Tag: Kaspersky

  • Hacker News: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024)

    Source URL: https://www.xstore.co.za/stuff/2024/01/kaspersky-finds-hardware-backdoor-in-5-generations-of-apple-silicon/ Source: Hacker News Title: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant security concern regarding a hardware backdoor found in Apple’s silicon. Identified as CVE-2023-38606, this vulnerability reportedly affects five generations of Apple mobile CPUs,…

  • The Register: Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims

    Source URL: https://www.theregister.com/2025/02/07/infected_apps_google_apple_stores/ Source: The Register Title: Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims Feedly Summary: OCR plugin great for extracting crypto-wallet secrets from galleries Kaspersky eggheads say they’ve spotted the first app containing hidden optical character recognition spyware in Apple’s App Store. Cunningly, the software nasty…

  • Hacker News: iPhone apps found on App Store with malware that reads your screenshots for data

    Source URL: https://9to5mac.com/2025/02/05/iphone-apps-on-app-store-malware-reads-screenshots/ Source: Hacker News Title: iPhone apps found on App Store with malware that reads your screenshots for data Feedly Summary: Comments AI Summary and Description: Yes Summary: Researchers at Kaspersky have discovered a novel malware, termed ‘SparkCat’, embedded in iOS and Android apps, utilizing screenshot-reading OCR technology to search for sensitive recovery…

  • Slashdot: iOS App Store Apps With Screenshot-Reading Malware Found For the First Time

    Source URL: https://it.slashdot.org/story/25/02/05/2010251/ios-app-store-apps-with-screenshot-reading-malware-found-for-the-first-time?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: iOS App Store Apps With Screenshot-Reading Malware Found For the First Time Feedly Summary: AI Summary and Description: Yes Summary: The discovery of “SparkCat” malware infiltrating iOS and Android apps marks a significant breach of security, being the first to implement malicious screenshot-reading capabilities in Apple’s App Store. This…

  • Slashdot: First OCR Spyware Breaches Both Apple and Google App Stores To Steal Crypto Wallet Phrases

    Source URL: https://it.slashdot.org/story/25/02/05/1826259/first-ocr-spyware-breaches-both-apple-and-google-app-stores-to-steal-crypto-wallet-phrases?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: First OCR Spyware Breaches Both Apple and Google App Stores To Steal Crypto Wallet Phrases Feedly Summary: AI Summary and Description: Yes **Summary:** Researchers from Kaspersky have identified new malware named “SparkCat” that exploits optical character recognition (OCR) technology to extract cryptocurrency wallet recovery phrases from users’ photo galleries…

  • Hacker News: Two never-before-seen tools, from same group, infect air-gapped devices

    Source URL: https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/ Source: Hacker News Title: Two never-before-seen tools, from same group, infect air-gapped devices Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the discovery of advanced hacking toolsets linked to a nation-state group, likely from Russia, targeting air-gapped systems. The findings highlight the sophistication and resourcefulness involved in circumventing…

  • Wired: A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines

    Source URL: https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/ Source: Wired Title: A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines Feedly Summary: It’s hard enough creating one air-gap-jumping tool. Researchers say the group GoldenJackal did it twice in five years. AI Summary and Description: Yes Summary: This text details the discovery of two advanced tool…

  • Slashdot: European Govt Air-Gapped Systems Breached Using Custom Malware

    Source URL: https://it.slashdot.org/story/24/10/11/1811217/european-govt-air-gapped-systems-breached-using-custom-malware?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: European Govt Air-Gapped Systems Breached Using Custom Malware Feedly Summary: AI Summary and Description: Yes Summary: An advanced persistent threat (APT) group named GoldenJackal has been successful in breaching air-gapped government systems in Europe, employing custom tools to steal sensitive information. This activity raises significant concerns about the security…