Remove 2014 Remove Architecture Remove Encryption
article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

.” According to the experts, the attackers have good knowledge about the internal architecture of the targeted platform. To avoid detection of malicious functionalities, the authors encrypted all suspicious-looking strings with the Corrected Block TEA (XXTEA) cipher and then running Base64 encoding. Pierluigi Paganini.

Malware 145
article thumbnail

Maastricht University finally paid a 30 bitcoin ransom to crooks

Security Affairs

It is unclear if the attackers have exfiltrated data from the systems before encrypting them. The attacker focused on encrypting data files in the Windows domain. TA505 hacking group has been active since 2014 focusing on Retail and banking sectors. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unknown FinSpy Mac and Linux versions found in Egypt

Security Affairs

It extracts the binary for the relevant architecture in /tmp/udev2 and executes it. The binaries are stored encrypted and obfuscated too, with a slightly different format, the AES Initialization vector being stored within the core module binary instead of in the encrypted module files.” ” continues the analysis.

Spyware 145
article thumbnail

Experts spotted a new Mirai variant that targets new processors

Security Affairs

Palo Alto Networks researchers discovered a new variant of the Mirai malware that is targeting more processor architectures than previous ones. Mirai botnet continues to be one of the most dangerous malware in the threat landscape, experts at Palo Alto Networks discovered a new variant that targets more processor architectures than before.

article thumbnail

US CISA warns of Ransomware attacks impacting pipeline operations

Security Affairs

“The threat actor then deployed commodity ransomware to Encrypt Data for Impact [T1486] on both networks. Then the attackers deployed ransomware that encrypted files on both IT and OT networks causing the “loss of availability” of human-machine interfaces (HMIs), data historians, and polling servers.

article thumbnail

OpenSSH introduces a security feature to prevent Side-Channel Attacks

Security Affairs

OpenSSH introduces a new feature to prevent Side-Channel attacks, latest release encrypts secret keys in memory as temporary solution. The latest version of the OpenSSH addresses this problem by implementing the encryption of the private keys before storing them into the system memory. Pierluigi Paganini.

article thumbnail

Decrypting TLS connections with new Raccoon Attack

Security Affairs

“Raccoon allows attackers under certain conditions to break the encryption and read sensitive communications.” If ephemeral keys get reused in either variant, they could lead to micro-architectural side channels, which could be exploited, although leading zero bytes are preserved. ” states the research paper.