ARTICLES December  2023

H  AI(3) APT(30) Attack(18) BigBrothers(56) BotNet(10) Crime(18) Cryptocurrency(23) Cyber(5) Exploit(29) Hacking(19) ICS(3) Incindent(12) IoT(1) Mobil(0) OS(64) Phishing(6) Ransom(35) Safety(1) Security(20) Social(7) Spam(2) Virus(121) Vulnerebility(108)

H  MARCH(103)  APRIL(113)  MAY(110)  JUNE(93)  July113)  August(97)  September(87)  October(107)  November(101)  December(106)  ALL 

Beware: Scam-as-a-Service Aiding Cybercriminals in Crypto Wallet-Draining Attacks

CATEGORIE : Cryptocurrency

DATE: 31.12.23

WEB : The Hacker News

Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets.

"These threats are unique in their approach, targeting a wide range of blockchain networks, from Ethereum and Binance Smart Chain to Polygon, Avalanche, and almost 20 other networks by using a crypto wallet-draining technique," Check Point researchers Oded Vanunu, Dikla Barda, and Roman Zaikin said.

Albanian Parliament and One Albania Telecom Hit by Cyber Attacks

CATEGORIE : BigBrothers

DATE: 29.12.23

WEB : The Hacker News

The Assembly of the Republic of Albania and telecom company One Albania have been targeted by cyber attacks, the country's National Authority for Electronic Certification and Cyber Security (AKCESK) revealed this week.

"These infrastructures, under the legislation in force, are not currently classified as critical or important information infrastructure," AKCESK said.

CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOK

CATEGORIE : Virus

DATE: 29.12.23

WEB : The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign orchestrated by the Russia-linked APT28 group to deploy previously undocumented malware such as OCEANMAP, MASEPIE, and STEELHOOK to harvest sensitive information.

The activity, which was detected by the agency between December 15 and 25, 2023, targets government entities with email messages urging recipients to click on a link to view a document.

Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest Attacks

CATEGORIE : APT

DATE: 29.12.23

WEB : The Hacker News

Nation-state actors affiliated to North Korea have been observed using spear-phishing attacks to deliver an assortment of backdoors and tools such as AppleSeed, Meterpreter, and TinyNuke to seize control of compromised machines.

South Korea-based cybersecurity company AhnLab attributed the activity to an advanced persistent threat group known as Kimsuky.

Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks

CATEGORIE : Virus

DATE: 29.12.23

WEB : The Hacker News

Microsoft on Thursday said it's once again disabling the ms-appinstaller protocol handler by default following its abuse by multiple threat actors to distribute malware.

"The observed threat actor activity abuses the current implementation of the ms-appinstaller protocol handler as an access vector for malware that may lead to ransomware distribution," the Microsoft Threat Intelligence team said.

 

Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service

CATEGORIE : Vulnerebility

DATE: 28.12.23

WEB : The Hacker News

Google Cloud has addressed a medium-severity security flaw in its platform that could be abused by an attacker who already has access to a Kubernetes cluster to escalate their privileges.

"An attacker who has compromised the Fluent Bit logging container could combine that access with high privileges required by Anthos Service Mesh (on clusters that have enabled it) to escalate privileges in the cluster," the company said as part of an advisory released on December 14, 2023.

Most Sophisticated iPhone Hack Ever Exploited Apple's Hidden Hardware Feature

CATEGORIE : Apple

DATE: 28.12.23

WEB : The Hacker News

The Operation Triangulation spyware attacks targeting Apple iOS devices leveraged never-before-seen exploits that made it possible to even bypass pivotal hardware-based security protections erected by the company.

Russian cybersecurity firm Kaspersky, which discovered the campaign at the beginning of 2023 after becoming one of the targets, described it as the "most sophisticated attack chain" it has ever observed to date. The campaign is believed to have been active since 2019.

New Rugmi Malware Loader Surges with Hundreds of Daily Detections

CATEGORIE : Virus

DATE: 28.12.23

WEB : The Hacker News

A new malware loader is being used by threat actors to deliver a wide range of information stealers such as Lumma Stealer (aka LummaC2), Vidar, RecordBreaker (aka Raccoon Stealer V2), and Rescoms.

Cybersecurity firm ESET is tracking the trojan under the name Win/TrojanDownloader.Rugmi.

Critical Zero-Day in Apache OfBiz ERP System Exposes Businesses to Attack

CATEGORIE : Vulnerebility

DATE: 28.12.23

WEB : The Hacker News

A new zero-day security flaw has been discovered in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system that could be exploited to bypass authentication protections.

The vulnerability, tracked as CVE-2023-51467, resides in the login functionality and is the result of an incomplete patch for another critical vulnerability (CVE-2023-49070, CVSS score: 9.8) that was released earlier this month.

Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances

CATEGORIE : Exploit

DATE: 27.12.23

WEB : The Hacker News

Barracuda has revealed that Chinese threat actors exploited a new zero-day in its Email Security Gateway (ESG) appliances to deploy backdoor on a "limited number" of devices.

Tracked as CVE-2023-7102, the issue relates to a case of arbitrary code execution that resides within a third-party and open-source library Spreadsheet::ParseExcel that's used by the Amavis scanner within the gateway.

New Sneaky Xamalicious Android Malware Hits Over 327,000 Devices

CATEGORIE : Android

DATE: 27.12.23

WEB : The Hacker News

A new Android backdoor has been discovered with potent capabilities to carry out a range of malicious actions on infected devices.

Dubbed Xamalicious by the McAfee Mobile Research Team, the malware is so named for the fact that it's developed using an open-source mobile app framework called Xamarin and abuses the operating system's accessibility permissions to fulfill its objectives.

Warning: Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency Mining

CATEGORIE : Cryptocurrency

DATE: 27.12.23

WEB : The Hacker News

Poorly secured Linux SSH servers are being targeted by bad actors to install port scanners and dictionary attack tools with the goal of targeting other vulnerable servers and co-opting them into a network to carry out cryptocurrency mining and distributed denial-of-service (DDoS) attacks.

"Threat actors can also choose to install only scanners and sell the breached IP and account credentials on the dark web," the AhnLab Security Emergency Response Center (ASEC) said in a report on Tuesday.

 

Carbanak Banking Malware Resurfaces with New Ransomware Tactics

CATEGORIE : Virus

DATE: 26.12.23

WEB : The Hacker News

The banking malware known as Carbanak has been observed being used in ransomware attacks with updated tactics.

"The malware has adapted to incorporate attack vendors and techniques to diversify its effectiveness," cybersecurity firm NCC Group said in an analysis of ransomware attacks that took place in November 2023.

"Carbanak returned last month through new distribution chains and has been distributed through compromised websites to impersonate various business-related software."

Cloud Atlas' Spear-Phishing Attacks Target Russian Agro and Research Companies

CATEGORIE : Phishing

DATE: 26.12.23

WEB : The Hacker News

The threat actor referred to as Cloud Atlas has been linked to a set of spear-phishing attacks on Russian enterprises.

Targets included a Russian agro-industrial enterprise and a state-owned research company, according to a report from F.A.C.C.T., a standalone cybersecurity company formed after Group-IB's formal exit from Russia earlier this year.

Cloud Atlas, active since at least 2014, is a cyber espionage group of unknown origin. Also called Clean Ursa, Inception, Oxygen, and Red October, the threat actor is known for its persistent campaigns targeting Russia, Belarus, Azerbaijan, Turkey, and Slovenia.

British LAPSUS$ Teen Members Sentenced for High-Profile Attacks

CATEGORIE : Attack

DATE: 24.12.23

WEB : The Hacker News

Two British teens part of the LAPSUS$ cyber crime and extortion gang have been sentenced for their roles in orchestrating a string of high-profile attacks against a number of companies.

Arion Kurtaj, an 18-year-old from Oxford, has been sentenced to an indefinite hospital order due to his intent to get back to cybercrime "as soon as possible," BBC reported. Kurtaj, who is autistic, was deemed unfit to stand trial.

 

Rogue WordPress Plugin Exposes E-Commerce Sites to Credit Card Theft

CATEGORIE : Crime

DATE: 23.12.23

WEB : The Hacker News

Threat hunters have discovered a rogue WordPress plugin that's capable of creating bogus administrator users and injecting malicious JavaScript code to steal credit card information.

The skimming activity is part of a Magecart campaign targeting e-commerce websites, according to Sucuri.

Operation RusticWeb: Rust-Based Malware Targets Indian Government Entities

CATEGORIE : Virus

DATE: 23.12.23

WEB : The Hacker News

Indian government entities and the defense sector have been targeted by a phishing campaign that's engineered to drop Rust-based malware for intelligence gathering.

The activity, first detected in October 2023, has been codenamed Operation RusticWeb by enterprise security firm SEQRITE.

Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware

CATEGORIE : Virus

DATE: 23.12.23

WEB : The Hacker News

A new phishing campaign is leveraging decoy Microsoft Word documents as bait to deliver a backdoor written in the Nim programming language.

"Malware written in uncommon programming languages puts the security community at a disadvantage as researchers and reverse engineers' unfamiliarity can hamper their investigation," Netskope researchers Ghanashyam Satpathy and Jan Michael Alcantara said.

UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware

CATEGORIE : Virus

DATE: 23.12.23

WEB : The Hacker News

The threat actor known as UAC-0099 has been linked to continued attacks aimed at Ukraine, some of which leverage a high-severity flaw in the WinRAR software to deliver a malware strain called LONEPAGE.

"The threat actor targets Ukrainian employees working for companies outside of Ukraine," cybersecurity firm Deep Instinct said in a Thursday analysis.

Microsoft Warns of New 'FalseFont' Backdoor Targeting the Defense Sector

CATEGORIE : Virus

DATE: 23.12.23

WEB : The Hacker News

Organizations in the Defense Industrial Base (DIB) sector are in the crosshairs of an Iranian threat actor as part of a campaign designed to deliver a never-before-seen backdoor called FalseFont.

The findings come from Microsoft, which is tracking the activity under its weather-themed moniker Peach Sandstorm (formerly Holmium), which is also known as APT33, Elfin, and Refined Kitten.

Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware

CATEGORIE : Virus

DATE: 23.12.23

WEB : The Hacker News

A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between reboots is offered as an "add-on feature" and that it depends on the licensing options opted by a customer.

"In 2021, Predator spyware couldn't survive a reboot on the infected Android system (it had it on iOS)," Cisco Talos researchers Mike Gentile, Asheer Malhotra, and Vitor Ventura said in a report shared with The Hacker News. "However, by April 2022, that capability was being offered to their customers."

Chameleon Android Banking Trojan Variant Bypasses Biometric Authentication

CATEGORIE : Android

DATE: 23.12.23

WEB : The Hacker News

Cybersecurity researchers have discovered an updated version of an Android banking malware called Chameleon that has expanded its targeting to include users in the U.K. and Italy.

"Representing a restructured and enhanced iteration of its predecessor, this evolved Chameleon variant excels in executing Device Takeover (DTO) using the accessibility service, all while expanding its targeted region," Dutch mobile security firm ThreatFabric said in a report shared with The Hacker News.

New JavaScript Malware Targeted 50,000+ Users at Dozens of Banks Worldwide

CATEGORIE : Virus

DATE: 23.12.23

WEB : The Hacker News

A new piece of JavaScript malware has been observed attempting to steal users' online banking account credentials as part of a campaign that has targeted more than 40 financial institutions across the world.

The activity cluster, which employs JavaScript web injections, is estimated to have led to at least 50,000 infected user sessions spanning North America, South America, Europe, and Japan.

German Authorities Dismantle Dark Web Hub 'Kingdom Market' in Global Operation

CATEGORIE : BigBrothers

DATE: 23.12.23

WEB : The Hacker News

German law enforcement has announced the disruption of a dark web platform called Kingdom Market that specialized in the sales of narcotics and malware to "tens of thousands of users."

The exercise, which involved collaboration from authorities from the U.S., Switzerland, Moldova, and Ukraine, began on December 16, 2023, the Federal Criminal Police Office (BKA) said.

Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware

CATEGORIE : Exploit

DATE: 23.12.23

WEB : The Hacker News

Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of malware called Agent Tesla.

