Category: Attack Feeds

0

ONLY Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Evaluation – [email protected] (The Hacker News)

– Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, it’s vital to understand the current cybersecurity vendor landscape and continually assess the effectiveness of available solutions. Luckily, the 2024 MITRE ATT&CK  – Read More  – The...

0

APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP – [email protected] (The Hacker News)

– [[{“value”:”The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files. The activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a “rogue RDP” technique that was previously”}]]  – Read More  – The Hacker...

0

Not Your Old ActiveState: Introducing our End-to-End OS Platform – [email protected] (The Hacker News)

– [[{“value”:”Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed true over the years: Our commitment to the open source community and companies using open source in their code. ActiveState has been helping enterprises manage open source for over a decade. In the early days, open source was in...

0

INTERPOL Pushes for “Romance Baiting” to Replace “Pig Butchering” in Scam Discourse – [email protected] (The Hacker News)

– [[{“value”:”INTERPOL is calling for a linguistic shift that aims to put to an end to the term “pig butchering,” instead advocating for the use of “romance baiting” to refer to online scams where victims are duped into investing in bogus cryptocurrency schemes under the pretext of a romantic relationship. “The term ‘pig butchering’ dehumanizes and shames victims of such...

0

Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected – [email protected] (The Hacker News)

– [[{“value”:”Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could pave the way for remote code execution. The issue, tracked as CVE-2024-53677, carries a CVSS score of 9.5 out of 10.0, indicating critical severity. The vulnerability shares similarities with another critical bug the project maintainers addressed in December 2023 (CVE-2023-50164, CVSS”}]]  – Read...

0

Meta Fined €251 Million for 2018 Data Breach Impacting 29 Million Accounts – [email protected] (The Hacker News)

– [[{“value”:”Meta Platforms, the parent company of Facebook, Instagram, WhatsApp, and Threads, has been fined €251 million (around $263 million) for a 2018 data breach that impacted millions of users in the bloc, in what’s the latest financial hit the company has taken for flouting stringent privacy laws. The Irish Data Protection Commission (DPC) said the data breach impacted approximately...

0

CISA delivers new directive to agencies on securing cloud environments – mbracken

– [[{“value”:” Federal civilian agencies have a new list of cyber-related requirements to address after the Cybersecurity and Infrastructure Security Agency on Tuesday issued guidance regarding the implementation of secure practices for cloud services. CISA’s Binding Operational Directive (BOD) 25-01 instructs agencies to identify all of its cloud instances and implement assessment tools, while also making sure that their cloud...

0

The AI Fix #29: AI on OnlyFans, and the bot that wants to be a billionaire – Graham Cluley

– [[{“value”:”In episode 29 of The AI Fix, an AI company makes the bold step of urging us to “stop hiring humans”, Graham is wrong about GB AI, parents prepare their kids for the imminent Moxie-mageddon, Google releases Gemini 2.0, and a robot is found dead at work and nobody knows why. Graham inspects the AI Miss World competition for...

0

Playbook advises federal grant managers how to build cybersecurity into their programs – Tim Starks

– [[{“value”:” Two U.S. cyber agencies released guidance Tuesday on how federal grant managers should incorporate cybersecurity in their programs for critical infrastructure projects, as well as how potential recipients can take it into account. The Office of the National Cyber Director and the Cybersecurity and Infrastructure Security Agency publication — the “Playbook for Strengthening Cybersecurity in Federal Grant Programs...

0

Clop is back to wreak havoc via vulnerable file-transfer software – Greg Otto

– [[{“value”:” In what we can assure you is a new cybersecurity incident despite sounding incredibly similar to incidents of past notoriety: threat actors tied to a notorious ransomware and extortion group have exploited file-transfer software to carry out attacks.  Clop has claimed responsibility for attacks tied to vulnerabilities in software made by Cleo, an Illinois-based IT company that sells...

0

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware – [email protected] (The Hacker News)

– [[{“value”:”A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate. “An attacker used social engineering via a Microsoft Teams call to impersonate a user’s client and gain remote access to their system,” Trend Micro researchers Catherine Loveria, Jovit Samaniego, and Gabriel Nicoleta said. “The attacker failed to...

