Galaxy Z Fold 5 will be shorter, narrower, & thinner than Fold 4

0
[ad_1]

We have long known that Samsung‘s upcoming foldable smartphone Galaxy Z Fold 5 will be thinner and lighter than its predecessor. The device will also fold gapless thanks to the new waterdrop hinge. Reputed tipster Ice Universe has now compared how it stacks up against the 2022 model in terms of dimensions and weight. They have also given us a visual showing the difference between the two foldables.

According to the new report, the Galaxy Z Fold 5 will measure 154.9 x 129.9 x 6.1mm when unfolded. In comparison, the Galaxy Z Fold 4 measures 155.1 x 130.1 x 6.3mm. So the new foldable is 0.2mm shorter, 0.2mm narrower, and 0.2mm thinner than its predecessor when unfolded. This change has helped Samsung cut its weight by nine grams, down from 263 grams to 254 grams. But that isn’t it.

The dimensions of the Galaxy Z Fold 5 in a folded state will reportedly measure 154.9 x 67.1 x 13.4mm. While the length and breadth are unchanged from the 2022 model, the new hinge makes the upcoming device a lot thinner when folded. We are talking about 0.8-2.4mm thinner than the Galaxy Z Fold 4. Last year’s foldable didn’t fold evenly or gapless, measuring between 14.2-15.8mm in thickness when folded. The new model is just 13.4mm thick.

Despite these changes in dimensions, Samsung is reportedly keeping the screen sizes unchanged from last year. The Galaxy Z Fold 5 will still get a 7.6-inch folding screen on the inside and a 6.2-inch secondary display on the outside. The company has seemingly cut the bezels a bit to make this happen. You won’t notice any difference between the two foldables in mockups shared by Ice Universe, though. We are talking about factions of a millimeter, so this isn’t something immediately noticeable to the naked eye.

Samsung Galaxy Z Fold 4 vs Fold 5 comparison

The Galaxy Z Flip 5 will get a bigger cover display

Samsung may be keeping the cover display unchanged on the Galaxy Z Fold 5, but it’s a different story for the Galaxy Z Flip 5. The clamshell foldable will get a much bigger screen on the outside. It will feature a 3.4-inch squarish panel on the top half of its back. Last year’s model has a 1.9-inch rectangular panel. The Flip model will also get the same waterdrop hinge as the Fold, so it should be thinner and lighter too. You can expect more leaks and rumors about the new Samsung foldables in the coming days. The company is planning to launch the Galaxy Z Fold 5 and Galaxy Z Flip 5 in late July.

 


[ad_2]
Source link

GhostToken GCP vulnerability allowed hacking of Google accounts

0
[ad_1]

Zero-day flaws are at the top when it comes to online security risks, as they allow hackers to exploit a vulnerability that is unknown to the software vendor. Recently, Google’s Cloud Platform (GCP), a popular data storage and management tool, became the target of one of these exploits, allowing attackers to gain access to people’s Google accounts, including data in Gmail, Drive, Docs, Photos, and more.

Although the Israeli cybersecurity startup Astrix Security discovered and reported the vulnerability back in June 2022, Google is now rolling out a patch to address the issue.

How does the vulnerability work?

Dubbed GhostToken, the vulnerability allowed hackers to make a malicious GCP app of their own and advertise it through the Google marketplace. Therefore, if a user installed the malicious GCP app and authorized it by linking it to an OAuth token, hackers would then gain access to the user’s Google account.

Additionally, to make it impossible for the victims to remove the app, hackers could hide it by deleting the linked GCP project, putting the app in a “pending deletion” state and making it invisible on the Google application management page. To make matters worse, attackers could repeat this process of hiding and restoring the malicious app every time they needed access to the victim’s data.

While the impact of the attack depended on the permissions a victim gave to the app, once the attackers had access to the Google account, they could hold a “ghost” token, which granted them access to the data indefinitely.

