Remove Analysis Remove Authentication Remove Libraries Remove Manufacturing
article thumbnail

China-linked APT group VANGUARD PANDA uses a new tradecraft in recent attacks

Security Affairs

In the most recent campaign, the group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. The Volt Typhoon group has been active since at least mid-2021 it carried out cyber operations against critical infrastructure.

Cleanup 78
article thumbnail

EventBot, a new Android mobile targets financial institutions across Europe

Security Affairs

EventBot is a mobile banking trojan and infostealer that abuses Android’s accessibility features to steal user data from financial applications, read user SMS messages, and steal SMS messages to allow the malware to bypass two-factor authentication.” ” reads the analysis published by Cybereason.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. million accounts compromised in Le Slip Français data breach The French underwear manufacturer Le Slip Français has suffered a data breach. Data breached: 5,300,000 records.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. Play store app manipulation The final step of the infection is the injection of a shared library into the Play store app. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. Play store app manipulation The final step of the infection is the injection of a shared library into the Play store app. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

Firmware Fuzzing 101

ForAllSecure

This is a blog post for advanced users with binary analysis experience. Non-glibc C standard library. Uses uClibc instead of glibc C standard library. Now that all the parts are in place, lets try actually running httpd: $ chroot root /qemu-mips-static /usr/sbin/httpd /usr/sbin/httpd: can't load library 'libssl.so.0.9.7'.

article thumbnail

Firmware Fuzzing 101

ForAllSecure

This is a blog post for advanced users with binary analysis experience. Non-glibc C standard library. Uses uClibc instead of glibc C standard library. Now that all the parts are in place, lets try actually running httpd: $ chroot root /qemu-mips-static /usr/sbin/httpd /usr/sbin/httpd: can't load library 'libssl.so.0.9.7'.