Category: Attack Feeds

LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers – [email protected] (The Hacker News)

– [[{“value”:”A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol (LDAP) that could trigger a denial-of-service (DoS) condition. The out-of-bounds reads vulnerability is tracked as CVE-2024-49113 (CVSS score: 7.5). It was addressed by Microsoft as part of Patch Tuesday updates for December 2024, alongside CVE-2024-49112 (“}]]  – Read More  – The...

Critical Deadline: Update Old .NET Domains Before January 7, 2025 to Avoid Service Disruption – [email protected] (The Hacker News)

– [[{“value”:”Microsoft has announced that it’s making an “unexpected change” to the way .NET installers and archives are distributed, requiring developers to update their production and DevOps infrastructure. “We expect that most users will not be directly affected, however, it is critical that you validate if you are affected and to watch for downtime or other kinds of breakage,” Richard...

Apple to Pay Siri Users $20 Per Device in Settlement Over Accidental Siri Privacy Violations – [email protected] (The Hacker News)

– [[{“value”:”Apple has agreed to pay $95 million to settle a proposed class action lawsuit that accused the iPhone maker of invading users’ privacy using its voice-activated Siri assistant. The development was first reported by Reuters. The settlement applies to U.S.-based individuals current or former owners or purchasers of a Siri-enabled device who had their confidential voice communications with the”}]] ...

Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API – [email protected] (The Hacker News)

– [[{“value”:”Details have emerged about three now-patched security vulnerabilities in Dynamics 365 and Power Apps Web API that could result in data exposure. The flaws, discovered by Melbourne-based cybersecurity company Stratus Security, have been addressed as of May 2024. Two of the three shortcomings reside in Power Platform’s OData Web API Filter, while the third vulnerability is rooted in the...

The AI Fix #31: Replay: AI doesn’t exist – Graham Cluley

– [[{“value”:”Mark and I took a break for the new year, but we’ll be back for a new episode of “The AI Fix” podcast at the usual time next week. In the meantime, here is another chance to hear one of our favourite episodes again. The very first episode from April 2024… Graham attempts to convince Mark that AI doesn’t,...

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them – [email protected] (The Hacker News)

– In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains – including endpoints, identity systems and cloud environments – so the adversary can infiltrate organizations, move laterally and evade detection. eCrime groups like SCATTERED SPIDER and North Korea-nexus adversaries such as FAMOUS  – Read More  –...

Three Russian-German Nationals Charged with Espionage for Russian Secret Service – [email protected] (The Hacker News)

– [[{“value”:”German prosecutors have charged three Russian-German nationals for acting as secret service agents for Russia. The individuals, named Dieter S., Alexander J., and Alex D., have been accused of working for a foreign secret service. Dieter S. is also alleged to have participated in sabotage operations as well as taking pictures of military installations with an aim to endanger...

Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a malicious package on the npm package registry that masquerades as a library for detecting vulnerabilities in Ethereum smart contracts but, in reality, drops an open-source remote access trojan called Quasar RAT onto developer systems. The heavily obfuscated package, named ethereumvulncontracthandler, was published to npm on December 18, 2024, by a user”}]]  – Read More ...

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites – [email protected] (The Hacker News)

– [[{“value”:”Threat hunters have disclosed a new “widespread timing-based vulnerability class” that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites. The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo. “Instead of relying on a single click, it takes advantage of a double-click sequence,” Yibelo said.”}]]  – Read More  – The...

Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Tuesday leveled sanctions against two entities in Iran and Russia for their attempts to interfere with the November 2024 presidential election. The federal agency said the entities – a subordinate organization of Iran’s Islamic Revolutionary Guard Corps and a Moscow-based affiliate of Russia’s Main Intelligence”}]]  – Read More ...