Google’s solution

Google’s recent update has finally fixed the vulnerability by making sure that GCP OAuth applications in a “pending deletion” state will now appear on the “Apps with access to your account” page. Therefore, allowing users to remove these applications and prevent any attempts at hijacking their accounts.

Moreover, to help stay protected from future vulnerabilities and exploits, users should also regularly check their app management page to verify that all third-party applications only have the necessary permissions for their intended functions.


[ad_2]
Source link

GhostToken Zero-Day Vulnerability Found In Google Cloud

0
[ad_1]

A severe zero-day vulnerability, identified as the “GhostToken” flaw, could allow an adversary to infect a target Google Cloud with malicious apps. Google patched the flaw before public disclosure.

GhostToken Zero-Day Vulnerability In Google Cloud

As elaborated in a recent post from Astrix Security, the GhostToken zero-day vulnerability could allow infecting the target Google Cloud with malicious apps.

Specifically, the flaw affected the Google account application management page – the option allowing users to review the apps in use. An adversary could connect malicious apps to the account, and hide them permanently from the user. As a result, the respective Google account’s user could never know the presence of the malicious app, inadvertently continuing to use an infected account.

Briefly, the flaw exists due to how an app connects to a Google account via a token. As the researchers explained, an app gains the access token to the respective account right after the Google user installs it from the Google Marketplace.

Regarding how they came across the issue, the researcher stated,

“While running our usual analysis process, a tokens.list API call had returned an odd result – a token of an OAuth application which had its displayText identical to the clientId field.

The researchers found the reason behind the weird displayText field behavior being the deletion of an OAuth application client. They then became curious about what would happen to the access token if they restore the app scheduled for deletion. (Google allows restoring an app scheduled for deletion within 30 days.)

They noticed that the refresh token, created before initiating the deletion, became re-enabled following the restoration. Eventually, they could use this refresh token to get the access token that they could exploit to access the respective Google account.

Hence, they deduced that someone with malicious intentions could easily delete and restore their malicious app to maintain stealthy yet persistent access to the victim’s Google account to steal sensitive data.

Google Patched the Vulnerability

According to the researchers, an adversary could exploit GhostToken vulnerability to access sensitive information from the target account’s Google Drive, Calendar, Photos, Google Docs, Google Maps (location data), and other Google Cloud Platform services.

Upon discovering the flaw, they reported the matter to Google in June 2022. While Google acknowledged the flaw in August 2022, it took them all the while until April 2023 to release a patch.

Still, Google managed to release the fix before the bug could suffer active exploitation. The patch includes showing the OAuth app tokens for apps scheduled for deletion in the users’ app management option.

Though the tech giant has released the fix, Google users must also review their accounts for any unrecognized apps. Also, users should ensure to provide minimal access permissions to third-party apps as a precaution.

Let us know your thoughts in the comments.


[ad_2]
Source link

Black Basta ransomware attacks Yellow Pages Canada

0
[ad_1]

Yellow Pages Canada has suffered a cyberattack by the Black Basta ransomware group.

The Canadian Yellow Pages Group has confirmed it recently became victim of a cyberattack. The Black Basta ransomware group has claimed responsibility for this attack by posting about Yellow Pages on the “Basta News” leak site.

When such a post shows up, it usually means that negotiations with the victim have stopped and that the ransomware group is getting ready to sell the data it managed to get its hands on during the attack.

Based on the most recent leaked information and an outage of the Yellow Pages website Canada 411 at the beginning of April, it is likely the attack occurred between March 15 and April 7. Attackers using Black Basta have been known to be active on a victim’s network for two to three days before running their ransomware.

Canada is ranked first if you look at the number of ransomware attacks divided by GDP.

top 10 countries ransomware attacks per GDPNumber of ransomware attacks per $1T GDP

Black Basta is not very different from other ransomware groups in the way it operates. Similar to others, the gang’s attacks frequently begin with initial access gained through phishing attacks. A typical attack might start with an email containing a malicious document in a zip file. Upon extraction, the document installs the Qakbot banking trojan to create backdoor access and deploy SystemBC, which sets up an encrypted connection to a command and control server. From there, CobaltStrike is installed for network reconnaissance and to distribute additional tools.

