spy

  1. Friend

    Cisco Accuses Microsoft: MS Office Can Spy on Mac

    Cisco has found 8 reasons for concern for macOS users. The Cisco Talos team has identified 8 vulnerabilities in Microsoft macOS applications that allow access to permissions and privileges granted to certain applications. The flaws allow an attacker to inject malicious libraries into Microsoft...
  2. Carding Forum

    Spy passions: how the secrets of Seoul ended up in Pyongyang's hands

    The fate of the undercover agents has become a major concern for South Korean intelligence. South Korea's Defense Ministry is investigating the leak of classified information about military intelligence officers that local media reported may have reached North Korea. Potentially leaked data...
  3. Carding Forum

    BeaverTail: Beaver Spy chews its way into the Apple ecosystem

    How can a simple job interview turn into a data theft operation? Cybersecurity researchers at Objective-See discovered an updated version of a well-known malware linked to hackers from North Korea, which is used for cyber espionage targeting job seekers. The malicious file identified by...
  4. Carding Forum

    Atlantis: A new spy virus that will steal all your secrets

    Cybercriminals use CVE-2024-38112 to break into vulnerable devices. The hacker group Void Banshee is seen exploiting a recently identified vulnerability in MSHTML used to distribute the Atlantis malware. This vulnerability, registered as CVE-2024-38112, is used for multi-stage attacks using...
  5. Carding Forum

    Is your Chrome a Google spy? Uncovered non-disabling data leak.

    And there's nothing you can do about it. Amid investigations by the US Department of Justice and the European Digital Markets Act (DMA), there have been reports that Google is using the Chrome browser to gain advantages over competitors. Chrome collects data about device performance and...
  6. Carding Forum

    CloudSorcerer: Hackers spy on Russian officials via Microsoft Graph, Yandex Cloud and Dropbox

    Government agencies are facing a sophisticated cloud attack. In May 2024, Russian government organizations faced a new, particularly complex cyberattack, which experts dubbed CloudSorcerer. This powerful cyber espionage tool is designed to discreetly monitor, collect, and display data through...
  7. Carding Forum

    Malware-spy managed via Telegram

    The TgRAT malware is written for a specific computer, and closed chats in Telegram become control channels. The malware was discovered by Positive Technologies experts. The virus can download files, take screenshots of the screen, and” put " the device to sleep. Many companies use Telegram as a...
  8. Tomcat

    EmailGPT: An AI Spy in your mailbox

    Researchers recommend removing the popular browser extension immediately. Synopsys discovered a zero-day vulnerability in EmailGPT, a popular extension for Google Chrome that uses artificial intelligence to write emails. A "Prompt Injection" vulnerability with the identifier CVE-2024-5184...
  9. Tomcat

    LightSpy: Universal Spy now available on macOS

    Initially, the mobile malware shifted its focus to desktop platforms. The malware called LightSpy, previously known only for attacks on Android and iOS, has now been spotted on macOS as well, confirming its extensive data collection capabilities. LightSpy is a modular spy framework that is...
  10. Father

    Your Car is a Spy: FTC warns about Data collection by Automakers

    The Commission criticizes companies for secretly disclosing information to third parties. The Federal Trade Commission (FTC) has warned automakers that it is closely monitoring their collection and sale of customer data. The Commission noted possible measures that may be applicable to...
  11. Father

    Cuckoo: New macOS spy selectively attacks Apple computers

    How did CIS users manage to get full immunity from malware exposure? Researchers from Kanjii have identified a new malware called Cuckoo, aimed at Apple macOS systems. This malicious software not only provides a permanent presence in infected systems, but also performs a number of dangerous...
  12. Father

    Wireshark: a godsend for a spy

    Wireshark is well-known to anyone who has anything to do with traffic analysis. On the one hand, it is a professional, free, open-source traffic analyzer for computer networks of absolutely various types and protocols. It allows you to study network activity, intercept, filter, decode, and...
  13. Father

    Chinese Spy in League of Legends: Vanguard Ignites Privacy War

    Fight against cheats or encroachment on freedom – what is the real purpose of the Riot Games anti-cheat system? Riot Games, the developer of the popular game League of Legends, introduced a new anti-cheat system Vanguard, which caused a mixed reaction among players. Vanguard is proprietary...
  14. Father

    Cuttlefish: A stealthy marine spy right in your router

    No password will escape the sophisticated digital cuttlefish. A new type of malware, called "Cuttlefish", was discovered in routers in large enterprises and small offices. It monitors all information passing through infected devices and steals credentials. Black Lotus Labs reports that...
  15. Father

    Spy Pet eliminated: Discord closes the service for collecting user secrets

    The administrator of the disputed site intends to continue its activities regardless of possible legal action. The popular Discord successfully blocked several accounts associated with the Spy Pet site, which collected billions of public messages from users. We first reported on Spy Pet on...
  16. Father

    Billions under the hood: keyboard developers spy on Android users around the world

    Vulnerabilities in popular smartphone keyboards allow you to see what the user is typing. Citizen Lab identified vulnerabilities in popular keyboard applications that can be used to register keystrokes of Chinese users around the world. Security issues are present in almost all apps, including...
  17. Father

    India and Pakistan hit by wave of Android spy apps

    The new eXotic Visit campaign is aimed at collecting data from inattentive users. Informs ESET about a new malware campaign targeting users in South Asia. The eXotic Visit campaign started in November 2021 and distributes malware through specialized websites and the Google Play Store. The...
  18. Father

    Apple does everything to ensure that you do not interfere with applications to spy

    iOS and macOS: a maze of settings where it's too easy to get lost. A new study from Aalto University in Finland challenges Apple's claims that users of its devices have full control over their privacy. As it turned out, built-in iOS, iPadOS and macOS applications continue to collect data about...
  19. Teacher

    FlightNight: One spy PDF puts India's public sector and energy sector at risk

    The HackBrowserData infostealer is distributed all over the country. Who is behind this operation? Researchers from the Dutch company EclecticIQ have revealed a new cyber-espionage campaign called Operation FlightNight, targeting the public sector and the energy industry in India. The attackers...
  20. Teacher

    GTPDOOR roaming: Hackers spy on subscribers through international traffic

    The vulnerability in the GTP protocol has become a new profitable loophole for the LightBasin group. Researchers have announced a new threat — the GTPDOOR malware, which targets telecommunications networks. This clever Linux Trojan exploits vulnerabilities in the GPRS protocol to covertly...
Top