CyberSecurity updates
Updated: 2024-10-17 18:23:31 Pacfic

Flag This


cisa.gov

Iranian Cyber Actors Targeting Critical Infrastructure Organizations Using Brute Force - 11h

Iranian state-sponsored cyber actors are using brute force tactics to compromise organizations across critical infrastructure sectors, including healthcare, government, information technology, engineering, and energy. Their goal is to steal credentials and sell access to cybercriminals, potentially enabling further malicious activities. This attack leverages brute force techniques like password spraying and MFA push bombing to gain access to user accounts. Once inside, they conduct reconnaissance to gather more credentials, escalate privileges, and collect information on the victim’s network.

MalBot @ Malware Analysis, News and Indicators

EDR Disruption Tool EDRSilencer Used by Threat Actors - 2d

EDRSilencer is a red team tool that has been observed being abused by threat actors to disrupt endpoint detection and response (EDR) solutions. It achieves this by blocking EDR traffic, making it harder for EDR solutions to identify and respond to malicious activity. This tool was discovered by Trend Micro, they also found that EDRSilencer can be used to conceal malicious activity, allowing threat actors to operate more stealthily. This represents a worrying development in the field of cybersecurity, with threat actors increasingly focusing on evading detection by EDR solutions.

crowdstrike.com

US Disrupts Anonymous Sudan DDoS Operation, Indicts 2 Sudanese Brothers - 18h

The US Department of Justice indicted two Sudanese brothers, suspected operators of the notorious hacktivist group Anonymous Sudan. This group is known for conducting thousands of DDoS attacks, targeting critical infrastructure, hospitals, and government facilities worldwide. The indictment signifies a significant step in disrupting the group’s operations.

do son @ Vulnerability Archives

New macOS Vulnerability, ‘HM Surf’, Allows Unauthorized Data Access - 1h

A newly discovered vulnerability in macOS, dubbed ‘HM Surf,’ enables attackers to bypass the Transparency, Consent, and Control (TCC) technology. This bypass allows malicious actors to access protected user data without consent, including browsing history, camera, microphone, and location. The vulnerability was patched by Apple, but users are advised to update their macOS operating system promptly.

crowdstrike.com

Anonymous Sudan DDoS Attacks Disrupted, Operators Indicted - 39m

The U.S. Department of Justice has indicted two Sudanese brothers suspected of being the operators of Anonymous Sudan, a notorious hacktivist group known for conducting over 35,000 DDoS attacks in a year. The group has been responsible for targeting various entities, including hospitals, government facilities, and critical infrastructure in Los Angeles and around the world. The indictment marks a significant step towards disrupting the group’s activities and holding its members accountable for their actions.

learn.microsoft.com

Call Stack Spoofing Technique Used by APT41 to Evade Security Software - 1h

APT41 utilizes a sophisticated call stack spoofing technique to evade detection by EDR and antivirus software. This technique involves constructing a fake call stack to mask malicious actions. The malware decrypts relevant strings at runtime using AES encryption and employs a JOP gadget to manipulate the call stack. This tactic highlights the need for advanced security measures to counter these sophisticated evasion techniques.

cisa.gov

Iranian Cyber Espionage Targeting Political Organizations - 8d

The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint fact sheet warning about Iranian cyber espionage activities targeting accounts associated with national political organizations. The Iranian government is suspected of using various tactics to gain access to sensitive information, including phishing, malware, and social engineering. The fact sheet provides recommendations for organizations to mitigate these threats, including multi-factor authentication, strong password practices, and cybersecurity awareness training. The joint alert highlights the ongoing threat of state-sponsored cyber espionage, emphasizing the need for vigilance and robust security measures to protect sensitive data and systems.

learn.microsoft.com

Call Stack Spoofing Technique Used by APT41: Obfuscating Malicious Activity - 41s

APT41 has been observed utilizing call stack spoofing techniques to evade detection by EDR and other security software. Call stack spoofing involves constructing a fake call stack that mimics a legitimate call stack, obscuring the true origin of function calls and hindering analysis. This technique was observed in the Dodgebox malware, which was used by APT41 to trick antivirus and EDR software that rely on stack call analysis for detection. The malware retrieves the address of functions, such as NtCreateFile, and manipulates the call stack to hide the true origin of the function call. This technique highlights the evolving tactics used by sophisticated threat actors and emphasizes the need for advanced detection and mitigation strategies to counter these evasive techniques.

dakshsharma16 @ Blog

HijackLoader Malware Abuses Genuine Code-Signing Certificates - 1d

HijackLoader malware is being used to distribute LummaStealer. This malware is using stolen code-signing certificates for authentication, allowing it to evade detection by security solutions. This exploitation of genuine certificates highlights the increasing sophistication of cybercriminals and the need for enhanced security measures. It’s crucial to be aware of this technique and adopt robust security practices to mitigate the risk.

cisa.gov

North Korean APT Group GoldenJackal Leverages Two Novel Tools for Compromising Air-Gapped Systems - 4d

ESET researchers have uncovered two sophisticated toolsets developed by the North Korean APT group, GoldenJackal, specifically designed to compromise air-gapped systems. These toolsets, never before seen in the wild, highlight the group’s resourcefulness and commitment to targeting government and diplomatic entities in Europe, the Middle East, and South Asia. The advanced nature of these tools suggests that GoldenJackal has invested significant resources in developing specialized capabilities to bypass conventional security measures. This discovery underscores the importance of maintaining robust security protocols for critical infrastructure and sensitive data, especially in the face of persistent and sophisticated nation-state threats.

