unauthorized access

AppWizard
April 3, 2025
Consumer-grade phone surveillance applications are becoming more sophisticated and difficult to remove. A recent investigation revealed an Android monitoring app that requires a password for uninstallation, trapping users who want to remove it. This spyware uses an Android feature to overlay content, displaying a password prompt when users attempt to uninstall it. The password is set by the person who installed the app, complicating removal. A workaround involves rebooting the device into "safe mode," which temporarily disables third-party apps, allowing users to uninstall the spyware without encountering the password prompt. These spyware applications are often marketed as parental control or employee tracking tools but can be classified as "stalkerware," with some promoting surveillance of partners without consent, which is illegal. Spyware is typically downloaded from unofficial sources and installed by individuals with physical access to the target device. It may hide its icon and continuously upload sensitive data to a web dashboard accessible by the abuser. Identifying such spyware can be difficult, as it may appear as a benign app in Android settings. To identify and remove Android password-enabled spyware, users should have a safety plan before proceeding. A general guide for spyware removal suggests checking for unfamiliar device admin apps, as these may indicate spyware presence. Users can enter safe mode by holding the power button, selecting "power off," and confirming the reboot into safe mode. In safe mode, users can check for and deactivate any suspicious device admin apps, then uninstall the spyware from the apps section in settings. After removal, users should secure their devices with a complex passcode and protect online accounts linked to the device. Staying vigilant about digital security is essential to reduce the risk of invasive technologies. Resources are available for those who suspect their phone has been compromised by spyware.
Tech Optimizer
April 2, 2025
Over 1,500 PostgreSQL instances exposed to the internet have been targeted by a cryptocurrency mining malware campaign called JINX-0126. Attackers exploit weak credentials to access PostgreSQL servers and use the "COPY ... FROM PROGRAM SQL" command for arbitrary command execution. They deploy a shell script to terminate existing cryptominers and deliver the pg_core binary. A Golang binary, disguised as the PostgreSQL multi-user database server, is then downloaded to establish persistence and escalate privileges, leading to the execution of the latest XMRig cryptominer variant. JINX-0126 employs advanced tactics, including unique hashes for binaries and fileless miner payload execution, to evade detection by cloud workload protection platforms.
Winsage
March 28, 2025
A newly uncovered zero-day vulnerability in Windows allows hackers to steal NTLM credentials simply by previewing a malicious file, affecting multiple Windows versions, including Windows 7 and Windows 11 v24H2. Microsoft has not yet issued a patch for this vulnerability, leaving millions of users exposed. The flaw was reported by security researcher Mitja Kolsek from ACROS Security, who noted that stolen credentials could lead to unauthorized access to networks. ACROS Security has created a temporary micro-patch available through its 0patch platform, which users are encouraged to implement. Additionally, a separate zero-day vulnerability identified in Google Chrome and other Chromium-based browsers allows attackers to bypass sandbox protection with a click on a malicious link, primarily targeting media organizations and government agencies in Russia. Users are advised to install the 0patch fix, avoid interacting with unfamiliar files, and update their browsers to protect against these threats.
Winsage
March 26, 2025
Broadcom has addressed a critical authentication bypass vulnerability, CVE-2025-22230, affecting VMware Tools for Windows, rated with a CVSS score of 9.8. This vulnerability allows low-privileged local attackers to escalate their privileges within vulnerable VMs, potentially leading to unauthorized access. It affects VMware Tools versions 12.x.x and 11.x.x across Windows, Linux, and macOS platforms. VMware Tools version 12.5.1 has been released to fix this issue. Additionally, Broadcom issued updates for three zero-day vulnerabilities in VMware ESX products (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226), which were confirmed to be actively exploited and represent a "VM Escape" scenario.
AppWizard
March 26, 2025
The National Security Agency (NSA) issued a warning on February 25 regarding vulnerabilities in the Signal app that could be exploited by foreign operatives, particularly Russian intelligence. This warning highlighted risks to the confidentiality of conversations and noted that individuals under surveillance should be cautious when using the app. The memo stated that while Department of Defense and NSA employees may use Signal, they are prohibited from discussing sensitive matters on it. Furthermore, the NSA cautioned against sharing compromising information over social media or internet-based applications, urging discretion in online interactions. The warning preceded a scandal involving Trump administration officials who leaked sensitive military information through the app, which included a U.S. journalist in the conversation, leading to potential legal repercussions for violating security guidelines.
Search