Category: Attack Feeds

0

The AI Fix #25: Beware of the superintelligence, and a spam-eating AI super gran – Graham Cluley

– [[{“value”:”In episode 25 of The AI Fix, humanity creates a satellite called Skynet and then loses it, Graham folds proteins in the comfort of his living room, a Florida man gets a robot dog, Grok rats on its own boss, and a podcast host discovers Brazil nuts. Graham meets an elderly grandmother who’s taking on the AI scammers, our...

0

Botnet serving as ‘backbone’ of malicious proxy network taken offline  – mbracken

– [[{“value”:” Whether it’s for espionage purposes or financially motivated cybercrime, proxy services are a common tool in the attacker toolbox. Often used to disguise the true origin or location of malicious activity, proxies can be lucrative for malicious actors, who create them via a botnet and sell access in order for others to run their schemes, which can range...

0

Attackers are hijacking Jupyter notebooks to host illegal Champions League streams – Christian Vasquez

– [[{“value”:” Amid threats of state-backed APTs turning the geopolitical tide by diving into sensitive networks, some hackers are looking to use misconfigured Jupyter notebook servers to watch UEFA Champions League soccer, according to a new report from Aqua Security. Researchers at the cloud security company said in a report released Tuesday that hackers were drawn to the misconfigured JupyterLab...

0

Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts – [email protected] (The Hacker News)

– [[{“value”:”Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools. The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed to facilitate illegal live streaming of sports events, Aqua said in a report shared with The”}]]  –...

0

Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices – [email protected] (The Hacker News)

– [[{“value”:”The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal. “At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly utilizing small office/home office (SOHO) routers and IoT devices,” the...

0

Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority – [email protected] (The Hacker News)

– Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users entrusted with it. This emphasis is perhaps due to the persistent challenges of Privileged Access Management (PAM) deployments. Yet, as the threat landscape evolves, so must organizational priorities. To  – Read More  – The Hacker...

0

Navigating SaaS Security Risks: Key Strategies and Solutions – [email protected]

– [[{“value”:” Software-as-a-Service, an acronym for SaaS applications, has become increasingly popular among businesses looking to enhance efficiency, productivity, and scalability. These cloud-based services have exploded in popularity over the last few years, with the net consumption up 18% in 2023 and 130 apps used per business on average. As cybersecurity threats evolve and grow, the risks associated with SaaS...

0

How to remove the cybersecurity gridlock from the nation’s energy lifelines – Greg Otto

– [[{“value”:” In a world where every digital connection has the potential to be a vulnerability, the stakes for cybersecurity have never been higher.  The recent statement from National Security Advisor Jake Sullivan on supply chain security brings into sharp focus the escalating threats faced by critical infrastructure operators, particularly the energy sector. For the United States, securing this sector...

0

New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. “Helldown deploys Windows ransomware derived from the LockBit 3.0 code,” Sekoia said in a report shared with The Hacker News. “Given the recent development of ransomware targeting ESX, it appears that the...

0

Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign – [email protected] (The Hacker News)

– [[{“value”:”U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information. The adversaries, tracked as Salt Typhoon, breached the company as part of a “monthslong campaign” designed to harvest cellphone communications of “high-value intelligence targets.” It’s not clear what information was taken, if any,”}]] ...

0

CISA Alert: Active Exploitation of VMware vCenter and Kemp LoadMaster Flaws – [email protected] (The Hacker News)

– [[{“value”:”Now-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the wild, it has emerged. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added CVE-2024-1212 (CVSS score: 10.0), a maximum-severity security vulnerability in Progress Kemp LoadMaster to its Known Exploited Vulnerabilities (KEV) catalog. It was”}]]  – Read More  – The...

0

Alleged Russian Phobos ransomware administrator extradited to U.S., in custody – Tim Starks

– [[{“value”:” A Russian man who allegedly served as an administrator of the Phobos ransomware that’s extorted millions of dollars from more than a thousand victims is in U.S. custody, the Justice Department said Monday. South Korea extradited Evgenii Ptitsyn, 42, to the United States for a court appearance Nov. 4, according to a news release about an unsealed 13-count...

0

The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think – [email protected] (The Hacker News)

– According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous year’s report. At the same time, the number of leaked credentials has never been higher, with over 12.7 million hardcoded credentials in public GitHub repositories alone. One of the more troubling aspects of this report is...

