article thumbnail

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Security Affairs

This tool modifies a JavaScript constraints file and executes it with SYSTEM-level permissions. Microsoft has observed APT28 using GooseEgg in post-compromise activities against various targets, including government, non-governmental, education, and transportation sector organizations in Ukraine, Western Europe, and North America.

Military 121
article thumbnail

Medibank Defends its Security Practices as its Ransomware Woes Worsen

IT Governance

In most cases, basic personal information – such as their name, date of birth, email address, phone number and gender – was exposed. The first was damaging enough, containing patients’ names, addresses and birthdates. Things got worse for Medibank after a second database was leaked , containing a file named “abortions”.

IT 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers disclose critical sandbox escape bug in vm2 sandbox library

Security Affairs

” Wi also published two proof-of-concept (PoC) exploits for this vulnerability that can be used to escape the sandbox to create an empty file named “flag” on the host. .” vm2 is a sandbox that can run untrusted code in an isolated context on Node.js ” reads the advisory published by vm2.

article thumbnail

New Linux Ransomware BlackSuit is similar to Royal ransomware

Security Affairs

According to government experts, the Royal ransomware attacks targeted numerous critical infrastructure sectors including, manufacturing, communications, healthcare and public healthcare (HPH), and education. ReadMe file name: README.BlackSuit.txt. similarities in jumps based on BinDiff, a comparison tool for binary files.”

article thumbnail

Hackers are actively exploiting a flaw in the Elementor Pro WordPress plugin

Security Affairs

The experts are also seeing files being uploaded with the following file names: wp-resortpack.zip wp-rate.php lll.zip The researchers also reported that the attackers are changing site URL to away[dot]trackersline[dot]com. This vulnerability was reported on March 18 by security researcher Jerome Bruandet from NinTechNet.

article thumbnail

Vice Society ransomware gang is using a custom locker

Security Affairs

This group focuses on public school districts and other educational institutions, like other ransomware gangs it implements a double extortion model and publishes data stolen from the victims on a data leak site. The malware dropped ransom notes with the file name “AllYFilesAE” in each encrypted directory.

article thumbnail

Iran-linked MERCURY APT behind destructive attacks on hybrid environments

Security Affairs

The ransomware employed in the attacks changes the file name extension to DARKBIT and drop ransom notes. ” DEV-1084 presented itself as cybercrime group likely as an attempt to hide its real motivation of a nation-state actor. Then the attackers maintain persistence by registering a scheduled task using GPO.