A little taste of what’s coming up at VB2025 🎬
We can’t wait to see so many of you in Berlin this September.
If you haven’t registered yet, now’s the time: Early Bird ends this week 🎟️
Secure your place now 👉https://tinyurl.com/4ujjvf7v
A little taste of what’s coming up at VB2025 🎬
We can’t wait to see so many of you in Berlin this September.
If you haven’t registered yet, now’s the time: Early Bird ends this week 🎟️
Secure your place now 👉https://tinyurl.com/4ujjvf7v
A teammate of mine worked on an interesting incident where the attackers connected to the backup server via RDP, launched the Chrome browser, and searched on Google for "VirtualBox".
The VirtualBox installer was then downloaded to the home directory of the compromised user:
C:\Users\<user>\Downloads\VirtualBox-7.1.6-167084-Win.exe
This file is a Windows installation package that the attacker used to set up a VirtualBox environment, allowing them to create an operating system without endpoint protection. The newly created virtual machine had the hostname "WIN-D1V1F70QJLC".
The attacker then logged into this newly created virtual machine to carry out further tasks without logging, antivirus, or EDR monitoring.
-CoinMarketCap hacked via animated logo
-White House rejects NSA & CyberCom nomination
-FCC probes US Cyber Trust Mark program
-Cyberattack disrupts Russian animal processing industry
-Iran hacks Albania's capital Tirana
-Breach at insurance company Aflac
-Oxford, UK breach
-Tonga hit by another cyberattack
-Salt Typhoon hacks Canadian telco
-BitoPro hack linked to North Korea
-Judge overturns HHS privacy rule
Podcast: https://risky.biz/RBNEWS441/
Newsletter: https://news.risky.biz/risky-bulletin-coinmarketcap-hacked-via-a-doodle-image/