250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

0
[ad_1]

Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very well-liked among gamers who use cryptocurrencies because of the potential rewards of a brand-new cryptocoin that the developers intend to launch. 

The game’s success has spawned numerous copycats with similar names, icons, and gameplay mechanics. While these imitations appear benign, they aim to profit from in-app advertising. 

The popularity of Hamster Kombat has created openings for cybercriminals. Fake app stores target Android users, offering malware disguised as the game that bombards them with ads.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Windows users are at risk from GitHub repositories distributing malicious farm bots and auto-clickers laced with Lumma Stealer malware for credential theft.  

 In-game screenshot of Hamster Kombat

Researchers discovered malware distributed through unofficial channels, including fake Hamster Kombat apps and game automation tools that actually steal user information, targeting both Android and Windows devices, highlighting the risks of downloading apps from unofficial sources. 

The game’s token, HMSTR, will be distributed on The Open Network (TON) based on in-game performance metrics like profit per hour, unlike Notcoin’s airdrop, which rewarded total score, emulating Notcoin’s successful token launch on TON in May 2024 and aiming to replicate its achievement in the crypto-gaming space. 

It has been found that Android malware, including spyware (Ratel) and fake app stores with unwanted ads, might encounter repositories containing Lumma Stealer cryptors.

While the game itself seems safe, cybersecurity experts warn of potential financial risks associated with “play-to-earn” mechanics. 

Malicious Hamster Kombat access requests

ESET researchers discovered Ratel, an Android spyware disguised as Hamster Kombat, on Telegram, which steals notifications and sends SMS messages to steal money from the victim. 

It hides notifications from over 200 apps to prevent the victim from discovering suspicious activities. Ratel also communicates with a C&C server to receive instructions and potentially upload intercepted notifications.  

Notification exfiltrated to C&C server

Hamster Kombat, a popular Telegram clicker game with a promised cryptocoin, has attracted malicious actors, while Android spyware Ratel disguised as Hamster Kombat on Telegram steals notifications and sends SMS messages. 

Fake app stores impersonating legitimate ones also deliver unwanted advertisements.

For Windows users, GitHub repositories offering farm bots and autoclickers contain Lumma Stealer malware, which steals cryptocurrency wallets, user credentials, and other sensitive information.

Fake websites impersonating an app store interface

Lumma Stealer malware uses different encryption methods for C++, Go, and Python applications.

The C++ variant embeds RC4 encrypted Lumma Stealer and injects it into RegAsm.exe.

The Go variant uses AES-GCM encryption and leverages obfuscated code from go_libpeconv to perform process hollowing. 

The Python variant presents a fake installer, downloads a password-protected archive containing a cryptor with Lumma Stealer upon user consent, and sends timestamps to a C&C server that likely forwards the data to the operators’ Telegram account.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo 


[ad_2]
Source link

Best Samsung Galaxy Z Flip 6 Deals

0
[ad_1]

The Samsung Galaxy Z Flip 6 is the best flip phone the company has made to date. As it should be. Companies should continue pushing forward instead of going backwards. The Galaxy Z Flip 6 this year gains a few upgrades, mostly pertaining to the camera.

With the Galaxy Z Flip 6, Samsung has upgraded the main sensor to a 50-megapixel camera. Now, that might not sound like a big deal, but this means that the Galaxy Z Flip 6 does get a 2x optical zoom option, as it can crop into that large 50-megapixel sensor for lossless zoom. Samsung has also improved the hinge here, making it stronger, thinner, and more durable. Like the Samsung Galaxy Z Fold 6, the Flip 6 also has dust resistance for the first time – now IP48.

The battery has received a pretty big upgrade here too, now pushing to 4,000mAh capacity. Keeping it right on par with the Motorola Razr+ (Razr 50 Ultra outside of the US).

