Category: Attack Feeds

0

PyPI Python Library “aiocpa” Found Exfiltrating Crypto Keys via Telegram Bot – [email protected] (The Hacker News)

– [[{“value”:”The administrators of the Python Package Index (PyPI) repository have quarantined the package “aiocpa” following a new update that included malicious code to exfiltrate private keys via Telegram. The package in question is described as a synchronous and asynchronous Crypto Pay API client. The package, originally released in September 2024, has been downloaded 12,100 times to date. By putting...

0

Google’s New Restore Credentials Tool Simplifies App Login After Android Migration – [email protected] (The Hacker News)

– [[{“value”:”Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps securely after migrating to a new Android device. Part of Android’s Credential Manager API, the feature aims to reduce the hassle of re-entering the login credentials for every app during the handset replacement. “With Restore Credentials, apps can seamlessly onboard”}]] ...

0

An opportunity for Trump’s deregulation journey: Cybersecurity harmonization – Greg Otto

– [[{“value”:” President-elect Donald Trump’s push for deregulation was a hallmark of his first administration — and he has vowed to not only continue it but take it further.  What started as removing two regulations for each new one has increased to removing 10 for every new one. There’s also a plan to create a new Department of Government Efficiency...

0

Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed two new attack techniques against infrastructure-as-code (IaC) and policy-as-code (PaC) tools like HashiCorp’s Terraform and Open Policy Agent (OPA) that leverage dedicated, domain-specific languages (DSLs) to breach cloud platforms and exfiltrate data. “Since these are hardened languages with limited capabilities, they’re supposed to be more secure than”}]]  – Read More  – The Hacker News 

0

Flying Under the Radar – Security Evasion Techniques – [email protected] (The Hacker News)

– [[{“value”:”Dive into the evolution of phishing and malware evasion techniques and understand how attackers are using increasingly sophisticated methods to bypass security measures. The Evolution of Phishing Attacks “I really like the saying that ‘This is out of scope’ said no hacker ever. Whether it’s tricks, techniques or technologies, hackers will do anything to evade detection and make sure...

0

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 – Nov 24) – [email protected] (The Hacker News)

– [[{“value”:”We hear terms like “state-sponsored attacks” and “critical vulnerabilities” all the time, but what’s really going on behind those words? This week’s cybersecurity news isn’t just about hackers and headlines—it’s about how digital risks shape our lives in ways we might not even realize. For instance, telecom networks being breached isn’t just about stolen data—it’s about power. Hackers are”}]] ...

0

Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called Bring Your Own Vulnerable Driver (BYOVD) to disarm security protections and ultimately gain access to the infected system. “This malware takes a more sinister route: it drops a legitimate Avast Anti-Rootkit driver (aswArPot.sys) and manipulates it to carry out its destructive agenda,” Trellix”}]]  – Read More ...

0

North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn – [email protected] (The Hacker News)

– [[{“value”:”The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million worth of cryptocurrency as part of social engineering campaigns orchestrated over a six-month period. These findings come from Microsoft, which said that multiple threat activity clusters with ties to the country have been observed creating fake profiles on LinkedIn, posing as...

0

Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites – [email protected] (The Hacker News)

– [[{“value”:”Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since at least January 2024, has also conducted cyber attacks against the Defense Industrial Base (DIB), aviation, telecommunications, and financial and legal services across the world, Microsoft said.”}]]  – Read...

0

Stronger cyber protections in health care targeted in new Senate bill – mbracken

– [[{“value”:” Protecting Americans’ health data and strengthening cybersecurity protections throughout the health care sector is the focus of a bill introduced Friday from a bipartisan quartet of Senate lawmakers. The Health Care Cybersecurity and Resiliency Act of 2024 (S.5390) is the culmination of a yearlong effort from Sens. Bill Cassidy, R-La., Maggie Hassan, D-N.H., John Cornyn, R-Texas, and Mark...

0

China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign – [email protected] (The Hacker News)

– [[{“value”:”A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage campaign designed to facilitate the delivery of the Cobalt Strike post-exploitation toolkit for follow-on information collection. “The attackers embedded malicious JavaScript in these sites, which spoofed a TLS certificate error to trick visitors into downloading a”}]]  – Read More  – The Hacker...

