News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Russia-Ukraine War: Complex Cyberespionage 
Russia-Ukraine War: Complex Cyberespionage

The war in Ukraine is also a cyber war that promotes cyber espionage. Bitdefender Labs discover recent attacks on the Elephant framework. Attacks also take place through phishing with the download of supposed Bitdefender AV software. A summary of current cyber espionage. Companies in the attacked country or in supporting nations connected to Ukraine are threatened by classic IT attack mechanisms, the perpetrators of which are politically motivated this time. In addition to deleting information, these include espionage. The Bitdefender Labs have analyzed the sophisticated attack mechanisms of the so-called Elephant Framework used for this. Cyber ​​war worsens global cybersecurity posture Threat intelligence experts…

Read more

RedLine Stealer exploits Internet Explorer vulnerability
Bitdefender_News

Global campaign - Germany hardest hit after India: Password thief RedLine Stealer steals confidential login information from Internet Explorer users. The outdated browser is vulnerable to a dangerous vulnerability. Bitdefender Labs is currently observing an intensive campaign to deploy malicious code using the RIG exploit kit. Among other things, the attackers distribute the password thief RedLine Stealer to exfiltrate sensitive credentials such as passwords, credit card information, crypto wallets, and VPN login details. After India, Germany is the country most affected by the global campaign, which has increased significantly in intensity since the beginning of April. RIG exploit kit for Internet Explorer Cyber ​​criminals distribute exploit kit…

Read more

Protection against supply chain attacks in SMEs 
Protection against supply chain attacks in SMEs

Attacks on the supply chain - the supply chain - for software (and for hardware) from IT also threaten small and medium-sized companies. Updates for services and software represent an increasingly dangerous vulnerability, especially since cybercriminals hope that hijacking an update will spread the attacks to numerous victims. In addition to upgrading their cyber defenses, small and medium-sized businesses should also review their supply chains for sourcing software, hardware, and updates. Unfortunately, attacks on the supply chain are often effective An attack on the IT supply chain aims to disrupt the production process…

Read more

IT security in times of the Ukraine war
IT security in times of the Ukraine war

It is still unclear whether a real cyber conflict will be added to the analogous Ukraine war – if such a conflict can be precisely defined at all. In any case, the current armed conflict poses a risk for the IT security of companies, even if it remains to be seen how the further risk situation will develop. In order to protect themselves effectively, companies should, on the one hand, keep an eye on current dangers and, on the other hand, follow security standards even more strictly. The company's own risk potential is measured by the geographic, business or even digital proximity of an organization to Ukraine. A defense...

Read more

Some security vulnerabilities in Wyze Cam IoT camera cannot be fixed
Bitdefender_News

Bitdefender has discovered security vulnerabilities in Wyze CAM IP video cameras. Attackers can bypass the authentication process, gain complete control over the device and read information and configuration data from the camera's SD card and install other malicious code. An update closes the gap from the Wyze Cam V2. However, patching is not possible for the first version of the camera. Surveillance cameras deliver sensitive content and the evaluation of the data is subject to strict data protection regulations. Some security gaps that allow access to recorded videos therefore not only endanger the security of a building,…

Read more

Donation scammers: helping Ukraine as a scam
Bitdefender_News

Ukraine scammers are expanding their campaign repertoire. Bitdefender's Antispam Lab monitors new scam mail campaigns related to the Ukraine war. Donation fraud with fake emails from aid organizations, welfare organizations, fake websites, fraudulent crowdfunding. Since the outbreak of the war, Bitdefender Anti Spam Lab's filters have been finding e-mails that seek to exploit the willingness of the general public to help. And the trend is rising: spam mails on the back of the tragedy are becoming more, more sophisticated and cynically better and better tailored to the target group, as the following examples show. Calls for crypto donations In a campaign, the authors call for donations to crypto wallets. The first two…

Read more

Malware and online scams use Ukraine war as a stepping stone
Malware and online scams use Ukraine war as a stepping stone

Bitdefender Labs is seeing increased malware shipments and online scams related to the Ukraine war. Remote access Trojans in attachments end up in manufacturing companies. 42% of the Ukraine variant of the “Nigerian Prince” scam ended up in German mailboxes. Cyberwar is a dominant IT aspect of the current conflict. Spam free riders are currently sending their emails outside of the countries directly involved. The more violent the clashes in Ukraine, the higher the number of online fraud or malware dispatches via e-mails. The perfidious goal of the criminals: They want to take advantage of the humanitarian crisis and the general willingness to help people. Remote Access Trojan “Agent Tesla” Bitdefender Labs observed in…

Read more

Anti-Hacker Therapy: Cyber ​​Security in Healthcare
Anti-Hacker Therapy: Cyber ​​Security in Healthcare

Healthcare continues to be one of the most hacked areas. It is therefore time to catch up on homework that has been put off for a long time in order to face the new demands and risks of a digitized and protected healthcare system. Comprehensive IT security technologies, possible funding and strong partners can initiate the therapy that seems more necessary than ever in view of the current crisis situation. Complex, often outdated and heterogeneous IT and technology and a lack of security strategy make hospitals, for example, a worthwhile target for hackers who can be blackmailed. Because a failure of the systems is not an...

Read more

How hackers infect computers with ransomware
How hackers infect computers with ransomware

Bitdefender details typical gateways for extortion attacks and five ways small business hackers infect machines with ransomware: pirated software, phishing, supply chain, IoT, and tech support scams. Ransomware attacks are now commonplace. Most of the time, companies are targeted by the attackers, because this is where the big money beckons. But that doesn't mean that private users aren't safe. Cyber ​​criminals rely on mass and continuous income from smaller amounts. Such attacks against consumers are increasing. The potential victims should therefore know the most important attack vectors. 5 Pathways of a Typical Ransomware Attack…

Read more

Banking Trojan FluBot targets smartphones in Germany

Current banking Trojan campaign hides attack methods behind new supposed content. Bitdefender experts are investigating the new variants of the banking Trojans FluBot and TeaBot, which target smartphones in Germany. Bitdefender Labs experts have been monitoring new variants of the FluBot and TeaBot banking Trojans since December 2021. Over 100.000 malicious SMS were registered in Bitdefender telemetry alone during this period. An important focus of the attacks in December 2021 was Germany with 32,23%. Only Australia was hit harder. The criminal actors have now adapted their campaigns and are now luring with supposedly new content....

Read more