0

New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a new stealthy malware loader called BabbleLoader that has been observed in the wild delivering information stealer families such as WhiteSnake and Meduza. BabbleLoader is an “extremely evasive loader, packed with defensive mechanisms, that is designed to bypass antivirus and sandbox environments to deliver stealers into memory,” Intezer security”}]]  – Read More  –...

0

The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think – [email protected] (The Hacker News)

– According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous year’s report. At the same time, the number of leaked credentials has never been higher, with over 12.7 million hardcoded credentials in public GitHub repositories alone. One of the more troubling aspects of this report is...

0

Battling Teen Sextortion on the Net – cyberpro

– [[{“value”:” All social media platforms, messaging apps, and websites are an open invitation to threat actors for the worst behavior. Most teens lack the critical thinking abilities to differentiate between what might be friend or foe and are perfect to be “played” by those that have bad intentions. Sextortion arrives in a number of ways and […] The post...

0

Gmail’s New Shielded Email Feature Lets Users Create Aliases for Email Privacy – [email protected] (The Hacker News)

– [[{“value”:”Google appears to be readying a new feature called Shielded Email that allows users to create email aliases when signing up for online services and better combat spam. The feature was first reported by Android Authority last week following a teardown of the latest version of Google Play Services for Android. The idea is to create unique, single-use email...

0

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17) – [email protected] (The Hacker News)

– [[{“value”:”What do hijacked websites, fake job offers, and sneaky ransomware have in common? They’re proof that cybercriminals are finding smarter, sneakier ways to exploit both systems and people. This week makes one thing clear: no system, no person, no organization is truly off-limits. Attackers are getting smarter, faster, and more creative—using everything from human trust to hidden flaws in”}]] ...

0

Beyond Compliance: The Advantage of Year-Round Network Pen Testing – [email protected] (The Hacker News)

– [[{“value”:”IT leaders know the drill—regulators and cyber insurers demand regular network penetration testing to keep the bad guys out. But here’s the thing: hackers don’t wait around for compliance schedules. Most companies approach network penetration testing on a set schedule, with the most common frequency being twice a year (29%), followed by three to four times per year (23%)...

0

Fake Discount Sites Exploit Black Friday to Hijack Shopper Information – [email protected] (The Hacker News)

– [[{“value”:”A new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus pages that mimic legitimate brands with the goal of stealing their personal information ahead of the Black Friday shopping season. “The campaign leveraged the heightened online shopping activity in November, the peak season for Black Friday discounts. The threat actor used fake discounted...

0

NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta’s Lawsuit – [email protected] (The Hacker News)

– [[{“value”:”Legal documents released as part of an ongoing legal tussle between Meta’s WhatsApp and NSO Group have revealed that the Israeli spyware vendor used multiple exploits targeting the messaging app to deliver Pegasus, including one even after it was sued by Meta for doing so. They also show that NSO Group repeatedly found ways to install the invasive surveillance...

0

Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites – [email protected] (The Hacker News)

– [[{“value”:”A critical authentication bypass vulnerability has been disclosed in the Really Simple Security (formerly Really Simple SSL) plugin for WordPress that, if successfully exploited, could grant an attacker to remotely gain full administrative access to a susceptible site. The vulnerability, tracked as CVE-2024-10924 (CVSS score: 9.8), impacts both free and premium versions of the plugin. The”}]]  – Read More ...

0

PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released – [email protected] (The Hacker News)

– [[{“value”:”Palo Alto Networks has released new indicators of compromise (IoCs) a day after the network security vendor confirmed that a new zero-day vulnerability impacting its PAN-OS firewall management interface has been actively exploited in the wild. To that end, the company said it observed malicious activity originating from below IP addresses and targeting PAN-OS management web interface IP”}]]  –...

0

Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials – [email protected] (The Hacker News)

– [[{“value”:”A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet’s FortiClient for Windows to extract VPN credentials as part of a modular framework called DEEPDATA. Volexity, which disclosed the findings Friday, said it identified the zero-day exploitation of the credential disclosure vulnerability in July 2024, describing BrazenBamboo as the developer behind DEEPDATA,”}]]  – Read More ...

0

NSO Group used WhatsApp exploits after the messaging app sued the spyware developer, court filing says – Tim Starks

– [[{“value”:” NSO Group developed malware that used WhatsApp to infect victims even after WhatsApp sued the leading spyware vendor over allegations that it violated federal and state anti-hacking laws, according to a court filing by the messaging app and its parent company Meta on Thursday. It was one of a bevy of revelations and new details found in the...

