flipboard.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Welcome to Flipboard on Mastodon. A place for our community of curators and enthusiasts to inform and inspire each other. If you'd like to join please request an invitation via the sign-up page.

Administered by:

Server stats:

1.2K
active users

#malware

158 posts79 participants7 posts today

Android Malware Hijacks Payments Using NFC-Relay Technique

Pulse ID: 680499de9a63e388fd8e492a
Pulse Link: otx.alienvault.com/pulse/68049
Pulse Author: cryptocti
Created: 2025-04-20 06:53:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Continued thread

3/2 Yes, this is #enshittification. It's deliberate obsolescence.

The Microsoft business case is that users should buy their hardware (prominently advertised at their notice of support ending), and buy into W11/services.

The counterargument is that newer hardware is required to mitigate against some types of #malware attacks.

The background is that our computing environments are spoiled because some people are 'bad actors', which creates the need for ('cyber') #security

The Register: Russians lure European diplomats into malware trap with wine-tasting invite. “Russia never stops using proven tactics, and its Cozy Bear, aka APT 29, cyber-spies are once again trying to lure European diplomats into downloading malware with a phony invitation to a lux event.”

https://rbfirehose.com/2025/04/19/the-register-russians-lure-european-diplomats-into-malware-trap-with-wine-tasting-invite/

ResearchBuzz: Firehose | Individual posts from ResearchBuzz · The Register: Russians lure European diplomats into malware trap with wine-tasting invite | ResearchBuzz: Firehose
More from ResearchBuzz: Firehose

So, a business associate's email got spoofed and I was sent an email with a link. It was something that was normal for him to send so I clicked it. It was of course as you surmised, malicious.

I did this on my iPhone. Nothing opened and I haven't seen any worrying signs. Cleared all my history and such.

Anything I need to worry about? Asking all the big brains out there.

New XorDDoS Malware Allows Attackers to Create Sophisticated DDoS Bot Network

Hundreds of people have signed a petition calling for the removal of the names of two people from a list of Pembrokeshire-based Pupils, who are also known as the PPPs.

Pulse ID: 6802f9594194962b1a050c5f
Pulse Link: otx.alienvault.com/pulse/6802f
Pulse Author: cryptocti
Created: 2025-04-19 01:16:09

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Leaked KeyPlug Malware Infrastructure Contains Exploits Targeting Fortinet Firewall and VPN

Pulse ID: 6802c50a49c5f0653c2e1ef4
Pulse Link: otx.alienvault.com/pulse/6802c
Pulse Author: cryptocti
Created: 2025-04-18 21:32:58

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation

A new Android malware campaign called 'SuperCard X' has been identified, employing NFC-relay techniques to enable fraudulent POS payments and ATM withdrawals. Distributed through a Chinese-speaking Malware-as-a-Service platform, it shares similarities with NGate malware. The campaign uses social engineering tactics to trick victims into installing the malicious app and tapping their payment cards on infected phones. This sophisticated fraud scheme combines SMS phishing, phone calls, malware installation, and NFC data interception. SuperCard X poses a significant financial risk to banking institutions, payment providers, and credit card issuers due to its ability to perform instant fraudulent cash-outs with debit and credit cards.

Pulse ID: 680278d75b1a8862b3d4d67d
Pulse Link: otx.alienvault.com/pulse/68027
Pulse Author: AlienVault
Created: 2025-04-18 16:07:51

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#Android#Bank#Chinese