Skip to main content

Posts

THE ENCRYPTER

100,000 WordPress Sites Impacted with Cross-Site Scripting(XSS) Flaw

KingComposer, a WordPress plugin found installed with over 100,000 WordPress sites found vulnerable to Reflected  Cross-Site Scripting . The vulnerability was  found by  the Wordfence security team with KingComposer Drag and Drop page building plugin. The vulnerability can be exploited by the attacker tricking the victim into clicking a malicious link, which sends the victim to the vulnerable website along with the payload. It can be tracked as CVE-2020-15299 and received CVSS Score: 6.1. the version before 2.9.5 is affected by the vulnerability. The vulnerability resides with AJAX action that no longer actively used by the plugin, “but could still be used by sending a POST request to  wp-admin/admin-ajax.php  with the action parameter set to  kc_install_online_preset .” The vulnerability can be exploited using base64-encoding on a malicious payload and trick the victim into sending a request through a  kc-online-preset-data  parameter, which would allow the malicious payload to execut
Recent posts

Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store

Cybersecurity researchers took the wraps off yet another instance of Android malware hidden under the guise of legitimate applications to stealthily subscribe unsuspecting users for premium services without their knowledge. In a report published by Check Point research today, the malware — infamously called Joker (or Bread) — has found another trick to bypass Google's Play Store protections: obfuscate the malicious DEX executable inside the application as Base64 encoded strings, which are then decoded and loaded on the compromised device. Following responsible disclosure by Check Point researchers, the 11 apps ( list and hashes here ) in question were removed by Google from the Play Store on April 30, 2020. "The Joker malware is tricky to detect, despite Google's investment in adding Play Store protections," said  Check Point 's Aviran Hazum, who identified the new modus operandi of Joker malware. "Although Google removed the malicious apps from the Play Stor

Types of Malware

1).  Virus:   A computer virus is a malware attached to another program such as a document which can replicate and spread after an initial execution on a target system where human interactions is required. Many viruses are harmful and can destroy data, slow down system resources, and log keystrokes. 2).  Adware:   Adware refers to a type of malware that displays unwanted advertisements on your computer or device. Adware is commonly activated unknowingly when users are trying to install legitimate applications that adware is bundled with.    While sometimes adware can be safe some pop-up windows intend to not only display advertisements but also collects data and information in order to target you with customised adverts. In these cases adware can direct you to malicious websites and infected pages through various advert links, putting you at risk of computer viruses. 3).  Spyware:   Spyware is a type of malware or malicious software that collects and shares information about a computer

Most Common Types of Online Scams

 Phishing  The top online scam today is Phishing. Internet thieves prey on unsuspecting users by sending out phishing emails. In these emails, a cyber criminal tries to trick you into believing you are logging into a trusted website that you normally do business with. This could be a bank, your social media account, an online shopping website, shipping companies, cloud storage companies and more.  Another type of popular phishing scam is the Nigerian Prince, or 419 scam.  These are phishing emails in which you’re asked to help bring large sums of money into the country, cash phony money orders or wire money to the thief. The trick is that the scammer first asks you for a small fee because the larger sum of money is “tied up” whether it be in wire transfer fees, processing fees or some other tall tale.  Fake AV  One close to our industry is fake security software, which is also known as scare-ware. These start with a pop up warning saying that you have a virus. Then the popup leads the

TERMUX

These are the Most Useful latest Termux Tools 1). Onex:    Onex is a hacking tool installer and package manager for hackers. Onex is a library of collection of tools for termux and linux distributions. Onex can install any third party tool or any hacking tool for you. Installation & Run: $ apt update $ apt upgrade $ pkg install git $ git clone  https://github.com/rajkumardusad/onex.git (copy this and paste in your terminal) $ chmod +x * $ ./install $ onex -h (to show options) $ onex -l (to show tools list) $ onex -i (tool name to install) 2). Nexphisher:    2020 new advanced phishing tool for linux/termux. Installation & Run: $ apt update $ apt upgrade $ pkg install git $ git clone  https://github.com/htr-tech/nexphisher.git (copy this and paste in your terminal) $ cd nexphisher $ chmod +x * $ setup: bash setup $ setup (termux): bash tmux_setup $ bash nexphisher Note : on your hostspot to generate link 3). Osi.ig    Osi.ig is the instagram information gathering tool. Installat