Category: Attack Feeds

0

Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection – [email protected] (The Hacker News)

– [[{“value”:”A security flaw has been disclosed in OpenWrt’s Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages. The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating critical severity. Flatt Security researcher RyotaK has been credited with discovering and reporting the”}]]  – Read...

0

DoJ Indicts 14 North Koreans for $88M IT Worker Fraud Scheme Over Six Years – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Department of Justice (DoJ) has indicted 14 nationals belonging to the Democratic People’s Republic of Korea (DPRK or North Korea) for their alleged involvement in a long-running conspiracy to violate sanctions and commit wire fraud, money laundering, and identity theft by illegally seeking employment in U.S. companies and non-profit organizations. “The conspirators, who worked for”}]]  – Read...

0

How to Generate a CrowdStrike RFM Report With AI in Tines – [email protected] (The Hacker News)

– [[{“value”:”Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform.  Their bi-annual “You Did What with Tines?!” competition highlights some of the most interesting workflows submitted by...

0

Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms – [email protected] (The Hacker News)

– [[{“value”:”Iran-affiliated threat actors have been linked to a new custom malware that’s geared toward IoT and operational technology (OT) environments in Israel and the United States. The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to attack IoT and supervisory control and data acquisition (SCADA) devices such as IP cameras, routers, programmable”}]]  – Read...

0

New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with capabilities to escalate privileges, hide files and directories, and conceal itself from system tools, while simultaneously evading detection. “PUMAKIT is a sophisticated loadable kernel module (LKM) rootkit that employs advanced stealth mechanisms to hide its presence and maintain communication with”}]]  – Read More  – The Hacker...

0

FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox (“rydox.ru” and “rydox[.]cc”) for selling stolen personal information, access devices, and other tools for conducting cybercrime and fraud. In tandem, three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli, have been arrested. Ardit”}]]  – Read More ...

0

Cybercriminal marketplace Rydox seized in international law enforcement operation – Greg Otto

– [[{“value”:” The Justice Department announced Thursday that it had participated in a coordinated effort to seize and dismantle Rydox, an online marketplace for stolen personal information and cybercrime tools. The operation led to the arrest of three individuals alleged to be the site’s administrators. Rydox has been linked to over 7,600 illicit sales and generated substantial profits since its...

0

Court indicts 14 North Korean IT workers tied to $88 million in illicit gains – Tim Starks

– [[{“value”:” A federal court has indicted 14 more North Korean IT workers as part of an ongoing U.S. government campaign to crack down on Pyongyang’s use of tech professionals to swindle American companies and nonprofits. The Justice Department said the 14 indicted workers generated at least $88 million throughout a conspiracy that stretched over approximately six years, ending in...

0

SolarWinds Access Rights Manager: One Vulnerability to LPE Them All – Piotr Bazydło

– [[{“value”:” Some time ago, I spent some time researching a core SolarWinds product, SolarWinds Platform (previously Orion Platform). At that time, I hadn’t been aware of the SolarWinds Access Right Manager product (Solar Winds ARM). Afterward, Trend Micro’s Zero Day Initiative began receiving submissions of vulnerabilities in Access Rights Manager (ARM). The first submissions we received were from Sina...

0

Doughnut orders disrupted! Krispy Kreme suffers hack attack – Graham Cluley

– [[{“value”:”Krispy Kreme, the dispenser of delectable doughnuts, says that it suffered a cyber attack at the end of last month which saw its IT systems compromised and has disrupted online orders in parts of the United States. Read more in my article on the Hot for Security blog.”}]]  – Read More  – Graham Cluley 

0

Notorious Nigerian cybercriminal tied to BEC scams extradited to U.S. – Greg Otto

– [[{“value”:” Abiola Kayode, a 37-year-old Nigerian national, has been extradited from Ghana to the United States to face charges of conspiracy to commit wire fraud.  Kayode, who was on the FBI’s Most Wanted cybercriminal list, is charged with participating in a business email compromise (BEC) scheme and romance fraud from January 2015 to September 2016, defrauding businesses of over...

