Tag Kaspersky

Stealthier Android Trojan Now Intercepts Bank Voice Calls

A recent analysis by Zimperium has revealed sophisticated evasion techniques utilized by a new variant of the FakeCall Trojan, which complicate the identification of its malicious code. Originally, researchers believed these apps might belong to a previously undiscovered malware family. However, further investigation revealed that the obfuscation involved concealing harmful…

Read MoreStealthier Android Trojan Now Intercepts Bank Voice Calls

ZKTeco Biometric System Exposed to 24 Critical Security Vulnerabilities

Security Flaws Discovered in ZKTeco Biometric Access System: A Call for Vigilance A recent analysis conducted by Kaspersky has revealed significant vulnerabilities in a hybrid biometric access system produced by the Chinese manufacturer ZKTeco. The assessment identified two dozen security flaws that could be exploited by cyber adversaries to undermine…

Read MoreZKTeco Biometric System Exposed to 24 Critical Security Vulnerabilities

New ‘HrServ.dll’ Web Shell Identified in APT Attack on Afghan Government

In a significant cybersecurity incident, an unidentified government entity in Afghanistan has fallen victim to a previously unreported web shell identified as HrServ, suggesting links to an advanced persistent threat (APT) attack. The exploit involves a dynamic-link library (DLL) file named "hrserv.dll," which boasts advanced functionalities, including custom encoding for…

Read MoreNew ‘HrServ.dll’ Web Shell Identified in APT Attack on Afghan Government

Critical OpenSSH Vulnerability Could Enable Root RCE on Linux Systems

OpenSSH Vulnerability Exposes Critical Risk to Linux Systems In a significant development for cybersecurity, the maintainers of OpenSSH have issued urgent security updates addressing a severe vulnerability that may allow unauthenticated remote code execution with root-level access on glibc-based Linux systems. This vulnerability, designated CVE-2024-6387 and dubbed "regreSSHion," resides within…

Read MoreCritical OpenSSH Vulnerability Could Enable Root RCE on Linux Systems

Two Unseen Tools from the Same Group Compromise Air-Gapped Devices

GoldenJackal’s Evolving Cyber Threat: A Deep Dive into Recent Developments Recent insights into the GoldenJackal cyber threat framework reveal a significant evolution in the sophistication of its attack methods since 2019. Initially known for its robust suite of capabilities, the group had developed tools that posed serious risks to organizations,…

Read MoreTwo Unseen Tools from the Same Group Compromise Air-Gapped Devices

Banking Trojans Exploit Google Cloud Run to Target Latin America and Europe

Cybersecurity Alert: Surge in Phishing Attacks Utilizing Google Cloud Services to Distribute Banking Trojans In a concerning trend, cybersecurity experts have detected a significant increase in email phishing campaigns employing Google Cloud Run to spread various banking trojans across Latin America and Europe. Notable trojans such as Astaroth, Mekotio, and…

Read MoreBanking Trojans Exploit Google Cloud Run to Target Latin America and Europe

QEMU Emulator Exploited as a Tunneling Tool to Compromise Company Network

Recent cybersecurity investigations revealed an alarming trend where threat actors are exploiting the QEMU open-source hardware emulator as a tunneling tool during a cyber intrusion aimed at a significant unnamed corporation. This development underscores a shift in tactics, showcasing how attackers are increasingly relying on legitimate software to implement their…

Read MoreQEMU Emulator Exploited as a Tunneling Tool to Compromise Company Network

ToddyCat Hacker Group Employs Sophisticated Tools for Large-Scale Data Theft

The Russian hacker group known as ToddyCat has drawn significant attention for employing an array of sophisticated tools to maintain access to compromised environments and extract sensitive information. Recently, Russian cybersecurity firm Kaspersky has classified this threat actor as a data harvester conducting operations primarily against governmental organizations—some associated with…

Read MoreToddyCat Hacker Group Employs Sophisticated Tools for Large-Scale Data Theft

A Shadowy Hacking Collective Unveils Two New Techniques for Extracting Data from Air-Gapped Systems

Newly Discovered Cyber Toolkit Reveals Evolving Threats to Data Security Recent research has unveiled a sophisticated toolkit designed for cyber espionage, characterized by its modular architecture and diverse functionalities developed in multiple programming languages. This toolkit aims to enhance flexibility and resilience against detection by targets, particularly when individual components…

Read MoreA Shadowy Hacking Collective Unveils Two New Techniques for Extracting Data from Air-Gapped Systems