article thumbnail

New S1deload Malware Hijacking Users' Social Media Accounts and Mining Cryptocurrency

The Hacker News

An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new information stealer to hijack the accounts and abuse the systems' resources to mine cryptocurrency. Once infected, S1deload Stealer steals

article thumbnail

Who’s Behind the GandCrab Ransomware?

Krebs on Security

But GandCrab far eclipsed the success of competing ransomware affiliate programs largely because its authors worked assiduously to update the malware so that it could evade antivirus and other security defenses. Those records show this individual routinely re-used the same password across multiple accounts: 16061991.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How threat actors can use generative artificial intelligence?

Security Affairs

For example, these campaigns leverage fake social media accounts to post questions and comments about divisive internal issues in the U.S. GAI models can refine these tools to bypass security defenses, making attacks more sophisticated and harder to detect.

article thumbnail

Report Finds 50% of Scattered Spider Phishing Domains Targeted Finance & Insurance

Digital Shadows

Phishing Remains Top Tactic, Fueled by Teams Abuse Figure 1: Top attack techniques in true-positive customer incidents for finance & insurance sector, H2 2024 vs H2 2023 Phishing dominated cyber attacks in H2 2024, accounting for over 90% of incidents across industries due to its simplicity and effectiveness.

article thumbnail

Meal delivery service Home Chef discloses data breach

Security Affairs

The company is investigating the incident and announced that it is taking action to strengthen its security defenses and prevent similar incidents in the future. There’s no need to adjust the other sections on the Account page (e.g. Subscription”). The company is notifying the incident to the impacted users.

article thumbnail

Operation Digital Eye: China-linked relies on Visual Studio Code Remote Tunnels to spy on Europen entities

Security Affairs

As a result, this technique may be challenging to detect and could evade security defenses.” Attackers utilized SSH and Visual Studio Code Remote Tunnels for executing commands on compromised systems, authenticating via GitHub accounts to establish remote connections through vscode.dev.

article thumbnail

Crooks abuse GitHub platform to host phishing kits

Security Affairs

Researchers at Proofpoint reported that crooks are abusing free code repositories on GitHub to host phishing websites and bypass security defenses. The drawback in using public GitHub accounts it that security researchers have major visibility into the threat actors’ activity and on the changes to their phishing pages.

Phishing 108