Weekly Cybersecurity Recap May 13

  • By Steven
  • May 13, 2022

As we transition to the second half of the year, it is becoming increasingly clear that digital attacks are not slowing down in the slightest. Search the web for "cyber-attacks," and you'll find a litany of stories from the current day as well as previous days and weeks highlighting nasty online threats. Let's shine the spotlight on some of the most notable digital attacks from the week gone by.

Wormable Malware Targets Windows Installer

A new variation of wormable malware that delivers digital pain via USBs is taking aim at Windows installers. The wormable malware, also known as Raspberry Robin, uses the Microsoft Standard Installer to inflict damage. The malware sends DLL files by way of USBs. DLL is short for dynamic link libraries. The USB devices also deliver the wormable malware through a LNK file shortcut. Though the file might appear harmless, it accesses the computer registry to access files and steal information. The identity of the digital criminals behind Raspberry Robin has not been determined as of the time of this publication.

Saintstealer and Prynt Malware  

The malware families referred to as Saintstealer and Prynt are stealing user logins and passwords. The new malware families also steal credit card information to boot. The stolen information is compressed with the use of a password-protected ZIP file. Saintstealer relies on an executable that is C# and 32-bit to pilfer login details. Saintstealer even has internal checks used for anti-analysis for self-deletion if necessary. Sainststealer takes login information as well as autofill data, cookies, and screenshots. This malware plucks data right out of Chromium web browsers, including Chrome, Vivaldi, Yandex, Opera, Edge, and Brave. The stolen information is subsequently compressed directly to the criminals' Telegram channel.

Prynt is more focused on stealing financial data through apps and web browsers. This malware scans a computer drive for keywords and steals all relevant information. Prynt is advanced to the point that it can access funds in digital wallets used for cryptocurrency.

Illuminate Education Breach

A breach at the Illuminate Education headquarters has opened the door for the sensitive data of students in grades K through 12 to be accessed and sold on the dark web or another black market. The illegal access occurred because of an unencrypted database. The Illuminate hack is a fantastic example of why every organization should encrypt data and implement the industry's latest digital safeguards with regularity. The breach has impacted a million students.

National Health Service Phishing Emails

The National Health Service, based in the United Kingdom, is being used for the manipulation of others. Hackers are using NHS employees' email accounts to send thousands of phishing messages, creating the impression that the NHS is reaching out to patients and other relevant organizations. The messages in question are actually from digital criminals. A total of 139 NHS employee email accounts were illegally accessed to send the messages.

Zero-Day Bug Patch Issued by Microsoft

Microsoft is proactively addressing a zero-day bug with a patch. The aim of the patch is to stop LSA spoofing. This software specialist's patch also pertains to infrastructure flaws, particularly those used in the cloud environment. Microsoft released a total of 73 patches in the month of May.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What is an Incident Response?

What is an Incident Response?

What is an Incident Response? After a bank heist, the work begins with specialized teams and plans engaged, allowing for analysis of the event, and from this analysis, the bank can prepare a response to the incident.

What is a Social Engineering Attack? Techniques and Ways to Prevent

What is a Social Engineering Attack? Techniques and Ways to Prevent

Everyone has received a spam text or email at some point. Their hallmarks are widely known; they often include poor or strange grammar, suspicious links, suggested connections with companies or people, or random individuals asking for help in some capacity.

Side Channel Attack: Everything You Need To Know

Side Channel Attack: Everything You Need To Know

Every year, millions of people get victimized by data breaches. Criminals steal their data from the network environments of organizations, vendors, providers, institutions, and governments; with ever-increasing frequency, cybercriminals are making big moves in the cyber wars—and making billions of dollars. 

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close