Category: Attack Feeds

New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a new botnet malware family called Gorilla (aka GorillaBot) that is a variant of the leaked Mirai botnet source code. Cybersecurity firm NSFOCUS, which identified the activity last month, said the botnet “issued over 300,000 attack commands, with a shocking attack density” between September 4 and September 27, 2024. No less than 20,000 commands designed”}]] ...

Reducing Alert Fatigue by Streamlining SOC Processes – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  We wanted to know what was going on within our vast networks; modern tools have made it possible for us to know too much. Some data...

Modernization of Authentication: Webinar on MFA, Passwords, and the Shift to Passwordless – [email protected] (The Hacker News)

– [[{“value”:”The interest in passwordless authentication has increased due to the rise of hybrid work environments and widespread digitization. This has led to a greater need for reliable data security and user-friendly interfaces. Without these measures, organizations are at risk of experiencing data breaches, leaks, and significant financial losses.  While traditional password-based systems offer”}]]  – Read More  – The Hacker...

Google Blocks Unsafe Android App Sideloading in India for Improved Fraud Protection – [email protected] (The Hacker News)

– [[{“value”:”Google has announced that it’s piloting a new security initiative that automatically blocks sideloading of potentially unsafe Android apps in India, after similar tests in Singapore, Thailand, and Brazil. The enhanced fraud protection feature aims to keep users safe when they attempt to install malicious apps from sources other than the Google Play Store, such as web browsers, messaging...

THN Cybersecurity Recap: Top Threats and Trends (Sep 30 – Oct 6) – [email protected] (The Hacker News)

– [[{“value”:”Ever heard of a “pig butchering” scam? Or a DDoS attack so big it could melt your brain? This week’s cybersecurity recap has it all – government showdowns, sneaky malware, and even a dash of app store shenanigans. Get the scoop before it’s too late! ⚡ Threat of the Week Double Trouble: Evil Corp & LockBit Fall: A consortium...

Critical Apache Avro SDK Flaw Allows Remote Code Execution in Java Applications – [email protected] (The Hacker News)

– [[{“value”:”A critical security flaw has been disclosed in the Apache Avro Java Software Development Kit (SDK) that, if successfully exploited, could allow the execution of arbitrary code on susceptible instances. The flaw, tracked as CVE-2024-47561, impacts all versions of the software prior to 1.11.4. “Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad...

E.U. Court Limits Meta’s Use of Personal Facebook Data for Targeted Ads – [email protected] (The Hacker News)

– [[{“value”:”Europe’s top court has ruled that Meta Platforms must restrict the use of personal data harvested from Facebook for serving targeted ads even when users consent to their information being used for advertising purposes, a move that could have serious consequences for ad-driven companies operating in the region. “An online social network such as Facebook cannot use all of...

Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability – [email protected] (The Hacker News)

– [[{“value”:”Apple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user’s passwords to be read out aloud by its VoiceOver assistive technology. The vulnerability, tracked as CVE-2024-44204, has been described as a logic problem in the new Passwords app impacting a slew of iPhones and iPads. Security researcher Bistrit Daha...

Election offices are preparing for a smooth voting process — and angry voters – djohnson

– [[{“value”:” Roughly a month out from Election Day, officials from across the country said they remain focused on carrying out a smooth voting process while bracing for the possibility that their offices could be overwhelmed by angry voters and false claims of election fraud. Speaking at a gathering in Washington D.C. hosted by the Partnership for Large Election Jurisdictions,...

U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown – [email protected] (The Hacker News)

– [[{“value”:”Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties to Russia to facilitate computer fraud and abuse in the country. “The Russian government ran this scheme to steal Americans’ sensitive information, using seemingly legitimate email accounts to trick victims into revealing account credentials”}]]  –...

Cybersecurity and compliance: The dynamic duo of 2024 – Graham Cluley

– Graham Cluley Security News is sponsored this week by the folks at ManageEngine. Thanks to the great team there for their support! It’s almost the end of 2024, and one thing is clear: cybersecurity and compliance are no longer optional; they’re inseparable pillars of survival. This year has seen some of the most severe cyber … Continue reading “Cybersecurity...

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks – [email protected] (The Hacker News)

– [[{“value”:”A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions. The flaw, tracked as CVE-2024-47374 (CVSS score: 7.2), has been described as a stored cross-site scripting (XSS) vulnerability impacting all versions of the plugin up to and including 6.5.0.2. It was”}]] ...

