News Items

  • news

    Visible to the public "What Can We Learn from the Latest Coinbase Cyberattack?"

    The cryptocurrency exchange Coinbase has thwarted a cyberattack that could have been launched by the same malicious actors who attacked Twillio, Cloudflare, and a number of other companies in 2022. Using smishing and vishing, the attackers attempted to trick Coinbase employees into sharing login credentials and installing remote desktop applications. However, they were only partially successful, as the company's incident response team responded quickly to alerts of unusual activity, and the attackers were ultimately unable to access customer data or steal funds. Coinbase has disclosed the tactics, techniques, and procedures (TTPs) used by the attackers so that the security teams of other companies can be on the watch. They consist of web traffic pointing to domains that combine the company's name with "sso," "login," or "dashboard," but do not belong to the company. The TTPs also include attempted downloads of remote desktop software such as AnyDesk or ISL Online or browser extensions that enable the modification of cookies. This article continues to discuss the cyberattack on the cryptocurrency exchange Coinbase, TTPs, and risk mitigation advice.

    Help Net Security reports "What Can We Learn from the Latest Coinbase Cyberattack?"

  • news

    Visible to the public "AI Power Analysis Breaks Post-quantum Security Algorithm"

    Swedish researchers have cracked one of the key post-quantum security algorithms. The US National Institute of Standards and Technology (NIST) selected the CRYSTALS-Kyber algorithm last year as part of the standards for encapsulating data as security against quantum computer attacks. Researchers at the KTH Royal Institute of Technology, Stockholm, used a new Artificial Intelligence (AI) algorithm together with side-channel attacks involving the power lines to break the CRYSTALS-Kyber algorithm. NIST chose CRYSTALS-Kyber as a public key encryption and key encapsulation mechanism to be standardized. It is also included in the National Security Agency's (NSA) suite of cryptographic algorithms recommended for national security systems. Therefore, it is essential to analyze the side-channel attack resilience of CRYSTALS-Kyber implementations. The algorithm has already been hardened against direct attacks, but the researchers explored a more sophisticated side-channel attack that uses changes in power consumption to break the code running on an ARM Cortex-M4 CPU. This article continues to discuss researchers successfully breaking the CRYSTALS-Kyber algorithm using a combination of an AI algorithm and side-channel attacks.

    eeNews Power reports "AI Power Analysis Breaks Post-quantum Security Algorithm"

  • news

    Visible to the public "Researchers Discover Numerous Samples of Information Stealer 'Stealc' in the Wild"

    Stealc, a new information stealer being sold on the dark web, could emerge as a major competitor to similar malware. SEKOIA researchers stated that Stealc is presented as a fully functional and ready-to-use stealer. According to the researchers, its development relied on the Vidar, Raccoon, Mars, and RedLine stealers. The cybersecurity company detected over 40 Stealc samples in the wild and 35 active command-and-control (C2) servers, indicating that the malware is gaining momentum among criminal groups. Stealc, which was offered for the first time on January 9, 2023, by an actor named Plymouth on the XSS and BHF Russian-speaking underground forums, is written in C and has the capability to steal data from web browsers, cryptocurrency wallets, email clients, and messaging applications. The Malware-as-a-Service (MaaS) also promises a "customizable" file grabber that enables customers to customize the module to extract specific files. It implements additional loader features for the deployment of additional payloads. This article continues to discuss the new Stealc information stealer.

    THN reports "Researchers Discover Numerous Samples of Information Stealer 'Stealc' in the Wild"

  • news

    Visible to the public "Microsoft Unravels One of NOBELIUM's Most Novel Cyber Attacks"

    Microsoft has released a report detailing the first sighting of a Global Assembly Cache (GAC) implant in the wild. The new malware, called MagicWeb, developed by the Russian nation-state hacking group NOBELIUM, enables an attacker to authenticate under the guise of any user on a targeted network. The SolarWinds supply chain compromise in December 2020 is largely recognized as the most sophisticated nation-state cyberattack in history. Microsoft reports that NOBELIUM remains active, carrying out multiple malicious campaigns against government organizations, non-governmental organizations (NGOs), intergovernmental organizations (IGOs), and think tanks around the US, Europe, and Central Asia. According to Microsoft, nation-state attackers such as NOBELIUM seem to have unlimited financial and technical support from their sponsor, as well as access to advanced hacking techniques, techniques, and procedures (TTPs). NOBELIUM, unlike most malicious actors, changes their methods on nearly every machine they impact. Microsoft's security analysts say this actor highly values their operations, making few mistakes and frequently modifying their tactics to avoid detection. In August 2022, a Microsoft customer was infiltrated by MagicWeb, which NOBELIUM used to maintain persistent access to the compromised customer's environment. After observing unusual authentication requests, the customer contacted Microsoft's Detection and Response Team (DART). DART examined the incident and conducted multiple data-wrangling operations, as well as performed an in-depth data analysis to determine how the threat actor obtained access to the environment, installed the backdoor, and how the backdoor functioned. This article continues to discuss Microsoft's new report on one of NOBELIUM's most novel attacks.

    HSToday reports "Microsoft Unravels One of NOBELIUM's Most Novel Cyber Attacks"

  • news

    Visible to the public "LockBit Ransomware Gang Hit the Portuguese Municipal Water Utility Aguas Do Porto"

    The LockBit ransomware group claims to have hacked Aguas do Porto, a Portuguese municipal water utility company. Aguas do Porto is a municipal water utility company that manages the water cycle, from water supply to wastewater drainage. Furthermore, the organization oversees public lighting and photovoltaic parks. The LockBit group added the municipal water utility company to its Tor leak site's list of victims, saying the deadline to pay the demanded ransom is March 7, 2023. The group has not yet published samples of the stolen data as evidence of the security breach. The volume and type of data stolen by the ransomware gang are also currently unknown. On January 30, the utility company announced the security breach, stating that a cyberattack impacted certain services but not the water supply or sanitization. This article continues to discuss the LockBit ransomware gang claiming to have hacked the Portuguese municipal water utility company Aguas do Porto.

    Security Affairs reports "LockBit Ransomware Gang Hit the Portuguese Municipal Water Utility Aguas Do Porto"

  • news

    Visible to the public "Semiconductor Industry Giant Says Ransomware Attack on Supplier Will Cost It $250 Million"

    During a recent earnings call, Applied Materials, a multi-billion-dollar company that provides technology to the semiconductor industry, stated that a ransomware attack on one of its suppliers would cost them $250 million in the next quarter. The company did not specify which supplier it was referring to, although some industry analysts believe that it was the engineering and technology firm MKS Instruments. Due to a ransomware attack discovered on February 3, MKS Instruments was forced to postpone its own fourth-quarter earnings call. The attack on MKS highlights a concern that many cybersecurity professionals have expressed in recent years. When larger organizations improve their system security, attackers will target smaller, more vulnerable links in the supply chain. Monti Knode of the cyber defense company Horizon3.ai emphasized that more companies, such as MKS Instruments, are publicly acknowledging the effects of cyberattacks. Others, such as the CEO of Approov, Ted Miracco, have stated that the semiconductor supply chain remains one of the most complex and significant areas of the world economy. As observed last year, disruptions in the semiconductor market can have long-lasting effects on everything from vehicle prices to food prices, he said. Therefore, attacks on the semiconductor supply chain call for more attention. This article continues to discuss the semiconductor industry giant Applied Materials revealing that a ransomware attack on one of its suppliers would cost it $250 million.

