Posts

NTLM HACKING TO ADMIN ACCOUNT

Image
  Due to the work from home possibilities, cybercriminals are constantly targeting normal users, as at this time they are working remotely, that’s why the usage of the RDP and video communication platforms will be high. And to take advantage of this situation, they are launching different types of attacks like phishing , malware, fraud, and disinformation campaigns. The cyber criminals are simply taking the COVID-19 pandemic as a luring opportunity. As in recent times, the activities of cyber criminals have skyrocketed in the daily life of users.  We all know that due to the deadly COVID-19 pandemic , many companies are simply opting for the work from home option, and for this reason, users have already started working from home, which seems to be a golden situation for the cybercriminals! Yes, they really don’t want to miss this golden situation.   As we have already seen in the case of Zoom , how these types of services have grown in recent ...

NTLM HACK WITH GOOGLE OWNED COMPANY

Image
  Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking     Due to the work from home possibilities, cybercriminals are constantly targeting normal users, as at this time they are working remotely, that’s why the usage of the RDP and video communication platforms will be high. And to take advantage of this situation, they are launching different types of attacks like phishing , malware, fraud, and disinformation campaigns. The cyber criminals are simply taking the COVID-19 pandemic as a luring opportunity. As in recent times, the activities of cyber criminals have skyrocketed in the daily life of users.  We all know that due to the deadly COVID-19 pandemic , many companies are simply opting for the work from home option, and for this reason, users have already started working from home, which seems to be a golden situation for the cybercriminals! Yes, they really don’t want to miss this golden situation.   As we have...

Bruteforce attack Investigation in IOT infrastructure

Malware

Image
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes. What are the 4 main types of malware? 4 Types of malware Virus. A virus can replicate itself and therefore spreads quickly as it attaches itself to another commonly used, legitimate program on a computer. ... Worm. Like a virus, worms are infectious and are designed by cybercriminals to replicate themselves. ... Botnets. ... Ransomware. 4 Types of malware Malware can go by many names. You’ve probably heard of some or all of the following common types of malware: Virus A virus can replicate itself and therefore spreads quickly as it attaches itself to another commonly used, legitimate program on a computer. A virus can also be transported. If the virus attaches to a music file, for instance, the virus goes with that file if it’s ...

etherium deploy RAT

Cybersecurity researchers have discovered a malicious package on the npm package registry that masquerades as a library for detecting vulnerabilities in Ethereum smart contracts but, in reality, drops an open-source remote access trojan called Quasar RAT onto developer systems. The heavily obfuscated package, named  ethereumvulncontracthandler , was published to npm on December 18, 2024, by a user named "solidit-dev-416." As of writing, it continues to be available for download. It has been  downloaded 66 times  to date. "Upon installation, it retrieves a malicious script from a remote server, executing it silently to deploy the RAT on Windows systems," Socket security researcher Kirill Boychenko  said  in an analysis published last month. The malicious code embedded into ethereumvulncontracthandler is obscured with multiple layers of obfuscation, leveraging techniques like Base64- and XOR-encoding, as well as minification to resist analysis and detection effort...

Thomas Cook India Reports Cyber Attack in Its IT Infrastructure

Image
The company's India operations are based out of Mumbai. While accessing the company's website after the development,  Mint  found that the homepage was flagging an Error 503, and the  Google  search results were also showing an error page instead of the travel agency's website on December 31. Thomas Cook India's website takes a hit, as users find Error 503 on the homepage. Google search results for Thomas Cook India website on December 31. What is an Error 503? According to  Microsoft 's official support blog, Error 503 occurs when the website is in a stopped state from the owner's side. “The ‘503 Service Unavailable’ message typically appears when the application pool is in a stopped state," said Pradeep Sharma in the support blog post. Topics You May Be Interested In cybercrimes Catch all the  Business News  ,  Corporate news  ,  Breaking News  Events and  Latest News  Updates on Live Mint. Download The  Mint News A...