#credential-theft

[ follow ]
#android-malware
Information security
fromInfoWorld
1 day ago

Crooks are hijacking and reselling AI infrastructure: Report

Threat actors are probing and hijacking exposed corporate LLM and MCP endpoints to steal compute, exfiltrate data, and resell API access for profit.
#phishing
fromZDNET
3 days ago
Information security

1Password's new anti-phishing feature targets your most inescapable vulnerability - here's how

fromTechCrunch
2 weeks ago
World news

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East | TechCrunch

fromZDNET
3 days ago
Information security

1Password's new anti-phishing feature targets your most inescapable vulnerability - here's how

fromTechCrunch
2 weeks ago
World news

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East | TechCrunch

Information security
fromTheregister
1 week ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Information security
fromTheregister
1 week ago

Phishing attacks abuse SharePoint, target energy orgs

Attackers used SharePoint-based phishing to steal credentials, compromise energy-sector email accounts, and send hundreds of phishing messages from hijacked inboxes.
Information security
fromTechzine Global
1 week ago

Skeleton Key campaign exploits trusted RMM tools

Attackers hijack legitimate remote monitoring and management (RMM) tools, using stolen credentials and signed enterprise software to maintain stealthy persistent backdoors.
Information security
fromTheregister
1 week ago

Mandiant releases credential cracker, to kill bad protocol

Mandiant released rainbow tables that enable Net-NTLMv1 credentials to be cracked within 12 hours on consumer hardware, urging organizations to disable the legacy protocol.
fromArs Technica
1 week ago

Mandiant releases rainbow table that cracks weak admin password in 12 hours

Microsoft released NTLMv1 in the 1980s with the release of OS/2. In 1999, cryptanalyst Bruce Schneier and Mudge published research that exposed key weaknesses in the NTLMv1 underpinnings. At the 2012 Defcon 20 conference, researchers released a tool set that allowed attackers to move from untrusted network guest to admin in 60 seconds, by attacking the underlying weakness. With the 1998 release of Windows NT SP4 in 1998, Microsoft introduced NTLMv2, which fixed the weakness.
Information security
fromTechCrunch
1 week ago

Supreme Court hacker posted stolen government data on Instagram | TechCrunch

Moore accessed those systems using stolen credentials of users who were authorized to access them. Once he gained access to those victims' accounts, Moore accessed and stole their personal data and posted some online to his Instagram account: @ihackthegovernment. In the case of the Supreme Court victim, identified as GS, Moore posted their name and "current and past electronic filing records."
Information security
Information security
fromTheregister
3 weeks ago

North Korea turns QR codes into phishing weapons

North Korean-linked hackers use malicious QR codes (quishing) to steal credentials and session tokens, bypass multi-factor authentication, and maintain access to targeted organizations.
#npm
Information security
fromArs Technica
3 months ago

NPM flooded with malicious packages downloaded more than 86,000 times

Attackers exploited NPM's Remote Dynamic Dependencies to publish over 100 credential-stealing packages that downloaded unseen malicious code from untrusted servers.
Information security
fromInfoQ
3 months ago

NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks

Malicious npm packages (s1ngularity) used AI-enabled tools to steal developer credentials, wallets, tokens, and SSH keys from infected systems.
fromInfoQ
3 months ago
Information security

NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks

Information security
fromThe Hacker News
1 month ago

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Two malicious Google Chrome extensions named 'Phantom Shuttle' intercept traffic, inject credentials, act as MITM proxies, and exfiltrate data after paid subscriptions.
#npm-supply-chain
fromIT Pro
2 months ago
Information security

Shai-Hulud malware is back with a vengeance and hit more than 19,000 GitHub repositories so far - here's what developers need to know

fromIT Pro
2 months ago
Information security

Shai-Hulud malware is back with a vengeance and hit more than 19,000 GitHub repositories so far - here's what developers need to know

Information security
fromTheregister
1 month ago

China's Ink Dragon hides out in European government networks

Ink Dragon expanded espionage into European government networks, using compromised servers as relay nodes, stealing credentials and updating backdoors to blend with Microsoft cloud activity.
Information security
fromTheregister
1 month ago

