article thumbnail

Don’t Wanna Pay Ransom Gangs? Test Your Backups.

Krebs on Security

Browse the comments on virtually any story about a ransomware attack and you will almost surely encounter the view that the victim organization could have avoided paying their extortionists if only they’d had proper data backups. “It can be [that they] have 50 petabytes of backups … but it’s in a … facility 30 miles away.…

Backups 361
article thumbnail

A Cryptomining botnet abuses Bitcoin blockchain transactions as C2 backup mechanism

Security Affairs

Crooks are exploiting BTC blockchain transactions to hide backup command-and-control (C2) server addresses for a cryptomining botnet. Security experts from Akamai have spotted a new botnet used for illicit cryptocurrency mining activities that are abusing Bitcoin (BTC) transactions to implement a backup mechanism for C2.

Backups 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Linux Cryptomining Malware

Schneier on Security

Shikitega also downloads Mettle, a Metasploit interpreter that gives the attacker the ability to control attached webcams and includes a sniffer, multiple reverse shells, process control, shell command execution and additional abilities to control the affected system. […]. Bottom line: Shikitega is a nasty piece of code.

Malware 301
article thumbnail

Ukrainian hackers are behind the Free Download Manager supply chain attack

Security Affairs

The recently discovered Free Download Manager (FDM) supply chain attack, which distributed Linux malware, started back in 2020. The maintainers of Free Download Manager (FDM) confirmed that the recently discovered supply chain attack dates back to 2020. org subdomain. collect) that launches the /var/tmp/crond file every 10 minutes.”

Malware 132
article thumbnail

Xenomorph banking Trojan downloaded over 50,000 times from Play Store

Malwarebytes

In reality this application was a Trojan dropper which contacted a remote server and downloaded one of several payloads based on certain parameters. The Fast Cleaner app has now been removed from the Play Store but not before it was downloaded more than 50,000 times. cf Backup C2 art12sec.ga Backup C2 kart12sec.gq

Banking 120
article thumbnail

Technical Report of the Bezos Phone Hack

Schneier on Security

That file shows an image of the Saudi Arabian flag and Swedish flags and arrived with an encrypted downloader. Because the downloader was encrypted this delayed or further prevented "study of the code delivered along with the video.". That's where that state-sponsored malware is going to be found.

Hacking 251
article thumbnail

Forging Australian Driver’s Licenses

Schneier on Security

The problem here is that an attacker who has access to the encrypted licence data (whether that be through accessing a phone backup, direct access to the device or remote compromise) could easily brute-force this 4-digit PIN by using a script that would try all 10,000 combinations… […].