News Items

  • news

    Visible to the public "PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks"

    According to Aqua Nautilus researchers, Microsoft's PowerShell Gallery poses a software supply chain risk due to its relatively weak protection against attackers uploading malicious packages to the online repository. Recent testing of the repository's policies regarding package names and owners revealed that a threat actor could easily exploit them to spoof legitimate packages and make it difficult for users to identify a true package owner. This article continues to discuss the software supply chain risk posed by Microsoft's PowerShell Gallery.

    Dark Reading reports "PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks"

  • news

    Visible to the public "AnonFiles Shuts Down After Massive User Abuse"

    A popular anonymous file sharing service used by security researchers and threat actors has recently closed down, citing "extreme volumes" of users abusing it. AnonFiles was a going concern for two years, enabling anyone to share files without fear of being tracked online. It became a popular way for malicious hackers to share stolen data such as logins and personally identifiable information (PII). The company stated, "After trying endlessly for two years to run a file sharing site with user anonymity, we have been tired of handling the extreme volumes of people abusing it and the headaches it has created for us. The admins noted that they banned file names and usage patterns connected to "abusive material" to the point where they didn't care even about accidentally deleting thousands of false positives in the process. The site admins are now trying to find a buyer for the domain.

    Infosecurity reports: "AnonFiles Shuts Down After Massive User Abuse"

  • news

    Visible to the public "'Distilling' Outdated Software Could Save Defense Dept. Millions in Time and Money"

    Many highly sophisticated systems, such as those that power drones, fighter jets, and even secure authentication programs, are custom software developed at great expense. It is not as simple as downloading the latest software patch and clicking "Install" to update them. It often requires an expensive and time-consuming rewrite or reverse engineering process. Therefore, Georgia Tech engineers, computer scientists, and cybersecurity researchers are working to accelerate the process with a Defense Advanced Research Projects Agency (DARPA)-funded project. Their goal is to unpack these legacy systems, incorporate updates, and redeploy them in weeks or months as opposed to years. About halfway through the five-year project, the team has a prototype pipeline that automates significant portions of the process using Georgia Tech-developed software analysis techniques. This article continues to discuss the DARPA-funded effort to update critical defense software.

    Georgia Tech reports "'Distilling' Outdated Software Could Save Defense Dept. Millions in Time and Money"

  • news

    Visible to the public "Think Twice Before Accepting Notifications on Chrome: Threats on the Rise"

    Many websites request permission to display notifications upon arrival. Many users unknowingly expose themselves to risk because they are accustomed to agreeing to generic prompts. Oren Koren, co-founder of the cybersecurity company Veriti, warns that sometimes a single permission is enough to white-list malware delivery. A user visits a website where the browser pops up an alert asking to show notifications for the website. If the user agrees, this website will push notifications to any browser tabs and even among system notifications. Similar to operating system notifications, these notifications appear on the main computer or phone screen. This can be an easy and effective method to deliver malware. It is embedded in the user profile connected to the browser. This article continues to discuss websites exploiting push notification functionality to serve ads, malware, or phish users' credentials.

    Cybernews reports "Think Twice Before Accepting Notifications on Chrome: Threats on the Rise"

  • news

    Visible to the public "Jefferson Cherry Hill Warns of Possible Data Breach. What Info May Have Been Exposed?"

    A missing piece of electronic equipment at Jefferson Health's hospital in Cherry Hill may have compromised the personal information of some of its patients, the health care provider recently revealed. Jefferson Health said it began mailing letters Tuesday to alert patients whose information may have been involved in a potential breach it describes as a "recent privacy incident." According to the hospital, the possible privacy breach involved a backup DEXA scan drive that contained partial information about patients. The hospital did not provide the number of patients that may have been impacted there but said the potential breach was recognized by a maintenance technician working on the machine. Jefferson said the information on the drive could be viewable and would include names, dates of birth, medical record numbers, the dates of studies, and, in some cases, mailing addresses. However, the hospital noted that other sensitive patient information, such as Social Security numbers, driver's licenses, phone numbers, and insurance numbers, are only viewable with the appropriate credentials, exact system software, and additional technology.

    Courier Post reports: "Jefferson Cherry Hill Warns of Possible Data Breach. What Info May Have Been Exposed?"

  • news

    Visible to the public "CISA Publishes JCDC Remote Monitoring and Management Systems Cyber Defense Plan"

    As part of its 2023 Planning Agenda, the US Cybersecurity and Infrastructure Security Agency (CISA) has released the Cyber Defense Plan for Remote Monitoring and Management (RMM), the first proactive plan developed by industry and government partners through the Joint Cyber Defense Collaborative (JCDC). This plan provides a roadmap for improving the security and resilience of the RMM ecosystem, as well as advancing efforts in the National Cyber Strategy to scale public-private collaboration and the CISA Cybersecurity Strategic Plan to drive the adoption of the most effective security measures. Organizations use RMM products to gain efficiency and benefit from scalable services. However, adversaries are increasingly targeting these benefits to compromise large numbers of downstream customer organizations. By focusing on RMM products, threat actors attempt to dodge detection and maintain persistent access, also known as "living off the land." This article continues to discuss the Cyber Defense Plan for RMM.

    CISA reports "CISA Publishes JCDC Remote Monitoring and Management Systems Cyber Defense Plan"

  • news

    Visible to the public "Web App Warning: 74% Of Apps With PII Are Vulnerable to a 'Major Exploit'"

    An analysis of 3.5 million business assets revealed that most Internet-exposed web apps containing Personal Identifiable Information (PII) are vulnerable to cyberattacks. Hackers use PII for financial, credential, and phishing-related attacks. Seventy-four percent of the web apps the security company CyCognito examined contain PII vulnerable to at least one known major exploit, such as Apache Superset, Papercut, or MOVEit. The report discovered that 11 percent of vulnerable assets had multiple "easily exploitable" flaws, including misconfiguration, lack of secure HTTPS encryption, and the absence of a Web Application Firewall (WAF). According to the report, the average enterprise has over 12,000 web apps, of which at least 30 percent, or more than 3,000 assets, contain at least one exploitable or high-risk vulnerability. This article continues to discuss key findings from CyCognito's analysis.