    The Record reports "Semiconductor Industry Giant Says Ransomware Attack on Supplier Will Cost It $250 Million"

  • news

    Visible to the public "Spain Orders Extradition of British Alleged Hacker to US"

    Spain's National Court has recently agreed to the extradition to the U.S. of a British citizen who allegedly took part in cyberattacks, including the July 2020 hacking of Twitter accounts of public figures such as Joseph Biden, Barack Obama, and Bill Gates. A court statement Friday said requirements had been met for handing over Joseph James O'Connor to U.S. authorities for 14 charges covering crimes such as the revelation of secrets, membership of a criminal gang, illegal access to computer systems, internet fraud, money laundering, and extortion. O'Connor, 23, from Liverpool, England, was arrested in the southern Spanish coastal town of Estepona in July 2021. The court noted that he is accused of hacking some 130 Twitter accounts. He is also wanted for hacking the Snapchat account of an unidentified public figure whom he allegedly tried to extort with the threat of publishing nude photographs of the person. He is also wanted for several cases of "swatting," prank calls to emergency services aimed at getting large numbers of police to be sent to different locations. The court noted that he is wanted by courts in the Northern District of California and the Southern District of New York. The extradition order can be appealed.

    SecurityWeek reports: "Spain Orders Extradition of British Alleged Hacker to US"

  • news

    Visible to the public "Novel Spy Group Targets Telecoms in 'Precision-Targeted' Cyberattacks"

    A threat actor is targeting telecommunications companies in the Middle East through a cyber espionage campaign similar to those that have targeted such organizations in numerous nations over the past few years. Researchers from SentinelOne who discovered the new campaign identified it as WIP26, a label the company assigns to activity that has not been attributed to a specific threat group. They had observed WIP26 using public cloud infrastructure to distribute malware, store exfiltrated data, and for command-and-control (C2) operations. The security company determined that the threat actor is using the technique to evade detection and make its activity more difficult to detect on compromised networks. The attacks reported by SentinelOne typically began with WhatsApp messages sent to specific persons within target Middle Eastern telecommunications companies. The messages had a link to a Dropbox archive file that contained documents on poverty-related topics relevant to the region. In actuality, it also contained a malware loader. Those tricked into clicking the link had two backdoors installed on their devices. SentinelOne discovered the CMD365 backdoor using a Microsoft 365 Mail client as its C2 and the CMDEmber backdoor using a Google Firebase instance for the same purpose. The security vendor stated that WIP26 used the backdoors to conduct reconnaissance, elevate privileges, and deploy more malware, as well as collect the user's private browsing data, information about high-value devices on the victim's network, and more. This article continues to discuss findings and observations regarding the new WIP26 campaign.

    Dark Reading reports "Novel Spy Group Targets Telecoms in 'Precision-Targeted' Cyberattacks"

  • news

    Visible to the public "Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest Attacks"

    As part of a social engineering campaign, the cyber espionage threat actor tracked as Earth Kitsune has been seen implementing a new backdoor named WhiskerSpy. Since at least 2019, Earth Kitsune has been known to predominantly target individuals interested in North Korea using self-developed spyware such as dneSpy and agfSpy. Previous breaches used watering holes that exploited browser vulnerabilities in Google Chrome and Internet Explorer to initiate the infection chain. According to a new analysis from Trend Micro, the distinguishing feature of the most recent attacks is a shift toward social engineering to deceive people into visiting infected websites associated with North Korea. According to the cybersecurity firm, the website of a pro-North Korea organization was hacked and changed to spread the WhiskerSpy implant. This article continues to discuss the cyber espionage threat actor Earth Kitsune deploying the new WhiskerSpy backdoor.

    THN reports "Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest Attacks"

  • news

    Visible to the public "Microsoft Outlook Flooded With Spam Due to Broken Email Filters"

    According to complaints from a growing number of Microsoft customers, Outlook inboxes have been overwhelmed with spam emails for the past nine hours due to malfunctioning email spam filters. Many Outlook users have complained that all messages, even those that would have previously been marked as spam and sent to the junk folder, are now arriving in their inboxes. One user reported receiving 36 spam emails for two consecutive hours. While the current Outlook spam filtering issue appears to be extremely severe and affecting a large number of users, this has been occurring for months, with some users reporting receiving numerous spam emails since November 2021. This article continues to discuss the flooding of Outlook inboxes with spam emails due to broken spam filters.

    Bleeping Computer reports "Microsoft Outlook Flooded With Spam Due to Broken Email Filters"

  • news

    Visible to the public "GoDaddy Hackers Stole Source Code, Customer Details"

    Threat actors have accessed GoDaddy's servers via the cPanel shared hosting environment and installed malware in an attack that has spanned several years. According to the company, the breach was discovered in December 2022, after investigating customer complaints about sites used to redirect to random domains. The company found that at least three security incidents from 2020 to 2022 can be attributed to the same attacker. GoDaddy says that the same attackers carried out the 2021 breach when the company's email addresses of up to 1.2 million Managed WordPress customers had been accessed by an unauthorized third party. The same group is believed to be responsible for the 2020 incident, in which threat actors compromised the hosting login credentials of around 28,000 hosting customers and GoDaddy employees. In the most recent attack, threat actors redirected users to seemingly random websites through malware. GoDaddy claims that the issue has been resolved, and security steps have been taken to prevent further attacks. This article continues to discuss the GoDaddy breach.

    Cybernews reports "GoDaddy Hackers Stole Source Code, Customer Details"

  • news

    Visible to the public "Fortinet Plugs Critical Security Hole in FortiNAC, With a PoC Incoming (CVE-2022-39952)"

    Forty vulnerabilities have been fixed in a number of Fortinet products, including two critical vulnerabilities impacting FortiNAC and FortiWeb. Since cybercriminals like exploiting vulnerabilities in Fortinet enterprise solutions, and a proof-of-concept (PoC) exploit for one of the holes is scheduled to be released soon, administrators are urged to patch as soon as possible. CVE-2022-39952 is an external control of file name or path vulnerability in the webserver of the network access control product FortiNAC. An unauthenticated attacker can exploit this flaw to perform arbitrary writes on a vulnerable system. The issue has been resolved in FortiNAC versions 9.4.1 and above, 9.2.6 and above, 9.1.8 and higher, and 7.2.0 and higher. Horizon3's Attack Team has previously announced that a PoC and blog post describing the attack will be released shortly. This article continues to discuss the fix, potential exploitation, and impact of the vulnerabilities found in various Fortinet products.

    Help Net Security reports "Fortinet Plugs Critical Security Hole in FortiNAC, With a PoC Incoming (CVE-2022-39952)"

  • news

    Visible to the public "New Samsung Message Guard Protects Mobile Devices Against Zero-Click Exploits"

    With the launch of its latest flagship Galaxy smartphones, Samsung recently introduced a new sandbox feature named Message Guard, designed to protect devices against zero-click exploits. Samsung noted that Galaxy smartphones, through the Knox platform, are already protected against attacks involving video and audio file formats. The new Message Guard feature protects phones against threats disguised as image attachments. Samsung stated that Samsung Message Guard is an advanced sandbox. When an image file arrives, it is trapped and isolated from the rest of the device. Samsung noted that this prevents malicious code from accessing the phone's files or interacting with its operating system. Samsung Message Guard checks the file bit by bit and processes it in a controlled environment to ensure it cannot infect the rest of the device. Samsung stated that Message Guard works with the Samsung Messages and Messages by Google applications, but support will be extended to other messaging apps in the future. The new feature is currently available on Galaxy S23 smartphones, which Samsung launched on February 17. The tech giant said it will be gradually rolled out to other Galaxy phones and tablets later this year. Samsung noted that it will be available for devices running version 5.1 or higher of Samsung's One UI user interface. The company said Message Guard is active by default and runs silently in the background.

