Category: Attack Feeds

0

Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor – [email protected] (The Hacker News)

– [[{“value”:”The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane as part of cyber attacks likely targeting East and Southeast Asia. That’s according to findings from cybersecurity firm ESET based on multiple Linux samples uploaded to the VirusTotal platform from Taiwan, the Philippines, and Singapore in March 2023.”}]]  –...

0

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign – [email protected] (The Hacker News)

– [[{“value”:”As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active exploitation in the wild. According to statistics shared by the Shadowserver Foundation, a majority of the infections have been reported in the U.S. (554) and India (461), followed by...

0

Looking at the Attack Surfaces of the Kenwood DMX958XR IVI – Connor Ford

– In our previous Kenwood DMX958XR blog post, we detailed the internals of the Kenwood in-vehicle infotainment (IVI) head unit and provided annotated pictures of each PCB. In this post, we aim to outline the attack surface of the DMX958XR in the hopes of providing inspiration for vulnerability research. We will cover the main supported technologies that present potential attack...

0

Privacy-focused mobile phone launches for high-risk individuals – Christian Vasquez

– [[{“value”:” Chinese hackers, cybercriminals, law enforcement agencies, and phone phreaks of yesteryear have all successfully accessed mobile phones along with the trove of data collected by the devices. But the mobile company Cape is looking to change the privacy game with a hardened phone that doesn’t keep metadata, while also adhering to the strict U.S. criminal and national security...

0

10 Most Impactful PAM Use Cases for Enhancing Organizational Security – [email protected] (The Hacker News)

– [[{“value”:”Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain tighter control over privileged access, achieve regulatory compliance, and reduce the burden on your IT team.  As an established provider of a PAM solution, we’ve witnessed firsthand how PAM transforms organizational security. In”}]]  – Read More ...

0

Cyber Story Time: The Boy Who Cried “Secure!” – [email protected] (The Hacker News)

– As a relatively new security category, many security operators and executives I’ve met have asked us “What are these Automated Security Validation (ASV) tools?” We’ve covered that pretty extensively in the past, so today, instead of covering the “What is ASV?” I wanted to address the “Why ASV?” question. In this article, we’ll cover some common use cases and...

0

North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs – [email protected] (The Hacker News)

– [[{“value”:”Threat actors with ties to the Democratic People’s Republic of Korea (DPRK) are impersonating U.S.-based software and technology consulting businesses in order to further their financial objectives as part of a broader information technology (IT) worker scheme. “Front companies, often based in China, Russia, Southeast Asia, and Africa, play a key role in masking the workers’ true origins and”}]] ...

0

Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online – [email protected] (The Hacker News)

– [[{“value”:”New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries, with the U.S. alone accounting for over one-third of the total exposures. The analysis, which comes from attack surface management company Censys, found that 38% of the devices are located in North America, 35.4% in Europe, 22.9% in Asia, 1.7% in Oceania, 1.2% in...

0

5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme – [email protected] (The Hacker News)

– [[{“value”:”Five alleged members of the infamous Scattered Spider cybercrime crew have been indicted in the U.S. for targeting employees of companies across the country using social engineering techniques to harvest credentials and using them to gain unauthorized access to sensitive data and break into crypto accounts to steal digital assets worth millions of dollars. All of the accused parties...

0

Google’s AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects – [email protected] (The Hacker News)

– [[{“value”:”Google has revealed that its AI-powered fuzzing tool, OSS-Fuzz, has been used to help identify 26 vulnerabilities in various open-source code repositories, including a medium-severity flaw in the OpenSSL cryptographic library. “These particular vulnerabilities represent a milestone for automated vulnerability finding: each was found with AI, using AI-generated and enhanced fuzz targets,””}]]  – Read More  – The Hacker News 

0

Stories from the SOC: Registry Clues to PDF Blues: A Tale of PUA Persistence – [email protected]

– [[{“value”:” Executive Summary Establishing persistence on a system allows a threat actor continued access or process execution across system restarts or other changes. For this reason, monitoring for and investigating persistence indicators are key components of any robust cybersecurity platform. Two common persistence techniques are using AutoStart Execution of programs during system boot or logon (T1547) and abusing scheduled...

0

NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data – [email protected] (The Hacker News)

– [[{“value”:”Threat hunters are warning about an updated version of the Python-based NodeStealer that’s now equipped to extract more information from victims’ Facebook Ads Manager accounts and harvest credit card data stored in web browsers. “They collect budget details of Facebook Ads Manager accounts of their victims, which might be a gateway for Facebook malvertisement,” Netskope Threat Labs researcher”}]]  –...