    SC Magazine reports "Web App Warning: 74% Of Apps With PII Are Vulnerable to a 'Major Exploit'"

  • news

    Visible to the public "A Third of UK University Students Targeted By Fraud"

    Security researchers at NatWest discovered that one in three students at British universities encountered fraud attempts online last year. The researchers polled over 3000 UK university students from 63 towns and cities back in May. The most common fraud attempts the researchers came across over the period were delivery scams, which 14% of respondents said they'd seen. The researchers noted that these are effectively phishing emails impersonating a well-known courier brand. They claim the recipient has a parcel waiting but needs to click through and enter their personal details, sometimes including financial information, to reschedule the delivery. The researchers stated that social media and HMRC tax scams were also frequently encountered by respondents. However, fraud relating to high street banks appeared to drop from 2022 figures, hitting just 10% of those polled for the study. The researchers said women were "slightly more likely" to have encountered a scam in the past 12 months and were over twice as likely to lose money than men. The average amount lost by victims of fraud was around $102. Students living in Bournemouth were most likely to have been hit by scams, with 44% of respondents living in the south coast city saying they had encountered fraud over the previous year. Next came Edinburgh and Oxford. Students in Bristol and Leicester were least likely to be on the receiving end of a fraud attempt (25%).

    Infosecurity reports: "A Third of UK University Students Targeted By Fraud"

  • news

    Visible to the public "DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities"

    OpenAI, Google, Meta, and other companies tested their Large Language Models (LLMs) at the DEF CON hacker conference. Results from the event have provided the White House Office of Science and Technology Policy and the Congressional AI Caucus with a new corpus of information. The Generative Red Team Challenge, organized by AI Village, SeedAI, and Humane Intelligence, provides greater insight into the potential misuse of generative Artificial Intelligence (AI) and what methods could secure it. During the challenge, hackers were tasked with forcing generative AI to produce personal or harmful information, contrary to its intended function. The AI Village team is still analyzing the event's data and expects to present it in September 2023. This article continues to discuss the Generative Red Team Challenge influencing AI security policy, the vulnerabilities LLMs are likely to have, and how to prevent these vulnerabilities.

    TechRepublic reports "DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities"

  • news

    Visible to the public "Ransomware Hit Disrupts Real Estate Property Listings in US"

    A ransomware attack has disrupted property listings across the US. Real estate agents lost the ability to list or update property information due to an attack on the California-based data services company Rapattoni, which hosts Multiple Listing Services (MLS). Regional MLS databases are used by the real estate industry so that brokers can share information. This information powers listing websites and enables cooperating brokers to market one another's properties. Many regional MLS providers rely on Rapattoni's services to identify new properties on the market, update home listings, connect buyers and sellers to facilitate offers, track commissions for listing agents, and more. This article continues to discuss the impact of the cyberattack on the Rapattoni-hosted MLS.

    BankInfoSecurity reports "Ransomware Hit Disrupts Real Estate Property Listings in US"

  • news

    Visible to the public "Chrome 116 Patches 26 Vulnerabilities"

    Google recently announced the release of Chrome 116 to the stable channel with patches for 26 vulnerabilities, including 21 reported by external researchers. Of the externally reported bugs, eight have a severity rating of "high," with most of them being memory safety issues. Based on the bug bounty reward paid out, the most important of these is CVE-2023-2312, a use-after-free flaw in the Offline component. Google noted that the reporting researcher was awarded a $30,000 bounty for the finding. Next in line is CVE-2023-4349, a use-after-free issue in Device Trust Connectors, followed by an inappropriate implementation in Fullscreen (CVE-2023-4350), and a use-after-free bug in Network (CVE-2023-4351), for which Google paid out bounties of $5,000, $3,000, and $2,000, respectively. Google noted that the remaining four high-severity vulnerabilities that Chrome 116 resolves include a type confusion flaw in the V8 JavaScript engine, a heap buffer overflow bug in ANGLE, another in Skia, and an out-of-bounds memory access issue in the V8 engine. These issues were reported by researchers at Google Project Zero and Microsoft Vulnerability Research, and, per Google's policy, no bug bounty reward will be issued for them. Google stated that all the remaining externally-reported vulnerabilities addressed in Chrome 116 are medium-severity: six inappropriate implementation bugs, three use-after-free issues, two insufficient policy enforcement flaws, one insufficient validation of untrusted input, and one heap buffer overflow vulnerability. Overall, Google gave the reporting researchers $63,000 in bug bounty rewards. The internet giant does not mention any of these vulnerabilities being exploited in attacks. The latest Chrome iteration is rolling out as version 116.0.5845.96 for Mac and Linux and as versions 116.0.5845.96/.97 for Windows.

    SecurityWeek reports: "Chrome 116 Patches 26 Vulnerabilities"

  • news

    Visible to the public "Monti Ransomware Targets Legal and Gov't Entities With New Linux-Based Variant"

    According to new research, the Monti hacker group appears to have reemerged after a two-month hiatus, claiming to target legal and government entities with a new Linux-based ransomware variant. Monti was discovered in June 2022, following the infamous Conti ransomware group ceasing operations. The hackers imitated their predecessors by using a similar name, copying Conti's attack methods, and using Conti's leaked source code to create tools. However, according to Allan Liska, an expert on ransomware at Recorded Future, the group behind the Monti ransomware seems to be relatively inexperienced. According to Trend Micro, at least 13 apparent victims from the legal, financial, and healthcare sectors have been listed on Monti's leak site since March. Liska noted that their victims have not been widespread, but the group appears to have struck enough to likely reinvest a portion of their ransom payments in developing new and improved code. This article continues to discuss the reemergence of the Monti hacker gang with a new Linux-based variant.

    The Record reports "Monti Ransomware Targets Legal and Gov't Entities With New Linux-Based Variant"

  • news

    Visible to the public "Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations"

    Multiple critical security vulnerabilities have been discovered in Ivanti Avalanche, an enterprise mobile device management solution used by 30,000 organizations. Ivanti Avalanche WLAvanacheServer.exe v6.4.0.0 contains the vulnerabilities, collectively tracked as CVE-2023-32560, with a CVSS score of 9.8. According to the cybersecurity company Tenable, they are stack-based buffer overflows. Tenable said the flaws stem from buffer overflows caused by processing certain data types. An unauthenticated remote attacker could specify a long hex string or long type 9 item to overflow the buffer. Exploiting both issues enables a remote adversary to achieve code execution or a system crash. This article continues to discuss the security flaws found in Ivanti Avalanche.