The infection chains leverage decoy Excel documents attached in invoice-themed messages to trick potential targets into opening them and activate the exploitation of CVE-2017-11882 (CVSS score: 7.8), a memory corruption vulnerability in Office's Equation Editor that could result in code execution with the privileges of the user.

 

Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild - Update ASAP

CATEGORIE : Vulnerebility

DATE: 21.12.23

WEB : The Hacker News

Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day flaw that it said has been exploited in the wild.

The vulnerability, assigned the CVE identifier CVE-2023-7024, has been described as a heap-based buffer overflow bug in the WebRTC framework that could be exploited to result in program crashes or arbitrary code execution.

 

Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster

CATEGORIE : Attack

DATE: 21.12.23

WEB : The Hacker News

Ransomware groups are increasingly switching to remote encryption in their attacks, marking a new escalation in tactics adopted by financially motivated actors to ensure the success of their campaigns.

"Companies can have thousands of computers connected to their network, and with remote ransomware, all it takes is one underprotected device to compromise the entire network," Mark Loman, vice president of threat research at Sophos, said.

Alert: Chinese-Speaking Hackers Pose as UAE Authority in Latest Smishing Wave

CATEGORIE : Attack

DATE: 21.12.23

WEB : The Hacker News

The Chinese-speaking threat actors behind Smishing Triad have been observed masquerading as the United Arab Emirates Federal Authority for Identity and Citizenship to send malicious SMS messages with the ultimate goal of gathering sensitive information from residents and foreigners in the country.

"These criminals send malicious links to their victims' mobile devices through SMS or iMessage and use URL-shortening services like Bit.ly to randomize the links they send," Resecurity said in a report published this week. "This helps them protect the fake website's domain and hosting location."

3,500 Arrested in Global Operation HAECHI-IV Targeting Financial Criminals

CATEGORIE : Crime

DATE: 21.12.23

WEB : The Hacker News

A six-month-long international police operation codenamed HAECHI-IV has resulted in the arrests of nearly 3,500 individuals and seizures worth $300 million across 34 countries.

The exercise, which took place from July through December 2023, took aim at various types of financial crimes such as voice phishing, romance scams, online sextortion, investment fraud, money laundering associated with illegal online gambling, business email compromise fraud, and e-commerce fraud.

New Go-Based JaskaGO Malware Targeting Windows and macOS Systems

CATEGORIE : Virus

DATE: 21.12.23

WEB : The Hacker News

A new Go-based information stealer malware called JaskaGO has emerged as the latest cross-platform threat to infiltrate both Windows and Apple macOS systems.

AT&T Alien Labs, which made the discovery, said the malware is "equipped with an extensive array of commands from its command-and-control (C&C) server."

FBI Takes Down BlackCat Ransomware, Releases Free Decryption Tool

CATEGORIE : Ransom

DATE: 21.12.23

WEB : The Hacker News

The U.S. Justice Department (DoJ) has officially announced the disruption of the BlackCat ransomware operation and released a decryption tool that more than 500 affected victims can use to regain access to files locked by the malware.

Court documents show that the U.S. Federal Bureau of Investigation (FBI) enlisted the help of a confidential human source (CHS) to act as an affiliate for the BlackCat group and gain access to a web panel used for managing the gang's victims, in what's a case of hacking the hackers.

 

Behind the Scenes of Matveev's Ransomware Empire: Tactics and Team

CATEGORIE : Ransom

DATE: 19.12.23

WEB : The Hacker News

Cybersecurity researchers have shed light on the inner workings of the ransomware operation led by Mikhail Pavlovich Matveev, a Russian national who was indicted by the U.S. government earlier this year for his alleged role in launching thousands of attacks across the world. Matveev, who resides in Saint Petersburg and is known by the aliases Wazawaka, m1x, Boriselcin, Uhodiransomwar, Orange, and waza, is alleged to have played a crucial part in the development and deployment of LockBit, Babuk, and Hive ransomware variants since at least June 2020.

Hackers Abusing GitHub to Evade Detection and Control Compromised Hosts

CATEGORIE : Security

DATE: 19.12.23

WEB : The Hacker News

Threat actors are increasingly making use of GitHub for malicious purposes through novel methods, including abusing secret Gists and issuing malicious commands via git commit messages.

"Malware authors occasionally place their samples in services like Dropbox, Google Drive, OneDrive, and Discord to host second stage malware and sidestep detection tools," ReversingLabs researcher Karlo Zanki said in a report shared with The Hacker News.

Iranian Hackers Using MuddyC2Go in Telecom Espionage Attacks Across Africa

CATEGORIE : BigBrothers

DATE: 19.12.23

WEB : The Hacker News

The Iranian nation-state actor known as MuddyWater has leveraged a newly discovered command-and-control (C2) framework called MuddyC2Go in its attacks on the telecommunications sector in Egypt, Sudan, and Tanzania.

The Symantec Threat Hunter Team, part of Broadcom, is tracking the activity under the name Seedworm, which is also tracked under the monikers Boggy Serpens, Cobalt Ulster, Earth Vetala, ITG17, Mango Sandstorm (formerly Mercury), Static Kitten, TEMP.Zagros, and Yellow Nix.

New Malvertising Campaign Distributing PikaBot Disguised as Popular Software

CATEGORIE : BotNet

DATE: 19.12.23

WEB : The Hacker News

The malware loader known as PikaBot is being distributed as part of a malvertising campaign targeting users searching for legitimate software like AnyDesk.

"PikaBot was previously only distributed via malspam campaigns similarly to QakBot and emerged as one of the preferred payloads for a threat actor known as TA577," Malwarebytes' Jérôme Segura said.

 

8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Spread Malware

CATEGORIE : Virus

DATE: 19.12.23

WEB : The Hacker News

The threat actors associated with the 8220 Gang have been observed exploiting a high-severity flaw in Oracle WebLogic Server to propagate their malware.

The security shortcoming is CVE-2020-14883 (CVSS score: 7.2), a remote code execution bug that could be exploited by authenticated attackers to take over susceptible servers.

Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide

CATEGORIE : Ransom

DATE: 19.12.23

WEB : The Hacker News

The threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities as of October 2023, according to a new joint cybersecurity advisory from Australia and the U.S.

"Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data and have impacted a wide range of businesses and critical infrastructure organizations in North America, South America, Europe, and Australia," authorities said.

