News Items

  • news

    Visible to the public "Microsoft Names Russian Threat Actor Cadet Blizzard"

    Microsoft Threat Intelligence has recently shed light on a previously tracked threat actor (DEV-0586), now known as "Cadet Blizzard." Microsoft believes Cadet Blizzard to be associated with the Russian General Staff Main Intelligence Directorate (GRU) and operates separately from other known GRU-affiliated groups. Microsoft noted that while the group's activities may be less prolific than other threat actors, their destructive campaigns have targeted government organizations and IT providers primarily in Ukraine, with occasional operations in Europe and Latin America. From a technical standpoint, Cadet Blizzard predominantly achieved initial access by exploiting web servers and vulnerabilities in Confluence servers, Exchange servers, and open-source platforms. Microsoft noted that they then achieved persistence on networks using web shells like P0wnyshell and reGeorg, escalated privileges through living-off-the-land techniques, and harvested credentials. To maintain operational security, Cadet Blizzard used anonymization services like IVPN, SurfShark, and Tor. They employed anti-forensics techniques and carried out destructive actions, including data exfiltration, deploying malware, hack-and-leak operations, and information operations through Tor sites and Telegram channels.

    Infosecurity reports: "Microsoft Names Russian Threat Actor Cadet Blizzard"

  • news

    Visible to the public "NSA and CISA Release Guide To Protect Baseboard Management Controllers"

    Baseboard Management Controllers (BMCs) are common server-class computer components. Cybercriminals could exploit the capabilities of these controllers to compromise industry and government systems. Neal Ziring, the Technical Director of the National Security Agency's (NSA) Cybersecurity Directorate, commented that implementing effective security defenses for these embedded controllers is often neglected. The firmware in these controllers is highly privileged, so malicious actors can use the firmware's capabilities to remotely control a critical server while evading traditional security tools. Therefore, organizations must take measures to protect servers with BMCs. NSA and the Cybersecurity and Infrastructure Security Agency (CISA) published the Cybersecurity Information Sheet "Harden Baseboard Management Controllers" to help network defenders. The guidance provides network defenders with recommendations and mitigations for securing their systems. This article continues to discuss the guidance released on hardening BMCs.

    NSA reports "NSA and CISA Release Guide To Protect Baseboard Management Controllers"

  • news

    Visible to the public "New Research: 6% of Employees Paste Sensitive Data into GenAI tools as ChatGPT"

    Generative Artificial Intelligence (AI) tools such as ChatGPT pose significant threats to organizations' sensitive data. New research from the browser security company LayerX highlighted the scope and nature of these risks. The "Revealing the True GenAI Data Exposure Risk" report provides data protection stakeholders with essential insights and helps them to take proactive measures. The report identifies key areas of concern by analyzing the use of ChatGPT and other generative AI applications by 10,000 employees. Six percent of employees have pasted sensitive information into generative AI, with 4 percent engaging in this behavior weekly. This recurring behavior poses a significant risk of data exfiltration. The report addresses crucial risk assessment questions, such as the actual scope of generative AI usage across enterprise workforces, the proportion of "paste" actions within this usage, the number of employees pasting sensitive data into this AI, the departments that use generative AI the most, and the types of sensitive data that are most likely to be exposed through pasting. This article continues to discuss findings from the LayerX study on the risks posed by generative AI tools such as ChatGPT to organizations' sensitive data.

    THN reports "New Research: 6% of Employees Paste Sensitive Data into GenAI tools as ChatGPT"

  • news

    Visible to the public "Barracuda Zero-Day Exploited by Chinese Actor"

    A zero-day vulnerability in the Barracuda Email Security Gateway (ESG) discovered in late May has been exploited in a Chinese espionage campaign since October 2022, according to security researchers at Mandiant. The researchers noted that new threat actor UNC4841 began sending phishing emails as far back as October 10 last year. The researchers stated that these malicious emails contained file attachments designed to exploit the Barracuda bug CVE-2023-2868 to gain initial access to vulnerable appliances. Once a foothold had been established, the group used Saltwater, Seaside, and Seaspray malware to maintain a presence on the devices by masquerading as legitimate Barracuda ESG modules or services. The researchers noted that post-initial compromise, they observed UNC4841 aggressively target specific data of interest for exfiltration and, in some cases, leverage access to an ESG appliance to conduct lateral movement into the victim network or to send mail to other victim appliances. The researchers also observed UNC4841 deploy additional tooling to maintain a presence on ESG appliances. Barracuda discovered the campaign on May 19 and released patches to contain and remediate the threat two days later. However, the threat group switched malware and deployed new persistence mechanisms to maintain access. The researchers noted that between May 22 and 24, UNC4841 targeted victims in 16 countries with "high frequency" operations, prompting Barracuda to take the unusual step of urging customers to isolate and replace their appliances, whatever their patch status. The researchers stated that UNC4841 has shown to be highly responsive to defensive efforts and actively modifies TTPs to maintain their operations.

    Infosecurity reports: "Barracuda Zero-Day Exploited by Chinese Actor"

  • news

    Visible to the public "Russian Hackers Use PowerShell USB Malware to Drop Backdoors"

    The Russian state-sponsored hacking group Gamaredon, also known as Armageddon or Shuckworm, continues to target critical organizations in Ukraine's military and security intelligence sectors using updated tools and novel infection techniques. Previously, the Russian hackers with ties to the FSB, were observed using information-stealing malware against Ukrainian state organizations. They were using new variants of their "Pteranodon" malware and a default Word template hijacker. Symantec's threat research team has reported that the threat actors have recently begun using USB malware to spread to additional systems within infected networks. Gamaredon's newest campaign targets HR departments, suggesting that the threat actors are aiming for spear-phishing attacks within breached organizations. This article continues to discuss the Gamaredon hacking group using USB malware to spread to additional systems inside infected networks.

    Bleeping Computer reports "Russian Hackers Use PowerShell USB Malware to Drop Backdoors"

  • news

    Visible to the public "Cybercriminals Return to Business as Usual in a Post-pandemic World"

    According to Proofpoint, cybercriminals resumed normal operations in 2022 following two years of pandemic-induced disruption. As COVID-19 medical and economic programs began to slow down, attackers were forced to find new ways to make a living by sharpening their social engineering skills, commercializing once-sophisticated attack techniques, and creatively seeking new opportunities. From scaling brute-force and targeted attacks on cloud tenants to an increase in conversational smishing attacks and the expansion of multi-factor authentication (MFA) bypass, the cyberattack landscape in 2022 saw significant developments on multiple fronts. Despite sending over 25 million messages in 2022, which is more than double the volume of the second most prominent threat actor, Emotet's presence has been unsteady, and the group has demonstrated a lack of adaptability to the post-pandemic threat landscape. This article continues to discuss key findings from Proofpoint's annual Human Factor report.

