Category: Attack Feeds

0

Legal barriers complicate justice for spyware victims – Greg Otto

– [[{“value”:” Last month, Apple sought to drop its lawsuit against spyware industry leader NSO Group, citing a number of difficulties with advancing the case. This month, WhatsApp parent company Meta asked a judge to punish the same company for not complying with orders to hand over its source code. And for years, many victims have failed to get courts...

0

Malvertising Campaign Hijacks Facebook Accounts to Spread SYS01stealer Malware – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta’s advertising platform and hijacked Facebook accounts to distribute information known as SYS01stealer. “The hackers behind the campaign use trusted brands to expand their reach,” Bitdefender Labs said in a report shared with The Hacker News. “The malvertising campaign leverages nearly a hundred malicious”}]]  – Read More  – The...

0

Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information – [email protected] (The Hacker News)

– [[{“value”:”A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs. The attack, codenamed CrossBarking, could have made it possible to conduct actions such as capturing screenshots, modifying browser settings, and account hijacking, Guardio Labs said. To demonstrate the issue, the company said it managed to publish...

0

Change Healthcare Breach Hits 100M Americans – BrianKrebs

– [[{“value”:” Change Healthcare says it has notified approximately 100 million Americans that their personal, financial and healthcare records may have been stolen in a February 2024 ransomware attack that caused the largest ever known data breach of protected health information. Image: Tamer Tuncay, Shutterstock.com. A ransomware attack at Change Healthcare in the third week of February quickly spawned disruptions...

0

Hackers find 15,000 credentials by scanning for git configuration – Christian Vasquez

– [[{“value”:” More than 15,000 stolen cloud service credentials were discovered in an open Amazon Web Services bucket by the cybersecurity firm Sysdig. In a report released Wednesday, Sysdig researchers revealed that a global operation called EMERALDWHALE stole credentials belonging to cloud service and email providers, as well as other services, by targeting exposed git configurations. The credentials, which researchers...

0

Coker: Agencies flooded with cyberattacks, beset with complex problems can’t always innovate – Tim Starks

– [[{“value”:” A deluge of cyberattacks on federal agencies, and the complexity of the challenges they face, makes it hard for them to advance new approaches to defending their networks, National Cyber Director Harry Coker Jr. said Wednesday. Speaking at CyberTalks, hosted by CyberScoop, Coker said that’s why his White House office focuses on strategy and policy to tackle complex...

0

Embarking on a Compliance Journey? Here’s How Intruder Can Help – [email protected] (The Hacker News)

– [[{“value”:”Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria these frameworks demand, making your compliance journey much smoother. Read on to understand how to meet the requirements of each framework to keep your customer data safe. How Intruder”}]] ...

0

Researchers Uncover Python Package Targeting Crypto Wallets with Malicious Code – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading tool but harbors functionality designed to steal sensitive data and drain assets from victims’ crypto wallets. The package, named “CryptoAITools,” is said to have been distributed via both Python Package Index (PyPI) and bogus GitHub repositories. It was downloaded over 1,300″}]]  – Read More ...

0

US charges Russian national for developing RedLine infostealer – Christian Vasquez

– [[{“value”:” The United States has charged a Russian national for his alleged role in developing infostealer malware, according to an unsealed criminal complaint from the Western District of Texas. According to the documents, Maxim Rudometov is one of the developers and administrators of RedLine, one of the most prevalent infostealers used by cybercriminals. Rudometov regularly accessed and managed RedLine,...

0

Senator urges Meta CEO to maintain election research partnerships – djohnson

– [[{“value”:” A Democratic Senator is pressing Meta to continue partnering with independent researchers to study the impact of their platforms on the 2024 elections. In a letter sent Tuesday to Meta CEO Mark Zuckerberg, Sen. Ed Markey, D-Mass., praised the company’s U.S. 2020 Facebook and Instagram Election Study, which opened up Meta’s platform and algorithm to study by outside...

0

The AI Fix #22: Probing AI tongues and ASCII smuggling attacks – Graham Cluley

– [[{“value”:”In episode 22 of “The AI Fix”, our hosts encounter a bowl of buttermilk king crab ice cream prepared by a baby hippo, a TV station finds an even better way to generate programme ideas than using a tank full of manatees, and Elon Musk does the world’s most expensive Blade Runner cosplay. Graham discovers a robot tongue and...

0

Researchers Uncover Vulnerabilities in Open-Source AI and ML Models – [email protected] (The Hacker News)

– [[{“value”:”A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported as part of Protect AI’s Huntr bug bounty platform. The most severe of...