0

Detailing the Attack Surfaces of the Tesla Wall Connector EV Charger – Dmitry Janushkevich

– [[{“value”:” The Tesla Wall Connector is a Level 2 electric vehicle charge station designed for use by residential home users. The device has a minimal user interface in its hardware, providing a Wi-Fi based interface for configuration and an NFC reader for user authentication. The device does not come with a dedicated mobile application out of the box; the...

0

Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks – [email protected] (The Hacker News)

– [[{“value”:”A new phishing campaign has been observed employing tax-themed lures to deliver a stealthy backdoor payload as part of attacks targeting Pakistan. Cybersecurity company Securonix, which is tracking the activity under the name FLUX#CONSOLE, said it likely starts with a phishing email link or attachment, although it said it couldn’t obtain the original email used to launch the attack....

0

Even Great Companies Get Breached — Find Out Why and How to Stop It – [email protected] (The Hacker News)

– [[{“value”:”Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses. But breaches still happen. So, what’s going wrong? The truth is, that attackers are constantly finding new ways to slip through cracks that often go unnoticed—even in well-prepared organizations....

0

5 Practical Techniques for Effective Cyber Threat Hunting – [email protected] (The Hacker News)

– [[{“value”:”Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot of research and proactive threat hunting. The problem here is that it is easy to get stuck in endless arrays of data and end up with no relevant intel. ...

0

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware – [email protected] (The Hacker News)

– [[{“value”:”A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT. “The attack chain used alternate data streams in a RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to pull down...

0

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection – [email protected] (The Hacker News)

– [[{“value”:”Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it a highly effective tool in modern cyber attacks,” Morphisec researcher Nadav Lorber said in a technical report published Monday. The attacks make use of fake update alerts that employ”}]] ...

0

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of flaws is below – CVE-2024-20767 (CVSS score: 7.4) – Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted”}]] ...

0

The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal – [email protected] (The Hacker News)

– [[{“value”:”A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. “The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007,” Kaspersky researchers Georgy Kucherin and Marc Rivero said in an...

0

Arctic Wolf acquires Cylance from BlackBerry for $160 million – Greg Otto

– [[{“value”:” Minnesota-based Arctic Wolf, a cybersecurity operations firm, announced an agreement Monday to acquire BlackBerry’s Cylance business for $160 million, a stark drop from the $1.4 billion BlackBerry initially paid to acquire the startup in 2018.  Arctic Wolf is integrating Cylance’s AI-powered endpoint security technology into its platform to broaden its security solutions. With this acquisition, Arctic Wolf plans...

0

CISA pitches updated cyber incident response plan as an ‘agile, actionable’ framework – mbracken

– [[{“value”:” The Cybersecurity and Infrastructure Security Agency on Monday opened a month-long public comment period for its updated draft plan detailing how the public and private sectors should respond to significant cyber incidents. The revamped National Cyber Incident Response Plan — an effort from CISA, the agency’s Joint Cyber Defense Collaborative and the Office of the National Cyber Director...

0

PHP backdoor looks to be work of Chinese-linked APT group – Greg Otto

– [[{“value”:” Cybersecurity researchers at a China-based cybersecurity company have uncovered an advanced PHP backdoor that suggests a new asset in the arsenal of Chinese-linked Advanced Persistent Threat group Winnti. Researchers at QiAnXin’s XLab discovered the backdoor, which they titled Glutton, targeting China, the United States, Cambodia, Pakistan, and South Africa. After initially discovering the malware in April of this...

0

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. “Entirely reliant on a single ad network for propagation, this campaign showcases the core mechanisms of malvertising — delivering over”}]]  – Read More  –...

0

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips – [email protected] (The Hacker News)

– [[{“value”:”This past week has been packed with unsettling developments in the world of cybersecurity. From silent but serious attacks on popular business tools to unexpected flaws lurking in everyday devices, there’s a lot that might have flown under your radar. Attackers are adapting old tricks, uncovering new ones, and targeting systems both large and small. Meanwhile, law enforcement has...