    Help Net Security reports "Cybercriminals Return to Business as Usual in a Post-pandemic World"

  • news

    Visible to the public "'Shampoo' ChromeLoader Variant Difficult to Wash Out"

    Fake websites promoting pirated video games, movies, and more are spreading a new variant of the ChromeLoader malware called "Shampoo." It steals sensitive information, redirects searches, and injects advertisements into browser sessions. Researchers from HP Wolf Security have been observing the new campaign, which appears to have been active since March. It distributes malware similar to the original ChromeLoader that was first discovered in May 2022 but is significantly more difficult to eradicate due to multiple persistence mechanisms. The first version of ChromeLoader installed a malicious Chrome extension for advertising, a process involving victims downloading malicious ISO files from websites hosting illegal content that hijack browsers. The ChromeLoader used in the Shampoo campaign is very similar in that it tricks victims into downloading and executing malicious VBScript files from websites, which ultimately leads to the installation of a malicious Chrome browser extension. Shampoo differs from the original ChromeLoader because it uses the browser's Task Scheduler to achieve persistence by scheduling a relaunch every 50 minutes. This article continues to discuss the new variant of the ChromeLoader malware.

    Dark Reading reports "'Shampoo' ChromeLoader Variant Difficult to Wash Out"

  • news

    Visible to the public "Detecting Deviators From the Norm - 'An Accurate Identification Method of Abnormal Users in Social Network Based on Multivariate Characteristics'"

    Research published in the International Journal of Web Based Communities introduces a new method for identifying abnormal users in social networks, which involves analyzing multiple user behavior characteristics. Using the APIs of different social networks, Jian Xie of the College of Education at Fuyang Normal University in Fuyang, China, collected comprehensive data about users, including information about their accounts, the content they post, and the specific behaviors they exhibit. This data analysis allowed him to ascribe a set of attributes to users. Through attribute reduction, he eliminated redundant features and built a targeted attribute feature set to analyze suspicious accounts. Xie then used the data to train the XGBoost model, a Machine Learning (ML) algorithm, in order to develop a highly objective function that can quickly flag abnormal behavior on a social network. Xie was able to identify abnormal users with 95 percent accuracy. This level of accuracy in identification is enough to alert the system's administrators to any potential issues, which could then be manually investigated and handled (e.g., blocking malicious users). The approach could set the groundwork for developing highly effective social network security policies. This article continues to discuss the proposed approach to identifying abnormal users in social networks and its potential impact on security for social networking.

    Inderscience reports "Detecting Deviators From the Norm - 'An Accurate Identification Method of Abnormal Users in Social Network Based on Multivariate Characteristics'"

  • news

    Visible to the public "MSSQL Makes up 93% Of All Activity on Honeypots Tracking 10 Databases"

    Honeypots focused on tracking the activity on database servers in Russia, Ukraine, Poland, the UK, China, and the US revealed that Microsoft SQL (MSSQL) composed 93 percent of all attack activity. SpiderLabs of Trustwave noted in a blog post that its study calls for security teams to treat database security seriously by using strong passwords, disabling default accounts, enabling multi-factor authentication (MFA), and more. In addition to keeping software up-to-date and conducting frequent security audits, the SpiderLabs researchers recommended that security teams keep a close watch on who is attempting to access the system and with what privileges. They added that the results regarding MSSQL prompted them to conduct another study on MSSQL, which will be published later this month. While the UK had the highest number of MSSQL attacks (21.84 percent), China was a close second (21.49 percent), followed by Ukraine (19.52 percent), Russia (17.54 percent), Poland (11.54 percent), and the US (8.04 percent). MSSQL instances were subjected to highly intense attacks. According to Shodan, there are more than 450,000 MSSQL instances accessible on the Internet, with more than 133,000 instances located in China. This article continues to discuss MSSQL making up 93 percent of all attack activity on honeypots tracking 10 databases.

    SC Magazine reports "MSSQL Makes up 93% Of All Activity on Honeypots Tracking 10 Databases"

  • news

    Visible to the public "Popular Email Provider Leaves Systems Wide Open"

    The popular disposable email provider Temp Mail left its systems publicly accessible for over three months, thus risking potential security breaches and widespread malware distribution. The Cybernews research team recently discovered a configuration error in the Temp Mail system that exposed sensitive data. Temp Mail is a free disposable email service that enables users to receive email at a temporary address, which then self-destructs after a specified amount of time. The email service is a popular option for users who wish to avoid spam and protect their email addresses from disclosure when registering on different websites, blogs, and forums. The recently discovered misconfiguration could have allowed malicious actors access to the internal systems of Temp Mail, manipulate sensitive data, deliver malware on a large scale, and target users. The severity of the situation is highlighted by the fact that Temp Mail's Android app alone has over 10 million downloads. This article continues to discuss the Temp Mail system leaving sensitive data exposed and the potential impact of this exposure.

    Cybernews reports "Popular Email Provider Leaves Systems Wide Open"

  • news

    Visible to the public "Spotify Fined $5 Million for Breaching EU Data Rules"

    Music streaming giant Spotify, was recently fined 58 million kronor ($5.4 million) for not properly informing users on how data it collected on them was being used, Swedish authorities said. Spotify said it planned to appeal the decision. The Swedish Authority for Privacy Protection's (IMY) stated that it had reviewed how Spotify handles customers' right of access to their personal data and found shortcomings. The regulator noted that under the rules of the European data protection act GDPR, users have a right to know what data a company has about an individual and how that data is being used. IMY stated that while Spotify did hand out the data it had when requested by an individual, it said the company had not been sufficiently specific as to how that data was being used. IMY noted that since the information provided by Spotify has been unclear, it has been difficult for individuals to understand how their personal data is processed and to check whether the processing of their personal data is lawful.

    SecurityWeek reports: "Spotify Fined $5 Million for Breaching EU Data Rules"

  • news

    Visible to the public "SAP Patches High-Severity Vulnerabilities With June 2023 Security Updates"

    SAP on Tuesday announced the release of eight new security notes as part of its June 2023 Security Patch Day, including two notes that address high-severity vulnerabilities. Five other notes were updated. The most important of SAP's new security notes resolve a stored cross-site scripting (XSS) bug in UI5 Variant Management. The bug is tracked as CVE-2023-33991 (CVSS score of 8.2), and it can be exploited to gain user-level access to the UI5 Varian Management application and compromise confidentiality, integrity, and availability. The second high-severity flaw is a missing authentication issue in Plant Connectivity and Production Connector for Digital Manufacturing, tracked as CVE-2023-2827 (CVSS score of 7.9). SAP noted that it can be exploited to connect to a vulnerable application without a valid JSON Web Token (JWT). According to enterprise application security firm Onapsis, "in order to fully patch this vulnerability, both components must be patched, and JWT signature validation must be configured from the Cloud Connector settings." This week, SAP also updated two notes dealing with high-severity bugs in Knowledge Warehouse (CVE-2021-42063) and SAPUI5 (CVE-2023-30743). The updates only contain "minor textual or structural" changes from the previous notes. Of the eight new and updated medium-severity security notes that SAP released this week, six deal with XSS flaws in NetWeaver, CRM ABAP (Grantor Management), CRM (WebClient UI), and BusinessObjects. The other two notes resolve an information disclosure bug in S/4HANA and an SQL injection issue in Master Data Synchronization. The last security note published on SAP's June 2023 Security Patch Day resolves a low-severity denial-of-service (DoS) vulnerability in NetWeaver (Change and Transport System).

