Aggregator
Email security risks healthcare IT can’t afford to ignore
92% of healthcare IT leaders say they’re confident in their ability to prevent email-based data breaches, but according to Paubox, they’re not. Healthcare compliance confidence gap Email remains one of the biggest security risks in healthcare. Outdated systems and frustrating tools often lead staff to bypass security measures, leaving patient data exposed. Despite their confidence, many healthcare IT leaders admit they’re uncertain about HIPAA compliance. A deeper issue is the gap between security goals and … More →
The post Email security risks healthcare IT can’t afford to ignore appeared first on Help Net Security.
CVE-2024-6713 | PVN Auth Popup Plugin up to 1.0.0 on WordPress Setting cross site scripting
CVE-2024-12722 | Mohsin Rasool Twitter Bootstrap Collapse aka Accordian Shortcode Plugin cross site scripting
CVE-2024-6693 | WP Content Copy Protection & No Right Click PRO Plugin Setting cross site scripting
CVE-2024-6712 | MapFig Studio Plugin up to 0.2.1 on WordPress Setting cross-site request forgery
CVE-2024-12716 | Simple Basic Contact Form Plugin 20221201 on WordPress Setting cross site scripting
CVE-2024-12724 | WP DeskLite Plugin up to 1.0.0 on WordPress cross site scripting
CVE-2024-12726 | ClipArt Plugin up to 0.2 on WordPress cross site scripting
CVE-2024-12739 | Mobile Contact Bar Plugin up to 3.0.4 on WordPress Setting cross site scripting
CVE-2024-10009 | Melapress File Monitor Plugin up to 2.0.x on WordPress sql injection
CVE-2025-48757 | Lovable up to 2025-04-15 Database Row-Level Security Policy authorization (EUVD-2025-16441)
CVE-2025-43925 | Unicom Focal Point 7.6.1 hard-coded key (EUVD-2025-16747)
CVE-2024-12725 | Clasify Classified Listing Plugin up to 1.0.7 on WordPress cross site scripting
44% of mobile users encounter scams every day
Nearly half of of mobile users encounter mobile scams daily, with people in the US and UK more likely to be targeted than those in other regions, according to Malwarebytes. Most users say it’s hard to tell a scam from something real, and very few feel confident in spotting one. Younger generations, like Gen Z and Millennials, are the most exposed. They’re more likely to see scams regularly compared to older users. No channel is … More →
The post 44% of mobile users encounter scams every day appeared first on Help Net Security.
Hunting Deserialization Vulnerabilities With Claude
恶意软件Crocodilus利用虚假通讯录联系人进行网络攻击
最新版本的“Crocodilus”安卓恶意软件引入了一种新机制,该机制会在受感染设备的联系人列表中添加一个虚假联系人,以便在收到威胁者的电话时利用虚假联系人欺骗受害者。该功能与其他几个功能一起推出,主要是针对规避的改进,该恶意软件似乎已将其目标范围扩展到全球。
Crocodilus触角涉及全球
Threat Fabric研究人员在2025年3月底首次记录了该恶意软件,并强调了其广泛的数据盗窃和远程控制能力。这些早期版本还通过伪造错误信息,要求用户在12小时内“备份”加密货币钱包密钥,否则将无法访问它,从而进行了基本的社交工程尝试。当时,Crocodilus只在土耳其的一些小规模活动中出现过。
根据Threat Fabric的说法,这种情况现在已经改变了,该公司继续监控恶意软件的运行,并观察到Crocodilus已将其目标范围扩大到所有大洲。
同时,最新的发布版本在滴管组件中引入了更好的代码打包以提高逃避检测的能力,并且为有效负载增加了额外的 XOR 加密层。
分析人员还发现,代码复杂化和纠缠现象使得恶意软件的逆向工程更加困难。另一个附加功能是一个系统,可以在受感染设备上本地解析被盗数据,然后将其泄露给威胁者以获得更高质量的数据收集。
虚假联系人
最新的Crocodilus恶意软件版本的一个显著特点是能够在受害者的设备上添加虚假联系人。这样做将导致设备在接到来电时显示来电者联系人配置文件中列出的姓名,而不是来电者的ID。这可能使威胁者可以冒充受信任的银行、公司,甚至朋友和家人,使电话看起来更可信。
此操作在发出特定命令时执行,该命令触发以下代码以编程方式(使用ContentProvider API)在Android设备上创建新的本地联系人。
JS代码段在设备上创建一个新联系人
“在收到命令“TRU9MMRHBCRO”后,Crocodilus会将指定联系人添加到受害者的联系人列表中,”Threat Fabric在报告中解释道。
这进一步增加了攻击者对设备的控制。威胁分子的意图是在一个令人信服的名字下添加一个电话号码,比如‘银行支持’,这样攻击者就可以在看起来合法的情况下给受害者打电话。恶意联系人不绑定用户的谷歌帐户,因此它不会与用户登录的其他设备同步。
Crocodilus进化得很快,它与社会工程有密切关系,这使它成为一种特别危险的恶意软件。安全研究人员建议Android用户在为他们的设备下载软件时坚持使用谷歌Play或信任的发行商,确保Play Protect始终处于激活状态,并将他们使用的应用数量减少到绝对必要的程度。