In a significant move against cybercrime, the U.S. government has announced a bounty of up to $15 million for information that could lead to the identification, arrest, or conviction of individuals associated with the notorious LockBit ransomware group. This announcement…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Beware of New AsukaStealer Steal Browser Passwords & Desktop Screens
An updated version of the ObserverStealer known as AsukaStealer was observed to be advertised as malware-as-a-service that was capable of collecting data from desktop screenshots, Steam Desktop Authenticator application, FileZilla sessions, Telegram sessions, Discord tokens, browser extensions, and cryptocurrency wallets. This…
Earth Preta Hackers Abuses Google Drive to Deploy DOPLUGS Malware
Threat actors abuse Google Drive for several malicious activities due to its widespread use, easy file sharing, and collaboration features. These things provide a convenient platform to host and distribute malware. Integration with legitimate services makes detecting and blocking malicious…
Swiggy Account Hacked, Hackers Placed Orders Worth Rs 97,000
In a startling incident underscoring the growing menace of cybercrime, a woman’s Swiggy account was hacked, leading to fraudulent orders worth Rs 97,000. The Delhi Police swiftly acted on the complaint, arresting two individuals, Aniket Kalra (25) and Himanshu Kumar…
Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts
A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged. This information stealer has been active since at least August 2022 and is designed to hijack corporate Facebook accounts by automatically filtering out Facebook session cookies…
Google Chrome 122 Update Addresses Critical Security Vulnerabilities
Google has recently unveiled Chrome 122, a significant milestone for the widely used web browser. The most recent release, compatible with Windows, Mac, and Linux operating systems, includes a set of crucial security patches and novel functionalities that enrich the…
New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack
Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2 infrastructure, storing stolen data, and delivering second and third-stage downloaders or rootkit programs. Two open-source PyPI packages were discovered to…
New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency
The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host. The campaign employed many Redis system-weakening commands to potentially disable data store security features that could hinder their initial attempts at access. Additionally, the…
Security Onion 2.4.50 Released for Defenders With New Features
Security Onion Solutions has recently rolled out the latest version of its network security monitoring tool, Security Onion 2.4.50. This updated version comes equipped with an array of new features and bug fixes, making it an even more critical tool…
VMware Urges to Remove Enhanced EAP Plugin to Stop Auth & Session Hijack Attacks
VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin vulnerable to severe security threats. The Enhanced Authentication Plugin (EAP), which provided seamless login capabilities to vSphere’s management interfaces, is susceptible to authentication relay and session…