    SecurityWeek reports: "SAP Patches High-Severity Vulnerabilities With June 2023 Security Updates"

  • news

    Visible to the public "Cyber Win: NSA Selects LSU to Build Cybersecurity Clinic to Support Small Businesses in Louisiana"

    The National Security Agency (NSA) has selected Louisiana State University (LSU) as the first university in the US to develop and pilot a cyber clinic to help protect small businesses, which are becoming increasingly frequent targets of cyberattacks. The LSU Cybersecurity Clinic (LCC) will provide free services through the Louisiana Small Business and Development Center at LSU while offering opportunities for students in the LSU College of Engineering and LSU E. J. Ourso College of Business to advance their cybersecurity education, gain practical experience, and earn professional certifications. The initial $1.5 million award from the NSA will be used to establish the LCC, providing services through three collaborative sub-clinics run by LSU students and faculty advisors. Each sub-clinic has a distinct purpose and technical focus. Together, they will make it easier for small businesses in Louisiana to access solutions to highly technical issues. The first sub-clinic, focusing on threat and vulnerability assessment, will place students on the offensive by having them pose as malicious hackers to help businesses identify security flaws. The cyber defense sub-clinic will provide guidance and solutions. The cyber risk assessment sub-clinic will focus on a company's specific assets, data, and operations to develop practical and effective mitigation strategies. This article continues to discuss the NSA-funded LCC that will enable small businesses in Louisiana to reach a proper cybersecurity posture.

    Louisiana State University reports "Cyber Win: NSA Selects LSU to Build Cybersecurity Clinic to Support Small Businesses in Louisiana"

  • news

    Visible to the public "Hundreds of Thousands of eCommerce Sites Impacted by Critical Plugin Vulnerability"

    Security researchers at Patchstack discovered that hundreds of thousands of ecommerce websites could be exposed to attacks due to a critical vulnerability in the WooCommerce Stripe Payment Gateway plugin. Tracked as CVE-2023-34000, the issue is described as an unauthenticated insecure direct object reference (IDOR) bug leading to information disclosure. The researchers noted that specifically, the flaw allows an unauthenticated attacker to view any information that a user provides when placing an order, including name, address, and email address. The security defect exists because the "javascript_params" and "payment_fields" functions lack proper access control and handle data in an insecure manner. The researchers stated that due to the lack of order ownership checks, an attacker can exploit the bugs to view order information in the site's page source or in the front end. The issue was resolved on May 30 with the release of WooCommerce Stripe Payment Gateway version 7.4.1. According to the official WordPress web store, the plugin has more than 900,000 active installations, and hundreds of thousands of them could be vulnerable to attacks based on available version use data.

    SecurityWeek reports: "Hundreds of Thousands of eCommerce Sites Impacted by Critical Plugin Vulnerability"

  • news

    Visible to the public "US and International Partners Release Comprehensive Cyber Advisory on LockBit Ransomware"

    "Understanding Ransomware Threat Actors: LockBit" is the title of a joint Cybersecurity Advisory (CSA) issued by the US Cybersecurity and Infrastructure Security Agency (CISA), FBI, Multi-State Information Sharing and Analysis Center (MS-ISAC), and the cybersecurity authorities of Australia, Canada, the UK, Germany, France, and New Zealand (CERT NZ, NCSC-NZ). This joint advisory is a comprehensive resource containing common LockBit affiliate tools and exploitations, as well as tactics, techniques, and procedures (TTPs). The advisory also provides recommended mitigations for organizations to reduce the likelihood and impact of future ransomware incidents. Threat actors who use LockBit, the most widely launched and prolific Ransomware-as-a-Service (RaaS) in 2022 and 2023, have targeted organizations of varying sizes in critical infrastructure sectors. This article continues to discuss the joint advisory aimed at helping organizations around the world better understand and protect against this global ransomware threat.

    CISA reports "US and International Partners Release Comprehensive Cyber Advisory on LockBit Ransomware"

  • news

    Visible to the public "DDoS Threats and Defense: How Certain Assumptions Can Lead to an Attack"

    There is a common misconception that a website with low traffic or that does not offer transaction-intensive online commerce does not need to prepare for Distributed Denial-of-Service (DDoS) attacks because it is not an attractive target. According to Jag Bains at TechRepublic, cybercriminals do not care about a website's popularity or offerings. In addition, hackers are always looking for new methods to launch even more complex and effective attacks that could have devastating financial and reputational outcomes for unprepared victims. It is currently simple and inexpensive to execute cyberattacks on a large scale. A DDoS attack can even be booked on one of many shady platforms, allowing low-skilled attackers to easily carry out such attacks without having to deal with the technology themselves. Therefore, not being prepared for DDoS attacks is no longer an option, no matter what a company's size, industry, or level of popularity is. This article continues to discuss the assumptions businesses should not make about their DDoS defenses and the steps they should take to reduce the likelihood of such attacks.

    TechRepublic reports "DDoS Threats and Defense: How Certain Assumptions Can Lead to an Attack"

  • news

    Visible to the public "Chrome 114 Update Patches Critical Vulnerability"

    Google recently announced a new Chrome 114 update that resolves five vulnerabilities, including four critical and high-severity bugs reported by external researchers. Google noted that the most important of these issues is CVE-2023-3214, a critical use-after-free flaw in Autofill payments. The issue was reported by Rong Jian of VRI. Use-after-free vulnerabilities are a type of memory corruption bug that occurs when a pointer is not cleared after memory allocation has been freed. Such flaws may be exploited to achieve remote code execution (RCE), denial-of-service (DoS), or data corruption and may even lead to complete system compromise if combined with other bugs. Google noted that successful exploitation of use-after-free vulnerabilities in Chrome may lead to a sandbox escape if the attacker can target a privileged Chrome process or a flaw in the underlying operating system. In addition to CVE-2023-3214, the latest Chrome update resolves two other use-after-free issues, both rated high severity: CVE-2023-3215, which impacts WebRTC, and CVE-2023-3217, which impacts WebXR. The fourth externally reported flaw resolved with this browser release is a type confusion issue in the V8 JavaScript engine. Google stated that it paid out $3,000 for the WebRTC vulnerability but has yet to determine the amounts to be paid for the Autofill payments and V8 bugs. The WebXR flaw was reported by Sergei Glazunov of Google Project Zero, and, per Google's policy, no bug bounty reward will be issued for this security defect. Google did not mention whether these vulnerabilities were being exploited in attacks. The latest Chrome iteration is now rolling out as version 14.0.5735.133 for macOS and Linux, and as versions 114.0.5735.133/134 for Windows.