Beware: Experts Reveal New Details on Zero-Click Outlook RCE Exploits

CATEGORIE : Exploit

DATE: 19.12.23

WEB : The Hacker News

Technical details have emerged about two now-patched security flaws in Microsoft Windows that could be chained by threat actors to achieve remote code execution on the Outlook email service sans any user interaction.

"An attacker on the internet can chain the vulnerabilities together to create a full, zero-click remote code execution (RCE) exploit against Outlook clients," Akamai security researcher Ben Barnea, who discovered the vulnerabilities, said in a two-part report shared with The Hacker News. The security issues, which were addressed by Microsoft in August and October 2023, respectively, are listed below -

Rhadamanthys Malware: Swiss Army Knife of Information Stealers Emerges

CATEGORIE : Virus

DATE: 19.12.23

WEB : The Hacker News

The developers of the information stealer malware known as Rhadamanthys are actively iterating on its features, broadening its information-gathering capabilities and also incorporating a plugin system to make it more customizable.

This approach not only transforms it into a threat capable of delivering "specific distributor needs," but also makes it more potent, Check Point said in a technical deep dive published last week.

Four U.S. Nationals Charged in $80 Million Pig Butchering Crypto Scam

CATEGORIE : Cryptocurrency

DATE: 19.12.23

WEB : The Hacker News

Four U.S. nationals have been charged for participating in an illicit scheme that earned them more than $80 million via cryptocurrency investment scams.

The defendants – Lu Zhang, 36, of Alhambra, California; Justin Walker, 31, of Cypress, California; Joseph Wong, 32, Rosemead, California; and Hailong Zhu, 40, Naperville, Illinois – have been charged with conspiracy to commit money laundering, concealment money laundering, and international money laundering.

QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality Industry

CATEGORIE : Virus

DATE: 19.12.23

WEB : The Hacker News

A new wave of phishing messages distributing the QakBot malware has been observed, more than three months after a law enforcement effort saw its infrastructure dismantled by infiltrating its command-and-control (C2) network.

Microsoft, which made the discovery, described it as a low-volume campaign that began on December 11, 2023, and targeted the hospitality industry.

CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats

CATEGORIE : BigBrothers

DATE: 19.12.23

WEB : The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging manufacturers to get rid of default passwords on internet-exposed systems altogether, citing severe risks that could be exploited by malicious actors to gain initial access to, and move laterally within, organizations.

In an alert published last week, the agency called out Iranian threat actors affiliated with the Islamic Revolutionary Guard Corps (IRGC) for exploiting operational technology devices with default passwords to gain access to critical infrastructure systems in the U.S.

MongoDB Suffers Security Breach, Exposing Customer Data

CATEGORIE : Incindent

DATE: 17.12.23

WEB : The Hacker News

MongoDB on Saturday disclosed it's actively investigating a security incident that has led to unauthorized access to "certain" corporate systems, resulting in the exposure of customer account metadata and contact information.

The American database software company said it first detected anomalous activity on December 13, 2023, and that it immediately activated its incident response efforts.

China's MIIT Introduces Color-Coded Action Plan for Data Security Incidents

CATEGORIE : Incindent

DATE: 16.12.23

WEB : The Hacker News

China's Ministry of Industry and Information Technology (MIIT) on Friday unveiled draft proposals detailing its plans to tackle data security events in the country using a color-coded system.

The effort is designed to "improve the comprehensive response capacity for data security incidents, to ensure timely and effective control, mitigation and elimination of hazards and losses caused by data security incidents, to protect the lawful rights and interests of individuals and organizations, and to safeguard national security and public interests, the department said.

Microsoft Warns of Storm-0539: The Rising Threat Behind Holiday Gift Card Frauds

CATEGORIE : Cyber

DATE: 16.12.23

WEB : The Hacker News

Microsoft is warning of an uptick in malicious activity from an emerging threat cluster it's tracking as Storm-0539 for orchestrating gift card fraud and theft via highly sophisticated email and SMS phishing attacks against retail entities during the holiday shopping season.

The goal of the attacks is to propagate booby-trapped links that direct victims to adversary-in-the-middle (AiTM) phishing pages that are capable of harvesting their credentials and session tokens.

New KV-Botnet Targeting Cisco, DrayTek, and Fortinet Devices for Stealthy Attacks

CATEGORIE : BotNet

DATE: 16.12.23

WEB : The Hacker News

A new botnet consisting of firewalls and routers from Cisco, DrayTek, Fortinet, and NETGEAR is being used as a covert data transfer network for advanced persistent threat actors, including the China-linked threat actor called Volt Typhoon.

Dubbed KV-botnet by the Black Lotus Labs team at Lumen Technologies, the malicious network is an amalgamation of two complementary activity clusters that have been active since at least February 2022.

 

Crypto Hardware Wallet Ledger's Supply Chain Breach Results in $600,000 Theft

CATEGORIE : Cryptocurrency

DATE: 15.12.23

WEB : The Hacker News

Crypto hardware wallet maker Ledger published a new version of its "@ledgerhq/connect-kit" npm module after unidentified threat actors pushed malicious code that led to the theft of more than $600,000 in virtual assets.

The compromise was the result of a former employee falling victim to a phishing attack, the company said in a statement.

New Security Vulnerabilities Uncovered in pfSense Firewall Software - Patch Now

CATEGORIE : Vulnerebility

DATE: 15.12.23

WEB : The Hacker News

Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called pfSense that could be chained by an attacker to execute arbitrary commands on susceptible appliances.

The issues relate to two reflected cross-site scripting (XSS) bugs and one command injection flaw, according to new findings from Sonar.

Google's New Tracking Protection in Chrome Blocks Third-Party Cookies

CATEGORIE : Safety

DATE: 15.12.23

WEB : The Hacker News

Google on Thursday announced that it will start testing a new feature called "Tracking Protection" starting January 4, 2024, to 1% of Chrome users as part of its efforts to deprecate third-party cookies in the web browser.

The setting is designed to limit "cross-site tracking by restricting website access to third-party cookies by default," Anthony Chavez, vice president of Privacy Sandbox at Google, said.