SantaStealer bags credentials and crypto wallets

SantaStealer is a modular credential- and wallet-stealing infostealer advertised as undetectable despite samples lacking robust anti-analysis and evasion techniques.
#infostealer
Information security
fromThe Hacker News
1 month ago

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Four new phishing kits — BlackForce, GhostFrame, InboxPrime AI, and Spiderman — enable large-scale credential theft and MFA bypass using MitB and evasion techniques.
Information security
fromAbove the Law
1 month ago

Incident Response Has Become A Law Firm Survival Skill - Above the Law

Law firms face targeted cyberattacks; preparedness and practiced incident response, clear leadership, and fast decisions prevent compounded damage and regulatory, ethical, and malpractice risks.
Information security
fromIT Pro
1 month ago

The most prominent infostealers and how businesses can protect against them

Infostealers increasingly harvest credentials that enable major breaches and ransomware, with strains like Stealerium and Lumma driving widespread, adaptable, multi-vector attacks.
#supply-chain-attack
#software-supply-chain
#supply-chain
fromInfoWorld
5 months ago
Information security

Wave of npm supply chain attacks exposes thousands of enterprise developer credentials

fromInfoWorld
5 months ago
Information security

Wave of npm supply chain attacks exposes thousands of enterprise developer credentials

Information security
fromThe Hacker News
2 months ago

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

Sneaky 2FA PhaaS now uses Browser-in-the-Browser (BitB) to present fake Microsoft login pop-ups, enabling large-scale credential theft and account takeover.
Information security
fromsfist.com
2 months ago

Anthropic Says Its AI Chatbot Was Used By Chinese Hackers for Large-Scale Cyber Attack

Anthropic's Claude chatbot was used by state-sponsored Chinese hackers to automate large-scale cyberattacks against about 30 American companies.
Information security
fromZDNET
2 months ago

Google spots malware in the wild that morphs mid-attack, thanks to AI

AI-powered large language models are being used in active cyberattacks to create adaptive malware that dynamically rewrites code, steals credentials, and evades detection.
fromThe Hacker News
3 months ago

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine optimization (SEO) fraud and theft of high-value credentials, configuration files, and certificate data. The attacks are designed to target Microsoft Internet Information Services (IIS) servers, with most of the infections reported in India, Thailand, Vietnam, Canada, and Brazil, spanning universities, tech firms, and telecom providers. The group was first discovered in April 2025. The targets are primarily mobile users, encompassing both Android and Apple iPhone devices.
Information security
Information security
fromTheregister
3 months ago

US government fibbing over FEMA security failings?

A June breach of FEMA via stolen credentials and a Citrix vulnerability led to Region 6 data exfiltration, prompting leadership firings and an IT overhaul despite initial claims of no data loss.
Information security
fromDataBreaches.Net
3 months ago

PowerSchool hit by Salesloft Drift campaign, but hackers claim that there is no risk of harm or ransom - DataBreaches.Net

PowerSchool's Salesforce customer-support database was accessed via the Drift app breach, exposing customer contact information, support case metadata, and support case contents.
Information security
fromTheregister
3 months ago

Beijing-backed burglars target government web servers

China-backed Phantom Taurus uses novel .NET-based NET-STAR malware to target IIS servers and pursue military, diplomatic, and government intelligence across Asia, Middle East, Africa.
fromSecurityWeek
4 months ago

PyPI Warns Users of Fresh Phishing Campaign

The attack, a continuation of a campaign conducted in July, involves fraudulent messages asking users to verify their email address for security purposes, and claiming that accounts may be suspended due to lack of action. "This email is fake, and the link goes to pypi-mirror.org which is a domain not owned by PyPI or the PSF [Python Software Foundation]," PSF security developer-in-residence Seth Larson warns. Setting up phishing-resistant multi-factor authentication (MFA), Larson explains, helps PyPI maintainers mitigate the risks associated with phishing attacks.
Information security
fromInfoWorld
4 months ago

