CISA Warns of Phishing Campaign Used to Deploy KONNI Malware

The Cybersecurity and Infrastructure Security Agency (CISA) advised users to be wary of an email attachment containing a malicious Microsoft Word document that’s used to deploy KONNI malware. Phishing is one of the main methods hackers use to spread ma… Continue reading CISA Warns of Phishing Campaign Used to Deploy KONNI Malware

Microsoft leaves critical bug unpatched on Patch Tuesday

Microsoft fixed bugs across a range of products on patch Tuesday, issuing patches for 115 distinct CVEs, with 26 rated critical. Continue reading Microsoft leaves critical bug unpatched on Patch Tuesday

Scammers are trying to exploit coronavirus concerns to breach companies

Hackers are preying upon fears about the new coronavirus from China by sending companies malicious emails cloaked as warnings about the economic repercussions that could occur as the illness spreads. Researchers from the email security firm Proofpoint discovered a series of phishing attempts aimed at businesses in sectors that are particularly vulnerable to a disruption in trade because of the coronavirus, such as manufacturing, transportation and finance. The messages feature subject lines like “Coronavirus – Brief note for the shipping industry,” then direct recipients to download a Microsoft Word document promising more information. That Word file activates a strain of malicious software, AZORult, which allows attackers to make off with sensitive data. “The malware actors doing this appear to be from Russia and Eastern Europe, and while they aren’t part of an [advanced persistent threat] group, they clearly understand the economic concerns surrounding the Coronavirus,” Sherrod DeGrippo, Proofpoint’s senior director for threat research […]

The post Scammers are trying to exploit coronavirus concerns to breach companies appeared first on CyberScoop.

Continue reading Scammers are trying to exploit coronavirus concerns to breach companies

Smashing Security #160: SNAFUs! MS Word, Amazon Ring, and TikTok

We discuss how Microsoft Word helped trap a multi-million dollar fraudster, how Amazon Ring may be recording more than you’re comfortable with, and how teens are flocking to TikTok (and why that might be a problem).
All this and much more is cove… Continue reading Smashing Security #160: SNAFUs! MS Word, Amazon Ring, and TikTok

North Korean hackers target U.S. entities amid stalled denuclearization talks

A hacking group with ties to North Korea has been targeting U.S. entities with malicious documents as it works to hide its tracks better, according to research from Maryland-based cybersecurity firm Prevailion. The group has started placing its malware in obscure file formats, namely Kodak FlashPix (FPX) files, to evade antivirus detection products, according to Danny Adamitis, Prevailion’s director of intelligence analysis. The FPX files are embedded in Microsoft Word documents that are sent to victims, which are then launched via macro commands. Since FPX file formats are less likely to be detected than standard Visual Basic for Applications (VBA) files, Adamitis believes the North Korean hackers are exploiting that gap to push their attacks past anti-virus detection. Prevailion links — with moderate confidence — the action to a group known as Kimsuky or Smoke Screen. The attackers have been sending trojanized documents to victims that discuss nuclear deterrence, North […]

The post North Korean hackers target U.S. entities amid stalled denuclearization talks appeared first on CyberScoop.

Continue reading North Korean hackers target U.S. entities amid stalled denuclearization talks

Employers Beware: Microsoft Word ‘Resume’ Phish Delivers Quasar RAT

A round of phishing emails purports to be from job seekers – but actually uses a slew of detection evasion tactics to download malware on victim systems. Continue reading Employers Beware: Microsoft Word ‘Resume’ Phish Delivers Quasar RAT

How Video Became a Dangerous Delivery Vehicle for Malware Attacks

Reading Time: 4 minutes The lure of video might be the perfect social engineering trick for malware attacks. Here’s how your enterprise security team can fight back.

The post How Video Became a Dangerous Delivery Vehicle for Malware Attacks appeared first on Security Intelligence.

Continue reading How Video Became a Dangerous Delivery Vehicle for Malware Attacks