Category: Attack Feeds

0

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine – [email protected] (The Hacker News)

– [[{“value”:”A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year. The findings come as part of a collaborative investigation by First Department and the University of Toronto’s Citizen Lab. “The spyware placed on his device allows the operator to...

0

Conquering the Complexities of Modern BCDR – [email protected] (The Hacker News)

– The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities make data protection and seamless business continuity challenging for businesses of all sizes. Your organization needs robust security measures that go beyond traditional backup solutions to address the intricacies of today’s complex IT ecosystems.  – Read More  – The Hacker News 

0

Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as MLflow, H2O, PyTorch, and MLeap that could pave the way for code execution. The vulnerabilities, discovered by JFrog, are part of a broader collection of 22 security shortcomings the supply chain security company first disclosed last month. Unlike the first”}]]  – Read...

0

More_eggs MaaS Expands Operations with RevC2 Backdoor and Venom Loader – [email protected] (The Hacker News)

– [[{“value”:”The threat actors behind the More_eggs malware have been linked to two new malware families, indicating an expansion of its malware-as-a-service (MaaS) operation. This includes a novel information-stealing backdoor called RevC2 and a loader codenamed Venom Loader, both of which are deployed using VenomLNK, a staple tool that serves as an initial access vector for the deployment of follow-on”}]] ...

0

Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware – [email protected] (The Hacker News)

– [[{“value”:”The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to conceal its staging infrastructure hosting a malware called GammaDrop. The activity is part of an ongoing spear-phishing campaign targeting Ukrainian entities since at least early 2024 that’s designed to drop the Visual Basic Script malware, Recorded Future’s Insikt Group said in a new...

0

FCC, for first time, proposes cybersecurity rules tied to wiretapping law – Tim Starks

– [[{“value”:” Federal Communications Commission Chairwoman Jessica Rosenworcel presented draft regulations Thursday to fellow commissioners that would for the first time require telecom companies to upgrade cyber defenses under a federal wiretapping law, or face fines. The draft rules are a response to alarming breaches of telecom providers by Chinese government hackers known as Salt Typhoon. The breaches have drawn...

0

Industry leaders on CISA’s secure-by-design pledge: A great program with some issues – mbracken

– [[{“value”:” Private-sector tech leaders told House lawmakers Thursday that the Cybersecurity and Infrastructure Security Agency’s secure-by-design push may benefit from more of an incentive structure, but poorly trained developers remain “a real problem” for the nearly two-year-old initiative. The four witnesses testifying before the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection all characterized CISA’s voluntary secure-by-design pledge...

0

Telecom Giant BT Group Hit by Black Basta Ransomware – Deeba Ahmed

– BT Group, a major telecommunications firm, has been hit by a ransomware attack from the Black Basta group. The attack targeted the company’s Conferencing division, leading to server shutdowns and potential data theft.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Russian money-laundering network linked to drugs and ransomware disrupted, 84 arrests – Graham Cluley

– [[{“value”:”The UK’s National Crime Agency (NCA) has revealed details of Operation Destabilise, a years-long international law enforcement investigation into a giant Russian money laundering enterprise that handled billions of dollars for drug traffickers and ransomware gangs worldwide. Read more in my article on the Tripwire State of Security blog.”}]]  – Read More  – Graham Cluley 

0

This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges – [email protected] (The Hacker News)

– [[{“value”:”As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a newly discovered Android remote access trojan (RAT) called DroidBot. “DroidBot is a modern RAT that combines hidden VNC and overlay attack techniques with spyware-like capabilities, such as keylogging and user interface monitoring,” Cleafy researchers Simone Mattia, Alessandro”}]]  – Read More  – The...

0

Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers – [email protected] (The Hacker News)

– [[{“value”:”Europol on Thursday announced the shutdown of a clearnet marketplace called Manson Market that facilitated online fraud on a large scale. The operation, led by German authorities, has resulted in the seizure of more than 50 servers associated with the service and the arrest of two suspects. More than 200 terabytes of digital evidence have been collected. Manson Market...

0

Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have released a proof-of-concept (PoC) exploit that strings together a now-patched critical security flaw impacting Mitel MiCollab with an arbitrary file read zero-day, granting an attacker the ability to access files from susceptible instances. The critical vulnerability in question is CVE-2024-41713 (CVSS score: 9.8), which relates to a case of insufficient input”}]]  – Read More  – The...

0

Exclusive: Feds are probing 764, The Com’s use of cybercriminal tactics to carry out violent crimes – Greg Otto

– [[{“value”:” The child sextortion group 764 and the global collective of loosely associated groups known as “The Com” are using tools and techniques normally used for financially motivated cybercrime tactics — such as SIM swapping, IP grabbing and social engineering — to commit violent crimes, according to exclusive law enforcement and intelligence reports reviewed by CyberScoop.  The reports offer...

