Remove 2010 Remove Malware Remove Passwords Remove Surveillance
article thumbnail

Top Zeus Botnet Suspect “Tank” Arrested in Geneva

Krebs on Security

The JabberZeus crew’s name is derived from the malware they used, which was configured to send them a Jabber instant message each time a new victim entered a one-time password code into a phishing page mimicking their bank. “In early October, the Ukrainian surveillance team said they’d lost him,” he wrote.

Banking 277
article thumbnail

A chink in the armor of China-based hacking group Nickel

Malwarebytes

The group’s activities have been traced back to 2010 when it performed a cyberespionage campaign directed at diplomatic organizations and missions in Europe. For lateral movement the DCU saw Nickel actors using Mimikatz, WDigest, NTDSDump, and other password dumping tools during attacks. Targets, methods, and techniques.

Hacking 99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft disrupts China-based hacking group Nickel

Malwarebytes

The group’s activities have been traced back to 2010 when it performed a cyberespionage campaign directed at diplomatic organizations and missions in Europe. For lateral movement the DCU saw Nickel actors using Mimikatz, WDigest, NTDSDump, and other password dumping tools during attacks. Targets, methods, and techniques.

Hacking 77
article thumbnail

Nation-state actors target critical sectors by exploiting the CVE-2021-40539 flaw

Security Affairs

Threat actors exploited a critical vulnerability, tracked as CVE-2021-40539 , in the Zoho ManageEngine ADSelfService Plus software, which is self-service password management and single sign-on solution. KdcSponge allows capturing the domain name, username, and password.

article thumbnail

Android 14 introduces first-of-its-kind cellular connectivity security features

Google Security

Attackers exploit this in a number of ways, ranging from traffic interception and malware sideloading, to sophisticated dragnet surveillance. Moreover, since 2010, security researchers have demonstrated trivial over-the-air interception and decryption of 2G traffic.

Mobile 94
article thumbnail

VulnRecap 3/4/24 – Ivanti, Ubiquiti, AppLocker Under Attack

eSecurity Planet

All sites incorporated the archaic FCKeditor plug-in, which stopped receiving support in 2010. The fix: To eliminate malware infections, perform a factory reset, upgrade to the latest firmware, change all default usernames and passwords, and adjust firewall rules to block exposure to unwanted remote management services.

IoT 114