ARTICLES September 2023

H  AI(3) APT(30) Attack(18) BigBrothers(56) BotNet(10) Crime(18) Cryptocurrency(23) Cyber(5) Exploit(29) Hacking(19) ICS(3) Incindent(12) IoT(1) Mobil(0) OS(64) Phishing(6) Ransom(35) Safety(1) Security(20) Social(7) Spam(2) Virus(121) Vulnerebility(108)

H  MARCH(103)  APRIL(113)  MAY(110)  JUNE(93)  July(113)  August(97)  September(87)  October(5)  November()  December()  ALL

Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics

CATEGORIE : Virus

DATE: 24.9.23

WEB : The Hacker News

Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth Falcon as part of a cyber espionage campaign.

"Deadglyph's architecture is unusual as it consists of cooperating components – one a native x64 binary, the other a .NET assembly," ESET said in a new report shared with The Hacker News.

New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware

Apple Zero-Day

CATEGORIE : Apple

DATE: 23.9.23

WEB : The Hacker News

The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a spyware strain called Predator targeting former Egyptian member of parliament Ahmed Eltantawy between May and September 2023.

"The targeting took place after Eltantawy publicly stated his plans to run for President in the 2024 Egyptian elections," the Citizen Lab said, attributing the attack with high confidence to the Egyptian government owing to it being a known customer of the commercial spying tool.

New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks

Banking Trojan BBTok

CATEGORIE : Virus

DATE: 23.9.23

WEB : The Hacker News

An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok, particularly users in Brazil and Mexico.

"The BBTok banker has a dedicated functionality that replicates the interfaces of more than 40 Mexican and Brazilian banks, and tricks the victims into entering its 2FA code to their bank accounts or into entering their payment card number," Check Point said in research published this week.

The payloads are generated by a custom server-side PowerShell script and are unique for each victim based on the operating system and country, while being delivered via phishing emails that leverage a variety of file types.

Iranian Nation-State Actor OilRig Targets Israeli Organizations

Iranian Nation-State

CATEGORIE : BigBrothers

DATE: 22.9.23

WEB : The Hacker News

Israeli organizations were targeted as part of two different campaigns orchestrated by the Iranian nation-state actor known as OilRig in 2021 and 2022.

The campaigns, dubbed Outer Space and Juicy Mix, entailed the use of two previously documented first-stage backdoors called Solar and Mango, which were deployed to collect sensitive information from major browsers and the Windows Credential Manager.

High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server

Atlassian Products and ISC BIND Server

CATEGORIE : Vulnerebility

DATE: 22.9.23

WEB : The Hacker News

Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to achieve denial-of-service (DoS) and remote code execution.

The Australian software services provider said that the four high-severity flaws were fixed in new versions shipped last month. This includes -

Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable

Zero-Day

CATEGORIE : Apple

DATE: 22.9.23

WEB : The Hacker News

Apple has released yet another round of security patches to address three actively exploited zero-day flaws impacting iOS, iPadOS, macOS, watchOS, and Safari, taking the total tally of zero-day bugs discovered in its software this year to 16.

The list of security vulnerabilities is as follows -

Mysterious 'Sandman' Threat Actor Targets Telecom Providers Across Three Continents

Sandman

CATEGORIE : Cyber

DATE: 22.9.23

WEB : The Hacker News

A previously undocumented threat actor dubbed Sandman has been attributed to a set of cyber attacks targeting telecommunic koation providers in the Middle East, Western Europe, and the South Asian subcontinent.

Notably, the intrusions leverage a just-in-time (JIT) compiler for the Lua programming language known as LuaJIT as a vehicle to deploy a novel implant called LuaDream.

Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge

P2PInfect Malware

CATEGORIE : Virus

DATE: 21.9.23

WEB : The Hacker News

The peer-to-peer (P2) worm known as P2PInfect has witnessed a surge in activity since late August 2023, witnessing a 600x jump between September 12 and 19, 2023.

"This increase in P2PInfect traffic has coincided with a growing number of variants seen in the wild, suggesting that the malware's developers are operating at an extremely high development cadence," Cado Security researcher Matt Muir said in a report published Wednesday.

China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers

Cyber Espionage Campaign

CATEGORIE : BigBrothers

DATE: 21.9.23

WEB : The Hacker News

China's Ministry of State Security (MSS) has accused the U.S. of breaking into Huawei's servers, stealing critical data, and implanting backdoors since 2009, amid mounting geopolitical tensions between the two countries.

In a message posted on WeChat, the government authority said U.S. intelligence agencies have "done everything possible" to conduct surveillance, secret theft, and intrusions on many countries around the world, including China, using a "powerful cyber attack arsenal." Specifics about the alleged hacks were not shared.

Cyber Group 'Gold Melody' Selling Compromised Access to Ransomware Attackers

Ransomware Attackers

CATEGORIE : Ransom

DATE: 21.9.23

WEB : The Hacker News

A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations for other adversaries to conduct follow-on attacks such as ransomware.

SecureWorks Counter Threat Unit (CTU) has dubbed the e-crime group Gold Melody, which is also known by the names Prophet Spider (CrowdStrike) and UNC961 (Mandiant).

Ukrainian Hacker Suspected to be Behind "Free Download Manager" Malware Attack

Free Download Manager

CATEGORIE : Virus

DATE: 21.9.23

WEB : The Hacker News

The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back to 2020 that led to its website being used to distribute malicious Linux software.

"It appears that a specific web page on our site was compromised by a Ukrainian hacker group, exploiting it to distribute malicious software," it said in an alert last week. "Only a small subset of users, specifically those who attempted to download FDM for Linux between 2020 and 2022, were potentially exposed."

Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with Venom RAT

WinRAR Vulnerability

CATEGORIE : Virus

DATE: 21.9.23

WEB : The Hacker News

A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability on GitHub with an aim to infect users who downloaded the code with Venom RAT malware.

"The fake PoC meant to exploit this WinRAR vulnerability was based on a publicly available PoC script that exploited a SQL injection vulnerability in an application called GeoServer, which is tracked as CVE-2023-25157," Palo Alto Networks Unit 42 researcher Robert Falcone said.

Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace

PIILOPUOTI Dark Web Drug Marketplace

CATEGORIE : Cyber

DATE: 20.9.23

WEB : The Hacker News

Finnish law enforcement authorities have announced the takedown of PIILOPUOTI, a dark web marketplace that specialized in illegal narcotics trade since May 2022.
"The site operated as a hidden service in the encrypted TOR network," the Finnish Customs (aka Tulli) said in a brief announcement on Tuesday. "The site has been used in anonymous criminal activities such as narcotics trade."

Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

Nagios XI Network Monitoring Software

CATEGORIE : Vulnerebility

DATE: 20.9.23

WEB : The Hacker News

Multiple security flaws have been disclosed in the Nagios XI network monitoring software that could result in privilege escalation and information disclosure.

