ASEC

Analysis Report on Malicious Apps Using Advanced Detection and Evasion Techniques

A sophisticated Android malware has been identified utilizing advanced evasion and detection resistance strategies. The malware employs strong packing and obfuscation to hinder traditional antivirus (AV) systems.

Case of ActiveMQ Vulnerability Exploitation to Install Sharpire (Kinsing)

A critical remote code execution vulnerability in Apache ActiveMQ is being actively exploited by the Kinsing (H2Miner) threat actor to deploy multiple malware strains, including the Sharpire backdoor, XMRig miner, and post-exploitation tools.

Phishing Emails Distribute GuLoader by Impersonating an International Shipping Company

The emails demand users open attachments that combine VBScript with PowerShell scripts, downloading files from external sources like planachiever.au and tripplebanks.duckdns.org.

Rhadamanthys Stealer Being Distributed Through MSC Files

The malicious MSC file is often disguised as a harmless document, such as a Word file. When the victim opens the file, it downloads and executes a PowerShell script from an external server. This script then decodes and runs the Rhadamanthys Stealer.

OPA Gatekeeper Bypass Reveals Risks in Kubernetes Policy Engines

OPA Gatekeeper is an essential tool that provides out-of-the-box security policies for Kubernetes, but Aqua Security’s research highlights critical flaws that may allow attackers to evade restrictions.

300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks

Researchers found that exposed Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and API keys.
October 28, 2024

Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining

The TeamTNT cryptojacking group is preparing for a new large-scale campaign targeting cloud-native environments to mine cryptocurrencies and rent out breached servers to third parties.

New Linux Malware "Hadooken' Targets Oracle WebLogic Applications

A new Linux malware named Hadooken is targeting Oracle WebLogic servers, dropping Tsunami malware and deploying a cryptominer. WebLogic servers are vulnerable to cyberattacks due to flaws like deserialization and weak access controls.

PG_MEM Malware Targets PostgreSQL Databases for Crypto Mining

Cryptojacking attackers are targeting poorly secured PostgreSQL databases on Linux systems. According to Aqua Security researchers, the attack begins with brute-force attempts to gain access to the database credentials.

New Discord DDoS Campaign Called Panamorfi Targets Vulnerable Jupyter Notebooks

Hackers are targeting misconfigured Jupyter Notebooks using a repurposed Minecraft DDoS tool known as mineping. The attack, dubbed Panamorfi, involves utilizing a Java tool to launch a TCP flood DDoS attack against vulnerable Jupyter Notebooks.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags