article thumbnail

Caketap, a new Unix rootkit used to siphon ATM banking data

Security Affairs

CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by the group since 2019. The group hacked mobile telephone networks around the globe and used specialized tools to access calling records and text messages from telecommunications companies. ” concludes the report.

Banking 125
article thumbnail

China-linked APT BlackTech was spotted hiding in Cisco router firmware

Security Affairs

The group targeted organizations in multiple sectors, including defense, government, electronics, telecommunication, technology, media, telecommunication industries. The nation-state actors employed multiple custom malware families targeting Windows, Linux, and FreeBSD operating systems.

Firmware 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

Canadian police last week raided the residence of a Toronto software developer behind “ Orcus RAT ,” a product that’s been marketed on underground forums and used in countless malware attacks since its creation in 2015. An advertisement for Orcus RAT. In an “official press release” posted to pastebin.com on Mar.

article thumbnail

Advanced threat predictions for 2023

SecureList

From a different angle, reporting from The Intercept revealed mobile surveillance capabilities available to Iran for the purposes of domestic investigations that leverage direct access to (and cooperation of) local telecommunication companies. SIGINT-delivered malware. The next WannaCry.

Firmware 111
article thumbnail

A guide to OWASP’s secure coding

CyberSecurity Insiders

That includes cached data, temporary files, and data accessible only by specific system users. Communication security is the practice of keeping illegal interceptors from obtaining understandable telecommunications while still sending information to the receivers. Scan user-uploaded files for viruses and malware.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Always keep your eyes open to control-rights of the senior IT managers or systems administrators with the authority to configure servers, firewalls, cloud storage, and file-sharing (or another network privilege). You will create cyber awareness among your staff, as well as users, partners, customers.