The four security vulnerabilities, tracked from CVE-2023-40931 through CVE-2023-40934, impact Nagios XI versions 5.11.1 and lower. Following responsible disclosure on August 4, 2023, They have been patched as of September 11, 2023, with the release of version 5.11.2.

Fresh Wave of Malicious npm Packages Threaten Kubernetes Configs and SSH Keys

Cybersecurity

CATEGORIE : Virus

DATE: 20.9.23

WEB : The Hacker News

Cybersecurity researchers have discovered a fresh batch of malicious packages in the npm package registry that are designed to exfiltrate Kubernetes configurations and SSH keys from compromised machines to a remote server.

Sonatype said it has discovered 14 different npm packages so far: @am-fe/hooks, @am-fe/provider, @am-fe/request, @am-fe/utils, @am-fe/watermark, @am-fe/watermark-core, @dynamic-form-components/mui, @dynamic-form-components/shineout, @expue/app, @fixedwidthtable/fixedwidthtable, @soc-fe/use, @spgy/eslint-plugin-spgy-fe, @virtualsearchtable/virtualsearchtable, and shineouts.

Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT

ValleyRAT and Gh0st RAT

CATEGORIE : Virus

DATE: 20.9.23

WEB : The Hacker News

Chinese-language speakers have been increasingly targeted as part of multiple email phishing campaigns that aim to distribute various malware families such as Sainbox RAT, Purple Fox, and a new trojan called ValleyRAT.

"Campaigns include Chinese-language lures and malware typically associated with Chinese cybercrime activity," enterprise security firm Proofpoint said in a report shared with The Hacker News.

Signal Messenger Introduces PQXDH Quantum-Resistant Encryption

Quantum-Resistant Encryption

CATEGORIE : Social

DATE: 20.9.23

WEB : The Hacker News

Encrypted messaging app Signal has announced an update to the Signal Protocol to add support for quantum resistance by upgrading the Extended Triple Diffie-Hellman (X3DH) specification to Post-Quantum Extended Diffie-Hellman (PQXDH).

"With this upgrade, we are adding a layer of protection against the threat of a quantum computer being built in the future that is powerful enough to break current encryption standards," Signal's Ehren Kret said.

GitLab Releases Urgent Security Patches for Critical Vulnerability

Critical Vulnerability

CATEGORIE : Vulnerebility

DATE: 20.9.23

WEB : The Hacker News

GitLab has shipped security patches to resolve a critical flaw that allows an attacker to run pipelines as another user.

The issue, tracked as CVE-2023-5009 (CVSS score: 9.6), impacts all versions of GitLab Enterprise Edition (EE) starting from 13.12 and prior to 16.2.7 as well as from 16.3 and before 16.3.4.

Trend Micro Releases Urgent Fix for Actively Exploited Critical Security Vulnerability

Trend Micro

CATEGORIE : Vulnerebility

DATE: 20.9.23

WEB : The Hacker News

Cybersecurity company Trend Micro has released patches and hotfixes to address a critical security flaw in Apex One and Worry-Free Business Security solutions for Windows that has been actively exploited in real-world attacks.

Tracked as CVE-2023-41179 (CVSS score: 9.1), it relates to a third-party antivirus uninstaller module that's bundled along with the software. The complete list of impacted products is as follows -

Apex One - version 2019 (on-premise), fixed in SP1 Patch 1 (B12380)

ShroudedSnooper's HTTPSnoop Backdoor Targets Middle East Telecom Companies

CATEGORIE : Virus

DATE: 19.9.23

WEB : The Hacker News

Telecommunication service providers in the Middle East are the target of a new intrusion set dubbed ShroudedSnooper that employs a stealthy backdoor called HTTPSnoop.

"HTTPSnoop is a simple, yet effective, backdoor that consists of novel techniques to interface with Windows HTTP kernel drivers and devices to listen to incoming requests for specific HTTP(S) URLs and execute that content on the infected endpoint," Cisco Talos said in a report shared with The Hacker News.

Also part of the threat actor's arsenal is a sister implant codenamed PipeSnoop that can accept arbitrary shellcode from a named pipe and execute it on the infected endpoint.

Operation Rusty Flag: Azerbaijan Targeted in New Rust-Based Malware Campaign

Rust-Based Malware

CATEGORIE : Virus

DATE: 19.9.23

WEB : The Hacker News

Targets located in Azerbaijan have been singled out as part of a new campaign that's designed to deploy Rust-based malware on compromised systems.

Cybersecurity firm Deep Instinct is tracking the operation under the name Operation Rusty Flag. It has not been associated with any known threat actor or group.

Inside the Code of a New XWorm Variant

CATEGORIE : Virus

DATE: 19.9.23

WEB : The Hacker News

XWorm is a relatively new representative of the remote access trojan cohort that has already earned its spot among the most persistent threats across the globe.

Since 2022, when it was first observed by researchers, it has undergone a number of major updates that have significantly enhanced its functionality and solidified its staying power.

Earth Lusca's New SprySOCKS Linux Backdoor Targets Government Entities

Linux Backdoor

CATEGORIE : Virus

DATE: 19.9.23

WEB : The Hacker News

The China-linked threat actor known as Earth Lusca has been observed targeting government entities using a never-before-seen Linux backdoor called SprySOCKS.

Earth Lusca was first documented by Trend Micro in January 2022, detailing the adversary's attacks against public and private sector entities across Asia, Australia, Europe, North America.

Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data

Microsoft AI

CATEGORIE : Incindent

DATE: 19.9.23

WEB : The Hacker News

Microsoft on Monday said it took steps to correct a glaring security gaffe that led to the exposure of 38 terabytes of private data.

The leak was discovered on the company's AI GitHub repository and is said to have been inadvertently made public when publishing a bucket of open-source training data, Wiz said. It also included a disk backup of two former employees' workstations containing secrets, keys, passwords, and over 30,000 internal Teams messages.

The repository, named "robust-models-transfer," is no longer accessible. Prior to its takedown, it featured source code and machine learning models pertaining to a 2020 research paper titled "Do Adversarially Robust ImageNet Models Transfer Better?"

Nearly 12,000 Juniper Firewalls Found Vulnerable to Recently Disclosed RCE Vulnerability

RCE Vulnerability

CATEGORIE : Vulnerebility

DATE: 19.9.23

WEB : The Hacker News

New research has found that close to 12,000 internet-exposed Juniper firewall devices are vulnerable to a recently disclosed remote code execution flaw.

VulnCheck, which discovered a new exploit for CVE-2023-36845, said it could be exploited by an "unauthenticated and remote attacker to execute arbitrary code on Juniper firewalls without creating a file on the system."

Transparent Tribe Uses Fake YouTube Android Apps to Spread CapraRAT Malware

Fake YouTube Android Apps

CATEGORIE : Virus

DATE: 19.9.23

WEB : The Hacker News

The suspected Pakistan-linked threat actor known as Transparent Tribe is using malicious Android apps mimicking YouTube to distribute the CapraRAT mobile remote access trojan (RAT), demonstrating the continued evolution of the activity.

