comparemela.com

Latest Breaking News On - ஆற்றலுடைய டெஸ்க்டாப் - Page 1 : comparemela.com

Gaming Software Supply-Chain Attack Installs Spyware

minute read Share this article: Researchers allege that software used for downloading Android apps onto PCs and Macs has been compromised to install malware onto victim devices. Researchers allege, attackers have compromised the update mechanism of NoxPlayer, which is software that allows gamers to run Android apps on their PCs or Macs. They then installed malware onto victims’ devices with surveillance-related capabilities. NoxPlayer is developed by BigNox, which is a China-based company that claims that it has over 150 million users worldwide (notably, however, BigNox users are predominantly in Asian countries). When contacted by researchers, BigNox denied being affected by the attack. Threatpost has reached out to BigNox for further comment.

After SolarWinds Data Breach in US, Vietnam Targeted in Similar Supply-Chain Cyberattack

Earlier this month alarm bells rang in the US after an IT management software provider SolarWinds found a massive breach in its network. Alleged Russian hackers managed to invade the network and stay hidden for nearly nine months before trojanizing an update to get into its clients networks. The massive hack had over a dozen US government agencies breached beside private companies like Cisco and Microsoft. Now, Vietnam is under a similar supply-chain attack, compromising government agencies and private companies. According to cybersecurity researchers, the unknown hackers were able to deploy malware inside a government software toolkit. The supply-chain attack was discovered by Slovak cybersecurity and antivirus firm ESET and named Operation SignSight .

Software Supply-Chain Attack Hits Vietnam Government Certification Authority

Software Supply-Chain Attack Hits Vietnam Government Certification Authority Cybersecurity researchers today disclosed a new supply-chain attack targeting the Vietnam Government Certification Authority (VGCA) that compromised the agency s digital signature toolkit to install a backdoor on victim systems. Uncovered by Slovak internet security company ESET early this month, the SignSight attack involved modifying software installers hosted on the CA s website ( ca.gov.vn ) to insert a spyware tool called PhantomNet or Smanager. According to ESET s telemetry, the breach happened from at least July 23 to August 16, 2020, with the two installers in question gca01-client-v2-x32-8.3.msi and gca01-client-v2-x64-8.3.msi for 32-bit and 64-bit Windows systems tampered to include the backdoor.

© 2024 Vimarsana

vimarsana © 2020. All Rights Reserved.