    THN reports "Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations"

  • news

    Visible to the public "Almost 2,000 Citrix NetScaler Servers Backdoored in Hacking Campaign"

    Nearly 2,000 Citrix NetScaler servers have been compromised in a massive campaign exploiting the critical Remote Code Execution (RCE) flaw, tracked as CVE-2023-3519. According to researchers, over 1,200 servers were backdoored before administrators installed the patch for the vulnerability, and they remain compromised because they have not been inspected for signs of successful exploitation. Researchers from the cybersecurity company Fox-IT (part of the NCC Group) and the Dutch Institute of Vulnerability Disclosure (DIVD) uncovered the large-scale campaign planting webshells on vulnerable Citrix NetScaler servers. This article continues to discuss the hacking campaign that has compromised almost 2,000 Citrix NetScaler servers.

    Bleeping Computer reports "Almost 2,000 Citrix NetScaler Servers Backdoored in Hacking Campaign"

  • news

    Visible to the public "QR Code Phishing Campaign Targets Top US Energy Company"

    A major US energy company was the target of a phishing campaign that sent more than 1,000 emails containing malicious QR codes designed to steal Microsoft credentials. The campaign, which Cofense discovered in May, used both PNG image attachments and redirect links associated with Microsoft Bing and well-known business applications, such as Salesforce and CloudFlare's Web3 services, with embedded QR codes. The fake Microsoft security alerts claimed that recipients were required to update their account's security settings for two-factor authentication (2FA), multi-factor authentication (MFA), and more. The images and links within the messages led recipients to a phishing page aimed at stealing Microsoft credentials. Although the campaign impacted multiple industries, a leading energy company in the US received the lion's share of the phishing emails, with its employees receiving over 29 percent of the more than 1,000 emails containing malicious QR codes. This article continues to discuss findings regarding the QR code phishing campaign.

    Dark Reading reports "QR Code Phishing Campaign Targets Top US Energy Company"

  • news

    Visible to the public "LinkedIn Users Targeted in Account Hijacking Campaign"

    LinkedIn users are the target of an ongoing account hijacking campaign. They are getting locked out of their accounts. The threat actors behind the malicious campaign are holding the compromised accounts for ransom. The Cyberint research team has observed a significant increase in online conversations on various social media platforms about LinkedIn accounts being compromised. Google Trends reveals that searches for "LinkedIn account hacked 2023" and "LinkedIn account recovery appeal" have increased by over 5,000 percent. The researchers hypothesize that the attackers are either attempting to brute-force account passwords or are using stolen login credentials from a prior, unidentified LinkedIn data breach. When they access the targeted account, they change the email address to one opened with the Russian web service rambler[.]ru and the account's password. This article continues to discuss the account hijacking campaign targeting LinkedIn users.

    Help Net Security reports "LinkedIn Users Targeted in Account Hijacking Campaign"

  • news

    Visible to the public "Cleaning Products Giant Clorox Takes Systems Offline Following Cyberattack"

    Cleaning products manufacturer and marketer Clorox recently announced that it has taken certain systems offline in response to a cyberattack. In a statement, the organization said it recently identified unusual activity on its IT systems. Upon detection, they immediately took steps to stop the activity and took certain systems offline. The affected systems remain offline as it is working on adding more "protections and hardening measures to further secure them." Clorox noted that, as a result, some operations are temporarily impaired. In a Form 8-K filing with the Securities and Exchange Commission (SEC), the company said it has implemented workarounds to enable offline operations and continue servicing customers, but disruptions are expected to continue. Clorox also told the SEC that it has informed law enforcement of the incident and that it is working with third-party cybersecurity experts to investigate the attack and restore its operations. Clorox did not provide additional information on the type of cyberattack it has fallen victim to. Clorox did not say whether any data was stolen from its systems nor how long it might take to restore the impacted systems. Clorox noted that the investigation into the nature and scope of the incident remains ongoing and is in its very early stages. Based in Oakland, California, Clorox makes and sells consumer and professional cleaning products, including Brita, Glad, Green Works Cleaning Products, Kingsford, Liquid-Plumr, Pine-Sol, and Tilex. The company has locations in 25 countries and territories worldwide and a market presence in over 100 countries.

    SecurityWeek reports: "Cleaning Products Giant Clorox Takes Systems Offline Following Cyberattack"

  • news

    Visible to the public "ASU Experts Explore National Security Risks of ChatGPT"

    Experts from Arizona State University (ASU) are bringing further attention to how ChatGPT and other Artificial Intelligence (AI)-driven chatbots threaten national security. According to Nadya Bliss, executive director of ASU's Global Security Initiative and chair of the Defense Advanced Research Projects Agency's (DARPA) Information Science and Technology Study Group, ChatGPT could be used to craft phishing emails and messages that target unsuspecting victims and trick them into revealing sensitive information or installing malware. This technology can generate a large number of emails that are difficult to detect. She emphasizes the possibility of accelerating sophisticated phishing attacks while reducing their cost. ChatGPT poses a cybersecurity threat due to its ability to rapidly generate malicious code, allowing attackers to create and deploy new threats quicker than security countermeasures can be developed. Malicious code generated by ChatGPT could be quickly updated to evade detection by traditional antivirus software and signature-based detection mechanisms. This article continues to discuss the ways in which ChatGPT and other AI chatbots pose national security risks and efforts to address these risks.

    Arizona State University reports "ASU Experts Explore National Security Risks of ChatGPT"

  • news

    Visible to the public "'DoubleDrive' Attack Turns Microsoft OneDrive Into Ransomware"

    According to SafeBreach researcher Or Yair, Microsoft's OneDrive file-sharing program can be used as ransomware to encrypt most files on a target machine beyond recovery, partly because Windows and Endpoint Detection and Response (EDR) programs inherently trust the program. Microsoft has patched OneDrive so that this vulnerability no longer affects client versions 23.061.0319.0003, 23.101.0514.0001, and later. Yair has packaged his OneDrive attack process into an automated tool called DoubleDrive, which is available on GitHub and compatible with older OneDrive versions. This article continues to discuss the DoubleDrive attack.

