CyberSecurity updates
Updated: 2024-10-21 23:04:18 Pacfic


Lawrence Abrams @ BleepingComputer
Internet Archive Users Receive Suspicious Emails and Messages from Compromised Account - 1d

Users of the Internet Archive have reported receiving suspicious emails and messages, indicating that the person(s) who compromised the archive still maintain persistent access. These messages include seemingly random content, such as photos of a cat and the N-word, suggesting potential disruption or harassment as a motive. The incident highlights the ongoing challenges faced by online platforms in combating persistent access and securing user data.

tomersp@checkpoint.com @ Check Point Research
Ransomware Attacks Target Healthcare and Manufacturing Sectors - 5h

In Q3 2024, cyberattacks surged globally, with an average of 1,876 attacks per organization. The Education/Research sector was the most targeted, while Africa faced the highest attack rates regionally. Ransomware incidents remained persistent, with North America experiencing 57% of the attacks. The Manufacturing and Healthcare sectors were particularly impacted by ransomware.

appgate.com
Direct-Routed ZTNA for Enhanced Security and FedRAMP Exemption - 4h

Direct-routed Zero Trust Network Access (ZTNA) offers a cutting-edge approach to network security by establishing a direct, encrypted connection between users and protected networks. Unlike traditional models, it bypasses intermediary points of presence (POPs) and internet-based services, ensuring granular control over network traffic and consistent access control. This method potentially exempts Federal agencies from FedRAMP certification, allowing them to deploy tailored solutions for their specific needs while still adhering to federal security standards.

microsoft.com
Akira Ransomware Continuously Evolving and Targeting Vulnerable Systems - 3h

Akira ransomware, a prominent threat actor, is continuously evolving its tactics and targeting vulnerable systems, particularly network appliances. Their latest ransomware encryptor targets both Windows and Linux hosts. Akira affiliates have been exploiting vulnerabilities in SonicWall SonicOS, Cisco ASA/FTD, and FortiClientEMS for initial access, followed by credential harvesting, privilege escalation, and lateral movement. The group’s recent shift back to encryption methods, coupled with data theft extortion, emphasizes their focus on stability and efficiency in affiliate operations.

info@thehackernews.com (The Hacker News) @ The Hacker News
Vulnerability in Roundcube Webmail Used for Phishing Attacks - 1d

A vulnerability in the open-source Roundcube webmail software has been exploited in phishing attacks. The flaw, tracked as CVE-2024-37383, allows attackers to steal user credentials by sending malicious emails that appear to be from legitimate sources. The vulnerability has been patched, but users of Roundcube webmail are advised to update their software immediately. Threat actors targeted user accounts of Roundcube Webmail users, specifically with the goal of stealing their login credentials. The attack involved sending emails with malicious links that, when clicked, would redirect users to a fake website designed to look like the real Roundcube login page. Users who entered their credentials on the fake website had them stolen by the attackers, compromising their accounts and potentially exposing sensitive data.

cocomelonc.github.io
Lucifer Block Cipher Implementation in Malware Development - 11h

This research explores the use of the Lucifer block cipher in malware development. It provides a detailed explanation of the Feistel network, the foundation of Lucifer, and its implementation in C code. The example code showcases the encryption and decryption of data blocks using Lucifer, demonstrating the potential for its application in malware. The research emphasizes the importance of understanding cryptographic algorithms in developing effective malware analysis and detection techniques.

microsoft.com
Akira Ransomware Continues to Evolve, Shifting Tactics and Targeting Both Windows and Linux Systems - 1h

Akira ransomware continues to evolve, adapting its tactics and targeting both Windows and Linux systems. The ransomware operators have recently shifted their focus to data exfiltration, leveraging vulnerabilities in network appliances and compromised VPN credentials for initial access. They are also experimenting with different programming techniques and refining their attack chain. This ongoing development makes Akira a persistent threat to both Windows and Linux-based enterprise environments.

