The Information Highway

The Information Highway

Malware dev lures child exploiters into honeytrap to extort them

hacker-arms-raised-brighter

You rarely root for a cybercriminal, but a new malware campaign targeting child exploiters doesn't make you feel bad for the victims.

Continue reading
  162 Hits

GitHub comments abused to push malware via Microsoft repo URLs

GitHub-headpic

A GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using URLs associated with a Microsoft repository, making the files appear trustworthy.

Continue reading
  161 Hits

Google Chrome gets real-time phishing protection later this month

Google_Chrome

Google will roll out a Safe Browsing update later this month that will provide real-time malware and phishing protection to all Chrome users, without compromising their browsing privacy.

Continue reading
  182 Hits

New RustDoor macOS malware impersonates Visual Studio update

mystery-hacker

A new Rust-based macOS malware spreading as a Visual Studio update to provide backdoor access to compromised systems uses infrastructure linked to the infamous ALPHV/BlackCat ransomware gang.


Continue reading
  385 Hits

Blackwood hackers hijack WPS Office update to install malware

China-hacker

A previously unknown advanced threat actor tracked as 'Blackwood' is using sophisticated malware called NSPX30 in cyberespionage attacks against companies and individuals.


Continue reading
  340 Hits

Microsoft disables MSIX protocol handler abused in malware attacks

Windows

Microsoft has again disabled the MSIX ms-appinstaller protocol handler after multiple financially motivated threat groups abused it to infect Windows users with malware. 

Continue reading
  366 Hits

New NKAbuse malware abuses NKN blockchain for stealthy comms

hacker-globe

A new Go-based multi-platform malware identified as 'NKAbuse' is the first malware abusing NKN (New Kind of Network) technology for data exchange, making it a stealthy threat. 

Continue reading
  292 Hits

Lumma Stealer malware now uses trigonometry to evade detection

Hacker_headpic

The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox. 

Continue reading
  331 Hits

Qubitstrike attacks rootkit Jupyter Linux servers to steal credentials

linux-security-headpic

Hackers are scanning for internet-exposed Jupyter Notebooks to breach servers and deploy a cocktail of malware consisting of a Linux rootkit, crypto miners, and password-stealing scripts. 

Continue reading
  476 Hits

New WordPress backdoor creates rogue admin to hijack websites

0_WordPres_20231014-202126_1

A new malware has been posing as a legitimate caching plugin to target WordPress sites, allowing threat actors to create an administrator account and control the site's activity. 

Continue reading
  504 Hits

Bing Chat responses infiltrated by ads pushing malware

bing-chat-header-blue

Malicious advertisements are now being injected into Microsoft's AI-powered Bing Chat responses, promoting fake download sites that distribute malware. 

Continue reading
  577 Hits

CISA: New Whirlpool backdoor used in Barracuda ESG hacks

Barracuda-Whirlpool

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has discovered that the backdoor malware named 'Whirlpool' used in attacks on compromised Barracuda Email Security Gateway (ESG) devices. 

Continue reading
  591 Hits