Category: Attack Feeds

Ransomware Gangs Use LockBit’s Fame to Intimidate Victims in Latest Attacks – [email protected] (The Hacker News)

– [[{“value”:”Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim data and upload them to S3 buckets under their control. “Attempts were made to disguise the Golang ransomware as the notorious LockBit ransomware,” Trend Micro researchers Jaromir Horejsi and Nitesh Surana said. “However, such is”}]]  –...

Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks – [email protected] (The Hacker News)

– It may come as a surprise to learn that 34% of security practitioners are in the dark about how many SaaS applications are deployed in their organizations. And it’s no wonder—the recent AppOmni 2024 State of SaaS Security Report reveals that only 15% of organizations centralize SaaS security within their cybersecurity teams. These statistics not only highlight a critical...

Researchers Reveal ‘Deceptive Delight’ Method to Jailbreak AI Models – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models (LLMs) during the course of an interactive conversation by sneaking in an undesirable instruction between benign ones. The approach has been codenamed Deceptive Delight by Palo Alto Networks Unit 42, which described it as both simple and effective, achieving an...

Pwn2Own Ireland 2024: Day Two Results – Dustin Childs

– [[{“value”:” Welcome back to Pwn2Own Ireland 2024! Yesterday, we awarded $516,250 for over 50 unique 0-day bugs. Today looks to be just as exciting with attempts on phones, cameras, printers, and smart speakers. We’ll be updating this blog in real time as results become available. We have a full schedule of attempts today, so stay tuned! All times are...

US officials warn foreign disinformation from Russia may flood post-election period – djohnson

– [[{“value”:” The U.S. intelligence community is anticipating a potentially tumultuous post-election period this year, where foreign governments will seek to amplify domestic unrest to cast doubt about the legitimacy of the winner while undermining confidence in democracy. Officials at the Office of the Director of National Intelligence singled out Russia, using some of their strongest language to date to...

AI chatbots can be tricked by hackers into helping them steal your private data – Graham Cluley

– [[{“value”:”Security researchers have uncovered a new flaw in some AI chatbots that could have allowed hackers to steal personal information from users. The flaw, which has been named “Imprompter”, which uses a clever trick to hide malicious instructions within seemingly-random text. Read more in my article on the Hot for Security blog.”}]]  – Read More  – Graham Cluley 

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans – [email protected] (The Hacker News)

– [[{“value”:”Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. “The campaign involves modular infection chains that are either Maldoc or HTML-based infections and require the victim’s intervention to trigger the”}]]  – Read More  –...

Task force unveils cyber recommendations for the next president – Tim Starks

– [[{“value”:” The victor of the 2024 presidential election must resolve conflicting cybersecurity regulations, better deter cyberattacks, address the cyber workforce shortage, develop plans with the private sector on critical infrastructure protection and review how to keep the economy going in the event of major hacks, a task force of cyber experts said in a report released Tuesday. Those were...

Ransomware attacks on health care sector are driving increase in emergency patient care – Greg Otto

– [[{“value”:” Ransomware attacks on the health care sector are rising and putting lives at risk, led by Iranian hackers, Microsoft said in a report Tuesday. The report, which draws on both internal company data and external data, points to a 300% increase in ransomware attacks on the health sector since 2015, and an increase in stroke and cardiac arrest...

SEC hits four companies with fines for misleading disclosures around SolarWinds hack – djohnson

– [[{“value”:” The Securities and Exchange Commission said it has reached a settlement with four companies for making materially misleading statements about the impact of the 2020 SolarWinds Orion software breach on their business. The regulator on Tuesday charged the four companies — Unisys Corp., Avaya Holdings Corp., Check Point Software Technologies and Mimecast Limited — with minimizing the compromise...

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks – [email protected] (The Hacker News)

– [[{“value”:”Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro. “In this attack, the threat actor used the gRPC protocol over h2c to evade security solutions and execute their crypto mining operations on the Docker host,” researchers Abdelrahman Esmail and Sunil Bharti said...

