Fake Windows Update in Browser Deliver Aurora Stealer

Hackers try to convince users to install a malicious package

Fake Windows Update became a malware spreading way once again. Updates are a pretty routine part of the Windows user experience. Over the last 7 years, Windows users mostly used to see the familiar update icon in the tray. Inexperienced people, however, do not know the mechanics of Windows update, and can be trapped with… Continue reading Fake Windows Update in Browser Deliver Aurora Stealer

Fullerton India Hacked, LockBit Leaks 600GB of Data

Company ignored the crooks' double-extortion attempt

Fullerton India, a large lending institution from India, appears to be hacked back in early April 2023. It is confirmed by the LockBit ransomware Darknet blog, where hackers listed the company, and now, over a month later, published all the leaked information. Fullerton, LockBit – who are they? Fullerton India Credit Company, or shortly Fullerton… Continue reading Fullerton India Hacked, LockBit Leaks 600GB of Data

Ransomware Attacks Increasingly Using AuKill Malware to Disable EDR

Ransomware Using AuKill Malware to Disable EDR

A new cybercrime tool called “AuKill” has emerged, which attackers use to disable endpoint detection and response (EDR) defenses used by enterprises before deploying ransomware. AuKill malware uses malicious device drivers to infiltrate systems. Recently, researchers from Sophos discovered an attacker using AuKill before deploying Medusa Locker ransomware and another attacker using it on an… Continue reading Ransomware Attacks Increasingly Using AuKill Malware to Disable EDR

LOBSHOT malware steals cryptowallets, exploits Google Ads

Hidden VNC function may be useful for money stealing without triggering alarms

LOBSHOT, a recently-detected malware family, appears to be a new strong player in the malware market. Carrying a combination of backdoor and spyware functionality, it uses novice spreading ways that make it more effective. Its ability to provide Hidden VNC connections may be a go-to point for numerous cybercriminals. Let’s analyse this malware and see,… Continue reading LOBSHOT malware steals cryptowallets, exploits Google Ads

PaperCut Vulnerability Allows RCE, Exploited in the Wild

Two CVEs in PaperCut allow RCE and account data extraction

PaperCut, a software solution used for print management, appears to be vulnerable to remote code execution (RCE). Another security violation that popped out along with the former allows extracting user data from the profiles created in the program. The RCE vulnerability is already used in cyberattacks. What is PaperCut? PaperCut is a print management solution,… Continue reading PaperCut Vulnerability Allows RCE, Exploited in the Wild

New SLP Vulnerability Allows 2200x DDoS Amplification

Hackers can exploit SLP to launch an enormously powerful DDoS attack

A recently-discovered vulnerability in SLP, a legacy network protocol, can be used for disastrous increasing in DDoS-attack efficiency. As researchers say, the use of SMP vulnerability can push the amplification factor of an attack up to 2200 times – an unseen level. What is SLP? First of all, let’s clear things up. SLP, or Service… Continue reading New SLP Vulnerability Allows 2200x DDoS Amplification

Capita Hacked, Black Basta Gang Publishes Data

The breach potentially exposes hundreds of gigabytes of company's data

Capita, a London-based international business process outsourcing company, was hacked recently. Users noticed strange events in the company earlier this month, but the confirmation appeared only on April 20, 2023. Black Basta ransomware gang posted Capita among other victims on its Onion leak website. What is Capita? Capita is a company for business processes outsourcing.… Continue reading Capita Hacked, Black Basta Gang Publishes Data

5 Signs That You’ve Fallen Victim to a Scam

5 Signs That You've Fallen Victim to a Scam

Internet fraud is becoming increasingly widespread and sophisticated. From simple phishing to romantic scammers, fraudsters are always looking for and inventing new ways to deceive unsuspecting victims. Let’s talk about the ways to understand that you’ve fallen victim to a scam, or are close to becoming one. It’s important to remember that it’s crucial to… Continue reading 5 Signs That You’ve Fallen Victim to a Scam

LockBit Releases World’s First macOS Ransomware

MacOS seems to be not that invincible to malware infections

LockBit, an infamous ransomware gang that became a major threat actor over the last two years, released the variant of its ransomware for macOS. Previously, this system was considered safe from ransomware, as no known samples were targeting it specifically. Currently, LockBit’s product is considered the first ransomware that breaks that rule. What is the… Continue reading LockBit Releases World’s First macOS Ransomware

Domino Backdoor is Lead by FIN7 and Conti Actors

New Domino Backdoor appears to be a collaboration between two notorious threat actors

A new Domino Backdoor popped out at the beginning of 2023. Since February, a new malware family coined Domino is used for attack on corporations, having Project Nemesis stealer as a final payload. Analysts say that the new backdoor is controlled and developed by ex-TrickBot/Conti actors and hackers related to the FIN7 group. Who are… Continue reading Domino Backdoor is Lead by FIN7 and Conti Actors