loader from loading.io

HN36 - Fake Sites, Real Danger: The Trojan Malware in Extensions

Exploit Brokers - Tech and Hacking News Commentary

Release Date: 08/15/2024

HN46 - Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis show art HN46 - Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis

Exploit Brokers - Tech and Hacking News Commentary

In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown ransomware, its exploitation of VPN vulnerabilities, and how these attacks are reshaping cybersecurity globally. If you’re curious about how ransomware works, the evolution of cybercrime, and what it means for businesses and individuals, this...

info_outline
HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats show art HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats

Exploit Brokers - Tech and Hacking News Commentary

In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking on suspicious links and files. We'll discuss how phishing emails, malware, and outdated software create an entryway for cybercriminals, even in some of the most secure environments. Using two real-world cases, we’ll uncover how modern-day...

info_outline
HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data show art HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data

Exploit Brokers - Tech and Hacking News Commentary

In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attack scams targeting eBay users and how scammers are leveraging Google Ads to lure unsuspecting victims into calling fake support numbers. With digital crime and data breaches on the rise, it’s essential to stay informed and protect yourself from...

info_outline
HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer show art HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer

Exploit Brokers - Tech and Hacking News Commentary

In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked together to dismantle their infrastructure, taking down over 1,200 servers with malware in dozens of countries. We'll also discuss how information stealers operate, their connection to cryptocurrency laundering, and what this takedown means for the ongoing...

info_outline
HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data? show art HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data?

Exploit Brokers - Tech and Hacking News Commentary

The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll dive deep into: How the hackers gained access through exposed tokens 🔓 What “access tokens” really are and why they’re often targeted 🔑 The role of GitLab configurations, Zendesk tokens, and more in the breach 🖥️ How...

info_outline
HN41 - Chinese Hackers Hijack US Telecom Networks show art HN41 - Chinese Hackers Hijack US Telecom Networks

Exploit Brokers - Tech and Hacking News Commentary

In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizon. Drawing inspiration from Friedrich Nietzsche's quote: "He who fights with monsters should look to it that he himself does not become a monster... when you gaze long into the abyss, the abyss also gazes into you." We explore how attempts to...

info_outline
HN40 - Shocking Move: Kaspersky Uninstalls Itself and Installs Ultra AV Overnight! show art HN40 - Shocking Move: Kaspersky Uninstalls Itself and Installs Ultra AV Overnight!

Exploit Brokers - Tech and Hacking News Commentary

Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are reacting, and what it means for your cybersecurity. Is this a breach of trust or a necessary step due to geopolitical tensions? Join us as we unravel the mystery behind Kaspersky's sudden exit from the U.S. market and the controversial...

info_outline
HN39 - Apple's Shocking Decision: Dropping the Fight Against NSO Spyware show art HN39 - Apple's Shocking Decision: Dropping the Fight Against NSO Spyware

Exploit Brokers - Tech and Hacking News Commentary

In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔   In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how the rise of commercial spyware vendors is reshaping the cybersecurity landscape and why Apple believes that continuing the lawsuit might actually do more harm than good.   Discover the implications for iPhone users worldwide and how this...

info_outline
HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning show art HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning

Exploit Brokers - Tech and Hacking News Commentary

Is Your Tap-to-Pay Secure? The Latest Android Malware Warning   🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We’ll break down how this malware works, why it's so dangerous, and what you can do to protect yourself. Learn about the latest threats in the world of digital crime and stay one step ahead! 💻   📢 Don't forget to LIKE, SUBSCRIBE, and hit the BELL icon to stay updated on the latest...

info_outline
HN37 - AI Manipulation: The Silent Threat to Democracy show art HN37 - AI Manipulation: The Silent Threat to Democracy

Exploit Brokers - Tech and Hacking News Commentary

🚨 AI Propaganda Exposed: How It’s Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We’ll explore how threat actors are using advanced AI to manipulate public opinion, the efforts to combat these operations, and what this means for the future of democracy. 🔒 Topics Covered: AI in political manipulation Election...

info_outline
 
More Episodes
In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We’ll discuss how these Trojans operate, how they’ve compromised over 300,000 users, and what steps you can take to protect yourself. Stay informed about the rising tide of digital crime and malware as we explore the dark side of the internet. Don't forget to like, subscribe, and hit the bell icon to stay updated on the latest in cybersecurity. If you're listening on a podcast platform, please leave us a review!

Hashtags: #CyberSecurity #MalwareAlert #BrowserExtensions #TrojanMalware #DigitalSafety #ExplorerBrokers #TechNews #DataBreach #InternetSafety #Hacking #OnlineSecurity #MalwarePrevention #TechTalks

## Follow us:
https://follow.exploitbrokers.com

## Sources
 Reason labs: https://reasonlabs.com/research/new-widespread-extension-trojan-malware-campaign