Topic: encrypted communication
-
Apple's Lockdown Mode Stumps FBI in Journalist Phone Probe
The FBI cannot access a reporter's seized iPhone due to Apple's Lockdown Mode, highlighting a conflict between law enforcement needs and strong privacy tools. While the iPhone remains secure, agents accessed one of her laptops using its fingerprint reader, viewing some encrypted Signal messages. ...
Read More » -
Fortune 100 Firm Hit by New PDFSider Windows Malware
A Fortune 100 company was compromised by a novel, stealthy malware called PDFSider, delivered via social engineering and a spearphishing email that used a legitimate, signed PDF24 Creator executable to side-load malicious code. The PDFSider backdoor exhibits advanced persistent threat (APT) chara...
Read More » -
New Atroposia RAT Emerges on Dark Web
Atroposia is a newly discovered remote access trojan sold on dark web marketplaces, offering encrypted remote control, credential theft, and cryptocurrency wallet data extraction. The malware is modular and integrates with tools like SpamGPT for AI-driven phishing campaigns and MatrixPDF for weap...
Read More » -
U.S. Found 100K SIM Cards That Could Have Crippled NYC's Cell Network
The U.S. Secret Service seized a massive telecommunications setup in New York City, comprising over 300 SIM servers and 100,000 SIM cards, which had the capability to severely disrupt or shut down mobile networks across the city. The equipment, discovered in multiple locations including abandoned...
Read More » -
Microsoft Teams Targeted by Fake IT Support Scams
A new wave of phishing attacks is exploiting Microsoft Teams, using fake IT support accounts to trick employees into installing malware that gives attackers full network control. Attackers are shifting from email to Teams due to its trusted role in business, impersonating IT staff to deploy remot...
Read More » -
DeadLock Ransomware Evades Security with BYOVD Attack
The DeadLock ransomware campaign uses a BYOVD technique, exploiting a known vulnerability (CVE-2024-51324) in a Baidu Antivirus driver to disable security software and delete recovery options before deploying its payload. The ransomware itself, written in C++, uses process hollowing and a custom ...
Read More »