The AI Fix #21: Virtual Trump, barking mad AI, and a robot dog with a flamethrower – Graham Cluley

– [[{“value”:”In episode 21 of “The AI Fix””, Mark and Graham comfort themselves with a limbless AI pet as they learn about a terrifying robot dog with a flamethrower, fission-powered data centres, AI suicide pods, and a multi-limbed robot with a passion for classical music. Graham finds out what happens if you sellotape an Alexa to a Chihuahua, and Mark...

Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers – [email protected] (The Hacker News)

– [[{“value”:”Details have emerged about a now-patched security flaw in Styra’s Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes. “The vulnerability could have allowed an attacker to leak the NTLM credentials of the OPA server’s local user account to a remote server, potentially allowing the attacker to relay...

A Comprehensive Guide to Finding Service Accounts in Active Directory – [email protected] (The Hacker News)

– Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges. This guide will walk you through how to locate and secure these accounts within Active Directory (AD), and explore how Silverfort’s solutions can help enhance your  – Read...

Malicious npm Packages Target Developers’ Ethereum Wallets with SSH Backdoor – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol. The packages attempt to “gain SSH access to the victim’s machine by writing the attacker’s SSH public key in the root user’s authorized_keys file,”...

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies – [email protected] (The Hacker News)

– [[{“value”:”Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as part of new phishing campaigns. Bumblebee and Latrodectus, which are both malware loaders, are designed to steal personal data, along with downloading and executing additional payloads onto compromised hosts. Tracked under the names BlackWidow, IceNova, Lotus,”}]]  – Read More ...

VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability – [email protected] (The Hacker News)

– [[{“value”:”VMware has released software updates to address an already patched security flaw in vCenter Server that could pave the way for remote code execution. The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol. “A malicious actor with network access to vCenter Server may trigger this vulnerability by”}]] ...

Pwn2Own Ireland Day One – The Results – Dustin Childs

– [[{“value”:” Welcome to the first day of Pwn2Own Ireland 2024! We have four tremendous days of research planned, including multiple SOHO attempts. We’ll be updating this blog in real time as results become available. We have a full schedule of attempts today, so stay tuned! All times are Irish Standard Time (GMT +1:00). “}]]  – Read More  – Zero...

CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation as a zero-day. The vulnerability in question, tracked as CVE-2024-9537 (CVSS v4 score: 9.3), refers to a bug involving an unspecified third-party component that could”}]]  – Read More  –...

Justice Department rule aims to curb the sale of Americans’ personal data overseas – djohnson

– [[{“value”:” The Justice Department has formally proposed new regulations that would prevent or restrict the selling and transferring of Americans’ sensitive personal data to adversarial countries. The proposed rule, first previewed in March, stems from an executive order issued by the Biden administration in February and imposes a series of restrictions on how American entities can sell “bulk” sensitive...

Pwn2Own Ireland – The Full Schedule – Dustin Childs

– [[{“value”:” Welcome to Pwn2Own Ireland 2024 – our first event ever from the emerald isle! This year’s contest is set to be one of our largest ever – both in terms of entries and potential prizes. If everything hits, we will end up paying out over $1,000,000 in cash and prizes. We’ve got four days of exciting competition ahead....

A Look at the Social Engineering Element of Spear Phishing Attacks – [email protected]

– [[{“value”:” When you think of a cyberattack, you probably envision a sophisticated hacker behind a Matrix-esque screen actively penetrating networks with their technical prowess. However, the reality of many attacks is far more mundane. A simple email with an innocent subject line such as “Missed delivery attempt” sits in an employee’s spam folder. They open it absentmindedly, then enter...

Sophos to acquire Secureworks for $859 million in cash – Christian Vasquez

– [[{“value”:” The cybersecurity firm Sophos agreed to acquire Secureworks in an all-cash transaction valued at $859 million, the two companies announced Monday. Sophos, a privately owned United Kingdom-based cybersecurity firm, said it intends to integrate security solutions for all small, mid-sized and enterprise customers focusing on automated prevention, detection, and response using artificial intelligence.  “Secureworks’ renowned expertise in cybersecurity...

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain – [email protected] (The Hacker News)

– [[{“value”:”The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed to a sophisticated cyber attack targeting the gambling and gaming industry. “Over a period of at least six months, the attackers stealthily gathered valuable information from the targeted company including, but not limited to, network configurations, user passwords,”}]]  –...

