FBI teams up with ‘Have I Been Pwned’ to alert Emotet victims

FBI teams up with ‘Have I Been Pwned’ to alert Emotet victims

The data breach notification site now allows you to check if your login credentials may have been compromised by Emotet The United States’ Federal Bureau of Investigation (FBI) has shared more than 4.3 million email addresses, harvested by the Emotet botnet, with data breach tracking website Have I Been Pwned (HBIP) in an effort to…
INTERPOL aims to deal a blow to digital piracy

INTERPOL aims to deal a blow to digital piracy

The agency’s new initiative will also warn about the high cost of the free lunch – the increased risk of malware exposure INTERPOL is stepping up its fight against online piracy after this ever-popular ‘activity’ has seen 60% growth in some countries over the past year. “Digital piracy is yet another crime area impacted by…
Microsoft will soon remove Flash Player from Windows 10 devices

Microsoft will soon remove Flash Player from Windows 10 devices

The Patch Tuesday security update due in July should hammer the last nail in the coffin of Adobe Flash Player Microsoft has updated its roadmap for eliminating Adobe Flash Player from the Windows 10 operating system. Starting in July, the removal of the piece of software that has helped shape the internet will become a…
Ousaban: Private photo collection hidden in a CABinet

Ousaban: Private photo collection hidden in a CABinet

Another in our occasional series demystifying Latin American banking trojans Ousaban is a Latin American banking trojan active exclusively in Brazil. ESET has been tracking this malware family since 2018. In common with most other LATAM banking trojans, Ousaban uses overlay windows to steal credentials and more from financial institutions. However, unlike most other LATAM…
Supply‑chain attacks: When trust goes wrong, try hope?

Supply‑chain attacks: When trust goes wrong, try hope?

How can organizations tackle the growing menace of attacks that shake trust in software? Cybersecurity is only as good as the weakest link, and in a supply chain this could be virtually anywhere. The big questions may be, “what and where is the weakest link?” and “is it something that you have control over and…
 million worth of gift cards stolen and sold on dark web

$38 million worth of gift cards stolen and sold on dark web

Easy to redeem and hard to trace, gift cards remain a hot commodity in the criminal underground A cybercriminal has sold almost 900,000 gift cards and over 300,000 payment cards on a top-tier cybercrime forum on the dark web. The total value of the cards was claimed to be some US$38 million. The hacker probably…
(Are you) afreight of the dark? Watch out for Vyveva, new Lazarus backdoor

(Are you) afreight of the dark? Watch out for Vyveva, new Lazarus backdoor

ESET researchers discover a new Lazarus backdoor deployed against a freight logistics firm in South Africa ESET researchers have discovered a previously undocumented Lazarus backdoor used to attack a freight logistics company in South Africa, which they have dubbed Vyveva. The backdoor consists of multiple components and communicates with its C&C server via the Tor…
Warning issued over scams touting fake COVID‑19 vaccines, asking for Bitcoin

Warning issued over scams touting fake COVID‑19 vaccines, asking for Bitcoin

Money doesn’t buy you happiness – cryptocurrency doesn’t buy you a genuine COVID-19 vaccine INTERPOL and the United States’ Homeland Security Investigations (HSI) have joined the chorus of warnings about online campaigns peddling bogus COVID-19 vaccines as cybercriminals are increasingly attempting to exploit nations’ vaccination programs. “With criminal groups producing, distributing, and selling fake vaccines,…
Apple rushes to patch zero‑day flaw in iOS, iPadOS

Apple rushes to patch zero‑day flaw in iOS, iPadOS

The bug is under active exploitation by unknown attackers and affects a wide range of devices, including iPhones, iPads and Apple Watches Apple has released an emergency update for its iOS, iPadOS, and watchOS operating systems to patch a zero-day security flaw that is being actively exploited in the wild. The vulnerability affects multiple models…