CyberSecurity updates
Updated: 2024-10-15 15:23:16 Pacfic

Flag This


msrc.microsoft.com

OilRig Targets UAE and Gulf with Windows Kernel Flaw Exploit - 1d

The Iranian state-sponsored hacking group, OilRig, has been observed exploiting a vulnerability in the Windows Kernel to conduct cyber espionage operations. This vulnerability allows attackers to escalate their privileges, enabling them to gain unauthorized access and control over targeted systems. The campaign targets government and critical infrastructure entities in the UAE and the broader Gulf region.

checkmarx.com

Command Jacking: New Supply Chain Attack Technique Targets Open Source Package Entry Points - 1d

A new and concerning attack technique has been identified by Checkmarx researchers, leveraging the entry points of open source application packages. This technique, dubbed “command jacking,” exploits the ability of developers to expose specific functions as command line tools. Attackers can create malicious packages with fake entry points, impersonating widely-used third-party tools or system commands like ‘aws’, ‘docker’, ‘npm’, ‘pip’, ‘git’, ‘kubectl’, ‘terraform’, ‘gcloud’, ‘heroku’, or ‘dotnet’. When unsuspecting developers install these packages and run the hijacked commands, malicious code can be executed, potentially leading to data theft, malware installation, and compromise of entire cloud infrastructures.

Dan Goodin @ Ars Technica

Perfctl Malware Exploits Common Misconfigurations and Known Vulnerabilities to Infect Linux Machines - 1d

Perfctl, a stealthy and persistent Linux malware, has been circulating since at least 2021, infecting thousands of machines. It leverages a range of tactics, including exploiting common misconfigurations and known vulnerabilities, to gain access to vulnerable systems. The malware, which has a high success rate in avoiding detection, uses a naming convention similar to common Linux tools to blend in with legitimate processes. The attackers exploit vulnerabilities like CVE-2023-33246 in Apache RocketMQ, a widely used messaging and streaming platform, to establish a foothold. Perfctl is primarily used for cryptocurrency mining, stealing processing power from infected machines.

cisa.gov

Iranian Cyber Espionage Targeting Political Organizations - 5d

The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint fact sheet warning about Iranian cyber espionage activities targeting accounts associated with national political organizations. The Iranian government is suspected of using various tactics to gain access to sensitive information, including phishing, malware, and social engineering. The fact sheet provides recommendations for organizations to mitigate these threats, including multi-factor authentication, strong password practices, and cybersecurity awareness training. The joint alert highlights the ongoing threat of state-sponsored cyber espionage, emphasizing the need for vigilance and robust security measures to protect sensitive data and systems.

cnews.link

Open-Source Repositories Infiltrated by Malicious Packages - 18h

The reliance on open-source repositories has unfortunately led to a significant rise in malicious software packages infiltrating software products. These malicious packages are deliberately designed to compromise systems and steal data. They can be hidden within legitimate-looking packages, making it difficult for developers and users to detect them. This threat highlights the need for stringent security measures and thorough vetting of all open-source packages.

cisa.gov

North Korean APT Group GoldenJackal Leverages Two Novel Tools for Compromising Air-Gapped Systems - 2d

ESET researchers have uncovered two sophisticated toolsets developed by the North Korean APT group, GoldenJackal, specifically designed to compromise air-gapped systems. These toolsets, never before seen in the wild, highlight the group’s resourcefulness and commitment to targeting government and diplomatic entities in Europe, the Middle East, and South Asia. The advanced nature of these tools suggests that GoldenJackal has invested significant resources in developing specialized capabilities to bypass conventional security measures. This discovery underscores the importance of maintaining robust security protocols for critical infrastructure and sensitive data, especially in the face of persistent and sophisticated nation-state threats.