0

Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a new remote access trojan and information stealer used by Iranian state-sponsored actors to conduct reconnaissance of compromised endpoints and execute malicious commands. Cybersecurity company Check Point has codenamed the malware WezRat, stating it has been detected in the wild since at least September 1, 2023, based on artifacts uploaded to the”}]]  –...

0

More bugs in Palo Alto Expedition see active exploitation, CISA warns – Christian Vasquez

– [[{“value”:” The Cybersecurity and Infrastructure Security Agency warned Thursday that a vulnerability in Palo Alto Networks’ firewall management software is actively being exploited in the wild, following last week’s attacks that exploited other flaws in the same software. The two bugs in Palo Alto’s Expedition tool, tracked as CVE-2024-9463 and CVE-2024-9465, could expose firewall credentials and affect versions 1.2.96...

0

Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices – [email protected] (The Hacker News)

– [[{“value”:”In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted? Certificate revocations, though rare, can send shockwaves through your operations, impacting security, customer confidence, and business continuity. Are you prepared to act swiftly when the unexpected happens? Join DigiCert’s exclusive webinar, “When Shift Happens: Are You Ready for Rapid”}]]  – Read More  – The...

0

Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed two security flaws in Google’s Vertex machine learning (ML) platform that, if successfully exploited, could allow malicious actors to escalate privileges and exfiltrate models from the cloud. “By exploiting custom job permissions, we were able to escalate our privileges and gain unauthorized access to all data services in the project,” Palo Alto Networks”}]]  – Read...

0

Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia – [email protected] (The Hacker News)

– [[{“value”:”A Vietnamese-speaking threat actor has been linked to an information-stealing campaign targeting government and education entities in Europe and Asia with a new Python-based malware called PXA Stealer. The malware “targets victims’ sensitive information, including credentials for various online accounts, VPN and FTP clients, financial information, browser cookies, and data from gaming software,””}]]  – Read More  – The Hacker...

0

How AI Is Transforming IAM and Identity Security – [email protected] (The Hacker News)

– In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management (IAM), reshaping how cybersecurity is approached in this crucial field. Leveraging AI in IAM is about tapping into its analytical capabilities to monitor access patterns and identify anomalies that could signal a potential security breach. The focus has expanded beyond merely managing human  – Read More  –...

0

High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system that could allow unprivileged users to alter environment variables, and potentially lead to code execution or information disclosure. The vulnerability, tracked as CVE-2024-10979, carries a CVSS score of 8.8. Environment variables are user-defined values that can allow a program”}]]  – Read More  – The Hacker...

0

Safeguarding Healthcare Organizations from IoMT Risks – [email protected]

– [[{“value”:” The healthcare industry has undergone significant transformation with the emergence of the Internet of Medical Things (IoMT) devices. These devices ranging from wearable monitors to network imaging systems collect and process vast amounts of sensitive medical data based on which they make critical decisions about patients’ health. But at the same time, they also raise serious privacy and...

0

Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin – [email protected] (The Hacker News)

– [[{“value”:”Ilya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurrency stock exchange Bitfinex, has been sentenced to five years in prison, the U.S. Department of Justice (DoJ) announced Thursday. Lichtenstein was charged for his involvement in a money laundering scheme that led to the theft of nearly 120,000 bitcoins (valued at over $10.5 billion at current prices) from...

0

CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that two more flaws impacting the Palo Alto Networks Expedition have come under active exploitation in the wild. To that, it has added the vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the necessary updates by December 5,”}]]  –...

0

An Interview With the Target & Home Depot Hacker – BrianKrebs

– [[{“value”:” In December 2023, KrebsOnSecurity revealed the real-life identity of Rescator, the nickname used by a Russian cybercriminal who sold more than 100 million payment cards stolen from Target and Home Depot between 2013 and 2014. Moscow resident Mikhail Shefel, who confirmed using the Rescator identity in a recent interview, also admitted reaching out because he is broke and...

0

HackerOne urges U.S. to advocate for research protections in UN cybercrime treaty – Greg Otto

– [[{“value”:” HackerOne has expressed serious concerns over the recently proposed UN Convention Against Cybercrime, which the company says lacks strong protections for good-faith security researchers.  In an open letter sent to Secretary of State Antony Blinken, Attorney General Merrick Garland, and United States Agency for International Development Administrator Samantha Power, Ilona Cohen, chief legal and policy officer for HackerOne,...