A team of researchers from the Microsoft Threat Intelligence Center (MSTIC) has warned of an ongoing attacks by the GALLIUM cybercriminal group targeting telecommunication providers in Southeast Asia, Europe and Africa. Attackers exploit vulnerabilities in the WildFly open ... Read More
Tier3 monitoring teams have detected that Public Procurement Regulatory Authority (PPRA) official website ppra.org.pk was earlier this morning by a hacker group "The Crash Rulers" . It is the same group that supposedly hacked Pakistan ... Read More
US officials say their attacks on Iranian military computers disabled systems that control missile and rocket launchers. The United States military launched cyberattacks against Iranian missile control systems and a spy network on Thursday after ... Read More
Scanbox framework used to hack Pakistani Govt’s passport application tracking site http://tracking.dgip.gov.pk Experts uncovered a watering hole attack against the Pakistani Govt’s passport application tracking site, hackers used the Scanbox Framework to steal visitors’ data ... Read More
Hackers were able to use the vulnerability and install other malware on phones. After 2 Weeks WhatsApp confirms its 1.5 Billion users need an upgrade. WhatsApp the most popular messenger app, is also owned by ... Read More
Fileless malware attacks are increasing every day.They can nowadays be seen as the perfect crime of opportunity. The initial vector of these attack can be a seemingly innocuous business email with a link to an ... Read More
In a latest security alert email sent by PKNIC (registrar of all .PK domains ) to its customers, it is reported that there has been an increase in cyber attacks on Pakistani IT installations in ... Read More
Even if security experts continue to make awareness campaign, people continue to use bad passwords exposing their data to the risk of hack. Bad habits are hard to die, 123456 is the most used password ... Read More
1. Do not give any personal information (name, address, bank details, email or phone number) to organisations or people before verifying their credentials. Always question unsolicited calls, texts or emails requesting your personal or financial ... Read More
Payment/ bank card fraud involves the compromise of any personal information from credit, debit or store cards. The personal information stolen from a card, or the theft of a card itself, can be used to ... Read More
Hacktivist group Anonymous hacks the company servers Freedom Hosting II and lay down some 10,000 web pages based on Tor, representing almost 20% of the web deep. Hackers claim that at least half of the web pages were child pornography.
If the user have JAVA (or python or similar interpreters) an attacker can insert jar file or py file into the presentation and trigger it when mouse moves, for easier exploitation the attacker can use ppsx file which will load automatically in presentation mode and once the user opens the file and moves mouse it will trigger the payload.
If the file is executed, Carbanak’s VBScript malware will see itself triggered. From here, the malware then proceeds to send and receive commands “to and from” Google services such as Google Apps Script, Google Sheets and Google Forms services.