0

Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor – [email protected] (The Hacker News)

– [[{“value”:”A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported Android-cum-Windows backdoor called DarkNimbus to facilitate long-term surveillance operations targeting Tibetans and Uyghurs. “Earth Minotaur uses MOONSHINE to deliver the DarkNimbus backdoor to Android and Windows devices, targeting WeChat, and possibly making it a”}]]  – Read More  – The Hacker News 

0

Want to Grow Vulnerability Management into Exposure Management? Start Here! – [email protected] (The Hacker News)

– [[{“value”:”Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the limitations of this approach have become increasingly evident.  At its core, Vulnerability Management”}]]  – Read More  – The...

0

How a Russian man’s harrowing tale shows the physical dangers of spyware – Greg Otto

– [[{“value”:” Kirill Parubets was, entirely understandably, afraid.  Six or seven Russian police officers had knocked on his Moscow apartment door in April, entered while wearing masks and holding automatic weapons, and started  interrogating him about how he and his wife had helped supply aid to people in Ukraine suffering from the war’s devastation.  The police beat him and his...

0

Smashing Security podcast #396: Dishy DDoS dramas, and mining our minds for data – Graham Cluley

– [[{“value”:”A CEO is arrested for turning satellite receivers into DDoS attack weapons! Then, we’ll journey into the world of bossware and “affective computing” and explore how AI is learning to read our emotions – is this the future of work, or a recipe for dystopia? All this and more is discussed in the latest edition of the “Smashing Security”...

0

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers – [email protected] (The Hacker News)

– [[{“value”:”A suspected Chinese threat actor targeted a large U.S. organization earlier this year as part of a four-month-long intrusion. According to Broadcom-owned Symantec, the first evidence of the malicious activity was detected on April 11, 2024 and continued until August. However, the company doesn’t rule out the possibility that the intrusion may have occurred earlier. “The attackers moved laterally”}]] ...

0

ANEL and NOOPDOOR Backdoors Weaponized in New MirrorFace Campaign Against Japan – [email protected] (The Hacker News)

– [[{“value”:”The China-linked threat actor known as MirrorFace has been attributed to a new spear-phishing campaign mainly targeting individuals and organizations in Japan since June 2024. The aim of the campaign is to deliver backdoors known as NOOPDOOR (aka HiddenFace) and ANEL (aka UPPERCUT), Trend Micro said in a technical analysis. “An interesting aspect of this campaign is the comeback...

0

CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple security flaws affecting products from Zyxel, North Grid Proself, ProjectSend, and CyberPanel to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows – CVE-2024-51378 (CVSS score: 10.0) – An incorrect default permissions”}]]  – Read More  – The...

0

NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions – [email protected] (The Hacker News)

– [[{“value”:”The U.K. National Crime Agency (NCA) on Wednesday announced that it led an international investigation to disrupt Russian money laundering networks that were found to facilitate serious and organized crime across the U.K., the Middle East, Russia, and South America. The effort, codenamed Operation Destabilise, has resulted in the arrest of 84 suspects linked to two Russian-speaking networks”}]]  –...

0

White House: Chinese telecom hacks have been in motion for years – mbracken

– [[{“value”:” A White House official says the Salt Typhoon hack has impacted eight telecom companies in the United States, with dozens of other countries also affected, and has been in motion for as long as two years.  The information comes as U.S. administration officials said earlier this week that the hacking group, linked to the Chinese government, is still...

0

Federal transportation officials aim to ‘bridge gaps’ in OT cybersecurity – mbracken

– [[{“value”:” From supporting aircraft systems to ensuring railway signals don’t falter, the operational technology that underpins transportation networks across the country is critical to daily life — and highly vulnerable to threats. For Katherine Rawls, director of sector cyber engagement at the Department of Transportation, acknowledging that reality sparks various debates on how to meet those challenges head on....

0

Russian-linked Turla caught using Pakistani APT infrastructure for espionage – Greg Otto

– [[{“value”:” A Russian cyber-espionage group with ties to the country’s Federal Security Service has been caught using networks associated with a Pakistani-based APT group. This operation marks the fourth recorded incident since 2019 where the Russian group, known commonly as Turla, has embedded themselves within another threat actor’s operations. The reports, released Wednesday by Microsoft’s Threat Intelligence Center and...

