Browsing category

Cyber Attack

AZORult Malware, Computer Security, Cyber Attack, Malware, RDP, RDP Protocol, Uncategorized,

AZORult Malware Abusing RDP Protocol To Steal the Data by Establish a Remote Desktop Connection

Sophisticated AZORult Malware emerging with a new form with advanced information stealing modules that capable of stealing sensitive information from infected computers. AZORult is one of the well-known malware that often sold in Russian forums for the higher price ($100) since this malware contains a broad range of persistent functionality. It using .bit domains in […]

The post AZORult Malware Abusing RDP Protocol To Steal the Data by Establish a Remote Desktop Connection appeared first on GBHackers On Security.

banking malware, Computer Security, Cyber Attack, Cyber Crime, Cyber Security News,

Organized Cybercrime – Hacker Groups Work Together To Distribute Banking Malware Globally

banking malware

The banking malware considered a top threat, it allows a malware developer an easy way to gain access to someone and cause serious damage. According to the reports, the cybercrime costs more than $600 billion in 2017 and for 2018 predicted $1.5 trillion in losses. Hacker groups continue to exchange their scripts, tactics, and techniques […]

The post Organized Cybercrime – Hacker Groups Work Together To Distribute Banking Malware Globally appeared first on GBHackers On Security.

Computer Security, Cyber Attack, Exploit, Malware, Ransomware, Vulnerability, Windows, WinRAR,

Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay

JNEC.a Ransomware

A brand new JNEC.a ransomware spreading via recently discovered WinRAR vulnerability exploit to compromise windows computer & demand the ransom amount. This exploits leverage the recently discovered WinRAR ACE code injection vulnerability, since then attackers continuously exploiting to intrude the targeted system in various ways. WinRAR is the worlds most popular Compression tool that used […]

The post Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay appeared first on GBHackers On Security.

Computer Security, Cyber Attack, Cyber Security News, G suite, IMAP, Malware, Office 365, Phishing,

Hackers Bypass Multi-factor Authentication to Hack Office 365 & G Suite Cloud Accounts Using IMAP Protocol

IMAP

attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based on Proofpoint study, IMAP is the most abused protocol, IMAP is the protocol that bypasses MFA and lock-out options for failed logins. These intelligent new brute force attacks bring a new approach to the traditional […]

The post Hackers Bypass Multi-factor Authentication to Hack Office 365 & G Suite Cloud Accounts Using IMAP Protocol appeared first on GBHackers On Security.

Computer Security, Cyber Attack, hacker group, hackers, hacking, Hacks, Vulnerabilities, Vulnerability, Web Applications, Website Security,

Anonymous Hacker Group Destroyed 1 Million Web Pages that Owned by Coca-Cola, ToysRUs, McDonald’s

Web Pages

Anonymous Threat actor group compromised hundreds of websites and destroyed nearly 1 million Israeli based webpages that belong to some of the leading brands including Coca-Cola, ToysRUs, McDonald’s. This breach also affected some of the leading websites in Isreal including Ynet and Calcalist where hackers displayed political messages. Hackers mostly compromised the well-known brand websites […]

The post Anonymous Hacker Group Destroyed 1 Million Web Pages that Owned by Coca-Cola, ToysRUs, McDonald’s appeared first on GBHackers On Security.

Computer Security, Cyber Attack, Cyber Crime, Cyber Security News, DDOS, DDOS attacks, DDoS detection tool, Hacker, Internet,

DDoS-as-a Sevice Operator who Have Launched 1.3 Million DDoS Attacks Pleads Guilty in Court

DDoS service

An Operator of DDoS-as-a Service (Illegal Booter Services) pleads guilty in North Carolina count for his massive operations of DDoS attack against 1.3 million targets. Sergiy P. Usatyuk, illegal DDoS service operator from Orland Park arrested by FBI for supporting this illegal services with his co-conspirator to develop, control and operate a number of booter […]

The post DDoS-as-a Sevice Operator who Have Launched 1.3 Million DDoS Attacks Pleads Guilty in Court appeared first on GBHackers On Security.

Cyber Attack, Cyber Security News, Internet, Malware, skimmer scripts, Web Applications,

Hackers Use Fake Google Analytics Scripts To Steal Credit Card Details from Magneto-based Websites

skimmer scripts

Hackers inject malicious skimmer scripts that steal the credit card information from the checkout pages of Magento based online shopping sites. Security researchers from Sucuri noticed credit card-stealing scripts uses a fake Google Analytics and Angular scripts to make them appear less suspicious and to evade detection form website administrators. “The malicious code is obfuscated […]

The post Hackers Use Fake Google Analytics Scripts To Steal Credit Card Details from Magneto-based Websites appeared first on GBHackers On Security.

Bangladesh Embassy, Computer Security, Cyber Attack, Cyber Crime, Cyber Security News, Exploit, Government websites, hackers, Malware, Security Hacker, Security News, Website hacked,

Hackers Compromised Bangladesh Embassy Website that Drops Weaponized Word Document with Malware

Bangladesh Embassy

Threat actors compromised the Bangladesh embassy in Cairo website and taking control to drops the weaponized word documents that contains privilege escalation flaw exploit (CVE-2017-7255). Attackers are usually distributing various malware via malspam and phishing emails which includes some of the convince action take place in order to infect the victims. But this is totally […]

The post Hackers Compromised Bangladesh Embassy Website that Drops Weaponized Word Document with Malware appeared first on GBHackers On Security.

Computer Security, Cyber Attack, Cyber Attacks, Cyber Defense, Cyber Security News, CyberSOC, Information Security Risks, Infosec- Resources, Malware, Security operation, Security Tools, SOC, SOC Operation, threats,

SOC Second Defense Phase – Understanding the Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the Attack Chain. Let’s move on to the phases of SOC and advacned level of protecting the organization. Early years, when we say virus, it’s just an ‘exe’ file with some pop-ups. […]

The post SOC Second Defense Phase – Understanding the Threat Profiles appeared first on GBHackers On Security.

coinminer, Computer Security, Crypto Attack, Cryptocurrency hack, Cyber Attack, Exploit, hackers, hacking, Hacking Tools, Malware, SMB, Vulnerability,

New Hacking Tools launching Crypto-Malware by Exploit a Windows SMB Server Vulnerability

Cybercriminals now leveraging new hacking tools and remote access software to drop cryptocurrency malware by exploiting a Windows SMB Server Vulnerability . There are 2 main hacking tools that are used by attackers to drop random file info to the targeted systems windows registry. First one is MIMIKATZ , a powerful post-exploitation hacking tool which is used with […]

The post New Hacking Tools launching Crypto-Malware by Exploit a Windows SMB Server Vulnerability appeared first on GBHackers On Security.