    SecurityWeek reports: "New Samsung Message Guard Protects Mobile Devices Against Zero-Click Exploits"

  • news

    Visible to the public "Police Bust $41m Email Scam Gang"

    A coordinated police operation across multiple countries recently led to the dismantling of a criminal network responsible for tens of millions of dollars in business email compromise (BEC) losses. Europol stated that there were five action days that took place between January 2022 and 2023 in France and Israel, leading to eight house searches and eight arrests, including the alleged Israeli gang leader. Europol noted that police also seized electronic equipment and vehicles, $3.4m from Portuguese bank accounts, $1.2m from Hungarian bank accounts, $641,000 from Croatian bank accounts, $427,000 from Spanish bank accounts, and $374,000 in virtual currencies. The group is said to have targeted victims in France. Europol stated that a resulting investigation revealed money mules operating for the gang in Croatia, Portugal, and Hungary. BEC has been the most lucrative form of cybercrime for the past few years, making fraud gangs billions in profits. The wide-ranging operation to track down the Franco-Israeli gang involved the Croatian National Police, the Croatian Anti Money Laundering Office, the French National Police, the French Gendarmerie, the Hungarian Budapest Metropolitan Police, the Israel Police, the Portuguese Judicial Police, and the Spanish National Police.

    Infosecurity reports: "Police Bust $41m Email Scam Gang"

  • news

    Visible to the public "Norway Seizes Millions in North Korean Crypto"

    Norwegian authorities have recently tracked and intercepted 60 million kroner ($5.9m) in cryptocurrency stolen last year by North Korean actors in the largest heist of its kind ever recorded. Norway's economic and environmental crime agency, Okokrim, claimed that the North Korean threat actors have been carrying out a massive money laundering operation ever since the March 2022 raid on Ronin Network. Vietnamese blockchain game developer Sky Mavis built Ronin Network to function as an Ethereum sidechain for its Axie Infinity game. Pyongyang-backed APT group Lazarus was able to breach the firm's network after an employee opened a malicious phishing email attachment. The hackers took an estimated $618m in cryptocurrency and hard cash in the world's biggest-ever cyber-heist. Okokrim's success comes a few months after investigators said they managed to seize $30m in funds stolen from Ronin. Okokrim stated that recently seized money will be returned to Sky Mavis so that it can reimburse some of its affected customers.

    Infosecurity reports: "Norway Seizes Millions in North Korean Crypto"

  • news

    Visible to the public "FBI 'Contains' Cyber-Incident on its Network"

    The FBI recently released a brief statement about a recent cyber-incident that occurred at one of its highest-profile field offices. The FBI claimed that the incident is now under control. The FBI stated that a malicious incident impacted part of its network used in investigations of images of child sexual exploitation. The FBI is currently working on gaining more information about the incident and does not have any further information at this time. This is not the first time hackers have targeted the bureau. In 2021, an official email address was reportedly compromised and used to spam at least 100,000 recipients.

    Infosecurity reports: "FBI 'Contains' Cyber-Incident on its Network"

  • news

    Visible to the public "Is Telegram the New Dark Web? Report Documents 'Cybercrime Ecosystem' on Messaging App"

    According to a new report from the cybercrime intelligence firm KELA, Telegram, a popular privacy-first messaging app, has become home to a "cybercrime ecosystem" similar to dark web forums. Cybercriminals are gathering on Telegram to plan the exchange of stolen personal data, facilitate ransomware payments, and more. Criminals are drawn to the messaging platform since it is simple to create new accounts without revealing any identifying information. Users can easily manage several accounts, signing up with foreign phone numbers that do not require having a SIM card or a major carrier. Although law enforcement has some visibility into user activity, identifying and tracking down a careful user is difficult. According to the report, several other encrypted chat apps have their own cybercrime ecosystems, including Discord, Jabber, Tox, and Wickr. However, none of these have anything near Telegram's core userbase or continuous rollout of new features. Some of these alternatives are also only popular in certain regions, such as Jabber, which is popular among Russian hackers. In addition, the alternatives lack the robust automatic translation that Telegram has. Researchers found that the Telegram cybercrime ecosystem is more focused on selling individual Personally Identifiable Information (PII) and login credentials than corporate secrets. Still, high-level database information does emerge for sale on occasion. For example, the database of an unnamed insurance company with 120 million subscribers was observed being sold for $360,000. This article continues to discuss Telegram becoming a major cybercrime ecosystem.

    CPO Magazine reports "Is Telegram the New Dark Web? Report Documents 'Cybercrime Ecosystem' on Messaging App"

  • news

    Visible to the public "35% More Patients Impacted by Healthcare Data Breaches in H2 2022"

    Healthcare data breaches had the most impact in the second quarter of 2022 compared to previous years, with a 35 percent rise in the number of patient records compromised, according to Crucial Insight's H2 2022 Healthcare Data Breach Report. Based on a review of breach data submitted to the HHS by healthcare organizations, the report discovered that victims of healthcare data breaches had 28.5 million records exposed in the second half of 2022, up from 21.1 million in 2019. Although the number of people affected by data breaches increased, the total number of breaches declined in 2022, resulting in a higher ratio of people affected per breach. In the second half of 2022, each breach affected about 91,028 patients, compared to only 61,246 in the first half of 2022. According to other health Information Technology (IT) vendors, most data breaches stemmed from hacking, which aligns with Crucial Insight's finding that hackers caused about 78 percent of healthcare data breaches. The percentage of hacking incidents rose from 61 percent in 2019 to 79 percent in 2022, while unauthorized access decreased from 27 percent in 2019 to 15 percent in 2022. Although hacking caused more breaches, the report found that unauthorized access exposes more records per breach. This article continues to discuss key findings from Critical Insight's H2 2022 Healthcare Data Breach Report.

    HealthITSecurity reports "35% More Patients Impacted by Healthcare Data Breaches in H2 2022"

  • news

    Visible to the public "Three Quarters of Vulnerabilities Currently Exploited by Ransomware Groups Were Discovered Before 2020"

    A new report from Cyber Security Works (CSW), Ivanti, Cyware, and Securin titled "2023 Spotlight Report: Ransomware Through the Lens of Threat and Vulnerability Management" highlights the need for an effective patch management approach. The report reveals that most vulnerabilities exploited by ransomware actors have been known for years. According to the study, more than 76 percent of the vulnerabilities still being exploited by ransomware groups were discovered between 2010 and 2019. The research highlighted 56 new vulnerabilities related to ransomware attacks out of 344 threats identified in 2022, representing a 19 percent year-over-year increase. The report also found that scanners are not picking up on all threats, since popular scanners did not detect 20 ransomware vulnerabilities. Advanced Persistent Threat (APT) groups are increasingly executing ransomware attacks, with CSW having reported over 50 APT groups using ransomware in attacks, which is an increase from 33 in 2020. Furthermore, the analysis discovered 57 ransomware-related vulnerabilities with low and medium-sized CVSS ratings associated with infamous ransomware families that can damage an organization and hinder business continuity. This article continues to discuss key findings from the new report on ransomware.

