ARTICLES November 2023

H  AI(3) APT(30) Attack(18) BigBrothers(56) BotNet(10) Crime(18) Cryptocurrency(23) Cyber(5) Exploit(29) Hacking(19) ICS(3) Incindent(12) IoT(1) Mobil(0) OS(64) Phishing(6) Ransom(35) Safety(1) Security(20) Social(7) Spam(2) Virus(121) Vulnerebility(108)

H  MARCH(103)  APRIL(113)  MAY(110)  JUNE(93)  July113)  August(97)  September(87)  October(107)  November(101)  December()  ALL 

 

North Korea's Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

CATEGORIE : Cryptocurrency

DATE: 30.11.23

WEB : The Hacker News

Threat actors from the Democratic People's Republic of Korea (DPRK) are increasingly targeting the cryptocurrency sector as a major revenue generation mechanism since at least 2017 to get around sanctions imposed against the country.

"Even though movement in and out of and within the country is heavily restricted, and its general population is isolated from the rest of the world, the regime's ruling elite and its highly trained cadre of computer science professionals have privileged access to new technologies and information," cybersecurity firm Recorded Future said in a report shared with The Hacker News.

CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks

CATEGORIE : Ransom

DATE: 30.11.23

WEB : The Hacker News

A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud analytics and business intelligence platform called Qlik Sense to obtain a foothold into targeted environments.

"This campaign marks the first documented instance [...] where threat actors deploying CACTUS ransomware have exploited vulnerabilities in Qlik Sense for initial access," Arctic Wolf researchers Stefan Hostetler, Markus Neis, and Kyle Pagelow said.

U.S. Treasury Sanctions Sinbad Cryptocurrency Mixer Used by North Korean Hackers

CATEGORIE : Cryptocurrency

DATE: 30.11.23

WEB : The Hacker News

The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that has been put to use by the North Korea-linked Lazarus Group to launder ill-gotten proceeds.

"Sinbad has processed millions of dollars' worth of virtual currency from Lazarus Group heists, including the Horizon Bridge and Axie Infinity heists," the department said.

 

Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.

CATEGORIE : Exploit

DATE: 29.11.23

WEB : The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that it's responding to a cyber attack that involved the active exploitation of Unitronics programmable logic controllers (PLCs) to target the Municipal Water Authority of Aliquippa in western Pennsylvania.

The attack has been attributed to an Iranian-backed hacktivist collective known as Cyber Av3ngers.

200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn

CATEGORIE : Android

DATE: 29.11.23

WEB : The Hacker News

An Android malware campaign targeting Iranian banks has expanded its capabilities and incorporated additional evasion tactics to fly under the radar.

That's according to a new report from Zimperium, which discovered more than 200 malicious apps associated with the malicious operation, with the threat actor also observed carrying out phishing attacks against the targeted financial institutions.

 

Okta Discloses Broader Impact Linked to October 2023 Support System Breach

CATEGORIE : Incindent

DATE: 29.11.23

WEB : The Hacker News

Identity services provider Okta has disclosed that it detected "additional threat actor activity" in connection with the October 2023 breach of its support case management system.

"The threat actor downloaded the names and email addresses of all Okta customer support system users," the company said in a statement shared with The Hacker News.

DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software

CATEGORIE : Ransom

DATE: 29.11.23

WEB : The Hacker News

A variant of a ransomware strain known as DJVU has been observed to be distributed in the form of cracked software.

"While this attack pattern is not new, incidents involving a DJVU variant that appends the .xaro extension to affected files and demanding ransom for a decryptor have been observed infecting systems alongside a host of various commodity loaders and infostealers," Cybereason security researcher Ralph Villanueva said.

GoTitan Botnet Spotted Exploiting Recent Apache ActiveMQ Vulnerability

CATEGORIE : BotNet

DATE: 29.11.23

WEB : The Hacker News

The recently disclosed critical security flaw impacting Apache ActiveMQ is being actively exploited by threat actors to distribute a new Go-based botnet called GoTitan as well as a .NET program known as PrCtrl Rat that's capable of remotely commandeering the infected hosts.

The attacks involve the exploitation of a remote code execution bug (CVE-2023-46604, CVSS score: 10.0) that has been weaponized by various hacking crews, including the Lazarus Group, in recent weeks.

Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability

CATEGORIE : Vulnerebility

DATE: 29.11.23

WEB : The Hacker News

Google has rolled out security updates to fix seven security issues in its Chrome browser, including a zero-day that has come under active exploitation in the wild.

Tracked as CVE-2023-6345, the high-severity vulnerability has been described as an integer overflow bug in Skia, an open source 2D graphics library.

Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access

CATEGORIE : Vulnerebility

DATE: 29.11.23

WEB : The Hacker News

Cybersecurity researchers have detailed a "severe design flaw" in Google Workspace's domain-wide delegation (DWD) feature that could be exploited by threat actors to facilitate privilege escalation and obtain unauthorized access to Workspace APIs without super admin privileges.

"Such exploitation could result in theft of emails from Gmail, data exfiltration from Google Drive, or other unauthorized actions within Google Workspace APIs on all of the identities in the target domain," cybersecurity firm Hunters said in a technical report shared with The Hacker News.

 

Key Cybercriminals Behind Notorious Ransomware Families Arrested in Ukraine

CATEGORIE : Ransom

DATE: 28.11.23

WEB : The Hacker News

A coordinated law enforcement operation has led to the arrest of key individuals in Ukraine who are alleged to be a part of several ransomware schemes.

"On 21 November, 30 properties were searched in the regions of Kyiv, Cherkasy, Rivne, and Vinnytsia, resulting in the arrest of the 32-year-old ringleader," Europol said in a statement today. "Four of the ringleader's most active accomplices were also detained."