    SC Media reports "'DoubleDrive' Attack Turns Microsoft OneDrive Into Ransomware"

  • news

    Visible to the public "Most DDoS Attacks Tied to Gaming, Business Disputes, FBI and Prosecutors Say"

    According to federal officials investigating Distributed Denial-of-Service (DDoS) incidents, most attacks stem from business or gaming disputes. In recent years, much media coverage of DDoS attacks has centered on groups affiliated with or supporting nation-states, such as Russia, that launch them against the websites of rival governments. FBI special agent, Elliott Peterson, and Cameron Schroeder, chief of the cyber and IP crimes Section division at the US Justice Department, noted that most DDoS attacks resulted from petty disputes between children or business attempts to siphon customers. They gave a presentation about their work convicting 33-year-old Illinois native Matthew Gatrel, who was sentenced to two years in federal prison last year for operating a service that helped people launch over 200,000 DDoS attacks. Although they acknowledge a significant increase in geopolitically motivated DDoS attacks in 2021 and 2022, their investigation of Gatrel and other providers of DDoS-for-hire services revealed that the majority merely desired a gaming advantage. This article continues to discuss DDoS attacks associated with gaming and business disputes.

    The Record reports "Most DDoS Attacks Tied to Gaming, Business Disputes, FBI and Prosecutors Say"

  • news

    Visible to the public "Colorado Health Agency Says 4 Million Impacted by MOVEit Hack"

    The Colorado Department of Health Care Policy and Financing (HCPF) has recently revealed that the personal information of millions of individuals was compromised in a data breach resulting from the recent MOVEit cyberattack. The HCPF informed the Maine Attorney General's office that it has started informing close to 4.1 million individuals that their personal information might have been compromised in the incident. HCPF revealed that, on May 28, an unauthorized party accessed certain HCPF files that IBM, which is providing certain services to the organization, was transferring using MOVEit. Those files contained the personal information of both Health First Colorado (Medicaid) and Child Health Plan Plus members. The exposed information, the organization says, includes names, addresses, birth dates, Social Security numbers, demographic or income information, medical information, treatment information, and health insurance information. On August 11, the agency started notifying the potentially impacted individuals of the data breach, offering free credit monitoring and identity restoration services.

    SecurityWeek reports: "Colorado Health Agency Says 4 Million Impacted by MOVEit Hack"

  • news

    Visible to the public "Ongoing Xurum Attacks Target Magento 2 E-stores"

    Researchers at Akamai warn of ongoing attacks, dubbed Xurum, against e-commerce websites using the Magento 2 Content Management System (CMS). Attackers are exploiting a server-side template injection vulnerability, tracked as CVE-2022-24086, with a CVSS score of 9.8 in Adobe Commerce and Magento Open Source. The name Xurum derives from the domain name of the attacker's command-and-control (C2) server. The campaign has been active since at least January 2023, and the threat actors appear to be interested in payment stats for orders placed in the victim's Magento store during the past ten days. Sometimes, the attackers also used a software skimmer to steal credit card information and transmit it to a remote server. The evidence gathered by the researchers suggests that a Russian threat actor is responsible for the attacks. This article continues to discuss findings regarding the ongoing Xurum attacks targeting Magento 2 e-stores.

    Security Affairs reports "Ongoing Xurum Attacks Target Magento 2 E-stores"

  • news

    Visible to the public "New QwixxRAT Trojan Spreads Through Messaging Apps"

    A new cybersecurity threat known as QwixxRAT, a Remote Access Trojan (RAT), was recently discovered by the Uptycs Threat Research team in early August 2023. According to the researchers, QwixxRAT has caught attention due to its unusual distribution method. The threat actor behind it is spreading the malicious tool through popular communication platforms, Telegram and Discord. The researchers noted that once it gains access to a victim's Windows-based machine, QwixxRAT discreetly collects sensitive data, sending it to the attacker's Telegram bot. The researchers stated that beyond mere data theft, QwixxRAT wields formidable remote administrative tools, enabling attackers to control victim devices, launch commands, and even destabilize systems. To evade detection, the RAT employs a Telegram bot for command-and-control functionalities. This also allows the attacker to remotely manage the RAT and execute operations without triggering antivirus alarms. The researchers noted that QwixxRAT's impact is global, as its reach has been observed in evaluations of compromised systems worldwide. The researchers noted that from a technical standpoint, the RAT file is a C# compiled binary, functioning as a 32-bit executable file designed for CPU operations. The researchers revealed that the threat actor employed two distinct names for the same Remote Access Trojan (RAT). One alias used was "Qwixx Rat," while the other was identified as "TelegramRAT." The main function consists of a total of 19 individual functions, each serving a unique purpose.

    Infosecurity reports: "New QwixxRAT Trojan Spreads Through Messaging Apps"

  • news

    Visible to the public "North Korean Hackers Suspected in New Wave of Malicious npm Packages"

    The npm package registry has been hit in yet another highly targeted attack campaign aimed at luring developers to download malicious modules. According to the software supply chain security company Phylum, the activity resembles a previous attack wave discovered in June, which has since been attributed to North Korean threat actors. Nine packages have been identified as uploaded to npm between August 9 and 12, 2023. Due to the sophistication of the attack and the small number of affected packages, it is suspected that this is yet another highly targeted attack, likely involving social engineering to convince targets to install these packages, according to Phylum. This article continues to discuss the new attack campaign targeting the npm package registry.

    THN reports "North Korean Hackers Suspected in New Wave of Malicious npm Packages"

  • news

    Visible to the public "What's New in the NIST Cybersecurity Framework 2.0"

    The National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CSF) has been updated, and is now aimed at organizations of all sizes. The framework was introduced nearly a decade ago as technical cybersecurity guidance for critical infrastructure interests such as energy, banking, and hospitals. Version 2.0 of the widely used NIST CSF has added a sixth function, govern, to the original framework's five (identify, protect, detect, respond, and recover) for an effective cybersecurity program. Viakoo's CEO, Bud Broomhead, explained that the new NIST update does not just help organizations with basic cybersecurity functions as it extends to other enterprise areas. Expanding the scope of the NIST framework to include all types of organizations acknowledges that all organizations face cyber threats and must have a plan to manage cyber hygiene and incident response. This article continues to discuss the updates and business benefits of CSF 2.0.