0

APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware – [email protected] (The Hacker News)

– [[{“value”:”The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called Asynshell. The attack campaign is said to have used Hajj-themed lures to trick victims into executing a malicious payload under the guise of a Microsoft Compiled HTML Help (CHM) file, the Knownsec 404 team said in an analysis published today. Mysterious Elephant,...

0

Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data? – [email protected] (The Hacker News)

– [[{“value”:”Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email, cloud storage and collaboration tools. This single-platform approach makes it easy for teams to connect and work efficiently, no matter where they are, enabling seamless digital transformation that’s both scalable and adaptable. As companies shift from traditional,”}]]  – Read More  – The...

0

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia – [email protected] (The Hacker News)

– [[{“value”:”Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe. Recorded Future’s Insikt Group, which has assigned the activity cluster the name TAG-110, said it overlaps with a threat group tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as UAC-0063, which, in turn,...

0

Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks – [email protected] (The Hacker News)

– [[{“value”:”Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services that enable scams, fraud, and phishing attacks. To that end, Microsoft’s Digital Crimes Unit (DCU) said it seized 240 fraudulent websites associated with an Egypt-based cybercrime facilitator named Abanoub Nady (aka MRxC0DER and mrxc0derii), who”}]]  – Read More  –...

0

DSPM vs CSPM: Key Differences and Their Roles in Data Protection – [email protected]

– [[{“value”:” It’s becoming increasingly challenging to secure sensitive data. Cybercriminals are becoming more sophisticated, IT infrastructure is becoming more complex, and attack surfaces are increasing. With so much data now stored off-premises, organizations must protect not only their sensitive information but also the platforms that house it. This is where data security posture management (DPSM) and cloud security posture...

0

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver an information stealer called JarkaStealer. The packages, named gptplus and claudeai-eng, were uploaded by a user named “Xeroline” in November 2023, attracting”}]]  – Read More  – The Hacker News 

0

Feds Charge Five Men in ‘Scattered Spider’ Roundup – BrianKrebs

– [[{“value”:” Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass, MailChimp, Okta, T-Mobile and Twilio. A visual depiction of the attacks by the SMS phishing group known as Scattered Spider,...

0

Microsoft seizes websites tied to Egypt-based DIY phishing kit-maker – Tim Starks

– [[{“value”:” Microsoft obtained a court order allowing it to seize 240 websites it says are linked to an Egypt-based seller of do-it-yourself phishing kits used to break into the tech giant’s user accounts, the company said Thursday. The kit-maker, Abanoub Nady — known online as MRxC0DER — used the brand name ONNX to sell the services, the trademark name...

0

750,000 patients’ medical records exposed after data breach at French hospital – Graham Cluley

– [[{“value”:”A hacker calling themselves “nears” claims to have compromised the systems of multiple healthcare facilities across France, claiming to have gained access to the records of over 1.5 million people. Read more in my article on the Tripwire State of Security blog.”}]]  – Read More  – Graham Cluley 

0

Meta cracks down on millions of accounts it tied to pig-butchering scams – Tim Starks

– [[{“value”:” Facebook and Instagram parent company Meta has taken down millions of accounts this year linked to overseas scam centers that enable a kind of cyber-related, fast-growing fraud known as “pig butchering,” the social media giant said Thursday. The account takedowns are part of a multifaceted Meta strategy to combat scams that have cost U.S. victims billions of dollars...

0

Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor – [email protected] (The Hacker News)

– [[{“value”:”The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane as part of cyber attacks likely targeting East and Southeast Asia. That’s according to findings from cybersecurity firm ESET based on multiple Linux samples uploaded to the VirusTotal platform from Taiwan, the Philippines, and Singapore in March 2023.”}]]  –...

0

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign – [email protected] (The Hacker News)

– [[{“value”:”As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active exploitation in the wild. According to statistics shared by the Shadowserver Foundation, a majority of the infections have been reported in the U.S. (554) and India (461), followed by...

