Hacking 2024    2026()  2025()  2024()  2023()

21.12.24

cShell DDoS Bot Attack

ASEC recently identified a new DDoS malware strain targeting Linux servers while monitoring numerous external attacks. The threat actor initially targeted poorly managed SSH services and ultimately installed a DDoS bot named cShell. cShell is developed in the Go language and is characterized by exploiting Linux tools called screen and hping3 to perform DDoS attacks.

HACKING

HACKING

11.12.24

Windows UI Automation

Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation

HACKING

HACKING

28.11.24

Dozens of Machines Infected

Dozens of Machines Infected: Year-Long NPM Supply Chain Attack Combines Crypto Mining and Data Theft

HACKING

HACKING

20.11.24

Ghost Tap

Ghost Tap: New cash-out tactic with NFC Relay

HACKING

NFC

5.9.24

Macropack

Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads

HACKING

Malware

5.9.24

Revival Hijack

Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk

HACKING

HACKING

30.8.24

Malicious npm Packages

North Korea Still Attacking Developers via npm

HACKING

Malware

21.8.24

pwish

Be careful what you pwish for – Phishing in PWA applications

HACKING

PHISHING

15.8.24

ArtiPACKED

ArtiPACKED: Hacking Giants Through a Race Condition in GitHub Actions Artifacts

HACKING

HACKING

9.8.24

Downgrade Attacks

Windows Downdate: Downgrade Attacks Using Windows Updates

HACKING

Attack

9.7.24

Jenkins Script Console

Turning Jenkins Into a Cryptomining Machine From an Attacker's Perspective

HACKING

CRYPTOCURRENCY

14.6.24

Sleepy Pickle Part 2

Exploiting ML models with pickle file attacks: Part 2

HACKING

ML

14.6.24

Sleepy Pickle Part 1

Exploiting ML models with pickle file attacks: Part 1

HACKING

ML

5.6.24

Excel File Deploys

FortiGuard Labs has recently identified a sophisticated cyberattack involving an Excel file embedded with a VBA macro designed to deploy a DLL file.

HACKING

HACKING

3.6.24

Cox modems hack

Hacking Millions of Modems (and Investigating Who Hacked My Modem)

HACKING

Hardware

1.6.24

Pumpkin Eclipse

Lumen Technologies’ Black Lotus Labs identified a destructive event, as over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP).

HACKING

Hardware

28.5.24

DNSBomb

DNSBomb is a new practical and powerful pulsing DoS attack exploiting DNS queries and responses.

HACKING

DNS

28.5.24

Server Side Credit Card Skimmer Lodged in Obscure Plugin

Attackers are always finding new ways to inject malware into websites and new ways to obscure it to avoid detection, but they’re always up to their same old tricks. In this post, we’ll explore how attackers are using a very obscure PHP snippet WordPress plugin to install server-side malware to harvest credit card details from a WooCommerce online store.

HACKING

Hacking

27.5.24

HTML Smuggling

HTML smuggling is an innovative attack technique, which abuses HTML5 and JavaScript features to inject or extract data across network boundaries.

HACKING

HTML

27.5.24

Transparent Phishing and HTML Smuggling

Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling

HACKING

Phishing

10.5.24

Tunnelcrack

TunnelCrack is a combination of two widespread security vulnerabilities in VPNs. An adversary can abuse these vulnerabilities to leak traffic outside the VPN tunnel.

HACKING

VPN

10.5.24

TunnelVision

A local network VPN leaking technique that affects all routing-based VPNs

HACKING

VPN

11.4.24

Trick Developers Detected in an Open Source Supply Chain Attack

In a recent attack campaign, cybercriminals were discovered cleverly manipulating GitHub's search functionality, and using meticulously crafted repositories to distribute malware.

HACKING

Hacking

22.3.24

z0Miner

z0Miner Exploits Korean Web Servers to Attack WebLogic Server

HACKING

Exploit

7.3.24

Quishing

QR codes have had a great run in the past few years, diffusing into almost every aspect of our lives, from looking at restaurant menus and paying for products or services online and offline to accessing websites with greater ease. While the positives of QR codes are clearly visible, both from a business and user perspective, their usage has some pitfalls.

HACKING

Mobil

18.1.24

iShutdown

A lightweight method to detect potential iOS malware

HACKING

iOS

3.1.24

SMTP Smuggling

In the course of a research project in collaboration with the SEC Consult Vulnerability Lab, Timo Longin (@timolongin) - known for his DNS protocol attacks

HACKING

SPAM

1.1.24

Hijack Execution Flow: DLL Search Order Hijacking

Adversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program.Hijacking DLL loads may be for the purpose of establishing persistence as well as elevating privileges and/or evading restrictions on file execution.

HACKING

DLL