article thumbnail

3CX voice and video conferencing software victim of a supply chain attack

Security Affairs

Popular voice and video conferencing software 3CX was the victim of a supply chain attack, SentinelOne researchers reported. As of Mar 22, 2023, SentinelOne observed a spike in behavioral detections of the 3CXDesktopApp, which is a popular voice and video conferencing software product.

article thumbnail

Experts demonstrate a post-exploitation tampering technique to display Fake Lockdown mode

Security Affairs

However, if the iPhone was previously compromised, the security feature cannot block the malware from running in the background, whether the user activates Lockdown Mode or not Upon turning on the feature in the Settings app, the method -[PUILockdownModeController setLockdownModeGloballyEnabled:] is triggered.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Japanese computers hit by a wiper malware ahead of 2021 Tokyo Olympics

Security Affairs

Researchers from the Japanese security firm Mitsui Bussan Secure Directions (MBSD) discovered an Olympics-themed malware that implements wiping capabilities, The Record reported. The wiper uses the cURL app to access content on the XVideos adult video portal while deleting files on the infected systems.

article thumbnail

Borat RAT, a new RAT that performs ransomware and DDoS attacks

Security Affairs

If it can find a connected microphone, the RAT records all audio and saves it in a file named micaudio.wav. The post Borat RAT, a new RAT that performs ransomware and DDoS attacks appeared first on Security Affairs. Initially, it checks if a microphone is present in the victim’s machine. Pierluigi Paganini.

article thumbnail

A 15-Year-Old Unpatched Python bug potentially impacts over 350,000 projects

Security Affairs

” reads the post published by security firm Trellix.”The ”The vulnerability is a path traversal attack in the extract and extractall functions in the tarfile module that allow an attacker to overwrite arbitrary files by adding the “.” Initially we thought we had found a new zero-day vulnerability. Pierluigi Paganini.

article thumbnail

ToxicEye RAT exploits Telegram communications to steal data from victims

Security Affairs

Telegram is a legitimate service and enterprise AV engines and security solutions trust its traffic. Researchers noticed that that the ToxicEye RAT configuration file includes a Telegram bot that is compiled into an executable file. ” If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

article thumbnail

Experts attribute WyrmSpy and DragonEgg spyware to the Chinese APT41 group

Security Affairs

Later variants masquerade as adult video content, “Baidu Waimai” food delivery platform, and Adobe Flash. “It then receives a response containing a file name which the malware uses to download additional rooting binaries from C2 infrastructure if one exists for the specified device.” ” continues the report.