0

Looking at the Attack Surfaces of the Kenwood DMX958XR IVI – Connor Ford

– In our previous Kenwood DMX958XR blog post, we detailed the internals of the Kenwood in-vehicle infotainment (IVI) head unit and provided annotated pictures of each PCB. In this post, we aim to outline the attack surface of the DMX958XR in the hopes of providing inspiration for vulnerability research. We will cover the main supported technologies that present potential attack...

Privacy-focused mobile phone launches for high-risk individuals – Christian Vasquez

– [[{“value”:” Chinese hackers, cybercriminals, law enforcement agencies, and phone phreaks of yesteryear have all successfully accessed mobile phones along with the trove of data collected by the devices. But the mobile company Cape is looking to change the privacy game with a hardened phone that doesn’t keep metadata, while also adhering to the strict U.S. criminal and national security...

10 Most Impactful PAM Use Cases for Enhancing Organizational Security – [email protected] (The Hacker News)

– [[{“value”:”Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain tighter control over privileged access, achieve regulatory compliance, and reduce the burden on your IT team.  As an established provider of a PAM solution, we’ve witnessed firsthand how PAM transforms organizational security. In”}]]  – Read More ...

Cyber Story Time: The Boy Who Cried “Secure!” – [email protected] (The Hacker News)

– As a relatively new security category, many security operators and executives I’ve met have asked us “What are these Automated Security Validation (ASV) tools?” We’ve covered that pretty extensively in the past, so today, instead of covering the “What is ASV?” I wanted to address the “Why ASV?” question. In this article, we’ll cover some common use cases and...

North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs – [email protected] (The Hacker News)

– [[{“value”:”Threat actors with ties to the Democratic People’s Republic of Korea (DPRK) are impersonating U.S.-based software and technology consulting businesses in order to further their financial objectives as part of a broader information technology (IT) worker scheme. “Front companies, often based in China, Russia, Southeast Asia, and Africa, play a key role in masking the workers’ true origins and”}]] ...

Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online – [email protected] (The Hacker News)

– [[{“value”:”New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries, with the U.S. alone accounting for over one-third of the total exposures. The analysis, which comes from attack surface management company Censys, found that 38% of the devices are located in North America, 35.4% in Europe, 22.9% in Asia, 1.7% in Oceania, 1.2% in...

5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme – [email protected] (The Hacker News)

– [[{“value”:”Five alleged members of the infamous Scattered Spider cybercrime crew have been indicted in the U.S. for targeting employees of companies across the country using social engineering techniques to harvest credentials and using them to gain unauthorized access to sensitive data and break into crypto accounts to steal digital assets worth millions of dollars. All of the accused parties...

Google’s AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects – [email protected] (The Hacker News)

– [[{“value”:”Google has revealed that its AI-powered fuzzing tool, OSS-Fuzz, has been used to help identify 26 vulnerabilities in various open-source code repositories, including a medium-severity flaw in the OpenSSL cryptographic library. “These particular vulnerabilities represent a milestone for automated vulnerability finding: each was found with AI, using AI-generated and enhanced fuzz targets,””}]]  – Read More  – The Hacker News 

Stories from the SOC: Registry Clues to PDF Blues: A Tale of PUA Persistence – [email protected]

– [[{“value”:” Executive Summary Establishing persistence on a system allows a threat actor continued access or process execution across system restarts or other changes. For this reason, monitoring for and investigating persistence indicators are key components of any robust cybersecurity platform. Two common persistence techniques are using AutoStart Execution of programs during system boot or logon (T1547) and abusing scheduled...

NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data – [email protected] (The Hacker News)

– [[{“value”:”Threat hunters are warning about an updated version of the Python-based NodeStealer that’s now equipped to extract more information from victims’ Facebook Ads Manager accounts and harvest credit card data stored in web browsers. “They collect budget details of Facebook Ads Manager accounts of their victims, which might be a gateway for Facebook malvertisement,” Netskope Threat Labs researcher”}]]  –...

Smashing Security podcast #394: Digital arrest scams and stream-jacking – Graham Cluley

– [[{“value”:”In our latest episode we discuss how a woman hid under the bed after scammers told her she was under “digital arrest”, how hackers are hijacking YouTube channels through malicious sponsorship deals, and how one phone company is turning the tables on fraudsters through deepfake AI. All this and much more is discussed in the latest edition of the...