Hackers Can Exploit 'Forced Authentication' to Steal Windows NTLM Tokens

CATEGORIE : Exploit

DATE: 28.11.23

WEB : The Hacker News

Cybersecurity researchers have discovered a case of "forced authentication" that could be exploited to leak a Windows user's NT LAN Manager (NTLM) tokens by tricking a victim into opening a specially crafted Microsoft Access file.

The attack takes advantage of a legitimate feature in the database management system solution that allows users to link to external data sources, such as a remote SQL Server table.

N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection

CATEGORIE : Apple

DATE: 28.11.23

WEB : The Hacker News

The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed "mixing and matching" different elements of the two disparate attack chains, leveraging RustBucket droppers to deliver KANDYKORN.

The findings come from cybersecurity firm SentinelOne, which also tied a third macOS-specific malware called ObjCShellz to the RustBucket campaign.

 

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

CATEGORIE : Safety

DATE: 27.11.23

WEB : The Hacker News

A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host keys from a vulnerable SSH server by observing when naturally occurring computational faults that occur while the connection is being established.

The Secure Shell (SSH) protocol is a method for securely transmitting commands and logging in to a computer over an unsecured network. Based on a client-server architecture, SSH uses cryptography to authenticate and encrypt connections between devices.

U.S., U.K., and Global Partners Release Secure AI System Development Guidelines

CATEGORIE : AI

DATE: 27.11.23

WEB : The Hacker News

The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for the development of secure artificial intelligence (AI) systems.

"The approach prioritizes ownership of security outcomes for customers, embraces radical transparency and accountability, and establishes organizational structures where secure design is a top priority," the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said.

 

New 'HrServ.dll' Web Shell Detected in APT Attack Targeting Afghan Government

CATEGORIE : APT

DATE: 25.11.23

WEB : The Hacker News

An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in what's suspected to be an advanced persistent threat (APT) attack.

The web shell, a dynamic-link library (DLL) named "hrserv.dll," exhibits "sophisticated features such as custom encoding methods for client communication and in-memory execution," Kaspersky security researcher Mert Degirmenci said in an analysis published this week.

Warning: 3 Critical Vulnerabilities Expose ownCloud Users to Data Breaches

CATEGORIE : Vulnerebility

DATE: 25.11.23

WEB : The Hacker News

The maintainers of the open-source file-sharing software ownCloud have warned of three critical security flaws that could be exploited to disclose sensitive information and modify files.

A brief description of the vulnerabilities is as follows -

Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand Scale

CATEGORIE : Phishing

DATE: 25.11.23

WEB : The Hacker News

More details have emerged about a malicious Telegram bot called Telekopye that's used by threat actors to pull off large-scale phishing scams.

"Telekopye can craft phishing websites, emails, SMS messages, and more," ESET security researcher Radek Jizba said in a new analysis.

Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel

CATEGORIE : BigBrothers

DATE: 25.11.23

WEB : The Hacker News

Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called SysJoker, which is assessed to have been used by a Hamas-affiliated threat actor to target Israel amid the ongoing war in the region.

"Among the most prominent changes is the shift to Rust language, which indicates the malware code was entirely rewritten, while still maintaining similar functionalities," Check Point said in a Wednesday analysis. "In addition, the threat actor moved to using OneDrive instead of Google Drive to store dynamic C2 (command-and-control server) URLs."

 

Kubernetes Secrets of Fortune 500 Companies Exposed in Public Repositories

CATEGORIE : Incindent

DATE: 24.11.23

WEB : The Hacker News

Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at risk of supply chain attacks.

"These encoded Kubernetes configuration secrets were uploaded to public repositories," Aqua security researchers Yakir Kadkoda and Assaf Morag said in a new research published earlier this week.

Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks

CATEGORIE : Virus

DATE: 24.11.23

WEB : The Hacker News

A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to deliver malware capable of harvesting sensitive information from compromised Windows hosts.

The activity has been attributed to a threat actor called Konni, which is assessed to share overlaps with a North Korean cluster tracked as Kimsuky (aka APT43).

Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed Emails

CATEGORIE : Virus

DATE: 24.11.23

WEB : The Hacker News

Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab.

"The malware itself is split into multiple components, including a loader, injector, downloader and backdoor, and successful requests to C2-controlled servers are often necessary to retrieve the next stage," IBM X-Force researchers Charlotte Hammond, Ole Villadsen, and Kat Metrick said.

Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS Attacks

CATEGORIE : BotNet

DATE: 24.11.23

WEB : The Hacker News

An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality to rope routers and video recorders into a Mirai-based distributed denial-of-service (DDoS) botnet.

"The payload targets routers and network video recorder (NVR) devices with default admin credentials and installs Mirai variants when successful," Akamai said in an advisory published this week.

 

North Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

CATEGORIE : Hacking

DATE: 23.11.23

WEB : The Hacker News

A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application developed by a Taiwanese multimedia software developer called CyberLink to target downstream customers via a supply chain attack.

"This malicious file is a legitimate CyberLink application installer that has been modified to include malicious code that downloads, decrypts, and loads a second-stage payload," the Microsoft Threat Intelligence team said in an analysis on Wednesday.

New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello Login

CATEGORIE : Vulnerebility

DATE: 23.11.23

WEB : The Hacker News

A new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows Hello authentication on Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X laptops.

The flaws were discovered by researchers at hardware and software product security and offensive research firm Blackwing Intelligence, who found the weaknesses in the fingerprint sensors from Goodix, Synaptics, and ELAN that are embedded into the devices.

North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns

CATEGORIE : Hacking

DATE: 23.11.23

WEB : The Hacker News

The activity clusters have been codenamed Contagious Interview and Wagemole, respectively, by Palo Alto Networks Unit 42.

