Buer Dropper Malware Updated Using Rust

Buer Dropper Malware Updated Using Rust

Fraud Management & Cybercrime , Fraud Risk Management , Governance & Risk Management Proofpoint: New Code Makes ‘RustyBuer’ Version Harder to Detect Doug Olenick (DougOlenick) • May 3, 2021     A malicious attachment containing RustyBuer malware (Source: Proofpoint) Attackers are using a freshly updated variant of the Buer first-stage malware loader rewritten in the…

State-Sponsored Successor to “Project Signal” Ransomware Campaign Discovered

State-Sponsored Successor to “Project Signal” Ransomware Campaign Discovered

Iranian state-sponsored attackers have been linked to a variety of cyberespionage activities aimed at organizations all over the world. Flashpoint security experts recently discovered another ransomware strain from Iran, that has been operating since July 2020. According to Flashpoint, Iran’s Islamic Revolutionary Guard Corps (IRGC) was running a ransomware campaign through Emen Net Pasargard, an Iranian…

Qualys Flags Gaping Security Holes in Exim Mail Server

Qualys Flags Gaping Security Holes in Exim Mail Server

Security researchers document 21 major security vulnerabilities in Exim and warn that users are exposed to remote code execution flaws  Security researchers at Qualys have discovered multiple gaping security holes in Exim, a widely deployed mail server that has been targeted in the past by advanced nation state-based threat actors. An advisory from Qualys documents…

Researchers Discover New Side-Channel Attacks Impacting All Modern AMD and Intel Chips

Researchers Discover New Side-Channel Attacks Impacting All Modern AMD and Intel Chips

All defenses against Spectre side-channel attacks can now be considered broken, leaving billions of computers and other devices just as vulnerable today as they were when the hardware flaw was three years ago. A paper published on Friday by a team of computer scientists from the University of….

Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys

Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys

Most mobile app users tend to blindly trust that the apps they download from app stores are safe and secure. But that isn’t always the case. To demonstrate the pitfalls and identify vulnerabilities on a large scale, cybersecurity and machine intelligence company CloudSEK recently provided a platform called BeVigil where individuals can search and check…

Security Researcher Released PoC Exploit for High-severity Vulnerability in Microsoft Exchange

Security Researcher Released PoC Exploit for High-severity Vulnerability in Microsoft Exchange

Security Researcher Released PoC Exploit for High-severity Vulnerability in Microsoft Exchange | IT Security News 4. May 2021 Last week, security specialist Nguyen Jang has released technical information and proof-of-concept exploit (PoC) code for the severe flaw CVE-2021-28482 in Microsoft Exchange Server that could be used by hackers to perform code on vulnerable systems. The…

New Pingback Malware Using ICMP Tunneling to Evade C&C Detection

New Pingback Malware Using ICMP Tunneling to Evade C&C Detection

New Pingback Malware Using ICMP Tunneling to Evade C&C Detection | IT Security News 4. May 2021 Researchers on Tuesday disclosed a novel malware that uses a variety of tricks to stay under the radar and evade detection, while stealthily capable of executing arbitrary commands on infected systems.Called ‘Pingback,’ the Windows malware leverages Internet Control…