As is the overarching trend for ransomware groups these days, Black Basta’s primary goal is to steal data so that it can hold the threat of leaked data over its victims. The data is generally stolen using the command line program Rclone, which filters and copies specific files to a cloud service. After the data is copied, the ransomware encrypts files with the “.basta” extension, erases volume shadow copies, and presents a ransom note named readme.txt on affected devices. Attackers using Black Basta may be active on a victim’s network for two to three days before running their ransomware.

On the leak site, Black Basta provided samples of highly sensitive information about several people. Included are copies of Canadian passports, Quebec and British Columbia driver’s licenses, Régie de l’assurance- maladie du Québec (RAMQ health insurance) cards, and a tax return containing one individual’s social insurance number.

Franco Sciannamblo, YP’s Senior Vice President Chief Financial Officer commented in a statement to BleepingComputer:

“Based on our investigation to date, we have reason to believe that the unauthorized third party stole certain personal information from servers containing YP employee data and limited data relating to our business customers.”

All impacted individuals and the appropriate privacy regulatory authorities have been notified about the attack.

How to avoid ransomware

  • Block common forms of entry. Create a plan for patching vulnerabilities in internet-facing systems quickly; disable or harden remote access like RDP and VPNs; use endpoint security software that can detect exploits and malware used to deliver ransomware.
  • Detect intrusions. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.
  • Stop malicious encryption. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.
  • Create offsite, offline backups. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.
  • Don’t get attacked twice. Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.

Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Google Pixel 7 Pro vs Xiaomi 13 Ultra

0
[ad_1]

The Xiaomi 13 Ultra is the company’s latest and greatest smartphone offering. In this article, we’ll pitch it against the very best of Google. We’ll compare the Google Pixel 7 Pro vs Xiaomi 13 Ultra. The Pixel 7 Pro is not exactly brand new, it launched in October last year, but it’s still the best Google has to offer. Both of these smartphones are great in their own way, so it’ll be interesting to see how they compare.

They are quite a bit different, though. That not only goes for their design, but also their software. The Xiaomi 13 Ultra launched only in China thus far, even though it’s coming to global markets. The variant we checked out is made for the China market, though, so keep that in mind. We did sideload Google services without a problem. In any case, we’ll first list the specs of both phones, and will then compare them across a number of categories.

Specs

Google Pixel 7 ProXiaomi 13 Ultra
Screen size6.7-inch QHD+ curved OLED LTPO display (120Hz refresh rate, 1,500 nits peak brightness)6.73-inch QHD+ LTPO AMOLED display (curved, 120Hz adaptive refresh rate, 2,600 nits peak brightness)
Screen resolution3120 x 14403120 x 1440
SoCGoogle Tensor G2Qualcomm Snapdragon 8 Gen 2
RAM12GB (LPDDR5)12GB (LPDDR5X)
Storage128GB/256GB/512GB, non-expandable (UFS 3.1)256GB/512GB, non-expandable (UFS 4.0)
Rear cameras50MP (Samsung ISOCELL GN1 sensor, 1.2um pixel size, f/1.85 aperture, 82-degree FoV)
12MP (ultrawide, 1.25um pixel size, f/2.2 aperture, 125.8-degree FoV, lens correction)
48MP (telephoto, 0.7um pixel size, f/3.5 aperture, 20.6-degree FoV, 5x optical zoom, Super Res Zoom up to 30x)
50.3MP (Sony’s IMX989 1-inch sensor, f/1.9-f/4.0 aperture, 23mm lens, 1.6um pixel size, multi-directional PDAF, Laser AF, OIS)
50MP (ultrawide, 122-degree FoV, f/1.8 aperture, 12mm lens, dual-pixel PDAF)
50 MP (telephoto, f/1.8 aperture, 75mm lens, 3.2x optical zoom, dual-pixel PDAF)
50MP (periscope telephoto, 5x optical zoom, dual-pixel PDAF, OIS, 120mm lens)
Front cameras10.8MP (1.22um pixel size, f/2.2 aperture, 92.8-degree FoV, Fixed Focus)32MP (wide angle)
Battery5,000mAh, non-removable, 23W wired charging, 23W wireless charging, reverse wireless charger
Charger not included
5,000mAh, non-removable, 90W wired charging, 50W wireless charging, 10W reverse wireless charging
Charger included
Dimensions162.9 x 76.6 x 8.9mm163.2 x 74.6 x 9.1mm
Weight212 grams227 grams
Connectivity5G, LTE, NFC, Bluetooth 5.2, Wi-Fi, USB Type-C5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, USB Type-C
SecurityFace Unlock
In-display fingerprint scanner (optical)
In-display fingerprint scanner (optical)
OSAndroid 13Android 13
MIUI 14
Price$899/$999/$1,099CNY5,999 ($872)+
BuyGoogleChina only for now

