The Hacker News

Experts uncover several C&C servers linked to “WellMess Malware.”

Views expressed in the cybersecurity and cybercrime update are those of the reporters and correspondents.

Accessed on 30 July 2021, 2116 UTC.

Content supplied by “The Hacker News.”

Source (email subscription to “The Hacker News”):

https://mail.google.com/mail/u/0/#inbox/FMfcgzGkZZsrnmMpqtHXkzJkFhbXCGjz

Please click link or scroll down to read your selections.

The Hacker News Daily Updates
Newsletter
cover The Threat Hunter’s Handboook

Using Log Analytics to Find and Neutralize Hidden Threats in Your Environment

Download Now Sponsored
LATEST NEWS Jul 30, 2021
Experts Uncover Several C&C Servers Linked to WellMess Malware

Cybersecurity researchers on Friday unmasked new command-and-control (C2) infrastructure belonging to the Russian threat actor tracked as APT29, aka Cozy Bear, that has been spotted actively serving WellMess malware as part of an ongoing attack campaign. More than 30 C2 servers operated by the …

Read More
Twitter Facebook LinkedIn
Several Malicious Typosquatted Python Libraries Found On PyPI Repository

As many as eight Python packages that were downloaded more than 30,000 times have been removed from the PyPI portal for containing malicious code, once again highlighting how software package repositories are evolving into a popular target for supply chain attacks. “Lack of moderation and automated …

Read More
Twitter Facebook LinkedIn
A New Wiper Malware Was Behind Recent Cyberattack On Iranian Train System

A cyber attack that derailed websites of Iran’s transport ministry and its national railway system earlier this month, causing widespread disruptions in train services, was the result of a never-before-seen reusable wiper malware called “Meteor.” The campaign — dubbed “MeteorExpress” — has not been …

Read More
Twitter Facebook LinkedIn
Phony Call Centers Tricking Users Into Installing Ransomware and Data-Stealers

An ongoing malicious campaign that employs phony call centers has been found to trick victims into downloading malware capable of data exfiltration as well as deploying ransomware on infected systems. The attacks — dubbed “BazaCall” — eschew traditional social engineering techniques that rely on …

Read More
Twitter Facebook LinkedIn
Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs

An unidentified threat actor has been exploiting a now-patched zero-day flaw in Internet Explorer browser to deliver a fully-featured VBA-based remote access trojan (RAT) capable of accessing files stored in compromised Windows systems, and downloading and executing malicious payloads as part of an …

Read More
Twitter Facebook LinkedIn
cover The Threat Hunter’s Handboook

Using Log Analytics to Find and Neutralize Hidden Threats in Your Environment

Download Now Sponsored

For the latest cybersecurity news and information, please check the blog sidebar and twitter posts.  These news feeds are updated daily.

Thanks for joining us today.

Russ Roberts

https://atomic-temporary-195915488.wpcomstaging.com

 

 

 

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s