Hackerzhome

hackerzhome-logo-bg

Cybersecurity news all over the world

HACKERZHOME NEWS

May 19, 2023

Friday

KeePass attack helps recover the master password in cleartext; a patch is on the way

The well-known password manager KeePass has a flaw that makes it possible to extract the master password from the program’s memory, giving hackers who get access to the device access to the password even while the database is protected.


The flaw was found by security researcher ‘vdohney,’ who released a proof-of-concept (PoC) program that allowed attackers to get the KeePass master password from memory.


Users may generate different passwords for each online account with the help of password managers, which can then store the login information in a password vault or database for quick access.

Users must keep in mind the single master password required to open the password vault and get access to the stored credentials in order for it to be properly secured.


The KeePass password database is encrypted by this master password, making it impossible to access or read it without first inputting the password.

A threat actor, however, can access all the credentials kept in the database if the master password is hacked.


Therefore, it is crucial that users maintain the master password and never divulge it to anyone else in order for a password manager to be adequately secured.


The KeePass master password can be recovered in cleartext form, with the exception of the first one or two characters, thanks to a recent vulnerability identified as CVE-2023-3278, regardless of whether the KeePass workspace is locked or perhaps even if the program is closed.

NEWS 1
KeePass attack helps recover the master password in cleartext; a patch is on the way

Breaking news

LIVE

You are not up to date!

Subscribe to our newsletter and stay updated on cybersecurity news

Malware is pre-installed on millions of Android handsets by a cybercrime ring.

Nearly 9 million Android-based smartphones, watches, TVs, and TV boxes apparently have ‘Guerilla’ malware pre-installed by a sizable criminal organization known as the “Lemon Group.”

A guerilla is a tool used by threat actors to do a variety of tasks, including loading extra payloads, intercepting SMS-based one-time passwords, setting up a reverse proxy from the infected device, stealing WhatsApp sessions, and more.

Some of the infrastructure used by the attackers is similar to the Triada trojan operation from 2016, claims research from Trend Micro, whose investigators found the vast criminal business and detailed it at the recent BlackHat Asia conference.

A banking malware called Triada was discovered pre-installed in 42 Android smartphone models made by low-end Chinese companies that export their goods worldwide.

Although Trend Micro made it clear that the devices its researchers had looked at had been re-flashed with new ROMs, the company has not explained how Lemon Group infects devices with the malicious software carrying Guerilla.

NEWS 2

For placing advertisements and promotions in this newspaper, or anywhere on our website, contact us through email at [email protected] or fill out this contact form.

Share this news:

May 19, 2023 /

Friday

Hackerzhome News

2

Have you heard?
Among Cybersecurity Professionals, New ZIP Domains Cause Discussion know more!

A teenager is accused of hacking 60,000 DraftKings gambling accounts.

A teenager is accused of hacking 60,000 DraftKings gambling accounts.

According to information released by the Department of Justice today, Wisconsin-born 18-year-old Joseph Garrison was accused with breaking into the accounts of over 60,000 customers of the DraftKings sports betting website in November 2022.

The suspect allegedly entered the accounts using a long list of credentials obtained from earlier breaches, according to the lawsuit. The purchasers of the accounts he later sold on him took almost $600,000 from over 1,600 hacked accounts.

In order to enable the buyers of the stolen accounts to withdraw all funds, Garrison and his accomplices came up with a scheme that required them to add a new payment method to the compromised accounts, deposit a small amount ($5) through it to confirm its legitimacy, and then withdraw all funds from the victims’ accounts and transfer them to a different bank account under their control.

Law authorities discovered tools used in credential-stuffing assaults, such as OpenBullet and SilverBullet, which need specific “config” files for each targeted website, during a search of Garrison’s home in February 2023.

On the suspect’s computer, there were almost 700 configuration files for many business websites, including 11 different ones for the betting website that was targeted in November.

NEWS 3

Apple Rejects 1.7 Million App Submissions and Stops $2 Billion in App Store Fraud

Apple Rejects 1.7 Million App Submissions and Stops $2 Billion in App Store Fraud
NEWS 4

Apple reported that in 2022, it stopped over $2 billion in transactions that may have been fraudulent and rejected almost 1.7 million app applications for privacy and security concerns.

The computer behemoth claimed to have deleted 282 million fake consumer accounts and terminated 428,000 developer accounts due to alleged fraudulent activities. It said that it prevented the formation of 198 million attempted fraudulent new accounts.

In comparison, it is predicted that Apple will have terminated 802,000 developer accounts in 2021. The decrease was ascribed by the business to new App Store “methods and protocols” that forbid the initial establishment of such accounts.

More than 147 million fake ratings and reviews on the App Store were found and stopped in 2022, and over the past 30 days alone, Apple has stopped about 3.9 million attempts to download or run programs obtained illegally through its Developer Enterprise Programmer.

Cupertino also emphasized that it barred 714,000 accounts from making transactions again and prevented roughly 3.9 million stolen credit cards from being used to make unauthorized purchases. In all, fraudulent App Store transactions of $2.09 billion were stopped in 2022.

Microsoft provides further information regarding the demise of Internet Explorer.

Customers will be able to pick when Internet Explorer 11 (IE11) will be completely erased from their devices according to a decision made by Microsoft.

This follows the February 14th Microsoft Edge upgrade that caused IE11 to be disabled on select Windows 10 devices.

Additionally, it is in response to earlier notices from June and December 2022 that a Windows upgrade will completely deactivate the old web browser.

Microsoft had initially planned to remove all IE11 visual references (including icons on the taskbar and the Start Menu), with the May non-security preview release scheduled for May 23.

The discontinuation of IE11 support in Windows 10 and Microsoft 365 in August 2020 was initially announced by Microsoft. In May 2021, about a year after the employee had officially announced his retirement, the corporation finally did so.

Starting in October 2020, IE11 will launch Microsoft Edge whenever it encounters an incompatible website.

Microsoft provides further information regarding the demise of Internet Explorer.
NEWS 5

For placing advertisements and promotions in this newspaper, or anywhere on our website, contact us through email at [email protected] or fill out this contact form.

Share this news: