API security, Endpoint/Device Security

Raspberry Pi exploited by novel GEOBOX tool

Share
Raspberry Pi declines bribe to pre-install malware

Hackread reports that cyberattacks involving Raspberry Pi 4 Model B devices are being concealed by threat actors with the new malicious GEOBOX dark web tool, which enables not only geolocation alteration and Wi-Fi MAC address masking but also inconspicuous communications.

Stealthier attacks have been facilitated by threat actors through the utilization of several strategically positioned internet-connected GEOBOX devices, a report from Resecurity's Cyber Threat Intelligence team revealed. Threat actors could leverage GEOBOX — which provides extensive internet connection configurations — not only to obfuscate their location but also conduct advanced financial fraud, credential stuffing campaigns, malware deployment efforts, disinformation operations, network security evaluations, and dark web activities, reported researchers. Such a tool, which follows the emergence of the TMChecker dark web tool, indicates the continuous evolution of the cybercrime toolset that should prompt the implementation of digital risk monitoring and endpoint protection strategies and other proactive cybersecurity measures, researchers added.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.