0

International crackdown disrupts DDoS-for-hire operations – Greg Otto

– [[{“value”:” In a sweeping international crackdown, law enforcement agencies from 15 countries, including the United States and multiple European nations, have dismantled 27 of the most popular platforms used for carrying out distributed denial-of-service (DDoS) attacks, Europol announced Wednesday. The operation, known as PowerOFF, has led to the arrest of three administrators in France and Germany and identified 300...

0

Gamaredon Deploys Android Spyware “BoneSpy” and “PlainGnome” in Former Soviet States – [email protected] (The Hacker News)

– [[{“value”:”The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and PlainGnome, marking the first time the adversary has been discovered using mobile-only malware families in its attack campaigns. “BoneSpy and PlainGnome target former Soviet states and focus on Russian-speaking victims,” Lookout said in an analysis. “Both”}]]  – Read More ...

0

Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks. “Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and API”}]]  – Read More  – The...

0

Scammers Exploit Fake Domains in Dubai Police Phishing Scams – Waqas

– BforeAI has discovered a surge in phishing attacks targeting the Dubai Police, a government-run entity. Learn how cybercriminals are exploiting the Dubai Police name to steal personal information and money.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

27 DDoS-for-hire services disrupted in run-up to holiday season – Graham Cluley

– [[{“value”:”Operation PowerOFF has disrupted what was anticipated to be a surge of distributed denial-of-service (DDoS) attacks over the Christmas period by taking over two dozen “booter” or “stresser” websites offline. Read more in my article on the Tripwire State of Security blog.”}]]  – Read More  – Graham Cluley 

0

SaaS Budget Planning Guide for IT Professionals – [email protected] (The Hacker News)

– [[{“value”:”SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion in global SaaS spending this year, it’s no wonder SaaS budgets are a big deal in the world of finance and IT. Efficient SaaS utilization can significantly affect both the bottom line and employee productivity.  In this article, we’ll...

0

Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS – [email protected] (The Hacker News)

– [[{“value”:”Details have emerged about a now-patched security vulnerability in Apple’s iOS and macOS that, if successfully exploited, could sidestep the Transparency, Consent, and Control (TCC) framework and result in unauthorized access to sensitive information. The flaw, tracked as CVE-2024-44131 (CVSS score: 5.3), resides in the FileProvider component, per Apple, and has been addressed with improved”}]]  – Read More  –...

0

Smashing Security podcast #397: Snowflake hackers, and under the influence – Graham Cluley

– [[{“value”:”A Canadian man is arrested in relation to the Snowflake hacks from earlier this year – after a cybersecurity researcher managed to track his identity, and a cryptocurrency-trading Instagram influencer is in trouble with the law. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.”}]] ...

0

WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins – [email protected] (The Hacker News)

– [[{“value”:”Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door to a variety of attacks. The flaw, tracked as CVE-2024-11972 (CVSS score: 9.8), affects all versions of the plugin prior to 1.9.0. The plugin has over 10,000 active installations. “This flaw poses a significant security...

0

Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested – [email protected] (The Hacker News)

– [[{“value”:”A global law enforcement operation has failed 27 stresser services that were used to conduct distributed denial-of-service (DDoS) attacks and took them offline as part of a multi-year international exercise called PowerOFF. The effort, coordinated by Europol and involving 15 countries, dismantled several booter and stresser websites, including zdstresser.net, orbitalstress.net, and”}]]  – Read More  – The Hacker News 

0

Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches – Tim Starks

– [[{“value”:” The $3 billion that Congress folded into the annual defense policy bill to remove Chinese-made telecommunications technology from U.S. networks would be a huge start to defending against breaches like the Salt Typhoon espionage campaign, senators and hearing witnesses said Wednesday. Federal Communications Commission Chairwoman Jessica Rosenworcel recently told Hill leaders that the $1.9 billion Congress had devoted...

0

How Cryptocurrency Turns to Cash in Russian Banks – BrianKrebs

– [[{“value”:” A financial firm registered in Canada has emerged as the payment processor for dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services aimed at Russian-speaking customers, new research finds. Meanwhile, an investigation into the Vancouver street address used by this company shows it is home to dozens of foreign currency dealers, money transfer businesses, and cryptocurrency exchanges...

