Category Archives: Cybersecurity
Purple Fox Malware Evolves With Worm Capabilities
The Windows malware called Purple Fox Evolves with worm capabilities. Purple Fox in the past the malware targeted Windows machines through a various attack methods like phishing and exploits before the software was evolved.
Guardicore Labs revealed that Purple Fox can now breach windows machines through SMB Brute-Force attacks. The Purple Fox malware would compromise various IIS7.5 servers to push rootkit’s which would then allow Purple Fox to hide itself within the Windows machine.
Once the payload is deployed, an MSI installed launches.
… Read the rest“The installer pretends to be a Windows Update package along with Chinese text which roughly translates to ‘Windows Update’ and random letters,” which Guardicore Labs explained. “These letters are randomly generated between each different MSI installer to create a different hash and make it a bit difficult to tie between different versions of the same MSI.”
“This is a ‘cheap’ and simple way of evading various detection
Three Linux vulnerabilities provided root access to hackers since 2006
Three Linux vulnerabilities provided root access to hackers since 2006 in the iSCSI module used for getting to shared data storage. This flaw could allow root access to any hacker with a user account.
The three vulnerabilities – CVE-2021-27363, CVE-2021-27364 and CVE-2021-27365 – were in the Linux code since 2006 going unnoticed until the researchers from GRIMM discovered them.
… Read the restAdam Nichols, Software Security Principal at GRIMM said. “If you already had execution on a box, either because you have a user account on the machine, or you’ve compromised some service that doesn’t have repaired permissions, you can do whatever you want basically,”
Even though the flaw “are in code that isn’t remotely accessible, so this isn’t like a remote exploit,” said Nichols. However they can take “any existing threat that might be there. It just makes it that much worse,” he explained. “And if you have users on the system
Microsoft released one-click solution for Exchange Vulnerability
To combat the severe vulnerability facing exchange servers, Microsoft has released a one-click solution to help server administrators mitigate the problem.
Microsoft Stated “We realized that there was a need for a simple, easy to use, automated solution that would meet the needs of customers using both current and out-of-support versions of on-premises Exchange Server,”
It has been reported by RISKIQ that over 80,000 servers are still vulnerable. Microsoft decided to take action and create a solution to mitigate the problem quicker. The one-click application should resolve the issues with exchange server 2013, 2016 and 2019.
You can find the download and more details on Microsoft’s Security Response Center.
Has your computer been hijacked with cryptojacking?
There are so many ways that hackers can use your computer to make themselves money and cryptojacking is one of them. Worst part about it is if you don’t have proper security in place you wont even know that your infected.
What is Cryptojacking?
Well the term cryptojacking refers to the unauthorized use of someone’s computer for mining cryptocurrency, for example bitcoin. Cryptojacking is a big deal because the hackers are stealing your computing power and making your systems slower. All the computing power they are using up will have a tangible effect in your power consumption and could cost you double in your power bill.
How does Cryptojacking work?
There are a few methods that you can be infected with Cryptojacking.
- Hackers can send you an email and trick you into clicking the link that loads the malicious software on your computer.
- Hackers can compromise a website or an
Importance of Cyber Security in the Workplace
Organizations need to elevate their security posture at the workplace and put in place a cyber security policy to better protect their data and their client’s data. Most company’s these days have a database containing confidential information such as:
- Private financial data of company assets.
- Personal details of customers, executives, employees, vendors and partners of the firm.
- Unfinished or ongoing projects, new software developments and patents of primal importance that are exclusive to the company.
- Confidential information about existing or potential clients of the company.
Cyber Security is absolutely a requirement these days and should no longer be over looked. All company’s should at least follow simple cyber security practices and employees should be aware of cyber security threats by providing them cyber security awareness training.
It is best to have a workplace security policy in place because your aren’t just protecting your employees’ but also the personal credentials … Read the rest
How To Protect Your Healthcare Institutions Against Cyber Attacks
Healthcare has become a top priority due to the pandemic and with so many wheels turning to keep up with demands several things fall through the cracks and one of them being cyber security.