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks

CATEGORIE : Virus

DATE: 15.12.23

WEB : The Hacker News

A novel multi-platform threat called NKAbuse has been discovered using a decentralized, peer-to-peer network connectivity protocol known as NKN (short for New Kind of Network) as a communications channel.

"The malware utilizes NKN technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities," Russian cybersecurity company Kaspersky said in a Thursday report.

116 Malware Packages Found on PyPI Repository Infecting Windows and Linux Systems

CATEGORIE : Virus

DATE: 15.12.23

WEB : The Hacker News

Cybersecurity researchers have identified a set of 116 malicious packages on the Python Package Index (PyPI) repository that are designed to infect Windows and Linux systems with a custom backdoor.

"In some cases, the final payload is a variant of the infamous W4SP Stealer, or a simple clipboard monitor to steal cryptocurrency, or both," ESET researchers Marc-Etienne M.Léveillé and Rene Holt said in a report published earlier this week.

 

New Pierogi++ Malware by Gaza Cyber Gang Targeting Palestinian Entities

CATEGORIE : BigBrothers

DATE: 14.12.23

WEB : The Hacker News

A pro-Hamas threat actor known as Gaza Cyber Gang is targeting Palestinian entities using an updated version of a backdoor dubbed Pierogi.

The findings come from SentinelOne, which has given the malware the name Pierogi++ owing to the fact that it's implemented in the C++ programming language unlike its Delphi- and Pascal-based predecessor.

Iranian State-Sponsored OilRig Group Deploys 3 New Malware Downloaders

CATEGORIE : BigBrothers

DATE: 14.12.23

WEB : The Hacker News

The Iranian state-sponsored threat actor known as OilRig deployed three different downloader malware throughout 2022 to maintain persistent access to victim organizations located in Israel.

The three new downloaders have been named ODAgent, OilCheck, and OilBooster by Slovak cybersecurity company ESET. The attacks also involved the use of an updated version of a known OilRig downloader dubbed SampleCheck5000 (or SC5k).

Russian SVR-Linked APT29 Targets JetBrains TeamCity Servers in Ongoing Attacks

CATEGORIE : APT

DATE: 14.12.23

WEB : The Hacker News

Threat actors affiliated with the Russian Foreign Intelligence Service (SVR) have targeted unpatched JetBrains TeamCity servers in widespread attacks since September 2023.

The activity has been tied to a nation-state group known as APT29, which is also tracked as BlueBravo, Cloaked Ursa, Cozy Bear, Midnight Blizzard (formerly Nobelium), and The Dukes. It's notable for the supply chain attack targeting SolarWinds and its customers in 2020.

New Hacker Group 'GambleForce' Tageting APAC Firms Using SQL Injection Attacks

CATEGORIE : Hacking

DATE: 14.12.23

WEB : The Hacker News

A previously unknown hacker outfit called GambleForce has been attributed to a series of SQL injection attacks against companies primarily in the Asia-Pacific (APAC) region since at least September 2023.

"GambleForce uses a set of basic yet very effective techniques, including SQL injections and the exploitation of vulnerable website content management systems (CMS) to steal sensitive information, such as user credentials," Singapore-headquartered Group-IB said in a report shared with The Hacker News.

Microsoft Takes Legal Action to Crack Down on Storm-1152's Cybercrime Network

CATEGORIE : Cyber

DATE: 14.12.23

WEB : The Hacker News

Microsoft on Wednesday said it obtained a court order to seize infrastructure set up by a group called Storm-1152 that peddled roughly 750 million fraudulent Microsoft accounts and tools through a network of bogus websites and social media pages to other criminal actors, netting them millions of dollars in illicit revenue.

"Fraudulent online accounts act as the gateway to a host of cybercrime, including mass phishing, identity theft and fraud, and distributed denial-of-service (DDoS) attacks," Amy Hogan-Burney, the company's associate general counsel for cybersecurity policy and protection, said.

BazaCall Phishing Scammers Now Leveraging Google Forms for Deception

CATEGORIE : Phishing

DATE: 14.12.23

WEB : The Hacker News

The threat actors behind the BazaCall call back phishing attacks have been observed leveraging Google Forms to lend the scheme a veneer of credibility.

The method is an "attempt to elevate the perceived authenticity of the initial malicious emails," cybersecurity firm Abnormal Security said in a report published today.

 

Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities

CATEGORIE : Android

DATE: 13.12.23

WEB : The Hacker News

Google is highlighting the role played by Clang sanitizers in hardening the security of the cellular baseband in the Android operating system and preventing specific kinds of vulnerabilities.

This comprises Integer Overflow Sanitizer (IntSan) and BoundsSanitizer (BoundSan), both of which are part of UndefinedBehaviorSanitizer (UBSan), a tool designed to catch various kinds of undefined behavior during program execution.

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing

CATEGORIE : Exploit

DATE: 13.12.23

WEB : The Hacker News

Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks.

"Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious activity," the Microsoft Threat Intelligence team said in an analysis.

Major Cyber Attack Paralyzes Kyivstar - Ukraine's Largest Telecom Operator

CATEGORIE : BigBrothers

DATE: 13.12.23

WEB : The Hacker News

Ukraine's biggest telecom operator Kyivstar has become the victim of a "powerful hacker attack," disrupting customer access to mobile and internet services.

"The cyberattack on Ukraine's #Kyivstar telecoms operator has impacted all regions of the country with high impact to the capital, metrics show, with knock-on impacts reported to air raid alert network and banking sector as work continues to restore connectivity," NetBlocks said in a series of posts on X (formerly Twitter).

Microsoft's Final 2023 Patch Tuesday: 33 Flaws Fixed, Including 4 Critical

CATEGORIE : Vulnerebility

DATE: 13.12.23

WEB : The Hacker News

Microsoft released its final set of Patch Tuesday updates for 2023, closing out 33 flaws in its software, making it one of the lightest releases in recent years.

Of the 33 shortcomings, four are rated Critical and 29 are rated Important in severity. The fixes are in addition to 18 flaws Microsoft addressed in its Chromium-based Edge browser since the release of Patch Tuesday updates for November 2023.

Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign

CATEGORIE : APT

DATE: 13.12.23

WEB : The Hacker News

The Russian nation-state threat actor known as APT28 has been observed making use of lures related to the ongoing Israel-Hamas war to facilitate the delivery of a custom backdoor called HeadLace.

