The Security Blog From Gridinsoft

Russian hack group SEABORGIUM

Disrupting SEABORGIUM’s Ongoing Phishing Operations

Microsoft Threat Intelligence Center (MSTIC) experts announce the disruption of an operation conducted by the Russian-speaking hacking group SEABORGIUM, targeting…

Researcher Hacks Starlink Terminal With $25 Homemade Board

Lennert Wouters, a researcher at the Catholic University of Leuven, who previously discovered a bug that allowed to hijack Tesla…

Chinese Hackers Injected a Backdoor into the MiMi Messenger

SEKOIA and Trend Micro specialists published reports on the activity of the Chinese hack group APT27 (aka Emissary Panda, Iron…

Cuba Ransomware Operators Use Previously Unknown ROMCOM RAT

Palo Alto Networks reports that the Cuba ransomware operators have begun to use new tactics in their attacks, including the…

Auto Parts Manufacturer Attacked by Three Different Ransomware in Two weeks

Sophos experts told about an interesting case when an unnamed auto parts manufacturer was attacked by three different ransomware in…

Illegal way to support Windows 7

My Digital Life forum community has found an illegal way to extend support for Windows 7

The community of the My Digital Life online forum has found an illegal way to extend support for Windows 7: bypass Microsoft’s restrictions and allow the installation of Windows 7…

Emotet topped the threat rating

Emotet topped the rating of the most common threats in 2022

Any.Run, interactive service for automated malware analysis has compiled a list of the ten most common threats downloaded to this platform. The Trojan Emotet topped this 2019 threat rating. The…

ToTok turned out to be a tracking tool

ToTok messenger turned out to be a tool for total tracking

The New York Times reported that the ToTok messenger turned out to be a tracking tool. The application allowed the UAE authorities to track conversations, movements and other data of…

Perfect encryption system presented

Perfect encryption system presented by team of scientists from three countries

An international team of scientists from the University of St. Andrews (Scotland), the King Abdullah University of Science and Technology (Saudi Arabia) and the Center for Alternative Scientific Processes (USA)…

MyKingz uses Taylor Swift

MyKingz botnet uses Taylor Swift photo to infect target machines

Sophos researchers noticed that the MyKingz botnet, also known as Smominru, DarkCloud, and Hexmen, now uses steganography to infect targeted machines. For these purposes, the criminals chose a JPG file…

Password meter services risk

Password meter services put Internet users at risk

Password meter services, implemented on many popular platforms, can be misleading, thereby putting users at risk of cyberattacks. During the holiday season, hundreds of millions of people will receive gadgets…

The most dangerous malware of November 2019

Check Point named the most dangerous malware of November 2019

Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, published the Global Threat Index report, listing the most dangerous malware of November 2019.…

LockerGoga developers looking in Ukraine

France are looking for LockerGoga ransomware developers in Ukraine

French law enforcement agencies are looking in Ukraine for developers who used LockerGoga ransomware to attack more than 1,200 industrial enterprises around the world. According to the French police, some…

Message disable WhatsApp chat

An attacker in a WhatsApp group chat could disable messengers of other participants

Do you like chatting in groups of interest? Are you smiling or shivering when in a group chat from your child’s kindergarten or school class new messages arrive? You are…

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

On July 18, 2018, the European Commission announced that it had fined Google €4.3 billion for violating EU competition rules. The fine was imposed after an investigation revealed that Google…

Smoke Loader Malware

Smoke Loader Malware: New Password-Stealing Infection Method

A new variant of the Smoke Loader malware has been discovered that uses a new method to infect computers. Smoke Loader is a sophisticated malware that has been around since…

Windows 8.1 ☠️ The End of Support

Windows 8.1 ☠️ The End of Support

First, it’s important to understand that Microsoft ended support for Windows 8.1 on January 9th, 2018. This means that the operating system will no longer receive security updates, bug fixes,…