article thumbnail

FBI and CISA published a new advisory on AvosLocker ransomware

Security Affairs

AvosLocker affiliates use legitimate software and open-source remote system administration tools to compromise the victims’ networks. bat) scripts [T1059.003] for lateral movement, privilege escalation, and disabling antivirus software. This joint CSA updates the advisory published by the US Government on March 17, 2022.

article thumbnail

WeSteal, a shameless commodity cryptocurrency stealer available for sale

Security Affairs

The researchers believe that the coder is an Italian vixer that previously created the “Zodiac Crypto Stealer” and “Spartan Crypter” for obfuscating malware to avoid antivirus detection. Organizations with effective spam filtering, proper system administration and up-to-date Windows hosts have a much lower risk of infection.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US govt agencies share details of the China-linked espionage malware Taidoor

Security Affairs

In May, the FBI and CISA also warned cyber attacks coordinated by Beijing and attempting to steal COVID-19 information from US health care, pharmaceutical, and research industry sectors. Keep operating system patches up-to-date. Disable File and Printer sharing services.

Malware 106
article thumbnail

Experts spotted Syslogk, a Linux rootkit under development

Security Affairs

Researchers from antivirus firm Avast spotted a new Linux rootkit, dubbed ‘Syslogk,’ that uses specially crafted “magic packets” to activate a dormant backdoor on the device. ” Security Affairs is one of the finalists for the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS.

Malware 78
article thumbnail

Earning Trust In Public Cloud Services

SiteLock

The audit process helps the customer ascertain that the provider has implemented and follows all the necessary security procedures, including those that specify rules for interacting with contractors and controlling the work of system administrators. David runs MacSecurity.net.

article thumbnail

Cloud Hopper operation hit 8 of the world’s biggest IT service providers

Security Affairs

.” According to the Reuters, the hackers had a total control over the HPE corporate network, they also left messages taunting system administrators. In one case, threat actors used the name nsa.mefound.com to mock US intelligence.

article thumbnail

US authorities charged Dridex gang members for stealing over $100 Million

Security Affairs

“According to the indictment, Bugat is a malware specifically crafted to defeat antivirus and other protective measures employed by victims. The malware implements sophisticated evasion techniques, it was improved with new functionalities and its name initially changed in “Cridex,” and later in “Dridex.”.

Banking 65