IBM X-Force is tracking the adversary under the name ITG05, which is also known as BlueDelta, Fancy Bear, Forest Blizzard (formerly Strontium), FROZENLAKE, Iron Twilight, Sednit, Sofacy, and TA422.

 

New MrAnon Stealer Malware Targeting German Users via Booking-Themed Scam

CATEGORIE : Virus

DATE: 12.12.23

WEB : The Hacker News

A phishing campaign has been observed delivering an information stealer malware called MrAnon Stealer to unsuspecting victims via seemingly benign booking-themed PDF lures.

"This malware is a Python-based information stealer compressed with cx-Freeze to evade detection," Fortinet FortiGuard Labs researcher Cara Lin said. "MrAnon Stealer steals its victims' credentials, system information, browser sessions, and cryptocurrency extensions."

Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws

CATEGORIE : Apple

DATE: 12.12.23

WEB : The Hacker News

Apple on Monday released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web browser to address multiple security flaws, in addition to backporting fixes for two recently disclosed zero-days to older devices.

This includes updates for 12 security vulnerabilities in iOS and iPadOS spanning AVEVideoEncoder, ExtensionKit, Find My, ImageIO, Kernel, Safari Private Browsing, and WebKit. macOS Sonoma 14.2, for its part, resolves 39 shortcomings, counting six bugs impacting the ncurses library.

New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now

CATEGORIE : Vulnerebility

DATE: 12.12.23

WEB : The Hacker News

Apache has released a security advisory warning of a critical security flaw in the Struts 2 open-source web application framework that could result in remote code execution.

Tracked as CVE-2023-50164, the vulnerability is rooted in a flawed "file upload logic" that could enable unauthorized path traversal and could be exploited under the circumstances to upload a malicious file and achieve execution of arbitrary code.

 

Researchers Unmask Sandman APT's Hidden Link to China-Based KEYPLUG Backdoor

CATEGORIE : APT

DATE: 11.12.23

WEB : The Hacker News

Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat cluster that's known to use a backdoor known as KEYPLUG.

The assessment comes jointly from SentinelOne, PwC, and the Microsoft Threat Intelligence team based on the fact that the adversary's Lua-based malware LuaDream and KEYPLUG have been determined to cohabit "in the same victim networks.

Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans

CATEGORIE : APT

DATE: 11.12.23

WEB : The Hacker News

The notorious North Korea-linked threat actor known as the Lazarus Group has been attributed to a new global campaign that involves the opportunistic exploitation of security flaws in Log4j to deploy previously undocumented remote access trojans (RATs) on compromised hosts. Cisco Talos is tracking the activity under the name Operation Blacksmith, noting the use of three DLang-based malware families, including a RAT called NineRAT that leverages Telegram for command-and-control (C2), DLRAT, and a downloader dubbed BottomLoader.

SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android Users

CATEGORIE : Android

DATE: 11.12.23

WEB : The Hacker News

Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded over 12 million times.

"Despite their attractive appearance, these services are in fact designed to defraud users by offering them high-interest-rate loans endorsed with deceitful descriptions, all while collecting their victims' personal and financial information to blackmail them, and in the end gain their funds," ESET said.

New PoolParty Process Injection Techniques Outsmart Top EDR Solutions

CATEGORIE : Hacking

DATE: 11.12.23

WEB : The Hacker News

A new collection of eight process injection techniques, collectively dubbed PoolParty, could be exploited to achieve code execution in Windows systems while evading endpoint detection and response (EDR) systems.

SafeBreach researcher Alon Leviev said the methods are "capable of working across all processes without any limitations, making them more flexible than existing process injection techniques."

 

SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs

CATEGORIE : Attack

DATE: 10.12.23

WEB : The Hacker News

Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak sensitive information from kernel memory on current and upcoming CPUs from Intel, AMD, and Arm.

The attack is an end-to-end exploit for Spectre based on a new feature in Intel CPUs called Linear Address Masking (LAM) as well as its analogous counterparts from AMD (called Upper Address Ignore or UAI) and Arm (called Top Byte Ignore or TBI).

Researchers Unveal GuLoader Malware's Latest Anti-Analysis Techniques

CATEGORIE : Virus

DATE: 9.12.23

WEB : The Hacker News

Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging.

"While GuLoader's core functionality hasn't changed drastically over the past few years, these constant updates in their obfuscation techniques make analyzing GuLoader a time-consuming and resource-intensive process," Elastic Security Labs researcher Daniel Stepanic said in a report published this week.

New 5G Modem Flaws Affect iOS Devices and Android Models from Major Brands

CATEGORIE : OS

DATE: 9.12.23

WEB : The Hacker News

A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well as hundreds of smartphone models running Android and iOS.

Of the 14 flaws – collectively called 5Ghoul (a combination of "5G" and "Ghoul") – 10 affect 5G modems from the two companies, out of which three have been classified as high-severity vulnerabilities.

N. Korea's Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

CATEGORIE : Virus

DATE: 9.12.23

WEB : The Hacker News

The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of a spear-phishing campaign with the ultimate goal of distributing backdoors on compromised systems.

"The threat actor ultimately uses a backdoor to steal information and execute commands," the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last week.

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software

CATEGORIE : Apple

DATE: 9.12.23

WEB : The Hacker News

Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy malware.

"Attackers can use this type of malware to gain money by building a proxy server network or to perform criminal acts on behalf of the victim: to launch attacks on websites, companies and individuals, buy guns, drugs, and other illicit goods," Kaspersky security researcher Sergey Puzan said.

WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability

CATEGORIE : Vulnerebility

DATE: 9.12.23

WEB : The Hacker News

WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with another bug to execute arbitrary PHP code on vulnerable sites.

"A remote code execution vulnerability that is not directly exploitable in core; however, the security team feels that there is a potential for high severity when combined with some plugins, especially in multisite installations," WordPress said.

 

Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme

CATEGORIE : Cryptocurrency

DATE: 8.12.23

WEB : The Hacker News

The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty, nearly 11 months after he was arrested in Miami earlier this year.

Anatoly Legkodymov (aka Anatolii Legkodymov, Gandalf, and Tolik), according to the U.S. Justice Department, admitted to operating an unlicensed money-transmitting business that enabled other criminal actors to launder their illicit proceeds. He faces up to five years in prison.

