In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on its unyielding repetition of tactics and the intricate dance between its seemingly unsophisticated campaigns and the concealed sophistication within. Known…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Grandoreiro Banking Malware Infrastructure Seized by Authorities
The Grandoreiro, a criminal organization that uses banking malware to commit electronic banking fraud against Spain, Mexico, Brazil, and Argentina, has been seized by authorities. It’s been operating since 2017. Through fraudulent actions, the criminal group is believed to have…
Hackers Started using Python for Developing New Ransomware
Ransomware has been one of the top threats to organizations, contributing several millions of dollars to multiple organizations worldwide. Most of these ransomware operators infiltrate the systems, steal sensitive data, and lock the systems with ransomware. There have been a…
Mercedes-Benz Source Code Leaked via mishandled GitHub token
Mercedes-Benz has been reported to have leaked its source code due to a GitHub token leak from an organization employee. This particular leak was identified during an internet scan from a research team, revealing a GitHub repository holding this information.…
What is Email Hijacking? – Email Account Takeover Protection Guide – 2024
Email hijacking occurs when cybercriminals gain unauthorized access to an individual’s or organization’s email account, it continues to pose a significant threat in the digital world. This security incident has the potential to result in unauthorized access and misuse of…
Hackers Hijacking MS-SQL Servers to Install Mimic Ransomware
The Trigona ransomware threat actor has been observed engaging in new activities, such as installing Mimic malware that targets MS-SQL servers. MS-SQL servers’ Bulk Copy Program (BCP) feature is abused during the malware installation process. The BCP utility bcp.exe is…
U.S. Officials Detained a 19-year-old SIM-Swap Hacker
In the murky depths of the digital underworld, a tale unfolds: the rise and fall of “King Bob,” a moniker masking 19-year-old Noah Michael Urban, a Florida man entangled in a web of cybercrime. An investigation revealed the accused’s role…
45K+ Exposed Jenkins Instances Vulnerable to RCE Attacks
It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file reads that can be utilized by threat actors to read sensitive files on the server. The CVE was mentioned as…
“45K+ Exposed Jenkins Instances Vulnerable to RCE Attacks”
It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file reads that can be utilized by threat actors to read sensitive files on the server. The CVE was mentioned as…
APT Hackers Use FalseFont Backdoor to Remotely Hack Computers
Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data. In this campaign, the malware offers the user a realistic user interface and behavior while posing as a legitimate application from US Defense…