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors – [email protected] (The Hacker News)

– [[{“value”:”Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds. The web infrastructure and security company said it fended off “over one hundred hyper-volumetric L3/4 DDoS attacks throughout the month, with many exceeding 2 billion packets per second (Bpps) and 3 terabits per second (“}]] ...

How to Get Going with CTEM When You Don’t Know Where to Start – [email protected] (The Hacker News)

– Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization. Each of these stages plays a crucial role in identifying, addressing, and mitigating vulnerabilities –  – Read More  – The Hacker...

Sellafield nuclear site hit with £332,500 fine after “significant cybersecurity shortfalls” – Graham Cluley

– [[{“value”:”The UK’s Sellafield nuclear waste processing and storage site has been fined £332,500 by regulators after its IT systems were found to have been left vulnerable to hackers and unauthorised access for years. Read more in my article on the Hot for Security blog.”}]]  – Read More  – Graham Cluley 

Former Mesa County clerk sentenced to 9 years for 2020 voting system breach – djohnson

– [[{“value”:” Tina Peters, a former county clerk for Mesa County, Colo., was sentenced to nine years in prison after being convicted earlier this year on seven felony counts for facilitating a data breach involving voting system data in the wake of the 2020 presidential election. The incident is widely viewed as one of the most serious breaches of election...

What’s new from this year’s Counter Ransomware Initiative summit, and what’s next – Tim Starks

– [[{“value”:” After trying some new approaches to the U.S.-led global Counter Ransomware Initiative this year, the international coalition is already laying the groundwork for next year’s agenda. Thursday wrapped up meetings of the 68 countries with an optional capacity-building day to help those participating nations “get through practical skills,” Anne Neuberger, the deputy national security advisor for cyber and...

Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks – [email protected] (The Hacker News)

– [[{“value”:”Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband (i.e., modem) refers to a processor on the device that’s responsible for handling all connectivity, such as LTE, 4G, and 5G, with a mobile phone cell tower or base station...

From Pwn2Own Automotive: More Autel Maxicharger Vulnerabilities – Connor Ford

– [[{“value”:” This blog post highlights two additional vulnerabilities in the Autel Maxicharger that were exploited at Pwn2Own Automotive 2024. Details of the patches are also included. Autel has been informed and has deployed a firmware update (v1.35) to address both of these issues. If you want to read about other Autel bugs reported at Pwn2Own, you check out our earlier...

The Secret Weakness Execs Are Overlooking: Non-Human Identities – [email protected] (The Hacker News)

– [[{“value”:”For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls kept our data and systems safe. The problem is that we no longer operate within the confines of physical...

DOJ, Microsoft seize more than 100 domains used by the FSB – AJ Vicens

– [[{“value”:” Microsoft and the U.S. Department of Justice on Thursday announced the seizure of more than 100 domains used by a Russian-backed hacking unit to target more than two dozen civil society organizations between January 2023 and August 2024. Microsoft’s Digital Crimes Unit filed a lawsuit with the NGO Information Sharing and Analysis Center (NGO-ISAC) to seize 66 unique...

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking – [email protected] (The Hacker News)

– [[{“value”:”Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim of running a cryptocurrency miner and proxyjacking software. “Perfctl is particularly elusive and persistent, employing several sophisticated techniques,” Aqua security researchers Assaf Morag and Idan Revivo said in a report shared with The Hacker News. “When a new user...

LevelBlue: Driving Cyber Resilience in October (and Beyond) – [email protected]

– [[{“value”:” As we navigate the rapidly evolving technology landscape in 2024, Cybersecurity Awareness Month, now in its 21st year, highlights the increasing importance of protecting against the evolving threat environment across all areas of a business. This initiative motivates both individuals and entire organizations to adopt essential practices that enhance online safety. Every October, Cybersecurity Awareness Month focuses on...

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks – [email protected] (The Hacker News)

– [[{“value”:”Threat actors with ties to North Korea have been observed delivering a previously undocumented backdoor and remote access trojan (RAT) called VeilShell as part of a campaign targeting Cambodia and likely other Southeast Asian countries. The activity, dubbed SHROUDED#SLEEP by Securonix, is believed to be the handiwork of APT37, which is also known as InkySquid, Reaper, RedEyes, Ricochet Chollima,”}]] ...

