article thumbnail

New NKAbuse malware abuses NKN decentralized P2P network protocol

Security Affairs

The malicious code can target various architectures, it supports both flooder and backdoor capabilities. The primary target of NKAbuse is Linux desktops, however, it can target MISP and ARM architecture. NKN (New Kind of Network) is a decentralized peer-to-peer network protocol that relies on blockchain technology. .

Malware 106
article thumbnail

Spotlight Podcast: Fixing Supply Chain Hacks with Strong Device Identities

The Security Ledger

Supply chain hacks like ME Docs and ASUS aren't inevitable. Supply chain hacks like ME Docs and ASUS aren’t inevitable. Software supply chain hacks are a growing problem. With devices that use a DICE architecture, a signed-but-malicious software updates would not be installed. Read the whole entry. »

Hacking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA warns of phishing attacks delivering KONNI RAT

Security Affairs

The KONNI RAT was first discovered in May 2017 by researchers from the Cisco Talos team after it was employed in attacks aimed at organizations linked to North Korea. The KONNI malware also employed in at least two campaigns in 2017. SecurityAffairs – hacking, KONNI RAT). ” reads the CISA’s alert.

Phishing 118
article thumbnail

A new Zerobot variant spreads by exploiting Apache flaws

Security Affairs

includes several new flaws, including: Vulnerability Affected software CVE-2017-17105 Zivif PR115-204-P-RS CVE-2019-10655 Grandstream CVE-2020-25223 WebAdmin of Sophos SG UTM CVE-2021-42013 Apache CVE-2022-31137 Roxy-WI CVE-2022-33891 Apache Spark ZSL-2022-5717 MiniDVBLinux. SecurityAffairs – hacking, botnet). Pierluigi Paganini.

IoT 113
article thumbnail

CFPB’s Proposed Data Rules

Schneier on Security

By separating which companies see what parts of our data, and in what contexts, we can gain control over data about ourselves (improving privacy) and harden cloud infrastructure against hacks (improving security). Equifax, Transunion and Experian make up a longstanding oligopoly for credit reporting.

Banking 249
article thumbnail

Go-based Chaos malware is rapidly growing targeting Windows, Linux and more

Security Affairs

Researchers from Black Lotus Labs at Lumen Technologies, recently uncovered a multifunctional Go-based malware that was developed to target devices based on multiple architectures, including Windows and Linux. SecurityAffairs – hacking, Chaos malware). ” Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini.

Malware 83
article thumbnail

Android devices shipped with backdoored firmware as part of the BADBOX network

Security Affairs

The most interesting characteristic of the Triada Trojan apart is its modular architecture, which gives it theoretically a wide range of abilities. Triada was designed with the specific intent to implement financial frauds, typically hijacking the financial SMS transactions. ” concludes the report.

Firmware 142