"New Android Banking Trojan Mimics Google Play Update App"

"New Android Banking Trojan Mimics Google Play Update App"

Cyble Research and Intelligence Labs (CRIL) discovered a new Android banking Trojan dubbed "Antidot." According to researchers, the malware is sophisticated as it includes overlay attacks, keylogging, and obfuscation capabilities. Antidot presents itself as a Google Play update application. The fake update page displayed upon installation is in various languages, including German, French, Spanish, English, and more, suggesting that the malware targets Android users in different regions.

Submitted by Gregory Rigby on

"Critical Flaw in AI Python Package Can Lead to System and Data Compromise"

"Critical Flaw in AI Python Package Can Lead to System and Data Compromise"

A critical vulnerability in a Python package used by Artificial Intelligence (AI) application developers enables arbitrary code execution. The flaw, dubbed "Llama Drama," was discovered by researcher Patrick Peng. It relates to the Jinja2 template rendering Python tool, which generates HTML, and the llama_cpp_python package that integrates AI models with Python. This article continues to discuss the potential exploitation and impact of the Llama Drama vulnerability. 

Submitted by Gregory Rigby on

"WebTPA Data Breach Impacts 2.4 million Insurance Policyholders"

"WebTPA Data Breach Impacts 2.4 million Insurance Policyholders"

The U.S. Department of Health and Human Services recently announced that the WebTPA Employer Services (WebTPA) data breach disclosed earlier this month impacts nearly 2.5 million individuals. Some of the impacted people are customers at large insurance companies. WebTPA is a GuideWell Mutual Holding Corporation subsidiary and a third-party administrator (TPA) that provides customized administrative services to health plans and insurance companies. WebTPA said the threat actor had access to personal data for five days between April 18 and April 23, 2023.

Submitted by Adam Ekwall on

Patient Data at Risk in MediSecure Ransomware Attack

Patient Data at Risk in MediSecure Ransomware Attack

Australian healthcare company MediSecure has recently suffered a “large scale” ransomware attack, putting individuals’ personal and health information at risk. The electronic prescriptions provider confirmed the incident in a statement on May 16, which it admitted has impacted the personal and health information of individuals. The company did not give any information about the nature of the information that has been potentially accessed. Medisecure’s website and phone lines are also out of operation currently.

Submitted by Adam Ekwall on

"Threat Actors Abuse GitHub to Distribute Multiple Information Stealers"

"Threat Actors Abuse GitHub to Distribute Multiple Information Stealers"

A malicious campaign has used a legitimate GitHub profile to spread information-stealing malware. Russian-speaking threat actors have impersonated 1Password, Bartender 5, and other legitimate applications to distribute Atomic macOS Stealer (AMOS), Vidar, Lumma, and Octo malware. The malware operations shared Command-and-Control (C2) infrastructure, suggesting the use of a centralized setup in cross-platform attacks to increase efficiency.

Submitted by Gregory Rigby on

"Flaw in Wi-Fi Standard Can Enable SSID Confusion Attacks"

"Flaw in Wi-Fi Standard Can Enable SSID Confusion Attacks"

According to researchers at Belgium's KU Leuven, attackers can exploit a fundamental design flaw in the IEEE 802.11 Wi-Fi standard to trick victims into connecting to a less secure wireless network. The Virtual Private Network (VPN) review site Top10VPN, which worked with one of the KU Leuven researchers to release details about the flaw, warns that such attacks increase the risk of traffic interception and manipulation. The flaw impacts Wi-Fi clients across all Operating Systems (OS).

Submitted by Gregory Rigby on

"Researchers Uncover 11 Security Flaws in GE HealthCare Ultrasound Machines"

"Researchers Uncover 11 Security Flaws in GE HealthCare Ultrasound Machines"

Researchers have found almost a dozen security flaws that affect the GE HealthCare Vivid Ultrasound product family. The exploitation of these vulnerabilities could allow malicious actors to tamper with patient data and install ransomware. From implanting ransomware on the ultrasound machine to accessing and manipulating patient data on vulnerable devices, the Operational Technology (OT) security vendor Nozomi Networks said these flaws have many effects.

Submitted by Gregory Rigby on

"Third Chrome Zero-Day Patched by Google Within One Week"

"Third Chrome Zero-Day Patched by Google Within One Week"

Google recently announced the release of Chrome 125 to the stable channel with patches for nine vulnerabilities, including four reported by external researchers. The most critical bug is CVE-2024-4947, a high-severity type confusion flaw in the V8 JavaScript engine that has already been exploited. Google noted that successfully exploiting the vulnerability could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

Submitted by Adam Ekwall on

"SugarGh0st RAT Variant Used in Targeted AI Industry Attacks"

"SugarGh0st RAT Variant Used in Targeted AI Industry Attacks"

Researchers have discovered a sophisticated cyber campaign targeting US Artificial Intelligence (AI) organizations. "UNK_SweetSpecter," a May 2024 campaign, uses the "SugarGh0st RAT," a "Gh0stRAT"-based Remote Access Trojan (RAT). This variant, which Chinese-speaking threat actors have used, now targets AI-related entities. Proofpoint reported that the attacks used a free email account to send AI-themed lures to open zip archives. This article continues to discuss the campaign involving the SugarGh0st RAT variant.

Submitted by Gregory Rigby on

"Kimsuky Hackers Deploy New Linux Backdoor in Attacks on South Korea"

"Kimsuky Hackers Deploy New Linux Backdoor in Attacks on South Korea"

The North Korean hacker group "Kimsuky" is now using "Gomir," a new Linux malware and version of the GoBear backdoor. Kimsuky is a state-sponsored threat actor connected to North Korea's military intelligence, the Reconnaissance General Bureau (RGB). Symantec researchers found a Linux variant of the GoBear backdoor while investigating a campaign reported by researchers at the SW2 threat intelligence company in early February 2024 that targeted South Korean government organizations. This article continues to discuss the Kimsuky hackers' use of a new Linux backdoor.

Submitted by Gregory Rigby on
Subscribe to