Pierluigi Paganini @ Intelligence Archives

Kimsuky APT Group Leverages Go Language for Malware Development, Signals Evolving Threat Landscape - 13d

The North Korean APT group Kimsuky, known for its extensive cyberespionage operations, has exhibited a significant shift in its toolkit. The group is now actively developing malware using the Go programming language, marking a noteworthy departure from its traditional reliance on Windows-based tools. This transition suggests a strategic adaptation by Kimsuky, likely driven by the Go language’s inherent advantages. Go’s reputation for stability, ease of use, and scalability makes it an attractive choice for sophisticated attackers seeking to craft robust and adaptable malware. This development is a major concern for security professionals as it signifies a heightened sophistication in the threat landscape. Kimsuky has historically targeted a range of sectors, including government, media, research, and diplomacy. The group’s shift towards Go-based malware necessitates a reevaluation of security strategies, emphasizing the need for robust defense mechanisms capable of detecting and mitigating such advanced threats.

do son @ Cybersecurity News

New Lynx Ransomware Leverages Similarities to INC Ransomware - 3d

The Lynx ransomware group is a newer ransomware-as-a-service (RaaS) actor that has claimed more than 20 victims since July 2024. This group has been using tactics similar to those of INC Ransomware. Lynx’s malware capabilities may enable effective data theft and exfiltration, remote control, and the potential for significant financial losses for victims. The similarities between Lynx and INC suggest that the groups may share resources or have common origins, raising concerns about a potential increase in ransomware activity. This trend highlights the evolving nature of the ransomware landscape and underscores the need for organizations to implement robust security measures to protect against such threats.

do son @ Cyber Security Archives

ChatGPT Usage for Planning Cyberattacks - 4d

OpenAI has recently reported the disruption of over 20 cyber and influence operations in 2023, involving Iranian and Chinese state-sponsored hackers. The company uncovered the activities of three threat actors abusing ChatGPT to launch cyberattacks. One of these actors used ChatGPT to plan ICS attacks, highlighting the evolving threat landscape where AI tools are being leveraged by malicious actors. This indicates the potential for more sophisticated attacks in the future, emphasizing the need for robust security measures to counter these emerging threats. OpenAI has been proactive in detecting and mitigating these malicious activities, highlighting the importance of collaboration between technology companies and cybersecurity researchers in combating these threats. The company is actively working to enhance its security measures to prevent future exploitation of its platforms by malicious actors.

trendmicro.com

EDR Disruption Tool EDRSilencer Used by Threat Actors - 6h

EDRSilencer is a red team tool that has been observed being abused by threat actors to disrupt endpoint detection and response (EDR) solutions. It achieves this by blocking EDR traffic, making it harder for EDR solutions to identify and respond to malicious activity. This tool was discovered by Trend Micro, they also found that EDRSilencer can be used to conceal malicious activity, allowing threat actors to operate more stealthily. This represents a worrying development in the field of cybersecurity, with threat actors increasingly focusing on evading detection by EDR solutions.

zimperium.com

FBCS Data Breach Impacts Millions of Customers, Including Comcast and Truist Bank - 7d

Financial Business and Consumer Solutions (FBCS), a US-based debt collection agency, experienced a significant data breach in February 2024. Cybercriminals gained access to FBCS’s systems, compromising sensitive information belonging to over 4 million individuals. The breach impacted several organizations, including Comcast Cable Communications and Truist Bank, which have subsequently notified their customers. The compromised data included names, addresses, dates of birth, Social Security numbers, driver’s license or state ID numbers, medical claims, provider and clinical information, and health insurance details. This incident highlights the vulnerability of third-party service providers and the importance of robust security measures to protect sensitive customer data. The breach also underscores the significant risks associated with ransomware attacks, which often result in data exfiltration and potential misuse.

verizon.com

Insider Threats: The Hidden Enemy of Cybersecurity - 5d

Insider threats continue to pose a significant challenge to cybersecurity. Internal actors, whether intentionally or unintentionally, can cause significant damage to organizations. Insider threats can range from careless mistakes like losing a device or using weak passwords to malicious activities like installing malware or stealing confidential data. Organizations must be vigilant in managing insider risks by implementing robust security measures, raising awareness among employees, and establishing clear policies to prevent and mitigate potential threats. Identifying suspicious activity, enforcing strong password policies, and limiting access to sensitive information are critical steps in mitigating insider threats.