    Dark Reading reports "What's New in the NIST Cybersecurity Framework 2.0"

  • news

    Visible to the public "Threat Actors Use Beta Apps to Bypass Mobile App Store Security"

    The FBI has issued a warning about a new tactic used by cybercriminals to steal cryptocurrency. The tactic involves the promotion of malicious "beta" versions of cryptocurrency investment apps on mobile app stores. The threat actors submit the apps to mobile app stores as "betas," meaning they are in the early stages of development. They are meant to be used by tech enthusiasts or fans to test and provide feedback to developers before the software is officially released. The advantage of this method is that beta apps are not subjected to a standard, comprehensive code review process but are instead superficially inspected for safety. This less rigorous code review process is not enough to unearth the hidden malicious code that is activated post-installation to carry out a variety of hostile actions. This article continues to discuss threat actors using beta apps to bypass mobile app store security.

    Bleeping Computer reports "Threat Actors Use Beta Apps to Bypass Mobile App Store Security"

  • news

    Visible to the public "Navigating Generative AI Risks and Regulatory Challenges"

    In the second quarter of 2023, according to Gartner, the availability of generative Artificial Intelligence (AI), such as OpenAI's ChatGPT and Google Bard, became a top concern for enterprise risk executives. Generative AI was the second most frequently cited risk in Gartner's second quarter survey, making its debut in the top ten. This reflects the rapid rise in public awareness and usage of generative AI tools, as well as the scope of potential use cases. Gartner surveyed 249 senior enterprise risk executives in May 2023 to provide a benchmarked view of 20 emerging risks to business leaders. The report contains comprehensive information on the potential impact, time frame, level of attention, and perceived opportunities associated with these risks. This article continues to discuss key findings and observations regarding generative AI risks and regulatory challenges.

    Help Net Security reports "Navigating Generative AI Risks and Regulatory Challenges"

  • news

    Visible to the public "Over 100,000 Users of Hacking Forums Infected With Malware"

    Security researchers at Hudson Rock have recently discovered over 140,000 breached passwords associated with accounts on hacking forums after their owners were infected with info-stealing malware. The researchers searched their cybercrime intelligence database for infected computers with credentials associated with the top 100 cybercrime sites. The researchers found 120,000 such computers, claiming many of these belonged to hackers. The researchers noted that when a machine is infected with info-stealing malware, a "substantial" amount of data can be retrieved, which helps to unmask the owner, including emails and account usernames, auto-fill data containing personal information like addresses and phone numbers, and system information like IP addresses. The researchers stated that info-stealer infections as a cybercrime trend surged by an incredible 6000% since 2018, positioning them as the primary initial attack vector used by threat actors to infiltrate organizations and execute cyberattacks, including ransomware, data breaches, account overtakes, and corporate espionage. The researchers noted that most of the info-stealer malware found during the research was Redline, followed by Raccoon and Azorult. Those exposed in the research mainly hailed from Tunisia, followed by Malaysia, Belgium, the Netherlands, and Israel. The cybercrime forum with the most exposed infected users was "Nulled[.]to," followed by "Cracked[.]io" and "Hackforums[.]net." Interestingly, the researchers discovered that most of the credentials used on the hacking sites were stronger than those used even on government and military sites.

    Infosecurity reports: "Over 100,000 Users of Hacking Forums Infected With Malware"

  • news

    Visible to the public "UK Police Data Breach Exposes Victim Information"

    The Norfolk and Suffolk police in the UK have recently confirmed the accidental exposure of personal data belonging to more than 1000 individuals, including crime victims. The disclosure occurred within Freedom of Information (FOI) responses issued by law enforcement agencies. According to a joint statement from the East Anglian constabularies, a "technical issue" resulted in the inclusion of raw crime report data in a "very small percentage" of FOI responses distributed between April 2021 and March 2022. The compromised data in the Norfolk and Suffolk breach encompassed information stored within a dedicated police system, including data on crime reports, details regarding victims, witnesses, and suspects, and descriptions of the criminal acts. The spectrum of offenses encompassed domestic incidents, sexual offenses, assaults, thefts, and instances of hate crime.

    Infosecurity reports: "UK Police Data Breach Exposes Victim Information"

  • news

    Visible to the public "Study: A Social Workplace Keeps Scammers at Bay"

    A group of professors from the University of Virginia's McIntire School of Commerce recently published an article titled "Phishing Susceptibility in Context: A Multilevel Information Processing Perspective on Deception Detection," which delves into why employees fall victim to phishing email scams that compromise their organizations' security, despite heightened security awareness. It is estimated that between 70 and 90 percent of all cybersecurity breaches begin with phishing emails. To verify their hypotheses, they conducted an experiment in which finance division employees at a large university encountered simulated phishing attempts via email as part of their normal work routine. In addition to investing in phishing training, companies are encouraged to establish collaborations and connections among employees. According to the researchers, it is important to approach the prevention of phishing attacks as a "team sport." This article continues to discuss the importance of creating collaborations and connections between employees in the fight against phishing attacks.

    The University of Virginia reports "Study: A Social Workplace Keeps Scammers at Bay"

  • news

    Visible to the public "Netflow in the Era of EDR and Cloud: Helicopter Parenting for Your Network"

    As opportunities for network data collection increase and usage patterns change, "network parenting" methods must evolve. People continue to make mistakes despite well-defined security policies, technical safeguards, and extensive user education, and adversaries continue to be successful. According to Daniel Ruef, a researcher with Carnegie Mellon Software Engineering Institute's (SEI) Computer Emergency Response Team (CERT) Division, using the perspective of a Security Operations Center (SOC) treating their network as children for which they are responsible, aspects of parenting can be applied to determine uses of monitored data to build greater situational awareness. This article continues to discuss the importance of listening to one's network, the role of Endpoint Detection and Response (EDR) data, tailoring analytics to the cloud, and the need for real-time streaming data analysis.

    Carnegie Mellon University Software Engineering Institute reports "Netflow in the Era of EDR and Cloud: Helicopter Parenting for Your Network"

  • news

    Visible to the public "Intel Insiders Go Undercover Revealing Fresh Details Into NoName Hacktivist Operations"

    In an exclusive Black Hat interview with Cybernews, two Radware threat researchers posing as pro-Russian sympathizers disclose new information about the inner workings of the cyberterrorist group NoName057(16). These security gurus have proven firsthand that the gang's crowdsourced "DDoSia" platform provides a steady stream of cryptocurrency payouts to otherwise ordinary citizens who despise Ukraine and its Western supporters. According to the duo, there is no stop in sight. Research conducted by Radware shows that NoName dominated the pro-Russian hacktivist landscape in the first half of 2023, launching 1,174 attacks in 32 Western countries in just 176 days. Out of the 15 hacktivist groups identified, NoName is responsible for over 31 percent of all attacks. This article continues to discuss the undercover hacktivists' findings regarding the cyberterrorist gang NoName057(16).

