article thumbnail

FBI seized other domains used by the shadow eBook library Z-Library

Security Affairs

The FBI disrupted once again the illegal eBook library Z-Library the authorities seized several domains used by the service. The Federal Bureau of Investigation (FBI) seized multiple domains used by the illegal shadow eBook library Z-Library. The library is still reachable through TOR and I2P networks.

Libraries 246
article thumbnail

Devices from Dell, HP, and Lenovo used outdated OpenSSL versions

Security Affairs

Researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. Binarly researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. that dates back to 2009. . that dates back to 2009.

Libraries 256
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. “Both Mac and Linux variants use the WolfSSL library for SSL communications. ” continues the report.

Libraries 318
article thumbnail

Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. “HIDDEN COBRA actors most likely deployed ISO 8583 libraries on the targeted switch application servers.

Retail 278
article thumbnail

The analysis of the code reuse revealed many links between North Korea malware

Security Affairs

In defining similarities, we take into account only unique code connections, and disregard common code or libraries. For example, the “Common SMB module” that was part of the WannaCry Ransomware (2017) was similar to the code used the malware Mydoom (2009), Joanap , and DeltaAlfa. ” states the report.

Libraries 174
article thumbnail

APT10 is back with two new loaders and new versions of known payloads

Security Affairs

The group has been active at least since 2009, in April 2017 experts from PwC UK and BAE Systems uncovered a widespread hacking campaign, tracked as Operation Cloud Hopper , targeting managed service providers (MSPs) in multiple countries worldwide.

Libraries 272
article thumbnail

Mysterious DarkUniverse APT remained undetected for 8 years

Security Affairs

The DarkUniverse has been active at least from 2009 until 2017. The executable file embedded in the documents drops two dynamic-link libraries on the target system, the updater. .” The dump also included an intriguing Pyton script named sigs.py that checked for traces of other APT groups in the compromised system. mod and glue30.dll.

Libraries 184