Year: 2018

0-day Flaw in Telegram was Used to Spread Malware

Delaware, USA ā€“ February 14, 2018 ā€“ Researchers from Kaspersky Lab discovered a zero-day vulnerability in the Windows client for Telegram software, which has been used by attackers for almost a year to infect users with malware. In October 2017, researchers spotted a vulnerability that allows attackers to perform a right-to-left override attack. Further investigation […]

Read More
Olympic Destroyer Malware was Used in Attack on Winter Olympics Opening Ceremony

Delaware, USA ā€“ February 13, 2018 ā€“ During the opening ceremony of the 2018 Winter Olympics, unknown threat actor performed a cyberattack on the event’s infrastructure. During the attack, hackers managed to shut down the Olympics website for 12 hours and also caused failures in the work of WiFi and digital television. Researchers from Cisco […]

Read More
SOC Prime Honored with Cybersecurity Excellence Awards

Delaware, USA ā€“ February 12, 2018 ā€“ SOC Prime, a fast-growing cybersecurity vendor, has been recognized as the winner at the annual Cybersecurity Excellence Awards and received two Bronze trophies. The Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation, and leadership in information security. The winners of each nomination were determined based […]

Read More
Iron Tiger APT Returns to Cyber Espionage

Delaware, USA ā€“ February 9, 2018 ā€“ Iron Tiger APT group is back in business. Researchers from Bitdefender discovered a cyber espionage campaign targeted the government, technology and telecommunications sectors in Asia and North America. They dubbed it Operation PZChao. Uncovered infrastructure and malware used allowed researchers to link this campaign to infamous Chinese hacker […]

Read More
Smominru and DDG Botnets Infected Thousands of Web Servers

Delaware, USA ā€“ February 8, 2018 ā€“ In early February, researchers published information about the two largest botnets, active since the second quarter of 2017. Smominru and DDG botnets are mining Monero cryptocurrency providing their operators with a significant profit. Researchers from Proofpoint claim that the Smominru botnet, which appeared in May 2017, infected more […]

Read More
Metasploit Framework Uses Modified NSA Exploits

Delaware, USA ā€“ February 7, 2018 ā€“ The researcher from RiskSense created Metasploit Framework ā€“ an open source tool for penetration tests. Sean Dillon, also known as zerosum0x0, has modified the code for several NSA exploits so that they can work on a wide range of MS Windows-based systems, starting with Windows 2000. Vulnerabilities CVE-2017-0143 […]

Read More
Dangerous Vulnerability in Flash Player

Delaware, USA ā€“ February 2, 2018 ā€“ Two days ago, South Korean CERT reported a zero-day vulnerability in Flash Player exploited by North Korean hackers for more than two months. Adobe promises to release updates only on Monday, February 5. The list of vulnerable products can be found at: https://helpx.adobe.com/security/products/flash-player/apsa18-01.html Vulnerability CVE-2018-4878 allows adversaries to […]

Read More
Meltdown & Spectre: from PoC to the First Malware Samples

Delaware, USA ā€“ February 1, 2018 ā€“ Less than a month after the first publications about the vulnerabilities Meltdown & Spectre, AV-Test team discovered about 140 attempts to create full-fledged malware that exploits Meltdown and Spectre vulnerabilities. Researchers at Fortinet claim that the detected samples contain PoC code published in early January and are not […]

Read More
WannaMine: a New Round of Threat Development

Delaware, USA ā€“ January 29, 2018 ā€“ CrowdStrike reported in their blog about a new round of WannaMine fileless malware activity. The operations of several companies were almost completely paralyzed due to infection with this virus. WannaMine was first discovered at the end of October 2017 by researchers from PandaLabs, but shortly after detection, its […]

Read More
Mezzo Banking Trojan Gathers Financial Data for Further Campaigns

Delaware, USA ā€“ January 29, 2018 ā€“ Threat actors leverage new Mezzo banking trojan to prepare a large-scale attack. At the moment, this trojan just collects and uploads data to the command and control servers, but it has the functionality to replace the files of financial software, as researchers from Kaspersky Lab report. Malware can […]

Read More