company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Wizcase

Moodle

Vulnerability

loading..
loading..
loading..

Wizcase experts detected a serious vulnerability in the open-source learning platform Moodle allowing accounts takeover

Moodle was detected with a serious vulnerability discovered by the cynersecurity researchers team of experts at Wizcase

12-Apr-2021
3 min read

No content available.

Related Articles

loading..

OCR

Sparkkitty

SparkKitty malware on Google Play and App Store steals photos and crypto wallets...

A sophisticated mobile malware campaign has successfully infiltrated both Google Play and Apple's App Store, stealing users' personal photos and cryptocurrency assets through a malicious software dubbed SparkKitty. Security researchers at Kaspersky have exposed this critical threat that represents an alarming evolution in mobile cybercrime, targeting millions of users worldwide through seemingly legitimate applications. ## How SparkKitty Operates SparkKitty represents a dangerous evolution of the SparkCat malware discovered in January 2024, employing advanced optical character recognition (OCR) technology to systematically steal sensitive data from infected devices. The malware operates through a sophisticated multi-stage attack process that has caught both Apple and Google’s security systems off guard. The attack sequence begins when users download infected applications from official app stores. Two primary malicious applications were identified: SOEX, a messaging app with cryptocurrency exchange features downloaded over 10,000 times from Google Play, and 币coin, a cryptocurrency information tracker on Apple’s App Store. Once installed, SparkKitty requests access to device photo galleries under the pretense of legitimate app functionality. On iOS devices, the malware automatically executes using the Objective-C '+load' method, while Android versions trigger during app launch or specific user actions. The malware then retrieves encrypted configuration files using AES-256 encryption to establish command-and-control server connections. ## Scale and Financial Consequences The SparkKitty campaign has demonstrated unprecedented reach and sophistication in mobile malware attacks. Kaspersky researchers confirmed that infected applications achieved over 242,000 downloads through Google Play alone, with additional distribution through unofficial channels and modified applications. The malware's primary objective involves systematically exfiltrating entire photo libraries from infected devices, specifically targeting cryptocurrency wallet recovery phrases stored as screenshots. These seed phrases provide complete access to victims’ digital wallets, enabling attackers to steal substantial cryptocurrency holdings. Beyond crypto theft, the malware poses severe privacy risks by stealing personal photographs that could be used for extortion or identity theft. ## Advanced Evasion Techniques SparkKitty employs multiple sophisticated techniques to evade detection and maximize data theft. On iOS platforms, the malware disguises itself within fake frameworks, including AFNetworking.framework and libswiftDarwin.dylib, often delivered through enterprise provisioning profiles. Android implementations utilize malicious Xposed and LSPosed modules to exploit low-level system vulnerabilities. The malware's OCR capabilities represent a significant technological advancement in mobile cybercrime. Some variants integrate Google's ML Kit library to perform intelligent text detection, filtering images to identify only those containing sensitive textual information such as recovery phrases or passwords. This targeted approach reduces data transmission requirements while maximizing the value of stolen information. ## Inadequate Security Measures Exposed Both Google and Apple have responded to the SparkKitty disclosure by removing identified malicious applications and banning associated developer accounts. Google spokesperson Ed Fernandez confirmed that _"all identified apps have been removed from Google Play, and the developers have been banned,"_ while emphasizing that Google Play Protect provides automatic protection against known malware variants. However, the successful infiltration of official app stores raises serious questions about current security review processes. Despite Apple's rigorous app review procedures, SparkKitty bypassed multiple security layers, highlighting critical vulnerabilities in mobile platform security. ## Widespread Threat Landscape SparkKitty's distribution extends far beyond official app stores, encompassing a sophisticated network of malicious applications and modified software. Researchers identified infected TikTok clones, gambling applications, adult-themed games, and casino apps distributed through unofficial channels. The campaign focuses on users in China and Southeast Asia, though its technical architecture poses global security risks. The malware's multi-language OCR capabilities support English, Chinese, Japanese, Korean, and various European languages, indicating broad international targeting. ## Critical Security Measures Security experts emphasize several crucial protective measures for mobile users. Primary recommendations include never storing cryptocurrency recovery phrases as device screenshots, implementing strict app permission controls, and avoiding installation of applications from unverified sources. Kaspersky analysts Sergey Puzan and Dmitry Kalinin recommend immediately deleting suspicious applications and regularly running security scans using reputable mobile security solutions. Users should scrutinize app permissions, particularly requests for photo gallery or storage access that seem unrelated to core app functionality. ## Escalating Mobile Security Crisis The SparkKitty campaign represents a critical escalation in mobile malware sophistication and demonstrates the urgent need for enhanced platform security measures. With mobile malware attacks reaching 12 million incidents in Q1 2025 alone, the threat landscape continues expanding rapidly. The successful infiltration of official app stores by OCR-equipped malware signals a new era of mobile cybercrime that traditional security measures struggle to address. As cryptocurrency adoption increases globally, similar campaigns targeting digital assets through mobile devices will likely proliferate, requiring immediate industry-wide security improvements and user education initiatives. The SparkKitty incident serves as a stark reminder that official app stores cannot guarantee absolute security. Combating evolving mobile threats requires heightened vigilance from both users and platform operators.