A Single Cloud Compromise Can Feed an Army of AI Sex Bots – BrianKrebs

– [[{“value”:” Organizations that get relieved of credentials to their cloud environments can quickly find themselves part of a disturbing new trend: Cybercriminals using stolen cloud credentials to operate and resell sexualized AI-powered chat services. Researchers say these illicit chat bots, which use custom jailbreaks to bypass content filtering, often veer into darker role-playing scenarios, including child sexual exploitation and...

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa – [email protected] (The Hacker News)

– [[{“value”:”INTERPOL has announced the arrest of eight individuals in Côte d’Ivoire and Nigeria as part of a crackdown on phishing scams and romance cyber fraud. Dubbed Operation Contender 2.0, the initiative is designed to tackle cyber-enabled crimes in West Africa, the agency said. One such threat involved a large-scale phishing scam targeting Swiss citizens that resulted in financial losses...

LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint Global Effort – [email protected] (The Hacker News)

– [[{“value”:”A new wave of international law enforcement actions has led to four arrests and the takedown of nine servers linked to the LockBit (aka Bitwise Spider) ransomware operation, marking the latest salvo against what was once a prolific financially motivated group. This includes the arrest of a suspected LockBit developer in France while on holiday outside of Russia, two...

Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Endpoint Manager (EPM) that the company patched in May to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-29824, carries a CVSS score of 9.6 out of a maximum of 10.0, indicating critical severity. “An”}]]  –...

Smashing Security podcast #387: Breaches in your genes, and Kaspersky switcheroo raises a red flag – Graham Cluley

– [[{“value”:”From family tree to jail cell? A hacker is alleged to have exploited information on genealogy websites to steal millions from public companies. Meanwhile, Kaspersky’s US customers are wondering – what on earth is UltraAV? All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole...

Research reveals vulnerabilities in routers that left 700,000-plus exposed – Tim Starks

– [[{“value”:” Researchers uncovered 14 vulnerabilities, one of them the most severe kind, that left more than 700,000 routers made by Taiwan-based DrayTek exposed to the public internet, but that the company has since patched. ForeScout’s Vedere Labs revealed the vulnerabilities Wednesday and urged security pros to make sure they implemented the fixes, adding that 75% of the routers are...

Fake Trading Apps Target Victims Globally via Apple App Store and Google Play – [email protected] (The Hacker News)

– [[{“value”:”A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well as phishing sites, to defraud victims, per findings from Group-IB. The campaign is part of a consumer investment fraud scheme that’s also widely known as pig butchering, in which prospective victims are lured into making investments in cryptocurrency or...

Russian authorities arrest nearly 100 in raids tied to cybercriminal money laundering – AJ Vicens

– [[{“value”:” Russian authorities announced Wednesday the arrests of nearly 100 people related to the UAPS payment system and Cryptex cryptocurrency exchanges in an investigation into cybercrime-related money laundering. The Main Investigative Department of the Investigative Committee of Russia — Russia’s top federal law enforcement agency — released the information along with a one-minute video showing authorities breaking down doors, making arrests,...

China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration – [email protected] (The Hacker News)

– [[{“value”:”A previously undocumented threat actor called CeranaKeeper has been linked to a string of data exfiltration attacks targeting Southeast Asia. Slovak cybersecurity firm ESET, which observed campaigns targeting governmental institutions in Thailand starting in 2023, attributed the activity cluster as aligned to China, leveraging tools previously identified as used by the Mustang Panda actor. “The”}]]  – Read More  –...

Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals – [email protected] (The Hacker News)

– [[{“value”:”A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent efforts to single out the sector under the guise of fake job applicant lures. “A sophisticated spear-phishing lure tricked a recruitment officer into downloading and executing a malicious file disguised as a resume, leading to a more_eggs backdoor infection,””}]]  – Read More ...

Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities – [email protected] (The Hacker News)

– [[{“value”:”A little over a dozen new security vulnerabilities have been discovered in residential and enterprise routers manufactured by DrayTek that could be exploited to take over susceptible devices. “These vulnerabilities could enable attackers to take control of a router by injecting malicious code, allowing them to persist on the device and use it as a gateway into enterprise networks,”...

Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by malicious actors by exploiting a security vulnerability dubbed CosmicSting. Tracked as CVE-2024-34102 (CVSS score: 9.8), the critical flaw relates to an improper restriction of XML external entity reference (XXE) vulnerability that could result in remote code execution. The shortcoming,”}]]  – Read More ...