br00t4c, to Law
@br00t4c@mastodon.social avatar

Law enforcement operation takes aim at an often-overlooked cybercrime lynchpin

https://arstechnica.com/?p=2027800

br00t4c, to Law
@br00t4c@mastodon.social avatar
br00t4c, to random
@br00t4c@mastodon.social avatar
kubikpixel, to random
@kubikpixel@chaos.social avatar

Mystery malware destroys 600,000 routers from a single ISP during 72-hour span:

An unknown threat actor with equally unknown motives forces ISP to replace routers.
One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them.

🔓 https://arstechnica.com/security/2024/05/mystery-malware-destroys-600000-routers-from-a-single-isp-during-72-hour-span/


#password #hack #pwhack #isp #mystery #malware #routers #unknown #october

davidbisset, to random
@davidbisset@phpc.social avatar

This is nuts.

Mystery destroys 600,000 routers from a single during 72-hour span.

https://blog.lumen.com/the-pumpkin-eclipse/

br00t4c, to random
@br00t4c@mastodon.social avatar

Mystery malware destroys 600,000 routers from a single ISP during 72-hour span

#malware

https://arstechnica.com/?p=2027651

ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar

Wow, someone deployed malware in October of 2023 which bricked 600,000 Internet routers -- owned by a SINGLE ISP.

"over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP). The incident took place over a 72-hour period between October 25-27, rendered the infected devices permanently inoperable, and required a hardware-based replacement."

https://blog.lumen.com/the-pumpkin-eclipse/

TalosSecurity, to random
@TalosSecurity@mstdn.social avatar

A new threat actor known as is using several different pieces of to silently infiltrate networks and steal sensitive data. Read more about this group and the TTPs they share with some North Korean state-sponsored actors https://blog.talosintelligence.com/lilacsquid/

nikita, to random German
@nikita@social.tchncs.de avatar

Fast 150.000 Android-Smartphones mit Banking- infiziert

In den vergangenen Monaten wurden einer neuen Untersuchung zufolge mehr als fünf Millionen Android-Smartphones mit infiziert. Darunter ist auch ein äußerst gefährlicher Banking-Trojaner.

TECHBOOK zeigt, welche betroffenen Apps Sie umgehend löschen sollten.

https://www.techbook.de/mobile-lifestyle/apps/anatsa-banking-trojaner

redhotcyber, to Software Italian
@redhotcyber@mastodon.bida.im avatar

Attacco agli ATM riuscito! Un Tasso del 99% di Efficacia Spaventa tutte le Banche Europee

Nello spazio si sta diffondendo attivamente un nuovo tipo di . Il suo tasso di successo, secondo i suoi autori, raggiunge il 99%.

Questo dannoso, chiamato “EU ATM Malware”, è in grado di quasi tutti gli sportelli in e circa il 60% degli sportelli bancomat in tutto il mondo, il che rappresenta una significativa per la sicurezza bancaria globale..

https://www.redhotcyber.com/post/attacco-agli-atm-riuscito-un-tasso-del-99-di-efficacia-spaventa-tutte-le-banche-europee/

brume, to android French
@brume@piaille.fr avatar

via @techbot

Un logiciel malveillant distribué via le PlayStore

Les auteurs distribuent le logiciel malveillant Anatsa via le PlayStore en le déguisant en applications telles que des lecteurs de PDF et des scanners de QRcode. Une fois installé, Anatsa télécharge sa charge utile et vole des infos bancaires sensibles à l'aide de superpositions. Anatsa a ciblé des applications bancaires en Europe et s'est étendu aux US, à la Corée et à Singapour.

Pulse ID : 6655bb0af84356806f384f5a
Lien Pulse : https://otx.alienvault.com/pulse/6655bb0af84356806f384f5a
Pulse Author : AlienVault
Créé : 2024-05-28

aarbrk, to Help Spanish
@aarbrk@mstdn.mx avatar

Hi folks, I need with a possible infection in on . After accidentally visiting a spammy website I am getting suspicious and short-lived windows with a grey border in the corner of the screen. Their text seems to always starts with (A). The first one was ostensibly about Norton, this one McAfee. Tough to verify any fix since they only appear once in a while; I did get a photo of one:

Please advise me!

jsrailton, to poland
@jsrailton@mastodon.social avatar

NEW: second judge in reportedly confirmed as spyware victim.

Appeals court judge told reporter her responsibilities included classified cases where wiretapping was used.

Poland's spyware reckoning continues.

[PL, machine trans.]
Story: https://oko.press/wiemy-o-drugim-polskim-sedzi-inwigilowanym-pegasusem-to-sedzia-apelacyjna-z-krakowa-news-oko-press

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • GTA5RPClips
  • thenastyranch
  • ngwrru68w68
  • magazineikmin
  • khanakhh
  • rosin
  • mdbf
  • Youngstown
  • slotface
  • everett
  • cubers
  • kavyap
  • DreamBathrooms
  • Leos
  • InstantRegret
  • Durango
  • osvaldo12
  • ethstaker
  • cisconetworking
  • tacticalgear
  • normalnudes
  • anitta
  • modclub
  • tester
  • provamag3
  • megavids
  • lostlight
  • All magazines