Hackers Are Using Malware to Infect Each Other’s Tools: Report

Hackers Are Using Malware to Infect Each Other’s Tools: Report
фото показано с : beincrypto.com

2020-3-11 10:15

A security researcher at Cybereason recently discovered a new malware campaign in which hacking groups are targeting each other by infecting popular hacking tools.

A recently discovered malware campaign has revealed quite an interesting development, suggesting that hackers themselves are becoming the targets of their peers. According to a recent report by Cybereason security researcher Amit Serper, hackers seem to be infecting popular hacking tools with malware.

New: Hackers are "baiting" other hackers by posting repackaged tools with malware on hacking forums. https://t.co/fznL3YgzPh

— Zack Whittaker (@zackwhittaker) March 10, 2020

The campaign has supposedly already been running for a year, even though it was only discovered recently. It also seems to be targeting a number of existing hacking tools, many of which were designed for exfiltrating data from various databases by misusing product key generators, cracks, and the like.

Such tools are being infected by a powerful remote-access trojan, as Serper reports. As soon as someone opens them, the hackers would gain full access to the targeted hacker’s device. Serper added that hackers seeking victims among their own are actively trying to infect as many others as possible by posting the repackaged tools on various hacking forums.

Hackers are targeting more than just other hackers

With that said, Serper believes that there is something else at play here, not just hackers targeting other hackers. The malicious tools are not only opening backdoors to hacker-owned computers but also to all the systems that the targeted hackers have already breached.

Serper said that this also includes offensive security researchers who are working on red team engagements.

The hackers behind the attack on other hackers remain unknown at this time. But what Serper did confirm is that they are injecting and repackaging tools with a trojan known as njRat, which provides access to files, passwords, microphones and webcams, and even entire desktops. The trojan itself is at least seven years old, dating back to 2013 when it was used against targets in the Middle East.

Serper also claims that hackers have compromised multiple websites to host hundreds of malware samples and speed up the infection of others.

The post Hackers Are Using Malware to Infect Each Other’s Tools: Report appeared first on BeInCrypto.

origin »

Bitcoin price in Telegram @btc_price_every_hour

X Real Estate Development (XRED) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 0.00 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Доступно / Всего 0 XRED

malware discovered campaign tools hackers hacking each

malware discovered → Результатов: 70


Criminals Raise the Stakes in Crypto Mining Malware Using Confluence Exploit Per Trend Micro Find

Cybercriminals are getting bolder and smarter all the time and it is hard to keep up with them, as they keep finding new exploits in several pieces of software. Now, it was recently discovered by the security intelligence company Trend Micro that the Confluence software, created by Atlassian, was used to spread crypto mining malware. […]

2019-5-8 02:30


New Malware, Shellbot Revealed, with the Ability to Create Crypto Using Others’ Resources, Be Aware

On Wednesday, May 1, 2019, security-focused firm, Threat Stack disclosed the findings of a relatively new malware called Shellbot to TechCrunch. As per the claims made, Shellbot – which was first discovered on an unnamed US firm’s server – has the ability to infect computers with Linux servers that carry easy-to-break into passwords, and then […]

2019-5-2 01:53


New Mac Malware Can Steal Crypto from Exchanges, Can it be Prevented?

Unit 42, the global threat intelligence team at Palo Alto Network, discovered Mac malware that can steal cookies linked to crypto exchanges and wallets. Although usernames and passwords may not be sufficient to initiate withdrawals at crypto exchanges, if hackers manage to steal a combination of login credentials, web cookies, authentication cookies, and SMS data, it could steal user funds.

2019-2-2 21:32


Фото:

Watch out for this new cryptocurrency ransomware stalking the web

Researchers have discovered “Anatova”, a brand new family of cryptocurrency-fuelled ransomware, and they warn it has the potential to become outright dangerous. Cybersecurity firm McAfee explained Anatova hides in seemingly innocuous icon files – usually the same popular games or applications – in order to fool the user into downloading the malware.