Google Pixel 7 Pro vs Xiaomi 13 Ultra: Design

These two phones do look quite a bit different. Well, if you look at them from the front, they’re far more similar than they actually are. The Google Pixel 7 Pro is made out of metal and glass. It has the Gorilla Glass Victus on the back, and its frame is made out of aluminum. The Xiaomi 13 Ultra is made out of metal, while there is a vegan leather backplate included on its back. There’s actually a lot to talk about here.

The back side of the Pixel 7 Pro is equally thick in all areas, save for the camera visor. The Xiaomi 13 Ultra’s is not. It’s thicker in the portion around the camera, as the backplate’s thickness gradually increases towards the upper portion. This is a design choice by Xiaomi, to avoid having an extremely thick camera oreo. The company did have to find a way to include four 50-megapixel cameras in there, including a 1-inch camera. Its vegan leather backplate also doesn’t curve into the frame, it cuts off before that point. It’s an interesting look, and the first such implementation we’ve seen.

Both phones have curved displays, thin bezels, and a centered display camera hole. The Pixel 7 Pro does have slightly sharper corners, and a camera visor on the back. That visor connects to the frame on both the left and right sides, and it’s covered by metal. The Xiaomi 13 Ultra includes a huge, circular camera island on the back, which is centered in the upper portion of the phone’s back.

The Xiaomi 13 Ultra is slightly taller and a bit narrower than the Pixel 7 Pro. It’s also slightly thicker, and a bit heavier too. The Xiaomi 13 Ultra is considerably less slippery compared to the Pixel 7 Pro. Both smartphones do come with IP68 certification for water and dust resistance. Both feel really well-built, and like premium pieces of tech, as you’d expect. Neither phone is easy to use with one hand, not at all. They’re not only huge, but also quite bulky at the same time.

Google Pixel 7 Pro vs Xiaomi 13 Ultra: Display

The Google Pixel 7 Pro features a 6.7-inch QHD+ (3120 x 1440) LTPO AMOLED display. This panel is curved, and it has a 120Hz refresh rate. It supports HDR10+ content, and gets up to 1,500 nits of brightness at its peak. We’re looking at a 19.5:9 aspect ratio here, while the Gorilla Glass Victus protects the display.

google pixel 7 pro AM AH 02 1
Google Pixel 7 Pro display

On the other hand, the Xiaomi 13 Ultra has a 6.73-inch QHD+ (3200 x 1440) LTPO AMOLED display. This panel is also curved, and it supports a refresh rate of up to 120Hz. Dolby Vision is supported, as is HDR10+ content. This panel gets considerably brighter than the Pixel 7 Pro’s, at 2,600 nits of peak brightness. At the time of writing this article, this was technically the brightest display on the market. It has a 20:9 aspect ratio, and it’s protected by the Gorilla Glass Victus.

Both of these displays are great. They offer vivid colors with deep blacks, and really good viewing angles. The touch response is good too. The Xiaomi 13 Ultra does have the advantage from the brightness standpoint, though. This display is great for outdoor use, especially when the sun is shining. The difference is quite noticeable between the two, actually. If that’s not a concern for you, either display will serve you great.

