Cybersecurity experts report that a hacking group has developed a complex rootkit to perform tasks on systems. As you will remember, a rootkit is a malicious tool designed to evade security mechanisms on a computer system to deploy subsequent attacks.

This new malware, identified as Moriya, was discovered by Kaspersky researchers and is described as a backdoor that allows threat actors to spy on network traffic on affected systems and send arbitrary commands to compromised hosts.

According to experts, Moriya allows its operators to capture and analyze incoming network traffic from the Windows kernel address space: “This backdoor receives commands…

The U.S. Air and Space Forces, in collaboration with the cybersecurity community, announced the launch of the second edition of the event Space Security Challenge: Hack-A-Sat. As the name suggests, this is a hacking event focused on the security of spatial deployments.

In this competition, security researchers at all levels will be able to show their skills and creativity to solve all kinds of cybersecurity challenges applied to space systems, as well as show the best ways to develop protection mechanisms for these systems.

Hack-A-Sat 2 begins with a qualifying event that will take place between June 26 and 27…

Recently hundreds of system users have been surprised to notice that, unexpectedly, the storage space on their devices appeared completely full, and a situation that seems to be due to a Windows Defender error. Some users report that the security software flaw causes hundreds of thousands of files to be created, so the device’s storage space was consumed in a matter of hours.

The issue affects systems where Windows Defender is the default security solution and resides in engine version 18100.5. The report mentions that the bug was fixed with the release of v18100.6 …

Cybersecurity specialists reported the finding of a critical vulnerability in Mobile Station Modem (MSM) telephone chips, developed by and compatible with 5G technology. Successful exploitation of this flaw would allow threat actors to access sensitive details including phone numbers, call history and even spy on live calls.

This is a series of chip systems (SoC) with 2G, 3G, 4G and 5G capabilities that are currently used in around 40% of smartphones around the world, including manufacturers such as Samsung, , LG, OnePlus and Xiaomi.

Check Point experts, responsible for the finding, mention that the flaw tracked as CVE-2020–11292 would have…

Officials from the Court of Justice in Rio Grande do Sul, Brazil, confirmed that their computer systems were affected by a ransomware attack that encrypted employee files and forced the closure of court networks. Apparently, the attack was deployed by the operators of the ransomware.

Everything indicates that the attack would have begun on Thursday morning, when multiple employees discovered that something prevented them from accessing their documents and images, and that a copy of the ransom note had appeared on the screens of all affected machines.

Shortly after the attack began, the court’s official Twitter account began warning employees…

Cybersecurity experts reported that operators of a new variant of ransomware identified as FiveHands managed to exploit a zero-day flaw in SonicWall SMA 100 Series VPN solutions to compromise the networks of different organizations in the United States and Europe. Hackers reportedly abused a flaw tracked as CVE-2021–20016 to inject ransomware payloads and complete the infection.

Before implementing ransomware payloads, this hacking group identified as UNC2447 used CobaltStrike implants pays to gain persistence on the target system and install the SombRAT backdoor, detected a few months ago in the hacking campaign identified as CostaRicto.

The report mentions that this variant…

The Azure Defender for IoT research group reported the finding of at least 25 security flaws impacting all kinds of intelligent devices and industrial application Internet of Things equipment. This set of vulnerabilities, identified as “BadAlloc”, was identified by experts from and the Cybersecurity and Infrastructure Security Agency (CISA).

According to the report, failures exist in standard memory allocation functions spanning real-time operating systems (ROTS), software development kits (SDKs), and C-standard library implementations. As the name implies, memory allocation features allow developers to control how a device’s firmware and applications work with the device’s built-in physical memory.

Researchers mention that…

Social media advertising may be about to change forever. A recent report ensures that finally approved its platforms to issue ads to children and teens who may be interested in gambling, alcohol and smoking. This research was conducted by the non-profit organization Reset Australia, which created a Facebook page to explore all the advertising options of the platform.

Researchers were able to create highly targeted ads based on Facebook user profiling tools, which is available to any page manager for about $5 USD. …

An unprecedented event occurred a few hours ago when, by mistake, thousands of users received an email from requesting users to confirm their accounts, giving the impression of being a massive attack. This incident, which began around 10:00 PM on Thursday, impacted individual and business accounts alike.

The subject line of these messages only mentioned the phrase “Confirm your Twitter account”, and included a button to complete the action. While these messages seemed legitimate, the cybersecurity community soon began to question their provenance and intentions, as this clearly seemed like a simple but effective phishing attack.

During the minutes following…

REvil ransomware operators disclosed that they have information related to some of upcoming releases, and even threaten to disclose it if their economic demands are not met. According to subsequent reports, this information was obtained after a cyberattack against Quanta, a hardware manufacturer that has established itself as one of Apple’s leading business partners. The Taiwanese firm is responsible for assembling devices such as Apple Watch, Macbook Air and ThinkPad.

Cybersecurity experts mention that hackers managed to compromise Quanta’s servers, steal confidential files and demand a ransom from the affected company. …

Eli Cyber Security

Knowledge belongs to the world

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store