0

Smashing Security podcast #394: Digital arrest scams and stream-jacking – Graham Cluley

– [[{“value”:”In our latest episode we discuss how a woman hid under the bed after scammers told her she was under “digital arrest”, how hackers are hijacking YouTube channels through malicious sponsorship deals, and how one phone company is turning the tables on fraudsters through deepfake AI. All this and much more is discussed in the latest edition of the...

0

 US charges five men linked to ‘Scattered Spider’ with wire fraud – Greg Otto

– [[{“value”:” Federal authorities unsealed charges Wednesday against five individuals with links to the “Scattered Spider” cybercrime syndicate, accusing them of conducting an extensive phishing scheme that compromised companies nationwide, enabling the theft of non-public data and millions in cryptocurrency.  Ahmed Hossam Eldin Elbadawy, 23, of Texas; Noah Michael Urban, 20, of Florida; Evans Onyeaka Osiebo, 20, of Texas; and...

0

CISOs can now obtain professional liability insurance – Greg Otto

– [[{“value”:” Professional liability insurance is designed to protect executives against claims of negligence or inadequate work arising from their services. Companies often use these policies to safeguard a business’s financial assets from the potentially high costs of lawsuits and settlements in the event someone alleges executives have failed to uphold their duties. The policies often cover CEOs, CFOs, and...

0

Vulnerability disclosure policy bill for federal contractors clears Senate panel – mbracken

– [[{“value”:” A bill that would require federal contractors to implement vulnerability disclosure policies that comply with National Institute of Standards and Technology guidelines cleared a key Senate panel Wednesday, setting the bipartisan legislation up for a vote before the full chamber. The Federal Contractor Cybersecurity Vulnerability Reduction Act of 2024 (S. 5028) from Sens. Mark Warner, D-Va., and James...

0

Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater” – gallagherseanm

– Sophos MDR has observed a new campaign that uses targeted phishing to entice the target to download a legitimate remote machine management tool to dump credentials. We believe with moderate confidence that this activity, which we track as STAC 1171, is related to an Iranian threat actor commonly referred to as MuddyWater or TA450. Earlier […]  – Read More ...

0

Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments – [email protected] (The Hacker News)

– [[{“value”:”Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic. “Criminals can now misuse Google Pay...

0

Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity – [email protected] (The Hacker News)

– [[{“value”:”Microsoft has announced a new Windows Resiliency Initiative as a way to improve security and reliability, as well as ensure that system integrity is not compromised. The idea, the tech giant said, is to avoid incidents like that of CrowdStrike’s earlier this July, enable more apps and users to be run without admin privileges, add controls surrounding the use...

0

Enhancing Cyber Resilience in US SLED Organizations – [email protected]

– [[{“value”:” 2024 Cyber Resilience Research Unveils US SLED Sector Challenges New data illuminates how US SLED leaders can prioritize resilience. US SLED (State, Local, and Higher Education) organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to US SLED...

0

NHIs Are the Future of Cybersecurity: Meet NHIDR – [email protected] (The Hacker News)

– The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes. While organizations often take  – Read More  – The Hacker News 

0

Decades-Old Security Vulnerabilities Found in Ubuntu’s Needrestart Package – [email protected] (The Hacker News)

– [[{“value”:”Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could allow a local attacker to gain root privileges without requiring user interaction. The Qualys Threat Research Unit (TRU), which identified and reported the flaws early last month, said they are trivial to exploit, necessitating that”}]]  – Read...

0

What is 2FA? – cyberpro

– [[{“value”:” Two-Factor Authentication (2FA) is a security process that adds an additional layer of protection to your accounts by requiring two different types of credentials to verify your identity before granting access. It ensures that even if one of the factors (like your password) is compromised, unauthorised access is still prevented because the attacker would need […] The post...

0

Social Media Hackers: How They Operate and How to Protect Yourself – cyberpro

– [[{“value”:” The Rising Threat of Social Media Hackers Social media platforms are an integral part of daily life, but they are also prime targets for hackers. With billions of users worldwide, these platforms store personal information that is highly valuable to cybercriminals. Understanding how social media hackers operate and learning how to protect your accounts is […] The post...

0

China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks – [email protected] (The Hacker News)

– [[{“value”:”A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection. Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications”}]]  – Read More ...

0

Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation – [email protected] (The Hacker News)

– [[{“value”:”Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild. The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information. “This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network”}]]  – Read More  – The...