loading..   24-Jun-2025
loading..   4 min read
loading..

SAlt Typhoon

Chinese hackers breached a Canadian telecom via a Cisco flaw, exposing critical ...

In a critical escalation of global cyber-espionage, Canadian authorities have confirmed that the Chinese state-sponsored hacking group Salt Typhoon successfully breached a major Canadian telecommunications provider by exploiting a known Cisco vulnerability. The incident underscores a persistent threat to North American critical infrastructure and signals a broader campaign targeting telecom networks worldwide. ## Sequence of Events - **Initial Discovery:** In February 2025, Salt Typhoon compromised three network devices belonging to a Canadian telecom company. The attackers leveraged CVE-2023-20198, a critical Cisco IOS XE vulnerability, which allows remote, unauthenticated attackers to create privileged accounts and seize control of affected devices. - **Technical Exploitation:** The flaw, first disclosed in October 2023, had already enabled hackers to infiltrate over 10,000 devices globally. Despite widespread warnings and available patches, the targeted Canadian provider had not secured its infrastructure, exposing it. - **Espionage Actions:** Attackers extracted configuration files from all three devices and reconfigured at least one to establish a GRE tunnel, enabling the interception and collection of sensitive network traffic. - **Scope of Attack:** Forensic investigations reveal that Salt Typhoon’s campaign extends beyond telecom, with reconnaissance and infiltration attempts detected across multiple Canadian sectors. ## National and International Ramifications - **Persistent Threat:** The Canadian Centre for Cyber Security and the FBI jointly warn that Salt Typhoon, almost certainly acting under the direction of the People’s Republic of China, will “almost certainly” continue targeting Canadian organizations—especially telecoms—over the next two years. - **Global Context:** The same group has breached at least eight U.S. telecom firms, including major carriers, with the campaign reportedly spanning dozens of countries. U.S. officials admit that Chinese actors remain embedded in some networks, complicating full remediation. - **Espionage Objectives:** Salt Typhoon’s operations prioritize intercepting communications of high-value targets, such as government officials and political figures, and exfiltrating call records and metadata. ## Geopolitical Fallout - **Official Responses:** Canada and the U.S. have issued urgent advisories, calling for immediate network hardening and patching of vulnerable systems. Beijing denies involvement, but international sanctions have already been levied against implicated Chinese entities. - **Broader Cyber Tensions:** The campaign’s reach is not limited to North America; recent intelligence suggests Chinese APTs are also probing Russian defense systems, signaling shifting allegiances and a widening cyber battlefield. ## What’s Next? - **Ongoing Risk:** Authorities warn that the Salt Typhoon campaign is far from over. The group’s ability to exploit known vulnerabilities and slow patch adoption leaves critical infrastructure at continued risk. - **Defensive Measures:** Organizations are urged to audit and secure all edge devices, prioritize patching, and monitor for suspicious activity linked to Salt Typhoon’s known tactics. > “The responsible actors are almost certainly PRC state-sponsored actors, specifically Salt Typhoon,” stated the Canadian Centre for Cyber Security, emphasizing the urgent need for vigilance.

loading..   23-Jun-2025
loading..   3 min read
loading..

DDoS Attack

Cloudflare defends the internet by blocking a record-shattering 7.3 Tbps DDoS at...

