Category: Attack Feeds

New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have uncovered a never-before-seen botnet comprising an army of small office/home office (SOHO) and IoT devices that are likely operated by a Chinese nation-state threat actor called Flax Typhoon (aka Ethereal Panda or RedJuliett). The sophisticated botnet, dubbed Raptor Train by Lumen’s Black Lotus Labs, is believed to have been operational since at least May 2020,”}]]  –...

Chinese Engineer Charged in U.S. for Years-Long Cyber Espionage Targeting NASA and Military – [email protected] (The Hacker News)

– [[{“value”:”A Chinese national has been indicted in the U.S. on charges of conducting a “multi-year” spear-phishing campaign to obtain unauthorized access to computer software and source code created by the National Aeronautics and Space Administration (NASA), research universities, and private companies. Song Wu, 39, has been charged with 14 counts of wire fraud and 14 counts of aggravated identity...

FBI joint operation takes down massive Chinese botnet, Wray says – mbracken

– [[{“value”:” The FBI conducted a joint operation last week to take down a massive Chinese state-sponsored botnet that the attackers used to compromise hundreds of thousands of devices, target U.S. and overseas critical infrastructure and steal data, Director Chris Wray said Wednesday.  The group behind the botnet, Flax Typhoon, hijacked routers and Internet of Things devices like cameras, video...

Scam ‘Funeral Streaming’ Groups Thrive on Facebook – BrianKrebs

– [[{“value”:” Scammers are flooding Facebook with groups that purport to offer video streaming of funeral services for the recently deceased. Friends and family who follow the links for the streaming services are then asked to cough up their credit card information. Recently, these scammers have branched out into offering fake streaming services for nearly any kind of event advertised...

Newmark initiative will bring online a network of civil defense hackers – Christian Vasquez

– [[{“value”:” Nearly 30 years ago, Craigslist brought the digital bazaar to the average person who had little idea how to trade on the net. Now, the founder of the classified ads website is looking to bring cybersecurity to the average person who has little idea how to stop hackers. At the Aspen Cyber Summit in Washington, D.C. on Wednesday,...

Why Pay A Pentester? – [email protected] (The Hacker News)

– The evolution of software always catches us by surprise. I remember betting against the IBM computer Deep Blue during its chess match against the grandmaster Garry Kasparov in 1997, only to be stunned when the machine claimed victory. Fast forward to today, would we have imagined just three years ago that a chatbot could write essays, handle customer support...

North Korean Hackers Target Energy and Aerospace Industries with New MISTPEN Malware – [email protected] (The Hacker News)

– [[{“value”:”A North Korea-linked cyber-espionage group has been observed leveraging job-themed phishing lures to target prospective victims in energy and aerospace verticals and infect them with a previously undocumented backdoor dubbed MISTPEN. The activity cluster is being tracked by Google-owned Mandiant under the moniker UNC2970, which it said overlaps with a threat group known as TEMP.Hermit, which is”}]]  – Read...

Introducing LevelBlue’s 24/7 Managed Threat Detection and Response Service for Government   – [email protected]

– [[{“value”:” As new threat vectors emerge and cybercriminals leverage sophisticated technologies to orchestrate more targeted attacks, staying ahead of threats is more challenging than ever. We are excited to announce the launch of a new managed security service designed to protect highly regulated data and help ensure critical services are efficiently delivered.  LevelBlue Managed Threat Detection and Response for...

Deterrence in cyberspace is possible — and ‘urgent’ — amid ‘alarming’ hybrid attacks, State cyber ambassador says – Tim Starks

– [[{“value”:” A narrative once took root in part of the security community that deterrence doesn’t apply in cyberspace, Nate Fick, America’s first cyber ambassador, said in an interview Tuesday. “I have to disagree with that pretty fundamentally,” he told CyberScoop. Deterrence is a subject Fick has been talking about ever since he was nominated to serve as the State...

Chrome Introduces One-Time Permissions and Enhanced Safety Check for Safer Browsing – [email protected] (The Hacker News)

– [[{“value”:”Google has announced that it’s rolling out a new set of features to its Chrome browser that gives users more control over their data when surfing the internet and protects against online threats. “With the newest version of Chrome, you can take advantage of our upgraded Safety Check, opt out of unwanted website notifications more easily and grant select...

GSMA Plans End-to-End Encryption for Cross-Platform RCS Messaging – [email protected] (The Hacker News)

– [[{“value”:”The GSM Association, the governing body that oversees the development of the Rich Communications Services (RCS) protocol, on Tuesday, said it’s working towards implementing end-to-end encryption (E2EE) to secure messages sent between the Android and iOS ecosystems. “The next major milestone is for the RCS Universal Profile to add important user protections such as interoperable end-to-end”}]]  – Read More ...

