Microsoft’s Exchange Server software has been hacked by China-based threat actors to gain access to the network of at least 30,000 organisations across the US, including govt and commercial firms. Four vulnerabilities in the email software were exploited by hackers to access email accounts and install malware. Microsoft has released several security updates to fix these bugs and is advising the customers to install those immediately.
National Power Grid took all possible measures to protect its network from hacking by Chinese state-backed hackers when CERT-In in Nov detected ShadowPad malware, one of the largest supply chain vector. The national grid operator and its other units were alerted about the malware along with the possibility of a cyberattack. In Feb, another cybersecurity agency detected an attempt by Red Echo, a Chinese group, trying to break into the grid control system.
With clients investing heavily in network defences after the sophisticated cyber-attack by suspected Russian hackers that uncovered vulnerabilities in software supply chains, Palo Alto Networks reported its first $1 bn quarter of revenue. Sales escalated by 25% to $1.02 bn, according to Bloomberg, which is the biggest YOY increase in seven quarters. Over 18,000 SolarWinds clients were exposed to Russian malware in the recent past.
The world’s most dangerous malware botnet ‘Emotet’ has been taken down by a collective operation, which lasted for over two years. The botnet first appeared in 2014 as a banking Trojan to become one of the most powerful malware ever created. The global participation to take down Emotet involved Europol, UK’s National Crime Agency, FBI, and law enforcement of six countries were involved in the operation to take down Emotet.
A new cybersecurity report said that 13,733 malware threats were detected every hour in 2020, with Trojan leading the YoY and QoQ charts followed by other malware. Seqrite, the enterprise security solutions brand by Quick Heal Technologies, in a report said that a total number of 113 mn malware were detected in 2020, the first quarter clocked the highest at 36 mn detections, with January witnessing maximum malware attacks.
Kaspersky has discovered new banking malware called Ghimob, which can spy and steal data from 153 Android apps including banking. The malware, using names like Google Docs, WhatsApp Updater, Google Defender, can be hidden inside malicious apps available on third-party app downloads or shared via email. Users in Brazil are the most targeted followed by India, China, US. It blocks the user from uninstalling it, restarting or shutting down the device.
A new variant of InterPlanetary Storm malware is targeting IoT devices – TVs, routers with ill configured SSH service etc – that run on Android, Mac, Linux and Windows OS in 84 countries, mainly southeast Asian such as China, HongKong, S Korea and Taiwan; Indian IoT devices haven’t been much on radar. The malware detects computer security mechanism, honeypots, auto-updates itself and tries to persist in the system by killing machine processes like debuggers.
All Good PDF Scanner; Mint Leaf Message-Your Private Message; Unique Keyboard – Fancy Fonts & Free Emoticons; Tangram App Lock; Direct Messenger; Private SMS; One Sentence Translator – Multifunctional Translator; Style Photo Collage; Meticulous Scanner; Desire Translate; Talent Photo Editor – Blur focus; Care Message; Part Message; Paper Doc Scanner; Blue Scanner; Hummingbird PDF Converter – Photo to PDF; All Good PDF Scanner.
Quick Heal Technologies said it had seen over 143M malware attacks in Q2 2020. Trickbot proved to be an active distributor for multiple malwares through phishing emails. Malware clocked 38% of the total Android detections in this quarter. Quick Heal found malicious apps that looked 100% authentic but infected consumers mobile phones; fake Aarogya Setu app took the lead in this section. June had the highest number of Windows malware detection.