US sanctions Russian, Iranian groups for election interference – djohnson

– [[{“value”:” The U.S. State Department has sanctioned two foreign organizations and one individual who it alleges worked on behalf of Russian and Iranian intelligence agencies to interfere in the 2024 U.S. general election. “These actors sought to stoke sociopolitical tensions and undermine our election institutions during the 2024 U.S. general election,” said State Department Press Secretary Matthew Miller in...

After UN adoption, controversial cybercrime treaty’s next steps could prove vital – Tim Starks

– [[{“value”:” A divisive United Nations cybercrime treaty — one that critics say is a huge danger to human rights and that the United States cautiously agreed to advance — is now in the hands of member nations. The U.N. General Assembly adopted the treaty without a vote last week, leaving ratification to individual states. If the past is any...

New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Department of Justice (DoJ) has issued a final rule carrying out Executive Order (EO) 14117, which prevents mass transfer of citizens’ personal data to countries of concern such as China (including Hong Kong and Macau), Cuba, Iran, North Korea, Russia, and Venezuela. “This final rule is a crucial step forward in addressing the extraordinary national security threat...

Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents – [email protected] (The Hacker News)

– [[{“value”:”The United States Treasury Department said it suffered a “major cybersecurity incident” that allowed suspected Chinese threat actors to remotely access some computers and unclassified documents.  “On December 8, 2024, Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key used by the vendor to secure a cloud-based”}]]  –...

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have uncovered three security weaknesses in Microsoft’s Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment. “Exploiting these flaws could allow attackers to gain persistent access as shadow administrators”}]]  – Read More  – The Hacker News 

U.S. Army Soldier Arrested in AT&T, Verizon Extortions – BrianKrebs

– [[{“value”:” Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South Korea. One of...

Treasury workstations hacked by China-linked threat actors – djohnson

– [[{“value”:” The Department of Treasury was notified earlier this month that several of its workstations were hacked by a group believed to be linked to China, the department confirmed to CyberScoop. According to a letter sent Monday to leaders on the Senate Committee on Banking, Housing and Urban Affairs and obtained by CyberScoop, the compromises occurred through third-party software...

Thousands of industrial routers vulnerable to command injection flaw  – djohnson

– [[{“value”:” Thousands of industrial routers from a Chinese telecommunications equipment manufacturer are vulnerable to a post-authentication vulnerability, with indications it is already being exploited in the wild to infect devices with Mirai malware. On Dec. 27, VulnCheck detailed the vulnerability, tracked as CVE-2024-12856, wherein an attacker can leverage default credentials in Four-Faith F3x24 and F3x36 routers to remotely inject...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips – [email protected] (The Hacker News)

– [[{“value”:”Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it’s a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting yourself and your organization. In this week’s update, we’ll cover the...

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits – [email protected] (The Hacker News)

– [[{“value”:”The United States Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients’ data against potential cyber attacks. The proposal, which seeks to modify the Health Insurance Portability and Accountability Act (HIPAA) of 1996, is part of a broader initiative to bolster the”}]] ...

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions – [email protected] (The Hacker News)

– News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials. Currently, over 25 extensions, with an install base of over two million users, have been found to be compromised, and customers are now working to figure out their exposure (LayerX, one of the...

Happy 15th Anniversary, KrebsOnSecurity! – BrianKrebs

– [[{“value”:” Image: Shutterstock, Dreamansions. KrebsOnSecurity.com turns 15 years old today! Maybe it’s indelicate to celebrate the birthday of a cybercrime blog that mostly publishes bad news, but happily many of 2024’s most engrossing security stories were about bad things happening to bad guys. It’s also an occasion to note that despite my publishing fewer stories than ever this past...

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft – [email protected] (The Hacker News)

– [[{“value”:”A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft. The attack targeted publishers of browser extensions on the Chrome Web Store via a phishing campaign and used their access permissions to insert malicious code into legitimate extensions in order...