"CapraRAT is a highly invasive tool that gives the attacker control over much of the data on the Android devices that it infects," SentinelOne security researcher Alex Delamotte said in a Monday analysis.

Transparent Tribe, also known as APT36, is known to target Indian entities for intelligence-gathering purposes, relying on an arsenal of tools capable of infiltrating Windows, Linux, and Android systems.

New AMBERSQUID Cryptojacking Operation Targets Uncommon AWS Services

Cryptojacking Operation

CATEGORIE : Cryptocurrency

DATE: 18.9.23

WEB : The Hacker News

A novel cloud-native cryptojacking operation has set its eyes on uncommon Amazon Web Services (AWS) offerings such as AWS Amplify, AWS Fargate, and Amazon SageMaker to illicitly mine cryptocurrency.

The malicious cyber activity has been codenamed AMBERSQUID by cloud and container security firm Sysdig.

Hook: New Android Banking Trojan That Expands on ERMAC's Legacy

Android Banking Trojan

CATEGORIE : Android

DATE: 18.9.23

WEB : The Hacker News

A new analysis of the Android banking trojan known as Hook has revealed that it's based on its predecessor called ERMAC.

"The ERMAC source code was used as a base for Hook," NCC Group security researchers Joshua Kamp and Alberto Segura said in a technical analysis published last week.

"All commands (30 in total) that the malware operator can send to a device infected with ERMAC malware, also exist in Hook. The code implementation for these commands is nearly identical."

Retool Falls Victim to SMS-Based Phishing Attack Affecting 27 Cloud Clients

SMS-Based Phishing Attack

CATEGORIE : Phishing

DATE: 18.9.23

WEB : The Hacker News

Software development company Retool has disclosed that the accounts of 27 of its cloud customers were compromised following a targeted and SMS-based social engineering attack.

The San Francisco-based firm blamed a Google Account cloud synchronization feature recently introduced in April 2023 for making the breach worse, calling it a "dark pattern."

Financially Motivated UNC3944 Threat Actor Shifts Focus to Ransomware Attacks

Ransomware Attacks

CATEGORIE : Ransom

DATE: 18.9.23

WEB : The Hacker News

The financially motivated threat actor known as UNC3944 is pivoting to ransomware deployment as part of an expansion to its monetization strategies, Mandiant has revealed.

"UNC3944 has demonstrated a stronger focus on stealing large amounts of sensitive data for extortion purposes and they appear to understand Western business practices, possibly due to the geographical composition of the group," the threat intelligence firm said.

"UNC3944 has also consistently relied on publicly available tools and legitimate software in combination with malware available for purchase on underground forums."

North Korea's Lazarus Group Suspected in $31 Million CoinEx Heist

Million CoinEx Heist

CATEGORIE : APT

DATE: 17.9.23

WEB : The Hacker News

The North Korea-affiliated Lazarus Group has stolen nearly $240 million in cryptocurrency since June 2023, marking a significant escalation of its hacks.

According to multiple reports from Certik, Elliptic, and ZachXBT, the infamous hacking group is said to be suspected behind the theft of $31 million in digital assets from the CoinEx exchange on September 12, 2023.

TikTok Faces Massive €345 Million Fine Over Child Data Violations in E.U.

Data Violations

CATEGORIE : Social

DATE: 17.9.23

WEB : The Hacker News

The Irish Data Protection Commission (DPC) slapped TikTok with a €345 million (about $368 million) fine for violating the European Union's General Data Protection Regulation (GDPR) in relation to its handling of children's data.

The investigation, initiated in September 2021, examined how the popular short-form video platform processed personal data relating to child users (those between the ages of 13 and 17) between July 31 and December 31, 2020.

Google Agrees to $93 Million Settlement in California's Location-Privacy Lawsuit

Location-Privacy Lawsuit

CATEGORIE : Security

DATE: 16.9.23

WEB : The Hacker News

Google has agreed to pay $93 million to settle a lawsuit filed by the U.S. state of California over allegations that the company's location-privacy practices misled consumers and violated consumer protection laws.

"Our investigation revealed that Google was telling its users one thing – that it would no longer track their location once they opted out – but doing the opposite and continuing to track its users' movements for its own commercial gain," California Attorney General Rob Bonta said.

DDoS 2.0: IoT Sparks New DDoS Alert

IoT Sparks New DDoS Alert

CATEGORIE : Attack

DATE: 16.9.23

WEB : The Hacker News

The Internet of Things (IoT) is transforming efficiency in various sectors like healthcare and logistics but has also introduced new security risks, particularly IoT-driven DDoS attacks. This article explores how these attacks work, why they're uniquely problematic, and how to mitigate them.

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers

NodeStealer Malware

CATEGORIE : Virus

DATE: 16.9.23

WEB : The Hacker News

An ongoing campaign is targeting Facebook Business accounts with bogus messages to harvest victims' credentials using a variant of the Python-based NodeStealer and potentially take over their accounts for follow-on malicious activities. "The attacks are reaching victims mainly in Southern Europe and North America across different segments, led by the manufacturing services and technology sectors," Netskope Threat Labs researcher Jan Michael said in an analysis published Thursday.

First documented by Meta in May 2023, NodeStealer originated as a JavaScript malware capable of pilfering cookies and passwords from web browsers to compromise Facebook, Gmail, and Outlook accounts.

Cybercriminals Combine Phishing and EV Certificates to Deliver Ransomware Payloads

CATEGORIE : Ransom

DATE: 16.9.23

WEB : The Hacker News

The threat actors behind RedLine and Vidar information stealers have been observed pivoting to ransomware through phishing campaigns that spread initial payloads signed with Extended Validation (EV) code signing certificates.

"This suggests that the threat actors are streamlining operations by making their techniques multipurpose," Trend Micro researchers said in a new analysis published this week.

Iranian Nation-State Actors Employ Password Spray Attacks Targeting Multiple Sectors

Password Spray Attacks

CATEGORIE : BigBrothers

DATE: 15.9.23

WEB : The Hacker News

Iranian nation-state actors have been conducting password spray attacks against thousands of organizations globally between February and July 2023, new findings from Microsoft reveal.

The tech giant, which is tracking the activity under the name Peach Sandstorm (formerly Holmium), said the adversary pursued organizations in the satellite, defense, and pharmaceutical sectors to likely facilitate intelligence collection in support of Iranian state interests.

Should the authentication to an account be successful, the threat actor has been observed using a combination of publicly available and custom tools for discovery, persistence, and lateral movement, followed by data exfiltration in limited cases.

Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems

Linux and macOS Systems

CATEGORIE : Apple

DATE: 15.9.23

WEB : The Hacker News

A set of memory corruption flaws have been discovered in the ncurses (short for new curses) programming library that could be exploited by threat actors to run malicious code on vulnerable Linux and macOS systems.