The price of the Galaxy Z Flip 6 did go up this year, but there are loads of promos that you can take advantage of that can get you the phone for almost free. And who doesn’t love free? Here are the best Galaxy Z Flip 6 deals available right now.


[ad_2]
Source link

Prime Video update makes it easier to find out which titles are included with your Prime membership

0
[ad_1]

A new Prime Video update is now rolling out, addressing one of the biggest criticisms the service was getting – that it’s hard to distinguish what’s included in your subscription. You needed to first click on it to find out. But now, we get this very useful update which will make it easier for you to know which feature is free and which isn’t. The new interface is also simpler and more personalized, which should help you find something to watch faster.

Prime Video is one of the benefits of an Amazon Prime subscription. However, not many people were using it, probably because it wasn’t obvious what you could watch with your subscription and what needed additional payment to watch. The service is now becoming more relevant with improvements in the content and price increases in the competition.

And now, Amazon is releasing an update to fix the annoying issue with the pricing. You should now be able to see more easily what is included with the Prime membership and what you need to pay extra for. With the update, logos for Prime and add-on subscription services (like Max, Paramount+, Starz, MGM+, and Crunchyroll) will appear on the title cards of a movie or TV show. Those should indicate which service the content is available on.

If a title requires additional payment, a yellow shopping bag icon will indicate this.

You also get a new “Prime” destination in the navigation area that lets you browse movies, TV shows, and others, that are available at no additional cost with a Prime membership.

Free doesn’t mean ad-free though, so do keep that in mind.

The. new update also brings a a navigation bar with single-click access to titles; an improved way of browsing, signing up for, and managing add-on subscriptions; and personalized content recommendations powered by generative AI.

The update is now rolling out globally, and according to Amazon, should take a few weeks to reach everyone. I personally find this update one of the most useful updates Amazon Prime Video has gotten recently. It is very annoying to finally find a title you’re interested in and then, when clicking on it, you find out it’s not included in your Prime membership. This update will make things easier, and hopefully, Prime Video will become more popular thanks to that.

[ad_2]
Source link

ShadowRoot Ransomware Attacking Organizations With Weaponized PDF Documents

0
[ad_1]

A rudimentary ransomware targets Turkish businesses through phishing emails with “.ru” domain sender addresses. Clicking a PDF attachment’s link triggers downloading a malicious executable from a compromised GitHub account. 

The executable encrypts crucial files with the “.shadowroot” extension, highlighting a wider trend of ransomware attacks using phishing emails to deploy payloads, demonstrating the ongoing threat to various industries globally. 

malicious URL from pdf

The analyzed executable is a malicious 32-bit Borland Delphi 4.0 binary that drops several files, including RootDesign.exe and Uninstall.exe, which are likely components of a malware program designed to infiltrate a system and carry out malicious activities.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

DotNet Confuser, which is an open-source obfuscator for.NET applications, provides additional protection for RootDesign.exe in particular that is being protected.

Packer info

Based on the obfuscation that is applied by DotNet Confuser, it becomes more difficult for conventional security software to recognize RootDesign.exe as a potential threat.

The dropper, PDF.FaturaDetay_202407.exe, employs nested PowerShell commands to execute RootDesign.exe in a hidden mode. PowerShell is a scripting language built into the Windows operating system that can be used to automate tasks and execute programs.

Obfuscated function and class name

By nesting PowerShell commands, the malware authors can achieve a level of indirection that makes it more difficult to trace the execution flow and identify the ultimate payload (RootDesign.exe) being launched. 

According to ForcePoint, running RootDesign.exe in hidden mode further conceals its activity from the user, making it even more challenging to detect and remove the malware.

An attacker executed a malicious script disguised as a command prompt command, which leverages PowerShell to launch a hidden process (RootDesign.exe), likely located in a directory named “The Dream.”. 

This process creates several mutexes, which are synchronization objects used to control access to shared resources, whose names (_SHuassist.mtx, Local\ZonesCacheCounterMutex, Local\ZonesLockedCacheCounterMutex) suggest the malware might target specific system functions. 