ClearFake Campaign Expands to Deliver Atomic Stealer on Macs Systems

CATEGORIE : Apple

DATE: 22.11.23

WEB : The Hacker News

The macOS information stealer known as Atomic is now being delivered to target via a bogus web browser update chain tracked as ClearFake.

"This may very well be the first time we see one of the main social engineering campaigns, previously reserved for Windows, branch out not only in terms of geolocation but also operating system," Malwarebytes' Jérôme Segura said in a Tuesday analysis.

LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In

CATEGORIE : Ransom

DATE: 22.11.23

WEB : The Hacker News

Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical security flaw in Citrix NetScaler application delivery control (ADC) and Gateway appliances to obtain initial access to target environments.

The joint advisory comes from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing and Analysis Center (MS-ISAC), and Australian Signals Directorate's Australian Cyber Security Center (ASD's ACSC).

Play Ransomware Goes Commercial - Now Offered as a Service to Cybercriminals

CATEGORIE : Ransom

DATE: 22.11.23

WEB : The Hacker News

The ransomware strain known as Play is now being offered to other threat actors "as a service," new evidence unearthed by Adlumin has revealed.

"The unusual lack of even small variations between attacks suggests that they are being carried out by affiliates who have purchased the ransomware-as-a-service (RaaS) and are following step-by-step instructions from playbooks delivered with it," the cybersecurity company said in a report shared with The Hacker News.

New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks

CATEGORIE : Virus

DATE: 22.11.23

WEB : The Hacker News

A new variant of the Agent Tesla malware has been observed delivered via a lure file with the ZPAQ compression format to harvest data from several email clients and nearly 40 web browsers.

"ZPAQ is a file compression format that offers a better compression ratio and journaling function compared to widely used formats like ZIP and RAR," G Data malware analyst Anna Lvova said in a Monday analysis.

How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography

CATEGORIE : Phishing

DATE: 22.11.23

WEB : The Hacker News

Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One of the latest trends in phishing is the use of QR codes, CAPTCHAs, and steganography. See how they are carried out and learn to detect them.

Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits

CATEGORIE : Virus

DATE: 22.11.23

WEB : The Hacker News

The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux systems with cryptocurrency miners and rootkits.

"Once Kinsing infects a system, it deploys a cryptocurrency mining script that exploits the host's resources to mine cryptocurrencies like Bitcoin, resulting in significant damage to the infrastructure and a negative impact on system performance," Trend Micro security researcher Peter Girnus said.

Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users

CATEGORIE : Android

DATE: 21.11.23

WEB : The Hacker News

Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data.

"Using social media platforms like WhatsApp and Telegram, attackers are sending messages designed to lure users into installing a malicious app on their mobile device by impersonating legitimate organizations, such as banks, government services, and utilities," Microsoft threat intelligence researchers Abhishek Pustakala, Harshita Tripathi, and Shivang Desai said in a Monday analysis.

Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions

CATEGORIE : BigBrothers

DATE: 21.11.23

WEB : The Hacker News

The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea.

Palo Alto Networks Unit 42 attributed the adversarial collective to three campaigns in August 2023, primarily singling out organizations in the South Pacific.

NetSupport RAT Infections on the Rise - Targeting Government and Business Sectors

CATEGORIE : Virus

DATE: 21.11.23

WEB : The Hacker News

Threat actors are targeting the education, government and business services sectors with a remote access trojan called NetSupport RAT.

"The delivery mechanisms for the NetSupport RAT encompass fraudulent updates, drive-by downloads, utilization of malware loaders (such as GHOSTPULSE), and various forms of phishing campaigns," VMware Carbon Black researchers said in a report shared with The Hacker News.

DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing Attacks

CATEGORIE : Virus

DATE: 21.11.23

WEB : The Hacker News

Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct QakBot trojan.

"These include hijacked email threads as the initial infection, URLs with unique patterns that limit user access, and an infection chain nearly identical to what we have seen with QakBot delivery," Cofense said in a report shared with The Hacker News.

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

CATEGORIE : Virus

DATE: 20.11.23

WEB : The Hacker News

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts.

The method is designed to "delay detonation of the sample until human mouse activity is detected," Outpost24 security researcher Alberto Marín said in a technical report shared with The Hacker News.

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

CATEGORIE : Exploit

DATE: 20.11.23

WEB : The Hacker News

Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of wallets spanning several blockchain platforms.

"Randstorm() is a term we coined to describe a collection of bugs, design decisions, and API changes that, when brought in contact with each other, combine to dramatically reduce the quality of random numbers produced by web browsers of a certain era (2011-2015)," Unciphered disclosed in a report published last week.

Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years

CATEGORIE : BigBrothers

DATE: 20.11.23

WEB : The Hacker News

An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive operation for over a decade.

The Appin Software Security (aka Appin Security Group), according to an in-depth analysis from SentinelOne, began as an educational startup offering offensive security training programs, while carrying out covert hacking operations since at least 2009.

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

CATEGORIE : Virus

DATE: 18.11.23

WEB : The Hacker News

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks.

The findings come from Cisco Talos, which has recorded an increase in activity carried out by cybercriminals.

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

CATEGORIE : Virus

DATE: 18.11.23

WEB : The Hacker News

Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities.

Check Point, which detailed Gamaredon's (aka Aqua Blizzard, Iron Tilden, Primitive Bear, Shuckworm, and Winterflounder) latest tactics, branded the group as engaging in large-scale campaigns that are followed by "data collection efforts aimed at specific targets, whose selection is likely motivated by espionage goals."

 

Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware

CATEGORIE : Virus

DATE: 17.11.23

WEB : The Hacker News

Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead.

