π°π°π°π° Cyber News π°π°π°π°
Cybercrime Gang Behind GozNym Banking Malware Dismantled
Europol said it has dismantled the cybercrime network behind the GozNym malware, which siphoned more than $100 million from businesses.
The cybercrime network behind the GozNym malware, used to siphon $100 million out of its victims, has been dismantled in a massive international investigation, according to authorities
Read More : https://threatpost.com/cybercrime-gang-behind-goznym-banking-malware-dismantled/144795/
#CyberCrime #GozNym #HackTorial #Malware
π°π°π°π° @HackTorial π°π°π°π°
Cybercrime Gang Behind GozNym Banking Malware Dismantled
Europol said it has dismantled the cybercrime network behind the GozNym malware, which siphoned more than $100 million from businesses.
The cybercrime network behind the GozNym malware, used to siphon $100 million out of its victims, has been dismantled in a massive international investigation, according to authorities
Read More : https://threatpost.com/cybercrime-gang-behind-goznym-banking-malware-dismantled/144795/
#CyberCrime #GozNym #HackTorial #Malware
π°π°π°π° @HackTorial π°π°π°π°
π°π°π°π° Linux Update π°π°π°π°
Security researchers discover Linux version of Winnti malware
Winnti Linux variant used in 2015 in the hack of a Vietnamese gaming company.
For the first time, security researchers have uncovered and analyzed a Linux variant of Winnti, one of the favorite hacking tools used by Beijing hackers over the past decade.
Discovered by security researchers from Chronicle, Alphabet's cyber-security division, the Linux version of the Winnti malware works as a backdoor on infected hosts, granting attackers access to compromised systems.
Read More : https://www.zdnet.com/article/security-researchers-discover-linux-version-of-winnti-malware/
#Linux #Winnti #Malware #HackTorial
π°π°π°π° @HackTorial π°π°π°π°
Security researchers discover Linux version of Winnti malware
Winnti Linux variant used in 2015 in the hack of a Vietnamese gaming company.
For the first time, security researchers have uncovered and analyzed a Linux variant of Winnti, one of the favorite hacking tools used by Beijing hackers over the past decade.
Discovered by security researchers from Chronicle, Alphabet's cyber-security division, the Linux version of the Winnti malware works as a backdoor on infected hosts, granting attackers access to compromised systems.
Read More : https://www.zdnet.com/article/security-researchers-discover-linux-version-of-winnti-malware/
#Linux #Winnti #Malware #HackTorial
π°π°π°π° @HackTorial π°π°π°π°
π° New Android malware bypass 2FA & steal one-time passwords π°
These apps were designed to pass as BtcTurk, a Turkish cryptocurrency exchange.
Researcher Lukas Stefanko at the Slovakian security firm ESET has discovered Android malware in new apps that can bypass the SMS-based two-factor authentication (2FA) without using SMS permissions. The malicious apps are available on the very reliable platform Google Play Store.
Read More : https://www.hackread.com/new-android-malware-bypass-2fa-steal-one-time-passwords/
#GooglePlaySTore #PlayStore #Malware #InfectedApps
#HackTorial #Vulnerability
π°π°π°π° @HackTorial π°π°π°π°
These apps were designed to pass as BtcTurk, a Turkish cryptocurrency exchange.
Researcher Lukas Stefanko at the Slovakian security firm ESET has discovered Android malware in new apps that can bypass the SMS-based two-factor authentication (2FA) without using SMS permissions. The malicious apps are available on the very reliable platform Google Play Store.
Read More : https://www.hackread.com/new-android-malware-bypass-2fa-steal-one-time-passwords/
#GooglePlaySTore #PlayStore #Malware #InfectedApps
#HackTorial #Vulnerability
π°π°π°π° @HackTorial π°π°π°π°
π° China Is Forcefully Installing A βData-Stealingβ Malware On Touristsβ Phones π°
China is notorious for its invasive security and surveillance operations, but now it has taken things to another level.
A report by Vice suggests that Chinese border guards are forcing tourists to install software, which is basically malware, on their phones. This software copies messaging, contacts, and scans the phones for thousands of different documents.
Read More : http://bit.ly/2XhxNGI
#China #Malware #Tourists #Hack #DataTheft #Hacktorial
π°π°π°π° @HackTorial π°π°π°π°
China is notorious for its invasive security and surveillance operations, but now it has taken things to another level.
