article thumbnail

Pegasus spyware and how it exploited a WebP vulnerability

Malwarebytes

Recent events have demonstrated very clearly just how persistent and wide-spread the Pegasus spyware is. The exploit chain based on these vulnerabilities was capable of compromising devices without any interaction from the victim and were reportedly used by the NSO Group to deliver its infamous Pegasus spyware.

Spyware 145
article thumbnail

Apple Patches Vulnerabilities in iOS Exploited by Spyware

eSecurity Planet

Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy on journalists, activists and world leaders (see Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal ). operating system was being exploited by the invasive Pegasus spyware.

Spyware 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Long-running surveillance campaigns target Uyghurs with BadBazaar and MOONSHINE spyware

Security Affairs

The threat actors behind the campaigns used two Android spyware to spy on the victims and steal sensitive information. APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets worldwide in several industries, including defense, high tech, energy, government, aerospace, and manufacturing.

article thumbnail

A new variant of Asruex Trojan exploits very old Office, Adobe flaws

Security Affairs

Asruex first appeared in the threat landscape 2015, researchers linked it to the spyware used by the DarkHotel APT group. CVE-2010-2883 is a stack buffer overflow flaw that could be exploited by attackers to execute arbitrary code or trigger a denial of service condition. . ” reads the report published by Trend Micro. .

Malware 110
article thumbnail

The Belgacom hack was the work of the UK GCHQ intelligence agency

Security Affairs

Many experts linked the Regin malware to the Five Eyes alliance , they found alleged references to the super spyware in a number of presentations leaked by Edward Snowden and according to malware researchers, it has been used in targeted attacks against government agencies in the EU and the Belgian telecoms company Belgacom.

Hacking 110
article thumbnail

OnionPoison: infected Tor Browser installer distributed through popular YouTube channel

SecureList

More importantly, one of the libraries bundled with the malicious Tor Browser is infected with spyware that collects various personal data and sends it to a command and control server. The spyware also provides the functionality to execute shell commands on the victim machine, giving the attacker control over it. 2021-Dec-21 09:44:08.

article thumbnail

Former NSA TAO hacker sentenced to 66 months in prison over Kaspersky Leak

Security Affairs

According to the prosecutors, between 2010 and 2015, the former NSA hacker had taken home with him TAO materials, including exploits and hacking tools.

Antivirus 111