Backdoor Links 2016 Ukrainian Blackout to Sandworm APT and NotPetya

Analysis of a new backdoor program allowed malware researchers to establish clear links between the cyberattacks that led to power outages in Ukraine in 2015 and 2016 and the NotPetya ransomware outbreak. The new backdoor is called Exaramel and is use… Continue reading Backdoor Links 2016 Ukrainian Blackout to Sandworm APT and NotPetya

Magecart Injects Skimmer Code in Customer Rating Widget

The groups of attackers who specialize in injecting payment card skimmer code called Magecart into online shops managed to compromise a third-party customer rating plugin called Shopper Approved that’s used by thousands of websites. The compromi… Continue reading Magecart Injects Skimmer Code in Customer Rating Widget

Study: Most Home Routers Have Unpatched Vulnerabilities

A study performed by the non-profit American Consumer Institute (ACI) Center for Citizen Research revealed that the majority of home routers have tens of known vulnerabilities. For its research, the ACI used a scanner called Insignary Clarity, which c… Continue reading Study: Most Home Routers Have Unpatched Vulnerabilities

APT28 Gets the Spotlight, But Turla Remains Russia’s Elite Hacking Unit

Over the past two years, the Russian cyberespionage group known as APT28, Sofacy or Fancy Bear, has been the focus of many press reports, threat analyses, Western intelligence investigations and, more recently, U.S. prosecution efforts. Yet despite al… Continue reading APT28 Gets the Spotlight, But Turla Remains Russia’s Elite Hacking Unit

Google Cracks Down on Malicious Chrome Extensions

The next major version of Google Chrome will give users finer-grained control over how extensions interact with the websites they visit. This decision comes after malicious extensions have repeatedly made their way into the Chrome Web Store over the p… Continue reading Google Cracks Down on Malicious Chrome Extensions

100K Routers Hijacked for Phishing in GhostDNS Campaign

Security researchers warn about a massive attack campaign in which more than 100,000 routers had their DNS settings hijacked to redirect users to phishing websites. The campaign has been dubbed GhostDNS and has been documented before, including by res… Continue reading 100K Routers Hijacked for Phishing in GhostDNS Campaign

Sophisticated IoT Botnet Torii Uses 6 Persistence Methods

Security researchers have uncovered a new botnet targeting Linux-based devices that’s more sophisticated than Mirai and most other IoT botnets observed so far. Researchers from antivirus vendor Avast have dubbed the new botnet Torii because its … Continue reading Sophisticated IoT Botnet Torii Uses 6 Persistence Methods

Russian Hacker Group APT28 Used UEFI Rootkit on Select Targets

Security researchers have found malicious versions of the LoJack anti-theft software on computers belonging to government agencies from the Balkans and Central and Eastern Europe. They attribute the attacks to the a notorious Russian cyberespionage gr… Continue reading Russian Hacker Group APT28 Used UEFI Rootkit on Select Targets

Half of SMBs Experienced a Security Breach Last Year

More than half of small and medium-sized businesses have experienced a data breach and 1 in 5 said it cost them between $1 and $2.5 million, according to a new study by Cisco Systems that surveyed 1,816 SMBs across 26 countries. Cisco’s “S… Continue reading Half of SMBs Experienced a Security Breach Last Year

MacOS Mojave Fixes Flaws, Yet Privacy Feature Can Be Bypassed

Apple’s new macOS Mojave (10.14) fixes eight vulnerabilities in the kernel and various other components. However, researchers have already found a way to bypass one of its new privacy features that restricts access to certain folders containing … Continue reading MacOS Mojave Fixes Flaws, Yet Privacy Feature Can Be Bypassed