2019-1-23 19:58


Фото:

Cryptocurrency mining malware has become self-aware (kinda)

A common form of cryptocurrency mining malware has evolved and is now able to switch off security services to continue mining without being detected. Security researchers at Palo Alto Networks’ Unit 42 discovered that the malware used by cryptojacking group “Rocke” is able to gain administrative privileges to Linux-based cloud servers and uninstall vital security programs.

2019-1-17 18:18


Фото:

Switzerland: Trojan horses are evolving to target cryptocurrency exchanges

A computer virus that mines the anonymous cryptocurrency Monero has been ranked as the sixth most significant malware to hit Switzerland in the first half of this year. Swiss researchers also discovered that cybersecurity threats once focused on breaking into online banking services have pivoted to more efficiently attack cryptocurrency exchanges.

2018-11-8 19:33


Фото:

Mac Cryptocurrency Price Tracking App Installs Backdoors to Control Host Computer

A Trojan pretending to be a macOS cryptocurrency ticker called CoinTicker was discovered installing backdoors on the computers of unsuspecting users, Bleeping Computer reported on October 29, 2018. Mac Cryptocurrency Price Tracker Caught Installing Backdoors Dozens of cybersecurity publications sounded the alarm over another cryptocurrency malware that was discovered on October 29, after a Malwarebytes forum user reported a trojan.

2018-10-31 18:00


Фото:

Research: New Botnet Scanning the Web to Shut Down Illicit Cryptominers

Chinese security researchers from Qihoo 360 Netlab have discovered a savvy botnet that destroys illicit crypto mining malware rather than hacking victims’ PCs for its benefit. The Benevolent ‘Cryptojacker’ The botnet, called Fbot, is based on the Satori Mirai program, which is typically used for DDoS attacks, according to Bleeping Computer, who first reported the news […] The post Research: New Botnet Scanning the Web to Shut Down Illicit Cryptominers appeared first on CryptoSlate.

2018-9-21 22:00


Фото:

Hackers Recycle old Ransomware for new Crypto Malware

Cybersecurity experts at Fortinet and Kaspersky have discovered new cryptocurrency malware that has been developed using updated versions of known ransomware according to September 5, 2018, reports. Cryptojacking Malware If you have been following blockchain media, you will be aware of the aggressive surge in cryptocurrency mining malware that allows hackers to implement code into a website that mines cryptocurrency...The post %%POSTLINK%% appeared first on %%BLOGLINK%%.

2018-9-10 19:00


New Mining Malware threatens crypto-world – ZombieBoy

Earlier this week, the presence of a new crypto mining malware was discovered named ZombieBoy. This malware started mining initially at $1000 per month. The existence of this threat was revealed by a Private security researcher, James Quinn Tweet by Latest Hacking News: “ZombieBoy: New Crypto-Mining Malware Exploits Multiple CVEs” ZombieBoy was named after its use […]

2018-8-4 20:57


PowerGhost, the latest Cryptomining malware discovered by Kaspersky

Kaspersky researchers have recently discovered a new cryptojacking campaign named PowerGhost that aims at infecting corporate networks worldwide in order to generate maximum mining profits. Cryptomining malware refers to software programs and malware components that are developed to forcefully take over a computer’s resources and adopt them for cryptocurrency mining without a user’s approval. The cryptojacking […]

2018-7-29 04:55


Monero [XMR] mining malware Coinhive takes another victim, League of Legends infected

Players of the popular internet game, League of Legends have fallen prey to a malicious software that programs their system to involuntarily mine Monero [XMR]. A Reddit user named Lestergonzaga discovered this through the Garena server, where many players all around the world have been mining Monero without their knowledge. The mining process took place […]

2018-7-22 02:28


MacOS-пользователи становятся жертвами хакеров в крипточатах в Slack и Discord

Ряд специалистов по кибербезопасности предупредили MacOS-пользователей о новом вредоносном ПО, которое может поразить их компьютеры через посвященные криптовалютам обсуждения в Slack и Discord. @patrickwardle @remco_verhoef @MalwarePatrol @MalwareMustDie @Malwageddon @malwrhunterteam @_odisseus @objective_see Recently discovered #OSX.

2018-7-3 23:40