Cybersecurity

Automating Pikabot’s String Deobfuscation

Technical Analysis Strings obfuscation The steps for decrypting a Pikabot string are relatively simple. Each string is decrypted only when required (in other words, Pikabot does not decrypt all strings at once). Pikabot follows the steps below to decrypt a string: Pushes on the stack the encrypted string array. Initializes the RC4 encryption algorithm. The […]

Cybersecurity

Airbnb scammers pose as hosts, redirect users to fake Tripadvisor site – Help Net Security

Scammers on Airbnb are faking technical issues and citing higher fees to get users to a spoofed Tripadvisor website and steal their money. The Airbnb scam Malwarebytes researchers came across the Airbnb scam when trying to book an apartment through the platform. The owner/scammer noted in the listing that those interested in booking the property […]

Cybersecurity

Zloader: No Longer Silent in the Night

Technical Analysis In the following sections, we dive into the technical details surrounding Zloader’s new updates to their anti-analysis techniques, embedded configuration, DGA, and network encryption. Anti-analysis techniques Zloader uses a combination of API import hashing, junk code, a filename check, and string obfuscation. The following sections analyze each technique. Imports and API resolution The […]

Cybersecurity

IBM Says 631K Affected in Johnson & Johnson Database Breach

Cybercrime , Fraud Management & Cybercrime , Governance & Risk Management IBM Blames ‘Technical Method’ for Allowing Unauthorized Access to Patient Info Marianne Kolbasuk McGee (HealthInfoSec) • October 17, 2023     IBM said nearly 631,000 individuals are affected by a recent database incident involving Johnson & Johnson’s Janssen CarePath service. (Image: IBM, J&J) IBM […]

Cybersecurity

Latest fraud schemes targeting the payments ecosystem – Help Net Security

Threat actors continued to exploit technical misconfigurations through various fraud schemes, according to a new report from Visa. These include the use of malvertising and search engine optimization (SEO) techniques to cultivate compelling and effective phishing and social engineering campaigns, the utilization of emerging advanced language model (ALM) technologies, and the increased targeting of authentication […]