The malware then injects copies of itself into memory with new process IDs (PIDs), creating a recursive thread structure, which is an indication of a ransomware attack that aims to encrypt files on the compromised system. 

Encrypted files with the ShadowRoot extension

RootDesign.exe, a.NET-compiled malware, logs its activity, initiates a ransomware attack, and recursively encrypts critical system files with a custom “.ShadowRoot” extension, dropping ransom notes and causing high memory usage due to its self-replication behavior. 

The malware creates a command-and-control channel via SMTP on port 587 to an email address that is probably under the attackers’ control and uses the common AESCryptoServiceProvider class for encryption. 

While no direct crypto wallet information is provided, the ransom note instructs victims to contact a suspicious email likely used for communication and potential decryption tool/payment processing.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo


[ad_2]
Source link

Google’s next Pixel 9 Pro teaser is a puzzle

0
[ad_1]

We just saw two short and sweet teasers showing off the upcoming Pixel 9 Pro and Pixel 9 Pro Fold. These were, unsurprisingly AI-focused. Well, Google just released another teaser showing off the former, and this one pushes you to use YOUR intelligence. The latest Pixel 9 Pro teaser has a word search.

If you didn’t see the previous teasers, you’re not missing much, especially if you’ve seen all of the recent leaks of the phone. We see the phones in all their Google-y glory, but they both start by talking about AI. This makes us worry if Google is going to make its next Pixel event (which is happening on August 13) be an AI event with the Pixel phones making a cameo. We’ll find out, so mark your calendars!

Google releases Pixel 9 Pro teaser with a word search

We all know the feeling of standing at the checkout line at the grocery store and flipping through the word search books. Well, Google wants us to all have that feeling again. Shortly after its video teasers, the company made a new post on Meta Threads. This post retains much the same visual aesthetic of the video ads. We see the silhouette of the phone. Rather than being filled with a Gemini prompt, it’s full of a word search.

Chalk this up as one of Google’s fun and quirky advertisements that encourage users to get involved. The tagline of the post is, “Can you find the reasons you should break up with your phone?” Well, can you? Google is betting big bucks on its AI to move this phone. It’s hoping to win you over with Gemini.

Sneak peek at a feature

This word search actually gives us a sneak peek at some of the features we should expect coming from the company. For example, just glancing at the word search, we see “searching screenshots”. This is a feature that’s been likened to Windows Recall. That’s the controversial feature that would have Windows take screenshots of everything you do on your computer and allow you to search them to recall what you were doing. Google’s feature is much different and less creepy. It will allow Gemini to search for content in your screenshots.

For more features, feel free to look at the word search and see what you should be excited about. The event is going down on August 13th, 10 AM EST.


[ad_2]
Source link

Samsung secures Nvidia certification for HBM3 chips in AI push

0
[ad_1]

Samsung may have just achieved a significant milestone in the AI chip market. Nvidia, the world’s biggest AI chip brand, has reportedly certified its high bandwidth memory (HBM) chips. The Korean firm’s HBM3 chips have received Nvidia’s approval for use in China. Its more advanced HBM3E solutions are still pending the Nvidia certification.

Samsung secures a big AI win with Nvidia certification for its HBM3 chips

The semiconductor industry is experiencing overwhelming growth due to the AI boom. As companies set out to establish AI data centers, training hubs, and peripheral infrastructure, chip demand and prices have surged exponentially. Riding on this growth, Samsung expects a staggering 1,450% increase in its quarterly operating profit in Q2 2024. The Korean firm is the world’s biggest supplier of memory chips.

However, it has been lagging in a key area, limiting its growth. Samsung’s HBM chips lacked Nvidia’s certification, blocking their use in leading AI processors. The company has been seeking this certification for a long time, and it has finally received it. Unfortunately, the job is still far from done for the Korean biggie. According to Reuters, Nvidia has only cleared Samsung’s HBM3 chips for use in its less sophisticated H20 AI chip.

