Skip to main content

Posts

Showing posts with the label Malware

Coronavirus Updates

Millions of Dell Laptops, Desktop Users Could Fall Prey to Hackers: Apply Patch Now

HIGHLIGHTS A Dell BIOS Utility cyber flaw had five vulnerabilities that existed since 2009 Sentinel Labs disclosed to flaw to Dell in December 2020, and a patch has now been released Dell has urged everyone to apply the patch, including out of service devices In yet another significant cyber vulnerability detected by a security research firm, millions of Dell laptops and desktops have been found to have sported a flaw that could have allowed cyber attackers elevated access to system internals. This could have allowed hackers to carry out a wide range of cyber attacks, including privilege escalation leading to denial of service. In simpler terms, a bug found in a preinstalled software in Dell laptops and desktops could have allowed hackers to get admin level access to users’ PCs, thereby installing malware deep inside systems that could freeze a user out of his own machine. The flaw, actually, is a collective of five different vulnerabilities that were present in the Dell BIOS Utility

New Pingback Malware Using ICMP Tunneling to Evade C&C Detection

Researchers on Tuesday disclosed a novel malware that uses a variety of tricks to stay under the radar and evade detection, while stealthily capable of executing arbitrary commands on infected systems. Called 'Pingback,' the Windows malware leverages Internet Control Message Protocol ( ICMP ) tunneling for covert bot communications, allowing the adversary to utilize ICMP packets to piggyback attack code, according to an  analysis  published today by Trustwave. Pingback (" oci.dll ") achieves this by getting loaded through a legitimate service called  MSDTC  (Microsoft Distributed Transaction Coordinator) — a component responsible for handling database operations that are distributed over multiple machines — by taking advantage of a method called  DLL search order hijacking , which involves using a genuine application to preload a malicious DLL file. Naming the malware as one of the plugins required for supporting  Oracle ODBC  interface in MSDTC is key to the at

FluBot malware asks Android users to track package delivery using link, then steals bank details

  Even after heavy protection, there are some dangerous apps that manage to infect the user’s device by hacking it. New  malware  is doing around on Android devices via text messages. The malware is known as “ FLUBOT “, it can steal the user’s personal information like passwords. Flubot Malware is Spreading on Android Devices via SMS in the UK, Spain, Germany, & Poland The Flubot malware is  spreading on Android devices SMS . A few country users have been targeted from  UK, Spain, Germany, and Poland . The malware is showing itself as a delivery tracking app, the user gets a message that contains a delivery tracking link. The users are advised not to click on the given link and should report it by forwarding it to 7726. And it is better to remove the text from the phone. If anyone clicks on the given link, the  malware lets the hacker steal the banking information and password of your device . Once you go to the link, you will be taken to a fake website which is shown as a DH

Cybercops Scrub Botnet Software from Millions of Computers | Malware

  Cybercops Scrub Botnet Software From Millions of Computers The notorious Emotet botnet software began uninstalling itself from some one million computers Sunday. According to  SecurityWeek , the uninstall command was part of an update sent to the infected computers by law enforcement servers in the Netherlands after Emotet's infrastructure was compromised in January during a multinational operation mounted by eight nations. The poisoned upgrade cleans the Windows registry key that enables the botnet's modules to run automatically, as well as stop and delete associated services. "The threat posed by Emotet was already neutralized by the takeover of its entire network infrastructure by law enforcement last January," explained Jean-Ian Boutin, head of threat research at  Eset , an information technology security company based in Bratislava in the Slovak Republic. "Our continuous monitoring of Emotet shows that the operation has been a complete success,&quo