I don't think a week goes by and we don't talk about phishing and malware. I apologize. It was not my intention to give away what we were about to review. Nevertheless, here we are. Those two are prevailing threats that internet users face every day, with the first sometimes serving as a precursor to the second.
Let's begin.
YouTube warns of AI-generated video of its CEO used in phishing attacks
If you're thinking about the bad side of AI-generated videos, I will not fault you. This is just one example, more is likely to follow. Reading the article shows that the phishing attack is quite convincing (I know which phishing attack is not?) and with some sense of urgency. If the potential victim falls for it, they will unknowingly send their login credentials to the attackers while everything appears as normal.
The article has more details.
Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems
It's been a while since I read an article about typosquatting. Well, that's what's going on here. The actors behind these published Go modules that are typosquatted versions of the original ones. And, they are designed to deploy loder malware on Linux and macOS.
From the article:
The counterfeit packages, Socket's analysis found, contain code to achieve remote code execution. This is achieved by running an obfuscated shell command to retrieve and run a script hosted on a remote server ("alturastreet[.]icu"). In a likely effort to evade detection, the remote script is not fetched until an hour has elapsed.
Malicious Chrome extensions can spoof password managers in new attack
In a recent revelation, cybersecurity experts have uncovered a sophisticated attack targeting Google Chrome users. Malicious extensions, disguised as legitimate tools, exploit Chrome's chrome.management
API to detect installed extensions, including password managers. Once identified, these rogue extensions mimic the appearance and functionality of trusted ones, deceiving users into divulging sensitive information.
The article has more details.
Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access
Given the popularity of WordPress, this article is a must-read. You never know, you might be managing a WordPress site in the future, and articles like this can prepare your mind on how to secure the site or respond effectively when you're targeted.
From the article:
Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed. The malicious JavaScript code has been found to be served via cdn.csyndication[.]com
Credits
Cover photo by Debby Hudson on Unsplash.
That's it for this week, and I'll see you next time.
Top comments (0)