Cloudflare successfully mitigated what stands as the largest distributed denial-of-service (DDoS) attack ever recorded, reaching a staggering 7.3 terabits per second (Tbps). This unprecedented cyberattack targeted a hosting provider using Cloudflare's Magic Transit protection service and represents a significant escalation in the scale and sophistication of modern DDoS campaigns. The attack delivered 37.4 terabytes of data in just 45 seconds, equivalent to streaming over 9,350 full-length HD movies or downloading 9.35 million songs in under a minute. ## Magnitude of Modern DDoS Attacks ### Historical Context and Escalation The 7.3 Tbps attack represents a dramatic escalation in DDoS attack volumes, surpassing previous records by significant margins. This attack was 12% larger than Cloudflare's previous record and 1 Tbps greater than a recent attack reported by cybersecurity journalist Brian Krebs. The evolution of DDoS attacks has accelerated dramatically in recent years, with massive attacks becoming increasingly common and more sophisticated. The rapid growth in attack volumes over the past decade demonstrates the increasing sophistication of cybercriminal infrastructure and the growing availability of compromised devices worldwide. In 2025, Cloudflare reported a 358% increase in DDoS attacks compared to the same period in the previous year, with over 20.5 million attacks recorded globally. ### Technical Specifications and Scale The attack's technical characteristics reveal the unprecedented scale of modern cyber threats. The assault maintained an average data transfer rate of approximately 831 gigabytes per second throughout its 45-second duration, carpet-bombing an average of 21,925 destination ports per second and reaching a peak of 34,517 destination ports per second. These metrics demonstrate the attackers' strategy of simultaneously overwhelming multiple network entry points rather than focusing on a single target. ## Attack Composition and Methodology ### Multi-Vector Approach The 7.3 Tbps attack employed a multi-vector approach, though it was overwhelmingly dominated by UDP flood attacks. Approximately 99.996% of the attack traffic consisted of UDP floods, while the remaining 0.004% comprised various reflection and amplification techniques including QOTD reflection attacks, Echo reflection attacks, NTP reflection attacks, Mirai UDP flood attacks, Portmap floods, and RIPv1 amplification attacks. This composition reflects a common pattern in modern DDoS attacks, where attackers leverage multiple attack vectors to maximize their impact while attempting to evade detection and mitigation systems. The UDP flood component provided the raw volumetric power, while the reflection and amplification attacks likely served to mask the true sources and increase the overall attack complexity. ### Geographic Distribution and Botnet Infrastructure The attack originated from a massive botnet spanning 122,145 unique IP addresses across 5,433 Autonomous Systems (AS) in 161 countries. This global distribution demonstrates the extensive reach of modern botnets and the challenge of defending against truly distributed attacks. The geographic breakdown reveals interesting patterns in botnet infrastructure and potentially vulnerable regions. Brazil and Vietnam each accounted for approximately 25% of the attack traffic, representing nearly half of the total volume. This concentration in developing nations aligns with broader trends in botnet distribution, where inadequate cybersecurity practices and the prevalence of vulnerable IoT devices create ideal conditions for large-scale compromises. The top ten source countries also included Taiwan, China, Indonesia, Ukraine, Ecuador, Thailand, the United States, and Saudi Arabia. ## Cloudflare's Mitigation Infrastructure ### Global Anycast Architecture Cloudflare's successful mitigation of this record-breaking attack demonstrates the effectiveness of their global anycast architecture. The targeted IP address was advertised from Cloudflare's network using global anycast, which distributed the attack traffic across 477 data centers in 293 locations worldwide. This approach leverages the distributed nature of DDoS attacks against itself, spreading the load across multiple geographic locations and reducing the impact on any single point of presence.The anycast approach provides several critical advantages in DDoS mitigation, including automatic traffic distribution based on BGP routing, redundancy across multiple data centers, and the ability to absorb large volumes of traffic without overwhelming individual locations. This distributed defense model is essential for handling attacks of this magnitude, as no single data center could reasonably be expected to handle 7.3 Tbps of malicious traffic. ### Autonomous Detection and Response SystemsCloudflare's mitigation relied heavily on their autonomous DDoS detection system, centered around their proprietary "dosd" (denial of service daemon). This system operates at every data center and uses advanced packet sampling techniques with eBPF (extended Berkeley Packet Filter) and XDP (eXpress Data Path) technologies to analyze traffic patterns in real-time.The detection system employs sophisticated fingerprinting techniques that analyze packet samples to identify suspicious patterns based on commonalities in packet header fields and anomalies in traffic behavior. When patterns are detected, the system generates multiple permutations of fingerprints to find the most accurate match that will provide the highest mitigation efficacy while minimizing false positives. ### Real-Time Threat Intelligence SharingA critical component of Cloudflare's defense is their "gossiping" system, where