0

NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool – [email protected] (The Hacker News)

– [[{“value”:”A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. “NoviSpy allows for capturing sensitive personal data from a target’s phone after infection and provides the ability to turn on the phone’s microphone or camera remotely,” the”}]]  –...

0

Rydox cybercrime marketplace seixed by law enforcement, suspected admins arrested – Graham Cluley

– [[{“value”:”Rydox, an online marketplace used by cybercriminals to sell hacked personal information and tools to commit fraud, has been seized in an international law enforcement operation and its suspected administrators arrested. Read more in my article on the Hot for Security blog.”}]]  – Read More  – Graham Cluley 

0

Data Governance in DevOps: Ensuring Compliance in the AI Era – [email protected] (The Hacker News)

– With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility and compliance. As we enter the age of artificial intelligence (AI), the importance of robust pipeline governance has only intensified. With that said, we’ll explore the concept of CI/CD pipeline governance and why it’s vital, especially as AI becomes ...

0

Amnesty International exposes Serbian police’s use of spyware on journalists, activists – Tim Starks

– [[{“value”:” Serbian police and intelligence authorities have combined phone-cracking technology with spyware to eavesdrop on activists and journalists there, Amnesty International revealed in a report Monday, in what the human rights group says could be a disturbing preview of a future era of digital surveillance. Amnesty International’s 87-page document surveys the broader picture of digital spying on civil society...

0

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting China, the United States, Cambodia, Pakistan, and South Africa. QiAnXin XLab, which discovered the malicious activity in late April 2024, attributed the previously unknown malware with moderate confidence to the prolific Chinese nation-state group tracked Winnti (“}]]  – Read...

0

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers are calling attention to a new kind of investment scam that leverages a combination of social media malvertising, company-branded posts, and artificial intelligence (AI) powered video testimonials featuring famous personalities, ultimately leading to financial and data loss. “The main goal of the fraudsters is to lead victims to phishing websites and forms that harvest”}]]  – Read More ...

0

Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes – [email protected] (The Hacker News)

– [[{“value”:”The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia’s Federal Security Service (FSB) that involves recruiting Ukrainian minors for criminal activities under the guise of “quest games.” Law enforcement officials said that it detained two FSB agent groups following a special operation in Kharkiv. These groups, per the...

0

Devices with new AI updates are misunderstood as hacking – cyberpro

– [[{“value”:” As AI (artificial intelligence) continues to permeate our world at a very fast pace, we are witnessing the fact that it has entered the landscape at a faster rate than the development of protection software. Companies are gleefully and with almost reckless abandon, adding AI at every turn, and this alone makes use feel a […] The post...

0

Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action – [email protected] (The Hacker News)

– [[{“value”:”Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed the communications between the devices and their command-and-control (C2) servers by sinkholing the domains”}]]  – Read More ...

0

Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques – [email protected] (The Hacker News)

– [[{“value”:”Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. “The target of the threat actors were Thailand officials based on the nature of the lures,” Nikhil Hegde, senior engineer for Netskope’s Security Efficacy team, told The Hacker News. “The Yokai backdoor...

0

390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits – [email protected] (The Hacker News)

– [[{“value”:”A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is estimated to have enabled the exfiltration of over 390,000 credentials. The malicious activity is part of a broader attack campaign undertaken by a threat actor, dubbed MUT-1244 (where MUT refers to “mysterious unattributed threat”) by Datadog Security Labs, that”}]] ...

0

Arizona man arrested for alleged involvement in violent online terror networks – Greg Otto

– [[{“value”:” Baron Martin, a 20-year-old resident of Tucson, Arizona, was arrested Wednesday on charges of producing child sexual abuse material and cyberstalking. His arrest is connected to his involvement in online terror networks, specifically 764 and CVLT, which are known for violent extremist activities. Martin, also known under the alias “Convict,” is charged with significant involvement in these networks...