Category: GBHackers

Beware Of Fake Verify You Are A Human Request That Delivers Malware
26
Sep
2024

Beware Of Fake Verify You Are A Human Request That Delivers Malware

Researchers observed two distinct instances where users were inadvertently led to malicious websites after conducting Google searches for video streaming…

Octo2 Android Malware Attacking To Steal Banking Credentials
26
Sep
2024

Octo2 Android Malware Attacking To Steal Banking Credentials

The original threat actor behind the Octo malware family has released a new variant, Octo2, with enhanced stability for remote…

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus
26
Sep
2024

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the Zerologon vulnerability, allowing them to gain…

New Mallox Ransomware Linux Variant Attacking Enterprise Linux Servers
26
Sep
2024

New Mallox Ransomware Linux Variant Attacking Enterprise Linux Servers

Kryptina RaaS, a free and open-source RaaS platform for Linux, initially struggled to attract attention. Still, after a Mallox affiliate’s…

TeamTNT Hackers Attacking VPS Servers Running CentOS
26
Sep
2024

TeamTNT Hackers Attacking VPS Servers Running CentOS

TeamTNT is targeting CentOS VPS clouds with SSH brute force attacks. It has uploaded a malicious script that disables security,…

Russian Hackers Registering Domains Targeting US Tech Brands
26
Sep
2024

Russian Hackers Registering Domains Targeting US Tech Brands

Researchers are tracking a Russian threat actor deploying domains involved in crypto scams targeting the US Presidential Election and tech…

Open Source C2 Frameworks Used In Red Teaming Assessments Vulnerable To RCE Attacks
26
Sep
2024

Open Source C2 Frameworks Used In Red Teaming Assessments Vulnerable To RCE Attacks

C2 frameworks, crucial for post-exploitation operations, offer open-source alternatives to Cobalt Strike. They streamline the management of compromised systems, enable…

Flax Typhoon’s Botnet Actively Exploiting 66 Vulnerabilities In Various Devices
26
Sep
2024

Flax Typhoon’s Botnet Actively Exploiting 66 Vulnerabilities In Various Devices

The Five Eyes agencies recently released a joint cybersecurity advisory detailing a new botnet, Flax Typhoon, linked to Chinese state-sponsored…

Multiple 0-Day Flaws in Automated Tank Gauge Systems Threaten Critical Infrastructure
25
Sep
2024

Multiple 0-Day Flaws in Automated Tank Gauge Systems Threaten Critical Infrastructure

Cybersecurity researchers from BitSight TRACE have uncovered multiple 0-day vulnerabilities in Automated Tank Gauge (ATG) systems, which are integral to…

MoneyGram Confirms Cyberattack Following Outage
25
Sep
2024

MoneyGram Confirms Cyberattack Following Outage

MoneyGram, a leading global money transfer service, has confirmed that it was the victim of a cyberattack, following a significant…

Kansas County Ransom Exposed Nearly 30,000 Residents' Data
25
Sep
2024

Kansas County Ransom Exposed Nearly 30,000 Residents’ Data

Franklin County, Kansas, has fallen victim to a ransomware attack that compromised the sensitive data of nearly 30,000 residents. The…

Researcher Details Cisco Smart Licensing that Lets Attacker Control Device
24
Sep
2024

Researcher Details Cisco Smart Licensing that Lets Attacker Control Device

Cisco disclosed a critical vulnerability identified as CVE-2024-20439, affecting its Smart Licensing Utility. An independent researcher discovered this vulnerability through…