Cybersecurity
- unit42.paloaltonetworks.com Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
North Korean IT worker cluster CL-STA-0237 instigated phishing attacks via video apps in Laos, exploiting U.S. IT firms and major tech identities. North Korean IT worker cluster CL-STA-0237 instigated phishing attacks via video apps in Laos, exploiting U.S. IT firms and major tech identities.
- blog.eclecticiq.com Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
Chinese threat actor SilkSpecter targets Black Friday shoppers with phishing campaigns, exploiting legitimate services to steal sensitive data.
- blog.sucuri.net Simple Include Statement Hides Casino Spam
Learn about a WordPress malware attack where a stealthy include statement concealed casino spam links above the webroot.
- therecord.media Malware being delivered by mail, warns Swiss cyber agency
The postal letters, dated to 12 November, claim to be offering people in the country a new weather app developed by the country's meteorological agency, however they contain a QR code redirecting people to a malicious application developed by fraudsters.
-
Advertisers are pushing ad and pop-up blockers using old tricks
www.malwarebytes.com Advertisers are pushing ad and pop-up blockers using old tricks | MalwarebytesA malvertising campaign using an old school trick was found pushing to different ad blockers.
- therecord.media Hungary confirms hack of defense procurement agency
Hungarian officials said the network of the NATO ally's defense procurement agency had been hacked. A ransomware gang had claimed earlier that it stole data from the agency.
-
Joint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructure
> we have identified that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders. We expect our understanding of these compromises to grow as the investigation continues.
-
Evaluating Synthetic Command Attacks on Smart Voice Assistants
> Recent advances in voice synthesis, coupled with the ease with which speech can be harvested for millions of people, introduce new threats to applications that are enabled by devices such as voice assistants (e.g., Amazon Alexa, Google Home etc.). We explore if unrelated and limited amount of speech from a target can be used to synthesize commands for a voice assistant like Amazon Alexa. More specifically, we investigate attacks on voice assistants with synthetic commands when they match command sources to authorized users, and applications (e.g., Alexa Skills) process commands only when their source is an authorized user with a chosen confidence level. We demonstrate that even simple concatenative speech synthesis can be used by an attacker to command voice assistants to perform sensitive operations. We also show that such attacks, when launched by exploiting compromised devices in the vicinity of voice assistants, can have relatively small host and network footprint. Our results demonstrate the need for better defenses against synthetic malicious commands that could target voice assistants.
- securityintelligence.com Strela Stealer: Today's invoice is tomorrow's phish
IBM X-Force has been tracking ongoing Hive0145 campaigns delivering Strela Stealer malware for over a year. Learn more about the malware, the techniques for spreading it, and how to protect against it.
- www.theregister.com Embargo ransomware claims breach of US pharmacy network
American Associated Pharmacies yet to officially confirm infection
- therecord.media NIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikely
The National Institute of Standards and Technology has faced criticism since it became clear that thousands of critical vulnerabilities were not being analyzed or enriched.
- blog.talosintelligence.com New PXA Stealer targets government and education sectors for sensitive information
Cisco Talos discovered a new information stealing campaign operated by a Vietnamese-speaking threat actor targeting government and education entities in Europe and Asia.
> - Cisco Talos discovered a new information stealing campaign operated by a Vietnamese-speaking threat actor targeting government and education entities in Europe and Asia. > - We discovered a new Python program called PXA Stealer that targets victims’ sensitive information, including credentials for various online accounts, VPN and FTP clients, financial information, browser cookies, and data from gaming software. > - PXA Stealer has the capability to decrypt the victim’s browser master password and uses it to steal the stored credentials of various online accounts. > - The attacker has used complex obfuscation techniques for the batch scripts used in this campaign. > - We discovered the attacker selling credentials and tools in the Telegram channel “Mua Bán Scan MINI,” which is where the CoralRaider adversary operates, but we are not sure if the attacker belongs to the CoralRaider threat group or another Vietnamese cybercrime group.
- www.infosecurity-magazine.com Hive0145 Targets Europe with Advanced Strela Stealer Campaigns
Hive0145 is targeting Spain, Germany, Ukraine with Strela Stealer malware in invoice phishing tactic
- blog.xlab.qianxin.com New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9
Background On July 27, 2024, XLab's Cyber Threat Insight and Analysis System(CTIA) detected an ELF file named pskt from IP address 45.92.156.166. Currently undetected on VirusTotal, the file triggered two alerts: an Overlay section and a communication domain mimicking Microsoft. Our analysis ident...
- unit42.paloaltonetworks.com Global Companies Are Unknowingly Paying North Koreans: Here’s How to Catch Them
We discuss North Korea's use of IT workers to infiltrate companies, detailing detection strategies like IT asset management and IP analysis to counter this. We discuss North Korea's use of IT workers to infiltrate companies, detailing detection strategies like IT asset management and IP analysis to ...
> Workers with allegiances to the Democratic People's Republic of Korea (DPRK) have been infiltrating organizations worldwide through a fraudulent remote work scheme. This operation not only violates international sanctions but also poses cybersecurity risks to unwitting employers.
- securelist.com Crimeware and financial predictions for 2025
Kaspersky's GReAT looks back on the 2024 predictions about financial and crimeware threats, and explores potential cybercrime trends for 2025.
