CyberSecurity updates
2025-02-09 05:29:05 Pacfic

Microsoft Releases PowerShell Script to Mitigate BlackLotus UEFI Bootkit - 1d
Microsoft Releases PowerShell Script to Mitigate BlackLotus UEFI Bootkit

Microsoft released a PowerShell script to update bootable media with the “Windows UEFI CA 2023” certificate to mitigate BlackLotus UEFI bootkit threats. This script helps to protect systems from attacks that bypass Secure Boot. The update improves the security posture of systems and is important for organizations which have legacy systems.

Lazarus Group's LinkedIn Recruiting Scam - 1d
Lazarus Group

The Lazarus Group, a North Korean APT, employed a sophisticated LinkedIn recruiting scam to target a Bitdefender researcher, aiming to deliver malware and capture credentials. The campaign was detected and analyzed within a sandbox environment. Lazarus is known for its advanced social engineering techniques and focus on credential harvesting. This highlights the persistent threat of APTs targeting cybersecurity professionals for espionage or supply chain attacks. The group’s ability to adapt their tactics, such as leveraging professional networking platforms, demonstrates their evolving threat landscape.

Cloudflare Outage Caused by Phishing URL Block Error - 12h
Cloudflare Outage Caused by Phishing URL Block Error

Cloudflare experienced an outage due to a botched attempt to block a phishing URL in its R2 object storage platform. The incident triggered a widespread outage, impacting multiple services for nearly an hour. The outage stemmed from human error during a routine abuse remediation process. Specifically, an advanced product disablement action, intended for a phishing site hosted on R2, inadvertently disabled the production R2 Gateway service responsible for the R2 API.

DeepSeek AI Model Raises Security and Ethical Concerns - 8h
DeepSeek AI Model Raises Security and Ethical Concerns

This cluster focuses on the controversies surrounding DeepSeek, a powerful Chinese AI model. Reports indicate that DeepSeek has been banned by some governments due to lack of safety measures, and it has been accused of misleading information on training costs. The model also exhibits serious security flaws.

HPE Data Breach from Russian State-Sponsored Hackers - 11h
HPE Data Breach from Russian State-Sponsored Hackers

Hewlett Packard Enterprise (HPE) experienced a data breach in May 2023, attributed to the Russian state-sponsored hacking group Midnight Blizzard (also known as Cozy Bear or APT29). The breach involved their Office 365 email environment and was confirmed in December 2023. The breach compromised employee data and was contained after its discovery.

Ransomware Payments Plunge as Victims Resist Extortion - 2d
Ransomware Payments Plunge as Victims Resist Extortion

Ransomware payments significantly decreased in 2024, falling 35% to ~$813.55 million, as more victims refused to pay. Despite a higher number of victims being posted on ransomware gang leak sites, fewer organizations yielded to extortion demands. This shift indicates a growing resistance to paying ransoms, potentially driven by improved data recovery strategies and law enforcement efforts.

The report underscores the evolving landscape of ransomware attacks, with a focus on victim empowerment through refusal to pay. It also suggests that while the number of attacks may remain high, the financial success of ransomware operations is diminishing, signaling a potential change in attacker tactics.

Hacker Targeting NATO and US Army Arrested in Spain - 2d
Hacker Targeting NATO and US Army Arrested in Spain

Spanish authorities have arrested an individual for allegedly hacking several high-profile organizations, including NATO and the US Army. The hacker, known as “natohub,” is suspected of conducting over 40 cyberattacks throughout 2024, targeting both public institutions and private entities. Stolen data was then sold on BreachForums.

The arrest highlights the ongoing threat posed by malicious actors targeting government and military systems, and the importance of international cooperation in combating cybercrime.

Cisco ISE Critical Flaws Allow Remote Execution - 1d
Cisco ISE Critical Flaws Allow Remote Execution

Cisco addressed two critical remote code execution flaws in its Identity Services Engine (ISE), tracked as CVE-2025-20124 (CVSS score of 9.9) and CVE-2025-20125 (CVSS score of 9.1). A remote attacker authenticated with read-only administrative privileges could exploit these vulnerabilities to gain unauthorized access and control over the affected system. These flaws could allow attackers to perform privilege escalation and system configuration changes.

Successful exploitation could allow attackers to execute arbitrary code, potentially leading to a full system compromise. Cisco has released software updates to address these vulnerabilities, and administrators are urged to apply the updates as soon as possible to mitigate the risk of exploitation.

UK Government Orders Apple to Break Encryption - 8h
UK Government Orders Apple to Break Encryption

This cluster centers around the UK government’s order mandating Apple to create a backdoor for accessing end-to-end encrypted data in iCloud. This order raises significant concerns about user privacy and security, as well as potential implications for global digital privacy norms. Apple is being legally pressured to compromise user data which would seriously damage privacy and security.

DeepSeek R1 Model Performance and Issues - 1h
DeepSeek R1 Model Performance and Issues

DeepSeek AI’s R1 model is gaining traction within the AI community for its detailed thought process and performance, even though it sometimes provides inaccurate answers. Some users prefer its clear reasoning over other models. The R1 model is now available on platforms like AWS and NVIDIA NIM, which allows for broader accessibility. Benchmarks also reveal that AMD’s Radeon RX 7900 XTX outperforms the RTX 4090 in certain DeepSeek benchmarks. However, there are concerns about DeepSeek’s safety guardrails, as they have reportedly failed multiple tests. It also faces scrutiny related to data use and alleged smuggling of NVIDIA GPUs.