    Cybernews reports "Intel Insiders Go Undercover Revealing Fresh Details Into NoName Hacktivist Operations"

  • news

    Visible to the public "US Cyber Safety Board to Review Cloud Attacks"

    The US government recently announced that the DHS's Cyber Safety Review Board (CSRB) is going to conduct a review on malicious attacks targeting cloud environments. The initiative will focus on providing recommendations for government, industry, and cloud services providers to improve identity management and authentication in the cloud. The DHS noted that initially, the review will focus on the recent Microsoft cloud hack but will then expand to issues relating to cloud-based identity and authentication infrastructure affecting applicable CSPs and their customers. The CSRB was established in February 2022 and is an initiative tasked with reviewing major cyber events, including their root cause, mitigations, and response.

    SecurityWeek reports: "US Cyber Safety Board to Review Cloud Attacks"

  • news

    Visible to the public "Google Chrome to Shield Encryption Keys From Promised Quantum Computers"

    Google has deployed a hybrid Key Encapsulation Mechanism (KEM) to protect symmetric encryption secret sharing while establishing secure Transport Layer Security (TLS) network connections. Devon O'Brien, the technical program manager for Chrome security, explained that starting with Chrome 116, Google's browser will support X25519Kyber768. The term is a combination of X25519, an elliptic curve algorithm currently used in the key agreement process for establishing a secure TLS connection, and Kyber-768, a quantum-resistant KEM that received NIST's approval for post-quantum cryptography last year. A KEM is a method for establishing a shared secret value between two parties in order for them to communicate in confidence using symmetric key encryption. It is a precursor to the secure exchange of information over a network. Google is deploying a hybrid version of the two algorithms in Chrome so that the web giant, users of its technology, and other network providers such as Cloudflare can test quantum-resistant algorithms while maintaining current security measures. This article continues to discuss Google's effort to protect encryption keys from quantum computers.

    The Register reports "Google Chrome to Shield Encryption Keys From Promised Quantum Computers"

  • news

    Visible to the public "Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking"

    Synack Red Team Members discovered several vulnerabilities in the ScrutisWeb ATM fleet monitoring software made by French company Iagona that could be exploited to remotely hack ATMs. The vendor patched the vulnerabilities in July 2023 with the release of ScrutisWeb version 2.1.38. ScrutisWeb allows organizations to monitor banking or retail ATM fleets from a web browser, enabling them to quickly respond to problems. The solution can be used to monitor hardware, reboot or shut down a terminal, send and receive files, and modify data remotely. It's worth noting that ATM fleets can include check deposit machines and payment terminals in a restaurant chain. The four types of vulnerabilities found by the researchers include CVE-2023-33871, CVE-2023-38257, CVE-2023-35763, and CVE-2023-35189. The flaws include path traversal, authorization bypass, hardcoded cryptographic key, and arbitrary file upload issues that can be exploited by remote, unauthenticated attackers. The researchers noted that threat actors could exploit the flaws to obtain data from the server (configurations, logs, and databases), execute arbitrary commands, obtain encrypted administrator passwords, and decrypt them using a hardcoded key. The researchers said an attacker can leverage the flaws to log into the ScrutisWeb management console as an admin and monitor the activities of connected ATMs, enable management mode on the devices, upload files, and reboot or power them off. Hackers could also exploit the remote command execution vulnerability to hide their tracks by deleting relevant files. The researchers noted that additional exploitation from this foothold in the client's infrastructure could occur, making this an internet-facing pivot point for a malicious actor.

    SecurityWeek reports: "Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking"

  • news

    Visible to the public "Hackers Rig Casino Card-Shuffling Machines for 'Full Control' Cheating"

    Joseph Tartaro, a researcher and consultant for the security company IOActive, along with IOActive colleagues Enrique Nissim and Ethan Shackelford, presented the findings of their months-long investigation into the Deckmate, the most widely used automated shuffling machine in casinos today. They found that if a small hacking device is plugged into an exposed USB port on the Deckmate 2, the latest version of the Deckmate, the shuffler's code could be altered to completely hijack the machine and tamper with its shuffling mechanism. According to the team, the Deckmate 2 has an internal camera to ensure every card is present in the deck. They could gain access to this camera to learn the entire order of the deck in real time, sending the information from their small hacking device via Bluetooth to a nearby phone held by a partner who could then send coded signals to the cheating player. Their shuffler hacking technique grants a cheater "100 percent full control," according to Tartaro. This article continues to discuss the possibility of hackers rigging the Deckmate 2 shuffler for full control cheating.

    Wired reports "Hackers Rig Casino Card-Shuffling Machines for 'Full Control' Cheating"

  • news

    Visible to the public "Alberta Dental Services Security Breach Exposes 1.47M Records"

    Alberta Dental Service Corporation (ADSC) has recently revealed that nearly 1.47 million individuals have been affected by a data breach that occurred between May 7 and July 9, 2023. ADSC administers dental benefits through various programs, and the incident has raised concerns over compromised personal information. The company stated that the breach was discovered on July 9, 2023, when an unauthorized third party gained access to a portion of ADSC's IT infrastructure and deployed malware, temporarily encrypting specific systems and data. ADSC didn't reveal how they were compromised. The breach impacted three groups in particular. Dental Assistance for Seniors Plan clients enrolled between July 1, 2015, and July 9, 2023, may have had their personal information compromised, including name, address, personal health number, date of birth, and dental benefits details. Low-Income Health Benefits Plan clients enrolled from January 1, 2006, to July 9, 2023, may have had their name, date of birth, dental benefits details, and government-issued identification number compromised. Dental Services Providers enrolled for direct payment of eligible health claims between January 1, 2010, and July 9, 2023, may have had their corporate details and license numbers exposed.

