Month: February 2018

Iron Tiger APT Returns to Cyber Espionage

Delaware, USA ā€“ February 9, 2018 ā€“ Iron Tiger APT group is back in business. Researchers from Bitdefender discovered a cyber espionage campaign targeted the government, technology and telecommunications sectors in Asia and North America. They dubbed it Operation PZChao. Uncovered infrastructure and malware used allowed researchers to link this campaign to infamous Chinese hacker […]

Read More
Smominru and DDG Botnets Infected Thousands of Web Servers

Delaware, USA ā€“ February 8, 2018 ā€“ In early February, researchers published information about the two largest botnets, active since the second quarter of 2017. Smominru and DDG botnets are mining Monero cryptocurrency providing their operators with a significant profit. Researchers from Proofpoint claim that the Smominru botnet, which appeared in May 2017, infected more […]

Read More
Metasploit Framework Uses Modified NSA Exploits

Delaware, USA ā€“ February 7, 2018 ā€“ The researcher from RiskSense created Metasploit Framework ā€“ an open source tool for penetration tests. Sean Dillon, also known as zerosum0x0, has modified the code for several NSA exploits so that they can work on a wide range of MS Windows-based systems, starting with Windows 2000. Vulnerabilities CVE-2017-0143 […]

Read More
Dangerous Vulnerability in Flash Player

Delaware, USA ā€“ February 2, 2018 ā€“ Two days ago, South Korean CERT reported a zero-day vulnerability in Flash Player exploited by North Korean hackers for more than two months. Adobe promises to release updates only on Monday, February 5. The list of vulnerable products can be found at: https://helpx.adobe.com/security/products/flash-player/apsa18-01.html Vulnerability CVE-2018-4878 allows adversaries to […]

Read More
Meltdown & Spectre: from PoC to the First Malware Samples

Delaware, USA ā€“ February 1, 2018 ā€“ Less than a month after the first publications about the vulnerabilities Meltdown & Spectre, AV-Test team discovered about 140 attempts to create full-fledged malware that exploits Meltdown and Spectre vulnerabilities. Researchers at Fortinet claim that the detected samples contain PoC code published in early January and are not […]

Read More