"Using environment variable poisoning, attackers could chain these vulnerabilities to elevate privileges and run code in the targeted program's context or perform other malicious actions," Microsoft Threat Intelligence researchers Jonathan Bar Or, Emanuele Cozzi, and Michael Pearse said in a technical report published today. The vulnerabilities, collectively tracked as CVE-2023-29491 (CVSS score of 7.8), have been addressed as of April 2023. Microsoft said it also worked with Apple on addressing the macOS-specific issues related to these flaws.

Free Download Manager Site Compromised to Distribute Linux Malware to Users for 3+ Years

CATEGORIE : Virus

DATE: 15.9.23

WEB : The Hacker News

A download manager site served Linux users malware that stealthily stole passwords and other sensitive information for more than three years as part of a supply chain attack.

The modus operandi entailed establishing a reverse shell to an actor-controlled server and installing a Bash stealer on the compromised system. The campaign, which took place between 2020 and 2022, is no longer active. "This stealer collects data such as system information, browsing history, saved passwords, cryptocurrency wallet files, as well as credentials for cloud services (AWS, Google Cloud, Oracle Cloud Infrastructure, Azure)," Kaspersky researchers Georgy Kucherin and Leonid Bezvershenko said.

N-Able's Take Control Agent Vulnerability Exposes Windows Systems to Privilege Escalation

Take Control Agent Vulnerability

CATEGORIE : Vulnerebility

DATE: 15.9.23

WEB : The Hacker News

A high-severity security flaw has been disclosed in N-Able's Take Control Agent that could be exploited by a local unprivileged attacker to gain SYSTEM privileges.

Tracked as CVE-2023-27470 (CVSS score: 8.8), the issue relates to a Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability, which, when successfully exploited, could be leveraged to delete arbitrary files on a Windows system.

The security shortcoming, which impacts versions 7.0.41.1141 and prior, has been addressed in version 7.0.43 released on March 15, 2023, following responsible disclosure by Mandiant on February 27, 2023.

Russian Journalist's iPhone Compromised by NSO Group's Zero-Click Spyware

NSO Group's Zero-Click Spyware

CATEGORIE : BigBrothers

DATE: 15.9.23

WEB : The Hacker News

The iPhone belonging to Galina Timchenko, a prominent Russian journalist and critic of the government, was compromised with NSO Group's Pegasus spyware, a new collaborative investigation from Access Now and the Citizen Lab has revealed.

The infiltration is said to have happened on or around February 10, 2023. Timchenko is the executive editor and owner of Meduza, an independent news publication based in Latvia.

It's currently not clear who deployed the malware on the device. The Washington Post reported that the Russian government is not a client of NSO Group, citing an unnamed person familiar with the company's operations.

Alert: New Kubernetes Vulnerabilities Enable Remote Attacks on Windows Endpoints

Kubernetes Vulnerabilities

CATEGORIE : Vulnerebility

DATE: 14.9.23

WEB : The Hacker News

Three interrelated high-severity security flaws discovered in Kubernetes could be exploited to achieve remote code execution with elevated privileges on Windows endpoints within a cluster.

The issues, tracked as CVE-2023-3676, CVE-2023-3893, and CVE-2023-3955, carry CVSS scores of 8.8 and impact all Kubernetes environments with Windows nodes. Fixes for the vulnerabilities were released on August 23, 2023, following responsible disclosure by Akamai on July 13, 2023.

Researchers Detail 8 Vulnerabilities in Azure HDInsight Analytics Service

Azure HDInsight Analytics Service

CATEGORIE : Vulnerebility

DATE: 14.9.23

WEB : The Hacker News

More details have emerged about a set of now-patched cross-site scripting (XSS) flaws in the Microsoft Azure HDInsight open-source analytics service that could be weaponized by a threat actor to carry out malicious activities. "The identified vulnerabilities consisted of six stored XSS and two reflected XSS vulnerabilities, each of which could be exploited to perform unauthorized actions, varying from data access to session hijacking and delivering malicious payloads," Orca security researcher Lidor Ben Shitrit said in a report shared with The Hacker News.

The issues were addressed by Microsoft as part of its Patch Tuesday updates for August 2023.

Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family

3AM Ransomware

CATEGORIE : Ransom

DATE: 14.9.23

WEB : The Hacker News

A new ransomware family called 3AM has emerged in the wild after it was detected in a single incident in which an unidentified affiliate deployed the strain following an unsuccessful attempt to deliver LockBit (attributed to Bitwise Spider or Syrphid) in the target network.

"3AM is written in Rust and appears to be a completely new malware family," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.

"The ransomware attempts to stop multiple services on the infected computer before it begins encrypting files. Once encryption is complete, it attempts to delete Volume Shadow (VSS) copies."

Microsoft Warns of New Phishing Campaign Targeting Corporations via Teams Messages

Phishing Campaign

CATEGORIE : Phishing

DATE: 14.9.23

WEB : The Hacker News

Microsoft is warning of a new phishing campaign undertaken by an initial access broker that involves using Teams messages as lures to infiltrate corporate networks.

The tech giant's Threat Intelligence team is tracking the cluster under the name Storm-0324, which is also known by the monikers TA543 and Sagrid.

"Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool to send phishing lures through Microsoft Teams chats," the company said, adding the development marks a shift from using email-based initial infection vectors for initial access.

Microsoft Releases Patch for Two New Actively Exploited Zero-Days Flaws

Microsoft Windows Update

CATEGORIE : Exploit

DATE: 13.9.23

WEB : The Hacker News

Microsoft has released software fixes to remediate 59 bugs spanning its product portfolio, including two zero-day flaws that have been actively exploited by malicious cyber actors.

Of the 59 vulnerabilities, five are rated Critical, 55 are rated Important, and one is rated Moderate in severity. The update is in addition to 35 flaws patched in the Chromium-based Edge browser since last month's Patch Tuesday edition, which also encompasses a fix for CVE-2023-4863, a critical heap buffer overflow flaw in the WebP image format.

Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability

Adobe Vulnerability

CATEGORIE : Exploit

DATE: 13.9.23

WEB : The Hacker News

Adobe's Patch Tuesday update for September 2023 comes with a patch for a critical actively exploited security flaw in Acrobat and Reader that could permit an attacker to execute malicious code on susceptible systems.

The vulnerability, tracked as CVE-2023-26369, is rated 7.8 for severity on the CVSS scoring system and impacts both Windows and macOS versions of Acrobat DC, Acrobat Reader DC, Acrobat 2020, and Acrobat Reader 2020.

Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and Thunderbird

Zero-Day Exploit in Firefox

CATEGORIE : Exploit

DATE: 13.9.23

WEB : The Hacker News

Mozilla on Tuesday released security updates to resolve a critical zero-day vulnerability in Firefox and Thunderbird that has been actively exploited in the wild, a day after Google released a fix for the issue in its Chrome browser.

The shortcoming, assigned the identifier CVE-2023-4863, is a heap buffer overflow flaw in the WebP image format that could result in arbitrary code execution when processing a specially crafted image.

