Skip to main content

Security

Hackers attack Apex Legends players in live tournament

posted onMarch 19, 2024
by l33tdawg
Credit: PC World

Accusations of cheating or “hax” tend to be flung around a lot in online shooter games. But for two high-level competitors in the Apex Legends battle royal, the cheating was both indisputable…and apparently completely unwanted. Evidence of multiple hacking attacks on players during a live-streamed tournament has the community reeling.

Chinese APT 'Earth Krahang' Compromises 48 Gov't Orgs

posted onMarch 19, 2024
by l33tdawg
Credit: Dark Reading

A previously unidentified Chinese espionage group has managed to breach at least 70 organizations across 23 countries, including 48 in the government space, despite using rather standard-fare tactics, techniques, and procedures (TTPs).

A new macOS backdoor could let hackers hijack your device without you knowing

posted onMarch 15, 2024
by l33tdawg
Credit: Flickr

A new malware variant has been uncovered targeting Apple’s macOS devices, experts have warned.

A report from Greg Lesnewich, Senior Threat Researcher at Proofpoint, who described the malware in more detail in a technical writeup here, notes the malware is called SpectralBlur, and is a “moderately capable” piece of code. It can upload, download, or delete files, run shell commands, and sleep and hibernate, he further explained.

Hackers can read private AI-assistant chats even though they’re encrypted

posted onMarch 15, 2024
by l33tdawg
Credit: Arstechnica

AI assistants have been widely available for a little more than a year, and they already have access to our most private thoughts and business secrets. People ask them about becoming pregnant or terminating or preventing pregnancy, consult them when considering a divorce, seek information about drug addiction, or ask for edits in emails containing proprietary trade secrets.

Teslas Can Be Stolen by Hijacking WiFi at Charging Stations, Researchers Find

posted onMarch 12, 2024
by l33tdawg
Credit: Wired

Researchers have found that hackers could easily hijack WiFi networks at Tesla charging stations to steal vehicles — a glaring cybersecurity vulnerability that only requires an affordable, off-the-shelf tool.

As Mysk Inc. security researchers Tommy Mysk and Talal Haj Bakry demonstrated in a recent YouTube video — as first reported spotted by Gizmodo — hackers only need a simple $169 hacking tool called Flipper Zero, a Raspberry Pi, or a laptop to pull it off.

Japan Blames North Korea for PyPI Supply Chain Cyberattack

posted onMarch 11, 2024
by l33tdawg
Credit: Dark Reading

Japanese cybersecurity officials warned that North Korea's infamous Lazarus Group hacking team recently waged a supply chain attack targeting the PyPI software repository for Python apps.

Threat actors uploaded tainted packages with names such as "pycryptoenv" and "pycryptoconf" -- similar in name to the legitimate "pycrypto" encryption toolkit for Python. Developers who get tricked into downloading the nefarious packages onto their Windows machines are infected with a dangerous Trojan known as Comebacker.

BlackCat hacker group methods exposed by Israeli cybersecurity firm

posted onMarch 11, 2024
by l33tdawg
Credit: Flickr

The Israeli cybersecurity company, Sygnia, revealed new details about a group of hackers known as BlackCat. First active in November 2021, the group focuses on attacking high-profile multi-sector and international organizations. Sygnia investigated this suspicious activity on BlackCat's network, which was eventually identified as a financial extortion attack that included a massive information leak.

Hackers abuse QEMU to covertly tunnel network traffic in cyberattacks

posted onMarch 8, 2024
by l33tdawg
Credit: Bleeping Computer

Malicious actors were detected abusing the open-source hypervisor platform QEMU as a tunneling tool in a cyberattack against a large company. QEMU is a free emulator and hypervisor that allows you to run other operating systems as guests on a computer.

As part of the attack, threat actors used QEMU to create virtual network interfaces and a socket-type network device to connect to a remote server. This allowed the threat actors to create a network tunnel from the victim's system to the attacker's server with negligible impact on system performance.