Remove 2008 Remove Analysis Remove Libraries Remove Security
article thumbnail

Threat actors leverages DLL-SideLoading to spread Qakbot malware

Security Affairs

Security expert ProxyLife and Cyble researchers recently uncovered a Qakbot campaign that was leveraging the Windows 7 Calculator app for DLL side-loading attacks. Dynamic-link library (DLL) side-loading is an attack method that takes advantage of how Microsoft Windows applications handle DLL files. Pierluigi Paganini.

article thumbnail

Experts add a BlueKeep exploit module to MetaSploit

Security Affairs

The Metasploit BlueKeep exploit module is based on the proof-of-concept code from the security researchers z??osum0x0 It has been developed to target only the 64-bit versions of Windows 7 and Windows 2008 R2. The initial PR of the exploit module targets 64-bit versions of Windows 7 and Windows 2008 R2.” Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Expert identifies new Nazar APT group referenced in 2017 Shadow Brokers leak

Security Affairs

A security expert uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017. Guerrero-Saade discovered that the SIG37 campaign references hacking activities dated back as far as 2008 that was carried out by an unknown threat actor, the expert tracked it as Nazar.

Libraries 105
article thumbnail

Latest Turla backdoor leverages email PDF attachments as C&C mechanism

Security Affairs

Malware researchers from ESET have conducted a new analysis of a backdoor used by the Russia-linked APT Turla in targeted espionage operations. The new analysis revealed a list of high-profile victims that was previously unknown. ” reads the analysis published by ESET. ” reads the analysis published by ESET.

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Guido Vranken returns to The Hacker Mind to discuss his CryptoFuzz tool on GitHub, as well as his experience fuzzing and finding vulnerabilities in cryptographic libraries and also within cryptocurrencies such as Ethereum. Fortunately, in this episode, we’re discussing vulnerabilities in both. Yeah, like that.

article thumbnail

Is APT27 Abusing COVID-19 To Attack People ?!

Security Affairs

Security researcher Marco Ramilli analyzed a new Coronavirus (COVID-19)-themed attack gathering evidence of the alleged involvement of an APT group. According with Trend Micro , the PlugX malware family is well known to researchers having samples dating back to as early as 2008. OCX VT coverage. No Input Commands, Wordcnvpxy execution.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Years ago, I was the lead security software reviewer at ZDNet and then at CNET. The password protected password file clearly was not secure. ” Of course, the security company freaked out, called the editor and chief, threatened to pull their advertising. .” And I was able to repeat the process over and over.