    Continuity Central reports "Three Quarters of Vulnerabilities Currently Exploited by Ransomware Groups Were Discovered Before 2020"

  • news

    Visible to the public "Data Leak Hits Thousands of NHS Workers"

    According to reports, an estimated 14,000 employees at a Liverpool NHS hospital trust have been informed that their data was leaked via email due to human error. Victims received an apology letter from the hospital trust's chief executive James Sumner. Sumner noted that a file containing sensitive payroll information was sent to hundreds of NHS managers and 24 external accounts. The spreadsheet file included a hidden tab that contained staff personal information. Sumner noted that while it was not visible to those receiving the email, it should not have been included in this spreadsheet. The information in this hidden tab included names, addresses, DOBs, NI numbers, gender, ethnicity, and salary. It did not include bank account details. Sumner reported that each of the 24 external recipients have been notified and confirmed the deletion of the file. Human error of this sort is a common cause of data leaks. According to Verizon, the "error" category accounted for 13% of breaches it analyzed last year. It contributed to a massive 82% of breaches that feature the "human element."

    Infosecurity reports: "Data Leak Hits Thousands of NHS Workers"

  • news

    Visible to the public "Hackers Earn $180,000 for ICS Exploits at Pwn2Own Miami 2023"

    White hat hackers recently received a total of $180,000 at the Pwn2Own Miami 2023 hacking contest for exploits targeting widely used industrial control system (ICS) products. At the ICS edition of Pwn2Own, hackers were invited to demonstrate exploits against OPC UA, data gateway, and edge products made by Aveva, Inductive Automation, ProSys, PTC, Softing Industrial Automation, Triangle MicroWorks, and Unified Automation. Prizes ranged between $5,000 and $40,000 per exploit chain, but none of the participants earned more than $20,000 for a single exploit. Researchers received $20,000 for remote code execution exploits targeting Triangle Microworks SCADA Data Gateway, Inductive Automation Ignition, and Softing EdgeAggregator Siemens. A majority of entries demonstrated DoS attacks and earned participants $5,000. The team from industrial cybersecurity firm Claroty was declared the winner, earning $98,500 for its exploits and an additional $25,000 representing the winner's bonus. Exploits earned participants nearly $155,000, excluding the winner's bonus. In comparison, at last year's ICS Pwn2Own, white hat hackers took home a total of $400,000 for more than two dozen unique exploits. Vulnerabilities demonstrated at Pwn2Own are reported to the vendors whose products they impact.

    SecurityWeek reports: "Hackers Earn $180,000 for ICS Exploits at Pwn2Own Miami 2023"

  • news

    Visible to the public "EU Cybersecurity Agency Warns Against Chinese APTs"

    According to the EU Agency for Cybersecurity (ENISA) and the Computer Emergency Response Team for the EU institutions, bodies, and agencies (CERT-EU), several Chinese state-sponsored threat groups have recently been observed targeting businesses and governments in the European Union. The advanced persistent threats (APTS) mentioned include APT27, APT30, APT31, Ke3chang, Gallium, and Mustang Panda. According to ENISA and CERT-EU, these threat actors present significant and ongoing threats to the European Union. Recent operations pursued by these actors focused mainly on information theft, primarily via establishing persistent footholds within the network infrastructure of organizations of strategic relevance. In July 2021, the EU urged Chinese authorities to take action against malicious cyber activities undertaken from their territory and linked to APT31.

    Infosecurity reports: "EU Cybersecurity Agency Warns Against Chinese APTs"

  • news

    Visible to the public "Cisco Issues Patch for Critical Vulnerability in Open-Source ClamAV Antivirus"

    Cisco has released a patch for a critical vulnerability found in its ClamAV open-source antivirus software. Cisco said that the issue, tracked as CVE-2023-2003, could enable Remote Code Execution on vulnerable devices and was given a "critical" rating of 9.8. It was discovered that the vulnerability impacts versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7. Cisco stated in an alert published on February 15 that the flaw impacted the ClamAV HFS+ file parser and could allow an "unauthenticated, remote attacker to execute arbitrary code" with the same privileges as the scanning process. According to the company, this vulnerability can also result in a Denial-of-Service (DoS) condition. This vulnerability stems from a missing buffer size check, which could lead to a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a specially crafted HFS+ partition file for ClamAV to scan on a vulnerable system. This article continues to discuss the potential impact and exploitation of the critical vulnerability discovered in the open-source ClamAV antivirus software.

    ITPro reports "Cisco Issues Patch for Critical Vulnerability in Open-Source ClamAV Antivirus"

  • news

    Visible to the public "BEC Groups Launch Executive Impersonation Attacks in at Least 13 Languages"

    Researchers at Abnormal Security have identified two groups who are using executive impersonation to carry out Business Email Compromise (BEC) attacks in at least 13 different languages. The researchers noted that while attacking targets in multiple regions and using multiple languages are not new tactics, in the past, these operations were typically performed by sophisticated groups with large budgets and resources. Due to the rise of automated translation tools such as Google Translate, threat actors can translate emails into any language they need, with greater ease. Abnormal Security has discovered two groups: Midnight Hedgehog, which engages in payment fraud, and Mandarin Capybara, which conducts payroll diversion attacks. The two groups have launched BEC attack campaigns in Danish, Dutch, Estonian, French, German, Hungarian, Italian, Norwegian, Polish, Portuguese, Spanish, and Swedish. This article continues to discuss the growth in BEC attacks and the launch of BEC campaigns in multiple languages by Midnight Hedgehog and Mandarin Capybara.

    SC Media reports "BEC Groups Launch Executive Impersonation Attacks in at Least 13 Languages"

  • news

    Visible to the public "XIoT Vendors Get Serious About Security, Devote Resources to Protect Cyber-Physical Systems"

    According to Claroty, cyber-physical system vulnerabilities disclosed in the second half of 2022 decreased by 14 percent since reaching a peak in the same period in 2021, while vulnerabilities discovered by internal research and product security teams surged by 80 percent over the same time frame. These findings suggest that security researchers are positively impacting the strengthening of security for Extended Internet of Things (XIoT) devices, which include cyber-physical systems across industrial, healthcare, and commercial environments. The findings also indicate that XIoT vendors are focusing more resources on examining the security and safety of their products. Claroty's new report provides an analysis of vulnerabilities affecting the XIoT, including Operational Technology and Industrial Control Systems (OT/ICS), Internet of Medical Things (IoMT) devices, building management systems, and enterprise IoT devices. This article continues to discuss key findings from Claroty's State of XIoT Security Report.

    Help Net Security reports "XIoT Vendors Get Serious About Security, Devote Resources to Protect Cyber-Physical Systems"

  • news

    Visible to the public "Hackers Target Chinese Language Speakers With FatalRat Malware"

    According to researchers at ESET, Chinese-speaking users are being targeted by the FatalRAT malware, which is spread via fake websites of widely-used apps. The FatalRat malware was first discovered in August 2021. It can record keystrokes, change a victim's screen resolution, download and execute files, and steal or delete browser-stored data. The researchers have not yet attributed this campaign to any known hacker group, and the attackers' purpose also remains unclear. The threat actors behind the campaign could be stealing information such as web credentials to sell on underground forums or use in other malicious activities. Most attacks were detected between August 2022 and January 2023, with Taiwan, China, and Hong Kong as the primary targets. Malaysia, Japan, the Philippines, Thailand, Singapore, Indonesia, and Burma have also faced a small number of attacks. The malware was spread via phishing websites posing as popular apps, including Google Chrome, Firefox, Telegram, WhatsApp, Signal, and Skype. Some of the websites provided fake Chinese-language versions of software that is unavailable in China, such as Telegram. This article continues to discuss the FatalRAT malware campaign.

