Vulnerabilities have been found in multiple mobile browsers that allow hackers to spoof the URL of websites in the address bar.
Detailed today by researcher Tod Beardsley at Rapid7 Inc., the address bar spoofing vulnerabilities were found in Apple Inc.’s Safari, Opera Touch/Mini, Yandex, Bolt Browser, RITS Browser and UC Browser. Although most of those are not widely known, Safari is the default browser in iOS and iPadOS, while the Opera browsers are popular on some low-end phones.
Exploiting the vulnerabilities, an attacker can present a fake URL in the address bar for a given webpage, fooling users into believing that they may be on a legitimate site when they are on a fake phishing or similar scam website.
Address spoofing isn’t new and it’s not limited to mobile browsers, but part of the issue lies with how mobile browsers present addresses. In a desktop browser, there are security features
A hacking group going by the name Darkside has reportedly tried to donate around $20,000 in stolen bitcoin to charity.
The gang posted receipts for two $10,000 bitcoin donations to The Water Project and Children International on a dark web blog post, the BBC reported along with screenshots of the transactions.
MORE FROM FORBESCoronavirus Has Made Akon’s $6 Billion Crypto-Powered, ‘Real-Life Wakanda’ In Senegal ‘More Necessary’By Billy Bambrough
Bitcoin and cryptocurrencies are often used by cyber criminals to extort victims thanks to their semi-anonymous nature. Ransomware attacks, where victims’ files are encrypted and only unlocked if bitcoin or other cryptocurrencies are paid to hackers, have become a common tool of cyber criminals in recent years.
Darkside hackers, who formed their seemingly sophisticated ransomware operation over the summer, say they want
Russian state-backed hackers were planning to attack the Tokyo 2020 Olympic and Paralympic games, the UK government said Monday.
This came the same day the Department of Justice indicted six Russian officials for orchestrating a series of serious cyber attacks, including on the 2018 Winter Olympics in South Korea.
The UK gave more detail on the 2018 attacks, saying Russian hackers attempted to sabotage the games using data-deleting malware.
The delayed Tokyo 2020 games are scheduled to begin on July 23, 2021.
Visit Business Insider’s homepage for more stories.
State-backed Russian hackers were planning to attack the 2020 Olympic Games in Tokyo before it was postponed, the UK announced on Monday.
“Russia’s military intelligence service, the GRU, conducted cyber reconnaissance against officials and organisations at the 2020 Olympic and Paralympic Games due to take place in Tokyo this summer before they were postponed,” the UK government said in a press
The Chinese group that Google is referring to as APT 31 (short for Advanced Persistent Threat) used email links from where users would download malware.
Google has unearthed a massive malware campaign allegedly run by hackers linked to the Chinese government. In a blog post, Google has shared the modus operandi of the campaign. As per Google, the hackers were running the campaign under the guise of McAfee antivirus software. The hackers seem to be the same group that targeted the presidential campaign of former Vice President Joe Biden with a phishing attack earlier this year.
Apart from this, the company noted that a similar group of Iran based hackers had tried to target President Trump’s campaign. Both of the attempts remained unsuccessful.
“The Iranian attacker group (APT35) and the Chinese attacker group (APT31) targeted campaign staffers’ personal emails with credential phishing emails and emails containing tracking links. As part
Google said in a new blog post that hackers linked to the Chinese government have been impersonating antivirus software McAfee to try to infect victims’ machines with malware. And, Google says, the hackers appear to be the same group that unsuccessfully targeted the presidential campaign of former Vice President Joe Biden with a phishing attack earlier this year. A similar group of hackers based in Iran had tried to target President Trump’s campaign, but also was unsuccessful.
The group, which Google refers to as APT 31 (short for Advanced Persistent Threat), would email links to users which would download malware hosted on GitHub, allowing the attacker to upload and download files and execute commands. Since the group used services like GitHub and Dropbox to carry out the attacks, it made it more difficult to track them.
“Every malicious piece of this attack was hosted on legitimate services, making it harder
The same Chinese government-linked hackers who targeted the campaigns of both 2020 presidential candidates earlier this year have been trying to trick users into installing malware by posing as the antivirus provider McAfee and using otherwise legitimate online services like GitHub and Dropbox.
Shane Huntley, the head of Google’s Threat Analysis Group, offered new details about the suspected state-sponsored cyberattackers, known as APT 31, and their latest tactics in a company blog post on Friday. In June, Google’s security team uncovered high-profile phishing scams by APT 31 and Iranian state-sponsored hackers intended to hijack the email accounts of campaign staffers with President Donald Trump and Democratic nominee Joe Biden. (All of these phishing attempts appeared to have failed, Google said at the time).
On Friday, Huntley said that one of APT 31’s latest hacking techniques involved