New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2 infrastructure, storing stolen data, and delivering second and third-stage downloaders or rootkit programs. Two open-source PyPI packages were discovered to be utilized by threat actors for executing code via DLL sideloading attacks as a means […]

The post New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency

The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host. The campaign employed many Redis system-weakening commands to potentially disable data store security features that could hinder their initial attempts at access. Additionally, the campaign uses these commands to carry out a cryptojacking attack on Redis. Redis, “Remote Dictionary […]

The post New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

More details about Operation Cronos that disrupted Lockbit operation

Law enforcement provided additional details about the international Operation Cronos that led to the disruption of the Lockbit ransomware operation. Yesterday, a joint law enforcement action, code-named Operation Cronos, conducted by law enforcement agencies from 11 countries disrupted the LockBit ransomware operation. Below is the image of the Tor leak site of the Lockbit ransomware gang that […]

LockBit Ransomware Members Charged by Authorities, Free Decryptor Released

In a significant blow to one of the most prolific ransomware operations, authorities from the U.S. and U.K., in collaboration with international law enforcement, have disrupted the LockBit ransomware variant. The coordinated effort led to the arrest of two operators in Poland and Ukraine and the release of a free decryptor tool that will aid […]

The post LockBit Ransomware Members Charged by Authorities, Free Decryptor Released appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

UK and FBI take over ransomware group’s website

UK agency says they have ‘hacked the hackers’ and will help LockBit victims decrypt their systemsA massive law enforcement operation has seized the “command and control” infrastructure for international ransomware group LockBit, the UK’s National Crime…

Warning: Agniane Stealer Targeting Users to Steal Financial Data

Threat actors use stealers to collect sensitive information from unsuspecting users covertly. These tools are favored for their ability to infiltrate systems, remain undetected, and extract valuable data, which threat actors can exploit for financial gain and several malicious purposes. Stealers offer a low-risk and high-reward method for threat actors to access valuable assets without […]

The post Warning: Agniane Stealer Targeting Users to Steal Financial Data appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Arrested For Stealing Banking Credentials Using Novel Android Malware

An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging to citizens of the United States and Canada. The cybercrime incident resulted in the perpetrator acquiring a total amount of more than UAH 3.5 million. Modus Operandi of Hacker In Vinnytsia, […]

The post Hackers Arrested For Stealing Banking Credentials Using Novel Android Malware appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

Clean links and sophisticated scams mark new era in email attacks

Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social engineering attacks are at all-time highs, according to VIPRE Security. The rise of the EML file attachments In 2024, QR code…