Python Developers Targeted with Malware During Fake Job Interviews

Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article

These particular attacks from North Korean state-funded hacking team Lazarus Group are new, but the overall malware campaign against the Python development community has been running since at least August of 2023, when a number of popular open source Python tools were maliciously duplicated with added malware. Now, though, there are also attacks involving “coding tests” that only exist to get the end user to install hidden malware on their system (cleverly hidden with Base64 encoding) that allows remote execution once present. The capacity for exploitation at that point is pretty much unlimited, due to the flexibility of Python and how it interacts with the underlying OS…

Continue reading Python Developers Targeted with Malware During Fake Job Interviews

Python Developers Targeted with Malware During Fake Job Interviews

Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article

These particular attacks from North Korean state-funded hacking team Lazarus Group are new, but the overall malware campaign against the Python development community has been running since at least August of 2023, when a number of popular open source Python tools were maliciously duplicated with added malware. Now, though, there are also attacks involving “coding tests” that only exist to get the end user to install hidden malware on their system (cleverly hidden with Base64 encoding) that allows remote execution once present. The capacity for exploitation at that point is pretty much unlimited, due to the flexibility of Python and how it interacts with the underlying OS…

Continue reading Python Developers Targeted with Malware During Fake Job Interviews

North Korean hackers’ social engineering tricks

“North Korean malicious cyber actors conducted research on a variety of targets connected to cryptocurrency exchange-traded funds (ETFs) over the last several months,” the FBI has warned through a public service announcement. This suggests … Continue reading North Korean hackers’ social engineering tricks

Determine location of scammer with SE and ‘honeypot’: not IP but picture metadata? [closed]

Server logs (or Grabify-type services) are only able to determine the IP (and other information unrelated to a physical location, such as browser, device, etc) and "Geo-ip location accuracy varies wildly from country to country and fr… Continue reading Determine location of scammer with SE and ‘honeypot’: not IP but picture metadata? [closed]

Online scam cycles are getting shorter and more effective, Chainalysis finds 

As enforcement and attribution have improved, scammers are ditching static infrastructure and drawn-out schemes for shorter campaigns that use disposable assets. 

The post Online scam cycles are getting shorter and more effective, Chainalysis finds  appeared first on CyberScoop.

Continue reading Online scam cycles are getting shorter and more effective, Chainalysis finds 

Number of incidents affecting GitHub, Bitbucket, GitLab, and Jira continues to rise

Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities, and, as a result, data loss are the reality that DevSecOps teams have to face every few days, according to GitProtect.io. DevSecOps The possibility to integrate s… Continue reading Number of incidents affecting GitHub, Bitbucket, GitLab, and Jira continues to rise

Email attacks skyrocket 293%

Email attacks have surged by 293% in the first half of 2024 compared to the same period in 2023, according to Acronis. The number of ransomware detections was also on the rise, increasing 32% from Q4 2023 to Q1 2024. Ransomware remains a top threat for… Continue reading Email attacks skyrocket 293%

Cisco Talos: Top Ransomware TTPs Exposed

Read about the new Cisco Talos report on the top ransomware groups’ techniques and learn how to mitigate this cybersecurity risk. Cisco Talos observed the TTPs used by 14 of the most prevalent ransomware groups based on their volume of attack, impact t… Continue reading Cisco Talos: Top Ransomware TTPs Exposed

Malware peddlers love this one social engineering trick!

Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem but also offers a way to fix it (Source: Proofpoint) Social engineering users to … Continue reading Malware peddlers love this one social engineering trick!