Cybersecurity company Securonix is tracking the ongoing activity under the name SEO#LURKER.

FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks

CATEGORIE : Attack

DATE: 17.11.23

WEB : The Hacker News

The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams that make it possible for malicious actors to orchestrate SIM-swapping attacks and port-out fraud.

"The rules will help protect consumers from scammers who target data and personal information by covertly swapping SIM cards to a new device or porting phone numbers to a new carrier without ever gaining physical control of a consumer's phone," FCC said this week.

 

CISA and FBI Issue Warning About Rhysida Ransomware Double Extortion Attacks

CATEGORIE : Ransom

DATE: 16.11.23

WEB : The Hacker News

The threat actors behind the Rhysida ransomware engage in opportunistic attacks targeting organizations spanning various industry sectors.

The advisory comes courtesy of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC).

Hackers Could Exploit Google Workspace and Cloud Platform for Ransomware Attacks

CATEGORIE : Ransom

DATE: 16.11.23

WEB : The Hacker News

A set of novel attack methods has been demonstrated against Google Workspace and the Google Cloud Platform that could be potentially leveraged by threat actors to conduct ransomware, data exfiltration, and password recovery attacks.

"Starting from a single compromised machine, threat actors could progress in several ways: they could move to other cloned machines with GCPW installed, gain access to the cloud platform with custom permissions, or decrypt locally stored passwords to continue their attack beyond the Google ecosystem," Martin Zugec, technical solutions director at Bitdefender, said in a new report.

Russian Hackers Linked to 'Largest Ever Cyber Attack' on Danish Critical Infrastructure

CATEGORIE : BigBrothers

DATE: 16.11.23

WEB : The Hacker News

Russian threat actors have been possibly linked to what's been described as the "largest cyber attack against Danish critical infrastructure," in which 22 companies associated with the operation of the country's energy sector were targeted in May 2023.

"22 simultaneous, successful cyberattacks against Danish critical infrastructure are not commonplace," Denmark's SektorCERT said [PDF]. "The attackers knew in advance who they were going to target and got it right every time. Not once did a shot miss the target."

U.S. Takes Down IPStorm Botnet, Russian-Moldovan Mastermind Pleads Guilty

CATEGORIE : BigBrothers

DATE: 16.11.23

WEB : The Hacker News

The U.S. government on Tuesday announced the takedown of the IPStorm botnet proxy network and its infrastructure, as the Russian and Moldovan national behind the operation pleaded guilty.

"The botnet infrastructure had infected Windows systems then further expanded to infect Linux, Mac, and Android devices, victimizing computers and other electronic devices around the world, including in Asia, Europe, North America and South America," the Department of Justice (DoJ) said in a press statement.

New PoC Exploit for Apache ActiveMQ Flaw Could Let Attackers Fly Under the Radar

CATEGORIE : Exploit

DATE: 16.11.23

WEB : The Hacker News

Cybersecurity researchers have demonstrated a new technique that exploits a critical security flaw in Apache ActiveMQ to achieve arbitrary code execution in memory.

Tracked as CVE-2023-46604 (CVSS score: 10.0), the vulnerability is a remote code execution bug that could permit a threat actor to run arbitrary shell commands.

 

Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments

CATEGORIE : Vulnerebility

DATE: 15.11.23

WEB : The Hacker News

Intel has released fixes to close out a high-severity flaw codenamed Reptar that impacts its desktop, mobile, and server CPUs.

Tracked as CVE-2023-23583 (CVSS score: 8.8), the issue has the potential to "allow escalation of privilege and/or information disclosure and/or denial of service via local access."

Alert: Microsoft Releases Patch Updates for 5 New Zero-Day Vulnerabilities

CATEGORIE : Vulnerebility

DATE: 15.11.23

WEB : The Hacker News

Microsoft has released fixes to address 63 security bugs in its software for the month of November 2023, including three vulnerabilities that have come under active exploitation in the wild.

Of the 63 flaws, three are rated Critical, 56 are rated Important, and four are rated Moderate in severity. Two of them have been listed as publicly known at the time of the release.

Urgent: VMware Warns of Unpatched Critical Cloud Director Vulnerability

CATEGORIE : Vulnerebility

DATE: 15.11.23

WEB : The Hacker News

VMware is warning of a critical and unpatched security flaw in Cloud Director that could be exploited by a malicious actor to get around authentication protections.

Tracked as CVE-2023-34060 (CVSS score: 9.8), the vulnerability impacts instances that have been upgraded to version 10.5 from an older version.

CacheWarp Attack: New Vulnerability in AMD SEV Exposes Encrypted VMs

CATEGORIE : Attack

DATE: 15.11.23

WEB : The Hacker News

A group of academics has disclosed a new "software fault attack" on AMD's Secure Encrypted Virtualization (SEV) technology that could be potentially exploited by threat actors to infiltrate encrypted virtual machines (VMs) and even perform privilege escalation.

The attack has been codenamed CacheWarp (CVE-2023-20592) by researchers from the CISPA Helmholtz Center for Information Security and the Graz University of Technology. It impacts AMD CPUs supporting all variants of SEV.

 

Alert: OracleIV DDoS Botnet Targets Public Docker Engine APIs to Hijack Containers

CATEGORIE : BotNet

DATE: 14.11.23

WEB : The Hacker News

Publicly-accessible Docker Engine API instances are being targeted by threat actors as part of a campaign designed to co-opt the machines into a distributed denial-of-service (DDoS) botnet dubbed OracleIV.

"Attackers are exploiting this misconfiguration to deliver a malicious Docker container, built from an image named 'oracleiv_latest' and containing Python malware compiled as an ELF executable," Cado researchers Nate Bill and Matt Muir said.