Developed for the Chinese market, the H20 is made in compliance with export restrictions set by the US government. It isn’t the most powerful AI chip out there. Ideally, Samsung would want to supply its HBM3 chips for Nvidia’s advanced AI processors. Its compatriot SK Hynix has already gained an upper hand in this segment. Samsung would also be itching to obtain Nvidia’s approval for its HBM3E chips.

Nonetheless, it’s a step in the right direction for Samsung. The new report says it could start supplying HBM3 chips to Nvidia in August. It is unclear if the American chipmaker is still testing Samsung’s HBM3 and HBM3E chips for global use or if the chips have already failed to meet its requirements. There have been rumors that the HBM3E solutions have heat and efficiency issues, though Samsung has rubbished the claims.

There is a shortage of HBM3 chips

HBM chips are critical for AI processors. They provide the processors with massive amounts of fast memory that allow them to perform complex AI tasks quickly. Samsung is one of the only three makers of HMB chips, alongside SK Hynix and Micron. The latter two have already received Nvidia’s approval for global use. But, the AI boom is so huge that there is still a shortage of these chips. Nvidia would be keen to get Samsung onboard, but it won’t approve the chips unless the Korean firm meets its standards. It is up to Samsung to step up its game.


[ad_2]
Source link

Spotify could connect you to the National Suicide Prevention Lifeline if you’re searching for risky content

0
[ad_1]

Spotify is aiming to create a safer online environment for young people, the popular streaming service announced.

There’s a recent blog piece by Marcelina Slota (Head of Spotify’s Platform Integrity) that states so.

With safety being a “top priority” for Spotify, the company aims to make it easier for young people and parents to understand and navigate the digital world. That’s why Spotify announced a new Parental Guide to assist in this effort and joined the Tech Coalition to share best practices within the industry for upholding youth safety.

The Tech Coalition is an organization that unites the global tech industry to foster a safer online environment for young people by preventing and combating online child sexual exploitation and abuse.

This partnership expands Spotify’s network of trusted third-party experts who help advise its teams on launching policies and products with safety by design.

In addition to partnering with global experts, Spotify works to craft a safe and enjoyable experience for young people in several ways, including:

  • Establishing a zero-tolerance policy against content that exploits children and Platform Rules that ban illegal and/or abusive behaviors that could harm children;
  • Leveraging machine learning signals and establishing user reporting mechanisms to detect potential policy and/or legal violations;
  • Staffing teams around the clock to review and promptly remove potentially violating or explicit content; and
  • Connecting potentially vulnerable users to mental health resources when they search for content related to suicide, self-harm, and disordered eating content.

The aforementioned mental health resources include the US’ National Suicide Prevention Lifeline, the TREVOR Project, National Eating Disorders services, and more.

So, if you or someone you know is struggling or thinking about self-harm, there are ways to get help. If you’re concerned about self-harm, drug or alcohol usage, or depression, please talk to someone or reach out to one of the organizations listed below for professional support.


[ad_2]
Source link

Indian Firm Linked to Fake DMCA Notices Silencing Journalists

0
[ad_1]

Is critical journalism under attack? A recent exposé reveals a disturbing trend: Companies, in this case, an Indian firm, using fake DMCA notices to silence investigative reports. Learn how “Delete Negative Links” schemes work!

A recent investigation by Swedish cybersecurity organization Qurium Media Foundation uncovers a disturbing trend – the rise of fake DMCA (Digital Millennium Copyright Act) requests to manipulate online content. They dubbed it a “delete negative links industry.”

The Case of Ojo Público:

In April 2024, the Peruvian investigatory newspaper Ojo Publico faced a seemingly ordinary DMCA takedown notice. The notice allows copyright holders to remove infringing content online. However, in this case, it targeted a legitimate investigative report about money laundering by the current mayor of Cajamarca Joaquín Ramírez.