0

Russia-Linked Turla Exploits Pakistani Hackers’ Servers to Target Afghan and Indian Entities – [email protected] (The Hacker News)

– [[{“value”:”The Russia-linked advanced persistent threat (APT) group known as Turla has been linked to a previously undocumented campaign that involved infiltrating the command-and-control (C2) servers of a Pakistan-based hacking group named Storm-0156 to conduct its own operations since 2022. The activity, first observed in December 2022, is the latest instance of the nation-state adversary “embedding”}]]  – Read More  –...

0

Ransomware-hit vodka maker Stoli files for bankruptcy in the United States – Graham Cluley

– [[{“value”:”Stoli Group USA, the US subsidiary of vodka maker Stoli, has filed for bankruptcy – and a ransomware attack is at least partly to blame. The American branch of Stoli, which imports and distributes Stoli brands in the United States, as well as the Kentucky Owl bourbon brand it purchased in 2017, was hit by a ransomware attack in...

0

Study shows potentially higher prevalence of spyware infections than previously thought – Tim Starks

– [[{“value”:” High-powered spyware might be more prevalent on victims’ phones than commonly believed, research out Wednesday from iVerify suggests. Devices that the mobile device security firm’s tech scanned found seven Pegasus spyware infections among 2,500 users who volunteered to participate in its investigation with a $0.99  version of its tech as an app. “Our investigation detected 2.5 infected devices...

0

U.S. Offered $10M for Hacker Just Arrested by Russia – BrianKrebs

– [[{“value”:” In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as “Wazawaka,” a cybercriminal who was deeply involved in the formation and operation of multiple ransomware groups. The U.S. government indicted Matveev as a top ransomware purveyor a year later, offering $10 million for information leading to his arrest. Last week, the Russian government reportedly arrested Matveev...

0

How Regional Service Providers Can Grab a Larger Share of the Cybersecurity Market – [email protected]

– [[{“value”:” Security leaders continue to be under intense pressure. Increasingly, they are turning toward third parties for support and expertise as their cybersecurity woes become more dire and it becomes harder to recruit and retain talent.  This is reflected in the projected growth for cybersecurity services through 20281 (managed security services, managed detection and response, security consulting, and security...

0

7 PAM Best Practices to Secure Hybrid and Multi-Cloud Environments – [email protected] (The Hacker News)

– Are you using the cloud or thinking about transitioning? Undoubtedly, multi-cloud and hybrid environments offer numerous benefits for organizations. However, the cloud’s flexibility, scalability, and efficiency come with significant risk — an expanded attack surface. The decentralization that comes with utilizing multi-cloud environments can also lead to limited visibility into user activity and  – Read More  – The Hacker...

0

Europol Dismantles Criminal Messaging Service MATRIX in Major Global Takedown – [email protected] (The Hacker News)

– [[{“value”:”Europol on Tuesday announced the takedown of an invite-only encrypted messaging service called MATRIX that’s created by criminals for criminal purposes. The joint operation, conducted by French and Dutch authorities under the moniker Passionflower, comes in the aftermath of an investigation that was launched in 2021 after the messaging service was discovered on the phone of a criminal convicted”}]] ...

0

How to Plan a New (and Improved!) Password Policy for Real-World Security Challenges – [email protected] (The Hacker News)

– Many organizations struggle with password policies that look strong on paper but fail in practice because they’re too rigid to follow, too vague to enforce, or disconnected from real security needs. Some are so tedious and complex that employees post passwords on sticky notes under keyboards, monitors, or desk drawers. Others set rules so loose they may as well...

0

Researchers Uncover Backdoor in Solana’s Popular Web3.js npm Library – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers are alerting to a software supply chain attack targeting the popular @solana/web3.js npm library that involved pushing two malicious versions capable of harvesting users’ private keys with an aim to drain their cryptocurrency wallets. The attack has been detected in versions 1.95.6 and 1.95.7. Both these versions are no longer available for download from the npm”}]]  –...

0

Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks – [email protected] (The Hacker News)

– [[{“value”:”A joint advisory issued by Australia, Canada, New Zealand, and the U.S. has warned of a broad cyber espionage campaign undertaken by People’s Republic of China (PRC)-affiliated threat actors targeting telecommunications providers. “Identified exploitations or compromises associated with these threat actors’ activity align with existing weaknesses associated with victim infrastructure; no novel”}]]  – Read More  – The Hacker News 

0

Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have called attention to a novel phishing campaign that leverages corrupted Microsoft Office documents and ZIP archives as a way to bypass email defenses. “The ongoing attack evades #antivirus software, prevents uploads to sandboxes, and bypasses Outlook’s spam filters, allowing the malicious emails to reach your inbox,” ANY.RUN said in a series of posts on X. The”}]] ...