Emsisoft released a new free decryption tool for the Avest ransomware

Security Affairs

The Avest ransomware encrypts victim’s files and appends the extension “ ckey().email().pack14” ransomware to decrypt their files for free.

Hack of DNA website exposes data from 92M accounts

Information Management Resources

MyHeritage received a message from a researcher who unearthed a file named 'myheritage' containing email addresses and encrypted passwords of nearly all of its users on a private server outside the company. Hacking Data security Cyber security Cyber attacks

B0r0nt0K ransomware demands $75,000 ransom to the victims

Security Affairs

The ransom encrypts all files and renames them by appending. rontok extension to the file names. According to the popular malware researcher Michael Gillespie , when the B0r0nt0K ransomware encrypts a file it will base64 the encrypted data.

Hacker breached Perceptics, a US maker of license plate readers

Security Affairs

Last week, a hacker that goes online with the moniker ‘Boris Bullet-Dodger’ reported the hack to The Register and showing it a list of files as proof of the attack.

A new Shamoon 3 sample uploaded to VirusTotal from France

Security Affairs

” In the attempt to deceive the victims, attackers used the internal file name “Baidu PC Faster” and the “Baidu WiFi Hotspot Setup” in the description of the file.

Sony Bravia Smart TVs affected by a critical vulnerability

Security Affairs

“This application handles file names incorrectly when the user uploads a media file. ” The third flaw directory-traversal vulnerability tracked as CVE-2018-16594 that relates to the way the Photo Sharing Plus app handles file names. The application handles file names incorrectly when receiving a user’s input file via uploading a URL. A attacker can upload an arbitrary file with a crafted file name (e.g.: /./)

Thousands of servers infected with the Lilocked Ransomware

Security Affairs

The infection caused the encrypted files to appear in the Google search results. The ransomware encrypts files and appends the. lilocked extension to the file name, then it drops a ransom note named # README.

Researchers released a free decryptor for the Nemty Ransomware

Security Affairs

Good news for the victims of the Nemty Ransomware , security researchers have released a free decryptor that could be used to recover files. The decryptor currently supports only a limited number of file extensions, anyway, researchers are working to improve it and support other file types.

Emsisoft released a free Decrypter for JSWorm 2.0

Security Affairs

ransomware, thanks to experts at Emsisoft they can decrypt their file for free. Researchers found notable callouts in two different malware samples naming ID Ransomware and several prominent malware researchers: “:HI SIRI, DEMONSLAY AND AMIIIIGO!!! “Its files have the “.[ID-<numbers>][<email>].JSWORM”

Victims of Planetary Ransomware can decrypt their files for free

Security Affairs

Researchers at Emsisoft developed a decryptor for the Planetary Ransomware family that could allow victims to decrypt their files for free. The latest variant of the Planetary malware appends the.mira extension to the names of the encrypted files. The ransom note, named !!!READ_IT!!!

Nemty Ransomware, a new malware appears in the threat landscape

Security Affairs

The name of the ransomware comes after the extension it adds to the encrypted file names, the malicious code also deletes their shadow copies to make in impossible any recovery procedure.

Researcher disclosed a Windows zero-day for the third time in a few months

Security Affairs

The last Windows zero-day flaw disclosed by SandboxEscaper is an arbitrary file read vulnerability that could be exploited by a low-privileged user or a malicious program to read the content of any file on a Windows system.

A new variant of Asruex Trojan exploits very old Office, Adobe flaws

Security Affairs

“However, when we encountered Asruex in a PDF file, we found that a variant of the malware can also act as an infector particularly through the use of old vulnerabilities CVE-2012-0158 and CVE-2010-2883 , which inject code in Word and PDF files respectively.”

Malware researchers decrypted the Qrypter Payload

Security Affairs

This messages warned the users about imminent summons against them, inviting them to read the attached lawsuit, a not so innocent looking file named “ Avviso del tribunale.jar ”. The JAR file seems to be corrupted due to the absence of some classes. Encrypted file content.

The SLoad Powershell malspam is expanding to Italy

Security Affairs

A new malspam campaign hit Italy in this days, threat actors are spreading a new variant of a powerful downloader named sLoad. As usual, it comes as a zip file attached to an e-mail, this file contains two elements: A fake shortcut to directory (.lnk

WinRAR CVE-2018-20250 flaw exploited in multiple campaigns

Security Affairs

The flaw is an “Absolute Path Traversal” issue in the library that could be exploited to execute arbitrary code by using a specially-crafted file archive. The malicious code allows the attackers to download and execute files on the infected machine.

Cr1ptT0r Ransomware targets D-Link NAS Devices and embedded systems

Security Affairs

Once the malware has infected a system drops two plain text files, one is a ransom note called “_FILES_ENCRYPTED_README.txt,” which gives information to the victim on what has happened and instruction to pay the ransom. The second text file named “_cr1ptt0r_support.txt”

New APT34 campaign uses LinkedIn to deliver fresh malware

Security Affairs

The fake profiles asked the victims to open the weaponized excel file named ERFT-Details. It supports several commands for collecting system information, uploading and downloading files, and arbitrary shell command execution.

AESDDoS bot exploits CVE-2019-3396 flaw to hit Atlassian Confluence Server

Security Affairs

Trend Micro researchers also discovered that the latest variant of the AESDDoS bot can modify files i.e., /etc/ rc. local , as an autostart technique by appending the {malware path } /{malware file name} reboot command. A new variant of the AESDDoS bot is exploiting a recent vulnerability in the Atlassian collaborative software Confluence.

Crooks exploit exposed Docker APIs to build AESDDoS botnet

Security Affairs

“A batch file first executes the WinEggDrop scanner (s.exe), which tries port 2375 on various hosts with Chinese IP address ranges specified in the ip.txt file.”

