APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector

The Hacker News Daily Updates
Newsletter
cover

Moving Past Passwords (At Last!)

7 Key Takeaways to Passwordless Authentication

Download Now Sponsored
LATEST NEWS Dec 28, 2022

BitKeep Confirms Cyber Attack, Loses Over $9 Million in Digital Currencies

Decentralized multi-chain crypto wallet BitKeep on Wednesday confirmed a cyberattack that allowed threat actors to distribute fraudulent versions of its Android app with the goal of stealing users' digital currencies. "With maliciously implanted code, the altered APK led to the leak of user's private keys and enabled the hacker to move funds," BitKeep CEO Kevin Como said, describing it as a ...

Read More
Twitter Facebook LinkedIn

APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector

Microsoft's decision to block Visual Basic for Applications (VBA) macros by default for Office files downloaded from the internet has led many threat actors to improvise their attack chains in recent months. Now according to Cisco Talos, advanced persistent threat (APT) actors and commodity malware families alike are increasingly using Excel add-in (.XLL) files as an initial intrusion ...

Read More
Twitter Facebook LinkedIn

BlueNoroff APT Hackers Using New Ways to Bypass Windows MotW Protection

BlueNoroff, a subcluster of the notorious Lazarus Group, has been observed adopting new techniques into its playbook that enable it to bypass Windows Mark of the Web (MotW) protections. This includes the use of optical disk image (.ISO extension) and virtual hard disk (.VHD extension) file formats as part of a novel infection chain, Kaspersky disclosed in a report published today. ...

Read More
Twitter Facebook LinkedIn

Facebook to Pay $725 Million to settle Lawsuit Over Cambridge Analytica Data Leak

Meta Platforms, the parent company of Facebook, Instagram, and WhatsApp, has agreed to pay $725 million to settle a long-running class-action lawsuit filed in 2018. The legal dispute sprang up in response to revelations that the social media giant allowed third-party apps such as those used by Cambridge Analytica to access users' personal information without their consent for ...

Read More
Twitter Facebook LinkedIn

GuLoader Malware Utilizing New Techniques to Evade Security Software

Cybersecurity researchers have exposed a wide variety of techniques adopted by an advanced malware downloader called GuLoader to evade security software. "New shellcode anti-analysis technique attempts to thwart researchers and hostile environments by scanning entire process memory for any virtual machine (VM)-related strings," CrowdStrike researchers Sarang Sonawane and Donato Onofri said in ...

Read More
Twitter Facebook LinkedIn

2022 Top Five Immediate Threats in Geopolitical Context

As we are nearing the end of 2022, looking at the most concerning threats of this turbulent year in terms of testing numbers offers a threat-based perspective on what triggers cybersecurity teams to check how vulnerable they are to specific threats. These are the threats that were most tested to validate resilience with the Cymulate security posture management platform between January 1st ...

Read More
Twitter Facebook LinkedIn

PrivateLoader PPI Service Found Distributing Info-Stealing RisePro Malware

The pay-per-install (PPI) malware downloader service known as PrivateLoader is being used to distribute a previously documented information-stealing malware dubbed RisePro. Flashpoint spotted the newly identified stealer on December 13, 2022, after it discovered "several sets of logs" exfiltrated using the malware on an illicit cybercrime marketplace called Russian Market. A C++-based ...

Read More
Twitter Facebook LinkedIn

W4SP Stealer Discovered in Multiple PyPI Packages Under Various Names

Threat actors have published yet another round of malicious packages to Python Package Index (PyPI) with the goal of delivering information-stealing malware on compromised developer machines. Interestingly, while the malware goes by a variety of names like ANGEL Stealer, Celestial Stealer, Fade Stealer, Leaf $tealer, PURE Stealer, Satan Stealer, and @skid Stealer, cybersecurity company ...

Read More
Twitter Facebook LinkedIn
cover

Moving Past Passwords (At Last!)