QR codes become the vehicle for malware in new technique

The malicious package, fezbox, is disguised as a utility library and has "layers of obfuscation" including the "innovative, steganographic use" of QR codes. Steganography involves embedding secret data into a cover medium so that it goes undetected. "Steganography is the practice of hiding a secret file in plain sight, something for which QR codes are great," wrote Socket researcher Olivia Brown.
Information security
fromComputerWeekly.com
4 months ago

Microsoft scores win against Office 365 credential thieves | Computer Weekly

Investigators from Microsoft's Digital Crimes Unit (DCU) have disrupted the network behind the dangerous RaccoonO365 infostealer malware that targeted the usernames and credentials of Office 365 users after being granted a court order in the Southern District of New York. The operation saw a total of 338 websites linked to the popular malware seized and its technical infrastructure disrupted, severing RaccoonO365 users' access to their victims.
Information security
Information security
fromThe Cyber Express
4 months ago

New Infostealer Campaign Targets Popular Games

Maranhão Stealer spreads via cracked-software sites to steal browser credentials and cryptocurrency data using Node.js payloads, reflective DLL injection, persistence mechanisms, and system reconnaissance.
fromThe Hacker News
4 months ago

When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider

As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of security incidents now originate from web applications accessed via Chrome, Edge, Firefox, and other browsers. One particularly fast-evolving adversary, Scattered Spider, has made it their mission to wreak havoc on enterprises by specifically targeting sensitive data on these browsers.
Information security
fromIT Pro
5 months ago

Watch out for fake Zoom invites - hackers are abusing ConnectWise ScreenConnect to take over devices

To manipulate targets into engaging and downloading ScreenConnect, the attackers employ advanced deception techniques built around impressive impersonations and familiar business contexts, effectively creating workflows that align with end-user expectations,
Information security
#identity-security
fromIT Pro
5 months ago
Information security

Cyber teams are struggling to keep up with a torrent of security alerts

fromIT Pro
5 months ago
Information security

Cyber teams are struggling to keep up with a torrent of security alerts

Information security
fromThe Hacker News
5 months ago

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

ShadowCaptcha uses compromised WordPress sites and fake CAPTCHA pages with ClickFix social engineering to deliver stealers, ransomware, and cryptocurrency miners.
Information security
fromThe Hacker News
5 months ago

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

HOOK Android banking trojan variant adds ransomware-style full-screen overlays, expanded remote commands, and enhanced data theft and device takeover capabilities.
fromThe Hacker News
5 months ago

DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft

Popular password manager plugins for web browsers have been found susceptible to clickjacking security vulnerabilities that could be exploited to steal account credentials, two-factor authentication (2FA) codes, and credit card details under certain conditions. The technique has been dubbed Document Object Model ( DOM)-based extension clickjacking by independent security researcher Marek Tóth, who presented the findings at the DEF CON 33 security conference earlier this month.
Information security
fromArs Technica
6 months ago

Phishers have found a way to downgrade-not bypass-FIDO MFA

The phishing attack bypasses a multifactor authentication scheme based on FIDO, the standard considered immune to credential phishing attacks, leading to unauthorized access.
Privacy technologies
#cybersecurity
fromHackernoon
2 years ago
Mobile UX

Fullscreen BitM Attack Discovered By SquareX Exploits Browser Fullscreen APIs To Steal Credentials | HackerNoon

fromHackernoon
2 years ago
Mobile UX

Fullscreen BitM Attack Discovered By SquareX Exploits Browser Fullscreen APIs To Steal Credentials | HackerNoon

Privacy professionals
fromSecuritymagazine
9 months ago

Research reveals mass scanning and exploitation campaigns

Organizations must adopt layered cybersecurity defenses to combat rising threats.
Proactive measures, like regular software updates and MFA, are essential for defense.
fromThe Hacker News
7 months ago

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

"The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server," Ganachari said.
Growth hacking
Remote teams
fromThe Hacker News
8 months ago

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

North Korean threat actors have upgraded their malware, OtterCookie, to enhance capabilities in stealing credentials and data.
[ Load more ]