    Infosecurity reports: "Alberta Dental Services Security Breach Exposes 1.47M Records"

  • news

    Visible to the public "Nine Flaws in CyberPower and Dataprobe Solutions Expose Data Centers to Hacking"

    Multiple vulnerabilities affecting CyberPower's PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and Dataprobe's iBoot Power Distribution Unit (PDU) were discovered by researchers at the Trellix Advanced Research Center. An attacker could exploit the vulnerabilities to gain unauthenticated access to these systems and conduct various malicious activities. CyberPower is a leading provider of data center hardware and infrastructure solutions, specializing in innovative power protection technologies and power management systems. The PowerPanel Enterprise DCIM platform enables Information Technology (IT) teams to configure, manage, and monitor the infrastructure of a data center via cloud connectivity. This platform functions as an integrated hub of information and control for all interconnected devices. These solutions are widely adopted by enterprises overseeing on-site server installations and expansive co-located data centers, including industry giants such as AWS, Google Cloud, Microsoft Azure, and more. This article continues to discuss the vulnerabilities in CyberPower's PowerPanel Enterprise DCIM platform and Dataprobe's iBoot PDU that could expose data centers to hacking.

    Security Affairs reports "Nine Flaws in CyberPower and Dataprobe Solutions Expose Data Centers to Hacking"

  • news

    Visible to the public "As Phishing Gets Even Sneakier, Browser Security Needs to Step Up"

    Phishing attacks are becoming increasingly sophisticated, requiring more advanced detection methods. Din Serussi, manager of the incident response group at Perception Point, explained that this is because modern forms of phishing are more difficult to detect, especially when employees work remotely, and are more challenging to protect. According to Serussi, 91 percent of cyberattacks start with a phishing email. In the past, it required time for an attacker to create a phishing template, but Artificial Intelligence (AI) can now generate a phishing template with an embedded malicious URL and malicious file in 30 seconds. This article continues to discuss Serussi's insights on modern phishing tactics used by attackers and how to address them.

    Dark Reading reports "As Phishing Gets Even Sneakier, Browser Security Needs to Step Up"

  • news

    Visible to the public "Macs Are Getting Compromised to Act as Proxy Exit Nodes"

    AdLoad malware has been targeting macOS systems for over five years. It is now delivering a new payload that, unbeknown to the owners, enlisted their systems in a residential proxy botnet. Many devices are infected, according to threat intelligence researchers from AT&T Alien Labs, who analyzed over 150 samples of malware they discovered in the wild. They have identified more than 10,000 IPs reaching out to the proxy servers each week that could be proxy exit nodes. It is unknown if all of these systems have been infected or if they are offering their systems voluntarily as proxies, but this could be indicative of a larger global infection. This article continues to discuss findings regarding the AdLoad malware.

    Help Net Security reports "Macs Are Getting Compromised to Act as Proxy Exit Nodes"

  • news

    Visible to the public "Ford Says Cars With Wi-Fi Vulnerability Still Safe to Drive"

    Ford warns of a buffer overflow vulnerability in the SYNC3 infotainment system used in many Ford and Lincoln vehicles, which could enable Remote Code Execution (RCE), but claims that vehicle safety is unaffected. SYNC3 is a modern infotainment system that supports Wi-Fi hotspots, phone connectivity, voice commands, and third-party applications. The WL18xx MCP driver for the Wi-Fi subsystem of the car's infotainment system contains the vulnerability, tracked as CVE-2023-29468. It allows an attacker within Wi-Fi range to cause a buffer overflow using a specially crafted frame. This article continues to discuss the potential exploitation and impact of the vulnerability in the SYNC3 infotainment system.

    Bleeping Computer reports "Ford Says Cars With Wi-Fi Vulnerability Still Safe to Drive"

  • news

    Visible to the public "Next-Gen OSDP Was Supposed to Make It Harder to Break in to Secure Facilities. It Failed."

    Researchers have uncovered a set of vulnerabilities that compromise a next-generation protocol designed to prevent the hacking of access control systems used at secure facilities on US military bases and buildings owned by federal, state, and local governments as well as private entities. The next-generation mechanism, Secure Channel, was introduced to the open standard, Open Supervised Device Protocol (OSDP), about ten years ago. Similar to the Wiegand protocol, OSDP provides a framework for connecting card readers, fingerprint scanners, and other peripheral devices to control interfaces that compare the collected credentials with a database of valid personnel. When credentials match, the control panel sends a message to open a door, gate, or other entry system. This article continues to discuss the OSDP Secure Channel.

    Ars Technica reports "Next-Gen OSDP Was Supposed to Make It Harder to Break in to Secure Facilities. It Failed."

  • news

    Visible to the public "Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping"

    Multiple security flaws in AudioCodes desk phones and Zoom's Zero Touch Provisioning (ZTP) could be exploited by an adversary to conduct remote attacks. Using the vulnerabilities discovered in AudioCodes desk phones and Zoom's ZTP feature, an external attacker can gain complete remote control of the devices, according to an analysis by a SySS security researcher. The unrestricted access could then be used to eavesdrop on rooms or phone conversations, pivot through the devices to attack corporate networks, and even assemble a botnet of infected devices. This article continues to discuss the potential exploitation and impact of the vulnerabilities in AudioCodes desk phones and Zoom's ZTP.

    THN reports "Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping"

  • news

    Visible to the public "Authorities Take Down Lolek Bulletproof Hosting Provider"

    Police have recently taken down a Lolek bulletproof hosting service criminals used to launch cyberattacks worldwide. The takedown was part of a coordinated effort between the Polish Central Cybercrime Bureau and the US Department of Justice (DoJ), alongside support from Europol and the Federal Bureau of Investigation (FBI). Europol stated that five of its administrators were arrested, and all of its servers were seized, rendering LolekHosted[.]net no longer available. The DoJ confirmed that a Polish national has been charged with computer fraud conspiracy. Unsealed court documents name the suspect as Artur Karol Grabowski, aged 36. Grabowski faces a maximum penalty of 45 years in prison if convicted on all counts. SentinelOne defines bulletproof hosting as hosting services that are considerably lenient about the kinds of material they allow their customers to upload and distribute.

