Hackerzhome

hackerzhome-logo-bg

Cybersecurity news all over the world

HACKERZHOME NEWS

March 27, 2023

Monday

For the Windows Snipping tool issue, Microsoft provides OOB security fixes.

To address the Acropalypse privacy issue, Microsoft provided an urgent security upgrade the Windows 10 and 11 for Windows Snipping tools.


The Acropalypse issue, which is currently tracked as CVE-2023-28303, results from picture editors failing to correctly remove cropped image data while overwriting the original file.


For instance, you should expect that when a snapshot is stored, any sensitive data you have cropped out, like account details, will be removed.


Nevertheless, it was discovered that due to this flaw, the cropped data was kept in the original file by both the Windows Snipping Tool and the Markup Tool for the Google Pixel.


The cropped image content could be partially recovered using this additional information, perhaps revealing private information that wasn’t intended for public consumption.


there may be a large number of publicly available photographs compromised by this problem, with VirusTotal alone hosting over 4,000 images.


As a result, there are probably many more Acropalypse-affected photos on image-hosting services.

NEWS 1
For the Windows Snipping tool issue, Microsoft provides OOB security fixes.

Breaking news

LIVE

You are not up to date!

Subscribe to our newsletter and stay updated on cybersecurity news

Emotet virus is transmitted as fake IRS W-9 tax documents.

A fresh Emotet phishing attack pretends to be W-9 tax paperwork delivered by your employer and the Federal Revenue Service in order to target US taxpayers.

A well-known malware outbreak called Emotet was previously delivered by phishing emails that included Microsoft Word and Excel documents that had malicious macros that installed the malware.

Emotet moved to exploit Microsoft OneNote files with embedded scripts to install the Emote virus after Microsoft started by default banning macros in downloaded Office documents.

Themed phishing attacks are frequently used by the Emotet malware operations to coincide with special occasions and recurring business events, like the current tax season in the United States.

Security researchers at Malwarebytes and Palo Alto Networks Unit 42 have seen recent phishing attempts in which the Emotet malware targets users with emails that include fake W-9 tax form attachments.

The threat actors in the campaign that Malwarebytes saw sent emails with the subject line “IRS Tax Forms W-9” while posing as an “Inspector” from the Internal Revenue Service.

NEWS 2

For placing advertisements and promotions in this newspaper, or anywhere on our website, contact us through email at [email protected] or fill out this contact form.

Share this news:

March 27, 2023 /

Monday

Hackerzhome News

2

Have you heard?
Chrome Browser Plugin For Fake ChatGPT Caught Hacking Facebook Accounts know more

FBI: U.S. vendors were defrauded using business email hack techniques

FBI U.S. vendors were defrauded using business email hack techniques

The Federal Bureau of Investigation is alerting American businesses about threat actors that use strategies similar to business email compromise to defraud vendors of a variety of items.

The main goal of typical business email compromise (BEC) assaults is to defraud the victim of money by deceiving them into sending the money to the fraudster’s account.

Around $2.4 billion in losses were caused by BEC schemes in the United States alone in 2021. The number is based solely on the nearly 20,000 complaints the FBI received during that year.

The FBI warned on Friday that scammers are using email domains associated with US businesses to start bulk transactions.

The con artists are conscientious enough to utilize spoof emails with names of actual, existing, or previous workers of the companies they imitate.

According to the organization, as a result, harmed vendors believe they are carrying out legal commercial operations in order to complete purchase orders for distribution.

NEWS 3

In its first month, the new Dark Power ransomware claimed 10 victims.

In its first month, the new Dark Power ransomware claimed 10 victims.
NEWS 4

A brand-new ransomware operation called “Dark Power” has surfaced, listing its first victims on a dark web data leak site and threatening to make the victims’ data public if a ransom is not paid.

The encryptor used by the ransomware gang bears a compilation date of January 29, 2023, the day the attacks began.

The operation hasn’t yet been advertised on any hacker forums or dark web locations, so it’s probably a private undertaking.

Nim, a cross-platform programming language with various speed-related advantages that makes it suited for performance-critical applications like ransomware, was used to create the Dark Power payload.

Although Nim is only now beginning to gain popularity among hackers, it is typically viewed as a niche option that will not be easily identified by protection technologies.

Trellix does not specify how Dark Power is infected, however, it might be through an exploit, phishing emails, or another method.

The malware generates a random 64-character ASCII string at each time to initialize the encryption process with a different key for each iteration.

Apparently, Rostec, a Russian company, can de-anonymize Telegram users.

According to reports, Rostec, a Russian company, has purchased a platform that enables it to identify anonymous Telegram users. This platform will likely be used to stifle adverse news coming from abroad.

800 businesses and 15 corporations make up the state-owned technology and defense systems firm known as Rostekh.

The company, which actively monitors information flow within the nation, is particularly curious about the identities of Telegram channel administrators who are critical of the Russian government.

This is according to Russian media outlets The Bell and Medusa, who looked into the situation following a slew of arrests of bloggers and operators of anonymous Telegram channels in 2022.

The Article details various incidents that caused users of the “Turn out the light” Telegram group, including the arrests of commercial director Ksenia Sobchak Kirill Sukhanov, former Tatler magazine editor Arian Romanovsky, and writer Tamerlan Bigaev.

The same allegations claim that in 2021 Rostec’s subsidiary “Avtomatika” (втомaтика) purchased the St. Petersburg-based IT firm T. Hunter, which had created a tool for locating anonymous Telegram users.

Apparently, Rostec, a Russian company, can de-anonymize Telegram users.
NEWS 5

For placing advertisements and promotions in this newspaper, or anywhere on our website, contact us through email at [email protected] or fill out this contact form.

Share this news: