Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

Someone accidentially uploaded documents that contained secret information to VirusTotal

An employee of the Google-owned platform VirusTotal accidentally uploaded a file with the names, email addresses and other data of hundreds of people working in intelligence agencies and ministries of defense around the world. In particular, the list includes persons associated with the US Cyber Command, the NSA, the Pentagon, the FBI and a number… Continue reading Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

LLM development gave an obvious and predicted boost to phishing emails

SlashNext noticed that cybercriminals are increasingly using generative AI in their phishing attacks, such as the new WormGPT tool. WormGPT is advertised on hacker forums, and it can be used to organize phishing mailings and compromise business mail (Business Email Compromise, BEC). WormGPT Is Massively Used for Phishing WormGPT is based on the GPTJ language… Continue reading WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

Researchers Found BlackLotus UEFI Bootkit Sources on GitHub

The source code for the BlackLotus UEFI bootkit, which was previously sold on the dark web for $5,000, has been discovered by Binarly analysts on GitHub. The researchers say the leaked sources are not entirely complete and contain mostly a rootkit and a bootkit to bypass Secure Boot. What is BlackLotus bootkit? BlackLotus was first… Continue reading Researchers Found BlackLotus UEFI Bootkit Sources on GitHub

MOVEit Transfer Fixes a New Critical Vulnerability

After hundreds of companies were attacked with a 0-day vulnerability in MOVEit Transfer, the developer of this file transfer management product, Progress Software, promised to regularly release patches to provide a “predictable, simple, and transparent bug fixing process.” The first such package included patches for three vulnerabilities, including a critical one. MOVEit Vulnerabilities – The… Continue reading MOVEit Transfer Fixes a New Critical Vulnerability

California Water Treatment Plant Is in the Hands of a Hacker

Rambler Gallo, a resident of Tracy, Calif., has been charged with maliciously damaging a computer after it allegedly infiltrated a network of a water treatment plant in Discovery Bay. The treatment plant serves water and sewer systems for 15,000 residents of the city of Discovery Bay. Gallo was an employee of a private Massachusetts company… Continue reading California Water Treatment Plant Is in the Hands of a Hacker

Wise Remote Trojan: Infostealer, RAT, DDoS Bot, and Ransomware

Wise Remote Stealer

Wise Remote Stealer is a potent and malicious software that operates as an infostealer, Remote Access Trojan (RAT), DDoS bot, and ransomware. It has gained notoriety within the cybersecurity community due to its extensive range of capabilities and the threat it poses to individuals and organizations. Unveiling the Wise Remote Stealer Revelations from cybersecurity experts… Continue reading Wise Remote Trojan: Infostealer, RAT, DDoS Bot, and Ransomware

TeamTNT Group Returns with Silent Bob Campaign

Aqua Security security researchers have warned that the TeamTNT group may be preparing a new large-scale anti-cloud campaign called “Silent Bob”. Such suspicions arose after experts discovered hackers targeting misconfigured servers. Aqua Security launched an investigation after discovering an attack on one of its lures. Subsequently, 4 images of malicious containers were discovered. However, given… Continue reading TeamTNT Group Returns with Silent Bob Campaign

Snappy Tool Helps Avoid Fraudulent Wi-Fi Hotspots

Trustwave has created a Snappy tool that will make it easy to determine if the Wi-Fi network is fake or fraudulent. The utility particularly checks whether the network spoofs the MAC address and SSID. The solution is available for free downloading on the company’s GitHub repository. For years, security experts have been warning about the… Continue reading Snappy Tool Helps Avoid Fraudulent Wi-Fi Hotspots

RustBucket Malware Attacks MacOS More Effectively

New update of RustBucket Malware introduced several changes. Now the malware is more securely fixed in the systems of its victims and evades detection by security software. Though the most concerning feature there is its enhanced ability to attack macOS. What is RustBucket malware? Researchers from Jamf Threat Lab discovered RustBucket in the spring of… Continue reading RustBucket Malware Attacks MacOS More Effectively

Russian Hacker Project DDoSIA Grew by Multiple Times

DDoSIA project appears to be first massive volunteer-based DDoS-for-hire project

Analysts of the Sekoia company reported that the Russian DDoSia hacker project grew by 2400% in less than a year. That project pays volunteers to participate in attacks on Western organizations. More than 10,000 people are currently involved in the attacks. DDoS-for-hire services became particularly popular over the last years. We recently did the review… Continue reading Russian Hacker Project DDoSIA Grew by Multiple Times