malware.news

Earth Baxia APT: Chinese-Linked Hacktivist Group Exploiting GeoServer Vulnerability to Target APAC Governments - 4d

The Earth Baxia APT group, believed to have ties to China, has been engaged in a targeted campaign against government entities and critical infrastructure in the Asia-Pacific (APAC) region. They have been exploiting a critical vulnerability in GeoServer, a popular open-source geospatial web server, to gain initial access. Once inside, attackers deploy custom Cobalt Strike payloads, including a new backdoor named EAGLEDOOR. This campaign raises concerns about the potential for disruption of essential services and demonstrates the growing sophistication of APAC-focused threat actors.

malware.news

US Cracks Down on Crypto Exchanges Involved in Russian Cybercrimes - 4d

The US Treasury Department has imposed sanctions on two Russian crypto exchanges, Cryptex and PM2BTC, for allegedly facilitating money laundering for cybercriminals. These exchanges are associated with Sergey Sergeevich Ivanov, also known as Taleon, who has been linked to providing money laundering services for threat actors for over two decades. The US government alleges that Ivanov’s exchanges were used to launder funds obtained through various cybercrimes, including ransomware attacks and carding schemes. The sanctions aim to disrupt the financial networks used by Russian cybercriminals and deter future illicit activities. This action highlights the increasing focus on tackling cryptocurrency-related cybercrime and the importance of international cooperation to disrupt criminal networks.

thecyberexpress.com

23andMe Settles Data Breach Lawsuit for $30 Million Following a Credential Stuffing Attack - 5d

23andMe, a genetic testing and ancestry service, experienced a data breach between April and August 2023, resulting in the exposure of personal data of 6.9 million customers. The breach involved credential stuffing, allowing attackers to access 5.5 million DNA Relatives profiles and 1.4 million Family Tree user profiles. This resulted in a class-action lawsuit, which 23andMe settled for $30 million, including providing affected individuals with credit monitoring and other security services.

do son @ Malware Archives

Exploiting Trusted GitHub Repositories for Malware Delivery - 3d

A sophisticated phishing campaign leveraging trusted GitHub links has been identified, bypassing Secure Email Gateway (SEG) defenses and delivering malicious payloads. The campaign exploits the trust associated with GitHub, a popular platform for code sharing and collaboration, to distribute malware. Attackers are creating fake GitHub repositories with names resembling legitimate projects or organizations, enticing victims to download malicious files disguised as legitimate software updates or other files. This tactic effectively evades traditional security measures that rely on blacklisting known malicious domains or files. The use of trusted repositories for malware distribution underscores the importance of implementing robust security measures to protect against social engineering attacks and carefully verifying the authenticity of any software or files downloaded from external sources.

do son @ Cybersecurity News

Critical Vulnerabilities in Ivanti Products - Urgent Patching Needed - 3d

Multiple Ivanti products are affected by critical vulnerabilities, including Ivanti Endpoint Manager Mobile (EPMM), Ivanti Cloud Service Application (CSA), Ivanti Velocity License Server, Ivanti Connect Secure, Policy Secure, and Ivanti Avalanche. Attackers can exploit these vulnerabilities to gain unauthorized access, execute commands, or compromise system integrity, posing significant risks to organizations. CVE-2024-7612, impacting Ivanti EPMM, allows local authenticated attackers to access or modify sensitive configuration files due to incorrect permission assignment, while vulnerabilities CVE-2024-9379 and CVE-2024-9380 affecting Ivanti CSA enable remote authenticated attackers with admin privileges to execute arbitrary SQL statements and commands, respectively.

csoonline.com

Chinese Researchers Crack Military-grade Encryption Using Quantum Computer - 2d

Chinese researchers have reportedly cracked military-grade encryption using a D-Wave quantum computer, potentially posing a significant threat to global security. The researchers utilized a quantum annealing algorithm to attack Substitution-Permutation Network (SPN) algorithms commonly employed in military and financial sectors. While no specific passcodes were cracked, the development highlights the rapid advancements in quantum computing and its potential to overcome traditional encryption defenses. It calls for urgent attention to the future of cryptography and the need for robust quantum-resistant solutions.