intelligence gathering
-
X (formerly twitter) security team confirms theft of SEC account
The U.S. Securities and Exchange Commission compromised the X (formerly twitter) account after unidentified individuals took control of the X (formerly twitter) account cell phone number. Approval for the Bitcoin ETF to be listed on all registered national stock exchanges was posted through the account, which did not have two-factor authentication enabled at the time of the theft.The X security team recommends that all users enable two-factor authentication to secure their accounts.
-
Syrian hacker group releases Silver RAT remote access Trojan tool
The Syrian hacker group calling itself Anonymous Arabia has released a remote access Trojan horse called Silver RAT, which bypasses security software and covertly launches hidden applications.
-
Turkish Hackers Exploit MS SQL Server Vulnerability in Cyber Attacks
Turkish hackers have recently utilized Microsoft SQL (MS SQL) servers, which have weak security globally, to carry out attacks. This action was designed to gain initial access and was linked to financial gain. The attack targeted the U.S., EU and Latin America (LATAM) regions. Researchers at the security firm Securonix named the operation RE#TURGENCE.
-
Bandook RAT Variant Targets Windows System Security Attacks
A new variant of Bandook Remote Access Trojan (RAT) is spread through carefully designed phishing emails targeting Windows users. The new variant utilizes a link embedded in a disguised PDF file to induce users to download and decompress a .7z compressed file containing malware, which is then injected into the msinfo32.exe system file to manipulate computers and steal information behind the scenes.
-
UAC-0050 Organization updates phishing tactics, deploys remote control Trojan horse Remcos RAT
Remcos RAT is a powerful remote-control Trojan horse capable of stealing system data, cookies, and web browser login information, which was used by UAC-0050 for espionage purposes, targeting Ukrainian and Polish entities for intelligence gathering.
-
Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset
The information-stealing malware is actively utilizing an unspecified Google OAuth endpoint called MultiLogin to hijack user sessions and allow users to continue accessing Google services even after resetting their passwords.
-
Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement
Google agreed to pay $5 billion to settle a privacy lawsuit alleging that the company tracked users in incognito mode. The lawsuit accused Google of using tools such as Google Analytics to collect data on users even when they thought they were browsing privately.
-
Orbit Bridge Cryptocurrency Losses Up to $82 Million in Hacking Attacks
On New Year's Eve 2024, Orbit Bridge was hit by a massive hack that cost over $82 million. The incident sparked panic in the crypto community and highlighted once again the importance of cryptocurrency security.
-
Google Account OAuth2 Protocol Faces New Attack Threats
Re-generate Google services cookies using undocumented OAuth2 functionality, regardless of IP or password reset.
-
Google Cloud Addresses Kubernetes Service Privilege Escalation Vulnerability
Google Cloud has addressed a criticality security vulnerability in its platform that can be exploited by attackers to escalate privileges in Kubernetes clusters they already have access to. The company said in an announcement on December 14, 2023...