Cutlet Maker 1.0 F
Cutlet Maker is a type of ATM malware, also known as "jackpotting" malware, designed to empty an ATM's cash cassettes by exploiting vulnerabilities in the machine's software and hardware. It is a flexible standalone application typically run from a USB drive, requiring...
Programmers also get bored sometimes. If you work for a serious software company, you can have a little fun by hiding an Easter egg somewhere in the depths of the program you are developing, and in such a way that it will not be accidentally discovered during a code review. Apparently, this is...
Malware has long been one of the main threats in the field of information security. Approaches to analysis and protection against such attacks are different. In general, two approaches are distinguished: static and dynamic analysis.
The task of static analysis is to search for malicious...
FIN7, a notorious and financially motivated hacking group, is employing new tactics to lure unsuspecting internet users with malware-laden websites that masquerade as deepfake "Deepnude" tools. A recent report from Silent Push reveals that this Russia-based group operates these malicious sites...
Malware distributors have begun to use a new way to send malicious emails on behalf of the security team on GitHub. The mailing is aimed at encouraging maintainers and developers using the Windows platform to take actions that lead to the installation of malware on their systems. The method is...
Cybersecurity researchers at Aqua have uncovered a new malware campaign dubbed Hadooken. The malware is distributed through Oracle Weblogic servers and is engaged in cryptocurrency mining, as well as the delivery of malware for a DDoS botnet.
The attack chain exploits both known vulnerabilities...
How VbsEdit helps hackers bypass traditional means of detecting malicious code.
The North Korean hacking group Kimsuky continues to develop its activity, using increasingly sophisticated methods to bypass security systems. Since 2018, the group's malware campaign, codenamed BabyShark, has been...
Bi.Zone analysts noted that since the beginning of 2024, commercial malware, whose developers prohibit its use against organizations in the CIS countries, has been increasingly used to attack Russian companies. However, attackers disable regional restrictions and "pirated" versions of malware...
Can iPhone get viruses? In this article I will tell you how to scan your iPhone for malware and how to remove a virus from it if it is detected.
The iPhone is well known for its security measures: the malware protection offered by Apple is one of the main reasons why people buy these devices...
ESET researchers have discovered a new malware for Android that can steal money by transferring data read via NFC to an attacker's device. The malware, dubbed NGate, allows you to emulate victims' cards, make unauthorized payments, or withdraw cash from ATMs.
According to experts, NGate has...
Researchers link the attacks to a mysterious group called Crazy Evil.
Security researchers at Moonlock have discovered a new wave of activity in the AMOS malware, also known as Atomic Stealer. Attackers allegedly linked to the hacker group Crazy Evil spread malware through fake advertising...
A new malicious program for Android not only tries to empty users ' bank accounts, but also completely erases data on the device, effectively implementing the destructive functionality of Viper. The malware was named BingoMod.
Vector of malware spread — text messages. Attackers are trying to...
In the Android version of the Telegram messenger, a vulnerability has been identified that allows you to send malicious APK payloads, disguising them as video content. The breach was named "EvilVideo".
On June 6, 2024, a cybercriminal named Ancryno posted an announcement on the XSS hacker forum...
How did the spy operation manage to go unnoticed since the beginning of 2022?
Yesterday, July 29, researchers from Kaspersky Lab reported on a new version of the Mandrake spyware, which, using improved methods of hiding and bypassing security systems, penetrated Google Play through five...
The company revealed an unusual way to recover from a CrowdStrike crash.
After the recent global crash caused by a failed CrowdStrike software update, Grant Thornton's computers and servers in Australia did not escape the fate of the rest of the world's Windows devices and began to massively...
Drain
Malicious smart contract. The main task is to pump out all the cryptocurrency on the user's wallet. When connected, it issues a request for trust management of assets and if you sign it, then all the cryptocurrency will go to the attacker. The most expensive option is equal to Stealer-IOS...
The TgRAT malware is written for a specific computer, and closed chats in Telegram become control channels. The malware was discovered by Positive Technologies experts. The virus can download files, take screenshots of the screen, and” put " the device to sleep.
Many companies use Telegram as a...
Hello Anonymous. Where do cards with balances come from and why doesn’t it work out for you?
The first answer is outrageously simple: they steal or buy. More often than not, it’s the latter, because stealing data is a tricky task and not everyone is capable of it.
What is a stealer?
What is a...
A story about how over 100 organizations fell victim to forced pentests.
Israeli researchers have identified serious vulnerabilities in the Visual Studio Code extension market, successfully infecting more than 100 organizations by injecting malicious code into a clone extension of the popular...