Aman Mishra, Author at GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/author/aman-mishra/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Mon, 11 Nov 2024 11:02:46 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Aman Mishra, Author at GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/author/aman-mishra/ 32 32 New Android Malware SpyAgent Taking Screenshots Of User’s Devices https://gbhackers.com/android-malware-spyagent-screenshots/ https://gbhackers.com/android-malware-spyagent-screenshots/#respond Mon, 11 Nov 2024 11:02:45 +0000 https://gbhackers.com/?p=114708 SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices.  By stealthily capturing screenshots, the malware bypasses traditional security measures that rely on text-based detection, which allows it to efficiently identify and exfiltrate sensitive information, posing a significant threat to cryptocurrency users. Cybercriminals are employing […]

The post New Android Malware SpyAgent Taking Screenshots Of User’s Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/android-malware-spyagent-screenshots/feed/ 0
HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data https://gbhackers.com/hookbot-malware-overlay-steals-data/ https://gbhackers.com/hookbot-malware-overlay-steals-data/#respond Wed, 06 Nov 2024 12:14:27 +0000 https://gbhackers.com/?p=114534 The HookBot malware family employs overlay attacks to trick users into revealing sensitive information by impersonating various brands and apps to gain trust. It also utilizes C2 servers to receive updates and evolve continuously.  A builder tool empowers threat actors to create custom HookBot apps as the malware is often distributed through Telegram, where it’s […]

The post HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hookbot-malware-overlay-steals-data/feed/ 0
ToxicPanda Banking Malware Attacking Banking Users To Steal Logins https://gbhackers.com/toxicpanda-banking-malware-attack/ https://gbhackers.com/toxicpanda-banking-malware-attack/#respond Wed, 06 Nov 2024 12:11:04 +0000 https://gbhackers.com/?p=114510 Recent research has uncovered a new strain of malware developed for Android devices, initially misidentified as TgToxic.  Despite sharing some bot command similarities, this malware, now dubbed ToxicPanda, exhibits significant code divergence from its original source. It lacks key TgToxic capabilities and possesses placeholder commands without functional implementation.  The malware leverages Remote Access capabilities to […]

The post ToxicPanda Banking Malware Attacking Banking Users To Steal Logins appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/toxicpanda-banking-malware-attack/feed/ 0
APT36 Hackers Attacking Windows Deevices With ElizaRAT https://gbhackers.com/apt36-elizarat-windows-attacks/ https://gbhackers.com/apt36-elizarat-windows-attacks/#respond Tue, 05 Nov 2024 10:33:08 +0000 https://gbhackers.com/?p=114503 APT36, a sophisticated threat actor, has been actively targeting Indian entities with advanced malware like ElizaRAT, which is designed for espionage. It leverages cloud-based services for covert communication and data exfiltration.  Recent campaigns have seen significant enhancements in ElizaRAT’s evasion techniques, making it a potent tool for persistent attacks. The integration of ApoloStealer into the […]

The post APT36 Hackers Attacking Windows Deevices With ElizaRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/apt36-elizarat-windows-attacks/feed/ 0
Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints https://gbhackers.com/hackers-av-edr-bypass-cybercrime/ https://gbhackers.com/hackers-av-edr-bypass-cybercrime/#respond Tue, 05 Nov 2024 10:30:16 +0000 https://gbhackers.com/?p=114492 Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to test an AV/EDR bypass tool were compromised, granting unauthorized access. The threat actor utilized a bypass tool, likely purchased from cybercrime forums, to compromise the system. Subsequent analysis of recovered files and digital footprints revealed the identity of one of the […]

The post Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-av-edr-bypass-cybercrime/feed/ 0
Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers https://gbhackers.com/hackers-fake-stores-million-theft/ https://gbhackers.com/hackers-fake-stores-million-theft/#respond Tue, 05 Nov 2024 10:27:49 +0000 https://gbhackers.com/?p=114483 The Phish, ‘n’ Ships fraud operation leverages, compromised websites to redirect users to fake online stores, which, optimized for search engine visibility, trick victims into providing credit card details to third-party payment processors, resulting in financial loss without receiving any products.  Phishing attacks exploit consumer demand for hard-to-find items, redirecting victims to fake online stores. […]

The post Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-fake-stores-million-theft/feed/ 0
Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit https://gbhackers.com/evasive-panda-cloudscout-attack/ https://gbhackers.com/evasive-panda-cloudscout-attack/#respond Mon, 04 Nov 2024 13:08:31 +0000 https://gbhackers.com/?p=114319 The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese government entity in early 2023, which leverages three modules, CGM, CGN, and COL, to hijack web sessions and access cloud services like Google Drive, Gmail, and Outlook.  By stealing cookies from a victim’s browser, CloudScout can bypass 2FA and IP […]

The post Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/evasive-panda-cloudscout-attack/feed/ 0
Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files https://gbhackers.com/midnight-blizzard-rdp-attack/ https://gbhackers.com/midnight-blizzard-rdp-attack/#respond Mon, 04 Nov 2024 12:40:55 +0000 https://gbhackers.com/?p=114346 Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in various sectors. The attacks involve sending signed RDP configuration files to thousands of targets, aiming to compromise systems for intelligence gathering.  The actor impersonates Microsoft employees and references other cloud providers to increase credibility, so users are advised to be […]

The post Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/midnight-blizzard-rdp-attack/feed/ 0
Sophisticated Phishing Attack Targeting Ukraine Military Sectors https://gbhackers.com/sophisticated-phishing-attack/ https://gbhackers.com/sophisticated-phishing-attack/#respond Mon, 04 Nov 2024 12:37:11 +0000 https://gbhackers.com/?p=114371 The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against critical Ukrainian infrastructure, including government agencies, key industries, and military entities. Phishing emails promoting integration with Amazon, Microsoft, and ZTA contained malicious .rdp files. Upon opening, these files connected devices to attacker-controlled servers, compromising security. The sophisticated attack leveraged a […]

The post Sophisticated Phishing Attack Targeting Ukraine Military Sectors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/sophisticated-phishing-attack/feed/ 0
Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks https://gbhackers.com/chinese-password-attacks-microsoft/ https://gbhackers.com/chinese-password-attacks-microsoft/#respond Mon, 04 Nov 2024 12:34:58 +0000 https://gbhackers.com/?p=114397 Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to launch highly evasive password spray attacks, successfully stealing credentials from multiple Microsoft customers.  The stolen credentials are then leveraged by threat actors like Storm-0940 to gain unauthorized access to systems. Storm-0940 has been an active threat actor since 2021 and […]

The post Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/chinese-password-attacks-microsoft/feed/ 0