article thumbnail

Microsoft Patch Tuesday, November 2024 Edition

Krebs on Security

The second bug fixed this month that is already seeing in-the-wild exploitation is CVE-2024-43451 , a spoofing flaw that could reveal Net-NTLMv2 hashes , which are used for authentication in Windows environments. Narang notes that CVE-2024-43451 is the third NTLM zero-day so far this year. This bug has earned a CVSS severity rating of 9.8 (10

article thumbnail

PIN-Stealing Android Malware

Schneier on Security

The malware captures any PINs and passwords the victim enters to unlock their device and can later use them to unlock the device at will to perform malicious activities hidden from view.

Malware 328
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA warns of RESURGE malware exploiting Ivanti flaw

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) warns of RESURGE malware, targeting a vulnerability in Ivanti Connect Secure (ICS) appliances. Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (MAR) on a new malware called RESURGE. reads the advisory. continues the advisory.

Malware 123
article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware.

DNS 139
article thumbnail

SK Telecom revealed that malware breach began in 2022

Security Affairs

In April, SK Telecom reported that threat actors gained access to USIM-related information for customers following a malware attack. SK Telecom announced it had enhanced defensive measures and blocked illegal SIM card changes and abnormal authentication attempts. million users affected by a malware breach that exposed sensitive data.

Malware 108
article thumbnail

Zanubis in motion: Tracing the active evolution of the Android banking malware

SecureList

Once these permissions are granted, the malware gains extensive capabilities that allow its operators to steal the user’s banking data and credentials, as well as perform remote actions and control the device without the user’s knowledge. Join us in this blogpost as we take a closer look at the malware’s evolution over time.

Banking 111
article thumbnail

Warning over free online file converters that actually install malware

Malwarebytes

Instead of converting files, the tools actually load malware onto victims computers. The FBI warned specifically about that malware leading to ransomware attacks, but we’ve also seen similar sites that install browser hijackers, adware, and potentially unwanted programs (PUPs). This is the actual malware. Email addresses.

Malware 135