Article Details

Scrape Timestamp (UTC): 2025-03-10 09:54:33.377

Source: https://thehackernews.com/2025/03/thn-weekly-recap-new-attacks-old-tricks.html

Original Article Text

Click to Toggle View

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact. Cyber threats today don't just evolve—they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds—ranging from nation-state espionage and ransomware to manipulated AI chatbots—the landscape becomes increasingly complex, prompting vital questions: How secure are our cloud environments? Can our IoT devices be weaponized unnoticed? What happens when cybercriminals leverage traditional mail for digital ransom? This week's events reveal a sobering reality: state-sponsored groups are infiltrating IT supply chains, new ransomware connections are emerging, and attackers are creatively targeting industries previously untouched. Moreover, global law enforcement actions highlight both progress and persistent challenges in countering cybercrime networks. Dive into this edition to understand the deeper context behind these developments and stay informed about threats that continue reshaping the cybersecurity world. ⚡ Threat of the Week U.S. Charges 12 Chinese Nationals for Nation-State Hacking — The U.S. Department of Justice (DoJ) announced charges against 12 Chinese nationals for their alleged participation in a wide-ranging scheme designed to steal data and suppress free speech and dissent across the world. The defendants include two officers of the People's Republic of China's (PRC) Ministry of Public Security (MPS), eight employees of the company i-Soon, and two members of APT27. "These malicious cyber actors, acting as freelancers or as employees of i-Soon, conducted computer intrusions at the direction of the PRC's MPS and Ministry of State Security (MSS) and on their own initiative," the DoJ said. "The MPS and MSS paid handsomely for stolen data." How to Conduct an AI Risk Assessment [Free Guide] With new AI tools like DeepSeek popping up daily, it's critical to take a proactive approach to mitigating AI risks. This guide covers steps to help you: 🔔 Top News Trending CVEs The software you rely on every day can have hidden risks that hackers actively target. Staying safe means keeping up-to-date with the latest security patches before vulnerabilities become costly breaches. Here's this week's critical list of software vulnerabilities you should urgently patch or review to protect your systems — CVE-2025-25015 (Elastic Kibana), CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 (VMware), CVE-2024-50302 (Google Android), CVE-2025-0364 (BigAntSoft BigAnt), CVE-2024-48248 (NAKIVO Backup & Replication), CVE-2025-1723 (Zoho ADSelfService Plus), CVE-2025-27423 (Vim), CVE-2025-24494 (Keysight Ixia Vision), CVE-2025-1080 (LibreOffice), CVE-2025-27218 (Sitecore), CVE-2025-20206 (Cisco Secure Client for Windows), CVE-2024-56325 (Apache Pinot), CVE-2025-1316 (Edimax IC-7100), CVE-2025-27622, CVE-2025-27623 (Jenkins), and CVE-2024-41334 through CVE-2024-41340, CVE-2024-51138, CVE-2024-51139 (Draytek routers). 📰 Around the Cyber World 🎥 Expert Webinar Traditional AppSec is Broken—Watch This to See How ASPM Can Fix It Traditional AppSec tools often struggle with today's complex software environments, creating security blind spots. Application Security Posture Management (ASPM) promises to bridge these gaps by combining code-level insights and runtime context. But is ASPM the future or a passing trend? Join Amir Kaushansky from Palo Alto Networks to quickly grasp ASPM's real-world benefits—such as proactive risk management and reduced patching workloads. Get actionable insights and evaluate whether adopting ASPM can strengthen your organization's security posture. Secure your spot now to stay ahead of evolving threats. P.S. Know someone who could use these? Share it. 🔧 Cybersecurity Tools 🔒 Tip of the Week Get Defense Against Advanced 'Living off the Land' Threats — Hackers often misuse built-in tools like PowerShell (Windows) or common Linux utilities to quietly break into systems—this is called a "Living off the Land" (LotL) attack. A simple, effective defense is Binary Allowlisting via Checksums, which ensures only verified tools can run. For Linux users, create a trusted baseline by running this one-time command on a clean system: sudo find /usr/bin -type f -exec sha256sum {} \; > /root/trusted.sha256 Then, schedule hourly checks using cron (edit with sudo crontab -e) to verify these binaries: 0 * * * * sha256sum -c /root/trusted.sha256 2>&1 | grep -v ": OK$" && echo "Checksum mismatch detected!" | mail -s "Security Alert" you@example.com For Windows users, install the free, user-friendly security tool Wazuh, and enable its File Integrity Monitoring feature. It automatically alerts you if critical binaries like those in C:\Windows\System32 are unexpectedly changed or replaced. This quick, practical approach stops attackers from sneaking through unnoticed, greatly strengthening your overall security posture. Conclusion Cybersecurity isn't just about technology—it's about understanding patterns, staying alert, and connecting the dots. As you finish this newsletter, ask yourself: which dot might become tomorrow's headline, and are you ready for it? Stay informed, stay curious, and keep connecting.

Daily Brief Summary

NATION STATE ACTIVITY // U.S. Charges 12 Chinese Nationals in Hacking Scheme

The U.S. Department of Justice has charged 12 Chinese nationals linked to a comprehensive data theft and suppression of dissent worldwide.

Two of the accused are officers from China's Ministry of Public Security, with eight working for i-Soon and two affiliated with APT27.

These cyber actors engaged in hacking under direction from the Chinese Ministry of Public Security and Ministry of State Security, as well as independently.

Both Chinese ministries reportedly compensated the hackers significantly for procured sensitive data.

These charges underscore the ongoing complex cyber espionage efforts employed by nation-states, illustrating a persistent global threat.

The engagement of state employees in such activities highlights the state-sponsored nature of these intrusions into critical international data systems.

Global law enforcement continues to face significant challenges in detecting and mitigating the impact of organized, state-backed cybercrime networks.