Tag: IFTTT
-
Recent MNKit Exploit Activity Reveals Some Common Threads
Recent MNKit Exploit Activity Reveals Some Common Threads http://ift.tt/296L64Q Unit 42 recently identified a variant of MNKit-weaponized documents being used to deliver LURK0 Gh0st, NetTraveler, and Saker payloads. The documents were delivered to targets involved with universities, NGOs, and political/human rights groups concerning Islam and South Asia. Reuse of this MNKit variant, sender email addresses,…
-
Time is running out to stop a $53 million cryptocurrency heist – The Verge
Time is running out to stop a $53 million cryptocurrency heist – The Verge http://ift.tt/295JyHm On June 17, someone stole $53 million from the DAO, an experimental investment bank built in the Ethereum cryptocurrency system — and the developers have spent the last two weeks trying to get it back. The DAO’s withdrawal system…
-
Man Booked For Hacking Wife’s Facebook Account – ValueWalk
Man Booked For Hacking Wife’s Facebook Account – ValueWalk http://ift.tt/29eJkS8 An Indian man was booked on Wednesday, under section 66A of the Information Technology Act, for the alleged hacking of his wife’s Facebook account. Facebook hacking, changing password and objectionable messages The victim is Meenu, and she claims that her husband Sachin Jindal, from Faridabad,…
-
Hackers Can Exploit LibreOffice Flaw With RTF Files
Hackers Can Exploit LibreOffice Flaw With RTF Files http://ift.tt/297oIKH The developers of the open source office suite LibreOffice informed users this week that they have patched a vulnerability which could allow attackers to execute arbitrary code using specially crafted RTF files. The vulnerability, found by Cisco Talos researchers and tracked as CVE-2016-4324, affects the RTF…
-
Conficker Used in New Wave of Hospital IoT Device Attacks
Conficker Used in New Wave of Hospital IoT Device Attacks http://ift.tt/295qLQT Internet-connected medical devices such as MRI machines, CT scanners and dialysis pumps are increasingly being targeted by hacker seeking to steal patient medical records from hospitals. Attackers consider the devices soft digital targets, seldom guarded with same security as client PCs and servers within…
-
Dridex and Locky authors revamped the Bart malware
Dridex and Locky authors revamped the Bart malware http://ift.tt/292Ko7r The authors responsible for Dridex and Locky malware have recently made another appearance, this time with their latest release – Bart malware. Similar to other ransomware, infected users are notified of the compromise with their desktop backgrounds changed with a warning, confirming that their files have…
-
Rooting Hummer malware brings $500,000 per day to its creator
Rooting Hummer malware brings $500,000 per day to its creator http://ift.tt/29a9Hbu Android malware with device rooting capabilities has been hitting Google Play for a while now, but for users third-party app stores the situation is even more dangerous. The Hummer malware family Hummer, an Android Trojan family that dates back to 2014, has managed to…
-
Massachusetts General Hospital Confirms Third-Party Breach
Massachusetts General Hospital Confirms Third-Party Breach http://ift.tt/298G6BF A breach at Massachusetts General Hospital has potentially compromised the information of roughly 4,300 dental patients, the hospital warned Wednesday. MGH was quick to point out that the data leaked wasn’t stored or maintained on its systems but those of a third-party vendor that assists the hospital in…
-
Facebook malware: tag me if you can
Facebook malware: tag me if you can http://ift.tt/294RTM9 On the morning of 26th June, news of a phishing campaign hit the Israeli media. Thousands of Facebook users complained that they had been infected by a virus through their accounts after they received a message from a Facebook friend claiming they had mentioned them in a…
-
Cracking Locky’s New Anti-Sandbox Technique
Cracking Locky’s New Anti-Sandbox Technique http://ift.tt/29dOkYi The last few weeks saw new variants of the Locky ransomware that employs a new anti-sandbox technique. In these new variants, Locky’s loader code uses a seed parameter from its JavaScript downloader in order to decrypt embedded malicious code and execute it properly. Threat Intel via CERT-EU : EMM…