Healthcare cyber attack breaches and leaks not only hurt the institutions financially but also hurt its patients for the rest of their lives. Therefore, everyone needs to do their part and take the necessary precautions and try to keep ahead of threats. Here are some simple cyber security measures you can take.
Vulnerability Management
Hackers love to find exploits and unpatched vulnerabilities in the IT infrastructure they are attacking so they can ensure the success of their attempt. You will need to make sure that all the security patches and device firmware are updated regularly. Overlooking even a small vulnerability in your healthcare’s IT security can have severe ramifications. Conducting periodic Vulnerability Assessment and Penetration Testing … Read the rest
The Strategy Behind Ransomware Attacks
Everyone Hates Ransomware Attacks and we should learn their strategy. Ransomware is a type of malware that is installed onto computers through malicious emails. The ransomware encrypts the computers data and then requires the victims to purchase a decryption key. Once the data is encrypted the hackers will demand a ransom, which can set you back a few hundred dollars to a few thousand which are payable in Bitcoin.
There are a number of attack vectors through which ransomware can gain unauthorized access into computer systems. One of the most common ways used to access computers is via phishing emails and email attachments. Hackers make these emails look really legitimate and trick the users to open them. Once these emails are opened and attachments are downloaded, the attackers take over the victims’ computers.
Hackers can also access your network through Remote Desktop (RDP) that are open directly to the public. … Read the rest
New Android Malware Spreading Through WhatsAPP
New Malware has been discovered being pushed through WhatsApp messages and once infected it will push to other contacts in order to expand what appears to be an adware campaign.
ESET researcher Lukas Stefanko said “This malware spreads via victim’s WhatsApp by automatically replying to any received WhatsApp message notification with a link to [a] malicious Huawei Mobile app” .
The malware will introduce itself as a Huawei Mobile app, upon clicking the link it will redirect users to a lookalike Google Play Store and luring you to install the malware app. You will be prompted to grant it notification access, which is then abused to carry out the malware attack.
Please be vigilant and always consider that the messages people send you with links may lead you to malware, especially if it something random and out of character from one of your contacts.
… Read the restPhishing Facts Every Business Should Know.
Have you asked yourself, are you doing enough to protect your business from phishing attacks? if your second guessing yourself you are most likely have been or going to be a victim of a phishing attack. Read these shocking phishing facts you may or may not know–and how these facts may apply to your own vulnerability against a phishing attack.
Interesting Phishing Facts |
Phishing Fact Source |
33% of breaches included social attacks | Verizon Data Breach Investigations Report (DBIR) 2019 |
65% of attacker groups used spear phishing as the primary infection vector | Symantec Internet Security Threat Report (ISTR) 2019 |
29% of breaches involved use of stolen credentials | Verizon Data Breach Investigations Report (DBIR) 2019 |
48% of malicious email attachments are Office files | Symantec Internet Security Threat Report (ISTR) 2019 |
94% of malware was delivered via email | Verizon Data Breach Investigations Report (DBIR) 2019 |
32% of breaches involve phishing | Verizon Data Breach |
The Risks Of Sharing Passwords At Work
Did you know that 81% of Data Breaches happen due to poor password practices and one of are due to human errors like password sharing which can lead to massive data breaches.
I’m sure your open minded just like me and when you read these statics it will provide the criticality of password security in today’s date:
- Did you know that 81% of the data breaches have been reported because of poor password security.
- Fun fact, by the end of 2020, password usage across the globe will grow by 300 billion.
- Just about 25% of employees use the same password for all their login accounts.
- About 61% of companies have accounts with non-expiring user passwords.
- Around 54% of the small and medium-sized businesses don’t check up on their employee password practices.
Do Not Share Your Work Password.
How would you feel giving your personal password to someone? You wouldn’t do … Read the rest