HackMag publishes high-quality translated content about information security, cyber security, hacking, malware and devops.
More than 60 malicious NPM packages are stealing user data
Socket’s Threat Research Team discovered an active campaign involving dozens of malicious npm packages that collect and leak information from victims’ systems. Over the past two weeks, unknown cybercriminals have published 60 malicious packages under three npm accounts: (…)
MathWorks affected by ransomware attack
MathWorks, Inc., an American corporation specializing in mathematical computing software, was affected by a ransomware attack resulting in service interruptions. Founded in 1984, MathWorks is headquartered in Massachusetts and has more than 34 offices worldwide with more than (…)
Many notorious hacker groups (e.g. North Korea’s Lazarus) use the BYOVD attack to gain access to kernel space and implement complex advanced persistent threats (APTs). The same technique is employed by the creators of the Terminator tool and various encryptor operators. This (…)
Packages intentionally destroying data discovered in NPM
Socket experts discovered in npm (node package manager) eight malicious packages that were downloaded from the repository more than 6,200 times over the last two years. All these packages could destroy data on users’ workstations. The malicious packages used typosquatting to (…)
Chrome will change compromised user passwords automatically
Google developers announced a new feature in the Chrome browser enabling its built-in password manager to change compromised credentials automatically. “When Chrome detects a compromised password during sign in, Google Password Manager prompts the user with an option to fix (…)
Chinese hackers use zero-day vulnerability in Trimble Cityworks to attack US Government networks
According to Cisco Talos, Chinese-speaking threat actors used a zero-day vulnerability in the Trimble Cityworks software to attack local governing bodies across the United States. Trimble Cityworks is a GIS-centric asset lifecycle management system used by local authorities, (…)
More than 100 dual-function Chrome extensions hijack sessions and steal user credentials
According to DomainTools Intelligence (DTI), more than 100 malicious Chrome browser extensions disguised as VPN services, AI assistants, crypto utilities, etc. are used to steal cookies and covertly execute remote scripts. Unknown cybercriminals have been have been (…)
IP cameras in pentesting. Improper use of security cameras
In the course of a pentesting audit, you can capture an image from a security camera and attach it to your report – just to please the customer. No doubt, such pictures are impressive, but what can be the real impact of attacks targeting cameras? Today I will show how to run (…)
Defendnot utility disables Microsoft Defender in Windows
A new tool called Defendnot can disable Microsoft Defender protection on Windows devices even if no real antiviruses are installed in the system. Defendnot has been developed by an IT researcher known as Arsenii es3n1n. The utility abuses an undocumented WSC API by (…)
Malware contained in NPM hides itself using Unicode-based steganography
A malicious package discovered in npm (node package manager) hides its code using invisible Unicode characters and uses Google Calendar links for communication with its C&C servers. According to Veracode, since the beginning of May, the malicious os-info-checker-es6 (…)
Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs
The China-aligned threat actor known as Mustang Panda has been observed using an updated version of a backdoor called TONESHELL and a previously (…)
15 September
600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet
Hackers leaked 600 GB of data linked to the Great Firewall of China, exposing documents, code, and operations.…
13 September
From Vibe Coding to Vibe Hacking: Claude AI Abused To Build Ransomware
Anthropic’s Claude AI presently rules the realm of vibe coding. However, the company has unveiled… From Vibe Coding to Vibe Hacking: Claude AI Abused To (…)
12 September
How to write a “welcome to our team” message: Tips, ideas, and 20 ready-to-use templates
“Welcome to the team” messages can fall flat. Write the best onboarding email with these 20 creative templates that will make new hires feel valued from day (…)
12 September