Remove Cryptocurrency Remove DDOS Remove VPN
article thumbnail

Crooks target Ukraine’s IT Army with a tainted DDoS tool

Security Affairs

Cisco Talos researchers have uncovered a malware campaign targeting Ukraine’s IT Army , threat actors are using infostealer malware mimicking a DDoS tool called the “Liberator.” Liberator is advertised as a DDoS tool to launch attacks against “Russian propaganda websites.” 35) on port 6666. Pierluigi Paganini.

DDOS 102
article thumbnail

Ukraine Nabs Suspect in 773M Password ?Megabreach?

Krebs on Security

The SBU said they found on Sanix’s computer records showing he sold databases with “logins and passwords to e-mail boxes, PIN codes for bank cards, e-wallets of cryptocurrencies, PayPal accounts, and information about computers hacked for further use in botnets and for organizing distributed denial-of-service (DDoS) attacks.”

Passwords 363
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 294

Security Affairs

A massive fraud operation used mobile device emulators to steal millions from online bank accounts SolarWinds hackers also breached the US NNSA nuclear agency Clop ransomware gang paralyzed flavor and fragrance producer Symrise Dell Wyse ThinOS flaws allow hacking think clients SUPERNOVA, a backdoor found while investigating SolarWinds hack Zero-day (..)

Hacking 105
article thumbnail

Security Affairs newsletter Round 350

Security Affairs

from the Lympo NTF platform.

VPN 111
article thumbnail

Consumer cyberthreats: predictions for 2024

SecureList

There are two main reasons for that: political pressure and DDoS attacks. In the other case, organizations use geofencing to protect their resources from DDoS attacks. Cognizant of these measures, individuals may perceive a potential impact on their data privacy and thus turn to robust privacy solutions like VPN.

VPN 132
article thumbnail

Security Affairs newsletter Round 313

Security Affairs

Cloud hosting provider Swiss Cloud suffered a ransomware attack Hacking a Tesla Model X with a DJI Mavic 2 drone equipped with a WIFI dongle WeSteal, a shameless commodity cryptocurrency stealer available for sale Experian API exposed credit scores of tens of millions of Americans Expert released PoC exploit for Microsoft Exchange flaw Most Common (..)

article thumbnail

Discover 2022’s Nastiest Malware

Webroot

Since the mainstreaming of ransomware payloads and the adoption of cryptocurrencies that facilitate untraceable payments, malicious actors have been innovating new methods and tactics to evade the latest defenses. In other words, 2022 has been an eventful year in the threat landscape, with malware continuing to take center stage.

Malware 89