Critical GitHub Vulnerability Exposes 4,000+ Repositories to Repojacking Attack

Repojacking Attack

CATEGORIE : Attack

DATE: 13.9.23

WEB : The Hacker News

A new vulnerability disclosed in GitHub could have exposed thousands of repositories at risk of repojacking attacks, new findings show.

The flaw "could allow an attacker to exploit a race condition within GitHub's repository creation and username renaming operations," Checkmarx security researcher Elad Rapoport said in a technical report shared with The Hacker News. "Successful exploitation of this vulnerability impacts the open-source community by enabling the hijacking of over 4,000 code packages in languages such as Go, PHP, and Swift, as well as GitHub actions."

Following responsible disclosure on March 1, 2023, the Microsoft-owned code hosting platform has addressed the issue as of September 1, 2023.

Chinese Redfly Group Compromised a Nation's Critical Grid in 6-Month ShadowPad Campaign

ShadowPad Campaign

CATEGORIE : BigBrothers

DATE: 13.9.23

WEB : The Hacker News

A threat actor called Redfly has been linked to a compromise of a national grid located in an unnamed Asian country for as long as six months earlier this year using a known malware referred to as ShadowPad.

"The attackers managed to steal credentials and compromise multiple computers on the organization's network," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News. "The attack is the latest in a series of espionage intrusions against [critical national infrastructure] targets."

ShadowPad, also known as PoisonPlug, is a follow-up to the PlugX remote access trojan and is a modular implant capable of loading additional plugins dynamically from a remote server as required to harvest sensitive data from breached networks.

Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine Clipper

Phishing Campaign

CATEGORIE : Virus

DATE: 13.9.23

WEB : The Hacker News

A sophisticated phishing campaign is using a Microsoft Word document lure to distribute a trifecta of threats, namely Agent Tesla, OriginBotnet, and RedLine Clipper, to gather a wide range of information from compromised Windows machines.

"A phishing email delivers the Word document as an attachment, presenting a deliberately blurred image and a counterfeit reCAPTCHA to lure the recipient into clicking on it," Fortinet FortiGuard Labs researcher Cara Lin said.

Beware: MetaStealer Malware Targets Apple macOS in Recent Attacks

MetaStealer Malware

CATEGORIE : Virus

DATE: 13.9.23

WEB : The Hacker News

A new information stealer malware called MetaStealer has set its sights on Apple macOS, making the latest in a growing list of stealer families focused on the operating system after MacStealer, Pureland, Atomic Stealer, and Realst.

"Threat actors are proactively targeting macOS businesses by posing as fake clients in order to socially engineer victims into launching malicious payloads," SentinelOne security researcher Phil Stokes said in a Monday analysis.

Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild - Update Now

Chrome Vulnerability

CATEGORIE : Exploit

DATE: 12.9.23

WEB : The Hacker News

Google on Monday rolled out out-of-band security patches to address a critical security flaw in its Chrome web browser that it said has been exploited in the wild.

Tracked as CVE-2023-4863, the issue has been described as a case of heap buffer overflow that resides in the WebP image format that could result in arbitrary code execution or a crash.

Apple Security Engineering and Architecture (SEAR) and the Citizen Lab at The University of Toronto's Munk School have been credited with discovering and reporting the flaw on September 6, 2023.

Vietnamese Hackers Deploy Python-Based Stealer via Facebook Messenger

Facebook Messenger

CATEGORIE : Virus

DATE: 12.9.23

WEB : The Hacker News

A new phishing attack is leveraging Facebook Messenger to propagate messages with malicious attachments from a "swarm of fake and hijacked personal accounts" with the ultimate goal of taking over the targets' Business accounts. "Originating yet again from a Vietnamese-based group, this campaign uses a tiny compressed file attachment that packs a powerful Python-based stealer dropped in a multi-stage process full of simple yet effective obfuscation methods," Guardio Labs researcher Oleg Zaytsev said in an analysis published over the weekend.

In these attacks, dubbed MrTonyScam, potential victims are sent messages that entice them into clicking on the RAR and ZIP archive attachments, leading to the deployment of a dropper that fetches the next-stage from a GitHub or GitLab repository.

Charming Kitten's New Backdoor 'Sponsor' Targets Brazil, Israel, and U.A.E.

Backdoor Malware

CATEGORIE : Virus

DATE: 12.9.23

WEB : The Hacker News

The Iranian threat actor known as Charming Kitten has been linked to a new wave of attacks targeting different entities in Brazil, Israel, and the U.A.E. using a previously undocumented backdoor named Sponsor.

Slovak cybersecurity firm is tracking the cluster under the name Ballistic Bobcat. Victimology patterns suggest that the group primarily singles out education, government, and healthcare organizations, as well as human rights activists and journalists.

At least 34 victims of Sponsor have been detected to date, with the earliest instances of deployment dating back to September 2021.

Google Chrome Rolls Out Support for 'Privacy Sandbox' to Bid Farewell to Tracking Cookies

Privacy Sandbox

CATEGORIE : Security

DATE: 12.9.23

WEB : The Hacker News

Google has officially begun its rollout of Privacy Sandbox in the Chrome web browser to a majority of its users, nearly four months after it announced the plans.

"We believe it is vital to both improve privacy and preserve access to information, whether it's news, a how-to-guide, or a fun video," Anthony Chavez, vice president of Privacy Sandbox initiatives at Google, said.

"Without viable privacy-preserving alternatives to third-party cookies, such as the Privacy Sandbox, we risk reducing access to information for all users, and incentivizing invasive tactics such as fingerprinting."

Cybercriminals Using PowerShell to Steal NTLMv2 Hashes from Compromised Windows

PowerShell

CATEGORIE : Hacking

DATE: 11.9.23

WEB : The Hacker News

A new cyber attack campaign is leveraging the PowerShell script associated with a legitimate red teaming tool to plunder NTLMv2 hashes from compromised Windows systems primarily located in Australia, Poland, and Belgium.

The activity has been codenamed Steal-It by Zscaler ThreatLabz.

New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World

HijackLoader Modular Malware Loader

CATEGORIE : Virus

DATE: 11.9.23

WEB : The Hacker News

A new malware loader called HijackLoader is gaining traction among the cybercriminal community to deliver various payloads such as DanaBot, SystemBC, and RedLine Stealer.

"Even though HijackLoader does not contain advanced features, it is capable of using a variety of modules for code injection and execution since it uses a modular architecture, a feature that most loaders do not have," Zscaler ThreatLabz researcher Nikolaos Pantazopoulos said.

Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play

Fake Telegram Apps

CATEGORIE : Android

DATE: 9.9.23

WEB : The Hacker News

Spyware masquerading as modified versions of Telegram have been spotted in the Google Play Store that's designed to harvest sensitive information from compromised Android devices.

According to Kaspersky security researcher Igor Golovin, the apps come with nefarious features to capture and exfiltrate names, user IDs, contacts, phone numbers, and chat messages to an actor-controlled server.

The activity has been codenamed Evil Telegram by the Russian cybersecurity company.