New Campaign Targets Middle East Governments with IronWind Malware

CATEGORIE : Virus

DATE: 14.11.23

WEB : The Hacker News

Government entities in the Middle East are the target of new phishing campaigns that are designed to deliver a new initial access downloader dubbed IronWind.

The activity, detected between July and October 2023, has been attributed by Proofpoint to a threat actor it tracks under the name TA402, which is also known as Molerats, Gaza Cyber Gang, and shares tactical overlaps with a pro-Hamas hacking crew known as APT-C-23 (aka Arid Viper).

Vietnamese Hackers Using New Delphi-Powered Malware to Target Indian Marketers

CATEGORIE : Virus

DATE: 14.11.23

WEB : The Hacker News

The Vietnamese threat actors behind the Ducktail stealer malware have been linked to a new campaign that ran between March and early October 2023, targeting marketing professionals in India with an aim to hijack Facebook business accounts.

"An important feature that sets it apart is that, unlike previous campaigns, which relied on .NET applications, this one used Delphi as the programming language," Kaspersky said in a report published last week.

CISA Sets a Deadline - Patch Juniper Junos OS Flaws Before November 17

CATEGORIE : Vulnerebility

DATE: 14.11.23

WEB : The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has given a November 17, 2023, deadline for federal agencies and organizations to apply mitigations to secure against a number of security flaws in Juniper Junos OS that came to light in August.

The agency on Monday added five vulnerabilities to the Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation -

New Ransomware Group Emerges with Hive's Source Code and Infrastructure

CATEGORIE : Ransom

DATE: 14.11.23

WEB : The Hacker News

The threat actors behind a new ransomware group called Hunters International have acquired the source code and infrastructure from the now-dismantled Hive operation to kick-start its own efforts in the threat landscape.

"It appears that the leadership of the Hive group made the strategic decision to cease their operations and transfer their remaining assets to another group, Hunters International," Martin Zugec, technical solutions director at Bitdefender, said in a report published last week.

 

Chinese Hackers Launch Covert Espionage Attacks on 24 Cambodian Organizations

CATEGORIE : BigBrothers

DATE: 13.11.23

WEB : The Hacker News

Cybersecurity researchers have discovered what they say is malicious cyber activity orchestrated by two prominent Chinese nation-state hacking groups targeting 24 Cambodian government organizations.

"This activity is believed to be part of a long-term espionage campaign," Palo Alto Networks Unit 42 researchers said in a report last week.

Major Phishing-as-a-Service Syndicate 'BulletProofLink' Dismantled by Malaysian Authorities

CATEGORIE : Phishing

DATE: 13.11.23

WEB : The Hacker News

Malaysian law enforcement authorities have announced the takedown of a phishing-as-a-service (PhaaS) operation called BulletProofLink.

The Royal Malaysia Police said the effort, which was carried out with assistance from the Australian Federal Police (AFP) and the U.S. Federal Bureau of Investigation (FBI) on November 6, 2023, was based on information that the threat actors behind the platform were based out of the country.

New BiBi-Windows Wiper Targets Windows Systems in Pro-Hamas Attacks

CATEGORIE : Virus

DATE: 13.11.23

WEB : The Hacker News

Cybersecurity researchers have warned about a Windows version of a wiper malware that was previously observed targeting Linux systems in cyber attacks aimed at Israel.

Dubbed BiBi-Windows Wiper by BlackBerry, the wiper is the Windows counterpart of BiBi-Linux Wiper, which has been put to use by a pro-Hamas hacktivist group in the wake of the Israel-Hamas war last month.

Russian Hackers Sandworm Cause Power Outage in Ukraine Amidst Missile Strikes

CATEGORIE : APT

DATE: 11.11.23

WEB : The Hacker News

The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a brief power outage in October 2022.

The findings come from Google's Mandiant, which described the hack as a "multi-event cyber attack" leveraging a novel technique for impacting industrial control systems (ICS).

Alert: 'Effluence' Backdoor Persists Despite Patching Atlassian Confluence Servers

CATEGORIE : Virus

DATE: 11.11.23

WEB : The Hacker News

Cybersecurity researchers have discovered a stealthy backdoor named Effluence that's deployed following the successful exploitation of a recently disclosed security flaw in Atlassian Confluence Data Center and Server.

"The malware acts as a persistent backdoor and is not remediated by applying patches to Confluence," Aon's Stroz Friedberg Incident Response Services said in an analysis published earlier this week.

Iran-Linked Imperial Kitten Cyber Group Targeting Middle East's Tech Sectors

CATEGORIE : APT

DATE: 11.11.23

WEB : The Hacker News

A group with links to Iran targeted transportation, logistics, and technology sectors in the Middle East, including Israel, in October 2023 amid a surge in Iranian cyber activity since the onset of the Israel-Hamas war.

The attacks have been attributed by CrowdStrike to a threat actor it tracks under the name Imperial Kitten, and which is also known as Crimson Sandstorm (previously Curium), TA456, Tortoiseshell, and Yellow Liderc.

Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan

CATEGORIE : Android

DATE: 10.11.23

WEB : The Hacker News

Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely emerged as a target of a watering hole attack designed to deliver a previously undocumented Android spyware dubbed Kamran.

The campaign, ESET has discovered, leverages Hunza News (urdu.hunzanews[.]net), which, when opened on a mobile device, prompts visitors of the Urdu version to install its Android app directly hosted on the website.

Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability

CATEGORIE : Exploit

DATE: 10.11.23

WEB : The Hacker News

The threat actor known as Lace Tempest has been linked to the exploitation of a zero-day flaw in SysAid IT support software in limited attacks, according to new findings from Microsoft.

