Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware

17/03/2023 0 Comments 0 tags

Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android and Windows users with cryptocurrency clipper malware. “All of them

Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials

17/03/2023 0 Comments 0 tags

The advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India, Lithuania, Slovakia, and the Vatican since 2021. The activity targeted Polish government agencies, the

Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips

17/03/2023 0 Comments 0 tags

Google is calling attention to a set of severe security flaws in Samsung’s Exynos chips, some of which could be exploited remotely to completely compromise a phone without requiring any

Chinese and Russian Hackers Using SILKLOADER Malware to Evade Detection

16/03/2023 0 Comments 0 tags

Threat activity clusters affiliated with the Chinese and Russian cybercriminal ecosystems have been observed using a new piece of malware that’s designed to load Cobalt Strike onto infected machines. Dubbed SILKLOADER by

Cryptojacking Group TeamTNT Suspected of Using Decoy Miner to Conceal Data Exfiltration

16/03/2023 0 Comments 0 tags

The cryptojacking group known as TeamTNT is suspected to be behind a previously undiscovered strain of malware used to mine Monero cryptocurrency on compromised systems. That’s according to Cado Security, which found the sample after Sysdig

Authorities Shut Down ChipMixer Platform Tied to Crypto Laundering Scheme

16/03/2023 0 Comments 0 tags

A coalition of law enforcement agencies across Europe and the U.S. announced the takedown of ChipMixer, an unlicensed cryptocurrency mixer that began its operations in August 2017. “The ChipMixer software blocked the

What’s Wrong with Manufacturing?

16/03/2023 0 Comments 0 tags

In last year’s edition of the Security Navigator we noted that the Manufacturing Industry appeared to be totally over-represented in our dataset of Cyber Extortion victims. Neither the number of businesses nor

Multiple Hacker Groups Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency

16/03/2023 0 Comments 0 tags

Multiple threat actors, including a nation-state group, exploited a critical three-year-old security flaw in Progress Telerik to break into an unnamed federal entity in the U.S. The disclosure comes from a joint advisory issued

CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the Wild

16/03/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on March 15 added a security vulnerability impacting Adobe ColdFusion to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The

YoroTrooper Stealing Credentials and Information from Government and Energy Organizations

15/03/2023 0 Comments 0 tags

A previously undocumented threat actor dubbed YoroTrooper has been targeting government, energy, and international organizations across Europe as part of a cyber espionage campaign that has been active since at least June