article thumbnail

Phishing campaign targets LATAM e-commerce users with Chaes Malware

Security Affairs

The kill chain starts with phishing messages that use a.docx file that once is opened triggers a template injection attack. bin, researchers also observed the use of a cryptocurrency mining module. . The post Phishing campaign targets LATAM e-commerce users with Chaes Malware appeared first on Security Affairs.

Phishing 107
article thumbnail

Weekly podcast: Browsealoud cryptojacking, Bee Token phishing and Olympic attacks

IT Governance

This week, we discuss the use of cryptocurrency mining software on numerous government websites, a phishing scam that robbed Bee Token investors of $1 million and cyber attacks on the Pyeongchang Winter Olympics. Here are this week’s stories. and NHS sites in the UK.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Long Run of Shade Ransomware

Security Affairs

The phishing email contains a.zip file named “slavneft.zakaz.zip”, which means something like “slavneft order” in English, showing a direct reference to “Slavneft”. Shade connects to its C2 server using embedded TOR libraries and downloads additional modules, such as the aforementioned “CMSBrute” or the “ZCash miner” one. Conclusions.

article thumbnail

Security Affairs newsletter Round 228

Security Affairs

5 Common Phishing Attacks and How to Avoid Them? A backdoor mechanism found in tens of Ruby libraries. Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency. Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds. Capital One hacker suspected to have breached other 30 companies.

article thumbnail

Information Literacy and Records Management

Brandeis Records Manager

Info literacy has largely become the preserve of the library community , with a focus on teaching scholars and citizens to navigate and to differentiate the information that confronts us. Should it exclude avoiding rogue apps, weak passwords, and phishing attempts? Sound familiar? I don’t think so.

article thumbnail

List of Data Breaches and Cyber Attacks in September 2022 – 35.6 Million Records Breached

IT Governance

Tulsa Tech hit by security incident (unknown) Indonesian and Malaysian restaurants hacked by DESORDEN (425,644) Samsung says customer data stolen in security incident (unknown) Yandex Taxi systems breached in bizarre cyber attack that caused massive traffic jam (unknown) Criminal hackers breached Overby-Seawell Company (unknown) Orange Cyberdefense (..)

article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

He shares a particular example: e-commerce couldn’t have happened without fundamental crypto libraries, such as TLS and SSL. Thanks to these crypto libraries, today’s online economy is the size of Spain’s GDP! You need user education; you need to make sure that you recognize phishing and all that sort of stuff.