    SecurityWeek reports: "Chrome 114 Update Patches Critical Vulnerability"

  • news

    Visible to the public "E-Commerce Firms Are Top Targets for API, Web Apps Attacks"

    According to a new report by Akamai, hackers launched 14 billion attacks against the e-commerce industry in 15 months, placing it at the top of the list of targets for Application Programming Interface (API) and web application exploits. Researchers found that the volume of attacks against e-commerce companies is primarily due to the digitalization of the industry and the wide variety of vulnerabilities hackers can exploit in the web applications of their intended targets. E-commerce companies store sensitive data such as Personally Identifiable Information (PII) and payment account details, making them a lucrative target for cybercriminals, according to researchers who analyzed web attacks from January 1, 2022, to March 31, 2023. Retail, hotel, and travel companies topped the list of 13 industries with 14.5 billion attacks, or more than one-third of all attacks explored by Akamai. The high-tech industry ranked second with approximately 9 billion attacks, followed by the financial services industry with around 7 billion. This article continues to discuss e-commerce companies being the top targets for API and web application exploits.

    BankInfoSecurity reports "E-Commerce Firms Are Top Targets for API, Web Apps Attacks"

  • news

    Visible to the public "Hackers Can Steal Cryptographic Keys by Video-Recording Power LEDs 60 Feet Away"

    Researchers have developed a novel attack that recovers the secret encryption keys in smart cards and smartphones by using iPhone cameras or commercial surveillance systems to video record the power LEDs that glow when the card reader or smartphone is on. The attacks enable a new method for exploiting two previously disclosed side channels, a type of attack that measures physical effects leaked from a device during a cryptographic operation. Attackers can collect enough information to recover the secret keys underpinning a cryptographic algorithm's security and confidentiality by carefully monitoring characteristics such as power consumption, sound, electromagnetic emissions, and how long an operation takes. This article continues to discuss the attack that recovers the secret encryption keys stored in smart cards and smartphones.

    Ars Technica reports "Hackers Can Steal Cryptographic Keys by Video-Recording Power LEDs 60 Feet Away"

  • news

    Visible to the public "LLM meets Malware: Starting the Era of Autonomous Threat"

    Researchers at B42 Labs have shared some findings from their exploratory research on the application of Large Language Models (LLMs) to malware automation, examining how a potential new type of autonomous threat may manifest in the near future. The researchers explored the potential architecture of an autonomous malware threat based on four main steps: Artificial Intelligence (AI)-assisted reconnaissance, reasoning and planning, and AI-assisted execution. They demonstrated the possibility of using an LLM to recognize infected environments and determine which malicious actions would be most appropriate for the environment. In order to leverage LLMs in the complex task of generating code on the fly to accomplish the malicious objectives of the malware agent, they adopted an iterative code generation strategy. This article continues to discuss findings from B42 Labs researchers' analysis of the application of LLMs to malware automation.

    Security Affairs reports "LLM meets Malware: Starting the Era of Autonomous Threat"

  • news

    Visible to the public "New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs"

    Skuld is a new Golang-based information stealer that has compromised Windows systems in Europe, Southeast Asia, and the US. According to Trellix researcher Ernesto Fernandez Provecho, this new strain of malware attempts to steal sensitive information from its victims. It searches for data stored in applications such as Discord and web browsers, information from the system, and files stored in the victim's folders. Skuld, shares overlaps with publicly available stealers like Creal Stealer, Luna Grabber, and BlackCap Grabber. It was developed by someone going by the online alias "Deathined" on different social media platforms. In addition to gathering system metadata, the malware can harvest cookies and credentials stored in web browsers, as well as files present in Windows user profile folders, including Desktop, Documents, Downloads, Pictures, Music, Videos, and OneDrive. This article continues to discuss findings regarding the new Golang-based information stealer Skuld.

    THN reports "New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs"

  • news

    Visible to the public "Fake Zero-Day PoC Exploits on GitHub Push Windows, Linux Malware"

    Hackers are posing as cybersecurity researchers on Twitter and GitHub to publish fake proof-of-concept (PoC) exploits for zero-day vulnerabilities that infect Windows and Linux with malware. The alleged researchers advertise these malicious exploits through a fake cybersecurity company called "High Sierra Cyber Security," which promotes the GitHub repositories on Twitter, likely targeting cybersecurity researchers and companies engaged in vulnerability research. The repositories seem legitimate, as the users who maintain them even use headshots to impersonate real security researchers from Rapid7 and other security companies. The same personas maintain Twitter accounts to lend credibility to their research and code repositories, such as GitHub, as well as to attract victims from the social media platform. According to VulnCheck, this campaign has been active since at least May 2023, promoting exploits for zero-day vulnerabilities in software such as Chrome, Discord, Signal, WhatsApp, and Microsoft Exchange. This article continues to discuss the impersonation of cybersecurity researchers to publish fake PoC exploits that push Windows and Linux malware.

    Bleeping Computer reports "Fake Zero-Day PoC Exploits on GitHub Push Windows, Linux Malware"

  • news

    Visible to the public "Switzerland Under Cyberattack"

    Swiss government websites are being hit with Distributed Denial-of-Service (DDoS) attacks, but several ransomware gangs have also been targeting Swiss government organizations, cantonal governments, cities, and companies in the last few months. The Swiss National Cyber Security Centre (NCSC) reported that a DDoS attack rendered several Federal Administration websites inaccessible on June 12, 2023. According to the NCSC, the group responsible for these DDoS attacks is the pro-Russian hacker group Noname057(16). In addition, the group has claimed responsibility for the recent DDoS attack on the website and mobile app of the Swiss Federal Railways that temporarily disrupted certain online services. In the past few months, ransomware groups have effectively targeted many Swiss businesses and government agencies, despite appearing to target organizations of all types globally. This article continues to discuss recent cyberattacks against Switzerland.

    Help Net Security reports "Switzerland Under Cyberattack"

  • news

    Visible to the public "Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs"

    A Chinese cyber espionage group that researchers previously spotted targeting VMware ESXi hosts has been exploiting a zero-day authentication bypass flaw in the virtualization technology to execute privileged commands on guest Virtual Machines (VMs). Researchers from Mandiant discovered the vulnerability during ongoing investigations of UNC3886, a Chinese threat actor they have been monitoring for some time. They disclosed the vulnerability to VMware, which then issued a patch to address it. VMware Tools, a collection of services and modules for improved administration of guest operating systems, contains the zero-day vulnerability, tracked as CVE-2023-208670. The vulnerability enables attackers to use a compromised ESXi host to transfer files to and from Windows, Linux, and vCenter guest VMs without the need for guest credentials and without the activity being logged by default. VMware rated the vulnerability as having a medium severity because an attacker must already have root access to an ESXi host in order to exploit it. This article continues to discuss UNC3886 and the threat actor's exploitation of a zero-day vulnerability in VMware Tools.