0

French ISP Free confirms data breach after hacker puts customer data up for auction – Graham Cluley

– [[{“value”:”One of the largest internet providers in France, Free S.A.S, has confirmed that it recently suffered a cybersecurity breach after a hacker attempted to sell what purported to be stolen data from the organisation on the dark web. Read more in my article on the Hot for Security blog.”}]]  – Read More  – Graham Cluley 

0

Cyber insecurity now impacts the health and wellness of Americans. We need a clearer treatment plan. – Greg Otto

– [[{“value”:” When a hospital in Wichita, Kansas, faced dangerous disruptions to patient care in May, it was not due to the challenges one might expect, such as hospital-acquired infections or staffing shortages. Ascension Via Christi St. Joseph experienced a cyberattack. Unfortunately, this hospital was not alone. In February, cybercriminals hacked Change Healthcare, a subsidiary of UnitedHealth — one of...

0

Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus – [email protected] (The Hacker News)

– [[{“value”:”The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked as RedLine and MetaStealer. The takedown, which took place on October 28, 2024, is the result of an international law enforcement task force codenamed Operation Magnus that involved authorities from the U.S., the U.K., Belgium, Portugal, and”}]]  – Read...

0

A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation – [email protected] (The Hacker News)

– [[{“value”:”Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant: “When you have eliminated the impossible, whatever remains, however improbable, must be the truth.” Rather than following every lead, Holmes focuses on the details that are needed to move him...

0

U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing – [email protected] (The Hacker News)

– [[{“value”:”The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the threat intelligence information shared between the private sector, individual researchers, and Federal Departments and Agencies. “The USG follows TLP markings on cybersecurity information voluntarily shared by an individual, company, or other any organization, when not in”}]]  – Read More ...

0

New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors – [email protected] (The Hacker News)

– [[{“value”:”More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found that the latest AMD and Intel processors are still susceptible to speculative execution attacks. The attack, disclosed by ETH Zürich researchers Johannes Wikner and Kaveh Razavi, aims to undermine the Indirect Branch Predictor Barrier (IBPB) on x86 chips, a...

0

CISA sees elimination of ‘bad practices’ as next secure-by-design step – mbracken

– [[{“value”:” HERSHEY, Pa. — A year-and-a-half after launching its global secure-by-design initiative, the Cybersecurity and Infrastructure Security Agency is “thrilled” by the progress it’s made in getting vendors on board and now turning its focus to a new program aimed at drawing more attention to especially risky software-building practices. Rina Rakipi, who leads strategic partnerships and vulnerability program development...

0

Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services – [email protected] (The Hacker News)

– [[{“value”:”A government entity and a religious organization in Taiwan were the target of a China-linked threat actor known as Evasive Panda that infected them with a previously undocumented post-compromise toolset codenamed CloudScout. “The CloudScout toolset is capable of retrieving data from various cloud services by leveraging stolen web session cookies,” ESET security researcher Anh Ho said. “Through”}]]  – Read...

0

Operation Magnus targets Redline, Meta infostealers – Christian Vasquez

– [[{“value”:” The Dutch National Police, the FBI, and a coalition of international law enforcement agencies disrupted two infostealer operations and gained “full access” to the criminals back-end infrastructure. A website announcing the operation, posted Monday, showcases the latest effort by international authorities to disrupt cybercriminal infrastructure. “On the 28th of October 2024 the Dutch National Police, working in close...

0

BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers – [email protected] (The Hacker News)

– [[{“value”:”Three malicious packages published to the npm registry in September 2024 have been found to contain a known malware called BeaverTail, a JavaScript downloader and information stealer linked to an ongoing North Korean campaign tracked as Contagious Interview. The Datadog Security Research team is monitoring the activity under the name Tenacious Pungsan, which is also known by the monikers”}]] ...

0

Russian Espionage Group Targets Ukrainian Military with Malware via Telegram – [email protected] (The Hacker News)

– [[{“value”:”A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of Windows and Android malware to target the Ukrainian military under the Telegram persona Civil Defense. Google’s Threat Analysis Group (TAG) and Mandiant are tracking the activity under the name UNC5812. The threat group, which operates a Telegram channel named civildefense_com_ua, was created on”}]]  –...

0

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – Oct 27) – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity news can sometimes feel like a never-ending horror movie, can’t it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your head spin. But don’t worry, we’re here to break it all down...

