Researchers discovered the spread of a malicious exe file that targets specific individuals and is disguised as information related to a personal data leak. The malware functions as a backdoor, executing obfuscated commands in XML format after receiving them from the threat actor. Because this…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
MrAnon Stealer Attacking Windows Users Via Weaponized PDF Files
Phishing emails targeting Windows users were discovered, tricking users into opening a malicious PDF file called “MrAnon Stealer” that spreads malware by using fake booking details. To obtain the final malware, the PowerShell script is executed by the PDF after…
Hackers Spy iPhone Users Using Malicious Keyboard Apps
A new method of keylogging using malicious keyboard apps has been discovered to affect iPhones, evading all Apple’s security detection procedures. Additionally, threat actors could also use this method to steal passwords, authentication codes, notes, private messages, etc., There have…
Over 50% of the Insider Attacks Uses Privilege Escalation Vulnerability
In the labyrinth of cybersecurity, the specter of insider threats emerges as a formidable adversary, wielding both malicious intent and unintentional foibles. This expose delves into the intricacies of how insiders exploit vulnerabilities, introducing an air of risk through actions…
How Smart Cars Are Spying You? Most important Privacy Concerns 2024
Privacy concerns related to smart cars primarily revolve around the extensive data collection, sharing, and potential misuse of personal information. Automobiles that are outfitted with artificial intelligence that is driven by systems are known as smart cars. They comprise numerous…
Crypto Exchange Founder Pleads Guilty for Dark Web Transfer
Bitzlato Ltd., a cryptocurrency exchange, was founded and is primarily owned by an individual who facilitated transactions between buyers and sellers in dark markets. The exchange acted as a conduit for such transactions to take place, making it an important…
Researchers Uncovered an Active Directory DNS spoofing exploit
In the intricate web of our interconnected world, the Domain Name System (DNS) stands as a linchpin, directing users to their online destinations. Yet, even this vital system is not impervious to the dark art of malicious manipulation. In a…
WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack
A critical remote code execution vulnerability has been patched as part of the WordPress 6.4.2 version. This vulnerability exists in the POP chain introduced in version 6.4, which can be combined with a separate Object Injection, resulting in the execution…
Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts
Hackers target email accounts because they contain valuable personal and financial information. Successful email breaches enable threat actors to:- Cybersecurity researchers at Microsoft Threat Intelligence team recently unveiled that the Russian state-sponsored actor, Star Blizzard (aka SEABORGIUM, COLDRIVER, Callisto Group),…
Exploitation Methods Used by PlugX Malware Revealed by Splunk Research
PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid detection by antivirus programs, making it challenging for security measures to identify and mitigate its presence:- That’s why PlugX malware stands out as a challenging and…