Tag Archives: malware

Hackers infect ISPs with malware that steals customers’ credentials

Getty Images reader comments 24 Malicious hackers likely working on behalf of the Chinese government have been exploiting a high-severity zero-day vulnerability that allowed them to infect at least four US-based ISPs with malware that steals credentials used by downstream customers, researchers said Tuesday. The vulnerability resides in the Versa Director, a virtualization platform that… Read More »

Novel technique allows malicious apps to escape iOS and Android guardrails

Getty Images reader comments 13 Phishers are using a novel technique to trick iOS and Android users into installing malicious apps that bypass safety guardrails built by both Apple and Google to prevent unauthorized apps. Both mobile operating systems employ mechanisms designed to help users steer clear of apps that steal their personal information, passwords,… Read More »

Mac and Windows users infected by software updates delivered over hacked ISP

reader comments 49 Hackers delivered malware to Windows and Mac users by compromising their Internet service provider and then tampering with software updates delivered over unsecure connections, researchers said. The attack, researchers from security firm Volexity said, worked by hacking routers or similar types of device infrastructure of an unnamed ISP. The attackers then used… Read More »

Mysterious family of malware hid in Google Play for years

reader comments 21 A mysterious family of Android malware with a demonstrated history of effectively concealing its myriad spying activities has once again been found in Google Play after more than two years of hiding in plain sight. The apps, disguised as file-sharing, astronomy, and cryptocurrency apps, hosted Mandrake, a family of highly intrusive malware… Read More »

Law enforcement operation takes aim at an often-overlooked cybercrime linchpin

Getty Images reader comments 13 An international cast of law enforcement agencies has struck a blow at a cybercrime linchpin that’s as obscure as it is instrumental in the mass-infection of devices: so-called droppers, the sneaky software that’s used to install ransomware, spyware, and all manner of other malware. Europol said Wednesday it made four… Read More »

Mystery malware destroys 600,000 routers from a single ISP during 72-hour span

Getty Images reader comments 100 One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them. “The routers now just sit there with a steady red light on the front,” one… Read More »

Hacker free-for-all fights for control of home and office routers everywhere

reader comments 2 Cybercriminals and spies working for nation-states are surreptitiously coexisting inside the same compromised name-brand routers as they use the devices to disguise attacks motivated both by financial gain and strategic espionage, researchers said. In some cases, the coexistence is peaceful, as financially motivated hackers provide spies with access to already compromised routers… Read More »

PyPI halted new users and projects while it fended off supply-chain attack

Enlarge / Supply-chain attacks, like the latest PyPI discovery, insert malicious code into seemingly functional software packages used by developers. They’re becoming increasingly common. Getty Images reader comments 32 PyPI, a vital repository for open source developers, temporarily halted new project creation and new user registration following an onslaught of package uploads that executed malicious… Read More »

Fujitsu says it found malware on its corporate network, warns of possible data breach

Getty Images reader comments 11 Japan-based IT behemoth Fujitsu said it has discovered malware on its corporate network that may have allowed the people responsible to steal personal information from customers or other parties. “We confirmed the presence of malware on several of our company’s work computers, and as a result of an internal investigation,… Read More »

Hugging Face, the GitHub of AI, hosted code that backdoored user devices

Getty Images reader comments 30 Code uploaded to AI developer platform Hugging Face covertly installed backdoors and other types of malware on end-user machines, researchers from security firm JFrog said Thursday in a report that’s a likely harbinger of what’s to come. In all, JFrog researchers said, they found roughly 100 submissions that performed hidden… Read More »