Get a Pentest and security assessment of your IT network.

Cyber Security

New PipeMon malware uses Windows print processors for persistence

Video game companies are once again victims of the Winnti hacking group, who used new malware PipeMon and a novel method to achieve persistence. The threat actor is well-known for supply-chain attacks, trojanizing software used by millions of users (Asus LiveUpdate, CCleaner) or in the financial sector (NetSarang) The group also targeted organizations in the healthcare and education sectors. ESET notes that a similar technique was seen with DePriMon downloader but the way PipeMon does it has not been documented before.

Source: https://www.bleepingcomputer.com/news/security/new-pipemon-malware-uses-windows-print-processors-for-persistence/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security