Tech News

School Employee Allegedly Framed a Principal With Racist Deepfake Rant

Controversial gunshot-detection company ShotSpotter has deployed more than 25,000 microphones across 170 cities worldwide. This week, WIRED and South Side Weekly revealed the company may continue to provide gunshot data to police in cities even after contracts have ended. Internal emails seen by the publications suggest ShotSpotter sensors may have stayed online despite law enforcement […]

Cybersecurity

Earth Freybug Uses UNAPIMON for Unhooking Critical APIs

First cc.bat for reconnaissance Once the scheduled task is triggered, a previously deployed batch file, %System%cc.bat, is executed in the remote machine. Based on our telemetry, this batch file launches commands to gather system information. Among the commands executed are: powershell.exe  -command “Get-NetAdapter |select InterfaceGuid” arp  -a ipconfig  /all fsutil  fsinfo drives query  user net  […]

Cybersecurity

Meet Rhysida, a New Ransomware Strain That Deletes Itself

Operating since last May, an emerging ransomware strain called Rhysida was deployed along with new stealer malware called Lumar for a potent new one-two punch against Brazil’s popular PIX payment system users. Researchers from Kaspersky reported Rhysida is functioning as a ransomware-as-a-service (RaaS) operation with a demonstrated ability to quickly evolve. “It stands out for […]

Cybersecurity

LightSpy Spyware Evolves to Add New Plugins for Data Exfiltration | Cyware Hacker News

LightSpy, a malware deployed in a 2020 watering hole attack against iOS users, has been found to be embedded with a set of 14 plugins that are responsible for private data exfiltration. Researchers have attributed the malware to the Chinese state-sponsored APT41 group, which previously had used DragonEgg and WyrmSpy spyware to target Android users. […]

Cybersecurity

Nearly 15,000 accounts raided at automaker sites to harvest vehicle IDs, report says

Cybercriminals appear to have deployed bots to break into customer accounts at several large automakers, then harvested important information about thousands of individual vehicles and offered it for sale in private Telegram channels, researchers said Tuesday. The evidence suggests the hackers used automated account takeover (ATO) techniques to “access to personal information as well as […]