    Infosecurity reports: "Authorities Take Down Lolek Bulletproof Hosting Provider"

  • news

    Visible to the public "SwRI Micropatch Algorithm Improves Ground-To-Spacecraft Software Update Efficiency"

    Southwest Research Institute (SwRI) has developed an algorithm to remotely update and fix spacecraft software using less time and data than other techniques. Not only does the tool improve the overall efficiency of satellite software transmissions, but it can also recover data from unsuccessful over-the-air updates and malicious cyberattacks. It identifies missing bytes and other errors before applying a custom "micropatch" to missing or damaged software. Instead of updating an entire file or operating system, as is typically required with over-the-air satellite software updates, the tool can detect and fix smaller errors, according to Henry Haswell, a research engineer in SwRI's Intelligent Systems Division. Researchers deployed and tested the tool on the International Space Station (ISS). SwRI collaborated with Axiom Space Inc. and Amazon Web Services (AWS) to upload and assess the micropatch technology on an ISS computer operated by Axiom Space. This article continues to discuss the SwRI micropatch algorithm that improves ground-to-spacecraft software update efficiency.

    Southwest Research Institute reports "SwRI Micropatch Algorithm Improves Ground-To-Spacecraft Software Update Efficiency"

  • news

    Visible to the public "A Puzzling Approach to Encryption"

    An advancement in data security is discussed in the International Journal of Information and Computer Security. The Japanese puzzle known as Sudoku promises a cryptographic system for text information, which works even in situations where there is limited computational power. The approach could be applied to Radio Frequency Identification (RFID) devices, medical devices, remote sensing networks, smart cards, and more. A team of researchers from Isra University, Iraq University College, and Al-Maaqal University demonstrated how the dynamic nature of the Sudoku puzzle could be used as the foundation of a secret encryption key or cipher to unlock a new approach to securing sensitive information. According to the researchers, the approach's dynamic nature significantly improves the security of the system. The team's results show that this approach outperforms other experimental lightweight cryptography methods. This article continues to discuss the message encryption scheme inspired by the Sudoku puzzle.

    Inderscience reports "A Puzzling Approach to Encryption"

  • news

    Visible to the public "Gootloader SEO Watering Hole Malware Targets Law Firms"

    Gootloader, a Search Engine Optimization (SEO) watering hole technique, has been observed targeting legal-related search terms. It has been identified as a threat to law firms and individuals conducting research online for legal information. According to Trustwave's SpiderLabs, the Gootloader malware exploits compromised WordPress sites for malware distribution and uses SEO poisoning techniques to achieve high rankings in web search results. Through the manipulation of search engine results and luring of unsuspecting users to compromised websites, Gootloader exploits users' trust in search results to deliver malicious payloads. Researchers found that close to 50 percent of these cases target law firms. In addition to English, the Gootloader campaign also targets the French, Spanish, Portuguese, German, and South Korean languages. This article continues to discuss findings regarding the Gootloader campaign.

    SC Magazine reports "Gootloader SEO Watering Hole Malware Targets Law Firms"

  • news

    Visible to the public "Federated Learning: How Private Is It Really?"

    Federated Learning (FL) is a popular structure that enables one to learn a Machine Learning (ML) model collaboratively. The classical FL structure involves multiple clients, each with their own local data that they may want to keep private, and a server responsible for learning a global ML model. One of the main reasons for FL's popularity is that clients can keep their data private while still benefiting from combined learning across all of their data. Saurabh Bagchi, a Purdue University professor of Electrical and Computer Engineering and Computer Science, and Arash Nourian, General Manager/Director of Engineering at AWS AI, discuss the ongoing back and forth over protecting data privacy through FL. This article continues to discuss experts' insights on the concept of FL and potential data leakage attacks.

    CACM reports "Federated Learning: How Private Is It Really?"

  • news

    Visible to the public "Multiple Flaws Found in the Avada WordPress Theme and Plugin"

    Multiple vulnerabilities have recently been identified in the widely used Avada theme and its accompanying Avada Builder plugin. Security researchers at Patchstack discovered the flaws. The researchers noted the Avada Builder plugin exhibits two weaknesses. The first is an Authenticated SQL Injection (CVE-2023-39309). The researchers stated that by exploiting this vulnerability, attackers possessing authenticated access could breach sensitive data and potentially execute remote code. The second vulnerability is a Reflected Cross-Site Scripting (XSS) vulnerability (CVE-2023-39306), enabling unauthenticated attackers to pilfer sensitive information and potentially heighten their privileges on impacted WordPress sites. Patchstack also discovered various vulnerabilities in the Avada theme. First among them is a Contributor+ Arbitrary File Upload vulnerability (CVE-2023-39307). With this vulnerability, contributors gain the ability to upload arbitrary files, which may encompass detrimental PHP files, thereby enabling remote code execution and compromising site integrity. The researchers also found an Author+ flaw (CVE-2023-39312). Here, the researchers were able to attain the capability to upload malevolent zip files, thereby introducing the potential for remote code execution and vulnerabilities within the site. The researchers stated that the last vulnerability discovered is the Contributor+ Server-Side Request Forgery (SSRF) vulnerability (CVE-2023-39313). Through this loophole, Contributors can instigate requests to internal services on the WordPress server, thereby potentially initiating unauthorized actions or data access within the organizational framework. The researchers noted that the vulnerabilities were reported to the Avada vendor on July 6, 2023, leading to the release of patched versions on July 11, 2023. To address these vulnerabilities, users are urged to update the Avada Builder plugin to version 3.11.2 and the Avada theme to version 7.11.2. The researchers noted that ensuring prompt updates is crucial to maintain website security.

    Infosecurity reports: "Multiple Flaws Found in the Avada WordPress Theme and Plugin"

  • news

    Visible to the public "CISA Discovered a New Backdoor, Named Whirlpool, Used in Barracuda ESG Attacks"

    Whirlpool, a new backdoor discovered by the US Cybersecurity and Infrastructure Security Agency (CISA), was used in attacks against Barracuda Email Security Gateway (ESG) devices. Barracuda, a provider of network security solutions, warned customers at the end of May that some of its ESG appliances had been compromised by threat actors exploiting a now-patched zero-day vulnerability. The vulnerability, tracked as CVE-2023-2868, exists in the email attachment screening module. The issue was discovered on May 19, and the company issued two security patches to address it on May 20 and 21. The company's investigation revealed that the vulnerability was exploited to target a subset of email gateway devices. According to the vendor's statement, the vulnerability has been exploited in real-world scenarios since at least October 2022. The malware families involved in the attacks are SALTWATER, SEASPY, and SEASIDE. This article continues to discuss the new backdoor Whirpool used in attacks against Barracuda ESG appliances.

    Security Affairs reports "CISA Discovered a New Backdoor, Named Whirlpool, Used in Barracuda ESG Attacks"