Chinese Evasive Panda Targets Tibetans with Nightdoor Backdoor

By Waqas
Evasive Panda, also identified as BRONZE HIGHLAND and Daggerfly, is carrying out global targeting of Tibetans.
This is a post from HackRead.com Read the original post: Chinese Evasive Panda Targets Tibetans with Nightdoor Backdoor
Continue reading Chinese Evasive Panda Targets Tibetans with Nightdoor Backdoor

This Week in Security: QueueJumper, JS VM2 Escape, and CAN Hacking

You may not be familiar with the Microsoft Message Queuing (MSMQ) service, a store and forward sort of inter-process and inter-system communication service. MSMQ has become something of a legacy …read more Continue reading This Week in Security: QueueJumper, JS VM2 Escape, and CAN Hacking

Likely state-based hackers infected Hong Kong websites to spy on Apple users, Google says

Suspected foreign government-backed hackers infected websites belonging to a Hong Kong-based media outlet and a pro-democracy group in a bid to install malware on visitors’ Apple devices, Google researchers say. Google’s Threat Analysis Center discovered the watering hole attack in August, which relied on a previously unreported backdoor, or zero-day flaw. “Based on our findings, we believe this threat actor to be a well-resourced group, likely state backed, with access to their own software engineering team based on the quality of the payload code,” Google’s Eyre Hernandez wrote in a blog post on Thursday. While Google didn’t attribute the attackers to a specific nation, China has long been suspected of conducting cyber-espionage and sowing disinformation aimed at democracy advocates in Hong Kong. The hackers relied on a previously known vulnerability in macOS Catalina to set up the backdoor, Google said. Apple patched the zero-day flaw on Sept. 23. The backdoor […]

The post Likely state-based hackers infected Hong Kong websites to spy on Apple users, Google says appeared first on CyberScoop.

Continue reading Likely state-based hackers infected Hong Kong websites to spy on Apple users, Google says

An espionage campaign spread its wings from Myanmar to the Philippines, raising new questions

A cyberespionage campaign that spread through Myanmar last fall at first looked like many others of the genre: a handpicked set of targets affected by highly tailored break-in methods. After all, scattershot attacks historically are not only less likely to hit valuable victims, but they also equal a greater chance of being caught and halted before the hackers gather the information they want. Then something changed, according to the security firm Kaspersky. What began as a small campaign — ultimately affecting approximately 100 Myanmar victims that Kaspersky identified — leapfrogged to another country, the Philippines, where the victim count exploded to 1,400 and included some government entities. Kaspersky researchers on Wednesday detailed the extent of the campaign, and who they believe is behind it. But they remain unsure why it evolved the way it did, even if they have some informed guesses. The investigators attributed the infections to a group […]

The post An espionage campaign spread its wings from Myanmar to the Philippines, raising new questions appeared first on CyberScoop.

Continue reading An espionage campaign spread its wings from Myanmar to the Philippines, raising new questions

Botnet traced to computer at hacked Florida water plant

On Feb. 5, an unidentified hacker broke into the computer system of a treatment plant in the Florida town of Oldsmar and temporarily changed the plant’s sodium hydroxide setting to a potentially dangerous level, according to local officials. It turns out that hacker wasn’t alone on the network. While law enforcement officials still haven’t publicly identified the perpetrator of the well-publicized hack, industrial security firm Dragos on Tuesday revealed a separate suspected intrusion that same day of one of the Oldsmar Water Treatment Facility’s computers. Dragos has tied the malicious code to a botnet, or horde of infected computers used by spammers, whose code may have also infected customers of local water utilities in Florida in recent months. There is no connection between the incidents — whoever tampered with the Oldsmar facility’s chemical settings is not involved in the botnet — but the revelation shows how two very different types of […]

The post Botnet traced to computer at hacked Florida water plant appeared first on CyberScoop.

Continue reading Botnet traced to computer at hacked Florida water plant

This Week in Security: Morse Code Malware, Literal and Figurative Watering Holes, and More

Code obfuscation has been around for a long time. The obfuscated C contest first ran way back in 1984, but there are examples of natural language obfuscation from way earlier in history. Namely Cockney rhyming slang, like saying “Lady from …read more

Continue reading This Week in Security: Morse Code Malware, Literal and Figurative Watering Holes, and More

Google reveals high-profile attack targeting Android, Windows users

By Deeba Ahmed
According to Google’s Project Zero team, threat actors exploited 0-day vulnerabilities to successfully carry on their attack.
This is a post from HackRead.com Read the original post: Google reveals high-profile attack targeting Android, … Continue reading Google reveals high-profile attack targeting Android, Windows users