Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding targets with massive amounts of traffic to disable websites. Recently, the cybersecurity researchers at Sekoia identified that the Russian hacker…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla Web Shell
Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell. This malicious activity significantly threatens website security and data integrity, prompting concerns among cybersecurity experts and website administrators worldwide. Cybercriminals…
How to Create a Sandbox Environment For Malware Analysis – A Complete Guide
In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens. The importance of secure environments for analyzing malware cannot be overstated, and this is where sandboxes play a pivotal role. ANY.RUN, a cloud interactive malware sandbox, is…
ALPHV BlackCat New Leak Site Seized by Authorities
The Federal Bureau of Investigation (FBI) has successfully seized a website associated with the ALPHV BlackCat ransomware group. The seizure was part of a coordinated law enforcement action targeting the notorious ransomware operation. The operation was a collaborative effort involving…
RA World Ransomware Attack Windows Using Hacked Domain Control & Anti-AV Tactics
Threat actors use hacked domain control to host malicious content by leveraging legitimate domains to evade detection by security measures. Anti-AV tactics are employed to bypass the antivirus software and tools that enable the execution of malicious code without detection.…
CACTUS Hackers Exploiting Software Bug to Attack Corporate Networks
Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours of its disclosure. This coordinated ransomware attack highlighted organizations’ growing risks in the digital landscape. The attack involved intricate steps,…
GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks
Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within the closed GRX network, which connects multiple telecommunication network operators. The GRX network is a closed network that connects individual network operators from various telecom companies. …
US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp
Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019. The lawsuit claims that NSO took advantage of a vulnerability in WhatsApp to install the Pegasus spyware on certain user devices without their permission. This means…
New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials
Threat actors employ phishing scams to trick individuals into giving away important details like login credentials or financial data. It is a method of cheating human confidence due to social engineering, making it cheap and hence widely used as a…
Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa
The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS) attacks, posing a grave threat to digital security. This comprehensive report delves into the key findings, attack trends, the impact on businesses, and the crucial preventive…