A new malware campaign has been identified that utilizes a legitimate Avast Anti-Rootkit driver to disable 142 security processes, effectively bypassing security protections and allowing attackers to take control of infected systems. This attack is part of a broader trend of cybersecurity threats, including a recent report from CISA that added a critical security flaw (CVE-2023-28461) affecting Array Networks AG and vxAG gateways to its Known Exploited Vulnerabilities catalog due to active exploitation. Additionally, Russian hackers have been linked to the exploitation of zero-day vulnerabilities in Firefox and Windows, enabling the delivery of the RomCom backdoor malware without requiring user interaction. Furthermore, a previously unknown China-linked hacking group, Earth Estries, has emerged, targeting Southeast Asian telecoms and technology firms with custom backdoors known as GHOSTSPIDER and MASOL RAT. These developments highlight the increasing sophistication and frequency of cyberattacks globally.
Russia-linked hackers exploited Firefox and Windows zero-day bugs in ‘widespread’ hacking campaign: https://t.co/3OzA1hE0zt by TechCrunch #infosec #cybersecurity #technology #news
Russia-linked hackers exploited Firefox and Windows zero-day bugs in ‘widespread’ hacking campaign https://t.co/3tAhS0ZXvy
🚨🚨Zero-Day 🚨🚨 RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks https://t.co/p2XajfeYw2 The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation of two security flaws, one in Mozilla Firefox and the other in…