Patch Issued for Critical VMware vCenter Flaw Allowing Remote Code Execution – [email protected] (The Hacker News)

– [[{“value”:”Broadcom on Tuesday released updates to address a critical security flaw impacting VMware vCenter Server that could pave the way for remote code execution. The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), has been described as a heap-overflow vulnerability in the DCE/RPC protocol. “A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a”}]] ...

AT&T agrees to $13 million fine for third-party cloud breach – djohnson

– [[{“value”:” The Federal Communications Commission has reached a $13 million settlement with AT&T over a January 2023 data breach that was traced to one of its third-party cloud vendors.   The breach, which resulted in the theft of information related to more than 8.9 million AT&T Mobility customers, happened through an unnamed company the telecom giant used for marketing, billing...

Russian threat groups shift attention to Harris-Walz campaign, researchers find – Tim Starks

– [[{“value”:” It took a little while for Russian influence operation peddlers to shift their attention from the Biden campaign to the Harris campaign, Microsoft said in a report published Tuesday, but now Kremlin-affiliated groups are ratcheting up fake videos about the Democratic presidential ticket. In late August and September, the Microsoft Threat Analysis Center observed two separate Russian groups...

The AI Fix #16: GPT-4o1, AI time travelers, and where’s my driverless car? – Graham Cluley

– [[{“value”:”In episode 16 of The AI Fix, Mark and Graham meet GPT-4o1 and ask if it knows how many cousins Alice’s sister has, a top cop wants AI injected into his colleagues “like heroin”, Mark finds an AI that might actually be able to help with that, and our hosts start a conspiracy theory about an AI that stops...

Meta to Train AI Models Using Public U.K. Facebook and Instagram Posts – [email protected] (The Hacker News)

– [[{“value”:”Meta has announced that it will begin training its artificial intelligence (AI) systems using public content shared by adult users across Facebook and Instagram in the U.K. in the coming months. “This means that our generative AI models will reflect British culture, history, and idiom, and that UK companies and institutions will be able to utilize the latest technology,”...

U.S. Treasury Sanctions Executives Linked to Intellexa Predator Spyware Operation – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Department of Treasury has imposed fresh sanctions against five executives and one entity with ties to the Intellexa Consortium for their role in the development, operation, and distribution of a commercial spyware called Predator. “The United States will not tolerate the reckless propagation of disruptive technologies that threatens our national security and undermines the privacy and”}]]  –...

Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense – [email protected] (The Hacker News)

– [[{“value”:”Google has announced that it will be switching from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts to defend against the risk posed by cryptographically relevant quantum computers (CRQCs). “Chrome will offer a key share prediction for hybrid ML-KEM (codepoint 0x11EC),” David Adrian, David Benjamin, Bob Beck, and Devon O’Brien of the Chrome...

How to Investigate ChatGPT activity in Google Workspace – [email protected] (The Hacker News)

– Since launching ChatGPT in 2022, OpenAI has defied expectations with a steady stream of product announcements and enhancements. One such announcement came on May 16, 2024, and for most consumers, it probably felt innocuous. Titled “Improvements to data analysis in ChatGPT,” the post outlines how users can add files directly from Google Drive and Microsoft OneDrive. It’s worth mentioning  –...

Physical Security In The Age Of Digital: Access Control System Vulnerabilities – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Access control systems are the physical form of the layers of data, credential and identity controls underpinning the systems relied on every day. Yet, they can...

Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users – [email protected] (The Hacker News)

– [[{“value”:”Cryptocurrency exchange Binance is warning of an “ongoing” global threat that’s targeting cryptocurrency users with clipper malware with the goal of facilitating financial fraud. Clipper malware, also called ClipBankers, is a type of malware that Microsoft calls cryware, which comes with capabilities to monitor a victim’s clipboard activity and steal sensitive data a user copies, including”}]]  – Read More ...

SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks – [email protected] (The Hacker News)

– [[{“value”:”SolarWinds has released fixes to address two security flaws in its Access Rights Manager (ARM) software, including a critical vulnerability that could result in remote code execution. The vulnerability, tracked as CVE-2024-28991, is rated 9.0 out of a maximum of 10.0 on the CVSS scoring system. It has been described as an instance of deserialization of untrusted data. “SolarWinds...

House Dem urges FCC to press ahead with disclosure rule around AI in political ads – djohnson

– [[{“value”:” The top Democrat on the House Administration Committee is signaling “strong support” for the Federal Communications Commission’s ongoing efforts to mandate disclosure of AI use in political ads, emphasizing transparency as essential as lawmakers assess how to regulate the technology in the future. In July, the FCC proposed a new regulation that would require broadcasters to disclose when...

Ransomware group releases screenshots in attempted extortion of Port of Seattle – AJ Vicens

– [[{“value”:” The cybercriminals responsible for the attempted extortion of the Port of Seattle posted on Monday a 100-bitcoin ransom demand and images of purported documents stolen from the organization. The images include what appears to be a scanned U.S. passport, tax identification forms with Social Security numbers and other personal identifiable information. The group is also demanding 100 bitcoin...