Lace Tempest, which is known for distributing the Cl0p ransomware, has in the past leveraged zero-day flaws in MOVEit Transfer and PaperCut servers.

New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers

CATEGORIE : Virus

DATE: 10.11.23

WEB : The Hacker News

A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate a malicious installer for a popular system profiling tool called CPU-Z.

"This incident is a part of a larger malvertising campaign that targets other utilities like Notepad++, Citrix, and VNC Viewer as seen in its infrastructure (domain names) and cloaking templates used to avoid detection," Malwarebytes' Jérôme Segura said.

MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel

CATEGORIE : APT

DATE: 10.11.23

WEB : The Hacker News

Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called MuddyC2Go as part of attacks targeting Israel.

"The framework's web component is written in the Go programming language," Deep Instinct security researcher Simon Kenin said in a technical report published Wednesday.

CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation

CATEGORIE : Exploit

DATE: 9.11.23

WEB : The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw in the Service Location Protocol (SLP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Tracked as CVE-2023-29552 (CVSS score: 7.5), the issue relates to a denial-of-service (DoS) vulnerability that could be weaponized to launch massive DoS amplification attacks.

Researchers Uncover Undetectable Crypto Mining Technique on Azure Automation

CATEGORIE : Cryptocurrency

DATE: 9.11.23

WEB : The Hacker News

Cybersecurity researchers have developed what's the first fully undetectable cloud-based cryptocurrency miner leveraging the Microsoft Azure Automation service without racking up any charges.

Cybersecurity company SafeBreach said it discovered three different methods to run the miner, including one that can be executed on a victim's environment without attracting any attention.

WhatsApp Introduces New Privacy Feature to Protect IP Address in Calls

CATEGORIE : Social

DATE: 9.11.23

WEB : The Hacker News

Meta-owned WhatsApp is officially rolling out a new privacy feature in its messaging service called "Protect IP Address in Calls" that masks users' IP addresses to other parties by relaying the calls through its servers.

"Calls are end-to-end encrypted, so even if a call is relayed through WhatsApp servers, WhatsApp cannot listen to your calls," the company said in a statement shared with The Hacker News.

Beware, Developers: BlazeStealer Malware Discovered in Python Packages on PyPI

CATEGORIE : Virus

DATE: 9.11.23

WEB : The Hacker News

A new set of malicious Python packages has slithered their way to the Python Package Index (PyPI) repository with the ultimate aim of stealing sensitive information from compromised developer systems.

The packages masquerade as seemingly innocuous obfuscation tools, but harbor a piece of malware called BlazeStealer, Checkmarx said in a report shared with The Hacker News.

Experts Expose Farnetwork's Ransomware-as-a-Service Business Model

CATEGORIE : Ransom

DATE: 9.11.23

WEB : The Hacker News

Cybersecurity researchers have unmasked a prolific threat actor known as farnetwork, who has been linked to five different ransomware-as-a-service (RaaS) programs over the past four years in various capacities.

Singapore-headquartered Group-IB, which attempted to infiltrate a private RaaS program that uses the Nokoyawa ransomware strain, said it underwent a "job interview" process with the threat actor, learning several valuable insights into their background and role within those RaaS programs.

N. Korea's BlueNoroff Blamed for Hacking macOS Machines with ObjCShellz Malware

CATEGORIE : Apple

DATE: 9.11.23

WEB : The Hacker News

The North Korea-linked nation-state group called BlueNoroff has been attributed to a previously undocumented macOS malware strain dubbed ObjCShellz.

Jamf Threat Labs, which disclosed details of the malware, said it's used as part of the RustBucket malware campaign, which came to light earlier this year.

New GootLoader Malware Variant Evades Detection and Spreads Rapidly

CATEGORIE : Virus

DATE: 9.11.23

WEB : The Hacker News

A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and evade detection.

"The GootLoader group's introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools for C2 such as CobaltStrike or RDP," IBM X-Force researchers Golo Mühr and Ole Villadsen said.

SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government Entities

CATEGORIE : Virus

DATE: 9.11.23

WEB : The Hacker News

The Pakistan-linked threat actor known as SideCopy has been observed leveraging the recent WinRAR security vulnerability in its attacks targeting Indian government entities to deliver various remote access trojans such as AllaKore RAT, Ares RAT, and DRat.

Enterprise security firm SEQRITE described the campaign as multi-platform, with the attacks also designed to infiltrate Linux systems with a compatible version of Ares RAT.

Experts Warn of Ransomware Hackers Exploiting Atlassian and Apache Flaws

CATEGORIE : Ransom

DATE: 7.11.23

WEB : The Hacker News

Multiple ransomware groups have begun to actively exploit recently disclosed flaws in Atlassian Confluence and Apache ActiveMQ.

Cybersecurity firm Rapid7 said it observed the exploitation of CVE-2023-22518 and CVE-2023-22515 in multiple customer environments, some of which have been leveraged for the deployment of Cerber (aka C3RB3R) ransomware.

Critical Flaws Discovered in Veeam ONE IT Monitoring Software – Patch Now

CATEGORIE : Vulnerebility

DATE: 7.11.23

WEB : The Hacker News

Veeam has released security updates to address four flaws in its ONE IT monitoring and analytics platform, two of which are rated critical in severity.

New Jupyter Infostealer Version Emerges with Sophisticated Stealth Tactics

CATEGORIE : Virus

DATE: 7.11.23

WEB : The Hacker News

An updated version of an information stealer malware known as Jupyter has resurfaced with "simple yet impactful changes" that aim to stealthily establish a persistent foothold on compromised systems.

"The team has discovered new waves of Jupyter Infostealer attacks which leverage PowerShell command modifications and signatures of private keys in attempts to pass off the malware as a legitimately signed file," VMware Carbon Black researchers said in a report shared with The Hacker News.