0

Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service – [email protected] (The Hacker News)

– [[{“value”:”The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat actors to deploy a known backdoor called Kazuar on target devices located in Ukraine. The new findings come from the Microsoft threat intelligence team, which said it observed the adversary leveraging the Amadey bot malware to download custom malware onto “specifically”}]]  –...

0

Turla living off other cybercriminals’ tools in order to attack Ukrainian targets – Greg Otto

– [[{“value”:” A Russian nation-state threat actor has been observed leveraging tools from other cybercriminal groups to compromise targets in Ukraine, a recent report by Microsoft Threat Intelligence disclosed. This clandestine approach, which is the second time in as many weeks that Microsoft has highlighted the group’s effort, shows how Turla uses a wide range of attack vectors to infiltrate...

0

New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools – [email protected] (The Hacker News)

– [[{“value”:”A newly devised technique leverages a Windows accessibility framework called UI Automation (UIA) to perform a wide range of malicious activities without tipping off endpoint detection and response (EDR) solutions. “To exploit this technique, a user must be convinced to run a program that uses UI Automation,” Akamai security researcher Tomer Peled said in a report shared with The...

0

Latest round of MITRE ATT&CK evaluations put cybersecurity products through rigors of ransomware  – Greg Otto

– [[{“value”:” MITRE Corporation released findings Wednesday from its latest round of ATT&CK evaluations, assessing the capabilities of enterprise cybersecurity solutions against some of the most prevalent ransomware tactics and North Korean malware. The sixth such evaluation from the nonprofit research organization measured 19 different vendors’ ability to protect enterprise systems by evaluating them against two prominent ransomware strains -—Cl0p...

0

ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago. “Zloader 2.9.4.0 adds notable improvements including a custom DNS tunnel protocol for C2 communications and an interactive shell”}]]  – Read...

0

Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have flagged a “critical” security vulnerability in Microsoft’s multi-factor authentication (MFA) implementation that allows an attacker to trivially sidestep the protection and gain unauthorized access to a victim’s account. “The bypass was simple: it took around an hour to execute, required no user interaction and did not generate any notification or provide the”}]]  – Read More  –...

0

Why Americans must be prepared for cybersecurity’s worst – Greg Otto

– [[{“value”:” The interconnected world we live in has brought incredible opportunities for growth in America. It’s made life better in ways we don’t think about — from the phone in your pocket to the groceries at your local store, networks touch and affect almost all aspects of our daily lives. But there is an old adage in war: every...

0

Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia – [email protected] (The Hacker News)

– [[{“value”:”A suspected China-based threat actor has been linked to a series of cyber attacks targeting high-profile organizations in Southeast Asia since at least October 2023. The espionage campaign targeted organizations in various sectors spanning government ministries in two different countries, an air traffic control organization, a telecoms company, and a media outlet, the Symantec Threat Hunter Team”}]]  – Read...

0

What is Nudge Security and How Does it Work? – [email protected] (The Hacker News)

– [[{“value”:”In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies whenever and wherever they need. While this has been a critical boon to productivity and innovation in the digital enterprise, it has upended traditional approaches to IT security and governance. Nudge Security is the world’s first and...

0

Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017 – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a novel surveillance program that’s suspected to be used by Chinese police departments as a lawful intercept tool to gather a wide range of information from mobile devices. The Android tool, codenamed EagleMsgSpy by Lookout, has been operational since at least 2017, with artifacts uploaded to the VirusTotal malware scanning platform as recently as”}]]  –...

0

LevelBlue SOC Analysts See Sharp Rise in Cyber Threats: Stay Vigilant – [email protected]

– [[{“value”:” This holiday season our SOC analysts have observed a sharp uptick in cyber threat activity. Specifically, they’ve seen a rise in attempted ransomware attacks, which started during the American Thanksgiving holiday period (November 25–31, 2024) and are expected to continue throughout the holiday season. We’re sharing details on the threat actors involved, their tactics, as well as recommendations...