article thumbnail

Hackers abused swap files in e-skimming attacks on Magento sites

Security Affairs

Attackers used this swap file to keep malware on the server and evade detection. After removing the swap file and clearing caches, the checkout page was clean. “The swapme part of the file name clued us in that there might be some swap lingering around. ” reads the report published by Sucuri.

Cleanup 331
article thumbnail

Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs

Security Affairs

Threat actors compromised the websites running vulnerable versions of the popular CMS, including 4.4.20, 5.0.21, 5.1.18 The attackers uploaded PHP files containing the C2 code consisting of names such as: rss-old[.]php, killme” : Create a BAT file (see below) with a name based on the current tick count.

CMS 340
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks use hidden directories of compromised HTTPS sites to deliver malware

Security Affairs

of the popular CMS that are affected by a cross-site request forgery (CSRF) flaw that resides in the comment section of WordPress that is enabled by defaul t. According to the experts, the cybercriminals targeted websites running outdated CMS plugins and themes or server-side software. zip) that contain the JavaScript file.

CMS 279
article thumbnail

Gootkit delivery platform Gootloader used to deliver additional payloads

Security Affairs

. “And if that same site visitor clicks the “direct download link” provided on this page, they receive a.zip archive file with a filename that exactly matches the search query terms used in the initial search, which itself contains another file named in precisely the same way.” ” continues the analysis.

article thumbnail

GhostWriter APT targets state entities of Ukraine with Cobalt Strike Beacon 

Security Affairs

The phishing messages use a RAR-archive named “Saboteurs.rar”, which contains RAR-archive “Saboteurs 21.03.rar.” ” This second archive contains SFX-archive “Saboteurs filercs.rar,” experts reported that the file name contains the right-to-left override (RTLO) character to mask the real extension.

Archiving 246
article thumbnail

Dacls RAT, the first Lazarus malware that targets Linux devices

Security Affairs

The name Dacls comes from its file name and the hard-coded strings, the malware has a modular structure that could extend its capabilities by loading plugins. The command and control protocol uses TLS and RC4 double-layer encryption, Dacls uses AES to encrypt configuration file and supports C2 instruction dynamic update.

CMS 265
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

The phishing email contains a.zip file named “slavneft.zakaz.zip”, which means something like “slavneft order” in English, showing a direct reference to “Slavneft”. It contains a russian speaking JavaScript file named “«??? «??? «?????????» ??????????? ??????”,