Cybercriminals Weaponizing Legitimate Advanced Installer Tool in Crypto-Mining Attacks

Crypto-Mining Attacks

CATEGORIE : Cryptocurrency

DATE: 9.9.23

WEB : The Hacker News

A legitimate Windows tool used for creating software packages called Advanced Installer is being abused by threat actors to drop cryptocurrency-mining malware on infected machines since at least November 2021.

"The attacker uses Advanced Installer to package other legitimate software installers, such as Adobe Illustrator, Autodesk 3ds Max, and SketchUp Pro, with malicious scripts and uses Advanced Installer's Custom Actions feature to make the software installers execute the malicious scripts," Cisco Talos researcher Chetan Raghuprasad said in a technical report.

U.K. and U.S. Sanction 11 Russia-based TrickBot Cybercrime Gang Members

Trickbot Cybercrime Gang

CATEGORIE : Crime

SUBKATEGORIE : Crime

DATE: 9.9.23

WEB : The Hacker News

The U.K. and U.S. governments on Thursday sanctioned 11 individuals who are alleged to be part of the notorious Russia-based TrickBot cybercrime gang.

"Russia has long been a safe haven for cybercriminals, including the TrickBot group," the U.S. Treasury Department said, adding it has "ties to Russian intelligence services and has targeted the U.S. Government and U.S. companies, including hospitals."

The targets of the sanctions are administrators, managers, developers, and coders who are believed to have provided material assistance in its operations. Their names and roles are as follows -

 

Apple Rushes to Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones

Patch Zero-Day Flaws

CATEGORIE : Apple

DATE: 8.9.23

WEB : The Hacker News

Apple on Thursday released emergency security updates for iOS, iPadOS, macOS, and watchOS to address two zero-day flaws that have been exploited in the wild to deliver NSO Group's Pegasus mercenary spyware.

The issues are described as below -

CVE-2023-41061 - A validation issue in Wallet that could result in arbitrary code execution when handling a maliciously crafted attachment.

Cisco Issues Urgent Fix for Authentication Bypass Bug Affecting BroadWorks Platform

CATEGORIE : Vulnerebility

DATE: 8.9.23

WEB : The Hacker News

Cisco has released security fixes to address multiple security flaws, including a critical bug, that could be exploited by a threat actor to take control of an affected system or cause a denial-of service (DoS) condition.

The most severe of the issues is CVE-2023-20238, which has the maximum CVSS severity rating of 10.0. It's described as an authentication bypass flaw in the Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform.

North Korean Hackers Exploit Zero-Day Bug to Target Cybersecurity Researchers

Zero-Day Bug

CATEGORIE : Exploit

DATE: 8.9.23

WEB : The Hacker News

Threat actors associated with North Korea are continuing to target the cybersecurity community using a zero-day bug in unspecified software over the past several weeks to infiltrate their machines.

The findings come from Google's Threat Analysis Group (TAG), which found the adversary setting up fake accounts on social media platforms like X (formerly Twitter) and Mastodon to forge relationships with potential targets and build trust.

"In one case, they carried on a months-long conversation, attempting to collaborate with a security researcher on topics of mutual interest," security researchers Clement Lecigne and Maddie Stone said. "After initial contact via X, they moved to an encrypted messaging app such as Signal, WhatsApp, or Wire."

CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho Vulnerabilities

CATEGORIE : Exploit

DATE: 8.9.23

WEB : The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that multiple nation-state actors are exploiting security flaws in Fortinet FortiOS SSL-VPN and Zoho ManageEngine ServiceDesk Plus to gain unauthorized access and establish persistence on compromised systems.

"Nation-state advanced persistent threat (APT) actors exploited CVE-2022-47966 to gain unauthorized access to a public-facing application (Zoho ManageEngine ServiceDesk Plus), establish persistence, and move laterally through the network," according to a joint alert published by the agency, alongside Federal Bureau of Investigation (FBI), and Cyber National Mission Force (CNMF).

Mac Users Beware: Malvertising Campaign Spreads Atomic Stealer macOS Malware

Atomic Stealer macOS Malware

CATEGORIE : Apple

DATE: 8.9.23

WEB : The Hacker News

A new malvertising campaign has been observed distributing an updated version of a macOS stealer malware called Atomic Stealer (or AMOS), indicating that it's being actively maintained by its author.

An off-the-shelf Golang malware available for $1,000 per month, Atomic Stealer first came to light in April 2023. Shortly after that, new variants with an expanded set of information-gathering features were detected in the wild, targeting gamers and cryptocurrency users. Malvertising via Google Ads has been observed as the primary distribution vector in which users searching for popular software, legitimate or cracked, on search engines are shown bogus ads that direct to websites hosting rogue installers.

Alert: Apache SuperSet Vulnerabilities Expose Servers to Remote Code Execution Attacks

Apache SuperSet

CATEGORIE : Vulnerebility

DATE: 7.9.23

WEB : The Hacker News

Patches have been released to address two new security vulnerabilities in Apache SuperSet that could be exploited by an attacker to gain remote code execution on affected systems.

The update (version 2.1.1) plugs CVE-2023-39265 and CVE-2023-37941, which make it possible to conduct nefarious actions once a bad actor is able to gain control of Superset's metadata database.

Outside of these weaknesses, the latest version of Superset also remediates a separate improper REST API permission issue (CVE-2023-36388) that allows for low-privilege users to carry out server-side request forgery (SSRF) attacks.

Mirai Botnet Variant 'Pandora' Hijacks Android TVs for Cyberattacks

Mirai Botnet

CATEGORIE : BotNet

DATE: 7.9.23

WEB : The Hacker News

A Mirai botnet variant called Pandora has been observed infiltrating inexpensive Android-based TV sets and TV boxes and using them as part of a botnet to perform distributed denial-of-service (DDoS) attacks.

Doctor Web said the compromises are likely to occur either during malicious firmware updates or when applications for viewing pirated video content are installed.

"It is likely that this update has been made available for download from a number of websites, as it is signed with publicly available Android Open Source Project test keys," the Russian company said in an analysis published Wednesday.

Outlook Breach: Microsoft Reveals How a Crash Dump Led to a Major Security Breach

CATEGORIE : Incindent

DATE: 7.9.23

WEB : The Hacker News

Microsoft on Wednesday revealed that a China-based threat actor known as Storm-0558 acquired the inactive consumer signing key to forge tokens and access Outlook by compromising an engineer's corporate account.

This enabled the adversary to access a debugging environment that contained information pertaining to a crash of the consumer signing system and steal the key. The system crash took place in April 2021.

"A consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process ('crash dump')," the Microsoft Security Response Center (MSRC) said in a post-mortem report.

Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw

Android Patch Update

CATEGORIE : Exploit

DATE: 7.9.23

WEB : The Hacker News

Google has rolled out monthly security patches for Android to address a number of flaws, including a zero-day bug that it said may have been exploited in the wild.