    Dark Reading reports "Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs"

  • news

    Visible to the public "Robot Can Rip the Data Out of RAM Chips With Chilling Technology"

    Cold boot attacks, in which memory chips are cooled and data, including encryption keys, are stolen, were first demonstrated in 2008. The original attack has been improved and automated in the form of a memory-stealing machine that costs about $2,000. At the REcon reverse engineering conference in Canada, Ang Cui, the founder and CEO of Red Balloon Security, gave a presentation titled "Ice Ice Baby: Coppin' RAM With DIY Cryo-Mechanical Robot." The presentation focuses on the Cryo-Mechanical RAM Content Extraction Robot that Cui and his colleagues Grant Skipper and Yuanzhe Wu created to extract decrypted data from DDR3 memory modules. By disabling JTAG debugging interfaces and UART circuitry, as well as by using Ball Grid Array (BGA) packaging and encrypted firmware, hardware manufacturers have made it more difficult to reverse engineer their products. Cui noted that manufacturers are removing many debugging interfaces, which does not necessarily increase product security but makes device introspection and reverse engineering significantly more difficult. Therefore, the researchers decided to pursue a different path. Instead of attempting fault injection, as they have in the past, or performing invasive reverse engineering via laser ablation, they constructed this affordable and accurate robot that freezes one RAM chip on the device at a time. This article continues to discuss the robot that reliably extracts the contents of RAM of modern embedded devices at runtime.

    The Register reports "Robot Can Rip the Data Out of RAM Chips With Chilling Technology"

  • news

    Visible to the public "USTC Achieves Thousand-Kilometer Quantum Key Distribution"

    Scientists from the University of Science and Technology of China (USTC) of the Chinese Academy of Sciences (CAS) and their collaborators from Tsinghua University, Jinan Institute of Quantum Technology, and Shanghai Institute of Microsystem and Information Technology (SIMIT) have achieved point-to-point long-distance Quantum Key Distribution (QKD) over a distance of 1,002 kilometers. This achievement sets a new world record for non-relay QKD and offers a solution for high-speed intercity quantum communication. QKD is based on quantum mechanics principles and enables the secure distribution of keys between two remote parties. It can attain the highest level of security for confidential communication when combined with the "one-time pad" encryption technique. However, QKD's range has been limited by channel loss and system noise. This study's achievement has significant implications for the development of secure quantum communication. This article continues to discuss the achievement of point-to-point long-distance QKD over a distance of 1,002 km.

    SCIENMAG reports "USTC Achieves Thousand-Kilometer Quantum Key Distribution"

  • news

    Visible to the public "Unveiling the Balada Injector: A Malware Epidemic in WordPress"

    A malicious cyber campaign has been silently exploiting popular WordPress plugins to undermine website security, infiltrating over a million websites. In April 2023, technology media outlets began reporting on cybercriminals hacking WordPress websites. A dangerous combination of the popular plugins Elementor Pro Premium (webpage builder) and WooCommerce (online storefront) allowed them to gain access. This recently disclosed vulnerability has a base CVSS score of 8.8, causing significant concern for WordPress administrators and cybersecurity teams. Websites running Elementor Pro 3.11.6 or earlier with an activated WooCommerce plugin should upgrade Elementor Pro to at least 3.11.7 or risk authenticated users (i.e., standard e-commerce customers) gaining total control of websites by exploiting Broken Access Control, the most severe of the Open Worldwide Application Security Project's (OWASP) top 10 vulnerabilities. Although reports of this vulnerability have been widely shared across the Internet, a lesser-known but related set of "hack-tivities" has occurred. The widespread and persistent Balada Injector campaign has infected over a million websites by exploiting vulnerabilities in Elementor Pro, WooCommerce, and a number of other WordPress plugins. This article continues to discuss the history of the Balada Injector campaign, its common objectives, and Indicators of Compromise (IoCs).

    Cybernews reports "Unveiling the Balada Injector: A Malware Epidemic in WordPress"

  • news

    Visible to the public "Business Email Compromise: The $50 Billion Scam"

    According to the FBI's Internet Crime Complaint Center (IC3), Business Email Compromise (BEC) is a sophisticated scam targeting businesses and individuals performing legitimate transfer-of-funds requests. The scam is often perpetrated when someone compromises legitimate business or personal email accounts through social engineering or computer intrusion to conduct unauthorized fund transfers. BEC is not always associated with a request to transfer funds. BEC attack variations often involve compromising legitimate business email accounts and requesting Personally Identifiable Information (PII), Wage and Tax Statement (W-2) forms, and cryptocurrency wallets from employees. The BEC scam continues to evolve, targeting small local businesses, larger companies, and personal transactions. In 2022, the IC3 observed an increase in the reporting of BEC incidents. BEC attacks have been reported in all 50 states and 177 countries. According to the financial data reported to the IC3 for 2022, banks in Hong Kong and China were the primary international destinations of fraudulent funds. The UK, which often serves as an intermediary stop for funds, Mexico, and Singapore followed. This article continues to discuss the concept of BEC attacks, statistical data on these attacks, and suggestions for protecting against BEC attacks.

    HSToday reports "Business Email Compromise: The $50 Billion Scam"

  • news

    Visible to the public "Xplain Data Breach Also Impacted the National Swiss Railway FSS"

    The Play ransomware attack faced by the Information Technology (IT) services provider Xplain is worse than initially anticipated, as the national railway company of Switzerland (FSS) and the canton of Aargau were also affected. The Bernese IT company Xplain provides services to several federal and cantonal government departments, the army, customs, and the Federal Office of Police (Fedpol). In early June, Swiss police launched an investigation into the cyberattack that targeted Xplain. On a Darknet forum, threat actors initially published data allegedly stolen from Fedpol and the Federal Office of Customs and Border Security (FOCBS). This article continues to discuss the Play ransomware attack launched against the IT services provider Xplain.

    Security Affairs reports "Xplain Data Breach Also Impacted the National Swiss Railway FSS"

  • news

    Visible to the public "France Says it Thwarted Attack on Websites From Russian State-Linked Actors"

    France's foreign minister recently announced that France had prevented a hybrid digital attack on the ministry's website, likely carried out by Russian state-linked actors, along with attacks on other government websites and French media sites. Foreign Minister Catherine Colonna also said France believed there was a broader campaign of spreading disinformation in France by Russian protagonists. Colonna noted that this campaign is notably based upon creating fake internet pages to hack into the identity of national media and government websites, as well as by creating fake accounts on social media networks. Moscow has consistently denied that it carries out hacking operations. However, Colonna said Russian embassies and Russian cultural institutes were also involved in this campaign and reaffirmed France's support for Ukraine in its conflict with Russia.

    Reuters reports: "France Says it Thwarted Attack on Websites From Russian State-Linked Actors"

  • news

    Visible to the public "US Charges Russians With Hacking Cryptocurrency Exchange"

    Two Russian nationals have recently been charged in the US with hacking the now-defunct cryptocurrency exchange Mt. Gox and conspiring to launder the proceeds. Alexey Bilyuchenko, 43, and Aleksandr Verner, 29, allegedly attempted to launder 647,000 Bitcoins from their hack of Mt. Gox. According to court documents, the two and other co-conspirators hacked Mt. Gox, the largest Bitcoin exchange at the time, in September 2011. On Friday, the US unsealed an indictment alleging that Bilyuchenko and Verner were among the individuals responsible for the hack and that they laundered at least 300,000 of the stolen Bitcoins. In a second indictment unsealed on Friday, Bilyuchenko and another Russian national, Alexander Vinnik, were charged with operating the illicit cryptocurrency exchange BTC-e from 2011 until 2017, when it was shut down by law enforcement. According to the indictment, BTC-e served more than one million users globally, processing billions of dollars worth of transactions. The exchange allegedly received criminal proceeds from numerous hacks, ransomware attacks, and identity theft schemes.

