Category: Attack Feeds

0

Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers are warning about malicious email campaigns leveraging a phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA with an aim to steal Microsoft 365 account credentials. “This campaign employs an AitM [adversary-in-the-middle] attack, allowing attackers to intercept user credentials and session cookies, which means that even users with multi-factor authentication (MFA)”}]]  – Read More  – The Hacker News 

0

U.S. Citizen Sentenced for Spying on Behalf of China’s Intelligence Agency – [email protected] (The Hacker News)

– [[{“value”:”A 59-year-old U.S. citizen who immigrated from the People’s Republic of China (PRC) has been sentenced to four years in prison for conspiring to act as a spy for the country and sharing sensitive information about his employer with China’s principal civilian intelligence agency. Ping Li, 59, of Wesley Chapel, Florida, is said to have served as a cooperative...

0

Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP – [email protected] (The Hacker News)

– [[{“value”:”Nearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some of which could be weaponized to bypass authentication and execute code with elevated privileges. “These vulnerabilities pose significant risks, allowing unauthenticated remote code execution with root privileges, thereby fully compromising the confidentiality,”}]]  – Read More  – The Hacker News 

0

Mimic ransomware: what you need to know – Graham Cluley

– [[{“value”:”What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool (“Everything” by Voidtools) to quickly locate files for encryption. Find out more about the threat in my article on the Tripwire State of Security blog.”}]]  – Read More  – Graham Cluley 

0

Personal and Company Internet Fraud – cyberpro

– [[{“value”:” The internet may have brought about some incredible benefits for society, but with it we are also seeing an uptick in crime and fraud. Threat actors hide behind a screen and attack individuals as well as corporations. They specialise in studying what works, developing sophisticated programs for financial theft, and disappearing as soon as they […] The post...

0

The Future of Serverless Security in 2025: From Logs to Runtime Protection – [email protected] (The Hacker News)

– Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of current serverless security practices often revolves around two key components: log monitoring and static analysis of code or system configuration. But here is  – Read More  – The Hacker...

0

XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm package registry by starting off as an innocuous library and later adding malicious code to steal sensitive data and mine cryptocurrency on infected systems. The package, named @0xengine/xmlrpc, was originally published on October 2, 2023 as a JavaScript-based XML-RPC”}]] ...

0

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware – [email protected] (The Hacker News)

– [[{“value”:”A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader malware campaign, infecting over 17,000 systems since at least June 2024. “Cybercriminals have been taking advantage of Godot Engine to execute crafted GDScript code which triggers malicious commands and delivers malware,” Check Point said in a new analysis published Wednesday. “The technique”}]] ...

0

U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider – [email protected] (The Hacker News)

– [[{“value”:”U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed. These intrusion attempts “originated from a wireline provider’s network that was connected to ours,” Jeff Simon, chief security officer at T-Mobile, said in a statement. “We see no instances of...

0

Smashing Security podcast #395: Gym hacking, disappearing DNA, and a social lockout – Graham Cluley

– [[{“value”:”A Kansas City man is accused of hacking into local businesses, not to steal money, but to… get a cheaper gym membership? A DNA-testing firm has vanished, leaving customers in the dark about what’s happened to their sensitive genetic data. And Australia mulls a social media ban for youngsters. All this and much much more is discussed in the...

0

Trio of South Dakota politicians set to have bigger roles on cybersecurity – Tim Starks

– [[{“value”:” Cybersecurity is set to get a decidedly South Dakotan bent in 2025. Three Republican South Dakota politicians are in line to take on more prominent roles to influence cyber policy next year: Gov. Kristi Noem is president-elect Donald Trump’s pick to lead the Homeland Security Department, Sen. Mike Rounds is poised to seize the gavel of a key...

0

Appeals court tosses sanctions on Tornado Cash crypto mixer – Greg Otto

– [[{“value”:” The U.S. Fifth Circuit Court of Appeals ruled Tuesday that the U.S. Treasury Department exceeded its legal authority when it sanctioned the cryptocurrency mixer Tornado Cash in 2022.  The court’s decision centered on whether Tornado Cash, a tool designed to anonymize cryptocurrency transactions, constitutes “property” under the International Emergency Economic Powers Act (IEEPA). A three-judge panel concluded that...

0

Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers – [email protected] (The Hacker News)

– [[{“value”:”A critical security flaw impacting the ProjectSend open-source file-sharing application has likely come under active exploitation in the wild, according to findings from VulnCheck. The vulnerability, originally patched over a year-and-a-half ago as part of a commit pushed in May 2023 , was not officially made available until August 2024 with the release of version r1720. As of November...

0

Latest Multi-Stage Attack Scenarios with Real-World Examples – [email protected] (The Hacker News)

– [[{“value”:”Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false sense of security. Knowing how they operate is the first step to building a solid defense strategy against them. Let’s examine real-world examples of some of the most common multi-stage attack scenarios that are active right now. URLs and...

0

Researchers Discover “Bootkitty” – First UEFI Bootkit Targeting Linux Kernels – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on what has been described as the first Unified Extensible Firmware Interface (UEFI) bootkit designed for Linux systems. Dubbed Bootkitty by its creators who go by the name BlackCat, the bootkit is assessed to be a proof-of-concept (PoC) and there is no evidence that it has been put to use in real-world attacks. Also...

0

APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor – [email protected] (The Hacker News)

– [[{“value”:”The threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in Japan that used a job application-themed lure to deliver the SpyGlace backdoor. That’s according to findings from JPCERT/CC, which said the intrusion leveraged legitimate services like Google Drive, Bitbucket, and StatCounter. The attack was carried out around August 2024. “In this...

