Researchers discovered several critical flaws – collectively called “BleedingTooth” – in the BlueZ kernel Bluetooth stack. There is already a YouTube video demonstrating remote code execution using these vulnerabilities. More details can be found below.
Read moreCategory: Security Center
HEH botnet is going after exposed Telnet Services on IoT devices
Researchers spotted a new IoT botnet that brute forces telnet ports on routers and then erase infected devices. HEH botnet also has some peculiar feature – or its creators have a strange sense of humour – it briefly displays the United Nations’ Universal Declaration of Human Rights… and is coded to display it in eight languages.
Read moreNewest InterPlanetary Storm variant targeting devices with Secure Shell
The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet – which now consists of roughly 13,500 infected machines worldwide. More about the IPS malware and ongoing campaign you can find below.
Read moreCerberus out, Alien malware in – there is a new and dangerous Android banking trojan in the wild
Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps imitated by this new threat including Bank of America and Microsoft Outlook. More about the Alien malware you can find below.
Read moreZerologon flaw lets hackers take over the entire network
Last month Microsoft patched Zerologon – one of the most severe bugs ever reported to the company. A flaw could allow attackers to infiltrate enterprises by gaining administrative privileges, giving them access to companies’ Active Directory domain controllers. The vulnerability received 10 CVSS points, but details were never made public. Users and IT administrators never knew how dangerous the issue really was. More information can be found below.
Read moreBaka, a new stealthy JS skimmer targets e-Commerce merchants
Web skimming attacks are an ongoing threat to e-Commerce. But Baka skimmer with seven C&C servers and while using an XOR cipher to obfuscate its code pose a major security issue for merchants and their customers alike.
Read moreKryptoCibule – triple threat / Magento flaws / Jocker is back
Welcome to the next episode of the Xopero Security Center! KryptoCibule is a new, 3 in 1threat for cryptocurrency owners! It has managed to stay under the radar for almost two years! In the first article of our IT news review, we take a closer look at this malware’s evolution. Ready for more?
ReaD moreAutodesk 3ds Max exploit / Qbot gains new tricks / SunCrypt joins ransomware cartel
Welcome to the next episode of the Xopero Security Center! Autodesk 3ds Max – a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group. The attack hit an architecture company involved in luxury real-estate projects worth billions of dollars. What more?
Read moreFritzFrog: a new generation botnet which uses a proprietary P2P protocol
Welcome to the next episode of the Xopero Security Center! Researchers at Guardicore Lab have discovered a new and very interesting botnet – named FritzFrog – that uses unusually advanced measures to infect servers and corral them into a peer-to-peer network. Keep reading.
Read moreFlaw in TeamViewer could let hackers steal your system password remotely
If you are using TeamViewer, make sure you’re running its latest version. The newest release includes a patch for the serious vulnerability which could allow attackers to steal your system password and eventually compromise it. More about CVE 2020-13699 vulnerability you can find below.
Read more