Lorenzo ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The UK NCSC announces its first commercial product, SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and Display Port connections

ncsc.gov.uk/news/world-first-n…

reshared this

Lorenzo ha ricondiviso questo.

ZionSiphon is an AI-generated, non-functional attempt at ICS malware. Malicious intent doesn't imply ability, and broken malware like this is a distraction when we have proven threats like VOLTZITE/Volt Typhoon out there hitting water utilities.:

dragos.com/blog/zionsiphon-ot-…

#ICS #malware

Questa voce è stata modificata (6 giorni fa)

reshared this

Lorenzo ha ricondiviso questo.

Hackers steal $2.5m from Sri Lanka's Finance Ministry

Funds were diverted during a foreign debt repayment

Basically BEC at a national scale... LOL

newswire.lk/2026/04/22/sri-lan…

reshared this

Lorenzo ha ricondiviso questo.

A Recorded Future report looks at "guarantee Telegram marketplaces," a term for Telegram channels where threat actors sell fraud and scam-related services to the operators of industrialized cyber scam compounds.

The new king of this market seems to be a platform named Dabai Guarantee.

recordedfuture.com/research/ev…

reshared this

Lorenzo ha ricondiviso questo.

Deutsche Telekom’s Red Team has revealed Pack2TheRoot, a new priv esc vulnerability impacting several Linux distros

github.security.telekom.com/20…

reshared this

Lorenzo ha ricondiviso questo.

There is another DDoS happening against mastodon.social, status information is here and the team is working on countering it -> status.mastodon.social/cmobau3…
Lorenzo ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

#BREAKING #ESETresearch uncovered an active NGate Android malware campaign targeting Spanish speaking users, combining fake app distribution, NFC relay abuse, PIN harvesting, and a shared Devil NFC MaaS backend. The operation is tied to the Devil NFC infrastructure used in 🇪🇸 Spain since January 2026
Distribution: We identified a domain distributing NGate malware targeting Spanish speaking users, with sample uploaded to VirusTotal.
The malware is disguised as a NFC Security app called “Seguridad NFC – Bloqueador de Cargos” and delivered through a fake Google Play website:
piaystore.it[.]com
Domain was registered on 2026 04 18, resolving to 65.109.108[.]183
Shared infrastructure & MaaS:
The same IP (65.109.108[.]183) also hosts:
https://devilxclusive[.]lol
This domain exposes an admin panel branded “Devil NFC”, which appears to provide NGate as NFC MaaS, linking distribution and backend operations.
NGate functionality:
The app can exfiltrate SMS messages and load a phishing screen from its hardcoded C&C server, mimicking generic account lock warning and instructing victims to hold their payment card against the back of the smartphone and then enter the card’s PIN.
Both NFC data and PINs are exfiltrated to the C&C server.
Bank‑branded NFC phishing:
NGate supports custom bank‑branded NFC phishing templates, embedded at build time by the operator.
In this campaign, we observed templates impersonating Santander Bank, shifting from generic warnings to targeted bank abuse.
NFC relay:
The NFC relay server – to transfer NFC data - is dynamically returned via C&C and decrypted as 65.109.108[.]183:5568 — the same IP used for hosting and distribution.
Session & victim tracking:
NGate requests a session ID from C&C, receiving an incrementing value representing number of connections (e.g., "conexion_id": 854).
This appears to track successful C&C connections, not completed fraud.
Separately, when a victim submits their card PIN, the server returns another incrementing ID — 40 at analysis time — representing confirmed cases where victims tapped a card and entered their PIN.
Historical connection
We have identified that this activity targeteing Spanish speaking users directly connects to earlier Devil NFC MaaS campaigns impersonating:
• Jan 2026: Shein app
• Feb 2026: CaixaBank and Santander Protect, and Seguridad Integral
• Mar 2026: Unicaja Key distributed via SMS links and Dispositivo Seguro
• Apr 2026: Unicaja Protect, Seguridad NFC
Unicaja publicly warned customers about this campaign x.com/UnicajaBanco/status/2033…
Victimology:
We detected Caixabank Protect, Seguridad Integral, and Unicaja Key malicious apps in Feb and Mar 2026 on Android devices in Spain
IoCs:
IoCs are available in our GitHub repo: github.com/eset/malware-ioc/tr…

reshared this

Lorenzo ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

I spent nearly 4 months investigating the inner workings of a North Korean state-sponsored hacking group. Here's what I found:

- The group used generative AI tools to aid in almost every part of their operations.