Secure Gaming During the Holidays – Owais Sultan

– Secure Gaming during holidays is essential as cyberattacks rise by 50%. Protect accounts with 2FA, avoid fake promotions,…  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

Stalking via social media aka Cyberstalking – cyberpro

– [[{“value”:” Stalking via Social Media aka Cyberstalking The mere term “stalking” usually sends a chill down the spine. While in-person stalking might be scary, cyberstalking via social media takes on a whole new problematic level. The internet has given people a far too relaxed attitude regarding sharing personal information and this opens the doors for those […] The post...

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials – [email protected] (The Hacker News)

– [[{“value”:”A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to new findings from VulnCheck. The vulnerability, tracked as CVE-2024-12856 (CVSS score: 7.2), has been described as an operating system (OS) command injection bug affecting router models F3x24 and F3x36. The severity of the shortcoming is lower due to the fact that it...

White House: Salt Typhoon hacks possible because telecoms lacked basic security measures – Greg Otto

– [[{“value”:” The White House said Friday that as the U.S. government continues to assess the damage caused by the Salt Typhoon hacks, the breach occurred in large part due to telecommunications companies failing to implement rudimentary cybersecurity measures across their IT infrastructure.  Anne Neuberger, the White House’s deputy national security adviser for cyber and emerging technology, told reporters Friday...

North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign – [email protected] (The Hacker News)

– [[{“value”:”North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie. Contagious Interview (aka DeceptiveDevelopment) refers to a persistent attack campaign that employs social engineering lures, with the hacking crew often posing as recruiters to trick individuals looking for potential job opportunities into”}]]  – Read More  – The Hacker News 

Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia – [email protected] (The Hacker News)

– [[{“value”:”The threat actor known as Cloud Atlas has been observed using a previously undocumented malware called VBCloud as part of its cyber attack campaigns targeting “several dozen users” in 2024. “Victims get infected via phishing emails containing a malicious document that exploits a vulnerability in the formula editor (CVE-2018-0802) to download and execute malware code,” Kaspersky researcher Oleg”}]]  –...

FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers are warning about a spike in malicious activity that involves roping vulnerable D-Link routers into two different botnets, a Mirai variant dubbed FICORA and a Kaiten (aka Tsunami) variant called CAPSAICIN. “These botnets are frequently spread through documented D-Link vulnerabilities that allow remote attackers to execute malicious commands via a GetDeviceSettings”}]]  – Read More  – The Hacker...

Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately – [email protected] (The Hacker News)

– [[{“value”:”Palo Alto Networks has disclosed a high-severity vulnerability impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices. The flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), impacts PAN-OS versions 10.X and 11.X, as well as Prisma Access running PAN-OS versions. It has been addressed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS”}]]  – Read More  –...

Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe Serialization – [email protected] (The Hacker News)

– [[{“value”:”The Apache Software Foundation (ASF) has released patches to address a maximum severity vulnerability in the MINA Java network application framework that could result in remote code execution under specific conditions. Tracked as CVE-2024-52046, the vulnerability carries a CVSS score of 10.0. It affects versions 2.0.X, 2.1.X, and 2.2.X. “The ObjectSerializationDecoder in Apache MINA uses Java’s”}]]  – Read More ...

South Korea sanctions 15 North Koreans for IT worker scams, financial hacking schemes – djohnson

– [[{“value”:” The South Korean government has sanctioned more than a dozen individuals and one organization for a wide-ranging global scheme to fund North Korea’s nuclear and missile programs through impersonating IT workers abroad, stealing cryptocurrency and facilitating cyberattacks. South Korean officials on Thursday identified 15 North Korean nationals and the Chosun Geumjeong Economic Information Technology Exchange Corporation for economic...

Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts – [email protected] (The Hacker News)

– [[{“value”:”A Brazilian citizen has been charged in the United States for allegedly threatening to release data stolen by hacking into a company’s network in March 2020. Junior Barros De Oliveira, 29, of Curitiba, Brazil has been charged with four counts of extortionate threats involving information obtained from protected computers and four counts of threatening communications, the U.S. Department of”}]] ...