A report by Vice suggests that Chinese border guards are forcing tourists to install software, which is basically malware, on their phones. This software copies messaging, contacts, and scans the phones for thousands of different documents.
Read More : http://bit.ly/2XhxNGI
#China #Malware #Tourists #Hack #DataTheft #Hacktorial
π°π°π°π° @HackTorial π°π°π°π°
New Android Spyware Created by Russian Defense Contractor Found in the Wild
Cybersecurity researchers have uncovered a new piece of mobile surveillance malware believed to be developed by a Russian defense contractor that has been sanctioned for interfering with the 2016 U.S. presidential election.
Dubbed Monokle, the mobile remote-access trojan has been actively targeting Android phones since at least March 2016 and is primarily being used in highly targeted attacks on a limited number of people.
According to security researchers at Lookout, Monokle possesses a wide range of spying functionalities and uses advanced data exfiltration techniques, even without requiring root access to a targeted device.
Read More : https://thehackernews.com/2019/07/russian-android-spying-apps.html
#HackerNews #AndroidSpyware #RussianDefenceContractor #Malware #Monokle #Hacktorial
π°π°π°π° @HackTorial π°π°π°π°
Cybersecurity researchers have uncovered a new piece of mobile surveillance malware believed to be developed by a Russian defense contractor that has been sanctioned for interfering with the 2016 U.S. presidential election.
Dubbed Monokle, the mobile remote-access trojan has been actively targeting Android phones since at least March 2016 and is primarily being used in highly targeted attacks on a limited number of people.
According to security researchers at Lookout, Monokle possesses a wide range of spying functionalities and uses advanced data exfiltration techniques, even without requiring root access to a targeted device.
Read More : https://thehackernews.com/2019/07/russian-android-spying-apps.html
#HackerNews #AndroidSpyware #RussianDefenceContractor #Malware #Monokle #Hacktorial
π°π°π°π° @HackTorial π°π°π°π°
ββFrench Police Remotely Removed RETADUP Malware from 850,000 Infected PCs
The French law enforcement agency, National Gendarmerie, today announced the successful takedown of one of the largest wide-spread RETADUP botnet malware and how it remotely disinfected more than 850,000 computers worldwide with the help of researchers.
Earlier this year, security researchers at Avast antivirus firm, who were actively monitoring the activities of RETADUP botnet, discovered...
Read More : http://feedproxy.google.com/~r/TheHackersNews/~3/EOT8sC3m8GY/retadup-botnet-malware.html
#Retadup #malware
π°π°π°π° @HACKTORIAL π°π°π°π°
The French law enforcement agency, National Gendarmerie, today announced the successful takedown of one of the largest wide-spread RETADUP botnet malware and how it remotely disinfected more than 850,000 computers worldwide with the help of researchers.
Earlier this year, security researchers at Avast antivirus firm, who were actively monitoring the activities of RETADUP botnet, discovered...
Read More : http://feedproxy.google.com/~r/TheHackersNews/~3/EOT8sC3m8GY/retadup-botnet-malware.html
#Retadup #malware
π°π°π°π° @HACKTORIAL π°π°π°π°
π° Smominru Botnet Indiscriminately Hacked Over 90,000 Computers Just Last Month π°
Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals have now shifted toward a profitable scheme where botnets do not just launch DDoS or spamβthey mine cryptocurrencies as well.
Smominru, an infamous cryptocurrency-mining and credential-stealing botnet, has become one of the rapidly spreading
Read More : http://feedproxy.google.com/~r/TheHackersNews/~3/7lLmulSq8ms/smominru-botnet.html
#Smominru #Botnet #Backdoor #Rootkit #Malware #Hacktorial
π°π°π°π° @HackTorial π°π°π°π°
Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals have now shifted toward a profitable scheme where botnets do not just launch DDoS or spamβthey mine cryptocurrencies as well.
Smominru, an infamous cryptocurrency-mining and credential-stealing botnet, has become one of the rapidly spreading
Read More : http://feedproxy.google.com/~r/TheHackersNews/~3/7lLmulSq8ms/smominru-botnet.html
#Smominru #Botnet #Backdoor #Rootkit #Malware #Hacktorial
π°π°π°π° @HackTorial π°π°π°π°