Tag: hackers

Hackers steal $53 million worth of cryptocurrency from CoinEx
News

Hackers steal $53 million worth of cryptocurrency from CoinEx

A substantial quantity of digital assets that were used to fund the platform's operations were stolen from vast amounts of hot wallets at the major cryptocurrency exchange CoinEX, according to an announcement. The issue happened on September 12 and preliminary investigation findings indicate that cryptocurrencies from Tron, Polygon, and Ethereum were used in the illicit transactions. Since the inquiry has not yet determined the full extent of the losses, CoinEx has not disclosed any information regarding the financial effect sustained. According to a report by the blockchain security company PeckShield, CoinEx lost over $19 million in ETH, $11 million in TRON, $6.4 million in Smart Chain Coin ($BSC), $6 million in Bitcoin (BTC), and roughly $295,000 in (MATIC) as a result of the ...
Hackers Exploit MinIO Storage System Vulnerabilities to Compromise Servers
News

Hackers Exploit MinIO Storage System Vulnerabilities to Compromise Servers

Unknown threat actors have been seen using MinIO's high-performance object storage system's high-severity security holes as weapons to execute unauthorized code on vulnerable systems. Security Joes, a company that specializes in cybersecurity and crisis response, claimed that the attack used a publicly accessible exploit chain to backdoor the MinIO instance. the first of which was posted to the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) list of Known Exploited Vulnerabilities (KEV) on April 21, 2023, consists of CVE-2023-28432 (CVSS score: 7.5) and CVE-2023-28434 (CVSS score: 8.8). The two flaws "possess the potential to expose sensitive information present within the compromised installation read more Hackers Exploit MinIO Storage System Vulnerabilities to Co...
Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security
News

Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security

According to recent research, bad actors could manipulate the Windows Container Isolation Framework to use a cunning malware detection evasion approach and get around endpoint security measures. At the DEF CON security conference earlier this month, Deep Instinct security researcher Daniel Avinoam revealed the findings. By using what is known as a dynamically produced image, Microsoft's container design (and consequently, Windows Sandbox) avoids duplicating system files while separating the file system from each container to the host. It is merely an "operating system image with clean copies of changeable read more Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security. Stay informed with the best cybersecurity news and raise your cybersecurity awar...
New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC
News

New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC

WinRAR has been found to include a high-severity security weakness that might be used by a threat actor to execute remote code on Windows systems. The vulnerability, identified as CVE-2023-40477 (CVSS score: 7.8), is a result of insufficient validation when processing recovery volumes. According to a warning from the Zero Day Initiative (ZDI), "the problem results from improper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer."The vulnerability "can be used by an attacker to execute code within the context of the current process read more New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC. Stay informed with the best cybersecurity news and raise your cybersecurity awareness with our comprehensive covera...
Hackers exploited Salesforce zero day in Facebook phishing attack
News

Hackers exploited Salesforce zero day in Facebook phishing attack

Salesforce's email services and SMTP servers were compromised by a zero-day vulnerability that hackers used to execute a sophisticated phishing campaign that targeted valued Facebook accounts. Bypassing Salesforce's sender verification protections and peculiarities in Facebook's web gaming platform, the attackers used a weakness known as "PhishForce" to send phishing emails in bulk. In order to get over security email gateways and filtering rules and deliver malicious emails to the target's inbox, phishing emails can be sent through a trusted email gateway like Salesforce read more Hackers exploited Salesforce zero day in Facebook phishing attack. Stay informed with the best cybersecurity news and raise your cybersecurity awareness with our comprehensive coverage of the latest th...
Hackers exploit BleedingPipe RCE to target Minecraft servers
News

Hackers exploit BleedingPipe RCE to target Minecraft servers

The 'BleedingPipe' remote code execution vulnerability in Minecraft mods is being regularly used by hackers to execute malicious commands on servers and clients to gain control of the targets. Due to improper deserialization in Java's 'ObjectInputStream' class when exchanging network packets between servers and clients, the BleedingPipe vulnerability is present in several Minecraft addons. To put it simply, the attackers hijack the servers by sending specially designed network packets to the susceptible Minecraft mod servers. Once the servers have been compromised, the threat actors can use them to install malware on players' devices by taking advantage of bugs in the Minecraft plugins that players use to connect to the server read more Hackers exploit BleedingPipe RCE to target Min...
Hackers threaten to auction off DNA patient records from Oklahoma hospital
News

Hackers threaten to auction off DNA patient records from Oklahoma hospital

A well-known ransom organization has set its sights on the McAlester Regional Health Centre in Oklahoma and claims to have stolen over 126GB of data from the facility, including a large number of DNA patient records that will be sold at auction to the highest bidder. On August 1st, the Karakurt ransomware hacking group announced its plans to publish samples and subsequently sell off 117GB of the hospital's private data. On their anonymous website's "Pre-Release" section on Friday, the hackers wrote: "Those are companies that refused negotiations and are going to be auctioned soon." Part of the collection, according to Karakurt, contains at least 40GB worth of genetic DNA patient records that the organization allegedly took read more Hackers threaten to auction off DNA patient rec...
Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps
News

Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps

Threat actors are using Android's WebAPK technology to lure unwary users into installing malicious web apps that are intended to collect sensitive personal information on Android phones. According to analysts from CSIRT KNF, the attack started when victims received SMS messages advising them to upgrade a mobile banking application. "The message's link pointed to a page where WebAPK technology was being used to install a malicious application on the victim's device." The program poses as PKO Bank Polski, a major international provider of banking and financial services with its headquarters in Warsaw. RIFFSEC, a Polish cybersecurity company, was the first to reveal information about the campaign read more Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps. ...
Gamaredon hackers start stealing data 30 minutes after a breach
News

Gamaredon hackers start stealing data 30 minutes after a breach

The Gamaredon hacker operates in quick attacks and can take data from compromised computers in less than an hour, according to a warning from Ukraine's Computer Emergency Response Team (CERT-UA). Cybersecurity researchers have connected Gamaredon, also known as Armageddon, UAC-0010, and Shuckworm, to the Russian Federal Security Service and have noted that some of its members are former SSU officials who defected to Russia in 2014. Threat actors are thought to be behind thousands of attacks against the Ukrainian government and other important public and private organizations since the beginning of the Russian invasion read more Gamaredon hackers start stealing data 30 minutes after a breach. Stay informed with the best cybersecurity news and raise your cybersecurity awareness wit...
Hackers Exploit Windows Policy Loophole to Forge Kernel Mode Driver Signatures
News

Hackers Exploit Windows Policy Loophole to Forge Kernel Mode Driver Signatures

Chinese-speaking threat actors have been seen to be using a Microsoft Windows policy vulnerability to spoof signatures on kernel-mode drivers. In a thorough two-part study provided with The Hacker News, Cisco Talos claimed that "actors are leveraging multiple open-source tools that alter the signing date of kernel mode drivers to load malicious and unverified drivers signed with expired certificates." This poses a serious risk because gaining access to the kernel allows for total system access and consequent system compromise. Microsoft announced that it has taken action to block all certificates in order to reduce the hazard after making a responsible disclosure read more Hackers Exploit Windows Policy Loophole to Forge Kernel Mode Driver Signatures. Stay informed with the best ...