WhatsApp Upgrades Proxy Feature Against Internet Shutdowns
Meta’s WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in the kind of content that can be shared in conversations.
This includes the ability to send and receive images, voice notes, files, stickers and GIFs, WhatsApp told The Hacker News. The new features were first reported by BBC Persian.
Some of the other improvements include streamlined steps to simplify the Read More
The Hacker News | #1 Trusted Cybersecurity News Site
Compounding the problem are zero-day vulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month. Delays in fixing these vulnerabilities lead to compliance issues, these delay can be minimized with a unique feature on AppTrana that helps you to get “Zero vulnerability report” within 72 hours.
Silver RAT Evades Anti-viruses
Developers active on hacker forums and social media, especially on Telegram, to offer services like:-
Cracked RATs
Leaked databases
Carding
Social media bot sales
Silver RAT v1.0 was initially seen in November 2023 which has destructive features and a Windows base, but a new version is planned for the following two platforms:-
Windows
Android
While besides this, ‘noradlb1’ is a known developer with a respected reputation on forums. The cracked version surfaced in October 2023 on Telegram and GitHub.
Silver RAT’s builder allows threat actors to customize payloads up to 50kb. Once connected, the victim’s logs appear on the attacker’s panel.
The final payload is a Windows executable file delivered through social engineering.
Apart from this, the sale announcement first appeared on the following hacking forums among the several ones:-
TurkHackTeam
1877
Multiple posts on forums (Source – Cyfirma)
A successful connection grants the attacker control over the target system. Through the ‘Manager’ option, they can do the following things:-
Handle applications
Navigate the file manager
Modify registry keys
Check startup items
Monitor system performance
Here below, we have mentioned all the other malicious activities that threat actors can leverage:-
Hidden Apps
Hidden Browsers
Hidden VNC
Functionalities of Silver RAT
Here below, we have mentioned all the functionalities of the Silver RAT:-
Command and control via IP address/port or webpage.
Windows Defender exclusion for post-launch stealth.
Configuration to erase all system restore points.
Delayed execution option for the payload.
Hidden process and installation in task manager.
Custom process name to conceal payload in folders.
Antivirus bypass through FUD Crypters.
Researchers discovered two Telegram channels used by the Silver RAT devs, which show high engagement. While CYFIRMA finds they use a known Crypto wallet with diverse addresses (Bitcoin, Ethereum, USDT):-
Researchers trace PayPal purchases and obtain threat actors’ Gmail. Further investigation links a hacktivist Facebook account supporting the “Syrian Revolution” to a Silver RAT developer known for FPS game hacks.
Recommendations
Here below, we have mentioned all the recommendations offered by the cybersecurity analysts:-
Google Chrome’s organize tabs will automatically reorder tabs
In a bid to upgrade user experience, the Chrome team is developing an “Organise Tabs” feature, soon to be seen at the top left corner of the browser, adjacent to the tab search function. This new addition would be a natural extension of Tab Groups functionality. […] Read More
Multiple vulnerabilities in PrinterLogic’s enterprise management printer solution could expose organizations to various types of attacks. The post Many Vulnerabilities Found in PrinterLogic Enterprise Software…