• Iot Forum
  • About us
  • Write for us
  • Contact us
  • Newsletter signup
IOT News - Internet of Things
  • IoT Forum
  • Hardware
    • Networking
  • Smart Home
  • Digital Transformation
    • All
    • Artificial Intelligence
    • Blockchain IoT
    • Enterprise IoT
    • Industrial IoT
    • Machine Learning
    • Smart City
    Morse Micro and Zetifi Announce Remote-Area Connectivity for Smart IoT Farming at #CES2024

    Morse Micro and Zetifi Announce Remote-Area Connectivity for Smart IoT Farming at #CES2024

    CES 2022 show highlights: Robo-dogs, self-sailing boat, brain tech

    CES 2022 show highlights: Robo-dogs, self-sailing boat, brain tech

    Quanergy and iCent to Showcase Advanced Electric Vehicle Charger Robot at #CES2022

    Quanergy and iCent to Showcase Advanced Electric Vehicle Charger Robot at #CES2022

    • Wearables
    • Artificial Intelligence
    • Machine Learning
    • Industrial IoT
  • Cloud
  • Security
  • 5G IoT
  • Cars
No Result
View All Result
  • IoT Forum
  • Hardware
    • Networking
  • Smart Home
  • Digital Transformation
    • All
    • Artificial Intelligence
    • Blockchain IoT
    • Enterprise IoT
    • Industrial IoT
    • Machine Learning
    • Smart City
    Morse Micro and Zetifi Announce Remote-Area Connectivity for Smart IoT Farming at #CES2024

    Morse Micro and Zetifi Announce Remote-Area Connectivity for Smart IoT Farming at #CES2024

    CES 2022 show highlights: Robo-dogs, self-sailing boat, brain tech

    CES 2022 show highlights: Robo-dogs, self-sailing boat, brain tech

    Quanergy and iCent to Showcase Advanced Electric Vehicle Charger Robot at #CES2022

    Quanergy and iCent to Showcase Advanced Electric Vehicle Charger Robot at #CES2022

    • Wearables
    • Artificial Intelligence
    • Machine Learning
    • Industrial IoT
  • Cloud
  • Security
  • 5G IoT
  • Cars
No Result
View All Result
IOT News - Internet of Things
No Result
View All Result
Home Security

Cybereason Discovers a Global Outbreak of Malware Attacks Using Bitbucket Share Article

Cybercriminals are carrying out targeted attacks against companies around the world utilizing a shotgun approach with many different types of malware. Cybereason's researchers determined 500,000 + workstations are infected around the world.

IoTNews.com by IoTNews.com
February 7, 2020
in Security
0
Cybereason Discovers a Global Outbreak of Malware Attacks Using Bitbucket Share Article
28
SHARES
110
VIEWS
Share on FBShare on TwitterShare on LinkedinReddit

Cybereason, creators of the leading Cyber Defense Platform, today announced that its Nocturnus research team released its newest research findings The Hole in the Bucket, which uncovers an arsenal of malware actively abusing Bitbucket to steal data, mine for cryptocurrency, and deliver ransomware to victims all over the world. Today, more than 500,000 workstations have been infected.

Due to the variety of malware types deployed in this active attack, attackers are not limited to one attack vector, but can hit victims over and over again. The payloads observed in this campaign originated from different accounts in the code repository platform Bitbucket, which was abused as part of the attackers delivery infrastructure.

Key Findings:

  • Abuses Resource Sharing Platforms: This ongoing campaign abuses the Bitbucket infrastructure to store and distribute a large collection of different malware.

Attacks From All Sides: This campaign is able to steal sensitive browser data, cookies, email client data, system information, and two-factor authentication software data, along with cryptocurrency from digital wallets. It is also able to take pictures using the camera, take screenshots, mine Monero, and, in certain cases, also deploy ransomware.

  • Far Reaching: This ongoing campaign has infected over 500,000 machines worldwide thus far.

Modular and Constantly Updating: The attackers leverage Bitbucket to easily update payloads and distribute many different types of malware at once. In order to evade detection, they have an array of user profiles and continuously update their repositories, at times as often as every hour.

  • Malware Variety: The attackers use the Evasive Monero Miner to steal a combination of data, mine cryptocurrency, and deploy other malware, including the Vidar stealer, Amadey Bot, and IntelRapid. They also use Predator the Thief, Azorult, and the STOP ransomware over the course of the campaign.
  • Devastating Impact: The combination of so many different types of malware exfiltrating so many different types of data can leave organizations unworkable. This threat is able to compromise system security, violate user privacy, harm machine performance, and cause great damage to individuals and corporations by stealing and spreading sensitive information, all before infecting them with ransomware.

“This research is interesting because of how the attackers infect a single target machine with multiple different kinds of malware. These kinds of commodity malware are often used for a one-off infection to steal data on the machine and sell it in underground hacking communities. However, in this attack, the attackers chose to integrate malware like coin miners and ransomware, which gives them a more persistent source of revenue,” said Lior Rochberger, Threat Hunter, Cybereason

About Cybereason
Cybereason, creators of the leading Cyber Defense Platform, gives the advantage back to the defender through a completely new approach to cybersecurity. Cybereason offers endpoint prevention, detection and response and active monitoring. The solution delivers multi-layered endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks.

JOIN OUR IoT COMMUNITY
IoTForums.com
×
Continue to iotForums.com
Internet of Things platforms, projects, development, devices & support forum
for developers and enthusiasts
Tags: bitbucketcybereasoncybersecurity
Share17Tweet5Share1Share
Previous Post

WISeKey’s Global Cybersecurity to Protect People’s Privacy and Critical Infrastructures

Next Post

Autonomous delivery vehicle set to roll after getting US approval

Related Posts

Enhanced NETGEAR Armor Helps Deliver Next-Gen Protection for Connected Devices

Enhanced NETGEAR Armor Helps Deliver Next-Gen Protection for Connected Devices

by IoTNews.com
August 11, 2021
0

NETGEAR, Inc. (NASDAQ: NTGR), the leading provider of award-winning connected products designed to simplify and improve people's lives, today announced...

30 Golden Rules for Online Security and Browsing the Internet safely

30 Golden Rules for Online Security and Browsing the Internet safely

by IoTNews.com
June 27, 2021
0

I initially developed this list to help family members browse the internet safely and secure their computers and cryptocurrency wallets....

AWS Announces General Availability of Amazon Fraud Detector

ExtraHop Threat Research Team Finds One in Three IT Environments Vulnerable to Ripple20 Threat

by IoTNews.com
September 11, 2020
0

SEATTLE: ExtraHop, the leader in cloud-native network detection and response, today issued a report warning of the potential impact of...

IoT Forum Discussions

No items

Stay Connected with IoTNews

IOT News - Internet of Things

© 2020 IoTNews.com

Navigate Site

  • Home
  • About us
  • Write for us
  • Contact Us
  • Newsletter signup

Follow Us

No Result
View All Result
  • IoT Forum
  • Hardware
    • Networking
  • Smart Home
  • Digital Transformation
    • Wearables
    • Artificial Intelligence
    • Machine Learning
    • Industrial IoT
  • Cloud
  • Security
  • 5G IoT
  • Cars

© 2020 IoTNews.com