7 Key Takeaways to Passwordless Authentication

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Key phrases

Older messages

Facebook to Pay $725 Million to settle Lawsuit Over Cambridge Analytica Data Leak

Tuesday, December 27, 2022

The Hacker News Daily Updates Newsletter cover Data in Motion to Accelerate Your Mission Learn how a cohesive enterprise data strategy that fosters data movement with built-in analytics and AI can help

GuLoader Malware Utilizing New Techniques to Evade Security Software

Monday, December 26, 2022

The Hacker News Daily Updates Newsletter cover Top 10 CMMS Software for 2022--Free Analyst Report Get an expert comparison of the top computerized maintenance management system (CMMS) software.

FrodoPIR: New Privacy-Focused Database Querying System

Saturday, December 24, 2022

The Hacker News Daily Updates Newsletter cover Top 10 CMMS Software for 2022--Free Analyst Report Get an expert comparison of the top computerized maintenance management system (CMMS) software.

LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen

Friday, December 23, 2022

The Hacker News Daily Updates Newsletter cover 7 Passwordless Approaches for B2C Passwords are problematic. They are hard to remember, and they don't work well. Passwords can be guessed or leaked.

Zerobot Botnet Emerges as a Growing Threat with New Exploits and Capabilities

Thursday, December 22, 2022

The Hacker News Daily Updates Newsletter cover 7 Passwordless Approaches for B2C Passwords are problematic. They are hard to remember, and they don't work well. Passwords can be guessed or leaked.

You Might Also Like

LW 131 - Test And Debug Shopify Functions     

Tuesday, April 30, 2024

Test And Debug Shopify Functions Shopify Development news and articles Issue 131 - 04/30/2024 Read Online Liquid Weekly All Things Shopify Development Test And Debug Shopify Functions In this video we

Node.js 22; Bun 1.1.5; JSR is not a package manager

Tuesday, April 30, 2024

We have 5 links for you - Stay up-to-date on JavaScript and tools Node.js 22: require() ESM modules, --run package scripts, --watch files, fs.glob() and more nodejs.org @nodejs@social.lfx.dev

Meta is offering popular Threads users thousands of dollars in bonuses

Tuesday, April 30, 2024

The Morning After It's Tuesday, April 30, 2024. Meta is offering some creators thousands of dollars if they go viral on Threads. The payouts are part of a new invitation-only bonus program that

New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024

Tuesday, April 30, 2024

THN Daily Updates Newsletter cover Coding with AI For Dummies ($18.00 Value) FREE for a Limited Time Boost your coding output and accuracy with artificial intelligence tools Download Now Sponsored

Post from Syncfusion Blogs on 04/30/2024

Tuesday, April 30, 2024

New blogs from Syncfusion Start Using the npm Query Today: Powerful Commands for Every Developer By Osusara Kammalawatta Explore npm query commands for efficient dependency management in Node.js.

Edge 391: Autonomous Agents and LLM Function Calling

Tuesday, April 30, 2024

LLMs that invoke external functions, UC Berkeley's LLM Compiler and the Phidata framework. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

China approves Tesla FSD 🚗, GitHub Copilot Workspace 👨‍💻, Mystery chatbot appears 🤖

Tuesday, April 30, 2024

China's government has signaled its blessing for Tesla to roll out its advanced driver-assistance service in the country Sign Up |Advertise|View Online TLDR Together With Dollar Flight Club TLDR

I/O is coming, get ready

Tuesday, April 30, 2024

What's new in Google Play and Android Email not displaying correctly? View it online April 2024 Google I/O program details are now live Google I/O program details are now live Get a sneak peek at

Google and Fisker cut jobs

Monday, April 29, 2024

Plus, Getir exits most markets and real estate investors learn to Backflip View this email online in your browser By Christine Hall Monday, April 29, 2024 Happy Monday, and welcome back to TechCrunch

⌨️ You'll Want One Of These Steam Deck Keyboards — Why I Stopped Trying to Finish Games to 100%

Monday, April 29, 2024

Also: Conditional Formatting in Spreadsheets, and More! How-To Geek Logo April 29, 2024 Did You Know Babies have more bones than adults; as they age, several bones (such as the plates in the skull)