article thumbnail

North Korea-linked Kimsuky APT attack targets victims via Messenger

Security Affairs

Researchers at Genius Security Center (GSC) identified a new attack strategy by the North Korea-linked Kimsuky APT group and collaborated with the Korea Internet & Security Agency (KISA) for analysis and response. ” reads the analysis. If the victims launch it the multi-stage attack chain starts.

article thumbnail

PoC exploit code for critical Fortinet FortiNAC bug released online

Security Affairs

The two vulnerabilities, tracked as CVE-2022-39952 and CVE-2021-42756 , are respectively an external control of file name or path in Fortinet FortiNAC and a collection of stack-based buffer overflow issues in the proxy daemon of FortiWeb. is an external control of file name or path in the keyUpload scriptlet of FortiNAC.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Qakbot operations continue to evolve to avoid detection

Security Affairs

. “Most recently, threat actors have transformed their techniques to evade detection by using ZIP file extensions, enticing file names with common formats, and Excel (XLM) 4.0 ” reads the analysis published by Zscaler. ” continues the analysis. Compensation-1172258432-Feb-16.xlsb,

article thumbnail

Evil Telegram campaign: Trojanized Telegram apps found on Google Play

Security Affairs

The malicious code hidden in the apps can harvest sensitive information from compromised Android devices. The apps can collect information about the user’s contacts, including IDs, nicknames, names, and phone numbers. The collected information is then encrypted and cached into a temporary file named tgsync.s3.

article thumbnail

macOS Backdoor RustDoor likely linked to Alphv/BlackCat ransomware operations

Security Affairs

The researchers noticed that the backdoor contained a plist file named ‘test’. The analysis of artifacts and IoCs revealed a possible link with the BlackBasta and (ALPHV/BlackCat) ransomware operation. “We identified multiple variants of the embedded Apple script, but all of them are meant for data exfiltration.”

article thumbnail

PlugX malware delivered by exploiting flaws in Chinese programs

Security Affairs

” reads the analysis published by ASEC. The PlugX backdoor has been used since 2008 by multiple China-linked APT groups, including Mustang Panda , Winnti , and APT41 In the attacks observed by ASEC, once exploited the vulnerability, threat actors executed a PowerShell command to create a file named esetservice.exe.

article thumbnail

Experts warn of backdoor-like behavior within Gigabyte systems

Security Affairs

Further analysis revealed that this behavior is present in hundreds of models of Gigabyte PCs. ” reads the analysis from Eclypsium. ” Firmware security firm Eclypsium said it first detected the anomaly in April 2023. .” Gigabyte has since acknowledged and addressed the issue.