Zero-Day Vulnerability in Trimble Cityworks - 5h
Zero-Day Vulnerability in Trimble Cityworks

Trimble Cityworks, a GIS-centric asset management and permitting software, is affected by a zero-day vulnerability (CVE-2025-0994). This vulnerability has been actively exploited in attacks targeting local governments and utilities, potentially allowing the deployment of malware. The vulnerability allows attackers to exploit deserialization flaws, potentially leading to malware delivery or other malicious activity.

Canadian Charged for $65M Crypto Theft from KyberSwap - 4d
Canadian Charged for $65M Crypto Theft from KyberSwap

Andean Medjedovic, a 22-year-old Canadian national, has been criminally charged for allegedly exploiting vulnerabilities in the KyberSwap and Indexed Finance decentralized finance (DeFi) protocols. These exploits resulted in the theft of approximately $65 million in cryptocurrency from investor funds. The accused is charged with wire fraud, unauthorized damage to a protected computer, attempted Hobbs Act extortion, money laundering conspiracy, and money laundering. Medjedovic remains at large, and authorities are actively pursuing his apprehension.

The exploitation of KyberSwap and Indexed Finance underscores the persistent security challenges within the DeFi ecosystem. Medjedovic allegedly laundered the stolen funds through a series of transactions designed to conceal the source and ownership of the funds, utilizing bridging transactions and crypto mixers. This case highlights the need for robust security audits and proactive measures to safeguard against vulnerabilities in smart contracts and DeFi platforms.

Zyxel Won't Patch Exploited Zero-Days in Legacy Devices - 8d
Zyxel Won

Zyxel has announced that it will not be releasing patches for two actively exploited zero-day vulnerabilities, CVE-2024-40890 and CVE-2024-40891, affecting multiple legacy DSL CPE products. These vulnerabilities allow attackers to execute arbitrary commands. A Mirai botnet variant is exploiting CVE-2024-40891 in the wild. Zyxel recommends that users replace the end-of-life products with newer-generation devices for optimal protection.

The lack of patches for these exploited vulnerabilities in Zyxel devices poses a significant risk to users who continue to use them. This incident highlights the importance of vendors providing ongoing security support for their products, even after they reach end-of-life.

BADBOX Botnet Infects Hundreds of Thousands of Android Devices - 2d
BADBOX Botnet Infects Hundreds of Thousands of Android Devices

The BADBOX botnet has infected over 190,000 Android devices, including high-end models like Yandex 4K QLED TVs. This botnet’s infection is believed to be facilitated by pre-installed malware during the manufacturing process or further down the supply chain, highlighting a significant supply chain vulnerability. The scale of the infection underscores the critical security risks associated with supply chain compromises.

Threat to Software Supply Chain via Abandoned AWS S3 Buckets - 2d
Threat to Software Supply Chain via Abandoned AWS S3 Buckets

Abandoned AWS S3 buckets used by various software projects, governments, and infrastructure deployment pipelines, now pose security risks.

Zyxel Legacy CPE Devices Remain Vulnerable, No Patch Provided - 2d
Zyxel Legacy CPE Devices Remain Vulnerable, No Patch Provided

Zyxel announced it will not patch two actively exploited vulnerabilities (CVE-2024-40890 and CVE-2024-40891) in its legacy DSL CPE products. These vulnerabilities allow for arbitrary command execution, putting users at significant risk. Users of affected devices are strongly advised to replace them immediately. This highlights the challenge of patching legacy hardware and the importance of vendor support for security updates.

Nova Stealer Malware Sold - 2d
Nova Stealer Malware Sold

Nova Stealer, a modified variant of SnakeLogger, is being sold on hacking forums as Malware-as-a-Service (MaaS) for as low as $50. This malware is designed to steal sensitive information, including credentials and financial data, making it a significant threat to individuals and organizations. The malware’s affordability and ease of deployment contribute to its widespread use by cybercriminals, increasing the risk of data breaches and financial losses.

Smartphone Location Data Breach Sparks Lawsuit - 1d

Gravy Analytics faces another lawsuit due to a potential data breach involving the location coordinates of millions of smartphones. The data was harvested from installed apps, raising privacy concerns. This is the fourth time the company has been sued for allegedly failing to protect user data. The stolen coordinates could be used for tracking and profiling individuals, posing significant risks to personal security and privacy. Legal actions and regulatory scrutiny may increase for data brokers handling sensitive location data.

WhatsApp Zero-Click Spyware Attack Targets Journalists - 8d
WhatsApp Zero-Click Spyware Attack Targets Journalists

A zero-click spyware attack, attributed to Israeli firm Paragon, targeted around 90 WhatsApp users, including journalists and civil society members. This attack did not require any user interaction, making it very dangerous. The spyware was delivered via malicious PDFs sent through WhatsApp groups. This campaign highlights how threat actors are constantly developing sophisticated techniques to compromise mobile devices using zero-click attacks and highlights the risk to journalists and activists. WhatsApp has taken steps to neutralize the attack and has notified all the victims.