Once the network was breached by the ransomware, the hackers started to hunt around to find out what they had gained access to – and how to make money out of it…
Trickbot can download new capabilities onto a victim’s device (as well as updating those it has already deployed) without interaction from the victim.
Ransomware that targets Windows systems. Ransom.Sodinokibi encrypts important files and asks for a ransom to decrypt them…
Sim-jacking is an attack in which your phone number is migrated away from your SIM card / phone to a different SIM card / phone that an attacker controls.
AdaptiveMobile Security researchers say they’ve discovered a new vulnerability, nicknamed Simjacker, that’s being used to surveil people’s devices by an unnamed surveillance company. The technique sends SMS messages containing instructions for an old S@T Browser app supported on some carriers’ SIM cards.
No matter what types of content your site provides, you are not an exception. If you don’t take certain precautions you could get hacked. Like everything technology related, you need to check your website security.
The security bug would give fraudsters legitimate rights to install programs, edit data or even create new accounts by users, by being redirected to a shady website on the vulnerable version of the browser.
This one had a twist, though, this malware was not an attack in itself, it was an enabler, hiding on infected computers, establishing a proxy that other malware can then use to manage traffic to the PC and carry out their threats.
Webinjects work in a similar way to a formgrabber, but instead they intercepting data being sent from the website to the browser; The data interception is done after the data is decrypted (SSL) but before the browser displays it, giving the malware the ability to modify webpages on the fly.
HTTPS is built on top of the TLS/SSL cryptographic protocols and is designed to prevent MITM (man-in-the-middle) attacks, before the HTTP request is sent to the server it is encrypted using TLS/SSL, this means that any malware intercepting socket functions would receive encrypted data it could not read. The solution: Formgrabbers.