Google Pixel 7 Pro vs Xiaomi 13 Ultra: Performance

Google’s flagship handset is fueled by the Google Tensor G2 SoC. In addition to that, Google included 12GB of LPDDR5 RAM here, in addition to UFS 3.1 flash storage. The Xiaomi 13 Ultra comes with the Snapdragon 8 Gen 2 SoC from Qualcomm. That SoC is backed by up to 16GB of LPDDR5X RAM and UFS 4.0 flash storage. The Xiaomi 13 Ultra does come with a more powerful SoC, and newer/better RAM and storage units.

Is this the difference you’ll notice during usage? Well, yes and no. If you use them side by side, you will notice the added speed of the Snapdragon 8 Gen 2 during day-to-day usage, sure. The Pixel 7 Pro is plenty fast and fluid on its own, though, and that chip on the inside is quite capable. Sure, it is a bit slower than the Snapdragon 8 Gen 2, but as long as you’re not using them side by side, you won’t really care, to be quite honest.

Things do change when gaming is concerned, though. The Xiaomi 13 Ultra is far better in the gaming department, especially when it comes to truly demanding games. The Tensor G2 wasn’t really made for gaming, or the Pixel 7 Pro. So, if you’re planning to play demanding games on your phone, the Xiaomi 13 Ultra is definitely the better choice. For the vast majority of games, however, the Pixel 7 Pro will serve you just fine too.

Google Pixel 7 Pro vs Xiaomi 13 Ultra: Battery

There is a 5,000mAh battery pack inside each of these two smartphones. They do not offer the same battery life, though, not at all. The Pixel 7 Pro has been rather finicky when it comes to battery consumption for us. At times it was great, and then at times it was rather average over the months we’ve seen it. At the moment, it provides up to 7 hours of screen-on-time, most of the time.

We’re still in the process of testing the Xiaomi 13 Ultra, and for now, it does do better in the battery life department than the Pixel 7 Pro. It’s nowhere near the levels of the Galaxy S23 Ultra and OnePlus 11, though. I’m able to reach the 7.5-8-hour mark, though. Do note that gaming is not really included in that equation, and I do take a lot of pictures on a daily basis. Your mileage may vary, though, due to different usage of different apps, with different signal strengths.

When charging is concerned, the Xiaomi 13 Ultra obliterates the Pixel 7 Pro. It supports 90W wired, 50W wireless, and 10W reverse wireless charging. The Pixel 7 Pro supports 23W wired, 23W wireless, and 5W reverse wireless charging. On top of all that, the Xiaomi 13 Ultra does come with a 90W charger in the box, while the Pixel 7 Pro doesn’t include a charger at all, only a charging cable.

Google Pixel 7 Pro vs Xiaomi 13 Ultra: Cameras

The Pixel 7 Pro has a 50-megapixel main camera, a 12-megapixel ultrawide unit (126-degree FoV), and a 48-megapixel telephoto camera (5x optical zoom). The Xiaomi 13 Ultra, on the flip side, comes with a 50.3-megapixel main camera (1-inch camera sensor, variable aperture), a 50-megapixel ultrawide unit (122-degree FoV), a 50-megapixel telephoto camera (3.2x optical zoom), and a 50-megapixel periscope telephoto unit (5x optical zoom, 100x digital zoom).

AH Xiaomi 13 Ultra image 20
Xiaomi 13 Ultra rear cameras

When it comes to camera hardware, the Xiaomi 13 Ultra dwarfs the Pixel 7 Pro. In fact, the Xiaomi 13 Ultra could be the most powerful smartphone in the market, when it comes to camera hardware. The Pixel 7 Pro does provide outstanding results with its setup, due to Google’s excellent image processing. Now, these two phones do provide entirely different results, and are more or less aimed at different people.

