Cybersecurity

Raspberry Robin Worm Rides on New One-Day Flaws to Launch Stealthy Attacks | Cyware Hacker News

A new version of the Raspberry Robin worm has been found exploiting two new one-day vulnerabilities to launch stealthy attacks. According to a report from Check Point, the attacks have been since October 2023, and have targeted organizations worldwide.  Recently, Raspberry Robin made headlines for expanding its attacks to the financial and insurance sectors in […]

Cybersecurity

Microsoft Rolls Out Patches for 73 Flaws, Including 2 Windows Zero-Days

Feb 14, 2024NewsroomPatch Tuesday / Vulnerability Microsoft has released patches to address 73 security flaws spanning its software lineup as part of its Patch Tuesday updates for February 2024, including two zero-days that have come under active exploitation. Of the 73 vulnerabilities, 5 are rated Critical, 65 are rated Important, and three and rated Moderate […]

Cybersecurity

Diving Into Glupteba’s UEFI Bootkit

This post is also available in: 日本語 (Japanese) Executive Summary Glupteba is advanced, modular and multipurpose malware that, for over a decade, has mostly been seen in financially driven cybercrime operations. This article describes the infection chain of a new campaign that took place around November 2023. Despite being active for over a decade, certain […]

Cybersecurity

Notorious Bumblebee Malware Re-emerges with New Attack Methods

Bumblebee malware has re-emerged following a four-month absence from the cyber threat landscape, according to Proofpoint research. The new campaign, observed in February 2024, used a “significantly different” attack chain compared to previous Bumblebee infiltrations. The return of Bumblebee coincides with the reappearance of several notorious threat actors at the start of 2024 following a […]

Cybersecurity

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit

Feb 13, 2024NewsroomCryptocurrency / Rootkit The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware. “This bootkit can intervene and control the [operating system] boot process, enabling Glupteba to hide itself and create a stealthy persistence that […]