New Mirai Malware Attack on Enterprise Wireless Presentation systems and Supersign TVs

Mirai malware is a powerful strain that compromises a number of Linux devices and uses those devices to launch a massive distributed denial of service attacks.

The new malware variant targets embedded devices such as routers, network storage devices, NVRs, and IP cameras and using numerous exploits against them.

Source: gbhackers

Continue reading “New Mirai Malware Attack on Enterprise Wireless Presentation systems and Supersign TVs”

Advertisements

Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay

A brand new JNEC.a ransomware spreading via recently discovered WinRAR vulnerability exploit to compromise windows computer & demand the ransom amount.

This exploits leverage the recently discovered WinRAR ACE code injection vulnerability, since then attackers continuously exploiting the vulnerability to intrude the targeted system in various ways.

Source: gbhackers Continue reading “Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay”

Extensive Ransomware Attack Hits Worldwide Operation at Aluminum Manufacturing Gaint Norsk Hydro

Extensive Ransomware Attack forced to shut down operations at, Norsk Hydro, one of the world’s largest aluminum producers. The company suffered production outages across Europe and the U.S.

The cyberattack shut down operations in the number of metal extrusion and rolled products plants, which transform the aluminum into finished products for car makers and for other manufactured goods.

Source: gbhackers

Continue reading “Extensive Ransomware Attack Hits Worldwide Operation at Aluminum Manufacturing Gaint Norsk Hydro”

APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device

Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250[6]) to hide the njRAT backdoor and targeting users reside in the Middle East via decoy Word document to compromise and control the device.

The 19-year-old vulnerability was disclosed by checkpoint security researchers last week, the vulnerability resides in the WinRAR UNACEV2.DLL library

Source: gbhackers

Continue reading “APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device”

WARNING – New Phishing Attack That Even Most Vigilant Users Could Fall For

How do you check if a website asking for your credentials is fake or legit to log in?
By checking if the URL is correct?
By checking if the website address is not a homograph?
By checking if the site is using HTTPS?
Or using software or browser extensions that detect phishing domains?

Source: thehackernews

Continue reading “WARNING – New Phishing Attack That Even Most Vigilant Users Could Fall For”

Blog at WordPress.com.

Up ↑