Qurium began investigating Ojo Publico’s article about Ramírez after receiving emails from Alisa Muncy representing Judith Warner, who claimed to be a former special correspondent for Newsweek in Paris. 

Muncy complained that the website infouse.exposureco, was the article’s source and that OjoPúblico copied content from fake websites like Exposure.co, Blogger, and Tumblr, mirroring the original reports.

Beyond Muncy’s emails, OjoPúblico identified 13 other copyright complaints filed against them on Google’s Lumen Database, likely linked to the same effort. These complaints aimed to remove the report on Ramírez and another on his cousin Osías Ramírez, both facing money laundering investigations.

Emails from Mrs. Muncy, provided a hint of her location, as they were sent from the time zone GMT +05:30, which corresponds to India. 

The same day, someone used the service “hosting-checker.net” to find out where Ojo Publico was hosted. When asked about copyrighted parts of the article, Alissa Muncy responded with a document with metadata revealing it was allegedly created by Ashi Aggarwal. However, no traces of Warner or Muncy were found.

Indian Firm Linked to Fake DMCA Notices Silencing Journalists
Screenshot provided by Qurium

Tracing the Takedown:

Ashi Aggarwal’s social media profile revealed she worked for Initiatrix Technologies in Noida, India registered as Amit Vatsya and owned by two businessmen Jha Piyush and Vipin Kumar. Alissa Muncy also runs a blogspot blog used to run several DMCA take-down requests with Google.

Initiatrix Technologies uses a multi-pronged approach to silence critical content, including fabricating fake websites, employing fake names or stolen identities to submit DMCA requests, and creating “back-dated copies of legitimate websites to claim copyright infringement of the investigative report on the original site,” Qurium’s report read.

Their goal? As per researchers, is to remove investigative articles that could damage their clients’ reputations.

Interestingly, the individual named in the Ojo Público case mysteriously closed all their social media accounts coinciding with Qurium’s report. Ojo Público, armed with Qurium’s findings, is pursuing further investigations. This incident highlights the vulnerability of investigative journalism to manipulation tactics.

Qurium

For your information, Qurium has been quite a vocal and active organization that protects human and media rights. Over the years, the organization has reported several instances of cybercrime, leading to vast government-level investigations.

These include the shutdown of the illegal prostitution ring in Kazakhstan back in September 2019, a deep dive into the DDoS attacks on the human rights watchdog Karapatan in August 2019, the large-scale Chinese scammers’ rings that exploited cloned websites for its global illegal gambling network in November 2023, DDoS attacks on the Philippines media giant Rappler to quiet critics in December 2023, and, most recently, last week’s report exposing the Chinese Vigorish Viper, which has been exploiting DNS and European football club sponsorships for illegal gambling.

  1. AI Generated Fake Obituary Websites Target Grieving Users
  2. Fake Wikipedia Researcher Hacked Bumi Chairman’s Computer
  3. Texas Adult Site Age Verification Law Sparks 234.8% VPN Surge
  4. Scam Utilizing AI-Generated Images to Represent Fake Law Firm
  5. Tuta Mail (Tutanota) Accuses Google of Censoring Its Search Results

[ad_2]
Source link

BreachForumsV1 Database Leaked: messages & emails Exposed

0
[ad_1]

BreachForumsV1, a notorious online platform for facilitating illegal activities, has reportedly suffered a massive data breach.

According to a recent post on X by DailyDarkWeb, the database of BreachForumsV1 has been leaked, exposing a treasure trove of sensitive information.

The breach has sent shockwaves through the cybersecurity community and raised serious concerns about the privacy and security of users involved in such forums.

Sensitive Information Exposed

The leaked data reportedly includes a wide array of sensitive information. Private messages, passwords, emails, date formats, time zones, and the last known IP addresses of the users are among the compromised data points.

