In issue #129 of Internet Security Week , free internet security test, hacker uses shortcut file to break in, tips for protecting your new computer, FBI warning about ransomware attack and much more.
News
Google and Microsoft services are used to host cryptocurrency scams
Criminals are using legitimate hosting services and comments on equally authentic websites as a way to increase the relevance of fraudulent pages, which are later used in cryptocurrency scams.
By Felipe Demartini on Canaltech
Hacker now uses shortcut file to break into corporate PC
Cybercriminals spreading malware variants are switching to shortcut (LNK) files to hack corporate PCs, HP Wolf Security report finds. According to the company's survey, shortcuts are gradually replacing the use of Office macros — which are starting to be blocked by default by Microsoft — to allow attackers to establish themselves on networks and trick users into installing malware on their PCs.
In CISO Advisor
Number of access to hacked corporate networks is still high
Statistics collected by cyber intelligence firm KELA during the second quarter of this year show that marketplaces selling initial access to corporate networks have grown.
By Bill Toulas in Bleeping Computer
Criminals don't stop: rootkit in a new version
Our researchers examined a new version of the CosmicStrand rootkit, which they found in the MOD IFIED UEFI (Extensible Firmware Interface) firmware – the code that first loads and starts the operating system boot process when the computer is turned on.
By Julia Glazova in Kaspersky Daily
Tips for protecting your new computer from cyber threats
We have put together a list of good practices and security measures to take into account when thinking about the security of a newly purchased computer against digital threats.
By Phil Muncaster in We Live Security
Mexican cartels go into operation on the dark web
Analysts at the company DarkOwl, which specializes in dark web searches, discovered several dark web custody-enabled marketplaces that claim to be affiliated with the Sinaloa Cartel. One of them, called exactly the “Sinaloa Cartel” is directly associated with this cartel and that of Los Chapitos. The site uses the same logo (red and black skull with the phrase “Sinaloa Cartel”) as a Facebook group page that has the same name.
In CISO Advisor
Scammers use remote access to steal money via Pix
A retiree from Rio de Janeiro (RJ) saw R$60,000 stolen from his account after suffering a new type of scam, which uses social engineering and remote access applications to make transfers via Pix.
By Felipe Demartini on Canaltech
FBI warns: ransomware can encrypt devices multiple times in attacks
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) today warned US organizations that attackers deploying Zeppelin ransomware can encrypt their files multiple times. The two federal agencies also shared tactics, techniques and procedures (TTPs) and indicators of compromise (IOCs) to help security professionals detect and block attacks using this variety of ransomware.
By Sergiu Gatlan in Bleeping Computer
New malicious campaign hunts for Discord tokens and credit card information
Open source code is a boon for the IT industry — it helps programmers save time and create products faster and more efficiently by eliminating the need to write repetitive common code. To facilitate this knowledge sharing, there are repositories — open platforms where any developer can publish their own packages with their code to speed up the development process for others.
By Elizaveta Shulyndina in Kaspersky Daily
Tool
Test Your Internet Security
- Do you know if your employees, students or family are protected from phishing sites, malware, pornography, racist or terrorist content? Take the test now and find out!
- Free
Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.