    The Record reports "Hackers Target Chinese Language Speakers With FatalRat Malware"

  • news

    Visible to the public "Atlassian: Leaked Data Stolen via Third-Party App"

    A threat group known as SiegedSec recently published a collection of employee and operations data allegedly stolen from the software workforce collaboration tool company Atlassian. Atlassian, which is known for its Trello, Jira, and Confluence brands, is assuring its customers that their data is secure, and has explained that a third-party app was compromised, exposing employee information such as names, emails, departments, and floor plans of parts of Atlassian offices in San Francisco, California, and Sydney, Australia. This article continues to discuss the SiegedSec threat group leaking data that Atlassian says was stolen from a third-party app used to coordinate in-office resources.

    Dark Reading reports "Atlassian: Leaked Data Stolen via Third-Party App"

  • news

    Visible to the public "Hackers Backdoor Microsoft IIS Servers With New Frebniis Malware"

    Hackers are launching a new malware named Frebniis on Microsoft's Internet Information Services (IIS), stealthily executing commands sent via web requests. Frebniis was found by Symantec's Threat Hunter Team, who revealed that an unidentified threat actor is using it against targets in Taiwan. Microsoft IIS is a web server software that serves as a web server and web app hosting platform for services such as Outlook on the Web for Microsoft Exchange. In the attacks observed by Symantec, hackers exploit an IIS feature called "Failed Request Event Buffering" (FREB), which is responsible for gathering request metadata (i.e., IP address, HTTP headers, and cookies). Its objective is to help server administrators troubleshoot unexpected HTTP status codes or request processing issues. The Frebniis malware injects malicious code into a certain function of a DLL file that controls FREB, allowing an attacker to intercept and monitor all HTTP POST requests sent to the ISS server. When the malware detects specific HTTP requests sent by an attacker, it parses the requests to identify which commands to execute on the server. This article continues to discuss findings regarding the new Frebniis malware.

    Bleeping Computer reports "Hackers Backdoor Microsoft IIS Servers With New Frebniis Malware"

  • news

    Visible to the public "New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices"

    A new variant of the Mirai botnet has been discovered using multiple security flaws to spread to Linux and Internet of Things (IoT) devices. Discovered during the second part of 2022, the latest variant has been named V3G4 by Palo Alto Networks Unit 42, which identified three different campaigns likely carried out by the same threat actor. Once infected, the vulnerable devices would be fully controlled by the attackers and become part of the botnet, according to Unit 42 researchers. The threat actor is able to use these devices to execute additional attacks, including Distributed Denial-of-Service (DDoS) attacks. The adversary uses as many as 13 vulnerabilities that could result in Remote Code Execution (RCE) in targeting servers and networking devices running Linux. Atlassian Confluence Server and Data Center, DrayTek Vigor routers, Airspan AirSpot, Geutebruck IP cameras, and more, include the exploited vulnerabilities. This article continues to discuss the new Mirai botnet variant V3G4.

    THN reports "New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices"

  • news

    Visible to the public "Cybersecurity Defenders Are Expanding Their AI Toolbox"

    Deep Reinforcement Learning (DRL) is a form of Artificial Intelligence (AI) that scientists have taken a significant step toward using to defend computer networks. DRL was effective in preventing adversaries from achieving their goals up to 95 percent of the time when confronted with sophisticated cyberattacks in a rigorous simulation environment. The result suggests a potential role for autonomous AI in proactive cyber defense. Researchers at the Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL) documented their findings in a research paper and presented them at a workshop on AI for Cybersecurity during the annual meeting of the Association for the Advancement of AI in Washington, DC. The development of a simulation platform for testing multistage attack scenarios involving different types of adversaries was the initial step. The creation of such a dynamic attack-defense simulation environment allows researchers to examine the effectiveness of various AI-based defense strategies in controlled test conditions. Such tools are necessary for assessing the performance of DRL algorithms. The method is becoming an effective decision-support tool for cybersecurity experts. It provides a defense agent that can learn, quickly adapt, and make decisions autonomously. Although other forms of AI are commonly used to detect intrusions or filter spam messages, DRL enhances defenders' ability to orchestrate sequential decision-making plans in their everyday confrontations with attackers. According to the researchers, DRL offers smarter cybersecurity, the ability to detect changes in the cyber landscape earlier, and the chance to take preventative measures against a cyberattack. This article continues to discuss the PNNL scientist's research on DRL for cyber system defense under dynamic adversarial uncertainties.

    Pacific Northwest National Laboratory reports "Cybersecurity Defenders Are Expanding Their AI Toolbox"

  • news

    Visible to the public "Abertay University Project Combats Growing Threat of Romance Fraud"

    A project conducted by researchers at Abertay University aims to combat one of the most destructive and costly types of cybercrime affecting thousands of individuals. The project involves using a tool to detect scammers who are using online dating platforms to trick people. This rising type of fraud, known as romance fraud, includes scammers luring their victims into false relationships to steal their money or personal information. Despite its rising prevalence, success has been slow in combating romance fraud, with most efforts focusing on awareness-raising initiatives that are difficult for people to implement in their own lives. In contrast, Abertay University's "Broken Hearts, Empty Accounts" project takes a technological approach, with a new program that picks up on subtle cues in online conversations and protects users from being scammed. This article continues to discuss romance fraud and the Abertay University project aimed at combating this form of cybercrime.

    Abertay University reports "Abertay University Project Combats Growing Threat of Romance Fraud"

  • news

    Visible to the public "Hackers Leverage PayPal to Send Malicious Invoices"

    Security researchers at Avanan, a Check Point company, found that threat actors have been leveraging the online payments system PayPal to send malicious invoices directly to users through the platform. The researchers noted that this is different from others attacks spoofing Paypal as this malicious invoice comes directly from PayPal. The researchers stated that the phishing email seen as part of the malicious campaign warned users that there had been fraud on the account and threatened a fine of $699.99 should the victim not take action. The researchers noted that the body of the email could alert some cautious users that the email was not authentic. First, the grammar and spelling are all over the place. Second, the phone number they list is not related to PayPal. The researchers stated that the general goal of the threat actors is to have victims call the number or follow up for more details. If a victim calls that number, now they have the person's cell phone number and can use it for more attacks. The threat actors will also try to scam the victim while on call with them. According to the researchers, the perks of using PayPal for threat actors are several, including the ability to send many invoices at a time and make them professional-looking. The researchers noted that an email that comes directly from PayPal will pass all SPF, DKIM, and DMARC checks.