0

Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities – [email protected] (The Hacker News)

– [[{“value”:”Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild. The flaws are listed below – CVE-2024-44308 – A vulnerability in JavaScriptCore that could lead to arbitrary code execution when processing malicious web content CVE-2024-44309 – A cookie management vulnerability...

0

Fintech Giant Finastra Investigating Data Breach – BrianKrebs

– [[{“value”:” The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of the security incident after a cybercriminal began selling more than 400 gigabytes of data purportedly stolen from the company....

0

Sen. Blumenthal wants FCC to get busy on telecom wiretap security rules – Tim Starks

– [[{“value”:” A top senator on Tuesday urged the Federal Communications Commission to begin writing rules that would create mandatory security standards for wiretapping systems embedded in the networks of telecommunications carriers. The suggestion to act immediately from Sen. Richard Blumenthal, D-Conn., comes in response to Chinese hackers known as Salt Typhoon, targeting the phones of both 2024 presidential campaigns...

0

Microsoft launches ‘Zero Day Quest’ competition to enhance cloud and AI security – Greg Otto

– [[{“value”:” Microsoft has announced the launch of Zero Day Quest, a significant expansion of its bug bounty programs, focused on uncovering high-impact security vulnerabilities in cloud and AI technologies.  Under the program, Microsoft will double the bounty rewards for eligible AI vulnerabilities from Nov. 19, 2024, to Jan. 19, 2025, and give researchers direct access to the company’s dedicated...

0

Bipartisan Senate bill targets supply chain threats from foreign adversaries – mbracken

– [[{“value”:” An interagency federal council charged with securing the government’s IT supply chain would get stronger oversight powers under new legislation from a bipartisan pair of Senate lawmakers. The Federal Acquisition Security Council Improvement Act from Sens. Gary Peters, D-Mich., and Mike Rounds, R-S.D., is aimed at better combatting security threats posed by technology products made by companies with...

0

Rail and pipeline representatives push to dial back TSA’s cyber mandates – Christian Vasquez

– [[{“value”:” House Republicans and representatives from the rail and pipeline industries criticized what they say are overly onerous security regulations during a Tuesday hearing that could be a preview of how cyber rules are handled in the Trump administration. The House Homeland Security Subcommittee on Transportation and Maritime Security hearing focused on the business impact of Transportation Security Administration...

0

Looking at the Internals of the Kenwood DMX958XR IVI – Connor Ford

– [[{“value”:” For the upcoming Pwn2Own Automotive contest, a total of four in-vehicle infotainment (IVI) head units have been selected as targets. One of these is the double DIN Kenwood DMX958XR. This unit offers a variety of functionality, such as wired and wireless Android Auto and Apple CarPlay, as well as USB media playback, wireless mirroring, and more. This blog...

0

The AI Fix #25: Beware of the superintelligence, and a spam-eating AI super gran – Graham Cluley

– [[{“value”:”In episode 25 of The AI Fix, humanity creates a satellite called Skynet and then loses it, Graham folds proteins in the comfort of his living room, a Florida man gets a robot dog, Grok rats on its own boss, and a podcast host discovers Brazil nuts. Graham meets an elderly grandmother who’s taking on the AI scammers, our...

0

Botnet serving as ‘backbone’ of malicious proxy network taken offline  – mbracken

– [[{“value”:” Whether it’s for espionage purposes or financially motivated cybercrime, proxy services are a common tool in the attacker toolbox. Often used to disguise the true origin or location of malicious activity, proxies can be lucrative for malicious actors, who create them via a botnet and sell access in order for others to run their schemes, which can range...

0

Attackers are hijacking Jupyter notebooks to host illegal Champions League streams – Christian Vasquez

– [[{“value”:” Amid threats of state-backed APTs turning the geopolitical tide by diving into sensitive networks, some hackers are looking to use misconfigured Jupyter notebook servers to watch UEFA Champions League soccer, according to a new report from Aqua Security. Researchers at the cloud security company said in a report released Tuesday that hackers were drawn to the misconfigured JupyterLab...

0

Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts – [email protected] (The Hacker News)

– [[{“value”:”Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools. The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed to facilitate illegal live streaming of sports events, Aqua said in a report shared with The”}]]  –...

0

Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices – [email protected] (The Hacker News)

– [[{“value”:”The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal. “At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly utilizing small office/home office (SOHO) routers and IoT devices,” the...

0

Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority – [email protected] (The Hacker News)

– Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users entrusted with it. This emphasis is perhaps due to the persistent challenges of Privileged Access Management (PAM) deployments. Yet, as the threat landscape evolves, so must organizational priorities. To  – Read More  – The Hacker...