attacks

  1. Man

    BabyLockerKZ: a wave of attacks covers continents - who is next?

    The well-known virus has received a new mask and has become even more dangerous. Cisco Talos has discovered new activity from cybercriminals distributing a modified version of the MedusaLocker ransomware. Experts found that the group operates globally, but a greater number of attacks were...
  2. Friend

    Genshin Impact as a Cover: HZ RAT Attacks macOS

    The attackers chose an unexpected way to deliver malicious code. Kaspersky Lab experts have identified a new threat to macOS users in China: the HZ RAT malware, which was previously known only in the Microsoft Windows version. The Trojan is distributed through popular Chinese instant messengers...
  3. Carding Forum

    VPN Traitor: How Cloudflare WARP Helps Hackers in Clever Attacks

    Cado Security explains about SSWW and other operations. According to a new study by Cado Security, attackers have begun to actively use the Cloudflare WARP service to conduct attacks on vulnerable Internet resources. Cloudflare WARP is a free VPN service that optimizes traffic by routing it...
  4. Tomcat

    Mallox ransomware attacks more frequently — an increase of 174% over the past year

    Hackers actively recruit accomplices on cybercrime forums. In 2023, Mallox ransomware activity increased significantly — by 174% compared to last year, according to new data obtained by Unit 42 specialists from Palo Alto Networks. "Mallox, like many other extortionate groups, follows the...
  5. Father

    PedoRansom: Ransomware attacks child pornography lovers

    This is a rare case when the public will take the side of cybercriminals. Cybersecurity researchers have discovered an unusual malware campaign targeting people searching for child pornography online. Instead of extorting money from random victims, as is usually the case, this time the...
  6. Teacher

    Brutus attacks VPN products en masse: what are hackers trying to achieve?

    A dangerous botnet changes IP addresses like gloves, just to avoid detection by security systems. Cisco published recommendations for its customers on how to protect against password-guessing attacks targeting Remote Access VPN (RAVPN) services configured on Cisco Secure Firewall devices. The...
  7. Teacher

    Phantom hackers with a Ukrainian footprint: PhantomCore attacks Russia

    Traces of the group's unique Trojan lead to Kiev. Experts from the Threat Intelligence department of F. A. C. C. T. have identified a new hacker group called PhantomCore. Since January 2024, this group has been actively attacking Russian companies using the unique, previously unknown remote...
  8. Teacher

    Apache at gunpoint: 3,000 attacks on Hadoop, Druid, and Flink over the past month

    Who is behind the new malware campaign and what are its goals? Aqua Security identified a new malware campaign targeting the Apache big data stack, specifically Hadoop, Druid, and Flink. Attackers use vulnerabilities and incorrect settings in cloud-based Honeypots to launch these attacks. Only...
  9. Teacher

    Koreans hacked Rhysida: victims of ransomware attacks can recover their data for free

    How did researchers from Seoul manage to solve the secret hacker cipher? Cybersecurity experts have discovered an implementation vulnerability in the Rhysida ransomware that allowed them to recover encryption keys and decrypt data blocked by the malware. The discovery was published by a team of...
  10. Lord777

    WinRAR vulnerability turned into a cyber weapon for attacks on government organizations

    Asian countries suffer the most, but hackers can hardly expand their activity zone. In the field of cybersecurity, a new serious threat is gaining momentum. A group of cybercriminals known as DarkCasino is exploiting a newly discovered vulnerability in the WinRAR software to launch hacking...
  11. Carding 4 Carders

    Confucius Attacks: how ancient teachings turned into data theft in Asia

    A group of hackers with extensive experience continues their attacks, bypassing the protection and attention of victims. According to a report by Anheng, the Confucius group (APT59) is attacking government and military structures in South and East Asia. Recently, experts discovered a new...
  12. Brother

    ATM attacks brought pennies to carders in 2021

    ATM attacks that use special malware and jackpotting techniques no longer generate normal income for cybercriminals. In the first half of 2019, ATM gangs raised less than € 1,000 per successful campaign. In total, banks across Europe have reported 35 incidents involving ATM malware and...
  13. Hacker

    How hackers prepare attacks on banks

    There is an opinion that attackers are using increasingly sophisticated techniques to break into financial institutions, including state-of-the-art viruses, exploits from the arsenal of special services, and well-targeted phishing. Step 1: Define your Goals In the offline world, it can be...
  14. dunkelh3it

    Kali Linux - Wireless Attacks

    In this chapter, we will learn how to use Wi-Fi cracking tools that Kali Linux has incorporated. However, it is important that the wireless card that you has a support monitoring mode. Fern Wifi Cracker Fern Wifi cracker is one of the tools that Kali has to crack wireless. Before opening Fern...
  15. Carding

    DDoS attacks (Distributed Denial of Service)

    DDoS attack is a hacker attack on a website, the main task of which is to lead to a denial of service, in which the interaction of users with services and sites will be difficult or impossible. It differs from a DoS attack in that it is carried out from multiple devices and addresses at once...
  16. Carding

    ATMs are vulnerable to cyber attacks

    Almost any ATM today can be hacked fairly easily by cybercriminals using malware, and sometimes even without it. And all because of the outdated software used in ATMs, errors in network settings and the lack of basic physical protection of important components of these machines. These...
Top