New threat actor leverages a varied tool kit & multiple payloads to distribute cryptomining malware

In April, Cisco Talos observed a new threat actor named Rocke using western and Chinese Git repositories to deliver cryptomining malware to honeypots that were vulnerable to an Apache Struts vulnerability. Researchers detected Rocke conducting a similar campaign in July. In that operation, the threat actor communicated with an HTTP File Server (HFS) hosting 11 …

Hackers using unknown, unpatched bug in Internet Explorer to attack Windows PCs with malware

Researchers at Qihoo 360’s Core security unit say an advanced persistent threat (APT) group is using the IE vulnerability on a “global scale”, which is being delivered to select targets via malicious Office documents loaded with what it calls a “double-kill” vulnerability. Victims are required to open the Office document, which launches a malicious webpage …

Thousands of websites hijacked by cryptocurrency mining kits

Many government and other websites were hijacked to mine the cryptocurrency Monero on Sunday. A list of affected websites can be viewed here: Texthelp Browsealoud security issue The malicious code was first spotted by UK-based infosec consultant Scott Helme, and confirmed by The Register. He recommended webmasters try a technique called SRI – Subresource Integrity – …

Warning of Chrome Extensions that are Malware infested

For long users have been warned of third-party Android apps might be hiding some malware as well. But your hyper-vigilant download habits should extend beyond your smartphone. You need to keep an eye on your desktop Chrome extensions as well. As with Android apps, though, Chrome extensions can sometimes hide malware or other scourges, even …

New Turla Cyber-espionage Malware Disguises as Adobe Flash Player installer

ESET researchers have uncovered state-sponsored hacking operationtargeting diplomats, using a new attack that bundles malware with a legitimate software update. The attacks are targeting embassies and consulates in eastern European post-Soviet states and have been attributed to Turla, a well-known advanced persistent threat group The ESET research shows that in addition to bundling its backdoors …

Winter Olympics targeted with new custom-built fileless malware

Researchers have uncovered a campaign targeting organisations involved with next month’s Games in South Korea, with the aim of controlling infected machines. Hackers are targeting the upcoming Winter Olympics with a phishing and malware campaign directed at the organisations that provide infrastructure and other support for the Games. The campaign targets a number of organisations …