article thumbnail

The Long Run of Shade Ransomware

Security Affairs

Since the beginning of the year, security firms observed a new intense ransomware campaign spreading the Shade ransomware. Between January and February, a new, intense, ransomware campaign has been observed by many security firms. Trend of malicious JavaScript downloading Shade ransomware (source: ESET).

article thumbnail

VulnRecap 2/26/24 – VMWare, Apple, ScreenConnect Face Risks

eSecurity Planet

February 21, 2024 5 Vulnerabilities Impact Joomla CMS Type of vulnerability: Mail address escaping, XSS, and remote code execution. Furthermore, threat actors use the authentication bypass issue to spread LockBit ransomware on infiltrated networks, specifically targeting vulnerable ScreenConnect servers. and iPadOS 17.3.

Risk 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks use hidden directories of compromised HTTPS sites to deliver malware

Security Affairs

Hacked websites were used for several malicious purposes, experts observed compromised WordPress and Joomla websites serving Shade /Troldesh ransomware, coin miners, backdoors, and some times were involved in phishing campaigns. jpg are EXE files that are the Shade ransomware. jpg are EXE files that are the Shade ransomware.

CMS 111
article thumbnail

Gootkit delivery platform Gootloader used to deliver additional payloads

Security Affairs

The Javascript-based infection framework for the Gootkit RAT was enhanced to deliver a wider variety of malware, including ransomware. The framework was improved to deploy a wider range of malware, including ransomware payloads. ” reads the analysis published by researchers Gabor Szappanos and Andrew Brandt from Sophos.

article thumbnail

Kyiv blames Belarus-linked APT UNC1151 for recent cyberattack

Security Affairs

Unlike other disinformation campaigns, GhostWriter doesn’t spread through social networks, instead, threat actors behind this campaign abused compromised content management systems (CMS) of news websites or spoofed email accounts to disseminate fake news.

CMS 101
article thumbnail

The Week in Cyber Security and Data Privacy: 13 – 19 November 2023

IT Governance

a property management company in Kentucky Incident details: The ransomware group Hunters International has added Homeland, Inc. Incident details: SEI, an online payment service provider, has notified customers that its systems has been accessed by an unknown individual who copied an encrypted database. to its leak site.

article thumbnail

Dacls RAT, the first Lazarus malware that targets Linux devices

Security Affairs

The group is considered responsible for the massive WannaCry ransomware attack, a string of SWIFT attacks in 2016, and the Sony Pictures hack. The command and control protocol uses TLS and RC4 double-layer encryption, Dacls uses AES to encrypt configuration file and supports C2 instruction dynamic update.

CMS 83