- They exfiltrated 26,584 cryptocurrency wallets from victim systems, with a combined value totaling as much $12 million dollars.

- In several cases, the threat actors set up entire front companies to lure in developers via fake job posting, then infected them with malware.

- The threat actors successfully pulled off a supply-chain attack by compromising a VS Code extension developer's system.

🔗 Full article: expel.com/blog/inside-lazarus-…

reshared this

Lorenzo ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

16 cybersecurity agencies from across the world have published a joint advisory on China's use of proxy botnets to disguise its espionage activity

ncsc.gov.uk/news/international…

reshared this

Lorenzo ha ricondiviso questo.

Republican lawmakers have introduced two privacy bills in Congress to preempt a patchwork of state privacy laws

-> Secure Data Act - for tech firms
-> GUARD Financial Data Act - for the financial sector

energycommerce.house.gov/posts…

reshared this

Lorenzo ha ricondiviso questo.

Checkmarx discloses a new supply chain attack on its KICS security scanner

New malicious versions were spotted for the Docker image, GitHub Action, VS Code extension, and Developer Assist extension

checkmarx.com/blog/checkmarx-s…

reshared this

Lorenzo ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The world is so stupid these days

news.bitcoin.com/a-hair-dryer-…

reshared this

Lorenzo ha ricondiviso questo.

"Bundestag President Julia Klöckner is among the victims of the current wave of attacks on Signal users"

spiegel.de/politik/deutschland…

reshared this

Lorenzo ha ricondiviso questo.

U.K. intelligence says at least 100 countries now have access to government spyware, up from around 80 countries in 2023. The rise shows that spyware continues to proliferate and that the bar to obtaining spyware is lower.

techcrunch.com/2026/04/22/uk-g…

Lorenzo ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

There's a lot of DNS in this one.

*slaps intercom* CLEAR MY SCHEDULE! I HAVE READING TO DO!

(I don't have a secretary.)

(Or an intercom.)


-Security firm employee pleads guilty to ransomware attacks
-Ukraine dismantles bot farm
-Malicious apps hit the Chinese iOS App Store
-Internet scans surge before vuln disclosures
-StealTok campaign hits 130k
-Perforce servers widely exposed on the internet
-The Hormuz scams are here
-Malware reports on The Gentlemen, Kyber, TwizAdmin, NGate, PhantomCLR, Gh0st RAT, Formbook, FudCrypt
-Ukrainian APT goes after TrueConf
-EU sanctions hit the Kremlin disinfo peddler
-Major KEV update

reshared this

It's not just Anthropic using this dark pattern. I checked my Mac and found #1Password installing similar extension bridges to browsers I've never installed. They should notify users of these changes during installation and never install for software that is not present.

$ cd ~/Library/Application\ Support
$ find . -name "com.1password.1password.json" | egrep "Arc|Microsoft"
./Microsoft Edge Beta/NativeMessagingHosts/com.1password.1password.json
./Microsoft Edge Dev/NativeMessagingHosts/com.1password.1password.json
./Microsoft Edge Canary/NativeMessagingHosts/com.1password.1password.json
./Microsoft Edge/NativeMessagingHosts/com.1password.1password.json
./Arc/User Data/NativeMessagingHosts/com.1password.1password.json

EDIT - updated find results to reflect 1Password-installed manifests


Can confirm this for Arc, Brave, Edge, Chromium, and Vivaldi on my machine:

#Anthropic secretly installs spyware when you install Claude Desktop
thatprivacyguy.com/blog/anthro…


Questa voce è stata modificata (1 settimana fa)
Lorenzo ha ricondiviso questo.

Interesting story of an Irish company falling victim to BEC fraud. Criminals hijacked an employee’s email account in the victim company. They then used that account to send payment instructions to the company’s outsourced financial admin company. The victim company lost €2 million.

The victim company is now suing the payments company on the basis that the payment company should have spotted that the emails were fraudulent

m.independent.ie/irish-news/co…

Questa voce è stata modificata (1 settimana fa)

reshared this

Lorenzo ha ricondiviso questo.

Can confirm this for Arc, Brave, Edge, Chromium, and Vivaldi on my machine:

#Anthropic secretly installs spyware when you install Claude Desktop
thatprivacyguy.com/blog/anthro…