Tech Nuggets with Technology: This Blog provides you the content regarding the latest technology which includes gadjets,softwares,laptops,mobiles etc
Monday, March 9, 2020
MPSC 2020 – Asst Motor Vehicle Inspector Prelims Admit Card Download
GSECL Result 2020 – Vidyut Sahayak (Jr Engineer & Asst) Provisional Result & Final Key Released
GSECL 2020 – Vidyut Sahayak (Jr Engineer & Asst) Provisional Result & Final Key Released
Nagaland PSC 2020 – NCS, NPS, NSS & Allied Services Revised Prelims Answer Key Released
Holi 2020: Five Free Apps To Help Brighten Up Your Celebrations
Apple sells fewer than 500,000 smartphones in China in February amid coronavirus
Samsung Display asks Vietnam not to quarantine 700 engineers from virus-hit South Korea
Coronavirus : Apple reopens 90% of retail stores in China
Hackers are targeting other hackers by infecting their tools with malware
A newly discovered malware campaign suggests that hackers have themselves become the targets of other hackers, who are infecting and repackaging popular hacking tools with malware.
Cybereason’s Amit Serper found that the attackers in this years-long campaign are taking existing hacking tools — some of which are designed to exfiltrate data from a database through to cracks and product key generators that unlock full versions of trial software — and injecting a powerful remote-access trojan. When the tools are opened, the hackers gain full access to the target’s computer.
Serper said the attackers are “baiting” other hackers by posting the repackaged tools on hacking forums.
But it’s not just a case of hackers targeting other hackers, Serper told TechCrunch. These maliciously repackaged tools are not only opening a backdoor to the hacker’s systems, but also any system that the hacker has already breached.
“If hackers are targeting you or your business and they are using these trojanized tools it means that whoever is hacking the hackers will have access to your assets as well,” Serper said.
That includes offensive security researchers working on red team engagements, he said.
Serper found that these as-yet-unknown attackers are injecting and repackaging the hacking tools with njRat, a powerful trojan, which gives the attacker full access to the target’s desktop, including files, passwords, and even access to their webcam and microphone. The trojan dates back to at least 2013 when it was used frequently against targets in the Middle East. njRat often spreads through phishing emails and infected flash drives, but more recently hackers have injected the malware on dormant or insecure websites in an effort to evade detection. In 2017, hackers used this same tactic to host malware on the website for the so-called Islamic State’s propaganda unit.
Serper found the attackers were using that same website-hacking technique to host njRat in this most recent campaign.
According to his findings, the attackers compromised several websites — unbeknownst to their owners — to host hundreds of njRat malware samples, as well as the infrastructure used by the attackers to command and control the malware. Serper said that the process of injecting the njRat trojan into the hacking tools occurs almost daily and may be automated, suggesting that the attacks are run largely without direct human interaction.
It’s unclear for what reason this campaign exists or who is behind it.
Here's How to Restore Your Disabled iPhone or iPad
Iran's official app for tracking COVID-19 infections removed from Play Store; sources: app was likely removed due to misleading claims about detecting COVID-19 (Catalin Cimpanu/ZDNet)
Catalin Cimpanu / ZDNet:
Iran's official app for tracking COVID-19 infections removed from Play Store; sources: app was likely removed due to misleading claims about detecting COVID-19 — Google removes Iran's official COVID-19 detection app from the Play Store. — Google has removed today an Android app …
Ed-tech firms go on hiring spree, look at creating 3,000 new jobs next year
Transport experts want BMTC to act like an aggregator and not a mere operator
Smartphone companies warn India of looming WTO probe into duty format
PE firm Everstone combines India's Wingify, which helps A/B test sites, and France's AB Tasty, which improves e-commerce UX; Everstone bought Wingify for $200M (Jagmeet Singh/TechCrunch)
Jagmeet Singh / TechCrunch : PE firm Everstone combines India's Wingify, which helps A/B test sites, and France's AB Tasty, which...
-
http://bit.ly/2XqNIDz
-
Amrith Ramkumar / Wall Street Journal : An interview with White House OSTP Director Michael Kratsios, a Peter Thiel protégé confirmed by ...