Microsoft Warns of COLDRIVER's Evolving Evasion and Credential-Stealing Tactics

CATEGORIE : Hacking

DATE: 8.12.23

WEB : The Hacker News

The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that are of strategic interests to Russia while simultaneously improving its detection evasion capabilities.

The Microsoft Threat Intelligence team is tracking under the cluster as Star Blizzard (formerly SEABORGIUM). It's also called Blue Callisto, BlueCharlie (or TAG-53), Calisto (alternately spelled Callisto), and TA446.

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

CATEGORIE : Exploit

DATE: 8.12.23

WEB : The Hacker News

A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices.

Tracked as CVE-2023-45866, the issue relates to a case of authentication bypass that enables attackers to connect to susceptible devices and inject keystrokes to achieve code execution as the victim.

Governments May Spy on You by Requesting Push Notifications from Apple and Google

CATEGORIE : Phishing

DATE: 8.12.23

WEB : The Hacker News

Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue people of interest, according to U.S. Senator Ron Wyden.

"Push notifications are alerts sent by phone apps to users' smartphones," Wyden said.

 

New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in Thailand

CATEGORIE : Virus

DATE: 7.12.23

WEB : The Hacker News

A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies in Thailand by threat actors to main covert access to victim networks at lease since 2021.

Named after a nocturnal female spirit of Southeast Asian folklore, the malware is "able to conceal its own presence during the initialization phase," Group-IB said in a report shared with The Hacker News.

Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger

CATEGORIE : Social

DATE: 7.12.23

WEB : The Hacker News

Meta has officially begun to roll out support for end-to-end encryption (E2EE) in Messenger for personal calls and one-to-one personal messages by default in what it called the "most significant milestone yet."

"This isn't a routine security update: we rebuilt the app from the ground up, in close consultation with privacy and safety experts," Loredana Crisan, vice president of Messenger at Meta, said in a post shared on X (formerly Twitter).

Alert: Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts

CATEGORIE : Hacking

DATE: 7.12.23

WEB : The Hacker News

Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way to infiltrate cloud accounts and conduct follow-on attacks.

The service enables threat actors to impersonate user identities and roles in cloud environments, Red Canary researchers Thomas Gardner and Cody Betsworth said in a Tuesday analysis.

Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks

CATEGORIE : Vulnerebility

DATE: 7.12.23

WEB : The Hacker News

A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular routers and open-source software components like TinyXML and OpenNDS.

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

CATEGORIE : Incindent

DATE: 7.12.23

WEB : The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a high-severity Adobe ColdFusion vulnerability by unidentified threat actors to gain initial access to government servers.

"The vulnerability in ColdFusion (CVE-2023-26360) presents as an improper access control issue and exploitation of this CVE can result in arbitrary code execution," CISA said, adding an unnamed federal agency was targeted between June and July 2023.

Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution

CATEGORIE : Vulnerebility

DATE: 7.12.23

WEB : The Hacker News

Atlassian has released software fixes to address four critical flaws in its software that, if successfully exploited, could result in remote code execution.

 

Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks

CATEGORIE : Vulnerebility

DATE: 6.12.23

WEB : The Hacker News

Chipmaker Qualcomm has released more information about three high-severity security flaws that it said came under "limited, targeted exploitation" back in October 2023.

The vulnerabilities are as follows -

Warning for iPhone Users: Experts Warn of Sneaky Fake Lockdown Mode Attack

CATEGORIE : Apple

DATE: 6.12.23

WEB : The Hacker News

A new "post-exploitation tampering technique" can be abused by malicious actors to visually deceive a target into believing that their Apple iPhone is running in Lockdown Mode when it's actually not and carry out covert attacks.

The novel method, detailed by Jamf Threat Labs in a report shared with The Hacker News, "shows that if a hacker has already infiltrated your device, they can cause Lockdown Mode to be 'bypassed' when you trigger its activation."

Russia's AI-Powered Disinformation Operation Targeting Ukraine, U.S., and Germany

CATEGORIE : BigBrothers

DATE: 6.12.23

WEB : The Hacker News

The Russia-linked influence operation called Doppelganger has targeted Ukrainian, U.S., and German audiences through a combination of inauthentic news sites and social media accounts.

These campaigns are designed to amplify content designed to undermine Ukraine as well as propagate anti-LGBTQ+ sentiment, U.S. military competence, and Germany's economic and social issues, according to a new report shared with The Hacker News.

15,000 Go Module Repositories on GitHub Vulnerable to Repojacking Attack

CATEGORIE : Attack

DATE: 6.12.23

WEB : The Hacker News

New research has found that over 15,000 Go module repositories on GitHub are vulnerable to an attack called repojacking.

"More than 9,000 repositories are vulnerable to repojacking due to GitHub username changes," Jacob Baines, chief technology officer at VulnCheck, said in a report shared with The Hacker News. "More than 6,000 repositories were vulnerable to repojacking due to account deletion."

New Threat Actor 'AeroBlade' Emerges in Espionage Attack on U.S. Aerospace

CATEGORIE : BigBrothers

DATE: 5.12.23

WEB : The Hacker News

A previously undocumented threat actor has been linked to a cyber attack targeting an aerospace organization in the U.S. as part of what's suspected to be a cyber espionage mission.

The BlackBerry Threat Research and Intelligence team is tracking the activity cluster as AeroBlade. Its origin is currently unknown and it's not clear if the attack was successful.

Microsoft Warns of Kremlin-Backed APT28 Exploiting Critical Outlook Vulnerability

CATEGORIE : APT

DATE: 5.12.23

WEB : The Hacker News

Microsoft on Monday said it detected Kremlin-backed nation-state activity exploiting a critical security flaw in its Outlook email service to gain unauthorized access to victims' accounts within Exchange servers.

The tech giant attributed the intrusions to a threat actor it called Forest Blizzard (formerly Strontium), which is also widely tracked under the monikers APT28, BlueDelta, Fancy Bear, FROZENLAKE, Iron Twilight, Sednit, and Sofacy.