The Pixel 7 Pro does all it can to process images the right way, and it’s arguably one of the best when it comes to that. The pictures end up looking great as a result, punchy, sharp, and everything in between. The Xiaomi 13 Ultra relies on its excellent hardware more, and thus images do look more natural, and the colors simply pop as well. The images do look sharper in low light, while being less processed at the same time. They also look more natural in low light. The Pixel 7 Pro low light photos do look outstanding, but they don’t really look like they were taken in low-light conditions sometimes. That may be the look you prefer, though. It’s all a matter of preference.

We did enjoy the Xiaomi 13 Ultra’s telephoto camera due to the excellent portrait mode it offers. While the ultrawide camera does an excellent job of keeping up with the main unit. Even the telephoto images in low light are nothing to scoff at. The Xiaomi 13 Ultra also has that periscope telephoto camera for crazy zoom ranges, unlike the Pixel 7 Pro. The video recording is better on the Xiaomi 13 Ultra, it’s more stable, and looks more natural at the same time.

Both of these smartphones are outstanding for taking pictures. It all depends on what you need from a phone in that regard. The results are considerably different. The Xiaomi 13 Ultra is definitely more professional-feeling, and more versatile at the same time. The Pixel 7 Pro is excellent for point-and-shoot usage, and thus may suit more people.

Audio

You will find a set of stereo speakers on both of these phones. On the Pixel 7 Pro, the main speaker sits at the bottom, while the secondary unit is located under the earpiece grille. The Xiaomi 13 Ultra speakers sit at the top and bottom of the phone. Xiaomi’s flagship offers richer sound, and these speakers are also louder. There’s also more bass included. The difference is not huge, though, as the Pixel 7 Pro is solid in that regard too.

Neither of the two devices has a 3.5mm headphone jack. You’ll need to use a dongle or Type-C headphones for wired connections. If you prefer wireless headphones, however, you’ll be glad to know that the Pixel 7 Pro and Xiaomi 13 Ultra offer Bluetooth 5.2 and Bluetooth 5.3, respectively.


[ad_2]
Source link

BMW expands Digital Key Plus support to Android phones

0
[ad_1]

After introducing Digital Key Plus for iOS last year, which enabled users to remotely lock, unlock, and start their cars from their iPhone and Apple Watch, BMW is finally expanding the feature to select Android phones, including the Pixel 7 Pro, Pixel 6 Pro, Galaxy S23 Plus/Ultra, Galaxy S22 Plus/Ultra, Galaxy S21 Plus/Ultra, Z Fold 3, Z Fold 4, and the Note 20 Ultra. However, Samsung phone users will need to use the Samsung Wallet app to access the feature.

Setting up the Digital Key Plus feature is simple and can be done through the My BMW app. Once set up, users can program the vehicle to unlock as they approach it. Eliminating the need to search for keys. Similarly, users can also program the car to lock automatically as they walk away from it. Ensuring that the vehicle remains secure. This can be especially helpful for users who leave their car in a hurry to get things from their house before leaving.

Furthermore, to ensure that other members of the household can also access the car, users can share their key with up to five other people who have a compatible Android or iOS phone.

Security Measures

Speaking on security, BMW stated that since they use the precise location data from the ultra-wideband (UWB) technology, it virtually eliminates the risk of relay attacks that may attempt to jam or intercept the radio signals in between.

“BMW worked in collaboration with key partners to develop the corresponding specification and established it as a global standard for the automotive industry via the Car Connectivity Consortium (CCC),” says BMW.

While this expansion of Digital Key Plus is a step in the right direction, it is important to note that the feature on Android is only compatible with BMW vehicles manufactured from November 2022. However, the company has promised to extend support to older vehicles with future software updates.


[ad_2]
Source link

Hackers Abuse Eval PHP WordPress Plugin To Deploy Backdoors

0
[ad_1]

Researchers found active exploitation of the Eval PHP WordPress plugin to deploy backdoors on target websites. Since the plugin remained abandoned for some time, it became trivial for the threat actors to abuse its inherent vulnerabilities.

