Connect with us

News

‘I Am Not a Robot’, CAPTCHAs Being Used to Spread Malware, HP Warns 

Published

on

Today at its annual Amplify Conference, HP Inc. (NYSE: HPQ) issued the latest HP Threat Insights Report, highlighting rising usage of fake CAPTCHA verification tests which allow threat actors to trick users into infecting themselves. The campaigns show attackers are capitalizing on people’s increasing familiarity with completing multiple authentication steps online – a trend HP calls ‘click tolerance’.

With analysis of real-world cyberattacks, the HP Threat Insights Report helps organizations to keep up with the latest techniques cybercriminals are using to evade detection and breach PCs. Based on data from millions of endpoints running HP Wolf Security1, notable campaigns identified by HP threat researchers include:

Advertisement

CAPTCHA Me If You Can: As bots get better at bypassing CAPTCHAs, authentication has grown more elaborate – meaning users have become more accustomed to jumping through hoops to prove they are human. HP threat researchers identified multiple campaigns where attackers crafted malicious CAPTCHAs. Users were directed to attacker-controlled sites, and prompted to complete a range of fake authentication challenges. Victims were tricked into running a malicious PowerShell command on their PC that ultimately installed the Lumma Stealer remote access trojan (RAT).

READ ALSO: HP Report Uncovers South African Youth’s Growing Interest in Gaming Careers Amid Awareness Gap

Attackers Capable of Accessing End-Users’ Webcams and Microphones to Spy on Victims: A second campaign saw attackers spreading an open source RAT, XenoRAT, with advanced surveillance features such as microphone and webcam capture. Using social engineering techniques to convince users to enable macros in Word and Excel documents, attackers could control devices, exfiltrate data, and log keystrokes – showing Word and Excel still present a risk for malware deployment.

Advertisement

Python Scripts Used for SVG Smuggling: Another notable campaign shows how attackers are delivering malicious JavaScript code inside Scalable Vector Graphic (SVG) images to evade detection. These images are opened by default in web browsers and execute the embedded code to deploy seven payloads—including RATs and infostealers—offering redundancy and monetization opportunities for the attacker. As part of the infection chain, the attackers also used obfuscated Python scripts to install the malware. Python’s popularity – which is being further boosted by rising interest in AI and data science – means it is an increasingly attractive language for attackers to write malware, as its interpreter is widely installed.

Patrick Schläpfer, Principal Threat Researcher in the HP Security Lab, comments:

“A common thread across these campaigns is the use of obfuscation and anti-analysis techniques to slow down investigations. Even simple but effective defence evasion techniques can delay the detection and response of security operations teams, making it harder to contain an intrusion. By using methods like direct system calls, attackers make it tougher for security tools to catch malicious activity, giving them more time to operate undetected – and compromise victims endpoints.”

Advertisement

READ ALSO: HP Revolutionizes Large Format Printing With The New 36-inch DesignJet Portfolio

By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely inside secure containers – HP Wolf Security has specific insight into the latest techniques used by cybercriminals. To date, HP Wolf Security customers have clicked on more than 65 billion email attachments, web pages, and downloaded files with no reported breaches.

The report, which examines data from calendar Q4 2024, details how cybercriminals continue to diversify attack methods to bypass security tools that rely on detection, such as:

Advertisement

At least 11% of email threats identified by HP Sure Click bypassed one or more email gateway scanners.
Executables were the most popular malware delivery type (43%), followed by archive files (32%).

Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc., comments:

“Multi-step authentication is now the norm, which is increasing our ‘click tolerance.’ The research shows users will take multiple steps along an infection chain, really underscoring the shortcomings of cyber awareness training. Organizations are in an arms race with attackers—one that AI will only accelerate.

Advertisement

To combat increasingly unpredictable threats, organizations should focus on shrinking their attack surface by isolating risky actions – such as clicking on things that could harm them. That way, they don’t need to predict the next attack; they’re already protected.”

Advertisement

News

Edo To Dredge Ikpoba River For Revenue, Flood Control

Published

on

Edo State government has proposed the dredging of Ikpoba River to curb flooding and exploring potentials for enhancing revenue generation in the state.

The state Commissioner for Mining, Hon. Andrew Ijegbai, disclosed this when he led a delegation on an inspection of the river in Benin City.

Advertisement

According to him, the initiative was to find a lasting solution to the incessant challenges of flooding and river overflow on the busy road.

He added that his team was on the ground to assess the condition of the river to get a firsthand observation of its impact on communities near its bank.

READ ALSO: Controversy Over Pregnant Woman Buried Alive In Edo

Advertisement

Also speaking, Director of Mining in the ministry, Mr. Omoruyi Ihianle expressed the state government’s determination to turn challenges into successes.

He stated that the primary objectives of the project were to generate revenue for the state government through mining and to mitigate flooding in the host communities.

“As a government, we have found a way of converting our challenges until success.

Advertisement

“As a result of the silted river channel, the host communities have been suffering from flooding, hence the Edo State Government is stepping in to desilt while raising revenue for the State Government,” he said.

Advertisement
Continue Reading

News

JUST IN: Ex-Eagles Goalkeeper, Peter Rufai, Is Dead

Published

on

Peter Rufai, the former Super Eagles goalkeeper, has died.

Waidi Akanni, a former teammate and associate, confirmed the legendary goalkeeper’s death to TheCable on Thursday.

Advertisement

Rufai, affectionately nicknamed Dodo Mayana, died at 61 after a reported battle with long-term illness.

The Super Eagles of Nigeria also announced the demise of the former goalkeeper on the team’s official X account.

READ ALSO: Meet First African Artiste Who Get Hollywood Walk Of Fame Star

Advertisement

Forever in our hearts, Dodo Mayana. We mourn the passing of legendary Super Eagles goalkeeper, Peter Rufai, a giant of Nigerian football and a 1994 AFCON champion,” the post reads.

Your legacy lives on between the sticks and beyond.”

Rufai is regarded as one of the best football goalkeepers Nigeria has ever produced. He was the Eagles’ first-choice goalkeeper when Nigeria won the 1994 Africa Cup of Nations (AFCON).

Advertisement

He also represented Nigeria at the 1994 FIFA World Cup in the US and the 1998 FIFA World Cup in France.

Rufai had over 60 caps for the Super Eagles over the course of a decade with the team.

Advertisement
Continue Reading

News

AMCON Sells Ibadan DisCo For N100bn

Published

on

The Asset Management Company of Nigeria (AMCON) has announced the sale of the Ibadan Electricity Distribution Company (IBEDC) for N100 billion.

AMCON’s Managing Director/CEO, Gbenga Alake, disclosed this at a media parley on Thursday.

Advertisement

Apart from IBEDC, AMCON also manages other distribution companies, including the Abuja Electricity Distribution Company (AEDC), Benin Electricity Distribution Company, Kaduna Electricity Distribution Company, and Kano Electricity Distribution Company.

READ ALSO:IBEDC Throws Ogun Industrial Estate, Others Into Darkness Over Debts

Alake said, “Today, I announce to you that Ibadan DisCo has been sold. When we came in, it had already been sold, but we renegotiated the price and got almost double of what it was initially going to be sold for.”

Advertisement

Regarding ongoing legal issues, Alake stated, “We have sold it, and whatever is still happening in court, we will face it.”

However, officials of IBEDC did not respond to inquiries about the sale.

 

Advertisement

Continue Reading

Trending