thezdi.com
Pwn2Own Ireland 2024: A Comprehensive Contest Schedule - 2h

Pwn2Own Ireland 2024, the first Pwn2Own event held in Ireland, has announced a comprehensive schedule for the four-day contest. The event features a diverse range of targets, including smart speakers, printers, network attached storage devices, surveillance cameras, and mobile phones. Researchers and security experts from around the world are competing to identify and exploit vulnerabilities in these devices, showcasing the latest in vulnerability research and hacking techniques. The contest is expected to attract significant attention from the cybersecurity community and provide valuable insights into the evolving threat landscape.

securityintelligence.com
BlackCat Ransomware Returns as Cicada3301: A Case of Malware Evolution and Rebranding - 2h

The BlackCat ransomware, known for its Rust-based code and sophisticated attack techniques, went inactive after successfully extorting a $22 million ransom from Change Healthcare. The group cited law enforcement interference as the reason for its shutdown. However, a new ransomware strain, Cicada3301, has emerged with striking similarities to BlackCat, suggesting a possible rebranding or continuation of the same operation. Both strains use similar toolsets, share code similarities, and exhibit similar functionality, including methods for shadow copy deletion and tampering. The similarities between BlackCat and Cicada3301 raise concerns about the potential return of a highly effective and dangerous ransomware group.

thezdi.com
Pwn2Own Ireland 2024: Security Researchers Compete for Over $1,000,000 - 3h

The Zero Day Initiative (ZDI) is hosting Pwn2Own Ireland 2024, a prestigious security competition where researchers attempt to exploit vulnerabilities in various products. This year’s event features a diverse range of targets, including smart speakers, network attached storage, printers, and mobile phones. The competition will award over $1,000,000 in prizes to successful participants. Researchers will showcase their skills by finding and exploiting zero-day vulnerabilities, potentially leading to the discovery of crucial security flaws and improving product security.

paloaltonetworks.com
Palo Alto Networks' OT Security Solution: Safeguarding Industrial Environments with Precision AI - 3h

Palo Alto Networks has introduced advancements in its OT Security solution, leveraging the power of Precision AI to address the evolving risks in operational technology (OT) environments. The new Guided Virtual Patching solution, powered by Precision AI, offers risk-based protection for unpatched legacy OT assets, reducing exposure and securing hard-to-patch systems. This AI-driven approach leverages machine learning, deep learning, and generative AI to deliver real-time threat detection and prevention, minimizing downtime and ensuring operational resilience. Additionally, the new Prisma Access Browser and Privileged Remote Access feature extend Zero Trust Network Access (ZTNA) to OT environments, providing secure access to IT, OT, and cloud applications for distributed workforces.

Charles Adrian Marty @ Trend Micro Research, News and Perspectives
Zimperium’s Zero-Day Protection Against Water Makara Spear-Phishing Campaign - 4h

The Water Makara spear-phishing campaign, recently identified by Trend Micro, targets victims using social engineering tactics and obfuscated JavaScript files. The attack entices victims to click malicious links or download harmful attachments, ultimately leading to credential theft and data compromise. Zimperium’s on-device phishing detection engine effectively classified 100% of the malicious URLs in the campaign as malicious, identifying them in a zero-day capacity. This highlights the effectiveness of Zimperium’s AI-powered solution in delivering comprehensive, real-time protection against sophisticated phishing attacks.

do son @ Cybersecurity News
New Lynx Ransomware Leverages Similarities to INC Ransomware - 9d

The Lynx ransomware group is a newer ransomware-as-a-service (RaaS) actor that has claimed more than 20 victims since July 2024. This group has been using tactics similar to those of INC Ransomware. Lynx’s malware capabilities may enable effective data theft and exfiltration, remote control, and the potential for significant financial losses for victims. The similarities between Lynx and INC suggest that the groups may share resources or have common origins, raising concerns about a potential increase in ransomware activity. This trend highlights the evolving nature of the ransomware landscape and underscores the need for organizations to implement robust security measures to protect against such threats.

MalBot @ Malware Analysis, News and Indicators
Microsoft Security Logs Misplaced: A Major Security Incident - 4d

Microsoft has acknowledged a significant security incident that resulted in the loss of customer security logs for a month. The incident, attributed to a vulnerability, impacted various Microsoft services, including Microsoft Entra, Microsoft Sentinel, Azure Logic Apps, Azure Monitor, Azure Healthcare APIs, Azure Trusted Signing, Azure Virtual Desktop, and Power Platform.
This incident underscores the importance of robust security measures and the need for companies to promptly disclose security incidents to their customers. The lack of security logs during this period could pose significant risks for organizations relying on these services for security monitoring and threat detection.