State Department offers $10 million reward for info on Russian propaganda outlet – Greg Otto

– [[{“value”:” The U.S. government has announced a reward of up to $10 million for information about the Russian media organization Rybar and its employees, amid allegations it’s involved in spreading propaganda aimed at influencing the upcoming U.S. presidential election. According to the State Department’s Rewards for Justice Program, Rybar has been accused of using its extensive social media reach,...

Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organizations Worldwide – Editor

– We have exciting news! Two global cybersecurity leaders are joining forces to accelerate the delivery of advanced cybersecurity services and technology for organizations of all sizes around the world. Sophos today has announced a definitive agreement to acquire Secureworks®, the developer of TaegisTM, the SaaS-based, open MDR/XDR platform built on more than 20 years of […]  – Read More ...

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20) – [email protected] (The Hacker News)

– [[{“value”:”Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems we thought were secure—like finding hidden doors in locked houses. But the good news? Security experts are fighting back with smarter tools to keep data safe. Some big companies were hit with attacks, while others fixed their vulnerabilities just...

Guide:  The Ultimate Pentest Checklist for Full-Stack Security – [email protected] (The Hacker News)

– [[{“value”:”Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring thorough assessments across an organization’s attack surface, both internal and external. By providing a structured approach, these checklists help testers systematically”}]]  – Read More  – The Hacker News 

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could be exploited to leak sensitive data. “The vulnerabilities range in severity: in many cases a malicious server can inject files, tamper with file data, and even gain direct access to plaintext,” ETH Zurich researchers Jonas Hofmann and Kien Tuong Truong”}]]  – Read...

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials – [email protected] (The Hacker News)

– [[{“value”:”Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube webmail software as part of a phishing attack designed to steal user credentials. Russian cybersecurity company Positive Technologies said it discovered last month that an email was sent to an unspecified governmental organization located in one of the Commonwealth of”}]]  – Read...

Celebrating Internet Day: The Tech Trifecta Shaping Our Digital Future – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  As we gear up to celebrate Internet Day on October 29th, let’s take a moment to appreciate how much the Internet has revolutionized our lives. From...

Acronym Overdose – Navigating the Complex Data Security Landscape – [email protected] (The Hacker News)

– In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together an effective security strategy. This article aims to demystify some of the most important acronyms  – Read...

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks – [email protected] (The Hacker News)

– [[{“value”:”A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of disrupting business operations and financial gain. “The group under review has a toolkit that includes utilities such as Mimikatz, XenAllPasswordPro, PingCastle, Localtonet, resocks, AnyDesk, PsExec, and others,””}]]  – Read...

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data – [email protected] (The Hacker News)

– [[{“value”:”North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new twist to their financially motivated attacks. “In some instances, fraudulent workers demanded ransom payments from their former employers after gaining”}]]  –...

Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach – BrianKrebs

– [[{“value”:” Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being “USDoD,” a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI’s InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security...

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken by Iranian cyber actors to infiltrate critical infrastructure organizations via brute-force attacks. “Since October 2023, Iranian actors have used brute force and password spraying to compromise user accounts and obtain access to organizations in the healthcare and”}]]  – Read More  – The...

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture – [email protected] (The Hacker News)

– [[{“value”:”Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces are hidden, some misplaced, and others might even be missing entirely. Keeping your data secure in today’s fast-evolving landscape can feel like an impossible challenge. But there’s a game-changing solution: Data Security Posture Management (DSPM). Think of it as a high-tech,”}]]  –...

Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign – [email protected] (The Hacker News)

– [[{“value”:”Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign dubbed ClickFix to deliver infostealers targeting Windows and macOS systems. “This tactic involves displaying fake error messages in web browsers to deceive users into copying and executing a given malicious PowerShell code, finally infecting their systems,” French cybersecurity company Sekoia said in”}]]  –...

Recapping Raid Forums: The Place Where Data Was Sold to the Highest Bidder – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  From stolen personal data to entire corporate databases, Raid Forums was a digital black market where the most valuable commodities weren’t physical goods but sensitive information....