Over 200 Apps on Play Store were distributing Facestealer info-stealer

Experts spotted over 200 Android apps on the Play Store distributing spyware called Facestealer used to steal sensitive data. Trend Micro researchers spotted over 200 Android apps on the Play Store distributing spyware called Facestealer used to steal sensitive data from infected devices. The malicious apps are able to steal credentials, Facebook cookies, and other personally identifiable information. Some […]

The post Over 200 Apps on Play Store were distributing Facestealer info-stealer appeared first on Security Affairs.

Cardiologist charged for use and sale of ransomware

The US Attorney’s Office is charging a Venezuelan cardiologist with attempted computer intrusions and conspiracy to commit computer intrusions. The charges stem from his use and sale of ransomware, as well as his extensive support of, and profit sharin…

A custom PowerShell RAT uses to target German users using Ukraine crisis as bait

Researchers spotted a threat actor using a custom PowerShell RAT targeting German users to gain intelligence on the Ukraine crisis. Malwarebytes experts uncovered a campaign that targets German users with custom PowerShell RAT targeting. The threat actors attempt to trick victims into opening weaponized documents by using the current situation in Ukraine as bait. The […]

The post A custom PowerShell RAT uses to target German users using Ukraine crisis as bait appeared first on Security Affairs.

Emotet is the most common malware

HP announced that the HP Wolf Security threat research team has identified a 27-fold increase in detections resulting from Emotet malicious spam campaigns in Q1 2022, compared to Q4 2021 – when Emotet first made its reappearance. The latest global HP W…

i created malware with Python (it’s SCARY easy!!) #Linux #NetworkAdmin #NetworkChuck #Python #RaspberryPi #Security #VirtualMachines #MaryPatriotNews [Video]

Create your Python Malware lab: https://ntck.co/linode (you get a $100 Credit good for 60 days as a new user!)We are going to write our very own malware in Python!! It’s actually scary easy to do and it will give you a peek behind the curtain of how bad actors create these malicious programs. NetworkChuck will walk you through every step of how to create a ransomware program in Python using the cryptography library in Python called Fernet. He’ll then show you how to download a malware playground, a malware showcase of malicious python scripts you can play with.🧪🧪Links and Walkthrough: https://ntck.co/321🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy**Sponsored by LinodeSUPPORT NETWORKCHUCK—————————————————➡️NetworkChuck membership: https://ntck.co/Premium☕☕ COFFEE and MERCH: https://ntck.co/coffeeCheck out my new channel: https://ntck.co/ncclips🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuckSTUDY WITH ME on Twitch: https://bit.ly/nc_twitchREADY TO LEARN??—————————————————-Learn Python: https://bit.ly/3rzZjzz-Get your CCNA: https://bit.ly/nc-ccnaFOLLOW ME EVERYWHERE—————————————————Instagram: https://www.instagram.com/networkchuck/Twitter: https://twitter.com/networkchuckFacebook: https://www.facebook.com/NetworkChuck/Join the Discord server: http://bit.ly/nc-discord0:00 ⏩ Intro0:45 ⏩ What do you need?0:56 ⏩ Our sponsor is awesome2:06 ⏩ STEP 1 – the setup2:20 ⏩ What is Ransomware?3:52 ⏩ STEP 2 – Creating our ransomware script14:39 ⏩ STEP 3 – Writing the ransomware decryption script21:37 ⏩ Downloading a malware playgroundAFFILIATES & REFERRALS—————————————————(GEAR I USE…STUFF I RECOMMEND)My network gear: https://geni.us/L6wyIUjAmazon Affiliate Store: https://www.amazon.com/shop/networkchuckBuy a Raspberry Pi: https://geni.us/aBeqAL#python #malware #ransomware

Experts show how to run malware on chips of a turned-off iPhone

Researchers devised an attack technique to tamper the firmware and execute a malware onto a Bluetooth chip when an iPhone is “off.” A team of researchers from the Secure Mobile Networking Lab (SEEMOO) at the Technical University of Darmstadt demonstrated a technique to tamper with the firmware and load malware onto a chip while an […]

The post Experts show how to run malware on chips of a turned-off iPhone appeared first on Security Affairs.

‘Sysrv’ Botnet Targeting Recent Spring Cloud Gateway Vulnerability

A new variant of the Sysrv botnet has added a recent Spring Cloud Gateway vulnerability to its exploit portfolio, Microsoft warns.
The Sysrv botnet has been active since at least late 2020, looking to exploit known security bugs in access interfaces in…

Iran’s COBALT MIRAGE Threat Group Behind Ransomware Attacks in US

By Deeba Ahmed
Cobalt Mirage is an Irani threat group believed to be linked to the Iranian Cobalt Illusion threat group,…
This is a post from HackRead.com Read the original post: Iran’s COBALT MIRAGE Threat Group Behind Ransomware Attacks i…