    SecurityWeek reports: "US Charges Russians With Hacking Cryptocurrency Exchange"

  • news

    Visible to the public "Are Clean Maritime Solutions Resilient to Cyber-Attacks at Sea?"

    Professor Kevin Jones and Dr. Kimberly Tam at the University of Plymouth share their expertise and provide some answers regarding whether clean maritime solutions are resilient to cyberattacks at sea. Companies throughout the UK are benefiting from a funding boost aimed at accelerating the development of clean maritime solutions, which will create a supportive but competitive environment at a time when innovations and new challenges are emerging. However, in order for solutions to be long-lasting, they must be not only effective but also resilient. Many of these solutions rely heavily on cutting-edge technology, which increases their vulnerability to cyberattacks. Therefore, cybersecurity must be considered in the early phases of technological development. Only by combining efficiency and security can we ensure clean technologies' short- and long-term viability. This includes bolstering the security of the data that the technology uses and generates, and reducing the likelihood of cyber-physical effects, such as a Denial-of-Service (DoS) attack, which could prevent clean maritime solutions from functioning. This article continues to discuss insights on the resilience of maritime solutions to cyberattacks at sea.

    The University of Plymouth reports "Are Clean Maritime Solutions Resilient to Cyber-Attacks at Sea?"

  • news

    Visible to the public "Gozi Malware Hacker Sentenced to Three Years in US Prison"

    A Romanian hacker who ran the infrastructure for multiple malware strains has been sentenced to three years in federal prison in the US. According to prosecutors, Mihai Ionut Paunescu, age 39, helped operate the "bulletproof hosting" service PowerHost[.]ro, which helped cybercriminals deliver the Gozi Virus, Zeus Trojan, SpyEye Trojan, and BlackEnergy malware. Cybercriminals used the malware strains to steal financial information and more. Paunescu rented servers and IP addresses from reputable Internet service providers and then provided the tools to cybercriminals, enabling them to remain anonymous and launch attacks. Paunescu was also accused of facilitating Distributed Denial-of-Service (DDoS) attacks and spam campaigns through his platforms. This article continues to discuss the Gozi malware hacker who has been sentenced to three years in US prison.

    The Record reports "Gozi Malware Hacker Sentenced to Three Years in US Prison"

  • news

    Visible to the public "Intellihartx Informs 490k Patients of GoAnywhere-Related Data Breach"

    Intellihartx, a company providing patient balance resolution services to hospitals, is starting to inform roughly 490,000 individuals that their personal information was compromised in the GoAnywhere zero-day attack earlier this year. Disclosed in early February and linked to the infamous Cl0p ransomware gang, the cyberattack exploited a zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software. Tracked as CVE-2023-0669 and leading to remote code execution, the flaw had been exploited starting January 28. Intellihartx says it has concluded its review of the data potentially compromised during the attack and has also identified the impacted individuals. The company stated that the affected information includes names, addresses, insurance data and medical billing, diagnosis and medication information, birth dates, and Social Security numbers. Intellihartx says it is not aware of the compromised information being misused. However, the Cl0p gang has made the data allegedly stolen from the company available on its leak site.

    SecurityWeek reports: "Intellihartx Informs 490k Patients of GoAnywhere-Related Data Breach"

  • news

    Visible to the public "CISA Directs Federal Agencies to Secure Internet-Exposed Management Interfaces"

    The Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 23-02, "Mitigating the Risk from Internet-Exposed Management Interfaces," requiring federal civilian agencies to remove specific networked management interfaces from the public-facing Internet or implement Zero Trust Architecture (ZTA) capabilities that enforce access control to the interface within 14 days of discovery. Recent threat campaigns highlight the risk posed by improperly configured network devices to the federal enterprise. As part of CISA and the broad US government's effort to move the federal civilian enterprise to a more secure posture, this Directive will further reduce the attack surface of the federal government networks. According to Jen Easterly, director of CISA, threat actors too often can use network devices to get unrestricted access to organizational networks, resulting in widespread compromise. An important step in reducing risk to the federal civilian enterprise is requiring the controls and mitigations outlined in this Directive. This article continues to discuss the BOD issued by CISA on mitigating the risk posed by Internet-exposed management interfaces.

    CISA reports "CISA Directs Federal Agencies to Secure Internet-Exposed Management Interfaces"

  • news

    Visible to the public "CosmicEnergy's Threat to Critical Infrastructure in Dispute"

    There are disagreements among security researchers regarding the danger posed by the recently discovered malware "CosmicEnergy" to critical infrastructure. Last month, the threat intelligence company Mandiant identified CosmicEnergy as a "plausible threat" to electric grid operators. Mandiant first identified the malware after the code was uploaded to a public malware scanning tool in December 2021. In an analysis report released last month, the company noted that there was evidence indicating that it had been designed as a red teaming tool for simulated power disruption exercises. According to the report, given that threat actors use red team tools and public exploitation frameworks for targeted threat activity, CosmicEnergy is believed to pose a plausible threat to impacted electric grid assets. In a report published last week, however, researchers from the industrial cybersecurity company Dragos noted that the malware is not yet mature enough to endanger Operational Technology (OT) networks. Dragos also mentioned CosmicEnergy's probable origins as a training tool for detection development, figuring that while its discovery should prompt organizations to reevaluate OT security, there was no immediate threat to OT environments. Jimmy Wylie, technical lead malware analyst and lead author, commented that there are no indications that an adversary is actively deploying CosmicEnergy. This article continues to discuss disputes regarding the CosmicEnergy malware.

    SC Magazine reports "CosmicEnergy's Threat to Critical Infrastructure in Dispute"

  • news

    Visible to the public "Ransomware Attack Played Major Role in Shutdown of Illinois Hospital"

    St. Margaret's Health is shutting down hospitals and other facilities in Peru and Spring Valley, Illinois, and says a 2021 ransomware attack is partly to blame. The cyberattack occurred in late February 2021 and forced the shutdown of the Spring Valley hospital's computer network, impacting all web-based operations, including its patient portal. The Peru branch was not affected, as it operated on a separate system. The hospital said that the incident impacted its ability to bill patients and get paid in a timely manner for the provided services. The systems were down for more than three months. The hospital noted that compounded with the impact from the Covid-19 pandemic, a staff shortage, and rising costs of goods and services, the cyberattack forced the hospital to suspend some of its services in January this year. On June 16, St. Margaret's Health will shut down both the Peru and Spring Valley facilities. In a video message on social media, St. Margaret's chairwoman Suzanne Stahl announced that OSF HealthCare will acquire the hospital in Peru, which will help pay some of the Spring Valley location's debts. St. Margaret's Health will also close clinics in Henry, LaSalle, and Streator and will sell other assets not included in the OSF HealthCare transaction. St. Margaret's Health is the first healthcare facility to link its closure to a ransomware attack.