0

INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled – [email protected] (The Hacker News)

– [[{“value”:”An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19 African countries and the takedown of 134,089 malicious infrastructures and networks as part of a coordinated effort to disrupt cybercrime in the continent. Dubbed Serengeti, the law enforcement exercise took place between September 2 and October 31, 2024, and targeted criminals behind ransomware, business email”}]]  –...

0

Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign – [email protected] (The Hacker News)

– [[{“value”:”A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages vulnerabilities and misconfigurations in Internet of Things (IoT) devices to co-opt them into a disruptive botnet. “This operation serves as a comprehensive one-stop shop for scanning, exploiting vulnerabilities, deploying malware, and setting up shop kits, showcasing a”}]]  – Read More  – The...

0

Hacker in Snowflake Extortions May Be a U.S. Soldier – BrianKrebs

– [[{“value”:” Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the cloud data storage company Snowflake, but a third suspect — a prolific hacker known as Kiberphant0m — remains at large and continues to publicly extort victims. However, this person’s identity may not remain a secret for long: A careful review...

0

Starbucks, UK grocers impacted by ransomware attack on Blue Yonder – Greg Otto

– [[{“value”:” A ransomware attack on supply chain management software provider Blue Yonder has impacted global operations at various companies in the United States and United Kingdom, affecting major retailers such as Starbucks and several UK-based supermarket chains.  Starbucks has reported difficulties in processing payroll and managing employee schedules due to the incident, telling the Wall Street Journal that locations...

0

African cybercrime crackdown nets more than 1,000 suspects – Tim Starks

– [[{“value”:” An international law enforcement operation has ensnared more than 1,000 cybercrime suspects in a crackdown that spanned 19 African countries over two months, Interpol and Afripol announced Tuesday. Dubbed Operation Serengeti, it targeted a wide range of cybercrime activity, with the law enforcement agencies saying it linked the criminals to 35,000 victims and $193 million worth of losses....

0

The AI Fix #26: Would AI kill sentient robots, and is water wet? – Graham Cluley

– [[{“value”:”In episode 26 of The AI Fix, an AI does surgery on pork chops, holographic Jesus wants your consent to use cookies, Mark opens the pod bay doors, our hosts discover OpenAI’s couch potato health coach, and Graham finds a robot made of drain pipes. Graham pits Mark against an AI in a morality quiz that asks “would you...

0

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks – [email protected] (The Hacker News)

– [[{“value”:”Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution. The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry a CVSS score of 9.8 out of a maximum of 10.0. They were addressed in versions”}]]  – Read...

0

Tips and Tools for Social Media Safety – Uzair Amir

– Protect your social media presence with tools like privacy checkups, monitoring services, and digital footprint scanners. Stay secure by avoiding oversharing, limiting third-party app permissions, and using strong passwords.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats – [email protected] (The Hacker News)

– [[{“value”:”When CVEs go viral, separating critical vulnerabilities from the noise is essential to protecting your organization. That’s why Intruder, a leader in attack surface management, built Intel – a free vulnerability intelligence platform designed to help you act fast and prioritize real threats. What is Intel? Intel was created to fill a gap in the resources available for tracking...

0

Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries – [email protected] (The Hacker News)

– [[{“value”:”The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER as part of its attacks targeting Southeast Asian telecommunications companies.  Trend Micro, which described the hacking group as an aggressive advanced persistent threat (APT), said the intrusions also involved the use of another cross-platform backdoor dubbed”}]]  – Read More  – The...

0

Here’s how simple it is for script kiddies to stand up DDoS services – Christian Vasquez

– [[{“value”:” A new report from Aqua Security highlights just how easy it is for an amateur-level hacker to set up malicious services that could in turn be weaponized by much-more skillful threat actors in the future. The cloud security company detailed in a report released Tuesday an operation to sell access to distributed denial-of-service (DDoS) tools  on Telegram which...

0

RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks – [email protected] (The Hacker News)

– [[{“value”:”The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation of two security flaws, one in Mozilla Firefox and the other in Microsoft Windows, as part of attacks designed to deliver the eponymous backdoor on victim systems. “In a successful attack, if a victim browses a web page containing the exploit, an adversary can run...

0

CISA Urges Agencies to Patch Critical “Array Networks” Flaw Amid Active Attacks – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched critical security flaw impacting Array Networks AG and vxAG secure access gateways to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, tracked as CVE-2023-28461 (CVSS score: 9.8), concerns a case of missing authentication that”}]]  – Read More  –...

0

Malware linked to Salt Typhoon used to hack telcos around the world – Greg Otto

– [[{“value”:” Those with firsthand knowledge of Salt Typhoon’s hack of several U.S. telecommunications companies have called the group’s actions some of the most sophisticated cyber-espionage efforts they have ever seen. A prominent security vendor may have unearthed some malware that shows why.  Trend Micro released a report Monday that gives details on the tactics, techniques and procedures used by...

0

PyPI Python Library “aiocpa” Found Exfiltrating Crypto Keys via Telegram Bot – [email protected] (The Hacker News)

– [[{“value”:”The administrators of the Python Package Index (PyPI) repository have quarantined the package “aiocpa” following a new update that included malicious code to exfiltrate private keys via Telegram. The package in question is described as a synchronous and asynchronous Crypto Pay API client. The package, originally released in September 2024, has been downloaded 12,100 times to date. By putting...

0

Google’s New Restore Credentials Tool Simplifies App Login After Android Migration – [email protected] (The Hacker News)

– [[{“value”:”Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps securely after migrating to a new Android device. Part of Android’s Credential Manager API, the feature aims to reduce the hassle of re-entering the login credentials for every app during the handset replacement. “With Restore Credentials, apps can seamlessly onboard”}]] ...