VirTool:Win32/ExcludeProc.D is the detection name of a malicious program that Windows users have recently discovered. It is a Trojan that engages in cryptojacking activities, which means it can use the machine’s resources, such as CPU power, to mine cryptocurrencies. Users may notice a number of symptoms, like slow performance, lagging, crashing, and bugs.
We have a new cybercrime outfit that goes by the name of RansomHouse. As discovered by Cyberint, the ransomware group is not what it seems to be. It is a data extortion gang that is targeting organizations, exfiltrating their data, and offering to delete it – all for a price.
The U.S. is setting up a Joint Ransomware Task Force, headed by the Cybersecurity and Infrastructure Security Agency and the FBI, as well as two international initiatives, chaired by the Department of Justice, to tackle illegal cryptocurrency activities related to ransomware.
Two security researchers have identified five related techniques for hijacking internet accounts by preparing them to be commandeered in advance.
And they claim that when they analyzed 75 popular internet services, almost half were vulnerable to at least one of these techniques.
Avinash Sudhodanan, an independent security researcher, and Andrew Paverd, a senior researcher at Microsoft, describe their findings in a paper titled, “Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web.”
The past year has seen a staggering acceleration in ransomware incidents, with 25% of all breaches containing a ransomware component.
That’s the top-line finding in the 2022 Verizon Data Breach Investigations Report (DBIR), which found that ransomware events in conjunction with breaches ballooned 13% in the past year — last year’s report found that just 12% of incidents were ransomware-related. That translates into a rate of increase that’s more than the previous five years of growth combined.
Popular video conferencing service Zoom has resolved as many as four security vulnerabilities, which could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages and execute malicious code.
Tracked from CVE-2022-22784 through CVE-2022-22787, the issues range between 5.9 and 8.1 in severity. Ivan Fratric of Google Project Zero has been credited with discovering and reporting all the four flaws in February 2022.