Mining 114

The Long Run of Shade Ransomware

Security Affairs

The phishing email contains a.zip file named “slavneft.zakaz.zip”, which means something like “slavneft order” in English, showing a direct reference to “Slavneft”. It contains a russian speaking JavaScript file named “«??? «??? «?????????» ??????????? ??????”,

CISA warns of critical flaws in Prima FlexAir access control system

Security Affairs

The list of flaws includes OS Command Injection, Unrestricted Upload of File with Dangerous Type, Cross-site Request Forgery, Small Space of Random Values, Cross-site Scripting, Exposure of Backup file to Unauthorized Control Sphere, Improper Authentication, and Use of Hard-coded Credentials.

Access 103

GermanWiper, a data-wiping malware that is targeting Germany

Security Affairs

GermanWiper is being distributed in Germany through spam messages that pretend to be emails sent by a job applicant named Lena Kretschmer that is submitting her resume. Once infected a system, the GermanWiper deletes files and leaves a ransom note asking for the payment of BTC 0.15038835.

New FuxSocy Ransomware borrows code from defunct Cerber

Security Affairs

The name of the ransomware comes after the FSociety hacking collective in the Mr. Robot tv series. “For example, when encrypting files FuxSocy will skip files whose file path contain certain strings.

Shade Ransomware is very active outside of Russia and targets more English-speaking victims

Security Affairs

The ransomware also drops on the Desktop 10 text files, named README1.txt through README10.txt, “Attention! All the important files on your disks were encrypted. The details can be found in README.txt files which you can find on any of your disks.”

Nansh0u campaign already infected 50,000 MS-SQL and PHPMyAdmin Servers

Security Affairs

Once successfully logged in with administrative privileges, threat actors execute a sequence of MS-SQL commands that allow them to download malicious payload from a remote file server and execute it with SYSTEM privileges. start”) in the name of the script initiating port scans.”

Mining 111

A month later Gamaredon is still active in Eastern Europe

Security Affairs

Hash 5555a3292bc6b6e7cb61bc8748b21c475b560635d8b0cc9686b319736c1d828e Threat Gamaredon Pteranodon implant Brief Description SFX file Ssdeep 24576:PXwOrRsTyuURQFsVhIe74lpyevrM4vZxn6k1gQ Guo:PgwRAyuURQ2/1YpyeT7ok8. Information about initial SFX file. Script content in “ 15003.cmd ” file.

Crooks use hidden directories of compromised HTTPS sites to deliver malware

Security Affairs

The following graph shows different types of threats that were distributed with this approach, the Shade ransomware was the most common one: Compromises websites delivering the Shade/Troldesh ransomware, included three types of files, namely HTML, ZIP, and EXE files masquerading as.jpg images.

CMS 114

TA505 is expanding its operations

Security Affairs

Hash 0c88e285b6fc183c96b6f03ca5700cc9ca7c83dfccc6ad14a946d1868d1cc273 Threat Dropper Brief Description Excel file with malicious macro Ssdeep 3072:Mc38TehYTdeHVhjqabWHLtyeGxml8/dgzxXYhh3vVYwrq 8/P5HKuPF1+bkm13Kkf:B38TehYTdeHVhjqabWHLty/xml8/dgNr. Files contained in “wprgxyeqd79.exe” (SFX).

IT 107

STOP ransomware encrypts files and steals victim’s data

Security Affairs

“These tasks include showing a fake Windows Update screen, disabling Windows Defender, and blocking access to security sites by adding entries to Windows’s HOSTS file.” The post STOP ransomware encrypts files and steals victim’s data appeared first on Security Affairs.

Severe bug in LibreOffice and OpenOffice suites allows remote code execution

Security Affairs

The security researcher Alex Inführ discovered a severe remote code execution vulnerability in LibreOffice and Apache OpenOffice that could be exploited by tricking victims into opening an ODT (OpenDocument Text) file embedding an event embedded.

Tik Tok, Tick Tock…Boom.

John Battelle's Searchblog

Something’s been bugging me about Tik Tok. I’ve almost downloaded it about a dozen times over the past few months. But I always stop short. I don’t have a ton of time ( here’s why ) so forgive me as I resort to some short form tricks here.

New NRSMiner cryptominer NSA-Linked EternalBlue Exploit

Security Affairs

The new version of NRSMiner updates existing infections by downloading new modules and removing files and services installed by old previous versions. This malicious code first installs a service named snmpstorsrv , with snmpstorsrv.dll registered as servicedll.

Mining 112

Major ASP.NET hosting provider SmarterASP hit by ransomware attack

Security Affairs

According to screenshots shared by some customers on Twitter, the piece of ransomware that infected the company appends the “ kjhbx ” file extension to each file name it encrypts.

Sofacy APT group used a new tool in latest attacks, the Cannon

Security Affairs

Hackers used weaponized files named ‘crash list (Lion Air Boeing 737).docx’ Sofacy APT group (aka APT28 , Pawn Storm , Fancy Bear , Sednit , Tsar Team, and Strontium ) has a new weapon in its arsenal dubbed Cannon.

Specially Crafted ZIP archives allow bypassing secure email gateways

Security Affairs

Attackers have devised a new technique to distribute malware bypassing secure email gateways and other security solutions by using a specially crafted ZIP file. “The ZIP file had a file size significantly greater than that of its uncompressed content.

Thousands of Mega account credentials leaked online, it is credential stuffing

Security Affairs

Thousands of account credentials associated with the popular file storage service Mega have been published online, The former NSA hacker Patrick Wardle, co-founder at Digita Security , discovered in June a text file containing over 15,500 usernames, passwords, and files names. Found file on VirusTotal w/ 15K+ Mega accounts (user names/passwords & users' file listings). File listings included files names describing child abuse content.