Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - maruf.swe

Pages: [1] 2 3 ... 32
1




The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems.

A honeypot set up to observe the current security landscape in smart manufacturing systems observed numerous threats—including cryptomining malware and ransomware—in just a few months, highlighting the new threats that industrial control systems (ICS) face with increased exposure to the internet.

While in the past ICS networks were traditionally proprietary and closed systems, the advent of the Internet of Things (IoT) has created manufacturing systems that have exposed devices and network ports to the internet. This also makes these systems vulnerable to more threats from bad actors – which could have dire implications when it comes to manufacturing plants or critical infrastructure.

For More Details : https://threatpost.com/fake-smart-factory-honeypot-highlights-new-attack-threats/152170/

2




The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.

A U.S. government agency was targeted with spear phishing emails harboring several malware strains – including a never-before-seen malware downloader that researchers call “Carrotball.”

The campaign, which researchers observed occurring from July to October and code-named “Fractured Statue,” involved six unique malicious document lures being sent as attachments from four different Russian email addresses to 10 unique targets. The subject matter of the lures featured articles written in Russian pertaining to ongoing geopolitical relations issues surrounding North Korea.

“Overall, the Fractured Statue campaign provides clear evidence that the TTPs [tactics, techniques and procedures] discovered in Fractured Block are still relevant, and that the group behind the attacks still appears to be active,” said Adrian McCabe with Palo Alto Networks’ Unit 42 research group

For More Details : https://threatpost.com/u-s-gov-agency-malware-laced-emails/152141/

3




The malware uses thousands of partner websites to spread malvertising code.

The malvertising-focused trojan known as Shlayer has burbled to the top of the malware heap when it comes to targeting Mac users. It made up 29 percent of all attacks on macOS devices in Kaspersky’s telemetry for 2019, making it the No. 1 Mac malware threat for the year. To spread, it has been swindling visitors to websites with millions of visitors, especially YouTube and Wikipedia, into clicking on malicious links.

Shlayer is a trojan downloader, which spreads via fake applications that hide its malicious code, according to Kaspersky. Its main purpose is to fetch and install various adware variants. These second-stage samples bombard users with ads, and also intercept browser searches in order to modify the search results to promote yet more ads.

For More Details : https://threatpost.com/shlayer-mac-youtube-wikipedia/152146/

4
Informative. thanks for sharing.

7
good post, Thanks for sharing

8
Informative, Thanks for sharing with us.

9
Thanks for sharing with us.

11
Good post, thanks for sharing.

12
Informative post. thanks for sharing.

13
Thanks for sharing.

14
Software Engineering / Re: Scientists redefine the kilogram
« on: Today at 12:48:06 AM »
Thanks for sharing.

Pages: [1] 2 3 ... 32