0

Suspected Russian hacking, influence operations take aim at Ukrainian military recruiting – Tim Starks

– [[{“value”:” A suspected Russian group is targeting potential Ukrainian military recruits in an espionage campaign that’s running concurrently with an influence operation designed to undermine Ukraine’s broader military mobilization, according to research published Monday. The hybrid campaign apparently looks to capitalize on fears about a Ukrainian mobilization law that went into effect this year that lowered the minimum conscription...

0

Meet the winners of the 2024 CyberScoop 50 awards – Greg Otto

– [[{“value”:” Scoop News Group is delighted to present the outstanding recipients of the 2024 CyberScoop 50 Awards. These prestigious accolades recognize the exceptional achievements of cybersecurity leaders who safeguard our essential networks, data, and infrastructure while pioneering innovation in this critical field. This year, voters from across the nation spent three months nominating and selecting leaders who have exhibited...

0

Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes – [email protected] (The Hacker News)

– [[{“value”:”Operational Technology (OT) security has affected marine vessel and port operators, since both ships and industrial cranes are being digitalized and automated at a rapid pace, ushering in new types of security challenges. Ships come to shore every six months on average. Container cranes are mostly automated. Diagnostics, maintenance, upgrade and adjustments to these critical systems are done”}]]  –...

0

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to abuse legitimate services like Cloudflare and Microsoft Sway to their advantage. “The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials for”}]]  – Read More ...

0

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel – [email protected] (The Hacker News)

– [[{“value”:”A new attack technique could be used to bypass Microsoft’s Driver Signature Enforcement (DSE) on fully patched Windows systems, leading to operating system (OS) downgrade attacks. “This bypass allows loading unsigned kernel drivers, enabling attackers to deploy custom rootkits that can neutralize security controls, hide processes and network activity, maintain stealth, and much more,” SafeBreach”}]]  – Read More  –...

0

Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions – [email protected] (The Hacker News)

– [[{“value”:”Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant reported that a court in St. Petersburg found Artem Zaets, Alexei Malozemov, Daniil Puzyrevsky, and Ruslan”}]]  –...

0

Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining – [email protected] (The Hacker News)

– [[{“value”:”The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale campaign targeting cloud-native environments for mining cryptocurrencies and renting out breached servers to third-parties. “The group is currently targeting exposed Docker daemons to deploy Sliver malware, a cyber worm, and cryptominers, using compromised servers and Docker Hub as the infrastructure”}]]  – Read More  –...

0

CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities – [email protected] (The Hacker News)

– [[{“value”:”The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. “The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zero-trust architecture,” CERT-UA said. “These emails contain attachments in the form of Remote Desktop Protocol (‘.rdp’”}]]  – Read More  – The...

0

Report: Chinese hackers used telecom access to go after phones of Trump, Vance – Tim Starks

– [[{“value”:” Federal authorities say they are investigating “unauthorized access to telecommunications commercial infrastructure” from Chinese hackers as news reports allege that the hackers may have used that access to target the phones and data of Republican presidential candidate Donald Trump and vice-presidential candidate J.D. Vance. In a joint statement released Friday, the FBI and the Cybersecurity and Infrastructure Security...

0

Pennsylvania officials rebut false voter fraud claims from home and abroad – djohnson

– [[{“value”:” An elections office in key presidential swing state Pennsylvania said a video circulating online this week purporting to depict the destruction of valid ballots is  fake, and a prominent disinformation researcher claims a Russian influence actor is behind the effort. The video appeared on X and other social media sites this week showing an unidentified individual opening envelopes...

0

US offers $10 million bounty for members of Iranian hacking gang – Graham Cluley

– [[{“value”:”A US $10 million reward is being offered to anyone who has information about four members of an Iranian hacking group. The US government’s Rewards for Justice initiative is making the reward available for information about four men believed to be members of Shahid Hemmat, a hacking gang backed by Iran’s Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC). Read...

0

Change Healthcare breach affected 100 million Americans, marking a new record – Tim Starks

– [[{“value”:” The Change Healthcare data breach in February affected 100 million Americans, the company told the Health and Human Services Department this week, making it the biggest breach of health care data ever reported to U.S. regulators. The development is the latest ripple in what was already an unprecedented attack, one in which the company paid a $22 million...

0

Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite – [email protected] (The Hacker News)

– [[{“value”:”A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. “This flaw allows an unauthenticated local attacker to”}]]  – Read More  –...

0

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security – [email protected] (The Hacker News)

– [[{“value”:”Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the “most advanced security architecture ever deployed for cloud AI compute at scale.” With the new technology, the...