Remove 2004 Remove Information Security Remove Malware
article thumbnail

New Linux variant of BIFROSE RAT uses deceptive domain strategies

Security Affairs

The Bifrost RAT has been active since 2004, it allows its operators to gather sensitive information, including hostname and IP address. The researchers observed the malware trying to contact a Taiwan-based public DNS resolver with the IP address 168.95.1[.]1. com) that mimics the legitimate VMware domain.

DNS 141
article thumbnail

Sophos Sandboxie is now available as an open-source tool

Security Affairs

.” The sandbox was developed by Ronen Tzur and released on June 26, 2004, he sold the solution to Invincea in 2013. Releasing the tool as the open-source, Sophos aims at engaging malware researchers to improve its Sandboxie with knowledge of the community. . SecurityAffairs – Sandbox, malware). Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs

Security Affairs

The Turla APT group (aka Snake , Uroburos , Waterbug , Venomous Bear and KRYPTON ) has been active since at least 2004 targeting diplomatic and government organizations and private businesses in the Middle East, Asia, Europe, North and South America, and former Soviet bloc nations.

Malware 139
article thumbnail

Critical bug in decoder used by popular chipsets exposes 2/3 of Android devices to hack

Security Affairs

Security researchers at Check Point Research have discovered a critical remote code execution that affects the implementation of the Apple Lossless Audio Codec (ALAC) in Android devices running on Qualcomm and MediaTek chipsets. ALAC was developed in 2004 and Apple open-sourced it in 2011, since then many third-party vendors used it.

Hacking 142
article thumbnail

Domestic Kitten has been conducting surveillance targeting over 1,000 individuals

Security Affairs

The researchers documented a malware, tracked as ‘FurBall,’ that was employed since the beginning of the operation. The attack chain leverage multiple vectors Telegram channels, SMS messages containing a link to the malware, phishing messages, and watering hole attacks involving Iranian websites. ” concludes the report.

article thumbnail

The Five-Step PCI DSS 4.0 Transition Checklist

CyberSecurity Insiders

With the boom in digital commerce paired with the increased popularity of contactless payment and cloud-stored accountholder data, the Payment Card Industry (PCI) Security Standards Council decided to re-evaluate the existing standard. Test security of systems and networks regularly. The current version, PCI DSS v3.2.1,

Antivirus 138
article thumbnail

US disrupts Russia-linked Snake implant’s network

Security Affairs

The US government announced to have disrupted the peer-to-peer (P2P) network of computers compromised by the Snake malware. The malware has been designed and used by Center 16 of Russia’s Federal Security Service (FSB) in cyber espionage operations on sensitive targets. ” reads the press release published by DoJ.

Malware 98