Tracked as CVE-2023-35674, the high-severity vulnerability is described as a case of privilege escalation impacting the Android Framework.

"There are indications that CVE-2023-35674 may be under limited, targeted exploitation," the company said in its Android Security Bulletin for September 2023 without delving into additional specifics.

Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant

SideTwist Backdoor and Agent Tesla Variant

CATEGORIE : Phishing

DATE: 7.9.23

WEB : The Hacker News

The Iranian threat actor tracked as APT34 has been linked to a new phishing attack that leads to the deployment of a variant of a backdoor called SideTwist.

"APT34 has a high level of attack technology, can design different intrusion methods for different types of targets, and has supply chain attack capability," NSFOCUS Security Labs said in a report published last week.

Ukraine's CERT Thwarts APT28's Cyberattack on Critical Energy Infrastructure

Cyberattack on Critical Energy Infrastructure

CATEGORIE : APT

DATE: 6.9.23

WEB : The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday said it thwarted a cyber attack against an unnamed critical energy infrastructure facility in the country.

The intrusion, per the agency, started with a phishing email containing a link to a malicious ZIP archive that activates the infection chain.

9 Alarming Vulnerabilities Uncovered in SEL's Power Management Products

Power Management Products

CATEGORIE : Vulnerebility

DATE: 6.9.23

WEB : The Hacker News

Nine security flaws have been disclosed in electric power management products made by Schweitzer Engineering Laboratories (SEL).

"The most severe of those nine vulnerabilities would allow a threat actor to facilitate remote code execution (RCE) on an engineering workstation," Nozomi Networks said in a report published last week.

W3LL Store: How a Secret Phishing Syndicate Targets 8,000+ Microsoft 365 Accounts

W3LL Store

CATEGORIE : Phishing

DATE: 6.9.23

WEB : The Hacker News

A previously undocumented "phishing empire" has been linked to cyber attacks aimed at compromising Microsoft 365 business email accounts over the past six years.

"The threat actor created a hidden underground market, named W3LL Store, that served a closed community of at least 500 threat actors who could purchase a custom phishing kit called W3LL Panel, designed to bypass MFA, as well as 16 other fully customized tools for business email compromise (BEC) attacks," Group-IB said in a report shared with The Hacker News.

New BLISTER Malware Update Fuelling Stealthy Network Infiltration

BLISTER Malware

CATEGORIE : Virus

DATE: 5.9.23

WEB : The Hacker News

An updated version of a malware loader known as BLISTER is being used as part of SocGholish infection chains to distribute an open-source command-and-control (C2) framework called Mythic.

"New BLISTER update includes keying feature that allows for precise targeting of victim networks and lowers exposure within VM/sandbox environments," Elastic Security Labs researchers Salim Bitam and Daniel Stepanic said in a technical report published late last month.

BLISTER was first uncovered by the company in December 2021 acting as a conduit to distribute Cobalt Strike and BitRAT payloads on compromised systems.

New Python Variant of Chaes Malware Targets Banking and Logistics Industries

Chaes Malware

CATEGORIE : Virus

DATE: 5.9.23

WEB : The Hacker News

Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes.

"It has undergone major overhauls: from being rewritten entirely in Python, which resulted in lower detection rates by traditional defense systems, to a comprehensive redesign and an enhanced communication protocol," Morphisec said in a new detailed technical write-up shared with The Hacker News.

Chaes, which first emerged in 2020, is known to target e-commerce customers in Latin America, particularly Brazil, to steal sensitive financial information.

Researchers Warn of Cyber Weapons Used by Lazarus Group's Andariel Cluster

Lazarus Group

CATEGORIE : BigBrothers

DATE: 5.9.23

WEB : The Hacker News

The North Korean threat actor known as Andariel has been observed employing an arsenal of malicious tools in its cyber assaults against corporations and organizations in the southern counterpart.

"One characteristic of the attacks identified in 2023 is that there are numerous malware strains developed in the Go language," the AhnLab Security Emergency Response Center (ASEC) said in a deep dive released last week. Andariel, also known by the names Nicket Hyatt or Silent Chollima, is a sub-cluster of the Lazarus Group that's known to be active since at least 2008.

Meta Takes Down Thousands of Accounts Involved in Disinformation Ops from China and Russia

Disinformation Ops

CATEGORIE :

SUBKATEGORIE :

DATE: 5.9.23

WEB : The Hacker News

Meta has disclosed that it disrupted two of the largest known covert influence operations in the world from China and Russia, blocking thousands of accounts and pages across its platform.

"It targeted more than 50 apps, including Facebook, Instagram, X (formerly Twitter), YouTube, TikTok, Reddit, Pinterest, Medium, Blogspot, LiveJournal, VKontakte, Vimeo, and dozens of smaller platforms and forums," Guy Rosen, chief information security officer at Meta, said last week, describing the Chinese disinformation group.

Hackers Exploit MinIO Storage System Vulnerabilities to Compromise Servers

System Vulnerability

CATEGORIE : Exploit

DATE: 5.9.23

WEB : The Hacker News

An unknown threat actor has been observed weaponizing high-severity security flaws in the MinIO high-performance object storage system to achieve unauthorized code execution on affected servers.

Cybersecurity and incident response firm Security Joes said the intrusion leveraged a publicly available exploit chain to backdoor the MinIO instance.

X (Twitter) to Collect Biometric Data from Premium Users to Combat Impersonation

Biometric Data

CATEGORIE : Social

DATE: 4.9.23

WEB : The Hacker News

X, the social media site formerly known as Twitter, has updated its privacy policy to collect users' biometric data to tackle fraud and impersonation on the platform.

"Based on your consent, we may collect and use your biometric information for safety, security, and identification purposes," the company said. The revised policy is expected to go into effect on September 29, 2023.

The social media behemoth told Bloomberg, which first reported the development, that the change is limited to premium users and that a biometric matching process "will also help X fight impersonation attempts and make the platform more secure."

Vietnamese Cybercriminals Targeting Facebook Business Accounts with Malvertising

Malvertising

CATEGORIE : Social

DATE: 4.9.23

WEB : The Hacker News

Malicious actors associated with the Vietnamese cybercrime ecosystem are leveraging advertising-as-a-vector on social media platforms such as Meta-owned Facebook to distribute malware.

"Threat actors have long used fraudulent ads as a vector to target victims with scams, malvertising, and more," WithSecure researcher Mohammad Kazem Hassan Nejad said. "And with businesses now leveraging the reach of social media for advertising, attackers have a new, highly-lucrative type of attack to add to their arsenal – hijacking business accounts."

Beware of MalDoc in PDF: A New Polyglot Attack Allowing Attackers to Evade Antivirus

MalDoc in PDF

CATEGORIE : Virus

DATE: 4.9.23

WEB : The Hacker News

Cybersecurity researchers have called attention to a new antivirus evasion technique that involves embedding a malicious Microsoft Word file into a PDF file.

The sneaky method, dubbed MalDoc in PDF by JPCERT/CC, is said to have been employed in an in-the-wild attack in July 2023.

