article thumbnail

Hackers exploit Log4Shell to drop Khonsari Ransomware on Windows systems

Security Affairs

The attackers exploited the Log4Shell remote code execution vulnerability to download a.NET binary from a remote server that encrypts the files on the target machine and adds the extension.khonsari to each file. NOT MODIFY OR DELETE THIS FILE OR ANY ENCRYPTED FILES. NOT MODIFY OR DELETE THIS FILE OR ANY ENCRYPTED FILES.

article thumbnail

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. video streams that are viewed). ” continues the analysis. This user seems to at least have permissions to access/view video streams.” Open questions: Who runs these servers?

Cloud 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts warn of a new strain of ransomware, the PXJ Ransomware

Security Affairs

The name PXJ ransomware comes from the file extension that it appends to encrypted files. ” reads the analysis post by IBM X-Force. . ” reads the analysis post by IBM X-Force. The PXJ ransomware uses both AES and RSA algorithms to encrypt the data, the technique is common to other threats.

article thumbnail

Telegram flaw could have allowed access to users secret chats

Security Affairs

Experts at Shielder disclosed a flaw in the Telegram app that could have exposed users’ secret messages, photos, and videos to remote attackers. The experts discovered that sending a sticker to a Telegram user could have exposed his secret chats, photos, and videos to remote attackers.

Access 114
article thumbnail

IDS & IPS Remain Important Even as Other Tools Add IDPS Features

eSecurity Planet

For example, Mandiant researchers discovered a threat actor that ran attacks off of equipment usually ignored on the network such as wireless access point controllers, storage area network (SAN) arrays, load balancers, and video conferencing camera systems. The most significant barrier to visibility is encryption.

Cloud 91
article thumbnail

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

One reason for the enduring waves of ransomware is that unstructured data is easy for hackers to locate and simple for them to encrypt. Related video: Why it’s high time to protect unstructured data. The main difference between the two is organization and analysis. Ransomware “is encrypting files, unstructured data.”

article thumbnail

[Full-Disclosure] HideezKey 2 FAIL: How a good idea turns into a SPF (Security Product Failure)

Security Affairs

video below), I started looking around for more interesting and concerning (from a security point of view) NRF52-based products. To give you a quick overview of this piece of hardware, check out their video intro: Now that you got the point of this product. Through Certificate Pinning Bypass and MiTM Traffic Analysis.

Security 101