Annual Pwn2Own Contest Reveals No User Interaction Zoom Remote Code Execution

From binarydefense.com

Pwn2Own is an annual contest held by the Zero Day Initiative providing a contest for hackers and researchers around the world a chance to win substantial monetary reward for producing never before seen exploits for some of the most used software and hardware, with the goal of assisting software providers in the security of their products.

This year Zoom came under the microscope by Daan Keuper and Thijs Alkemade from Computest. They were able to exploit Zoom messenger with a three bug chained attack obtaining remote code execution not requiring user input. As of this writing it is known to work in the Windows and Mac client versions of zoom and has yet to be proven effective in iOS or Android apps. Zoom was contacted internally and are in the process of producing a patch to cover this vulnerability. A suggested work-around is to use the browser version of Zoom client on Windows or Mac.

Read more…

2 scraped LinkedIn databases with 500m and 827m records sold online

From hackread.com

2 scrapped LinkedIn databases with 500m records each sold online

Although, none of the databases contain LinkedIn users’ passwords; the data in the records is enough for cybercriminals to carry out a number of attacks including SIM Swapping, identity scams, phishing, and SMSishing, etc.

Just last week, a hacker leaked over 533 million Facebook users’ data that was collected from the social media giant using the web data scraping technique. Now, two different threat actors are selling LinkedIn data compiled as a result of data scraping as well.

It is worth noting that both databases are being sold on the same hacker forum. One of the sellers is offering 7 LinkedIn databases which, when merged together, makes 827 million users’ records. The price for all databases together is $7,000.

Read more…

New REvil Ransomware Version Automatically Logs Windows into Safe Mode

From heimdalsecurity.com

When it comes to ingenious hacking strategies and techniques, there’s no stopping REvil Ransomware.

Once more, the well-known ransomware has elevated its attack vector to change the victim’s login password in order to reboot the computer into Windows Safe Mode.

While malicious groups are always updating their attack methodology to counter security measures, the threat actors behind the REvil ransomware are particularly adept at honing their malware to make their attack campaigns more efficient.

Read more…

Hackers Tampered With APKPure Store to Distribute Malware Apps

From thehackernews.com

APKPure, one of the largest alternative app stores outside of the Google Play Store, was infected with malware this week, allowing threat actors to distribute Trojans to Android devices.

In an incident that’s similar to that of German telecommunications equipment manufacturer Gigaset, the APKPure client version 3.17.18 is said to have been tampered with in an attempt to trick unsuspecting users into downloading and installing malicious applications linked to the malicious code built into the APKpure app.

Read more…

Maze/Egregor Ransomware Earned over $75 Million

From ehackingnews.com

Researchers at Analyst1 have noticed that the Maze/Egregor ransomware cartel has made at least $75 million in ransom payments to date. This figure is the base of their estimations, as the maximum could be conceivably more since not every victim has disclosed paying to the threat actor. While the group is crippled presently, it is the one that began numerous innovations in the ransomware space. 

Read more…

Hevethat.online Removal Guide

From 2-spyware.com

Hevethat.online

Hevethat.online is a potentially unwanted program that is categorized as adware due to intrusive advertising content that fills up the screen. During every browsing session, this program aims to show various promotions and tries to trick people into allowing suspicious notifications from this or another page. Behavior related to redirects and random app injections allows calling this app a push notification virus been though this is not a malicious program.

Read more…