Check Point analysts found that Chinese hackers in a chain of accidents infected an unnamed European hospital with malware. Researchers attribute this to the uncontrolled spread of malware that is dissiminated by the Chinese hack group Camaro Dragon (aka Mustang Panda, BASIN, Bronze President, Earth Preta, HoneyMyte, RedDelta and Red Lich) via USB drives. The… Continue reading Chinese Hackers Accidentally Infected European Hospital with Malware
Tag: Check Point
Rorschach’s New Ransomware Is Named the Fastest to Date
Check Point analysts have discovered a new ransomware, Rorschach ransomware that has already been used to attack an unnamed American company. This malware is notable for its extremely high speed of file encryption and the fact that it is deployed using a signed component of commercial security software. Check Point calls this threat “one of… Continue reading Rorschach’s New Ransomware Is Named the Fastest to Date
Hackers Are Promoting a Service That Allows Bypassing ChatGPT Restrictions
Check Point researchers say that the OpenAI API is poorly protected from various abuses, and it is quite possible to bypass its limitations, wnd that attackers took the advantage of it. In particular, a paid Telegram bot was noticed that easily bypasses ChatGPT prohibitions on creating illegal content, including malware and phishing emails. The experts… Continue reading Hackers Are Promoting a Service That Allows Bypassing ChatGPT Restrictions
Russian Cybercriminals Seek Access to OpenAI ChatGPT
Check Point analysts have noticed that Russian-speaking hacker forums are actively discussing access to bypass geo-blocking, due to which the OpenAI ChatGPT language model is not available in Russia. We also wrote that Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern, and also that Google Is Trying to Get… Continue reading Russian Cybercriminals Seek Access to OpenAI ChatGPT
Dangerous bug in WhatsApp could lead to disclosure of user data
Check Point specialists spoke about a dangerous bug they discovered in the WhatsApp image processing function, which could lead to the disclosure of user data. The problem helped to disable the application, in addition, by applying certain filters to a specially created image and sending it to a potential victim, an attacker could exploit the… Continue reading Dangerous bug in WhatsApp could lead to disclosure of user data
Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device
Check Point researchers reported that in April of this year, IT giant Amazon eliminated critical vulnerabilities in the Amazon Kindle. The problems could be used to gain full control over the device, allowed them to steal the Amazon device token and other confidential data stored on it. For a successful attack on a Kindle, just… Continue reading Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device
Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones
More than a third of all smartphones in the world have been affected by a new vulnerability in Qualcomm Mobile Station Modem (MSM). This bug gives attackers access to call history, SMS messages, and even allows them to eavesdrop on conversations. MSM is a SoC that allows devices to connect to mobile networks. It was… Continue reading Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones
Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals
CheckPoint experts found that the number of job search ads on the darknet and on hacker forums is growing – job seekers that were desperate to find a job are now ready to work for cybercriminals. Check Point reports that a new trend has emerged at the beginning of 2021: not hackers do not post… Continue reading Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals
Hackers majorly use Microsoft and DHL brands in phishing attacks
Hackers majorly use the Microsoft and DHL brands in phishing attacks. In Q4 2020, cybercriminals used more brands from the tech industry, followed by shipping and retail businesses. Information security researchers from the Check Point Software team said that phishers love the Microsoft brand. 43% of all attempts at phishing attacks were associated with it… Continue reading Hackers majorly use Microsoft and DHL brands in phishing attacks
About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library
Check Point experts warned that developers of many popular Android applications forgot to make an important update and now their product is vulnerable to a bug in the Play Core library. So, according to the company, about 8% of all applications in the Google Play Store use old and unsafe versions of the Play Core… Continue reading About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library