    Infosecurity reports: "Hackers Leverage PayPal to Send Malicious Invoices"

  • news

    Visible to the public "Quarter of Crypto Tokens Linked to Pump-and-Dump"

    Security researchers at Chainalysis have discovered that almost a quarter (24%) of cryptocurrency tokens launched last year displayed the tell-tale signs of a pump-and-dump fraud scheme. Pump-and-dump schemes are common in traditional finance. Fraudsters typically promote assets they hold stocks in to other investors, rapidly driving up the price. When it reaches a certain point, they sell the over-valued shares at a profit, causing the price to plummet. The researchers noted that crypto tokens, tradeable digital assets built on another cryptocurrency's blockchain, are increasingly popular among the same scammers. The researchers explained that "this is largely due to the relative ease with which bad actors can launch a new token and establish an artificially high price and market capitalization for it 'on paper' by seeding the initial trade volume and controlling the circulating supply." The researchers noted that, additionally, teams launching new projects and tokens can remain anonymous, which makes it possible for serial offenders to carry out multiple pump-and-dump schemes. Chainalysis looked at the 1.1 million tokens launched last year on the Ethereum and BNB blockchains. Of the 40,521 tokens that did gain traction, 9902 (24%) saw a 90% price drop in the first week after launch, singling them out as pump-and-dump scams. The researchers stated that it seems like the same fraudsters were responsible for multiple scams last year. The most prolific individual launched 264 suspect tokens in 2022. The researchers said that in total, buyers not believed to be associated with the tokens' creators spent a total of $4.6bn worth of cryptocurrency acquiring some of the 9902 suspected pump-and-dump tokens they identified. The researchers estimate that the creators of these tokens made a total of $30m in profits from selling off their holdings before the tokens' value plummeted.

    Infosecurity reports: "Quarter of Crypto Tokens Linked to Pump-and-Dump"

  • news

    Visible to the public "Experts Warn of Surge in Multipurpose Malware"

    Security researchers at Picus Security have warned that a growing number of versatile malware variants are capable of performing multiple malicious actions across the cyber-kill chain. Picus Security compiled its Red Report 2023 by analyzing over 500,000 malware samples last year, identifying their tactics, techniques, and procedures (TTPs), and extracting over 5.3 million "actions." The vendor then mapped these actions to MITRE ATT&CK techniques. The researchers found that the average malware variant now leverages 11 TTPs or nine MITRE ATT&CK techniques. One-third (32%) uses more than 20 TTPs, and one in 10 leverages over 30 TTPs. The researchers noted that this "Swiss Army knife" malware can enable attackers to move through networks undetected at great speed, obtain credentials to access critical systems, and encrypt data. The researchers found that 40% of the most prevalent MITRE ATT&CK techniques they identified were used to help with lateral movement. These included tried-and-tested techniques such as Command and Scripting Interpreter and OS Credential Dumping and newer ones such as Remote Services, Remote System Discovery, and WMI. The researchers noted that the most common technique used was Command and Scripting Interpreter, which involves the abuse of legitimate interpreters such as PowerShell, AppleScript, and Unix shells to execute arbitrary commands. The researchers stated that this highlights how hackers favor legitimate existing tools in their attacks rather than custom-developed ones. The second most common technique used was OS Credential Dumping, which attackers use to hijack accounts and move laterally. Third, came Data Encrypted for Impact, which reveals the continued threat posed by ransomware.

    Infosecurity reports: "Experts Warn of Surge in Multipurpose Malware"

  • news

    Visible to the public "ESXiArgs Ransomware Has Infected Hundreds of New Targets in Europe, Researchers Say"

    According to data collected by the security research firm Censys, the ESXiArgs ransomware has recently targeted over 500 European organizations. Researchers at Censys have been updating a dashboard that monitors the ransomware campaign's spread daily. In the past few days, researchers have seen slightly more than 500 hosts that have been recently infected with ESXiArgs. France experienced 217 new incidents, compared to 137 in Germany, 28 in the Netherlands, 23 in the UK, and 19 in Ukraine. The analysis also reveals that the initial infections date back to October 12, 2022, before European cybersecurity officials began issuing warnings about the ransomware on February 2, 2023. This article continues to discuss the infection of over 500 new targets in Europe by the ESXiArgs ransomware and other findings regarding the malicious campaign.

    The Record reports "ESXiArgs Ransomware Has Infected Hundreds of New Targets in Europe, Researchers Say"

  • news

    Visible to the public "AI-Based Visual Editing Service Leaks User Images and Customer Data"

    Internet users have become increasingly fascinated with Artificial Intelligence (AI)-based tools such as ChatGPT and DALL-E, but few have likely considered the security consequences of contributing text or images to such programs. Cybernews researchers have found that Cutout.pro, an AI-based visual design platform headquartered in Hong Kong, exposed user-generated content through an unprotected ElasticSearch instance. With the help of an AI-based Application Programming Interface (API), Cutout.pro's services enable users to alter photos and create images. The functionality allows the integration of the company's services into third-party applications. According to the team, Cutout.pro exposed usernames and images made by customers with the company's tools. The instance also contained information regarding the number of user credits, a virtual in-service currency, as well as links to Amazon S3 buckets containing generated images. The exposed instance had about 22 million log entries that referenced usernames for individual users and business accounts, but this does not mean that the same number of users were exposed, as there were duplicate log entries. This article continues to discuss the exposure of data by the AI media manipulation service Cutout.pro.

    Cybernews reports "AI-Based Visual Editing Service Leaks User Images and Customer Data"

  • news

    Visible to the public "ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally"

    Experiments have demonstrated that ChatGPT, a popular Large Language Model (LLM), could help defenders in triaging potential security incidents and finding security flaws in code, even though the Artificial Intelligence (AI) model was not trained for such tasks. In an analysis of ChatGPT's value as an incident response tool, researchers determined that it could identify malicious processes running on compromised systems. The researchers infected a system with the Meterpreter and PowerShell Empire agents, assumed the role of an adversary, and then went through the system with a ChatGPT-powered scanner. The LLM identified two malicious processes running on the system and correctly disregarded 137 benign processes, potentially significantly decreasing overhead. This article continues to discuss the potential use of ChatGPT as a tool for incident response triage and software vulnerability discovery.

    Dark Reading reports "ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally"

  • news

    Visible to the public "High-Risk Users May Be Few, but the Threat They Pose Is Huge"

    According to research conducted by Elevate Security, about 10 percent of the workforce is composed of high-risk users, who are in every department and function of the business. In addition, the study uncovered multiple unexpected findings. For example, contractors are less likely to pose a high risk than employees, and simulated phishing is not a reliable indicator of who poses a high risk for real phishing attacks. This study debunks the idea that many traditional ways to decrease user risk rely on simulated phishing tests as the major determinant for detecting potentially risky individuals. Although they constitute a small portion of the population, high-risk users pose a significant threat to the organization. This article continues to discuss key findings from Elevate Security's research on high-risk users.

    Help Net Security reports "High-Risk Users May Be Few, but the Threat They Pose Is Huge"

  • news

    Visible to the public "Hackers Start Using Havoc Post-exploitation Framework in Attacks"

    According to security researchers, threat actors are now using Havoc, an open-source command-and-control (C2) framework, as an alternative to paid options such as Cobalt Strike and Brute Ratel. Havoc's cross-platform nature and ability to evade Microsoft Defender on Windows 11 devices via sleep obfuscation, return address stack spoofing, and indirect syscalls are among its features. Similar to previous exploitation kits, Havoc includes various modules that enable pen testers (and hackers) to execute commands, manage processes, download additional payloads, manipulate Windows tokens, and execute shellcode. This article continues to discuss threat actors switching to a new and open-source C2 framework known as Havoc as an alternative to paid options.

