-
Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very well-liked among gamers who use cryptocurrencies because of the potential rewards of a brand-new cryptocoin that the developers intend to launch.Β The gameβs success has spawned numerous copycats with similar names, icons, and gameplay mechanics. While these imitations appear benign, they [β¦] The post 250 Million Hamster Kombat Players Targeted Via Android And Windows Malware appeared first on GBHackers on Security | #1 Globally Trusted Cyber…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Malicious Python packages uploaded by βdsfsdfdsβ to PyPI infiltrated user systems by exfiltrating sensitive data to a Telegram bot likely linked to Iraqi cybercriminals.Β Active since 2022 and containing more than 90,000 Arabic messages, it has functioned as both a command-and-control center and an underground marketplace for social media manipulation tools.Β It highlights a broader [β¦] The post Beware Of Malicious Python Packages That Steal Users Sensitive Data appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Threat actors often attack dating apps to steal personal data, including sensitive data and location details, which can be used in identity theft, blackmailing people, or other malicious activities. Since these applications are a goldmine of personal experiences and chats, hackers consider them as lucrative options for their malicious activities. Cybersecurity researchers at DistriNet Research [β¦] The post Beware Of Dating Apps Exposing Your Personal And Location Details To Cyber Criminals appeared first on GBHackers on Security | #1 Globally…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
There are 3,664 emojis that can be used to express emotions, ideas, or objects in digital communication. While seemingly harmless, criminals are increasingly exploiting emojis for covert communication in illegal activities. This allows them to conduct transactions and target victims while evading detection by law enforcement and text-based filtering systems.Β Law enforcementβs text-based detection methods [β¦] The post Emojis Are To Express Emotions, But CyberCriminals For Attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails from the internet[.]ru domain.Β PDF links trigger exe payload downloads, which encrypt files with the β.shadowrootβ extension, which is actively compromising various global organizations, including healthcare and e-commerce sectors.Β A PDF attachment containing a malicious URL linking to a compromised GitHub [β¦] The post New ShadowRoot Ransomware Attacking Business Via Weaponized PDFβs appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to target military personnel in the Middle East by leveraging social engineering tactics and using military-themed lures to trick victims into downloading the malware.Β Based on a preexisting RAT (Remote Access Trojan) called Dendroid, GuardZoo grants attackers remote control over the infected [β¦] The post GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data appeared first on GBHackers on Security | #1 Globally Trusted…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Ransomware-as-a-service (RaaS) has evolved into sophisticated enterprise-like model. From 2022 to 2023, ransomware programs advertised on the dark web increased by half, with 27 ads identified. The RAMP forum was made the main hub of hiring for ransomware. Attacks published on specific leak sites rose by a margin of 74% which reached 4,583 in 2023. [β¦] The post New Eldorado Ransomware Attacking Windows And Linux Systems appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing are making it difficult for law enforcement to intercept information during investigations lawfully.Β Home Routing allows a userβs communication to be routed through their home network even when they are abroad, as the data is subject to the laws of the [β¦] The post Europol Concerns Over Privacy Enhancing Technologies Challenge Lawful Interception appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
A malware campaign of huge magnitude, and perhaps run by just one group, is using artificially nested files for distribution named βWEXTRACT.EXEΒ Β Β Β Β Β .MUIβ. More than 50,000 files worldwide featuring this method are delivered by different stealers and loaders such as Redline, RisePro, and Amadey. Several samples are associated with an [β¦] The post New Hacker Group Attacking Systems With 10 Malware At Same Time appeared first on GBHackers on Security | #1 Globally Trusted Cyber…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Cyberespionage actors are increasingly using ransomware as a final attack stage for financial gain, disruption, or to cover their tracks, as the report details previously undisclosed attacks by a suspected Chinese APT group, ChamelGang, who used CatB ransomware against a major Indian healthcare institution and the Brazilian Presidency in 2022. ChamelGang also targeted other government [β¦] The post Chinese Hacker Groups Using Off-The-Shelf Tools To Deploy Ransomware appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