Hackers Are Using Malware to Infect Each Other’s Tools: Report

Hackers Are Using Malware to Infect Each Other’s Tools: Report
фото показано с : beincrypto.com

2020-3-11 10:15

A security researcher at Cybereason recently discovered a new malware campaign in which hacking groups are targeting each other by infecting popular hacking tools.

A recently discovered malware campaign has revealed quite an interesting development, suggesting that hackers themselves are becoming the targets of their peers. According to a recent report by Cybereason security researcher Amit Serper, hackers seem to be infecting popular hacking tools with malware.

New: Hackers are "baiting" other hackers by posting repackaged tools with malware on hacking forums. https://t.co/fznL3YgzPh

— Zack Whittaker (@zackwhittaker) March 10, 2020

The campaign has supposedly already been running for a year, even though it was only discovered recently. It also seems to be targeting a number of existing hacking tools, many of which were designed for exfiltrating data from various databases by misusing product key generators, cracks, and the like.

Such tools are being infected by a powerful remote-access trojan, as Serper reports. As soon as someone opens them, the hackers would gain full access to the targeted hacker’s device. Serper added that hackers seeking victims among their own are actively trying to infect as many others as possible by posting the repackaged tools on various hacking forums.

Hackers are targeting more than just other hackers

With that said, Serper believes that there is something else at play here, not just hackers targeting other hackers. The malicious tools are not only opening backdoors to hacker-owned computers but also to all the systems that the targeted hackers have already breached.

Serper said that this also includes offensive security researchers who are working on red team engagements.

The hackers behind the attack on other hackers remain unknown at this time. But what Serper did confirm is that they are injecting and repackaging tools with a trojan known as njRat, which provides access to files, passwords, microphones and webcams, and even entire desktops. The trojan itself is at least seven years old, dating back to 2013 when it was used against targets in the Middle East.

Serper also claims that hackers have compromised multiple websites to host hundreds of malware samples and speed up the infection of others.

The post Hackers Are Using Malware to Infect Each Other’s Tools: Report appeared first on BeInCrypto.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

X Real Estate Development (XRED) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 0.00 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Доступно / Всего 0 XRED

malware discovered campaign tools hackers hacking each

malware discovered → Результатов: 70


Cybercriminals are targeting healthcare companies with phishing campaigns to steal sensitive data

Healthcare providers are facing an unprecedented level of social engineering-driven malware threats, according to new research. The findings — disclosed by California-based enterprise security solutions provider Proofpoint US — discovered at least 77 percent of email attacks on the medical sector during the first three months of 2019 involved the use of malicious links.

2019-10-9 19:00


Newly Discovered Spyware Uses Telegram Bots to Steal Cryptocurrency from a Number of Wallets

Jupiter Threat Labs recently released a report about a newly discovered commercial spyware called “Masad Clipper and Stealer.” It uses Telegram bots as its command and control (C2) to phish information from Windows and Android users, along with the capability to steal cryptocurrency from unsuspecting victims, while dumping more malware on their devices. The report […]

2019-9-28 00:30


Фото:

Nasty Glupteba malware uses Bitcoin blockchain to keep itself alive

Cybersecurity researchers have discovered a new strain of the nefarious Glupteba malware that uses the Bitcoin blockchain to ensure it remains dangerous. TrendMicro’s latest blog details the previously undocumented variant which is capable of invading systems to mine Monero cryptocurrency and steal sensitive browser data like passwords and cookies.

2019-9-4 17:09


Criminals Raise the Stakes in Crypto Mining Malware Using Confluence Exploit Per Trend Micro Find

Cybercriminals are getting bolder and smarter all the time and it is hard to keep up with them, as they keep finding new exploits in several pieces of software. Now, it was recently discovered by the security intelligence company Trend Micro that the Confluence software, created by Atlassian, was used to spread crypto mining malware. […]

2019-5-8 02:30


New Malware, Shellbot Revealed, with the Ability to Create Crypto Using Others’ Resources, Be Aware

On Wednesday, May 1, 2019, security-focused firm, Threat Stack disclosed the findings of a relatively new malware called Shellbot to TechCrunch. As per the claims made, Shellbot – which was first discovered on an unnamed US firm’s server – has the ability to infect computers with Linux servers that carry easy-to-break into passwords, and then […]

2019-5-2 01:53


New Mac Malware Can Steal Crypto from Exchanges, Can it be Prevented?

Unit 42, the global threat intelligence team at Palo Alto Network, discovered Mac malware that can steal cookies linked to crypto exchanges and wallets. Although usernames and passwords may not be sufficient to initiate withdrawals at crypto exchanges, if hackers manage to steal a combination of login credentials, web cookies, authentication cookies, and SMS data, it could steal user funds.

2019-2-2 21:32


Фото:

Watch out for this new cryptocurrency ransomware stalking the web

Researchers have discovered “Anatova”, a brand new family of cryptocurrency-fuelled ransomware, and they warn it has the potential to become outright dangerous. Cybersecurity firm McAfee explained Anatova hides in seemingly innocuous icon files – usually the same popular games or applications – in order to fool the user into downloading the malware.

2019-1-23 19:58


Фото:

Cryptocurrency mining malware has become self-aware (kinda)

A common form of cryptocurrency mining malware has evolved and is now able to switch off security services to continue mining without being detected. Security researchers at Palo Alto Networks’ Unit 42 discovered that the malware used by cryptojacking group “Rocke” is able to gain administrative privileges to Linux-based cloud servers and uninstall vital security programs.

2019-1-17 18:18


Фото:

Switzerland: Trojan horses are evolving to target cryptocurrency exchanges

A computer virus that mines the anonymous cryptocurrency Monero has been ranked as the sixth most significant malware to hit Switzerland in the first half of this year. Swiss researchers also discovered that cybersecurity threats once focused on breaking into online banking services have pivoted to more efficiently attack cryptocurrency exchanges.

2018-11-8 19:33