Exploit News, Articles and Updates

Private chats and user accounts could be exposed by Tinder security bug

An easy-to-exploit bug has left Tinder accounts and private chats exposed to hackers, revealed a researcher this week.

AndroRAT exposes fragmented Android ecosystem vulnerabilities

A new version of a familiar menace, AndroRAT, has emerged from out of the trash to exploit long forgotten vulnerabilities.

App zero-day flaw exploited to fool users into malicious downloads

Attackers were found exploiting a zero-day Telegram app vulnerability in order to make the names and extensions of malicious files appear more legitimate, in hopes that users who received these files would more willingly open them.

Windows Installer service hacked to infect victims' systems with malware

Cyber-criminals are using a malware spam campaign to exploit a remote code execution vulnerability in Microsoft Office to download and execute malicious scripts on victims' systems.

Government websites, including ICO, hit by cryptocurrency mining campaign

More than 5,000 sites, including sites belonging to the NHS, ICO, local councils and the Student Loans Company were hit by a cryptocurrency mining campaign that exploited a popular plug-in to infect sites with a malicious script.

Fancy Bear targets defence contractors email to steal tech secrets

Russian hacking group Fancy Bear, have exploited weakspots in the email systems of defence contract workers to access top secret information on US defence technology, including drones.

Cyber-criminals exploiting traditional trust measures for compromises

Cyber-criminals are exploiting traditional measures of trust to gain a foothold on users systems by compromising trusted sites via background initiated requests, using phishing sites, and typo-squatting.

Desperately needed fix for Flash Player bug exploitation released by Adobe

Adobe Systems today released a critical security update for a pair of vulnerabilities in Flash Player, one of which has been actively exploited in phishing attacks attributed to North Korean APT actor Group 123.

Flash Player zero-day attacks attributed to advancing North Korean APT

Researchers are reporting that an increasingly sophisticated North Korean hacking group is responsible for an attack campaign exploiting CVE-2018-4878, a critical use-after-free flaw in Flash Player that has not yet been patched.

Monero miner Smominru using EternalBlue to spread

The new Monero miner Smominru is active in the wild using the EternalBlue exploit to spread, according to a new report.

Attackers exploit critical Adobe Flash Player zero-day bug; no patch yet

Adobe Systems says it plans to address a critical zero-day vulnerability in Flash Player that a researcher asserts is being actively exploited in the wild to attack South Koreans conducting research on North Korea.

Satori creator linked with new Mirai variant Masuta

Nexus Zeta behind botnet that weaponises router exploit to enlist further vulnerable IoT devices. The author of Satori botnet may also be behind two new Mirai variants called Masuta and PureMasuta.

Hide 'N Seek IoT botnet caught using Peer-to-Peer communication

An emerging botnet comprised of compromised IoT devices dubbed "Hide 'N Seek" or HNS is using custom built Peer-to-Peer communication to exploit victims and build its infrastructure.

Cryptominer malwares in RIG EK spread via malvertising

Malwarebytes researcher Jerome Segura analysed a RIG exploit campaign distributing malware coin miners delivered via drive-by download attacks from malvertising.

macOS Zero Day details exposed by researcher

An independent security researcher called Siguza revealed a local privilege escalation Zero Day in macOS that can be exploited by any unprivileged user.

Mozilla patches one critical, two high flaws in Thunderbird

Mozilla issued a series of security updates for Thunderbird 52.5.2 that included a critically rated buffer overflow issue that could lead to a crash if exploited.

TLS exploit capitalises on 19-year-old vulnerability; vendors issue patch

Researchers recently discovered that a nearly two-decade-old vulnerability in TLS stacks was still exploitable due to insufficient protective counter-measures some used by highly popular websites.

UPDATE: 'NotPetya' ransomware at heart of new global campaign

A yet-indeterminate ransomware strain has infected systems all over the world with particular enthusiasm for Ukrainian targets.

Wikileaks releases CIA tool set which help malware onto air-gapped PCs

WikiLeaks on Thursday dumped more leaked CIA documents with its latest Vault 7 disclosures, this time publishing materials from a tool suite called Brutal Kangaroo that allows attackers to indirectly infiltrate a closed network or air-gapped computer using a compromised flash drive.

Platinum hackers exploit Intel AMT-SOL for secure C&C communications

A file-transfer mechanism that Microsoft describes as a feature rather than a bug is being exploited by the Platinum hacking group on targeted machines in south east Asia.

Researcher hacks city's WiFi service using buffer-overflow exploit

As a growing number of cities provide free WiFi networks become, a security researcher demonstrated his successful hack of his city's WiFi network.

Linux-run IoT devices under attack by NyaDrop

Internet of Things (IoT) devices running on the open-source Linux OS are under attack from NyaDrop.

Brazil hotbed of financial fraud, report

Brazil has emerged as a primary centre of financially motivated e-crime threat activity.

1.5 billion Windows computers potentially affected by unpatched 0-day exploit

Trustwave has found a zero-day exploit which it said affects all versions of Microsoft's OS Windows, all the way from Windows 2000 up to a fully patched version of Windows 10.

ICYMI:; Backdoor concerns; TalkTalk losses; EBay exploit; Safe-Harbour 2; Malwarebytes flaw

The latest In Case You Missed It (ICYMI) looks at; Investigatory Powers Bill; TalkTalk woes continue; EBay exploit unfixed; EU-US Privacy Shield agreed; Malwarebytes apologises for flaw.

Trend Micro patched flaws would let hackers execute malicious code

Trend Micro patched several critical flaws in Password Manager found by a Google Project Zero research that allowed hackers to execute malicious code.

Revamped RIG exploit kit infects one million PCs

A new version of the widely-distributed RIG exploit kit has emerged and is infecting around 27,000 PCs each day, according to researchers at Trustwave Spiderlabs.