Posts

Showing posts from June, 2022

Kubernetes instances found exposed online SEC ARTIC .V2

Image
  Over 900,000 Kubernetes instances were found exposed online                       Over 900,000 misconfigured Kubernetes clusters were found exposed on the internet to potentially malicious scans, some even vulnerable to data-exposing cyberattacks. Kubernetes is a highly versatile open-source container orchestration system for hosting online services and managing containerized workloads via a uniform API interface. It enjoys  massive adoption  and growth rates thanks to its scalability, flexibility in multi-cloud environments, portability, cost, app development, and system deployment time reductions. Finding exposed Kubernetes Researchers at  Cyble  have conducted an exercise to locate exposed Kubernetes instances across the internet, using similar scanning tools and search queries to those employed by malicious actors. The results show a massive 900,000 Kubernetes servers, with 65% of them (585,000) being located in the United States, 14% in China, 9% in Germany, while Netherlands an

Black Basta Ransomware Teams Up with Malware Stalwart Qbot by SEC ARTIC .V1

Image
  The novel cybercriminal group tapped the ever-evolving info-stealing trojan to move laterally on a network in a recent attack, researchers have found. A newcomer on the ransomware scene has coopted a 14-year-old malware variant to help it maintain persistence on a targeted network in a recent attack, researchers have found. Black Basta, a ransomware group that emerged in April, leveraged Qbot, (a.k.a. Quakbot), to move laterally on a compromised network, researchers from security consulting firm NCC Group wrote in a blog post published this week. Researchers also observed in detail how Black Basta operates. “Qakbot was the primary method utilized by the threat actor to maintain their presence on the network,” NCC Group’s Ross Inman and Peter Gurney wrote in the post. Qbot emerged in 2008 as a Windows-based info-stealing trojan capable of keylogging, exfiltrating cookies, and lifting online banking details and other credentials. Since then it has stood the test of time through constan

8 COMMON HACKING TECHNIQUES THAT EVERY Tech And Business Persons KNOW ABOUT SEC ARTIC .V2

Image
  Phishing. Phishing is the most common hacking technique. Attackers can trick you into visiting malicious sites using trusted marketing methods such as paid-for advertising on websites. When websites sell advertising space, it can be purchased by rogue attackers. The bona fide advertisement can be replaced with a ‘bad’ link that can be used to download malware, lock up your browser, or compromise your systems. Alternatively, the advertisement may link to a legitimate website, but it will be programmed to redirect you to a harmful site. Key Logger.  Key logger or Keystroke logging often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. Sign of a keylogger attack is  Signs a keylogger is monitoring your device including  slow Internet performance, interru