CyberSecurity updates
Updated: 2024-10-22 08:06:07 Pacfic


do son @ Cybersecurity News
Akira Ransomware Continuously Evolving and Targeting Vulnerable Systems - 12h

Akira ransomware, a prominent threat actor, is continuously evolving its tactics and targeting vulnerable systems, particularly network appliances. Their latest ransomware encryptor targets both Windows and Linux hosts. Akira affiliates have been exploiting vulnerabilities in SonicWall SonicOS, Cisco ASA/FTD, and FortiClientEMS for initial access, followed by credential harvesting, privilege escalation, and lateral movement. The group’s recent shift back to encryption methods, coupled with data theft extortion, emphasizes their focus on stability and efficiency in affiliate operations.

github.com
Necro.N - Mobile Malware Targeting Android Devices - 3d

Necro.N is a highly intrusive mobile malware campaign targeting Android devices, showing similarities to the notorious Joker malware. The campaign involves the distribution of malicious SDKs within mobile applications, exploiting users who download these apps. The malware uses steganography to hide its payload within images, making it challenging to detect. Once installed, the malware can steal sensitive data, subscribe victims to unwanted paid services, and perform other malicious actions. Necro.N poses a major threat to Android users, highlighting the importance of installing apps only from trusted sources.

MalBot @ Malware Analysis, News and Indicators
New Tool EDRSilencer Compromises Endpoint Security Defenses - 5d

EDRSilencer is a red team tool designed to disrupt endpoint detection and response (EDR) solutions by interfering with their communications through the Windows Filtering Platform. This tool allows attackers to operate undetected by EDRs, making it harder for security teams to identify and respond to malicious activity. EDRSilencer highlights the ongoing challenges in endpoint security and the need for proactive measures to counter such evasion techniques.

tomersp@checkpoint.com @ Check Point Research
Ransomware Attacks Target Healthcare and Manufacturing Sectors - 13h

In Q3 2024, cyberattacks surged globally, with an average of 1,876 attacks per organization. The Education/Research sector was the most targeted, while Africa faced the highest attack rates regionally. Ransomware incidents remained persistent, with North America experiencing 57% of the attacks. The Manufacturing and Healthcare sectors were particularly impacted by ransomware.

daksh sharma @ Cyble
HijackLoader Malware Abuses Genuine Code-Signing Certificates - 6d

HijackLoader malware is being used to distribute LummaStealer. This malware is using stolen code-signing certificates for authentication, allowing it to evade detection by security solutions. This exploitation of genuine certificates highlights the increasing sophistication of cybercriminals and the need for enhanced security measures. It’s crucial to be aware of this technique and adopt robust security practices to mitigate the risk.

arstechnica.com
Perfctl Malware Exploits Common Misconfigurations and Known Vulnerabilities to Infect Linux Machines - 7d

Perfctl, a stealthy and persistent Linux malware, has been circulating since at least 2021, infecting thousands of machines. It leverages a range of tactics, including exploiting common misconfigurations and known vulnerabilities, to gain access to vulnerable systems. The malware, which has a high success rate in avoiding detection, uses a naming convention similar to common Linux tools to blend in with legitimate processes. The attackers exploit vulnerabilities like CVE-2023-33246 in Apache RocketMQ, a widely used messaging and streaming platform, to establish a foothold. Perfctl is primarily used for cryptocurrency mining, stealing processing power from infected machines.

do son @ Cyber Security Archives
ChatGPT Usage for Planning Cyberattacks - 10d

OpenAI has recently reported the disruption of over 20 cyber and influence operations in 2023, involving Iranian and Chinese state-sponsored hackers. The company uncovered the activities of three threat actors abusing ChatGPT to launch cyberattacks. One of these actors used ChatGPT to plan ICS attacks, highlighting the evolving threat landscape where AI tools are being leveraged by malicious actors. This indicates the potential for more sophisticated attacks in the future, emphasizing the need for robust security measures to counter these emerging threats. OpenAI has been proactive in detecting and mitigating these malicious activities, highlighting the importance of collaboration between technology companies and cybersecurity researchers in combating these threats. The company is actively working to enhance its security measures to prevent future exploitation of its platforms by malicious actors.


This site is an experimental news aggregator using feeds I personally follow. You can reach me using contacts documented at my website here (https://royans.net/) if you have feedback. You can also find Flathis at Mastodon.