Category: Attack Feeds

Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices – [email protected] (The Hacker News)

– [[{“value”:”A malicious botnet called Socks5Systemz is powering a proxy service called PROXY.AM, according to new findings from Bitsight. “Proxy malware and services enable other types of criminal activity adding uncontrolled layers of anonymity to the threat actors, so they can perform all kinds of malicious activity using chains of victim systems,” the company’s security research team said in an...

Seven Bolt-Ons to Make Your Entra ID More Secure for Critical Sessions – [email protected] (The Hacker News)

– [[{“value”:”Identity security is all the rage right now, and rightfully so. Securing identities that access an organization’s resources is a sound security model. But IDs have their limits, and there are many use cases when a business should add other layers of security to a strong identity. And this is what we at SSH Communications Security want to talk...

Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI – [email protected] (The Hacker News)

– [[{“value”:”Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim’s account by means of a prompt injection attack. Security researcher Johann Rehberger, who has chronicled many a prompt injection attack targeting various AI tools, found that providing the input...

Public and private sectors must partner to address generative AI’s interdependent energy and security requirements – mbracken

– [[{“value”:” Unlocking what pundits tout as the visionary potential of generative AI may require unprecedented amounts of electrical power, but it is unclear if our current energy infrastructure is up to the task. That question is especially important now given the rise of gen AI and the competing demands the country faces with other high-priority goals, such as developing...

84 Arrested as Russian Ransomware Laundering Networks Disrupted – Waqas

– Operation Destabilise was a major international operation led by the UK’s National Crime Agency (NCA) to dismantle two Russian-speaking criminal networks: Smart and TGR. These networks were backbone in laundering billions of dollars for various criminal activities.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions – [email protected] (The Hacker News)

– [[{“value”:”In yet another software supply chain attack, it has come to light that two versions of a popular Python artificial intelligence (AI) library named ultralytics were compromised to deliver a cryptocurrency miner. The versions, 8.3.41 and 8.3.42, have since been removed from the Python Package Index (PyPI) repository. A subsequently released version has introduced a security fix that “ensures”}]] ...

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise of fake business meetings. “The threat actors behind the malware have set up fake companies using AI to make them increase legitimacy,” Cado Security researcher Tara Gould said. “The...

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar – [email protected] (The Hacker News)

– [[{“value”:”Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to secure privileged accounts. Why? Traditional Privileged Access Management (PAM) solutions often fall short, leaving: Blind spots that limit full visibility. Complex deployment processes.”}]]  – Read More  – The Hacker...

Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok – [email protected] (The Hacker News)

– [[{“value”:”In a historic decision, Romania’s constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a result, the second round vote, which was scheduled for December 8, 2024, will no longer take place. Călin Georgescu, who won the first round, denounced the verdict as an “officialized coup”...

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine – [email protected] (The Hacker News)

– [[{“value”:”A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year. The findings come as part of a collaborative investigation by First Department and the University of Toronto’s Citizen Lab. “The spyware placed on his device allows the operator to...

Conquering the Complexities of Modern BCDR – [email protected] (The Hacker News)

– The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities make data protection and seamless business continuity challenging for businesses of all sizes. Your organization needs robust security measures that go beyond traditional backup solutions to address the intricacies of today’s complex IT ecosystems.  – Read More  – The Hacker News 

Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as MLflow, H2O, PyTorch, and MLeap that could pave the way for code execution. The vulnerabilities, discovered by JFrog, are part of a broader collection of 22 security shortcomings the supply chain security company first disclosed last month. Unlike the first”}]]  – Read...

More_eggs MaaS Expands Operations with RevC2 Backdoor and Venom Loader – [email protected] (The Hacker News)

– [[{“value”:”The threat actors behind the More_eggs malware have been linked to two new malware families, indicating an expansion of its malware-as-a-service (MaaS) operation. This includes a novel information-stealing backdoor called RevC2 and a loader codenamed Venom Loader, both of which are deployed using VenomLNK, a staple tool that serves as an initial access vector for the deployment of follow-on”}]] ...

Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware – [email protected] (The Hacker News)

– [[{“value”:”The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to conceal its staging infrastructure hosting a malware called GammaDrop. The activity is part of an ongoing spear-phishing campaign targeting Ukrainian entities since at least early 2024 that’s designed to drop the Visual Basic Script malware, Recorded Future’s Insikt Group said in a new...

