Tag Trend Micro

New ‘Goldoon’ Botnet Exploits Decade-Old Vulnerability in D-Link Routers

A newly identified botnet, known as Goldoon, has emerged with a focus on exploiting a long-standing vulnerability within D-Link routers. This vulnerability, designated as CVE-2015-2051, has been present for nearly ten years, affecting models like the D-Link DIR-645. The flaw permits remote attackers to execute arbitrary commands through specially crafted…

Read MoreNew ‘Goldoon’ Botnet Exploits Decade-Old Vulnerability in D-Link Routers

Cybercriminals Leverage Phishing and EV Certificates to Distribute Ransomware

The cyber threat landscape continues to evolve as researchers from Trend Micro report that the perpetrators behind the RedLine and Vidar information stealers are shifting their tactics to include ransomware attacks. This alarming trend has been facilitated through phishing campaigns that distribute malware utilizing Extended Validation (EV) code signing certificates,…

Read MoreCybercriminals Leverage Phishing and EV Certificates to Distribute Ransomware

Active Attacks Targeting OS Command Injection Vulnerability in Oracle WebLogic Server

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced on Thursday the inclusion of a significant security vulnerability associated with the Oracle WebLogic Server in its Known Exploited Vulnerabilities (KEV) catalog. This action follows compelling evidence that the flaw is actively being exploited in the wild, raising concerns for organizations…

Read MoreActive Attacks Targeting OS Command Injection Vulnerability in Oracle WebLogic Server

FBI Releases 7,000 Decryption Keys to Assist LockBit Ransomware Victims

The FBI has announced that it possesses over 7,000 decryption keys related to the LockBit ransomware operation, a significant development aimed at assisting victims in recovering their data at no cost. Bryan Vorndran, the assistant director of the FBI’s Cyber Division, highlighted this initiative during his keynote address at the…

Read MoreFBI Releases 7,000 Decryption Keys to Assist LockBit Ransomware Victims

Microsoft Releases Patches for 51 Vulnerabilities, Featuring a Critical MSMQ Flaw

Microsoft Addresses 51 Vulnerabilities in June Patch Tuesday Update In its latest Patch Tuesday update for June 2024, Microsoft has rolled out security updates to address 51 vulnerabilities across its products. Among these, one vulnerability has been classified as Critical, while the remaining 50 are deemed Important. This release also…

Read MoreMicrosoft Releases Patches for 51 Vulnerabilities, Featuring a Critical MSMQ Flaw

Experts Caution Against Mekotio Banking Trojan Threatening Latin American Nations

Mekotio Banking Trojan Intensifies Threats Against Latin American Financial Institutions A serious cybersecurity concern has emerged as banks and financial institutions across Latin America face increasing threats from a malware known as Mekotio, also referred to as Melcoz. Recent findings from cybersecurity firm Trend Micro point to a notable rise…

Read MoreExperts Caution Against Mekotio Banking Trojan Threatening Latin American Nations

Cybercriminals Launch Over 100,000 Malicious Android Apps to Capture OTP Codes

A recent investigation has uncovered a significant malicious campaign leveraging harmful Android applications to pilfer users’ SMS messages, with activity dating back to at least February 2022. This large-scale operation purportedly involves over 107,000 unique malicious app samples aimed at intercepting one-time passwords (OTPs) that are essential for online account…

Read MoreCybercriminals Launch Over 100,000 Malicious Android Apps to Capture OTP Codes

Ransomware Hackers Exploit Cloud Service Platforms as Their Playground

In recent years, the landscape of cybercrime has become increasingly perilous, with ransomware attacks surging in both frequency and sophistication. Cybercriminal organizations have gained notoriety for infiltrating targeted networks, encrypting vital databases, and effectively locking out businesses from their critical data until a ransom is paid. This evolving approach to…

Read MoreRansomware Hackers Exploit Cloud Service Platforms as Their Playground

Kasseika Ransomware Employs BYOVD Technique to Bypass Security Before Encryption

The Kasseika ransomware group has emerged as the latest threat actor exploiting the Bring Your Own Vulnerable Driver (BYOVD) technique to disable security processes on compromised Windows systems. This method allows cybercriminals to terminate antivirus software, facilitating the deployment of ransomware. Kasseika joins other prominent groups, including Akira, AvosLocker, BlackByte,…

Read MoreKasseika Ransomware Employs BYOVD Technique to Bypass Security Before Encryption