Eval PHP WordPress Plugin Abuse For Backdoors

A recent post from Sucuri elaborated on a malicious campaign actively exploiting the outdated Eval PHP plugin for installing backdoors.

As explained (and as evident from the plugin’s official page), Eval PHP received its last major update 11 years ago. The plugin seemed to facilitate WordPress admins in adding PHP codes to an article or blog, disabling PHP error messages, and performing other related functionalities. With time, the plugin stopped receiving updates from its developer, eventually remaining as an abandoned plugin in the WordPress repository.

However, despite remaining dormant for a decade, Sucuri observed a sudden spike in its number of installations in April 2023. Hence, they delved deeper, only to unveil the malicious campaign exploiting the plugin.

Briefly, the researchers noticed that the threat actors are using the Eval PHP plugin to infect websites with backdoors. For this, they first sneakily install the vulnerable plugin on a target website. This step remains easy given the plugin’s availability on the official WordPress plugin repository.

This timeline matched with the researchers’ observations regarding an ongoing malicious campaign compromising websites with backdoors.

As Sucuri explained, the attackers tried to create draft posts on target websites to execute malicious PHP backdoors. In some cases, the attackers even created drafts with admin accounts.

Check Your Websites For Eval PHP

According to the researchers, the most effective way for WordPress admins to detect a compromise on their websites is to look for the presence of Eval PHP, especially if they didn’t install this plugin themselves. Having this plugin on a website clearly shows a compromised state, with the potential presence of backdoors.

Besides, Sucuri also recommends securing admin accounts with 2FA, keeping the site updated with the latest patches, and running a robust WAF to avoid malicious exploitation.

Let us know your thoughts in the comments.


[ad_2]
Source link

GuLoader returns with a rotten shipment

0
[ad_1]

We take a look at a GuLoader campaign which comes bundled with an Italian language fake shipment email.

GuLoader, a perennial favourite of email-based malware campaigns since 2019, has been seen in the wild once again. GuLoader is a downloader with a chequered history, dating back to somewhere around 2011 in various forms. Two years ago it was one of our most seen malspam attachments.

Malspam chart 2020Most popular attachments by tags in Malwarebytes email telemetry

We also saw it during the pandemic, masquerading as a health e-book sent from the World Health Organisation.

GuLoader is typically used to load in the payload for the campaign in question. It often arrives in a ZIP file, and once opened and the file inside is executed the malicious activity begins. It may attempt to download data stealers, trojans, generic forms of malware…whatever is required. On top of this, GuLoader is designed to evade network detection and sneak past sandbox technology. For example, it may recognise being loaded up inside a virtual testing machine and refuse to load.

In this case, we have a bogus shipping notification written in Italian.

GuLoader Detected

This is somewhat humorous given GuLoader’s Italian origins. The mail, titled “Shipment Notification”, reads as follows:

Dear Customer,

We are pleased to inform you that the shipment to you by Mastrotto Express has begun. For shipping details, please see the attached file. For convenience, we summarise the details of the shipment:

Shipping number:

Delivery note number:

Number of packages:

Weight:

Volume:

We inform you that the email was automatically generated by a server, please do not reply, thanks for your cooperation.

In this example, GuLoader is not hidden inside a Zip file. Instead, the attachment is an .ISO file. An .ISO is designed to be a copy of a DVD, a CD, and other related forms of media. If you ever spent some time backing up your CD collection to a computer, you probably have a lot of these in a folder somewhere.

The file (or image, as they’re also sometimes called) would then be mounted as a virtual drive to gain access to the content. You could also just use a program like WinZip to open the files. However you do it, in this case the only thing waiting inside is GuLoader taking the form of a fake .JPG file. Note the .EXE (executable) extension in the below screenshot. Pretending that an executable is an image by giving it a double extension is an incredibly old trick. On the other hand, it works!