FCC, for first time, proposes cybersecurity rules tied to wiretapping law – Tim Starks

– [[{“value”:” Federal Communications Commission Chairwoman Jessica Rosenworcel presented draft regulations Thursday to fellow commissioners that would for the first time require telecom companies to upgrade cyber defenses under a federal wiretapping law, or face fines. The draft rules are a response to alarming breaches of telecom providers by Chinese government hackers known as Salt Typhoon. The breaches have drawn...

Industry leaders on CISA’s secure-by-design pledge: A great program with some issues – mbracken

– [[{“value”:” Private-sector tech leaders told House lawmakers Thursday that the Cybersecurity and Infrastructure Security Agency’s secure-by-design push may benefit from more of an incentive structure, but poorly trained developers remain “a real problem” for the nearly two-year-old initiative. The four witnesses testifying before the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection all characterized CISA’s voluntary secure-by-design pledge...

Telecom Giant BT Group Hit by Black Basta Ransomware – Deeba Ahmed

– BT Group, a major telecommunications firm, has been hit by a ransomware attack from the Black Basta group. The attack targeted the company’s Conferencing division, leading to server shutdowns and potential data theft.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

Russian money-laundering network linked to drugs and ransomware disrupted, 84 arrests – Graham Cluley

– [[{“value”:”The UK’s National Crime Agency (NCA) has revealed details of Operation Destabilise, a years-long international law enforcement investigation into a giant Russian money laundering enterprise that handled billions of dollars for drug traffickers and ransomware gangs worldwide. Read more in my article on the Tripwire State of Security blog.”}]]  – Read More  – Graham Cluley 

This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges – [email protected] (The Hacker News)

– [[{“value”:”As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a newly discovered Android remote access trojan (RAT) called DroidBot. “DroidBot is a modern RAT that combines hidden VNC and overlay attack techniques with spyware-like capabilities, such as keylogging and user interface monitoring,” Cleafy researchers Simone Mattia, Alessandro”}]]  – Read More  – The...

Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers – [email protected] (The Hacker News)

– [[{“value”:”Europol on Thursday announced the shutdown of a clearnet marketplace called Manson Market that facilitated online fraud on a large scale. The operation, led by German authorities, has resulted in the seizure of more than 50 servers associated with the service and the arrest of two suspects. More than 200 terabytes of digital evidence have been collected. Manson Market...

Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have released a proof-of-concept (PoC) exploit that strings together a now-patched critical security flaw impacting Mitel MiCollab with an arbitrary file read zero-day, granting an attacker the ability to access files from susceptible instances. The critical vulnerability in question is CVE-2024-41713 (CVSS score: 9.8), which relates to a case of insufficient input”}]]  – Read More  – The...

Exclusive: Feds are probing 764, The Com’s use of cybercriminal tactics to carry out violent crimes – Greg Otto

– [[{“value”:” The child sextortion group 764 and the global collective of loosely associated groups known as “The Com” are using tools and techniques normally used for financially motivated cybercrime tactics — such as SIM swapping, IP grabbing and social engineering — to commit violent crimes, according to exclusive law enforcement and intelligence reports reviewed by CyberScoop.  The reports offer...

Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor – [email protected] (The Hacker News)

– [[{“value”:”A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported Android-cum-Windows backdoor called DarkNimbus to facilitate long-term surveillance operations targeting Tibetans and Uyghurs. “Earth Minotaur uses MOONSHINE to deliver the DarkNimbus backdoor to Android and Windows devices, targeting WeChat, and possibly making it a”}]]  – Read More  – The Hacker News 

Want to Grow Vulnerability Management into Exposure Management? Start Here! – [email protected] (The Hacker News)

– [[{“value”:”Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the limitations of this approach have become increasingly evident.  At its core, Vulnerability Management”}]]  – Read More  – The...

How a Russian man’s harrowing tale shows the physical dangers of spyware – Greg Otto

– [[{“value”:” Kirill Parubets was, entirely understandably, afraid.  Six or seven Russian police officers had knocked on his Moscow apartment door in April, entered while wearing masks and holding automatic weapons, and started  interrogating him about how he and his wife had helped supply aid to people in Ukraine suffering from the war’s devastation.  The police beat him and his...

