Tag ESET

Chinese PlushDaemon APT Compromises S. Korean IPany VPN with Backdoor Access

Cybersecurity firm ESET has uncovered a previously unidentified Advanced Persistent Threat (APT) group known as “PlushDaemon,” which is reportedly aligned with China and has been targeting South Korea through sophisticated cyber espionage tactics. This revelation marks a significant development in the cybersecurity landscape, as PlushDaemon employs an innovative attack strategy…

Read MoreChinese PlushDaemon APT Compromises S. Korean IPany VPN with Backdoor Access

Cyberattack Impacting School Boards Nationwide: What Families Should Know and Do About Potential Data Exposure

In recent weeks, school boards across Canada, including some of the nation’s largest, have reported a significant data breach involving PowerSchool, a third-party service used by K-12 institutions to manage student data. Investigations into this cyber incident are ongoing, revealing that student information dating back several decades may have been…

Read MoreCyberattack Impacting School Boards Nationwide: What Families Should Know and Do About Potential Data Exposure

Microsoft Updates Windows to Address Secure Boot Bypass Vulnerability

For the past several months, a significant vulnerability affecting the security of Windows devices has been identified, allowing potential bypass of an industry-standard protection mechanism designed to thwart firmware infections. On Tuesday, Microsoft announced a patch for the vulnerability tracked as CVE-2024-7344. Currently, the implications for Linux systems remain uncertain.…

Read MoreMicrosoft Updates Windows to Address Secure Boot Bypass Vulnerability

State-Sponsored Entities Fuel the Ransomware Threat Landscape

Recent trends in ransomware attacks reveal a concerning evolution in tactics, as highlighted by the latest Threat Report from ESET. This report identifies a significant shift towards state-sponsored cybercriminal activities, with orchestration increasingly coming from government-affiliated groups focused on disruption and financial gain. These actors leverage ransomware not only to…

Read MoreState-Sponsored Entities Fuel the Ransomware Threat Landscape

Linux Faces Its First-Ever UEFI Bootkit Attack

Endpoint Security Bootkitty: Researchers Identify Linux’s First Bootkit, Primarily Conceptual Rather Than Malicious Prajeet Nair (@prajeetspeaks) • November 28, 2024 Bootkitty discovered in the wild is recognized as the first bootkit targeting Linux. (Image: Shutterstock) Cybersecurity experts have unearthed the first bootkit specifically engineered to compromise Linux systems by manipulating…

Read MoreLinux Faces Its First-Ever UEFI Bootkit Attack

Linux First Ever Targeted by a Bootkit Attack

Researchers Identify First Bootkit Targeting Linux Systems Cybersecurity experts have uncovered a significant advancement in malware threats with the identification of the first bootkit specifically engineered to compromise Linux systems. Dubbed "Bootkitty," this malicious software operates within the Unified Extensible Firmware Interface (UEFI), manipulating the boot process for harmful intents.…

Read MoreLinux First Ever Targeted by a Bootkit Attack

Discovered in the Wild: The First Ever Unkillable UEFI Bootkit for Linux

In recent developments within the cybersecurity landscape, a new form of malware known as Bootkitty has emerged, targeting Linux systems with techniques historically associated with Windows infections. This bootkit operates at the firmware level, specifically within the Unified Extensible Firmware Interface (UEFI), a crucial component that executes prior to the…

Read MoreDiscovered in the Wild: The First Ever Unkillable UEFI Bootkit for Linux

Russian Hackers Leverage 0-Day Vulnerabilities in Firefox and Windows to Install Backdoors

Russian RomCom Group Leverages Zero-Day Vulnerabilities in Cyber Campaign Cybersecurity researchers from ESET have uncovered a sophisticated attack campaign attributed to the Russia-linked group known as RomCom, which exploited two previously unknown vulnerabilities—commonly referred to as zero-day flaws—in widely used software platforms, namely Firefox and Windows. This complex operation highlights…

Read MoreRussian Hackers Leverage 0-Day Vulnerabilities in Firefox and Windows to Install Backdoors