Varshini, Author at GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/author/varshini/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Sat, 19 Oct 2024 02:18:31 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Varshini, Author at GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/author/varshini/ 32 32 Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication https://gbhackers.com/prokyc-bypasses-2fa/ https://gbhackers.com/prokyc-bypasses-2fa/#respond Fri, 11 Oct 2024 13:34:03 +0000 https://gbhackers.com/?p=113385 Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed specifically for NAF (New Account Fraud) attacks and can create verified but synthetic accounts by mimicking facial recognition authentication. By overcoming these security measures, threat actors can engage in money laundering, create mule accounts, and […]

The post Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/prokyc-bypasses-2fa/feed/ 0
Serhiy Tokarev Reveals Roosh’s Investment in the French Freelance Platform https://gbhackers.com/roosh-ventures-invests-french/ https://gbhackers.com/roosh-ventures-invests-french/#respond Thu, 10 Oct 2024 12:33:12 +0000 https://gbhackers.com/?p=113676 Ukrainian Roosh Ventures has invested in the French freelance platform Jump. This was announced by tech entrepreneur and co-founder of the Roosh investment fund, Serhiy Tokarev, on his LinkedIn page: “Thrilled to announce that Roosh Ventures is backing Jump, a platform that’s changing the game for freelancers.”  Jump is a universal platform aiming to make freelancing simpler […]

The post Serhiy Tokarev Reveals Roosh’s Investment in the French Freelance Platform appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Serhiy Tokarev Reveals Roosh’s Investment in the French Freelance Platform appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/roosh-ventures-invests-french/feed/ 0
Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code https://gbhackers.com/foxit-pdf-vulnerability-code-execution/ https://gbhackers.com/foxit-pdf-vulnerability-code-execution/#respond Thu, 10 Oct 2024 09:20:42 +0000 https://gbhackers.com/?p=113335 Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability was found in Foxit PDF Reader, a widely used alternative to Adobe Acrobat.  Given the memory corruption vulnerability, attackers could execute arbitrary code on the machine that is the target of their attack.  Additionally, three vulnerabilities were discovered in Veertu’s Anka […]

The post Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/foxit-pdf-vulnerability-code-execution/feed/ 0
Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars https://gbhackers.com/automative-0-day-flaws-control-cars/ https://gbhackers.com/automative-0-day-flaws-control-cars/#respond Tue, 08 Oct 2024 14:33:47 +0000 https://gbhackers.com/?p=113195 Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day vulnerabilities that could allow attackers to gain full control over vehicle systems. These vulnerabilities, highlighted in a presentation by security researcher Amit Geynis of PlaxidityX, underscore the urgent need for robust cybersecurity measures in the automotive industry. Series of Vulnerabilities The […]

The post Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/automative-0-day-flaws-control-cars/feed/ 0
DCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials https://gbhackers.com/dcrat-html-smuggling-credential-theft/ https://gbhackers.com/dcrat-html-smuggling-credential-theft/#respond Mon, 30 Sep 2024 14:45:00 +0000 https://gbhackers.com/?p=112859 In a new campaign that is aimed at users who speak Russian, the modular remote access tool (RAT) known as DCRat has been utilized.  Delivered through HTML smuggling, a technique not previously seen with DCRat, the malware leverages its typical RAT capabilities to execute shell commands, log keystrokes, exfiltrate files, and steal credentials, which marks […]

The post DCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post DCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/dcrat-html-smuggling-credential-theft/feed/ 0
Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page https://gbhackers.com/html-smuggling-phishing/ https://gbhackers.com/html-smuggling-phishing/#respond Fri, 27 Sep 2024 14:48:56 +0000 https://gbhackers.com/?p=112694 Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing email mimicking an American Express notification, leading to a series of redirects.  The final redirect pointed to a Cloudflare R2 public bucket hosting an HTML file, which loaded an external JavaScript code that contained a […]

The post Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/html-smuggling-phishing/feed/ 0
LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution https://gbhackers.com/lummac2-stealer-execution/ https://gbhackers.com/lummac2-stealer-execution/#respond Fri, 27 Sep 2024 14:47:50 +0000 https://gbhackers.com/?p=112770 The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of a broader set of transformations, making it difficult for analysts to reverse engineer the binary.  It introduces obfuscated code that is mixed with the original compiler-generated code, requiring a specialized deobfuscator for analysis. The obfuscator’s […]

The post LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/lummac2-stealer-execution/feed/ 0
Hackers Using Supershell Malware To Attack Linux SSH Servers https://gbhackers.com/supershell-malware-linux-attack/ https://gbhackers.com/supershell-malware-linux-attack/#respond Thu, 19 Sep 2024 15:41:34 +0000 https://gbhackers.com/?p=112280 Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack leverages Supershell, a cross-platform reverse shell backdoor written in Go, granting attackers remote control of compromised systems.  Following the initial infection, attackers are suspected to have deployed scanners to identify additional vulnerable targets and then likely launched dictionary attacks on these […]

The post Hackers Using Supershell Malware To Attack Linux SSH Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Using Supershell Malware To Attack Linux SSH Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/supershell-malware-linux-attack/feed/ 0
Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker https://gbhackers.com/selenium-grid-hacks/ https://gbhackers.com/selenium-grid-hacks/#respond Tue, 17 Sep 2024 10:45:55 +0000 https://gbhackers.com/?p=112008 Two campaigns targeting Selenium Grid’s default lack of authentication are underway, as threat actors are exploiting this vulnerability to deploy malicious payloads, including exploit kits, cryptominers, and proxyjackers. Selenium Grid’s widespread use among developers, coupled with its default lack of security, makes it an attractive target for attackers seeking to compromise systems and gain unauthorized […]

The post Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/selenium-grid-hacks/feed/ 0
CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World https://gbhackers.com/cosmicbeetle-smb-vulnerability-attacks/ https://gbhackers.com/cosmicbeetle-smb-vulnerability-attacks/#respond Thu, 12 Sep 2024 12:38:16 +0000 https://gbhackers.com/?p=110986 CosmicBeetle, a threat actor specializing in ransomware, has recently replaced its old ransomware, Scarab, with ScRansom, a custom-built ransomware that continues to evolve.  The threat actor has been actively targeting SMBs worldwide, exploiting vulnerabilities to gain access to their systems and experimenting with the leaked LockBit builder, attempting to leverage its reputation by impersonating the […]

The post CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cosmicbeetle-smb-vulnerability-attacks/feed/ 0