Anna Ribeiro @ Industrial Cyber

Earth Simnavaz APT Targets Gulf Organizations Using Microsoft Exchange Server Backdoor - 1h

The Earth Simnavaz APT, a suspected Iranian state-sponsored threat actor, has been targeting organizations in the Gulf region using a backdoor in Microsoft Exchange servers. The backdoor allows the attackers to gain unauthorized access to sensitive information and potentially deploy ransomware. The attacks highlight the growing threat of nation-state actors targeting critical infrastructure and businesses.

do son @ Cybersecurity News

New Lynx Ransomware Leverages Similarities to INC Ransomware - 5d

The Lynx ransomware group is a newer ransomware-as-a-service (RaaS) actor that has claimed more than 20 victims since July 2024. This group has been using tactics similar to those of INC Ransomware. Lynx’s malware capabilities may enable effective data theft and exfiltration, remote control, and the potential for significant financial losses for victims. The similarities between Lynx and INC suggest that the groups may share resources or have common origins, raising concerns about a potential increase in ransomware activity. This trend highlights the evolving nature of the ransomware landscape and underscores the need for organizations to implement robust security measures to protect against such threats.

raw.githubusercontent.com

Exploiting Vulnerable Drivers in Windows 7 for Kernel Shellcode Persistence - 5h

A design flaw in older Windows operating systems, specifically Windows NT 4.0 through Windows 7, allows kernel shellcode to persist and be launched during system boot by writing specially crafted data to the system registry. This vulnerability is due to the incomplete fix for a vulnerability in the RtlQueryRegistryValues function. The function can be used to query multiple registry values with a single call, but the way it handles values of unexpected types can lead to a buffer overflow, which can be exploited to execute malicious code. The vulnerability was exploited in a targeted attack in 2018, and researchers at Kaspersky GReAT discovered that it was only partially fixed by Microsoft, making it possible for attackers with administrator privileges to stealthily store and execute kernel shellcode. The vulnerability was exposed in a challenge at the SAS CTF, an international cybersecurity competition organized by Kaspersky GReAT.

do son @ Cyber Security Archives

ChatGPT Usage for Planning Cyberattacks - 6d

OpenAI has recently reported the disruption of over 20 cyber and influence operations in 2023, involving Iranian and Chinese state-sponsored hackers. The company uncovered the activities of three threat actors abusing ChatGPT to launch cyberattacks. One of these actors used ChatGPT to plan ICS attacks, highlighting the evolving threat landscape where AI tools are being leveraged by malicious actors. This indicates the potential for more sophisticated attacks in the future, emphasizing the need for robust security measures to counter these emerging threats. OpenAI has been proactive in detecting and mitigating these malicious activities, highlighting the importance of collaboration between technology companies and cybersecurity researchers in combating these threats. The company is actively working to enhance its security measures to prevent future exploitation of its platforms by malicious actors.

ciso2ciso.com

Critical Vulnerability in Ivanti Cloud Service Appliance Actively Exploited - 5d

A critical vulnerability in Ivanti’s Cloud Service Appliance (CSA) has been actively exploited by attackers. The flaw, tracked as CVE-2024-8190, allows attackers to gain unauthorized access to sensitive data and execute arbitrary commands on vulnerable systems. The vulnerability exists in the CSA’s authentication mechanism and can be exploited by attackers who can send specially crafted requests to the CSA. This attack vector allows attackers to bypass the CSA’s security measures and gain access to the underlying operating system. The vulnerability has been exploited in the wild by a suspected nation-state adversary. There are strong indications that China is behind the attacks. Organizations using Ivanti CSA should prioritize patching the vulnerability immediately to reduce their risk of being compromised.

zimperium.com

FBCS Data Breach Impacts Millions of Customers, Including Comcast and Truist Bank - 10d

Financial Business and Consumer Solutions (FBCS), a US-based debt collection agency, experienced a significant data breach in February 2024. Cybercriminals gained access to FBCS’s systems, compromising sensitive information belonging to over 4 million individuals. The breach impacted several organizations, including Comcast Cable Communications and Truist Bank, which have subsequently notified their customers. The compromised data included names, addresses, dates of birth, Social Security numbers, driver’s license or state ID numbers, medical claims, provider and clinical information, and health insurance details. This incident highlights the vulnerability of third-party service providers and the importance of robust security measures to protect sensitive customer data. The breach also underscores the significant risks associated with ransomware attacks, which often result in data exfiltration and potential misuse.

