Types Of Steganography?

Types Of Steganography? – Steganogrpahy is the art and science of writing hidden messages in such a way that no one other than intended recipient knows of the existence of the message. The increasing uses of electronic file formats with new technologies have made data hidding possible. Basic steganography can be broken down into two area: data hiding and document making. Document making deals with protection against removal. It’s further classification of cover medium includes watermarking and fingerprinting. Types Of Steganography? the Different Type of steganography are as follows: Image…

Read More

Another Mumbai-Like Blackout? Telangana Power Utilities Dodge Chinese Hacking Attempt After Alert

An alert by Computer Emergency Response Team of India has averted a hacking attempt of the power systems in Telangana’s TS Transco and TS Genco by a China-based group. TS Transco and TS Genco are power utilities of the state. The hackers were reportedly trying to steal data and disrupt power supply. GENCO has blocked suspected IP addresses and changed the user credentials of officials operating remote sites and sophisticated power grids. “China-based threat actor group command and control servers were trying to communicate with systems belonging to Telangana SLDC…

Read More

Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection

Cybercriminals are now deploying remote access Trojans (RATs) under the guise of seemingly innocuous images hosted on infected websites, once again highlighting how threat actors quickly change tactics when their attack methods are discovered and exposed publicly. New research released by Cisco Talos reveals a new malware campaign targeting organizations in South Asia that utilize malicious Microsoft Office documents forged with macros to spread a RAT that goes by the name of ObliqueRAT. First documented in February 2020, the malware has been linked to a threat actor tracked as Transparent…

Read More

What is Steganography?

What is Steganography? – Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain confidentiality of data. Utilizing a graphic image as a cover is the most popular method to conceal the data in files. Attacker can use steganography to hide message such as list of the compromised servers, source code for the hacking tool, plans for future attacks, etc. What is Steganography? One of the shortcomings of various detection programs is their primary focus on streaming text data.…

Read More

No data breach in Chinese hacking attempt at power grid system, says govt

The Centre on Monday denied any data breach in the attempt made by Chinese hackers to target the country’s power grid system. In a statement, the power ministry said, “An email was received from CERT-In on 19th November, 2020 on the threat of malware called Shadow Pad at some control centres of POSOCO. Accordingly, action has been taken to address these threats.” “NCIIPC informed through mail on Feb 12 about threat by Red Echo through malware Shadow Pad that ‘Chinese state-sponsored threat Actor group known as Red Echo is targeting…

Read More

RootKits Tool And Defend Against RootKits

RootKits Tool And Defend Against RootKits – Rootkits are software programs aimed to gain access to a computer without detection. These are malware that help the attackers to gain unauthorized access to a remote system. RootKits Tool And Defend Against RootKits RootKits Tool HorsePill Source: Horse Pill Tool Horse Pill is a PoC of a ramdisk based containerizing root kit. it resides inside the initrd, and prior to the actual init running, it puts it into a mount and pid namespace that allows it to run covert processes and covert…

Read More

North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware

A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry. Attributing the attacks with high confidence to the Lazarus Group, the new findings from Kaspersky signal an expansion of the APT actor’s tactics by going beyond the usual gamut of financially-motivated crimes to fund the cash-strapped regime. This broadening of its strategic interests happened in early 2020 by leveraging a tool called ThreatNeedle, researchers Vyacheslav Kopeytsev and Seongsu Park said in a Thursday…

Read More

H2C smuggling named top web hacking technique of 2020

A novel alternative to traditional HTTP request smuggling that spotlighted an obsolete, hitherto obscure protocol has been recognized as 2020’s top web hacking technique. Unveiled by Bishop Fox researchers in September, HTTP/2 cleartext (H2C) smuggling “abuses H2C-unware front-ends to create a tunnel to backend systems, enabling attackers to bypass frontend rewrite rules and exploit internal HTTP headers,” explains James Kettle, head of research at PortSwigger Web Security*, in the company’s rundown of 2020’s most impressive web hacking techniques. “Conceptually similar” to, but “significantly more practical” than, last year’s WebSocket smuggling,…

Read More

Twitter’s new hacking label has already been hacked

Twitter has started to label some tweets with a warning about materials “obtained through hacking.” This new label is appearing on some news stories that Twitter believes are based on hacks and leaked documents, but Twitter users have found an easy way to hack a URL together to make it appear on any tweet. The new label appeared on a story from independent outlet The Grayzone this week. If you share the URL of this particular story, it will generate the warning. But Twitter also displays the warning if you…

Read More

How RootKits Works & How To Detect Rootkits?

How RootKits Works & How To Detect Rootkits? – System hooking is a process of changing and replacing the original function pointer with the pointer provided by the rootkit in stealth mode. Inline function hooking is a technique where a rootkit changes some of the bytes of a function inside the core system DLLs (kernel32.dll and ntdll.dll) placing an instruction so that any process calls hit the rootkit first. Direct Kernel Object Manipulation (DKOM) rootkits are able to locate and manipulate the “system” process in kernel memory structures and patch…

Read More