The Security Blog From Gridinsoft

open source cryptor Cryptonite

Open-Source Cryptor Cryptonite Became a Wiper due to a Bug

Fortinet researchers studied the recently appeared open-source cryptor Cryptonite, distributed for free on GitHub. It turned out that the creator…

Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Volunteers of the open-source project hosting Fosshost, whose services are used by GNOME, Armbian and Debian, and the Free Software…

Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others

Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles. In addition, the SiriusXM smart car…

FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations

The FBI and the U.S. Infrastructure and Cyber Security Agency (CISA) report that as of August 2022, Cuba ransomware operators…

Cyber Spies Use USB Devices to Infect Targets

Mandiant specialists talk about an unusual malware campaign affecting targets in Southeast Asia, when cyber spies use USB devices as…

ransomware attacks take 45 minutes

Microsoft estimated that ransomware attacks take less than 45 minutes

Microsoft analysts have prepared a traditional Digital Defense report, in which they talked about the main events and trends in the field of cybersecurity and threat analysis over the past…

Coffee machine ransom money

Avast expert taught Smarter Coffee machine to ransom money

Back in 2015, experts from Pen Test Partners talked about a way to hack Wi-Fi networks through the iKettle, created by Smarter, and then discovered that Smarter Coffee maker machine,…

TikTok multi-factor authentication

Attackers can bypass TikTok multi-factor authentication through the site

Journalists of the ZDNet publication, citing one of their readers, report that the web version of TikTok did not receive multi-factor authentication (via mail and SMS), which developers established for…

Windows XP source codes

Windows XP source codes leaked

4chan has published a 42.9 GB torrent file, which contains the source codes for several operating systems, including Windows XP and Windows Server 2003. The person who published the file…

Alien malware steals passwords

Alien malware steals passwords from 226 Android apps

ThreatFabric analysts have discovered a new Android malware Alien. The malware primarily targets banking applications. Overall, Alien steals passwords and other credentials from 226 apps. Alien is sold on hacker…

LokiBot infostealer activity growth

CISA experts warned about the growth of LokiBot infostealer activity

Specialists from the Agency for Cybersecurity and Infrastructure Protection, organized by the US Department of Homeland Security (DHS CISA), warned about growth of activity of LokiBot infostealer aka Loki and…

Microsoft left Bing open

Microsoft left open one of the internal servers of the search engine Bing

Ata Hakcil, cyber security specialist at WizCase, discovered that Microsoft employees mistakenly left one of the Bing backend servers open – it was available to anyone. The researcher writes that…

Spammers hide behind IP addresses

Spammers hide behind hexadecimal IP addresses

Trustwave experts have discovered that pharmaceutical spam attackers have started to insert unusual URLs into their messages. Spammers hide behind hexadecimal IP addresses. They use hexadecimal IPs to bypass email…

Mozilla stops Firefox Send

Mozilla completely stops development of Firefox Send and Firefox Notes

This summer, I talked about how ZDNet journalists drew attention of Mozilla engineers to numerous abuses of the Firefox Send service, which was actively used to spread malware. As a…

US Department of Justice accused Russians

US Department of Justice accused two Russians of stealing $17,000,000 worth of cryptocurrency

The US Department of Justice brought charges in absentia against two Russian citizens: Daniil Potekhin (aka cronuswar) and Dmitry Karasavidi. The US Department of Justice accused the Russians in organizing…

Chinese hackers attack the US

Chinese hackers attack US organizations and exploit bugs in F5, Citrix and Microsoft Exchange

The Department of Homeland Security (DHS CISA) Cybersecurity and Infrastructure Protection Agency (DHS CISA) has published security guidelines for the private sector and government agencies. CISA said that Chinese hackers…

Qbot entered the top malware

Qbot Trojan Entered The Top Of The Most Widespread Malware

Check Point has released its monthly Global Threat Index for August 2020. According to the researchers, the updated Qbot Trojan (aka QuakBot, Qakbot, and Pinkslipbot) first entered the TOP of…