Panda Security @ Panda Security Mediacenter
Genomics Company 23andMe to Pay Up to $10,000 Per Person to Victims of Data Breach - 7h

Genomics company 23andMe has agreed to pay victims of a data breach that occurred last year up to $10,000 per person. The breach, which affected seven million users, involved the theft of sensitive data, including genetic information, ethnic background, and contact details. The company will also provide three years of credit monitoring to affected users. The settlement highlights the growing concern over the security of personal data, particularly sensitive information like genetic data. The incident serves as a stark reminder of the need for robust security measures to protect sensitive information from unauthorized access.

CISA @ Alerts
Critical Vulnerabilities in Siemens, Rockwell Automation, and Delta Products: Impacting Industrial Control Systems (ICS) - 5h

Several critical vulnerabilities have been discovered in industrial control systems (ICS) products from Siemens, Rockwell Automation, and Delta Electronics. These vulnerabilities could allow attackers to execute arbitrary code, trigger denial-of-service conditions, or gain unauthorized access to sensitive information. One of the most concerning vulnerabilities is CVE-2024-41798, affecting Siemens’ SENTRON 7KM PAC3200 power monitoring device. This vulnerability exposes the device to brute-force attacks and unauthorized access through its Modbus TCP interface. Organizations using these ICS products are urged to prioritize patching and implementing robust security measures to mitigate the risks.

djohnson @ Cybercrime Archives
North Korean IT Worker Scheme Dupes Firms for Ransomware - 3d

North Korean threat actors have been using a sophisticated identity fraud scheme to infiltrate Western firms and gain positions as developers and other IT workers. They leverage fraudulent identities to dupe HR departments and obtain access to sensitive information, including trade secrets and critical data. This scheme is evolving, now involving extortion. After infiltrating a company, the threat actors steal trade secrets and hold them for ransom, demanding payment to avoid disclosure or damage to the company’s reputation. This tactic demonstrates a shift in North Korea’s cyber espionage activities, moving beyond data theft and towards financially motivated extortion. The scheme relies on well-crafted profiles and social engineering tactics to deceive HR departments, highlighting the importance of robust vetting processes and cybersecurity awareness training for employees.

do son @ Malware Archives
Beast Ransomware Targets Windows, Linux, and VMware ESXi - 18h

Beast Ransomware is a Ransomware-as-a-Service (RaaS) platform that has been actively targeting organizations since 2022. The ransomware targets Windows, Linux, and VMware ESXi systems, allowing attackers to encrypt files and demand payment for their decryption. Beast is known for its sophistication and ability to evade detection, making it a significant threat to organizations of all sizes. The ransomware operators use a variety of techniques to gain access to target systems, including phishing campaigns, exploiting vulnerabilities, and using stolen credentials. Organizations should take steps to protect themselves from Beast Ransomware by implementing strong security measures, keeping their software up to date, and training employees on how to identify and avoid phishing attacks.

Microsoft Threat Intelligence @ Microsoft Security Blog
New macOS Vulnerability, "HM Surf", Allows Attackers to Bypass Transparency, Consent, and Control (TCC) Protection - 4d

Microsoft Threat Intelligence has discovered a new macOS vulnerability, dubbed “HM Surf”, that allows attackers to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to protected user data. The vulnerability involves removing TCC protection for the Safari browser directory and modifying a configuration file to access user data, including browsing history, camera, microphone, and location, without user consent. Microsoft has reported the vulnerability to Apple, which has released a fix as part of a macOS security update. Users are urged to install the update as soon as possible to mitigate the risk. This vulnerability highlights the importance of keeping operating systems and applications updated to protect against emerging threats and the persistent challenges of maintaining robust security in complex software environments.


This site is an experimental news aggregator using feeds I personally follow. You can reach me using contacts documented at my website here (https://royans.net/) if you have feedback. You can also find Flathis at Mastodon.