    SecurityWeek reports: "Ransomware Attack Played Major Role in Shutdown of Illinois Hospital"

  • news

    Visible to the public "Historic Zacks Breach Impacts Nearly Nine Million"

    Security researchers have recently discovered a breach at Zacks Investment Research dating back to 2020, which appears to have impacted millions of customers. So far, the stock research and analysis firm has made no public disclosure about the incident. However, a post on the breach site HaveIBeenPwned revealed that a trove of data numbering nearly nine million customers are being widely shared on a popular hacking forum. Security researchers noted that the most recent data was dated May 2020 and included names, usernames, email and physical addresses, phone numbers, and passwords stored as unsalted SHA-256 hashes. The publication of the data means that customers should expect follow-on phishing and other attacks. In January, the firm revealed a data breach that affected an estimated 820,000 customers, which it said occurred "sometime between November 2021 and August 2022." This particular incident involved a legacy database of customers who signed up for the Zacks Elite product between November 1999 and February 2005.

    Infosecurity reports: "Historic Zacks Breach Impacts Nearly Nine Million"

  • news

    Visible to the public "Google, Cornell to Partner in Online Security Initiative"

    Cornell is one of four higher-education institutions in a new partnership with Google that aims to make New York City the global leader in cybersecurity. Google announced the Google Cyber NYC Institutional Research Program on June 12 to kick-start the cybersecurity ecosystem, distributing $12 million to four institutions. According to Greg Morrisett, the Jack and Rilla Neafsey Dean and Vice Provost of Cornell Tech and Principal Investigator (PI) for Cornell, making systems safe, secure, and trustworthy is immensely difficult, and it will only become more difficult in the Artificial Intelligence (AI) era. Cornell, along with the City University of New York, Columbia University's Fu Foundation School of Engineering and Applied Science, and New York University's Tandon School of Engineering, will each receive annual funding of $1 million through 2024, with the option to continue through 2025. The funding will support about 90 collaborative research projects across the four institutions in areas where additional research could foster the creation of more secure digital ecosystems and inspire innovation. Although most security-related research focuses on technical challenges, many of the most significant security failings involve humans and are often attributable to a lack of human-centered design. This partnership will use an interdisciplinary approach to improve the foundations of secure systems and ensure that their deployment will not exacerbate societal issues. This article continues to discuss the new online security initiative.

    Cornell University reports "Google, Cornell to Partner in Online Security Initiative"

  • news

    Visible to the public "RDP Honeypot Targeted 3.5 Million Times in Brute-Force Attacks"

    A study involving high-interaction honeypots with a Remote Desktop Protocol (RDP) connection accessible from the public web demonstrates that attackers are relentless and follow a daily schedule that closely resembles office hours. Researchers at GoSecure, a threat detection and response company with headquarters in the US and Canada, logged close to 3.5 million login attempts to their RDP honeypot system over the course of three months. At the NorthSec cybersecurity conference in Montreal, Canada, Andreanne Bergeron, a GoSecure cybersecurity researcher, explained that the honeypots are tied to a research program aimed at understanding attacker strategies, which could then be translated into prevention advice. The honeypot has operated intermittently for more than three years and continuously for over a year, but the data compiled for the presentation only represents three months, from July 1 to September 30, 2022. During this time period, the honeypot was hit 3,427,611 times by more than 1,500 unique IP addresses. However, the total number of login attempts for the entire year reached 13 million. This article continues to discuss the GoSecure researchers' experiment involving its RDP honeypot system.

    Bleeping Computer reports "RDP Honeypot Targeted 3.5 Million Times in Brute-Force Attacks"

  • news

    Visible to the public "Researchers Uncover Publisher Spoofing Bug in Microsoft Visual Studio Installer"

    According to security researchers, an "easily exploitable" vulnerability in the Microsoft Visual Studio installer could be exploited by an attacker to impersonate a legitimate publisher and distribute malicious extensions. Dolev Taler, a researcher at Varonis, noted that a threat actor could impersonate a well-known publisher and distribute a malicious extension to compromise a targeted system. Malicious extensions have been used to steal sensitive data, access and modify code, and take complete control of a system. Microsoft addressed the spoofing flaw, tracked as CVE-2023-28299 with a CVSS score of 5.5, as part of its Patch Tuesday updates for April 2023. Varonis discovered that the flaw stems from the Visual Studio user interface that enables the spoofing of publisher digital signatures. This article continues to discuss the potential exploitation and impact of the flaw found in the Microsoft Visual Studio installer.

    THN reports "Researchers Uncover Publisher Spoofing Bug in Microsoft Visual Studio Installer"

  • news

    Visible to the public "Incorporating Cloud Security Teams Into the SOC Enhances Operational Efficiencies"

    According to Trend Micro, security leaders recognize that the cloud and how cloud security teams operate today are becoming increasingly critical to business and Information Technology (IT) operations. Therefore, cloud security and the foundational practices of their teams will be integrated into the Security Operations Center (SOC) in the coming years to increase efficiencies. Leaders who have navigated cloud security successfully are well-equipped to navigate a similar transition to the modern SOC landscape. Software consumes everything, creating system infrastructure increasingly defined as code and dependent on large volumes of data, with automation serving as the foundation for delivering value at accelerating rates. These concepts are foundational to teams building and securing in the cloud, but SOC and IT infrastructure teams' tooling, such as cross-detection and response (XDR), also use them and can benefit from absorbing the scale, skills, and expertise of cloud teams. Trend Micro predicts that viable SOC tools will increasingly incorporate cloud protection capabilities. This article continues to discuss Trend Micro's predictions regarding cloud security.

    Help Net Security reports "Incorporating Cloud Security Teams Into the SOC Enhances Operational Efficiencies"

  • news

    Visible to the public "Researchers Report First Instance of Automated SaaS Ransomware Extortion"

    The 0mega ransomware group has effectively executed an extortion attack against the SharePoint Online environment of a company without using a compromised endpoint, as is typically the case with these types of attacks. Instead, the threat group appears to have exploited a poorly protected administrator account to infiltrate the environment of the unnamed company, elevate permissions, and ultimately exfiltrate sensitive data from the victim's SharePoint libraries. The stolen information was used to demand a ransom from the victim. According to Glenn Chisholm, cofounder and CPO of Obsidian, the security company that discovered the attack, most enterprise efforts to combat ransomware tend to focus on endpoint protection mechanisms. The attack observed by Obsidian began with a member of the 0mega group obtaining a service account credential for one of the victim organization's Microsoft Global administrators. Not only was the compromised account accessible from the public Internet, but it also lacked multi-factor authentication (MFA). This article continues to discuss the attack that highlights the growing interest among threat actors to target data from Software-as-a-Service (SaaS) providers.