This information could be used for various malicious purposes, including identity theft, blackmail, and further cyber-attacks.

The breach highlights the inherent risks associated with participating in illegal online activities and the potential consequences of such involvement.

The BreachForumsV1 data leak underscores the growing threat of cyber-attacks and the importance of robust cybersecurity measures.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Experts warn that cybercriminals could exploit the exposed information to launch targeted attacks against individuals and organizations.

The breach also serves as a stark reminder of the vulnerabilities within online platforms, particularly those operating on the fringes of legality. In response to the violation, cybersecurity professionals are urging users to protect their personal information immediately.

This includes changing passwords, enabling two-factor authentication, and being vigilant for any signs of suspicious activity. Additionally, law enforcement agencies are likely to intensify their efforts to track down the perpetrators behind the breach and hold them accountable.

As the investigation into the BreachForumsV1 data leak continues, it remains to be seen what further repercussions will emerge.

For now, the incident serves as a cautionary tale about the dangers of engaging in illicit online activities and the critical need for enhanced cybersecurity measures in an increasingly digital world.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo


[ad_2]
Source link

Samsung leverages MediaTek to nudge Qualcomm on chip prices

0
[ad_1]

Samsung seems all set to launch the Galaxy Tab S10 series with MediaTek’s Dimensity 9300+ chip in October. It would be the company’s first flagship Android tablet with a MediaTek processor. According to the Korean media, it’s a well-thought-out strategy from the firm to bolster its bargaining powers with Qualcomm.

Samsung uses MediaTek chip to make Qualcomm drop prices

Flagship Galaxy tablets have long used Qualcomm’s Snapdragon chips globally. Samsung also uses Qualcomm processors in its foldables globally, while its flagship smartphones are often split between Snapdragon and Exynos chips. Depending on where you live, you get one or the other version (the Galaxy S23 series didn’t have an Exynos version).

However, for a change, Samsung is using a MediaTek chip on the Galaxy Tab S10 series. And it isn’t necessarily a bad move. The Dimensity 9300+ is equivalent to the Snapdragon 8 Gen 3, both on paper and in real-world performance. They are fabricated on TSMC’s 4nm process node and offer comparable raw performance and power efficiency.

It always looked like the Korean firm was making the switch due to price differences. MediaTek’s flagship chipsets are said to be about ten percent cheaper than Qualcomm’s competing solutions. However, this move may have multiple benefits for Samsung. Alongside saving some costs, the firm is reducing its reliance on Qualcomm, giving itself more space for price negotiations. It can make Qualcomm offer special discounts on its chipsets.

There have been rumors of Samsung considering using MediaTek’s next-gen Dimensity 9400 3nm chip in its Galaxy S25 flagships next year. The company might equip the Galaxy Tab S10 series with the Dimensity 9300+ to see how Qualcomm reacts. Ideally, Qualcomm would want to power as many Galaxy S25 units as possible with its 3nm Snapdragon 8 Gen 4. This competition between the two chip vendors may benefit Samsung.

“If it increases its reliance on Qualcomm, it will lose its bargaining power in price negotiations,” The Koreran Economic Daily quotes a semiconductor industry source as saying about Samsung primarily using Snapdragon chips in its devices. “MediaTek is a good card that Samsung can use as leverage in negotiations with Qualcomm.” The Dimensity 9400 and Snapdragon 8 Gen 4 arrive later this year as the first 3nm chipsets for Android flagships.

Samsung has two more flagship products in the pipeline

Alongside the Galaxy Tab S10 series, Samsung has two more flagship products in the pipeline. The company is readying the Galaxy S24 FE and Galaxy Z Fold 6 Ultra/Slim. These devices are also expected to launch between October and December this year. Time will tell whether we will see a MediaTek chip in either device. Well, chances of MediaTek powering the Fold are slim, but we won’t rule out the Fan Edition phone getting a Dimensity processor.


[ad_2]
Source link