each server shares real-time threat intelligence with other servers within the same data center and globally. This distributed intelligence sharing improves mitigation efficacy by ensuring that attack fingerprints discovered at one location are quickly propagated to all other locations. The system can detect and mitigate attacks fully autonomously, without requiring human intervention. ## Broader Implications for Internet Security ### The Growing DDoS Threat Landscape The 7.3 Tbps attack occurs within a context of rapidly escalating DDoS activity worldwide. The first quarter of 2025 saw unprecedented levels of DDoS attacks, with organizations reporting sustained campaigns exceeding 2 Tbps and lasting several hours or recurring in waves. This trend reflects the increasing sophistication of attack infrastructure and the growing availability of compromised devices for botnet recruitment. The economic impact of these attacks continues to grow, with each damaging DDoS attack now costing enterprises an average of $500,000 to $1.1 million, not including long-term reputational damage and customer churn. For critical infrastructure sectors including healthcare, energy, and transportation, the potential consequences of successful attacks can be far more severe than financial losses alone. ### The Role of IoT Devices in Modern Botnets The massive scale of the 7.3 Tbps attack highlights the critical role of compromised IoT devices in modern DDoS campaigns. Millions of vulnerable devices with fast internet access, particularly in developing countries, provide an ideal foundation for large botnets. These devices often lack robust security measures, use default credentials, and receive infrequent security updates, making them attractive targets for cybercriminals. Recent research has identified botnets comprising over 1.33 million devices, with the majority concentrated in countries with large populations of older, unpatched devices. The Mirai botnet family and its variants continue to be particularly effective at recruiting IoT devices, including cameras, routers, and other internet-connected appliances. ### Infrastructure Vulnerabilities and Resilience The successful mitigation of the 7.3 Tbps attack demonstrates both the vulnerability of internet infrastructure and the effectiveness of properly implemented defense systems. While Cloudflare's global network successfully absorbed and mitigated this massive attack, the incident highlights the ongoing vulnerability of internet infrastructure to large-scale attacks.Recent disruptions to global internet infrastructure, including damage to submarine cables and targeted attacks on critical network components, have revealed the fragility of the systems that underpin global connectivity. The concentration of attack traffic from specific geographic regions also raises questions about the security of telecommunications infrastructure in those areas. ## Advanced Mitigation Technologies ### eBPF and XDP Technologies Cloudflare's successful defense against the 7.3 Tbps attack relied heavily on advanced packet processing technologies, particularly eBPF and XDP. These technologies enable high-performance packet processing directly in the Linux kernel, allowing for extremely fast detection and mitigation of malicious traffic. XDP can drop over 11 million attack packets per second on a single server, making it well-suited for handling large-scale volumetric attacks. The combination of eBPF and XDP provides several advantages for DDoS mitigation, including minimal latency overhead, high throughput capacity, and the ability to implement sophisticated filtering logic directly in the kernel. This approach allows for surgical precision in blocking attack traffic while preserving legitimate connections. ### Machine Learning and Automated Defense Modern DDoS mitigation increasingly relies on machine learning algorithms and automated defense systems to handle the scale and complexity of contemporary attacks. These systems can adapt to new attack patterns in real-time, updating their detection models and mitigation strategies without human intervention. The speed of modern attacks, which can reach peak intensity within seconds, makes automated response essential for effective defense. ## Recommendations and Future Outlook ### Strengthening Internet Infrastructure The 7.3 Tbps attack underscores the need for continued investment in robust internet infrastructure and distributed defense systems. Organizations should prioritize implementing multi-layered security architectures that can distribute attack traffic across multiple locations and provide redundancy in case of localized failures. The success of anycast-based mitigation demonstrates the value of distributed defense approaches. ### Addressing IoT Security Challenges The role of compromised IoT devices in enabling massive DDoS attacks requires urgent attention from manufacturers, regulators, and users. Key recommendations include implementing strong default credentials, providing regular security updates throughout device lifecycles, and establishing better monitoring for suspicious network activity. Internet service providers should also consider implementing network-level monitoring to detect and isolate compromised devices. ### International Cooperation and Threat Intelligence The global nature of DDoS attacks, as demonstrated by the 161 countries involved in the 7.3 Tbps attack, requires enhanced international cooperation in cybersecurity defense. Sharing threat intelligence across borders and coordinating response efforts can help identify and disrupt botnet infrastructure before it can be weaponized for large-scale attacks

loading..   21-Jun-2025
loading..   8 min read