verizon.com

Insider Threats: The Hidden Enemy of Cybersecurity - 7d

Insider threats continue to pose a significant challenge to cybersecurity. Internal actors, whether intentionally or unintentionally, can cause significant damage to organizations. Insider threats can range from careless mistakes like losing a device or using weak passwords to malicious activities like installing malware or stealing confidential data. Organizations must be vigilant in managing insider risks by implementing robust security measures, raising awareness among employees, and establishing clear policies to prevent and mitigate potential threats. Identifying suspicious activity, enforcing strong password policies, and limiting access to sensitive information are critical steps in mitigating insider threats.

twitter.com

Brazil’s Polícia Federal Arrested the Notorious Hacker USDoD - 11h

The hacker known as USDoD, responsible for the National Public Data and InfraGard breaches, has been arrested by Brazil’s Polícia Federal. USDoD, also known as EquationCorp, is known for high-profile data leaks and is a man from Brazil, according to a CrowdStrike investigation. The arrest was announced in Belo Horizonte, MG, Brazil. This arrest highlights the ongoing efforts of law enforcement agencies to track down and apprehend hackers who exploit vulnerabilities and compromise sensitive data.

do son @ Vulnerability Archives

CISA Adds Three Actively Exploited Vulnerabilities to KEV Catalog, Urges Urgent Patching - 6d

The US Cybersecurity and Infrastructure Security Agency (CISA) has added three new security vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, due to confirmed reports of active exploitation in the wild. These vulnerabilities pose significant risks to organizations and require immediate attention. The three vulnerabilities added to the KEV Catalog include a format string vulnerability in multiple Fortinet products, a SQL injection vulnerability in Ivanti Cloud Services Appliance (CSA), and an OS command injection vulnerability in Ivanti CSA. The addition of these vulnerabilities to the KEV Catalog highlights the ongoing threat posed by malicious cyber actors who actively exploit known vulnerabilities. CISA urges all organizations to prioritize timely remediation of vulnerabilities listed in the KEV Catalog as part of their vulnerability management practices to reduce their exposure to cyberattacks.

malware.news

Earth Baxia APT: Chinese-Linked Hacktivist Group Exploiting GeoServer Vulnerability to Target APAC Governments - 6d

The Earth Baxia APT group, believed to have ties to China, has been engaged in a targeted campaign against government entities and critical infrastructure in the Asia-Pacific (APAC) region. They have been exploiting a critical vulnerability in GeoServer, a popular open-source geospatial web server, to gain initial access. Once inside, attackers deploy custom Cobalt Strike payloads, including a new backdoor named EAGLEDOOR. This campaign raises concerns about the potential for disruption of essential services and demonstrates the growing sophistication of APAC-focused threat actors.

Latest

Call Stack Spoofing Technique Used by APT41: Obfuscating Malicious Activity (41s)

Anonymous Sudan DDoS Attacks Disrupted, Operators Indicted (39m)

New macOS Vulnerability, ‘HM Surf’, Allows Unauthorized Data Access (1h)

Earth Simnavaz APT Targets Gulf Organizations Using Microsoft Exchange Server Backdoor (1h)

Call Stack Spoofing Technique Used by APT41 to Evade Security Software (1h)

Exploiting Vulnerable Drivers in Windows 7 for Kernel Shellcode Persistence (5h)

Iranian Cyber Actors Targeting Critical Infrastructure Organizations Using Brute Force (11h)

Brazil’s Polícia Federal Arrested the Notorious Hacker USDoD (11h)

US Disrupts Anonymous Sudan DDoS Operation, Indicts 2 Sudanese Brothers (18h)

HijackLoader Malware Abuses Genuine Code-Signing Certificates (1d)

EDR Disruption Tool EDRSilencer Used by Threat Actors (2d)

North Korean APT Group GoldenJackal Leverages Two Novel Tools for Compromising Air-Gapped Systems (4d)

Critical Vulnerability in Ivanti Cloud Service Appliance Actively Exploited (5d)

New Lynx Ransomware Leverages Similarities to INC Ransomware (5d)

ChatGPT Usage for Planning Cyberattacks (6d)

Earth Baxia APT: Chinese-Linked Hacktivist Group Exploiting GeoServer Vulnerability to Target APAC Governments (6d)

CISA Adds Three Actively Exploited Vulnerabilities to KEV Catalog, Urges Urgent Patching (6d)

Insider Threats: The Hidden Enemy of Cybersecurity (7d)

Iranian Cyber Espionage Targeting Political Organizations (8d)

FBCS Data Breach Impacts Millions of Customers, Including Comcast and Truist Bank (10d)