πŸ‡ΊπŸ‡¦ Hacken was born in Ukraine, and we stand with all Ukrainians in our fight for freedom!

πŸ‡ΊπŸ‡¦ Hacken stands with Ukraine!

Learn more
bg

Weekly Digest #18

Weekly Digest #18

Published: 22 Jan 2021 Updated: 5 Apr 2022

DNSpooq Flaws Allow DNS Hijacking of Millions of Devices

This week researchers have uncovered a set of flaws in dnsmasq, popular open-source software used for caching Domain Name System (DNS) responses for home and commercial routers and servers.

The set of seven flaws consist of buffer overflow issues and weaknesses, allowing for DNS cache-poisoning attacks (also known as DNS spoofing). If exploited, these flaws could be chained together to allow remote code execution, denial of service and other attacks.

Dnsmasq is installed on many homes and commercial routers and servers in many organisations.

Read more

Google Searches Expose Stolen Corporate Credentials

Attackers behind a recently discovered phishing campaign have unintentionally left more than 1,000 stolen credentials available online via simple Google searches, researchers have found.

The campaign, which began in August 2020, used e-mails that spoof notifications from Xerox scan to lure victims into clicking on malicious HTML attachments.

While this is and of itself is not atypical of phishing campaigns, attackers made a β€œsimple mistake in their attack chain” that left the credentials they’d stolen exposed to the β€œpublic Internet, across dozens of drop-zone servers used by the attackers,” researchers said.

Read more

Windows RDP servers are being abused to amplify DDoS attacks

According to Shodan, there are five millions of RDP servers all over the world available for hackers to use exploit.

Windows RDP servers running on UDP port 3389 can be ensnared in DDoS botnets and abused to bounce and amplify junk traffic towards victim networks.

Hackers are abusing Windows Remote Desktop Protocol (RDP) systems to bounce and amplify junk traffic as part of DDoS attacks. Not every RDP server can be abused, only systems where RDP authentication is also enabled on UDP port 3389 on top of the standard TCP port 3389.

Read more

Ransomware is now the biggest cybersecurity concern for CISOs

Ransomware is the most significant cybersecurity concern facing businesses, according to those responsible for keeping organisations protected from cyberattacks and hacking.

A survey of chief information security officers (CISOs) and chief security officers (CSOs) by cybersecurity company discovered that ransomware is now viewed as the primary cybersecurity threat to their organisation over the next year.

46% – of CSOs and CISOs surveyed said that ransomware or other forms of extortion by outsiders represents the biggest cybersecurity threat.

Read more

Malwarebytes said it was hacked by the same group who breached SolarWinds

We continue the heading of the hack chain of companies that are engaged in cybersecurity. This week Malwarebytes becomes the fourth major security firm targeted by criminals after FireEye, Microsoft, CrowdStrike.

Malwarebytes was hacked by the same group which breached IT software company SolarWinds last year.

Malwarebytes said its intrusion is not related to the SolarWinds supply chain incident since it doesn’t use any of SolarWinds software in its internal network.

The security firm said the hackers breached its internal systems by exploiting a dormant email protection product within its Office 365 tenant.

Read more

share via social

Subscribe to our research

Enter your email address to subscribe to Hacken Research and receive notifications of new posts by email

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo