Passion Group, a Killnet, and Anonymous Russia affiliate, recently started providing DDoS-as-a-Service to pro-Russian hackers. During the attacks on January 27, the Passion Botnet was used to target medical institutions in the United States,…
The cybersecurity analysts at Check Point Research recently reported that TrickGate, a shellcode-based packer, has been in operation for over six years without being detected. It has enabled threat actors to deploy various types of malware such as:-…
Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group of cyber criminals called “InTheBox”. This group is primarily active on a Russian-language cybercrime forum, wh…
Prilex is indeed a single threat actor that transformed from malware targeted at ATMs into distinctive modular point-of-sale (PoS) malware. Prilex has resurfaced with new upgrades that allow it to block contactless payment transactions. This is ex…
During the monitored timespan, APT groups aligned with Russia have been observed to be heavily involved in cyber operations aimed at Ukraine. These operations have included deploying malicious software, such as wipers (which can erase data on a targeted system) and ransomware (which can encrypt a system’s data and demand payment for the decryption key). […]
The post <strong>Sandworm APT Group Adds New Wiper to Its Hacking Toolkit</strong> appeared first on Cyber Security News.
Updates for QNAP’s network-attached storage (NAS) systems have been released to address a critical security flaw that might allow arbitrary code injection. Customers of QNAP are being advised to update their QTS and QuTS firmware in order to fix a critical security flaw. The security flaw is tracked as (CVE-2022-27596) and rated as “Critical” (CVSS […]
The post <strong>QNAP NAS Critical Vulnerability Let Attacker Inject Arbitrary Code</strong> appeared first on Cyber Security News.