QNAP Releases Patch for 2 Critical Flaws Threatening Your NAS Devices

CATEGORIE : Vulnerebility

DATE: 7.11.23

WEB : The Hacker News

QNAP has released security updates to address two critical security flaws impacting its operating system that could result in arbitrary code execution.

Tracked as CVE-2023-23368 (CVSS score: 9.8), the vulnerability is described as a command injection bug affecting QTS, QuTS hero, and QuTScloud.

SecuriDropper: New Android Dropper-as-a-Service Bypasses Google's Defenses

CATEGORIE : Android

DATE: 6.11.23

WEB : The Hacker News

Cybersecurity researchers have shed light on a new dropper-as-a-service (DaaS) for Android called SecuriDropper that bypasses new security restrictions imposed by Google and delivers the malware.

Dropper malware on Android is designed to function as a conduit to install a payload on a compromised device, making it a lucrative business model for threat actors, who can advertise the capabilities to other criminal groups.

 

Iranian Hackers Launches Destructive Cyberattacks on Israeli Tech and Education Sectors

CATEGORIE : BigBrothers

DATE: 6.11.23

WEB : The Hacker News

Israeli higher education and tech sectors have been targeted as part of a series of destructive cyber attacks that commenced in January 2023 with an aim to deploy previously undocumented wiper malware.

The intrusions, which took place as recently as October, have been attributed to an Iranian nation-state hacking crew it tracks under the name Agonizing Serpens, which is also known as Agrius, BlackShadow and Pink Sandstorm (previously Americium).

Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel

CATEGORIE : Hacking

DATE: 6.11.23

WEB : The Hacker News

Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host command-and-control (C2) infrastructure.

The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June 2023.

U.S. Treasury Sanctions Russian Money Launderer in Cybercrime Crackdown

CATEGORIE : BigBrothers

DATE: 6.11.23

WEB : The Hacker News

The U.S. Department of the Treasury imposed sanctions against a Russian woman for taking part in the laundering of virtual currency for the country's elites and cybercriminal crews, including the Ryuk ransomware group.

Ekaterina Zhdanova, per the department, is said to have facilitated large cross border transactions to assist Russian individuals to gain access to Western financial markets and circumvent international sanctions.

 

StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million Devices

CATEGORIE : Virus

DATE: 4.11.23

WEB : The Hacker News

An advanced strain of malware masquerading as a cryptocurrency miner has managed to fly the radar for over five years, infecting no less than one million devices around the world in the process.

That's according to findings from Kaspersky, which has codenamed the threat StripedFly, describing it as an "intricate modular framework that supports both Linux and Windows."

Okta's Recent Customer Support Data Breach Impacted 134 Customers

CATEGORIE : Incindent

DATE: 4.11.23

WEB : The Hacker News

Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach affected 134 of its 18,400 customers.

It further noted that the unauthorized intruder gained access to its systems from September 28 to October 17, 2023, and ultimately accessed HAR files containing session tokens that could be used for session hijacking attacks.

Google Play Store Introduces 'Independent Security Review' Badge for Apps

CATEGORIE : Android

DATE: 4.11.23

WEB : The Hacker News

Google is rolling out an "Independent security review" badge in the Play Store's Data safety section for Android apps that have undergone a Mobile Application Security Assessment (MASA) audit.

"We've launched this banner beginning with VPN apps due to the sensitive and significant amount of user data these apps handle," Nataliya Stanetsky of the Android Security and Privacy Team said.

Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud Environments

CATEGORIE : Vulnerebility

DATE: 4.11.23

WEB : The Hacker News

The threat actors linked to Kinsing have been observed attempting to exploit the recently disclosed Linux privilege escalation flaw called Looney Tunables as part of a "new experimental campaign" designed to breach cloud environments.

"Intriguingly, the attacker is also broadening the horizons of their cloud-native attacks by extracting credentials from the Cloud Service Provider (CSP)," cloud security firm Aqua said in a report shared with The Hacker News.

 

NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads

CATEGORIE : Virus

DATE: 3.11.23

WEB : The Hacker News

Compromised Facebook business accounts are being used to run bogus ads that employ "revealing photos of young women" as lures to trick victims into downloading an updated version of a malware called NodeStealer.

"Clicking on ads immediately downloads an archive containing a malicious .exe 'Photo Album' file which also drops a second executable written in .NET – this payload is in charge of stealing browser cookies and passwords," Bitdefender said in a report published this week.

CanesSpy Spyware Discovered in Modified WhatsApp Versions

CATEGORIE : Virus

DATE: 3.11.23

WEB : The Hacker News

Cybersecurity researchers have unearthed a number of WhatsApp mods for Android that come fitted with a spyware module dubbed CanesSpy.

These modified versions of the instant messaging app have been observed propagated via sketchy websites advertising such software as well as Telegram channels used primarily by Arabic and Azerbaijani speakers, one of which boasts 2 million users.

48 Malicious npm Packages Found Deploying Reverse Shells on Developer Systems

CATEGORIE : Virus

DATE: 3.11.23

WEB : The Hacker News

A new set of 48 malicious npm packages have been discovered in the npm repository with capabilities to deploy a reverse shell on compromised systems.

"These packages, deceptively named to appear legitimate, contained obfuscated JavaScript designed to initiate a reverse shell on package install," software supply chain security firm Phylum said.

Mysterious Kill Switch Disrupts Mozi IoT Botnet Operations

CATEGORIE : BotNet

SUBKATEGORIE : BotNet

DATE: 2.11.23

WEB : The Hacker News

The unexpected drop in malicious activity connected with the Mozi botnet in August 2023 was due to a kill switch that was distributed to the bots.

