article thumbnail

FBI and CISA published a new advisory on AvosLocker ransomware

Security Affairs

AvosLocker affiliates use legitimate software and open-source remote system administration tools to compromise the victims’ networks. bat) scripts [T1059.003] for lateral movement, privilege escalation, and disabling antivirus software. This joint CSA updates the advisory published by the US Government on March 17, 2022.

article thumbnail

WeSteal, a shameless commodity cryptocurrency stealer available for sale

Security Affairs

The researchers believe that the coder is an Italian vixer that previously created the “Zodiac Crypto Stealer” and “Spartan Crypter” for obfuscating malware to avoid antivirus detection. Organizations with effective spam filtering, proper system administration and up-to-date Windows hosts have a much lower risk of infection.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Hopper operation hit 8 of the world’s biggest IT service providers

Security Affairs

“The hacking campaign, known as “ Cloud Hopper ,” was the subject of a U.S. ” The report attributed the cyberespionage campaign to the China-linked APT10 (aka Menupass, and Stone Panda), the same group recently accused of hacking telco operators worldwide. SecurityAffairs – Cloud Hopper, hacking).

article thumbnail

US govt agencies share details of the China-linked espionage malware Taidoor

Security Affairs

The CISA agency provides recommendations for system administrators and owners to enhance the level of security of their organizations: Maintain up-to-date antivirus signatures and engines. Keep operating system patches up-to-date. SecurityAffairs – hacking, Taidoor). Disable File and Printer sharing services.

Malware 107
article thumbnail

Microsoft warns of Human-Operated Ransomware as a growing threat to businesses

Security Affairs

“They exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.” In many cases, some machines run without standard safeguards, like security updates and cloud-delivered antivirus protection.”

article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

The government says Snatch used a customized ransomware variant notable for rebooting Microsoft Windows devices into Safe Mode — enabling the ransomware to circumvent detection by antivirus or endpoint protection — and then encrypting files when few services are running. Details after contacting on jabber: truniger@xmpp[.]jp.”

article thumbnail

Experts spotted Syslogk, a Linux rootkit under development

Security Affairs

Researchers from antivirus firm Avast spotted a new Linux rootkit, dubbed ‘Syslogk,’ that uses specially crafted “magic packets” to activate a dormant backdoor on the device. SecurityAffairs – hacking, Syslogk). Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g.

Malware 80