Remove Architecture Remove Cybercrime Remove Information Security
article thumbnail

Banshee macOS stealer supports new evasion mechanisms

Security Affairs

In August 2024, Russian crooks advertised a macOS malware called BANSHEE Stealer that can target both x86_64 and ARM64 architectures. The malicious code was advertised on cybercrime forums for $3,000 per month. The malware can collect cookies, logins and browsing history, but from Safari only cookies can be collected.

Malware 120
article thumbnail

Russian Cybercrime group is exploiting Zerologon flaw, Microsoft warns

Security Affairs

Microsoft has uncovered Zerologon attacks that were allegedly conducted by the infamous TA505 Russia-linked cybercrime group. Microsoft spotted a series of Zerologon attacks allegedly launched by the Russian cybercrime group tracked as TA505 , CHIMBORAZO and Evil Corp. Pierluigi Paganini. SecurityAffairs – hacking, Zerologon).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Mirai botnet targets TBK DVRs by exploiting CVE-2024-3721

Security Affairs

“Typically, bot infections involve shell scripts that initially survey the target machine to determine its architecture and select the corresponding binary. . “The request contains a malicious command that is a single-line shell script which downloads and executes an ARM32 binary on the compromised machine.”

IoT 137
article thumbnail

Raccoon Malware, a success case in the cybercrime ecosystem

Security Affairs

According to a report published by security firm CyberArk, Raccoon is mostly delivered through Exploit Kits and Phishing Campaigns. The malware is also able to collect system details (OS version and architecture, language, hardware info, enumerate installed apps). “Like most of the credential stealers, the client (i.e.

article thumbnail

The FBI warns of HiatusRAT scanning campaigns against Chinese-branded web cameras and DVRs

Security Affairs

In this latest campaign, our investigation also uncovered prebuilt Hiatus binaries that target new architectures such as Arm, Intel 80386, and x86-64 and previously targeted architectures such as MIPS, MIPS64, and i386. reads the report published by Black Lotus Labs.

article thumbnail

Mirai botnets exploit Wazuh RCE, Akamai warned

Security Affairs

These samples, named “morte,” support multiple architectures and link to C2 domains like nuklearcnc.duckdns[.]org Like the first variant, it targets multiple IoT architectures. org and galaxias[.]cc. Other samples (e.g., neon,” “k03ldc”) showed ties to V3G4 and LZRD variants with unique console strings.

article thumbnail

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat

Security Boulevard

Meanwhile, an informal Tenable poll looks at cloud security challenges. And get the latest on ransomware trends and on cybercrime legislation and prevention! government is urging software makers to adopt secure application-development practices that help prevent buffer overflow attacks.

Banking 64