Stealer

An ongoing campaign initiated in the early 2020s was discovered with bad actors that were distributing a new credential or password stealer which was written in AutoHotKey (AHK) scripting language. AutoHotKey is built and aimed at serving easy shortcut keys for macro-creation and software automation that could allow users of Windows to repeat and automate…
Read more

SolarWinds Supply Chain Attack Using Malware and Backdooring

Earlier this year, some foreign hackers (believed to be the from Russian intelligence SVR) somehow hacked into the systems of SolarWinds and were able to code a spyware in the company’s one of the most common and widely used software – Orion.

Operation SideCopy: Cyber Espionage targeting Indian Army – The Hack Report

Quick Heal researchers warn the government of a new cyber attack suspected to be routed by Pakistan based APT-31 and backed by China.Seqrite, Quick Heal’s threat intelligence group, recently found evidence of an Advanced Persistence Threat(APT) against the Indian Army and allied forces. The operation is dubbed as “Operation SideCopy.”The operation is said to be…
Read more

Researchers finds ongoing surveillance campaign from 2014 targeting Iranian expats and defectors

The history of Iranian cyber-offensive operations has shown that the same threat actors responsible for espionage against the private sector are engaged in surveillance of human rights defenders and are significantly more successful. The relationship between Iran-originated cyber activities and the government, as well as the motivations for such operations, is made more apparent by the lens…
Read more

German Ransom

A German Patient Dies After Ransomware Attack Paralyzes German Hospital Systems

In an unusual case, a German woman died of ransomware. German police have launched a homicide case against the hackers.  In a first of it is kind, a female patient from Dusseldorf, Germany, due to getting a life-saving treatment died as a result of a cyber-attack at Dusseldorf University Hospital which resulted in locking the…
Read more

malware

Instantaneous Increase of Emotet Trojan Attacks reported by authorities from Japan, France, New Zealand

In 2014, Emotet was first discovered as a “simple” banking trojan intended to steal financial data. Since it has developed over time into a botnet and incorporated modularity, such as the ability to distribute ransomware using worm-like functionality, therefore, it has been described by the US Department of Homeland Security as “one of the most expensive and…
Read more

Instagram Retaining Deleted User Data: Bug Reported by Researcher

A bug was reported recently on Instagram by a researcher, Saugat Pokharal, in a blog post. Saugat is a security researcher who lives in Kathmandu, Nepal. He revealed that he accidentally found out that the company retained the copy of data on its servers even when the users had deleted it from their accounts.  Instagram is…
Read more