New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks

CATEGORIE : Attack

DATE: 5.12.23

WEB : The Hacker News

New research has unearthed multiple novel attacks that break Bluetooth Classic's forward secrecy and future secrecy guarantees, resulting in adversary-in-the-middle (AitM) scenarios between two already connected peers.

The issues, collectively named BLUFFS, impact Bluetooth Core Specification 4.2 through 5.4. They are tracked under the identifier CVE-2023-24023 (CVSS score: 6.8) and were responsibly disclosed in October 2022.

New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices

CATEGORIE : BotNet

DATE: 5.12.23

WEB : The Hacker News

Cybersecurity researchers have discovered a new variant of an emerging botnet called P2PInfect that's capable of targeting routers and IoT devices.

The latest version, per Cado Security Labs, is compiled for Microprocessor without Interlocked Pipelined Stages (MIPS) architecture, broadening its capabilities and reach.

LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks

CATEGORIE : Attack

DATE: 4.12.23

WEB : The Hacker News

The Unified Extensible Firmware Interface (UEFI) code from various independent firmware/BIOS vendors (IBVs) has been found vulnerable to potential attacks through high-impact flaws in image parsing libraries embedded into the firmware.

The shortcomings, collectively labeled LogoFAIL by Binarly, "can be used by threat actors to deliver a malicious payload and bypass Secure Boot, Intel Boot Guard, and other security technologies by design."

Microsoft Warns of Malvertising Scheme Spreading CACTUS Ransomware

CATEGORIE : Ransom

DATE: 4.12.23

WEB : The Hacker News

Microsoft has warned of a new wave of CACTUS ransomware attacks that leverage malvertising lures to deploy DanaBot as an initial access vector.

The DanaBot infections led to "hands-on-keyboard activity by ransomware operator Storm-0216 (Twisted Spider, UNC2198), culminating in the deployment of CACTUS ransomware," the Microsoft Threat Intelligence team said in a series of posts on X (formerly Twitter).

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.

CATEGORIE : Virus

DATE: 2.12.23

WEB : The Hacker News

Organizations in the Middle East, Africa, and the U.S. have been targeted by an unknown threat actor to distribute a new backdoor called Agent Racoon.

"This malware family is written using the .NET framework and leverages the domain name service (DNS) protocol to create a covert channel and provide different backdoor functionalities," Palo Alto Networks Unit 42 researcher Chema Garcia said in a Friday analysis.

Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot Malware

CATEGORIE : Virus

DATE: 2.12.23

WEB : The Hacker News

A Russian national has been found guilty in connection with his role in developing and deploying a malware known as TrickBot, the U.S. Department of Justice (DoJ) announced.

Vladimir Dunaev, 40, was arrested in South Korea in September 2021 and extradited to the U.S. a month later.

New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia

CATEGORIE : Android

DATE: 1.12.23

WEB : The Hacker News

Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has been observed targeting users in Southeast Asian countries like Indonesia, Thailand, and Vietnam since early September 2023.

"Spreading primarily through messaging services, it combines app-based malware with social engineering to defraud banking customers," Oslo-based mobile app security firm Promon said in an analysis published Thursday.

Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats

CATEGORIE : Virus

DATE: 1.12.23

WEB : The Hacker News

The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle the notorious Qakbot malware and botnet. While the operation was successful in disrupting this long-running threat, concerns have arisen as it appears that Qakbot may still pose a danger in a reduced form. This article discusses the aftermath of the takedown, provides mitigation strategies, and offers guidance on determining past infections.

Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan

CATEGORIE : Virus

DATE: 1.12.23

WEB : The Hacker News

A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets the Uzbekistan Ministry of Foreign Affairs and South Korean users with a remote access trojan called SugarGh0st RAT.

The activity, which commenced no later than August 2023, leverages two different infection sequences to deliver the malware, which is a customized variant of Gh0st RAT (aka Farfli).

Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks

CATEGORIE : Attack

DATE: 1.12.23

WEB : The Hacker News

The most recent Gcore Radar report and its aftermath have highlighted a dramatic increase in DDoS attacks across multiple industries. At the beginning of 2023, the average strength of attacks reached 800 Gbps, but now, even a peak as high as 1.5+ Tbps is unsurprising. To try and break through Gcore's defenses, perpetrators made two attempts with two different strategies. Read on to discover what happened and learn how the security provider stopped the attackers in their tracks without affecting end users' experiences.

WhatsApp's New Secret Code Feature Lets Users Protect Private Chats with Password

CATEGORIE : Social

DATE: 1.12.23

WEB : The Hacker News

Meta-owned WhatsApp has launched a new Secret Code feature to help users protect sensitive conversations with a custom password on the messaging platform.

The feature has been described as an "additional way to protect those chats and make them harder to find if someone has access to your phone or you share a phone with someone else."

U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign-Based Agents

CATEGORIE : BigBrothers

DATE: 1.12.23

WEB : The Hacker News

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Thursday sanctioned the North Korea-linked adversarial collective known as Kimsuky as well as eight foreign-based agents who are alleged to have facilitated sanctions evasion.

The agents, the Treasury said, helped in "revenue generation and missile-related technology procurement that support the DPRK's weapons of mass destruction (WMD) programs."

Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices

CATEGORIE : Vulnerebility

DATE: 1.12.23

WEB : The Hacker News

Zyxel has released patches to address 15 security issues impacting network-attached storage (NAS), firewall, and access point (AP) devices, including three critical flaws that could lead to authentication bypass and command injection.

The three vulnerabilities are listed below -

Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws

CATEGORIE : Apple

DATE: 1.12.23

WEB : The Hacker News

Apple has released software updates for iOS, iPadOS, macOS, and Safari web browser to address two security flaws that it said have come under active exploitation in the wild on older versions of its software.

The vulnerabilities, both of which reside in the WebKit web browser engine, are described below -

Google Unveils RETVec - Gmail's New Defense Against Spam and Malicious Emails

CATEGORIE : Safety

DATE: 1.12.23

WEB : The Hacker News

Google has revealed a new multilingual text vectorizer called RETVec (short for Resilient and Efficient Text Vectorizer) to help detect potentially harmful content such as spam and malicious emails in Gmail.

"RETVec is trained to be resilient against character-level manipulations including insertion, deletion, typos, homoglyphs, LEET substitution, and more," according to the project's description on GitHub.