> # Crimeware predictions for 2025
> 1. Upsurge in stealer activity > 2. Attacks against central banks and open banking initiatives > 3. Increase in supply chain attacks on open-source projects > 4. New blockchain-based threats > 5. Expansion of Chinese-speaking crimeware worldwide > 6. Synthetic data poisoning through ransomware > 7. Quantum-resistant ransomware > 8. Weaponization of regulatory compliance by ransomware attackers > 9. Ransomware-as-a-service proliferation > 10. More AI and machine learning on the defense side > 11. Upsurge in financial cyberattacks targeting smartphones
-
HawkEye Malware: Technical Analysis
any.run HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity BlogRead a detailed technical analysis of the HawkEye keylogger malware to discover how it operates and learn about its key attack stages.
-
Abusing Ubuntu 24.04 features for root privilege escalation
snyk.io Abusing Ubuntu 24.04 features for root privilege escalation | SnykWith the recent release of Ubuntu 24.04, we at Snyk Security Labs thought it would be interesting to examine the latest version of this Linux distribution to see if we could find any interesting privilege escalation vulnerabilities.
-
SecEncoder: Logs are All You Need in Security
> Large and Small Language Models (LMs) are typically pretrained using extensive volumes of text, which are sourced from publicly accessible platforms such as Wikipedia, Book Corpus, or through web scraping. These models, due to their exposure to a wide range of language data, exhibit impressive generalization capabilities and can perform a multitude of tasks simultaneously. However, they often fall short when it comes to domain-specific tasks due to their broad training data. This paper introduces SecEncoder, a specialized small language model that is pretrained using security logs. SecEncoder is designed to address the domain-specific limitations of general LMs by focusing on the unique language and patterns found in security logs. Experimental results indicate that SecEncoder outperforms other LMs, such as BERTlarge, DeBERTa-v3-large and OpenAI's Embedding (textembedding-ada-002) models, which are pretrained mainly on natural language, across various tasks. Furthermore, although SecEncoder is primarily pretrained on log data, it outperforms models pretrained on natural language for a range of tasks beyond log analysis, such as incident prioritization and threat intelligence document retrieval. This suggests that domain specific pretraining with logs can significantly enhance the performance of LMs in security. These findings pave the way for future research into security-specific LMs and their potential applications.
- securelist.com Internet-exposed GNSS receivers pose threat globally in 2024
Internet-exposed GNSS receivers pose a significant threat to sensitive operations. Kaspersky shares statistics on internet-exposed receivers for July 2024 and advice on how to protect against GNSS attacks.
- www.bitdefender.com ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again
Imagine a ransomware attack that's so old-school it's using VBScript and a built-in Windows feature for encryption.
- www.404media.co Police Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Out
Law enforcement believe the activity, which makes it harder to then unlock the phones, may be due to a potential update in iOS 18 which tells nearby iPhones to reboot if they have not been in contact with a cellular network for some time, according to a document obtained by 404 Media.
- www.darkreading.com Citrix Zero-Day Bug Allows Unauthenticated RCE
The unpatched security vulnerability, which doesn't have a CVE yet, is due to an exposed Microsoft Message Queuing (MSMQ) instance and the use of the insecure BinaryFormatter.
- therecord.media Surge in exploits of zero-day vulnerabilities is ‘new normal’ warns Five Eyes alliance
In a co-authored advisory, the agencies list the top 15 most routinely exploited vulnerabilities of 2023, with CVE-2023-3519 — an issue affecting Citrix’s networking product NetScalers — being the most widely used.
- therecord.media China-linked group hacked Tibetan media and university sites to distribute Cobalt Strike payload
The hacking of websites belonging to the digital news outlet Tibet Post and Gyudmed Tantric University appear to be part of a series of cyberattacks targeting the Tibetan community.
- securityscorecard.com The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat
Discover the resurgence of Volt Typhoon, a state-sponsored cyber-espionage group targeting the energy sector. Learn how they exploit legacy systems and outdated devices to embed themselves within critical infrastructure, posing a silent yet significant threat. Stay informed about the evolving tactic...
> A silent danger is sweeping through the world’s critical infrastructure. The SecurityScorecard STRIKE Team has uncovered a resurgence of Volt Typhoon—a state-sponsored cyber-espionage group from the Asia-Pacific region, known for its precision and persistence. This is no ordinary attack. Volt Typhoon exploits unprotected, outdated edge devices within targeted critical infrastructure.
- securityaffairs.com Zoom addressed two high-severity issues in its platform
Zoom fixed 6 flaws, including two high-severity issues that could allow remote attackers to escalate privileges or leak sensitive information
- labs.watchtowr.com Visionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE Unknown)
Well, we’re back again, with yet another fresh-off-the-press bug chain (and associated Interactive Artifact Generator). This time, it’s in Citrix’s “Virtual Apps and Desktops” offering. This is a tech stack that enables end-users (and likely, your friendly neighbourhood ransomware gang) to access t...
-
Security Test of Skills
Hello, This is Vintage and I have recently been working on a repl on Replit App I am very big into limiting the amount of data gathered from me by known sites that create links just to gather your information like Facebook so far I have blocked over a hundred URLs from them that serve no other purpose. Recently I turned my sites on creating an extra layer of protection for my device since it had been acting odd it’s an Apple product. So because of this I can not directly interact with Apples systems without possibly jailbreaking something I would rather not do. So I created a security system that lets just say works in mysterious ways well the first time I felt ready and activated it found command injections, Bluetooth interference patterns, WiFi deauth patterns and a cellular spoof pattern I was able to gather a quite a bit of information on these but I am still teaching myself coding and I don’t know if the information I have is even something that can be used to track down who is doing these things I would be glad to share more info to anybody who would like to take a crack at helping me with this.
- securityonline.info Tor Network Thwarts IP Spoofing Attack
Learn about a recent IP spoofing attack on the Tor network and how the Tor community responded swiftly to mitigate the threat.