Smashing Security podcast #396: Dishy DDoS dramas, and mining our minds for data – Graham Cluley

– [[{“value”:”A CEO is arrested for turning satellite receivers into DDoS attack weapons! Then, we’ll journey into the world of bossware and “affective computing” and explore how AI is learning to read our emotions – is this the future of work, or a recipe for dystopia? All this and more is discussed in the latest edition of the “Smashing Security”...

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers – [email protected] (The Hacker News)

– [[{“value”:”A suspected Chinese threat actor targeted a large U.S. organization earlier this year as part of a four-month-long intrusion. According to Broadcom-owned Symantec, the first evidence of the malicious activity was detected on April 11, 2024 and continued until August. However, the company doesn’t rule out the possibility that the intrusion may have occurred earlier. “The attackers moved laterally”}]] ...

ANEL and NOOPDOOR Backdoors Weaponized in New MirrorFace Campaign Against Japan – [email protected] (The Hacker News)

– [[{“value”:”The China-linked threat actor known as MirrorFace has been attributed to a new spear-phishing campaign mainly targeting individuals and organizations in Japan since June 2024. The aim of the campaign is to deliver backdoors known as NOOPDOOR (aka HiddenFace) and ANEL (aka UPPERCUT), Trend Micro said in a technical analysis. “An interesting aspect of this campaign is the comeback...

CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple security flaws affecting products from Zyxel, North Grid Proself, ProjectSend, and CyberPanel to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows – CVE-2024-51378 (CVSS score: 10.0) – An incorrect default permissions”}]]  – Read More  – The...

NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions – [email protected] (The Hacker News)

– [[{“value”:”The U.K. National Crime Agency (NCA) on Wednesday announced that it led an international investigation to disrupt Russian money laundering networks that were found to facilitate serious and organized crime across the U.K., the Middle East, Russia, and South America. The effort, codenamed Operation Destabilise, has resulted in the arrest of 84 suspects linked to two Russian-speaking networks”}]]  –...

White House: Chinese telecom hacks have been in motion for years – mbracken

– [[{“value”:” A White House official says the Salt Typhoon hack has impacted eight telecom companies in the United States, with dozens of other countries also affected, and has been in motion for as long as two years.  The information comes as U.S. administration officials said earlier this week that the hacking group, linked to the Chinese government, is still...

Federal transportation officials aim to ‘bridge gaps’ in OT cybersecurity – mbracken

– [[{“value”:” From supporting aircraft systems to ensuring railway signals don’t falter, the operational technology that underpins transportation networks across the country is critical to daily life — and highly vulnerable to threats. For Katherine Rawls, director of sector cyber engagement at the Department of Transportation, acknowledging that reality sparks various debates on how to meet those challenges head on....

Russian-linked Turla caught using Pakistani APT infrastructure for espionage – Greg Otto

– [[{“value”:” A Russian cyber-espionage group with ties to the country’s Federal Security Service has been caught using networks associated with a Pakistani-based APT group. This operation marks the fourth recorded incident since 2019 where the Russian group, known commonly as Turla, has embedded themselves within another threat actor’s operations. The reports, released Wednesday by Microsoft’s Threat Intelligence Center and...

Russia-Linked Turla Exploits Pakistani Hackers’ Servers to Target Afghan and Indian Entities – [email protected] (The Hacker News)

– [[{“value”:”The Russia-linked advanced persistent threat (APT) group known as Turla has been linked to a previously undocumented campaign that involved infiltrating the command-and-control (C2) servers of a Pakistan-based hacking group named Storm-0156 to conduct its own operations since 2022. The activity, first observed in December 2022, is the latest instance of the nation-state adversary “embedding”}]]  – Read More  –...

Ransomware-hit vodka maker Stoli files for bankruptcy in the United States – Graham Cluley

– [[{“value”:”Stoli Group USA, the US subsidiary of vodka maker Stoli, has filed for bankruptcy – and a ransomware attack is at least partly to blame. The American branch of Stoli, which imports and distributes Stoli brands in the United States, as well as the Kentucky Owl bourbon brand it purchased in 2017, was hit by a ransomware attack in...

Study shows potentially higher prevalence of spyware infections than previously thought – Tim Starks

– [[{“value”:” High-powered spyware might be more prevalent on victims’ phones than commonly believed, research out Wednesday from iVerify suggests. Devices that the mobile device security firm’s tech scanned found seven Pegasus spyware infections among 2,500 users who volunteered to participate in its investigation with a $0.99  version of its tech as an app. “Our investigation detected 2.5 infected devices...