Explosive New MirrorBlast Campaign Targets Financial Companies

Key Points:  Morphisec Labs tracked a new MirrorBlast campaign targeting financial services organizations  MirrorBlast is delivered via a phishing email that contains malicious links which download a weaponized Excel document…

Medtronic recalls insulin pump controllers over life-threatening flaws

A threat actor can exploit these vulnerabilities to hijack Medtronic devices and modify how much insulin should be administered to a patient. Medtronic, a well-known medical device maker, has recalled…

Why healthcare IoT requires stronger healthcare cybersecurity

The healthcare industry has gone through a dramatic technological transformation, one that has been accelerated by COVID. Internet-connected devices (collectively known as the Internet of Things, or IoT devices), once…

LockBit Resurfaces With Version 2.0 Ransomware Detections in Chile, Italy, Taiwan, UK

Trend Micro – Trend Micro – SHA-256 Filename Detection 0545f842ca2eb77bcac0fd17d6d0a8c607d7dbc8669709f3096e5c1828e1c049   Ransom.Win32.LOCKBIT.YXBHJ-T 0906a0b27f59b6db2a2451a0e0aabf292818e32ddd5404d08bf49c601a466744    Ransom.Win32.LOCKBIT.SMYEBGW 21879b5a8a84c5fe5e009c85744caf74b817c57203020bf919037d7ccb6b6a58   Ransom.Win32.LOCKBIT.SMCET 255f8465962bedaf7a373da5f721aecbc1d6027ca2e4256c6c4352f2de179ca0     Restore-My-Files.txt         Ransom.Win32.LOCKBIT.ENE.note     4db47caf8d93e855b8364def67d3d3282fc964dc4684df6bbe172ea6e902e6fe…

Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising

Trend Micro – Trend Micro – SHA256 File name Note Analysis 124FE26D53E2702B42AE07F8AEC5EE4E79E7424BCE6ECDA608536BBF0A7A2377 oneroom_setup.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ E667F9C109E20900CC8BADD09EDE6CDCE0BDC77164CFD035ACE95498E90D45E7 oneroom_game.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ 93FFE7CF56FEB3FB541AEF91D3FC04A5CF22DF428DC0B7E5FEB8EDDDC2C72699 Magicalgirl.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ AD13BB18465D259ACC6E4CEBA24BEFF42D50843C8FD92633C569E493A075FDDC…

Threat Actors Exploit Misconfigured Apache Hadoop YARN

Trend Micro – Trend Micro – SHA-265 Trend Micro Pattern Detection 25d19152363063eb2b1976b416452e63ad21c205f727837d38d17001831f17f3 Trojan.Linux.KINSING.AB ec5ed2498945a5b0b1c1f149e201d7395bf3cb1c50f471d820500028ffe19d53 Trojan.SH.KINSING.G d17b00fd7687d2de31b0dd3b43d468f1de281002228361ef3125b92de0c08772 Trojan.SH.CVE20207961.SM 6e25ad03103a1a972b78c642bac09060fa79c460011dc5748cbb433cc459938b Coinminer.Linux.MALXMR.PUWEMA 11547e36146e0b0956758d48faeb19d4db5e737dc942bc7498ed86a8010bdc8b Coinminer.Win32.MALXMR.TIAOODGJ 1caf7ed35dcb8eddb5bca9120294bc79e7d9a24d451bc0fbebb2195fa5826808 Coinminer.Win32.MALXMR.TIAOODGJ 7cd493e9a14eb33279a96fe025aae0ff37712a300e83dd334cff8ce138fd721a Coinminer.Win32.MALXMR.TIAOODGJ 83c4ff76659aec8db03942b3b7094736e4377048166839d3ab476067fbc2f892 Coinminer.Win32.MALXMR.TIAOODGJ 559a8ff34cf807e508d32e3a28864c687263587fe4ffdcefe3f462a7072dcc74 Coinminer.Win32.MALXMR.TIAOODDS/16.845.00 a5604893608cf08b7cbfb92d1cac20868808218b3cc453ca86da0abaeadc0537…