    Dark Reading reports "Researchers Report First Instance of Automated SaaS Ransomware Extortion"

  • news

    Visible to the public "How Analytics Tools, Third-Party Tracking Tech Pose Threats to Patient Privacy"

    Transferring sensitive data to non-Health Insurance Portability and Accountability Act (HIPAA)-covered entities may result in compliance complications, data breaches, lawsuits, and patient privacy risks. Third-party tracking tools promise functionality but may transmit sensitive data back to technology companies, potentially threatening the privacy of patients. Multiple high-profile healthcare data breaches and lawsuits against hospitals and technology companies over the use of third-party tracking tools prompted researchers to further examine the trend. Matthew McCoy, assistant professor of medical ethics and health policy at the University of Pennsylvania and one of the study's authors, noted that prior to the study, there had been some investigative reporting on the use of tracking technologies on the websites of small groups of hospitals. McCoy, together with Ari B. Friedman, assistant professor of emergency medicine at the University of Pennsylvania, and their colleagues set out to explore the prevalence of tracking technologies on hospital websites. The researchers discovered third-party tracking technologies on 98.6 percent of all US nonfederal acute care hospital websites. This article continues to discuss analytics tools and third-party tracking technologies posing threats to patients' privacy.

    HealthCareExecIntelligence reports "How Analytics Tools, Third-Party Tracking Tech Pose Threats to Patient Privacy"

  • news

    Visible to the public "Microsoft Warns of Multi-Stage AiITM Phishing and BEC Attacks"

    Microsoft discovered multi-stage adversary-in-the-middle (AiTM) phishing and Business Email Compromise (BEC) attacks targeting financial service organizations. In AiTM phishing, threat actors set a proxy server between a target user and the website the user wants to access, which is the phishing website under the attackers' control. The proxy server enables attackers to access traffic in order to steal passwords and session cookies. Microsoft found that the attackers initially compromised a trusted vendor before launching AiTM attacks and follow-on BEC activities against multiple organizations. This campaign is notable for its use of an indirect proxy, which gave perpetrators control and flexibility in tailoring phishing pages to their intended victims. Microsoft attributes the attacks to the "Storm-1167" emerging cluster. This article continues to discuss Microsoft researchers' warning of banking AitM phishing and BEC attacks targeting banking and financial organizations.

    Security Affairs reports "Microsoft Warns of Multi-Stage AiITM Phishing and BEC Attacks"

  • news

    Visible to the public "Log4J Exploits May Rise Further as Microsoft Continues War on Phishing"

    Researchers expect a rise in Log4J exploits as cybercriminals continue to find new methods to circumvent the ongoing implementation of Microsoft's anti-phishing measures. Microsoft blocked the enablement of VBA macros in Office documents by default in 2022, after the Information Technology (IT) community had demanded it for years. Therefore, one of the leading methods for delivering malware via Office documents and phishing emails was nullified. Since then, ESET researchers have observed a global increase in exploits targeting the Log4J vulnerability. Researchers are uncertain as to the cause of the increase in attempts, but cybercriminals may be seeking new attack methods now that phishing with malicious documents has become more difficult. This article continues to discuss the expected rise in Log4J exploits, the latest Log4J numbers, and the effectiveness of blocking VBA macros.

    ITPro reports "Log4J Exploits May Rise Further as Microsoft Continues War on Phishing"

  • news

    Visible to the public "New Entrants to Ransomware Unleash Frankenstein Malware"

    Ransomware hackers are pushing the concept of code reuse to its limits. In their rush to make money, some new cybercriminals are turning to previous ransomware groups' discarded remnants, piecing together ransomware rather than developing their own malware. "Frankenstein" ransomware is created by attackers using stolen or leaked code. The ESXiArgs malware, which began targeting VMware systems in February, is one such monster, using a ransom note from one ransomware and the encryption scheme from another to create a new ransomware. Other newcomers adopting this strategy include Rapture, which appears to have used leaked Paradise crypto-locker source code. This article continues to discuss hackers testing the limits of the concept of code reuse.

    DataBreachToday reports "New Entrants to Ransomware Unleash Frankenstein Malware"

  • news

    Visible to the public "Nvidia's AI Software Tricked Into Leaking Data"

    According to researchers at the San Francisco-based company Robust Intelligence, a feature in Nvidia's Artificial Intelligence (AI) software can be manipulated to disregard safety restrictions and reveal private information. The "NeMo Framework" developed by Nvidia enables developers to work with various Large Language Models (LLMs), the underlying technology that drives generative AI products such as chatbots. The chipmaker designed the framework to be adopted by businesses. Researchers at Robust Intelligence discovered they could easily circumvent so-called guardrails intended to ensure the AI system's safe use. After using the Nvidia system on its own data sets, it took Robust Intelligence analysts hours to get LLMs to overcome restrictions. In one test scenario, the researchers instructed the Nvidia system to replace the letter 'I' with the letter 'J.' This action triggered the release of Personally Identifiable Information (PII) from a database. This article continues to discuss researchers manipulating a feature in Nvidia's AI software to reveal sensitive information.

    Ars Technica reports "Nvidia's AI Software Tricked Into Leaking Data"

  • news

    Visible to the public "Confidential Data Downloaded From UK Regulator Ofcom in Cyberattack"

    Ofcom, Britain's communications regulator, has disclosed that hackers exploiting a flaw in Progress Software's MOVEit Transfer file transfer app downloaded confidential information on companies it regulates. A spokesperson for Ofcom revealed that the organization was among the many impacted by the MOVEit cyberattack, which has potentially affected hundreds of organizations worldwide. Microsoft had initially warned that the Cl0p ransomware group was behind attempts to exploit MOVEit. Recently, Cl0p published an extortion note claiming to have used the vulnerability to attack "hundreds" of businesses. The gang threatened to publish victims' names on its extortion website by June 14 if they did not contact the group to negotiate a ransom. The actual number of companies worldwide that the hacking campaign has compromised is unknown. Over 2,000 instances of the MOVEit Transfer tool were discovered exposed to the public Internet, most of which were in the US. There were 128 instances of MOVEit Transfer exposed to the Internet from the UK, but the number of affected companies could be significantly higher. This article continues to discuss hackers downloading confidential data from Britain's communications regulator Ofcom through the exploitation of the vulnerability in the MOVEit Transfer file transfer app.

    The Record reports "Confidential Data Downloaded From UK Regulator Ofcom in Cyberattack"

  • news

    Visible to the public "Barracuda ESG Zero-Day Exploit Hits Australia's ACT Government"

    The Australian Capital Territory (ACT) Government is among an estimated 5 percent of Barracuda Networks' Email Security Gateway (ESG) customers who have been instructed to remove and replace their appliances due to a zero-day flaw compromise. Barracuda Networks disclosed the critical vulnerability on May 19 and patched impacted ESG appliances the next day, but the vendor recently warned those whose appliances had been compromised by the remote command injection vulnerability to replace their compromised appliances immediately. The ACT government rebuilt its Barracuda system after discovering the vulnerability and determining that malicious hackers had exploited it. According to Chris Steel, the Digital and Data Special Minister of State for the ACT Government, there was a "strong likelihood" that data had been stolen. However, they are currently unaware of any information that may have been accessed on ACT Government systems and made available on the dark web. The ACT Government administers the federal territory of Australia, which is home to the country's capital city, Canberra. Its ESG service was linked to the government's main citizen-facing transaction portal, health services, and more. This article continues to discuss the impact of the Barracuda ESG zero-day bug on the ACT Government.

    SC Media reports "Barracuda ESG Zero-Day Exploit Hits Australia's ACT Government"