Kia Motors Hit With $20M Ransomware Attack – Report
DoppelPaymer ransomware gang claims credit for Kia’s outage, demands $20 million in double-extortion attack. [...]
DoppelPaymer ransomware gang claims credit for Kia’s outage, demands $20 million in double-extortion attack. [...]
A malicious adware-distributing application specifically targets Apple's new M1 SoC, used in its newest-generation MacBook Air, MacBook Pro and Mac mini devices. [...]
The WatchDog malware has flown under the radar for two years in what researchers call one of the 'largest' Monero cryptojacking attacks ever. [...]
A new version of the Masslogger trojan has been targeting Windows users - now using a compiled HTML (CHM) file format to start the infection chain. [...]
Enlarge (credit: Getty Images) Last week, a researcher demonstrated a new supply-chain attack that executed counterfeit code on networks belonging to some of the biggest companies on the planet, Apple, Microsoft, and Tesla included. Now, fellow researchers are peppering the Internet with copycat packages, with more than 150 of …
Interesting story about a barcode scanner app that has been pushing malware on to Android phones. The app is called Barcode Scanner. It’s been around since 2017 and is owned by the Ukrainian company Lavabird Ldt. But a December 2020 update included some new features: However, a rash …
Research from Zscaler ThreatLabZ shows attackers using spam emails and legitimate-looking links to gaming software to serve up Epsilon ransomware, the XMRrig cryptominer and various data and token stealers. [...]
The two malware families have sophisticated capabilities to exfiltrate SMS messages, WhatsApp messaging content and geolocation. [...]
The ransomware gang behind the hack of CD Projekt Red may be asking for $1 million opening bids for the company's valuable data. [...]
Researchers at Google and Stanford analyzed a 1.2 billion malicious emails to find out what makes users likely to get attacked. 2FA wasn't a big factor. [...]
The LodaRAT - known for targeting Windows devices - has been discovered also targeting Android devices in a new espionage campaign. [...]
CD Projekt Red was hit with a cyberattack (possibly the work of the "Hello Kitty" gang), and the attackers are threatening to release source code for Witcher 3, corporate documents and more. [...]
Enlarge (credit: portal gda / Flickr ) A benign barcode scanner with more than 10 million downloads from Google Play has been caught receiving an upgrade that turned it to the dark side, prompting the search-and-advertising giant to remove it. Barcode Scanner, one of dozens of such apps available in the …
The ransomware attack, affecting OT systems, resulted in some of WestRock's facilities lagging in production levels. [...]
It seems to be the season of sophisticated supply-chain attacks. This one is in the NoxPlayer Android emulator : ESET says that based on evidence its researchers gathered, a threat actor compromised one of the company’s official API (api.bignox.com) and file-hosting servers (res06.bignox.com). Using this …
Eletrobras, the largest power company in Latin America, faces a temporary suspension of some operations. [...]
A new DDoS botnet propagates via the Android Debug Bridge and uses Tor to hide its activity. [...]
A week after law enforcement agencies said they took down Emotet, there has been no sign of the prolific malware. [...]
Microsoft analyzed details of the SolarWinds attack: Microsoft and FireEye only detected the Sunburst or Solorigate malware in December, but Crowdstrike reported this month that another related piece of malware, Sunspot, was deployed in September 2019, at the time hackers breached SolarWinds’ internal network. Other related malware includes Teardrop …
The infamous malware has incorporated the legitimate Masscan tool, which looks for open TCP/IP ports with lightning-fast results. [...]
Enlarge (credit: Getty Images) High-performance computer networks, some belonging to the world’s most prominent organizations, are under attack by a newly discovered backdoor that gives hackers the ability to remotely execute commands of their choice, researchers said on Tuesday. Kobalos, as researchers from security firm Eset have named …
The sophisticated backdoor steals SSH credentials for servers in academic and scientific high-performance computing clusters. [...]
A new version of the Agent Tesla RAT can 'kneecap' endpoint protection software supported by Microsoft ASMI. [...]
Enhanced Explosive RAT and Caterpillar tools are at the forefront of a global espionage campaign. [...]
Enlarge / Circuit board with speed motion and light. (credit: Getty Images ) Researchers have uncovered a software supply chain attack that is being used to install surveillance malware on the computers of online gamers. The unknown attackers are targeting select users of NoxPlayer, a software package that emulates the Android …