    Bleeping Computer reports "Hackers Start Using Havoc Post-exploitation Framework in Attacks"

  • news

    Visible to the public "Researchers Warn of Critical Security Bugs in Schneider Electric Modicon PLCs"

    Two new vulnerabilities affecting Schneider Electric Modicon Programmable Logic Controllers (PLCs) have been reported by security researchers at Forescout. These vulnerabilities could allow authentication bypass and Remote Code Execution (RCE). The vulnerabilities, tracked as CVE-2022-45788 and CVE-2022-45789, are part of a larger set of security vulnerabilities identified by Forescout as OT:ICEFALL. A successful attack using the vulnerabilities could allow an adversary to execute unauthorized code, cause a Denial-of-Service (DoS) condition, or disclose sensitive data. According to the cybersecurity firm, a threat actor can chain the vulnerabilities with known vulnerabilities from other vendors to achieve deep lateral movement in Operational Technology (OT) networks. This movement enables attackers to obtain deep access to Industrial Control Systems (ICS) and cross often-overlooked security perimeters, enabling them to carry out highly granular and covert manipulations and to circumvent functional and safety constraints. A proof-of-concept (PoC) cyber-physical attack revealed that the vulnerabilities could be exploited to evade safety guardrails and cause damage to a movable bridge's infrastructure. This article continues to discuss the new critical security flaws impacting Schneider Electric Modicon PLCs.

    THN reports "Researchers Warn of Critical Security Bugs in Schneider Electric Modicon PLCs"

  • news

    Visible to the public "Our Neurodata Can Reveal Our Most Private Selves. As Brain Implants Become Common, How Will It Be Protected?"

    Brain-Computer Interfaces (BCIs) offer regained mobility and, more recently, thought-to-text capabilities to millions of people living with paralysis, epilepsy, and neuromuscular conditions. Few implanted versions of the technology have been commercialized, but several companies are working to change that. BCIs will eventually enable individuals to perform various tasks with their minds. Implanted BCIs can provide rich access to brain signals, but there is no option to select which signals are shared. According to Christina Maher, a researcher at the University of Sydney, brain data is the most private information due to the conclusions that could be drawn about a person's identity and mental state. However, private BCI companies may not be required to inform users about which data is used to train algorithms or how the inputs are connected to interpretations that result in outputs. In Australia, strict data storage rules require that all BCI-related patient data be stored on secure servers in an anonymized form, thereby protecting patient privacy. Still, requirements outside of the context of research remain unclear. As with many industries where data protection is crucial, there is a risk of neurodata hacking in which cybercriminals access and exploit brain data. This article continues to discuss BCIs and the potential privacy and security risks associated with them.

    The Conversation reports "Our Neurodata Can Reveal Our Most Private Selves. As Brain Implants Become Common, How Will It Be Protected?"

  • news

    Visible to the public "Developing a Successful Cyber Resilience Framework"

    According to Alberto G. Alexander, Ph.D., cyber resilience combines information security, business continuity, and organizational resilience. He has described the components of an effective cyber resilience strategy and highlighted a cyber resilience framework's elements. Adverse cyber events have a negative impact on the availability, integrity, or confidentiality of networked Information Technology (IT) systems and the associated data and services. These incidents could be intentional, such as a cyberattack, or unintentional, like a software update failure. Humans, nature, or a combination of both may also cause adverse cyber events. The purpose of cyber resilience is to sustain the entity's ability to consistently deliver the desired outcome at all times. This requires doing so even when normal distribution systems have failed, such as during a crisis or a security breach. In addition, the idea of cyber resilience encompasses the ability to restore or recover regular delivery methods following such incidents, as well as the ability to continuously update or adapt these delivery mechanisms as risks and threats evolve. In the process of restoring delivery methods, backups and disaster recovery procedures are included. This article continues to discuss the elements of a successful cyber resilience strategy, the components of a cyber resilience framework, and the best cyber practices presented by Dr. Alberto G. Alexander.

    Continuity Central reports "Developing a Successful Cyber Resilience Framework"

  • news

    Visible to the public "An AI Flew a US Air Force Training Aircraft For Over 17 Hours"

    An artificial intelligence agent recently flew the Lockheed Martin VISTA X-62A training aircraft for over 17 hours. VISTA, which stands for Variable In-flight Simulation Test Aircraft, can use software to simulate the performance characteristics of other aircraft. On this occasion, it mimicked a human pilot instead. Lockheed stated that the flight took place during a testing period in December. Lockheed noted that this is the first time that AI has been engaged in such a way on a tactical aircraft. Lockheed stated that the aim is to use the platform to test aircraft designs that can be flown autonomously. US Air Force Test Pilot School (USAF TPS) director of research, Dr. M. Christopher Cotting, stated that "VISTA will allow us to parallelize the development and test of cutting-edge artificial intelligence techniques with new uncrewed vehicle designs." Cotting noted that this approach, combined with focused testing on new vehicle systems as they are produced, will rapidly mature autonomy for uncrewed platforms and allow us to deliver tactically relevant capability to our warfighters. The USAF recently upgraded the VISTA X-62A with Lockheed's Model Following Algorithm (MFA) and System for Autonomous Control of the Simulation (SACS). When integrated, these systems help VISTA carry out advanced flight tests that harness autonomy and AI.

    Engadget reports: "An AI Flew a US Air Force Training Aircraft For Over 17 Hours"

  • news

    Visible to the public "Chinese Threat Group Leaks Hacking Secrets in Failed Attack"

    Group-IB's analysis of an intercepted spear-phishing email provides further insight into the hacking techniques of the Chinese state-sponsored espionage threat actor known as Tonto Team. According to the security firm, a spear-phishing attempt against its own employees in July 2022 was made by the Chinese threat actor that historically targeted South Korea, Japan, Taiwan, and the US but has since expanded operations to include additional Asian and Eastern European nations. The US-China Economic and Security Review Commission's analysis found that Tonto Team is likely a unit of the People's Liberation Army, which in 2017, allegedly hacked multiple South Korean organizations involved in the deployment of an American anti-ballistic missile defense system. In 2021, the cybersecurity company ESET identified it as a participant in the wave of Chinese state-sponsored hackers exploiting vulnerabilities in Microsoft Exchange. During the summer, Malwarebytes discovered that the group was extending its eavesdropping operations against Russian government agencies. No single indicator prompted Group-1B to believe that Tonto Team was behind their phishing attempt, but evidence began to mount. Attached to the phishing email was a document containing metadata that revealed the default language to be "Chinese People's Republic of China." The attachment was a rich text format file created with the Royal Road RTF Weaponizer, a malware tool primarily used by Chinese Advanced Persistent Threat (APT) groups. This article continues to discuss findings regarding the Chinese state-sponsored espionage threat actor Tonto Team.

    DataBreachToday reports "Chinese Threat Group Leaks Hacking Secrets in Failed Attack"

  • news

    Visible to the public "Community Health Systems Data Breach Caused by GoAnywhere MFT Hack"

    Community Health Systems (CHS) is one of the leading healthcare providers in the US. CHS operates 79 acute-care hospitals and over 1,000 other care locations, including physician practices, urgent care centers, freestanding emergency departments, occupational medicine clinics, imaging centers, cancer centers, and ambulatory surgical centers. Threat actors used the zero-day vulnerability, tracked as CVE-2023-0669, in Fortra's GoAnywhere MFT secure file transfer platform to launch an attack against CHS. CHS was recently informed that its third-party provider Fortra had suffered a security breach, which compromised company data. An investigation into whether any CHS systems were compromised revealed that 1 million patients were affected. Researchers at the threat intelligence company Huntress shared the results of their investigation into the exploitation of GoAnywhere MFT and attributed the attacks to the TA505 threat actors. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) added the GoAnywhere MFT vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog last week, requiring that federal agencies remediate it by March 3, 2023. This article continues to discuss the latest findings regarding the CHS data breach.

