#credential-theft

[ follow ]
Information security
fromTheregister
2 days ago

Beijing-backed burglars target government web servers

China-backed Phantom Taurus uses novel .NET-based NET-STAR malware to target IIS servers and pursue military, diplomatic, and government intelligence across Asia, Middle East, Africa.
fromSecurityWeek
1 week ago

PyPI Warns Users of Fresh Phishing Campaign

The attack, a continuation of a campaign conducted in July, involves fraudulent messages asking users to verify their email address for security purposes, and claiming that accounts may be suspended due to lack of action. "This email is fake, and the link goes to pypi-mirror.org which is a domain not owned by PyPI or the PSF [Python Software Foundation]," PSF security developer-in-residence Seth Larson warns. Setting up phishing-resistant multi-factor authentication (MFA), Larson explains, helps PyPI maintainers mitigate the risks associated with phishing attacks.
Information security
#phishing
fromIT Pro
3 months ago
Privacy professionals

Hackers are using Microsoft 365 features to bombard enterprises with phishing emails - and they've already hit more than 70 organizations

fromIT Pro
3 months ago
Privacy professionals

Hackers are using Microsoft 365 features to bombard enterprises with phishing emails - and they've already hit more than 70 organizations

fromInfoWorld
1 week ago

QR codes become the vehicle for malware in new technique

The malicious package, fezbox, is disguised as a utility library and has "layers of obfuscation" including the "innovative, steganographic use" of QR codes. Steganography involves embedding secret data into a cover medium so that it goes undetected. "Steganography is the practice of hiding a secret file in plain sight, something for which QR codes are great," wrote Socket researcher Olivia Brown.
Information security
#npm
Information security
fromThe Cyber Express
2 weeks ago

New Infostealer Campaign Targets Popular Games

Maranhão Stealer spreads via social-engineering sites offering pirated software, uses reflective DLL injection and persistence mechanisms to steal credentials and cryptocurrency data.
fromComputerWeekly.com
2 weeks ago

Microsoft scores win against Office 365 credential thieves | Computer Weekly

Investigators from Microsoft's Digital Crimes Unit (DCU) have disrupted the network behind the dangerous RaccoonO365 infostealer malware that targeted the usernames and credentials of Office 365 users after being granted a court order in the Southern District of New York. The operation saw a total of 338 websites linked to the popular malware seized and its technical infrastructure disrupted, severing RaccoonO365 users' access to their victims.
Information security
Information security
fromThe Cyber Express
2 weeks ago

New Infostealer Campaign Targets Popular Games

Maranhão Stealer spreads via cracked-software sites to steal browser credentials and cryptocurrency data using Node.js payloads, reflective DLL injection, persistence mechanisms, and system reconnaissance.
fromThe Hacker News
1 month ago

When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider

As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of security incidents now originate from web applications accessed via Chrome, Edge, Firefox, and other browsers. One particularly fast-evolving adversary, Scattered Spider, has made it their mission to wreak havoc on enterprises by specifically targeting sensitive data on these browsers.
Information security
Information security
fromInfoWorld
1 month ago

Wave of npm supply chain attacks exposes thousands of enterprise developer credentials

A supply-chain attack on Nx and multiple malicious npm React packages used AI-powered post-install malware to steal developer credentials and enterprise secrets.
fromIT Pro
1 month ago

Watch out for fake Zoom invites - hackers are abusing ConnectWise ScreenConnect to take over devices

To manipulate targets into engaging and downloading ScreenConnect, the attackers employ advanced deception techniques built around impressive impersonations and familiar business contexts, effectively creating workflows that align with end-user expectations,
Information security
Information security
fromTheregister
1 month ago

Nx NPM packages poisoned in AI-assisted supply chain attack

Compromised Nx NPM packages contained malware that stole developer credentials and exposed them via public GitHub repositories.
#identity-security
fromTheregister
1 month ago
Information security

Report declares 'identity crisis' amid rising login attacks

Security leaders increasingly distrust identity providers due to complexity, poor visibility, inadequate MFA coverage, and rising credential-focused attacks.
fromIT Pro
1 month ago
Information security

Cyber teams are struggling to keep up with a torrent of security alerts

Identity-related alerts require 11 person-hours to investigate on average, while fragmented identity systems and AI-driven credential theft sharply increase breach risk.
fromIT Pro
1 month ago
Information security

Cyber teams are struggling to keep up with a torrent of security alerts

Information security
fromThe Hacker News
1 month ago

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

ShadowCaptcha uses compromised WordPress sites and fake CAPTCHA pages with ClickFix social engineering to deliver stealers, ransomware, and cryptocurrency miners.
Information security
fromThe Hacker News
1 month ago

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

HOOK Android banking trojan variant adds ransomware-style full-screen overlays, expanded remote commands, and enhanced data theft and device takeover capabilities.
fromThe Hacker News
1 month ago

DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft

Popular password manager plugins for web browsers have been found susceptible to clickjacking security vulnerabilities that could be exploited to steal account credentials, two-factor authentication (2FA) codes, and credit card details under certain conditions. The technique has been dubbed Document Object Model ( DOM)-based extension clickjacking by independent security researcher Marek Tóth, who presented the findings at the DEF CON 33 security conference earlier this month.
Information security
fromArs Technica
2 months ago

Phishers have found a way to downgrade-not bypass-FIDO MFA

The phishing attack bypasses a multifactor authentication scheme based on FIDO, the standard considered immune to credential phishing attacks, leading to unauthorized access.
Privacy technologies
#cybersecurity
fromHackernoon
2 years ago
Mobile UX

Fullscreen BitM Attack Discovered By SquareX Exploits Browser Fullscreen APIs To Steal Credentials | HackerNoon

fromHackernoon
2 years ago
Mobile UX

Fullscreen BitM Attack Discovered By SquareX Exploits Browser Fullscreen APIs To Steal Credentials | HackerNoon

Privacy professionals
fromSecuritymagazine
5 months ago

Research reveals mass scanning and exploitation campaigns

Organizations must adopt layered cybersecurity defenses to combat rising threats.
Proactive measures, like regular software updates and MFA, are essential for defense.
fromThe Hacker News
3 months ago

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

"The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server," Ganachari said.
Growth hacking
Remote teams
fromThe Hacker News
4 months ago

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

North Korean threat actors have upgraded their malware, OtterCookie, to enhance capabilities in stealing credentials and data.
[ Load more ]