article thumbnail

Information Security News headlines trending on Google

CyberSecurity Insiders

According to the advisory, all healthcare providers operating in the Indian subcontinent and in the whole of South Asia should be cautious about the said file-encrypting group that mainly targets the healthcare sector. The post Information Security News headlines trending on Google appeared first on Cybersecurity Insiders.

article thumbnail

ViperSoftX uses more sophisticated encryption and anti-analysis techniques

Security Affairs

xyz pic.twitter.com/VLhISark8Y — Goldwave (@OGoldwave) March 13, 2023 The variant employed in the campaign supports a more sophisticated encryption method of byte remapping and a monthly rotation of the C2 server. #ViperSoftX is back, doesn't look like much has changed. c2 arrowlchat[.]com ” continues the report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Royal Ransomware adds support for encrypting Linux, VMware ESXi systems

Security Affairs

Royal Ransomware operators added support for encrypting Linux devices and target VMware ESXi virtual machines. The Royal Ransomware gang is the latest extortion group in order of time to add support for encrypting Linux devices and target VMware ESXi virtual machines. The malware changes the extension of the encrypted files to ‘.royal’.

article thumbnail

DePriMon downloader uses a never seen installation technique

Security Affairs

ESET researchers discovered a new downloader, dubbed DePriMon, that used new “Port Monitor” methods in attacks in the wild. . The new DePriMon downloader was used by the Lambert APT group, aka Longhorn, to deploy malware. The second stage installs itself and loads the third stage using an encrypted, hardcoded path.

Malware 102
article thumbnail

Linux variant of Cerber ransomware targets Atlassian servers

Security Affairs

The attackers use the web shell to download and run the primary Cerber payload. As such, the data the ransomware is able to encrypt is limited to files owned by the confluence user. It will of course succeed in encrypting the datastore for the Confluence application, which can store important information.”

article thumbnail

TeamTNT is back and targets servers to run Bitcoin encryption solvers

Security Affairs

“What we discovered is that TeamTNT has been scanning for a misconfigured Docker Daemon and deploying alpine, a vanilla container image, with a command line to download a shell script (k.sh) to a C2 server (domain: whatwill[.]be “Breaking the cryptographic encryption is considered “Mission: Impossible”. be on IP 93[.]95[.]229[.]203).”

article thumbnail

ENC Security, the encryption provider for Sony and Lexar, leaked sensitive data for over a year

Security Affairs

When you buy a Sony, Lexar, or Sandisk USB key or any other storage device, it comes with an encryption solution to keep your data safe. The software is developed by a third-party vendor – ENC Security. Threat actors might switch the download file with an infected one. SecurityAffairs – hacking, ENC Security).