Treasury hits Predator spyware makers with more sanctions – Tim Starks

– [[{“value”:” The Treasury Department announced sanctions Monday on the Intellexa Consortium, a corporate entity responsible for developing and marketing the notorious Predator spyware. The sanctions target five individuals and one corporate entity that the U.S. government says were responsible for the spyware’s proliferation. They are in addition to the sanctions issued in March, when the Treasury Department said Predator...

Tackling the Unique Cybersecurity Challenges of Online Learning Platforms – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Online learning has expanded access to education across all levels. However, as beneficial as these platforms can be, they pose unique cybersecurity risks. Securing e-learning platforms...

North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers are continuing to warn about North Korean threat actors’ attempts to target prospective victims on LinkedIn to deliver malware called RustDoor. The latest advisory comes from Jamf Threat Labs, which said it spotted an attack attempt in which a user was contacted on the professional social network by claiming to be a recruiter for a legitimate decentralized”}]] ...

The Dangers of False Social Media Accounts – cyberpro

– [[{“value”:” Stalking, Bullying, Spread of Misinformation Social media platforms have become the “go to” place for too many seeking information.While platforms such as Instagram, TikTok, Facebook, and X (formerly Twitter) are fertilegrounds for the spread of misinformation, they are also ripe for the creation of fake accountswith even more nefarious intentions. Threat actors make use of […] The post...

Kids Are Now Using Apps to Create “Deep Fakes” to Bully Others – cyberpro

– [[{“value”:” Parents and caregivers have barely learned about the power of social media platforms and yet now they are finding out that kids are making use of apps that create “deep fakes” for the purpose of bullying other kids. These kids typically know that the “adults” will lag behind in catching them as they realise most […] The post...

Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution – [email protected] (The Hacker News)

– [[{“value”:”A now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieve remote code execution on cloud servers by means of a supply chain attack technique called dependency confusion. The vulnerability has been codenamed CloudImposer by Tenable Research. “The vulnerability could have allowed an attacker to hijack an internal software dependency”}]]  – Read More ...

Master Your PCI DSS v4 Compliance with Innovative Smart Approvals – [email protected] (The Hacker News)

– The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger, businesses are scrambling to meet the stringent new requirements of PCI DSS v4.0. Two sections in particular, 6.4.3 and 11.6.1, are troublesome as they demand that organizations rigorously monitor and manage payment page scripts and use a robust change detection mechanism. With the deadline...

From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook – [email protected] (The Hacker News)

– [[{“value”:”Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit? Not a rogue virus, but a compromised identity. The attacker is inside your walls, masquerading as a trusted user. This isn’t a horror movie, it’s the new reality of cybercrime. The question is, are you prepared? Traditional incident response...

Exclusive Offer: Free Domain Score with DaVinci Cybersecurity’s Website Scan – Da Vinci Support

– [[{“value”:” Free Domain Score & Website Scan – Exclusive Offer by DaVinci Cybersecurity Why Every Business Should Check Their Domain’s Vulnerability Score and Conduct a Website Security Scan In today’s digital world, having an online presence is essential, but is your website really safe? Most businesses trust their hosting provider’s basic security features, unaware that these […] The post...

Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure – [email protected] (The Hacker News)

– [[{“value”:”Apple has filed a motion to “voluntarily” dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk landscape that could lead to exposure of critical “threat intelligence” information. The development was first reported by The Washington Post on Friday. The iPhone maker said its efforts, coupled with those of others in the industry and national governments...

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed email login pages that are designed to harvest users’ credentials. “Unlike other phishing webpage distribution behavior through HTML content, these attacks use the response header sent by a server, which occurs before the processing of the HTML content,” Palo Alto”}]]  –...

Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability – [email protected] (The Hacker News)

– [[{“value”:”Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation in the wild. The high-severity vulnerability in question is CVE-2024-8190 (CVSS score: 7.2), which allows remote code execution under certain circumstances. “An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows”}]]  –...

CISA warns of hackers exploiting bug for end-of-life Ivanti product – Christian Vasquez

– [[{“value”:” An end-of-life version of Ivanti’s cloud IT service management software has a recently released vulnerability that the Cybersecurity and Infrastructure Security Agency says is being exploited. CISA warned that organizations outfitted with Ivanti’s Cloud Service Appliance version 4.6 and below are being targeted by hackers and the bug has been added to the known exploited vulnerabilities (KEV) list....

US accuses RT, others of covert arms dealing, global influence operations – djohnson

– [[{“value”:” The State Department announced a fresh round of sanctions for RT and related media companies Friday, accusing the Russian state-funded news outlet of operating a crowdfunding website that funneled weaponry and equipment to Russian soldiers fighting in Ukraine. Secretary of State Antony Blinken said the crowdfunding site was used to purchase weapons and equipment, including drones, radio equipment,...