article thumbnail

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

Security Affairs

CISA has added nine flaws to its Known Exploited Vulnerabilities catalog, including bugs exploited by commercial spyware on mobile devices. The exploits were used to install commercial spyware and malicious apps on targets’ devices. The threat actors behind the attacks used both zero-day and n-day exploits in their exploits.

Spyware 81
article thumbnail

A week in security (June 27 – July 3)

Malwarebytes

Mozilla fixes security vulnerabilities and introduces a new privacy feature for Firefox Raccoon Stealer returns with a new bag of tricks RansomHouse claims to have stolen at least 450GB of AMD’s data Forced Chrome extensions get removed, keep reappearing Internet Safety Month: Everything you need to know about Omegle Hermit spyware is deployed with (..)

Spyware 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anti-Debugging Techniques from a Complex Visual Basic Packer

Security Affairs

It has been in continuous development at least since 2013 and the malware authors behind Hawkeye have improved the malware service adding new capabilities and techniques. Figure 20: Password retrieving routine from Internet Explorer. “Hawkeye Keylogger” is an info-stealing malware for sale in the dark-web.

Spyware 72
article thumbnail

Australian man charged with creating and selling the Imminent Monitor spyware

Security Affairs

An Australian national has been charged for the creation and sale of the Imminent Monitor (IM) spyware, which was also used for criminal purposes. The 24-year-old Australian national Jacob Wayne John Keen has been charged for his alleged role in the development and sale of spyware known as Imminent Monitor (IM).

Spyware 103
article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

It is not unusual to have your system or network infected with malware, such as spyware, that often lingers secretly with no apparent symptoms. Malware can be categorized based on how it behaves (adware, spyware and ransomware), and how it propagates from one victim to another (viruses, worms and trojans). Don’t worry though.

article thumbnail

The Most Common Types of Malware in 2021

CyberSecurity Insiders

It is not unusual to have your system or network infected with malware, such as spyware, that often lingers secretly with no apparent symptoms. Malware can be categorized based on how it behaves (adware, spyware and ransomware), and how it propagates from one victim to another (viruses, worms and trojans). Don’t worry though.

Malware 107
article thumbnail

The Ups and Downs of 0-days: A Year in Review of 0-days Exploited In-the-Wild in 2022

Google Security

July 2022: Reported to Android Security team Aug 2022: Android Security labels “Won’t Fix” and sends to ARM Oct 2022: Bug fixed by ARM Nov 2022: In-the-wild exploit discovered April 2023: Included in Android Security Bulletin In December 2022, TAG discovered another exploit chain targeting the latest version of the Samsung Internet browser.

Spyware 92