GuLoader-double-extension

How to avoid fake parcel scams

  • Check your orders. The email isn’t going anywhere, and neither is your order. You have plenty of time to see if you recognise parcel details, and also the delivery network. 
  • Avoid attachments. So-called invoices or shipping details enclosed in a ZIP file should be treated with suspicion.
  • Watch out for a sense of urgency. Be wary of anything applying pressure to make you perform a task. A missing payment and only 24 hours to make it? A time-sensitive refund? Mysterious shipping charges? All are designed to hurry you into making a decision.
  • If in doubt, make contact with the company directly via official channels.

Thanks to Jerome for sending over.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Show your love of Roblox with these co-branded Razer accessories

0
[ad_1]

Razer has done plenty of collaborations for accessories before, but never any for Roblox. That is until today, when Razer has now officially announced some new Roblox-themed accessories that you can outfit your PC gaming setup with.

The collection includes three different accessories, the Blackwidow V3 gaming keyboard, the Barracuda X wireless headphones, and the Orochi V2 mobile gaming mouse. All three accessories have distinctive Roblox design elements, like the Roblox logo and a series of block shapes across the product. The Roblox Edition accessories are also a little more expensive than the standard models.

The Black Widow V3 normally costs $139.99, but the Roblox Edition will set you back $179.99. And if you’re going for the Orochi V2 and/or Barracuda X, those will set you back $89.99 and $129.99 respectively. Whereas the standard models are $69.99 and $99.99. If you’re really into Roblox, it might also be worth picking up all three. As each one comes with a little something extra.

Razer Roblox Edition accessories come with in-game rewards

Those who play Roblox and are active within its many worlds may want to think about picking these accessories up. As they come with in-game rewards. Each one comes with a unique in-game item that can be redeemed for use.

So picking all of them ensures you get all three items. The Blackwidow V3 comes with a pair of virtual Razer Cyberwings, the Orochi V2 comes with a virtual Razer Cyberpack, and the Barracuda X comes with a virtual Razer Cyber Helmet. Other than the designs, price, and free in-game items, these are no different than the standard versions. Functionally they’re the exact same.

But if you really love Roblox are play it often enough, then these are some good pickups. You can find all three at Razer’s website and select retailers, though officially they won’t launch until April 28.

Razer Roblox Edition Accessories


[ad_2]
Source link

The US administration takes the initiative for 6G development

0
[ad_1]

The US administration wants to hold a meeting to discuss the 6G development in the country, Phonearena (via CNN) reports.

While many countries are still struggling with expanding 5G, the United States wants to get ahead of everyone else and become the leader of 6G. Today, over 60% of Americans have high-speed 5G coverage at home, and the number is growing every month. The 6G, however, could give the US a competitive advantage over rivals like China.

The meeting will be held on Friday this week in the White House. Business leaders, government officials, and academics are invited to participate and discuss the pathways and strategies for 6G development. The biggest wireless carriers in the country, like AT&T and Verizon, could have an important role in this program.

The White House reportedly wants to “take the lessons learned from 5G about the importance of early involvement and resilience.” The learned lessons will apply to building a 6G network that “optimizes performance, accessibility, and security.”

The US administration wants to outperform China in 6G development

The 6G race between the United States and China is strategic for countries. Every country that could successfully establish the first 6G network can shape the standards and patent necessary technologies. The White House meeting on 6G also coincides with China’s recent test of ultra-fast wireless Internet with 300Gbps download speed.

Additionally, the major Chinese companies working on 6G – Huawei and ZTE- are banned from operating in the United States. So the US is concerned that China could use 6G patents to reinforce its influence in other countries and for espionage purposes. China is currently holding 26.8% of 5G patents.

The United States and China are not alone in developing 6G. South Korea has recently announced its plans to establish a 6G experience in 2028. The country was initially supposed to launch 6G in 2030. Likewise, South Korea aims to gain 30% of 6G patents.

Artificial intelligence, semiconductors, and 6G are the top three battlefields for world superpowers. Any superpower that wants to continue its dominance must be at the forefront of developing these. Otherwise, it will be doomed.


[ad_2]
Source link