"First, the drop manifested in India on August 8," ESET said in an analysis published this week. "A week later, on August 16, the same thing happened in China. While the mysterious control payload – aka kill switch – stripped Mozi bots of most functionality, they maintained persistence."

Iran's MuddyWater Targets Israel in New Spear-Phishing Cyber Campaign

CATEGORIE : BigBrothers

DATE: 2.11.23

WEB : The Hacker News

The Iranian nation-state actor known as MuddyWater has been linked to a new spear-phishing campaign targeting two Israeli entities to ultimately deploy a legitimate remote administration tool from N-able called Advanced Monitoring Agent.

Cybersecurity firm Deep Instinct, which disclosed details of the attacks, said the campaign "exhibits updated TTPs to previously reported MuddyWater activity," which has, in the past, used similar attack chains to distribute other remote access tools like ScreenConnect, RemoteUtilities, Syncro, and SimpleHelp.

Researchers Find 34 Windows Drivers Vulnerable to Full Device Takeover

CATEGORIE : Vulnerebility

DATE: 2.11.23

WEB : The Hacker News

As many as 34 unique vulnerable Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers could be exploited by non-privileged threat actors to gain full control of the devices and execute arbitrary code on the underlying systems.

"By exploiting the drivers, an attacker without privilege may erase/alter firmware, and/or elevate [operating system] privileges," Takahiro Haruyama, a senior threat researcher at VMware Carbon Black, said.

FIRST Announces CVSS 4.0 - New Vulnerability Scoring System

CATEGORIE : Security

DATE: 2.11.23

WEB : The Hacker News

The Forum of Incident Response and Security Teams (FIRST) has officially announced CVSS v4.0, the next generation of the Common Vulnerability Scoring System standard, more than eight years after the release of CVSS v3.0 in June 2015.

"This latest version of CVSS 4.0 seeks to provide the highest fidelity of vulnerability assessment for both industry and the public," FIRST said in a statement.

HelloKitty Ransomware Group Exploiting Apache ActiveMQ Vulnerability

CATEGORIE : Ransom

DATE: 2.11.23

WEB : The Hacker News

Cybersecurity researchers are warning of suspected exploitation of a recently disclosed critical security flaw in the Apache ActiveMQ open-source message broker service that could result in remote code execution.

"In both instances, the adversary attempted to deploy ransomware binaries on target systems in an effort to ransom the victim organizations," cybersecurity firm Rapid7 disclosed in a report published Wednesday.

Researchers Expose Prolific Puma's Underground Link Shortening Service

CATEGORIE : Hacking

DATE: 2.11.23

WEB : The Hacker News

A threat actor known as Prolific Puma has been maintaining a low profile and operating an underground link shortening service that's offered to other threat actors for at least over the past four years.

Prolific Puma creates "domain names with an RDGA [registered domain generation algorithm] and use these domains to provide a link shortening service to other malicious actors, helping them evade detection while they distribute phishing, scams, and malware," Infoblox said in a new analysis pieced together from Domain Name System (DNS) analytics.

Iranian Cyber Espionage Group Targets Financial and Government Sectors in Middle East

CATEGORIE : BigBrothers

DATE: 1.11.23

WEB : The Hacker News

A threat actor affiliated with Iran's Ministry of Intelligence and Security (MOIS) has been observed waging a sophisticated cyber espionage campaign targeting financial, government, military, and telecommunications sectors in the Middle East for at least a year.

Israeli cybersecurity firm Check Point, which discovered the campaign alongside Sygnia, is tracking the actor under the name Scarred Manticore, which is said to closely overlap with an emerging cluster dubbed Storm-0861, one of the four Iranian groups linked to destructive attacks on the Albanian government last year.

North Korean Hackers Targeting Crypto Experts with KANDYKORN macOS Malware

CATEGORIE : Apple

DATE: 1.11.23

WEB : The Hacker News

State-sponsored threat actors from the Democratic People's Republic of Korea (DPRK) have been found targeting blockchain engineers of an unnamed crypto exchange platform via Discord with a novel macOS malware dubbed KANDYKORN.

Elastic Security Labs said the activity, traced back to April 2023, exhibits overlaps with the infamous adversarial collective Lazarus Group, citing an analysis of the network infrastructure and techniques used.

Turla Updates Kazuar Backdoor with Advanced Anti-Analysis to Evade Detection

CATEGORIE : APT

DATE: 1.11.23

WEB : The Hacker News

The Russia-linked hacking crew known as Turla has been observed using an updated version of a known second-stage backdoor referred to as Kazuar.

The new findings come from Palo Alto Networks Unit 42, which is tracking the adversary under its constellation-themed moniker Pensive Ursa.

Alert: F5 Warns of Active Attacks Exploiting BIG-IP Vulnerability

CATEGORIE : Vulnerebility

DATE: 1.11.23

WEB : The Hacker News

F5 is warning of active abuse of a critical security flaw in BIG-IP less than a week after its public disclosure, resulting in the execution of arbitrary system commands as part of an exploit chain.

Tracked as CVE-2023-46747 (CVSS score: 9.8), the vulnerability allows an unauthenticated attacker with network access to the BIG-IP system through the management port to achieve code execution. A proof-of-concept (PoC) exploit has since been made available by ProjectDiscovery.

Arid Viper Targeting Arabic Android Users with Spyware Disguised as Dating App

CATEGORIE : Android

DATE: 1.11.23

WEB : The Hacker News

The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has been attributed as behind an Android spyware campaign targeting Arabic-speaking users with a counterfeit dating app designed to harvest data from infected handsets.

"Arid Viper's Android malware has a number of features that enable the operators to surreptitiously collect sensitive information from victims' devices and deploy additional executables," Cisco Talos said in a Tuesday report.