"A file created with MalDoc in PDF can be opened in Word even though it has magic numbers and file structure of PDF," researchers Yuma Masubuchi and Kota Kino said. "If the file has a configured macro, by opening it in Word, VBS runs and performs malicious behaviors."

Chinese-Speaking Cybercriminals Launch Large-Scale iMessage Smishing Campaign in U.S.

iMessage Smishing Campaign

CATEGORIE : CyberCrime

DATE: 4.9.23

WEB : The Hacker News

A new large-scale smishing campaign is targeting the U.S. by sending iMessages from compromised Apple iCloud accounts with an aim to conduct identity theft and financial fraud.

"The Chinese-speaking threat actors behind this campaign are operating a package-tracking text scam sent via iMessage to collect personally identifying information (PII) and payment credentials from victims, in the furtherance of identity theft and credit card fraud," Resecurity said in an analysis published last week.

PoC Exploit Released for Critical VMware Aria's SSH Auth Bypass Vulnerability

SSH Auth Bypass Vulnerability

CATEGORIE : Exploit

DATE: 3.9.23

WEB : The Hacker News

Proof-of-concept (PoC) exploit code has been made available for a recently disclosed and patched critical flaw impacting VMware Aria Operations for Networks (formerly vRealize Network Insight).

The flaw, tracked as CVE-2023-34039, is rated 9.8 out of a maximum of 10 for severity and has been described as a case of authentication bypass due to a lack of unique cryptographic key generation.

"A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI," VMware said earlier this week.

Okta Warns of Social Engineering Attacks Targeting Super Administrator Privileges

Super Administrator Privileges

CATEGORIE : Hacking

DATE: 2.9.23

WEB : The Hacker News

Identity services provider Okta on Friday warned of social engineering attacks orchestrated by threat actors to obtain elevated administrator permissions.

"In recent weeks, multiple US-based Okta customers have reported a consistent pattern of social engineering attacks against IT service desk personnel, in which the caller's strategy was to convince service desk personnel to reset all multi-factor authentication (MFA) factors enrolled by highly privileged users," the company said.

The adversary then moved to abuse the highly privileged Okta Super Administrator accounts to impersonate users within the compromised organization. The campaign, per the company, took place between July 29 and August 19, 2023.

Threat Actors Targeting Microsoft SQL Servers to Deploy FreeWorld Ransomware

Microsoft SQL Servers to Deploy FreeWorld Ransomware

CATEGORIE : Ransom

DATE: 2.9.23

WEB : The Hacker News

Threat actors are exploiting poorly secured Microsoft SQL (MS SQL) servers to deliver Cobalt Strike and a ransomware strain called FreeWorld.

Cybersecurity firm Securonix, which has dubbed the campaign DB#JAMMER, said it stands out for the way the toolset and infrastructure is employed.

Russian State-Backed 'Infamous Chisel' Android Malware Targets Ukrainian Military

Russian Hackers

CATEGORIE : Android

DATE: 2.9.23

WEB : The Hacker News

Cybersecurity and intelligence agencies from Australia, Canada, New Zealand, the U.K., and the U.S. on Thursday disclosed details of a mobile malware strain targeting Android devices used by the Ukrainian military.

The malicious software, dubbed Infamous Chisel and attributed to a Russian state-sponsored actor called Sandworm, has capabilities to "enable unauthorized access to compromised devices, scan files, monitor traffic, and periodically steal sensitive information."

Some aspects of the malware were uncovered by the Security Service of Ukraine (SBU) earlier in August, highlighting unsuccessful attempts on part of the adversary to penetrate Ukrainian military networks and gather valuable intelligence.

New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean Activists

SuperBear Trojan

CATEGORIE : Virus

DATE: 2.9.23

WEB : The Hacker News

A new phishing attack likely targeting civil society groups in South Korea has led to the discovery of a novel remote access trojan called SuperBear.

The intrusion singled out an unnamed activist, who was contacted in late August 2023 and received a malicious LNK file from an address impersonating a member of the organization, non-profit entity Interlabs said in a new report. The LNK file, upon execution, launches a PowerShell command to execute a Visual Basic script that, in turn, fetches the next-stage payloads from a legitimate but compromised WordPress website.

This includes the Autoit3.exe binary ("solmir.pdb") and an AutoIt script ("solmir_1.pdb") that's launched using the former.

Classiscam Scam-as-a-Service Raked $64.5 Million During the COVID-19 Pandemic

Classiscam Scam-as-a-Service

CATEGORIE : Spam

DATE: 1.9.23

WEB : The Hacker News

The Classiscam scam-as-a-service program has reaped the criminal actors $64.5 million in illicit earnings since its emergence in 2019.

"Classiscam campaigns initially started out on classified sites, on which scammers placed fake advertisements and used social engineering techniques to convince users to pay for goods by transferring money to bank cards," Group-IB said in a new report.

"Since then, Classiscam campaigns have become highly automated, and can be run on a host of other services, such as online marketplaces and carpooling sites."

SapphireStealer Malware: A Gateway to Espionage and Ransomware Operations

SapphireStealer Malware

CATEGORIE : Virus

DATE: 1.9.23

WEB : The Hacker News

An open-source .NET-based information stealer malware dubbed SapphireStealer is being used by multiple entities to enhance its capabilities and spawn their own bespoke variants.

"Information-stealing malware like SapphireStealer can be used to obtain sensitive information, including corporate credentials, which are often resold to other threat actors who leverage the access for additional attacks, including operations related to espionage or ransomware/extortion," Cisco Talos researcher Edmund Brumaghin said in a report shared with The Hacker News.

North Korean Hackers Deploy New Malicious Python Packages in PyPI Repository

Malicious Python Packages in PyPI Repository

CATEGORIE : Virus

DATE: 1.9.23

WEB : The Hacker News

Three additional rogue Python packages have been discovered in the Package Index (PyPI) repository as part of an ongoing malicious software supply chain campaign called VMConnect, with signs pointing to the involvement of North Korean state-sponsored threat actors.

The findings come from ReversingLabs, which detected the packages tablediter, request-plus, and requestspro.

First disclosed at the start of the month by the company and Sonatype, VMConnect refers to a collection of Python packages that mimic popular open-source Python tools to download an unknown second-stage malware.

Earth Estries' Espionage Campaign Targets Governments and Tech Titans Across Continents

Earth Estries

CATEGORIE : Cyber

DATE: 1.9.23

WEB : The Hacker News

A hacking outfit nicknamed Earth Estries has been attributed to a new, ongoing cyber espionage campaign targeting government and technology industries based in the Philippines, Taiwan, Malaysia, South Africa, Germany, and the U.S.

"The threat actors behind Earth Estries are working with high-level resources and functioning with sophisticated skills and experience in cyber espionage and illicit activities," Trend Micro researchers Ted Lee, Lenart Bermejo, Hara Hiroaki, Leon M Chang, and Gilbert Sison said.