abuse

  • Blog

    Hackers abuse popular Godot game engine to infect thousands of PCs

    ​Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months. As Check Point Research found while investigating the attacks, threat actors can use this malware loader to target gamers across all major platforms, including Windows, macOS, Linux, Android, and iOS. It’s also…

    Read More »
  • Blog

    Hackers abuse Avast anti-rootkit driver to disable defenses

      A new malicious campaign is using a legitimate but old and vulnerable Avast Anti-Rootkit driver to evade detection and take control of the target system by disabling security components. The malware that drops the driver is a variant of an AV Killer of no particular family. It comes with a hardcoded list of 142 names for security processes from various vendors.…

    Read More »
  • Blog

    Hackers abuse F5 BIG-IP cookies to map internal servers

    CISA is warning that threat actors have been observed abusing unencrypted persistent F5 BIG-IP cookies to identify and target other internal devices on the targeted network. By mapping out internal devices, threat actors can potentially identify vulnerable devices on the network as part of the planning stages in cyberattacks. “CISA has observed cyber threat actors leveraging unencrypted persistent cookies managed by…

    Read More »
Back to top button
close