Hacking

Pierluigi Paganini December 17, 2019
Dacls RAT, the first Lazarus malware that targets Linux devices

Researchers spotted a new Remote Access Trojan (RAT), dubbed Dacls, that was used by the Lazarus APT group to target both Windows and Linux devices. Experts at Qihoo 360 Netlab revealed that the North-Korea Lazarus APT group used a new Remote Access Trojan (RAT), dubbed Dacls, to target both Windows and Linux devices. The activity […]

Pierluigi Paganini December 17, 2019
TP-Link Archer routers allow remote takeover without passwords

TP-Link has addressed a critical vulnerability impacting some TP-Link Archer routers that could allow attackers to login without passwords. TP-Link addressed a critical zero-day vulnerability (CVE-2017-7405) in its TP-Link Archer routers that could be exploited by attackers to remotely take their control over LAN via a Telnet connection without authentication. “This is a zero-day flaw that was […]

Pierluigi Paganini December 17, 2019
Online Retailer LightInTheBox exposes unsecured DB containing 1.3TB of web server logs

vpnMentor researchers discovered an unsecured server belonging to the Chinese e-store LightInTheBox.com containing 1.3TB of web server logs. Infosec researchers have uncovered an unsecured Elasticsearch database containing 1.3TB of web server log entries held by Chinese e-commerce website LightInTheBox.com. LightInTheBox is a Chinese online retailer trading on the New York Stock Exchange, most of its […]

Pierluigi Paganini December 17, 2019
A study reveals the list of worst passwords of 2019

Another year is ending and this is the right time to discover which are the worst passwords of 2019 by analyzing data leaked in various data breaches. Independent anonymous researchers, compiled and shared with security firm NordPass a list of 200 most popular passwords that were leaked in data breaches during 2019. The company collected […]

Pierluigi Paganini December 15, 2019
From iPhone to NT AUTHORITY\SYSTEM – exploit ‘Printconfig’ dll with a real-world example

From iPhone to NT AUTHORITY\SYSTEM – As promised in my previous post, I will show you how to exploit the “Printconfig” dll with a real world example. But what does Apple’s iPhone have to do with it?? Well, keep on reading… (sorry  no) Some time ago, me and my “business partner”  @padovah4ck, were looking for possible privileged […]

Pierluigi Paganini December 15, 2019
Iran announced to have foiled a second cyber-attack in a week

Iran telecommunications minister announced that for the second time in a week Iran has foiled a cyber attack against its infrastructure. Iran has foiled a new cyber-attack, the country’s telecommunications minister Mohammad Javad Azari-Jahromi says. A few days ago, the Iranian telecommunications minister Mohammad Javad Azari Jahromi, announced that the Islamic Republic had recently thwarted […]

Pierluigi Paganini December 15, 2019
Security Affairs newsletter Round 244

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs SEC Xtractor – Experts released an open-source hardware analysis tool US authorities charged Dridex gang members for stealing over $100 Million A bug in the decryptor for the Ryuk ransomware could cause data loss China 3-5-2 directive orders […]

Pierluigi Paganini December 14, 2019
A malvertising campaign targets iPhone users with Krampus-3PC

A malvertising campaign that involved more than 100 publisher websites targeted iPhone users to deliver the Smart Krampus-3PC Malware. According to The Media Trust’s Digital Security & Operations (DSO) team, iPhone users have been targeted by a malvertising campaign that has impacted more than 100 publisher websites, including online newspapers and international weekly news magazines. […]

Pierluigi Paganini December 14, 2019
Rooster Teeth Productions suffered a payment card breach

Rooster Teeth Productions has suffered a data breach that exposed payment card information from shoppers on the company’s online store. The popular production company Rooster Teeth Productions has suffered a data breach, hackers have stolen credit card and other payment data from users that made purchases on the company’s online store. Rooster Teeth Productions, LLC is […]

Pierluigi Paganini December 13, 2019
A flaw in outdated versions of Beaver Builder and Elementor plugins allows hacking WordPress sites

WordPress sites running outdated versions of “Ultimate Addons for Beaver Builder,” or “Ultimate Addons for Elementor” plugins are exposed to hack. Security experts from MalCare discovered a critical easy-to-exploit authentication bypass vulnerability in “Ultimate Addons for Beaver Builder,” or “Ultimate Addons for Elementor.” The vulnerability resides in the way the plugins let WordPress account holders, […]