    Security Affairs reports "Community Health Systems Data Breach Caused by GoAnywhere MFT Hack"

  • news

    Visible to the public "SAS App and Website Hit as Attacks Target Swedish Firms"

    Scandinavian airline SAS was hit by a cyberattack yesterday that reportedly downed its website and app and may have leaked customer information for a brief time. Customers were urged to refrain from using the airline's mobile app as they may be served incorrect information. Some users were apparently logged into the wrong accounts and therefore had access to the personal details of other customers. The company's website was also reportedly down for a time. Customers claimed that they were also not able to buy plane tickets yesterday. It's unclear whether all of the reported issues have been resolved because the company has yet to share much information about the cyberattack or what impact the cyberattack has had on its operations. Threat actors also targeted several Scandinavian media companies yesterday, including Swedish TV channel svt. The DDoS attacks were claimed by a group describing itself as "Anonymous Sudan," who said they were retaliating against a recent incident of Quran burning near Turkey's embassy in Stockholm. Experts are claiming that the DDoS attack may be a Russian false-flag campaign designed to continue whipping up hatred towards Sweden in Muslim countries like Turkey.

    Infosecurity reports: "SAS App and Website Hit as Attacks Target Swedish Firms"

  • news

    Visible to the public "Malicious DDoS Attacks up by 150 Percent"

    Globally, the number of Distributed Denial-of-Service (DDoS) attacks increased by 150 percent in 2022 compared to the previous year, while the number of attacks in the Americas increased by 212 percent compared to 2021. The 2022 Global Threat Analysis Report published by Radware reveals that the frequency of DDoS attacks has increased significantly. In the fourth quarter of 2022, companies mitigated an average of 29.3 attacks per day, which is 3.5 times greater than the 8.4 attacks mitigated per day at the end of 2021. The overall volume of attacks recorded in 2022 was 4.44PB, an increase of 32 percent compared to 2021, with the Americas experiencing the most significant rise of 1100 percent. Although EMEA outpaced the Americas in terms of attack frequency, its total attack volume decreased by 44 percent in 2022 compared to the previous year. The largest attack recorded globally in 2022 was 1.46Tbps, which was 2.8 times larger than the biggest attack reported in 2021. The complexity of DDoS attacks has also increased. Typically, attackers choose diverse channels to amplify their impact and make attack prevention more difficult. In 2022, attacks above 1Gbps had an average of more than two different attack vectors, and attacks above 10Gbps were twice as complicated. Attacks above 100Gbps had, on average, over nine different attack vectors, with the most complex attacks involving 38 distinct vectors. This article continues to discuss key findings from Radware's 2022 Global Threat Analysis Report.

    BetaNews reports "Malicious DDoS Attacks up by 150 Percent"

  • news

    Visible to the public "Dozens of Vulnerabilities Patched in Intel Products"

    Intel recently announced patches for dozens of vulnerabilities across its product portfolio, including critical and high-severity issues. The most severe of these flaws is CVE-2021-39296 (CVSS score of 10), which impacts the Integrated Baseboard Management Controller (BMC) and OpenBMC firmware of several Intel platforms. Intel noted that the bug was identified in 2021 in the netipmid (IPMI lan+) interface and could allow an attacker to obtain root access to the BMC, bypassing authentication using crafted IPMI messages. Four other vulnerabilities were addressed in BMC, and OpenBMC firmware, including a high-severity, out-of-bounds read issue that could lead to denial-of-service (DoS). Intel has addressed these bugs with the release of Integrated BMC firmware versions 2.86, 2.09, and 2.78, and OpenBMC firmware versions 0.72, wht-1.01-61, and egs-0.91-179. The company noted that patches were also released for a high-severity privilege escalation defect in Xeon processors with SGX (CVE-2022-33196). Both BIOS and microcode updates that address this issue are now available. Intel also warned of a high-severity escalation of privilege issue (CVE-2022-21216) impacting Atom and Xeon processors and released microcode updates for Xeon to address CVE-2022-33972, an incorrect calculation bug that could lead to information disclosure. Intel also announced updates that resolve high-severity privilege escalation defects in the BIOS firmware and Trusted Execution Technology (TXT) Secure Initialization (SINIT) Authenticated Code Modules (ACM) of some processors. Updates were also released to resolve high-severity flaws in Driver Support Assistant (DSA) software and high and medium severity vulnerabilities in Battery Life Diagnostic Tool, oneAPI Toolkits, System Usage Report (SUR), Server Platform Services (SPS) firmware, and Quartus Prime Pro and Standard edition software. The company noted that various medium-severity vulnerabilities were also resolved in the FPGA SDK for OpenCL Quartus Prime Pro software, Integrated Sensor Solution, Media Software Development Kit (SDK), Trace Analyzer and Collector software, and Xe MAX drivers for Windows. Intel recommends that users update to the latest available firmware and software versions as soon as possible.

    SecurityWeek reports: "Dozens of Vulnerabilities Patched in Intel Products"

  • news

    Visible to the public "Tonga Is the Latest Pacific Island Nation Hit With Ransomware"

    A ransomware attack has targeted Tonga's state-owned telecommunications company. Tonga Communications Corporation (TCC), one of the country's two telecommunications companies, announced that the attack could slow down administrative operations. The ransomware attack encrypted and locked access to a part of TCC's system, but did not disrupt the delivery of voice and Internet services to users. However, it may slow down the connection of new users, the delivery of bills, and the management of consumer communications, according to the company. The Polynesian country consists of about 171 islands and has a population of around 100,000. TCC manages all fixed telephone lines and has a 70 percent market share in dial-up and broadband Internet. With over 300 employees, the company operates nearly half of the mobile phone services. According to cybersecurity researcher Dominic Alvieri, the Medusa ransomware group claimed responsibility for the attack on TCC. In a 2022 advisory, the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), warned that Medusa is based on a Ransomware-as-a-Service (RaaS) model and shares 60 percent of ransoms with affiliates while keeping the remaining 40 percent. Observed as recently as May 2022, MedusaLocker attackers mostly exploit Remote Desktop Protocol (RDP) vulnerabilities to gain access to victim networks. This article continues to discuss the ransomware attack faced by Tonga.

    The Record reports "Tonga Is the Latest Pacific Island Nation Hit With Ransomware"

  • news

    Visible to the public "India-Linked Group Used Telegram to Mastermind Cyberattacks Across Asia, Says Analyst"

    In 2021, SideWinder, also known as Hardcore Nationalist (HN2), targeted more than 60 organizations in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka, according to Group-IB. By a wide margin, government agencies were the most heavily attacked, with 44 targeted versus only four military organizations, while nearly half of the attacks were directed at targets in Nepal. Group-IB also noticed SideWinder using the popular messaging application Telegram to process data from targeted systems. According to Group-IB, due to its relative ease of use, the communication platform has gained popularity as a command-and-control (C2) center or base of operations among Advanced Persistent Threat (APT) groups and financially-motivated cybercriminals during the past year. SideWinder was also found to be improving its toolkit, with Group-IB identifying SideWinder.StealerPy as one of the tools. It is described as a Python-written information stealer that exfiltrates data stolen from the victim's computer. This article continues to discuss researchers' findings and observations regarding the SideWinder group.

    Cybernews reports "India-Linked Group Used Telegram to Mastermind Cyberattacks Across Asia, Says Analyst"