Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12782
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2025-04-30 21:07:27 | bleepingcomputer | MALWARE | Malicious WordPress Plugin Masks as Security Tool, Injects Malware | A new malware campaign targets WordPress websites using a deceptive plugin that pretends to be a security enhancement.
The crafted plugin, once installed, allows attackers persistent site access, capability to execute remote code, and JavaScript injection while avoiding detection.
Wordfence researchers discovered altered WordPress core files which autonomously recreate the malicious plugin if deleted.
The entry point for the infection is believed to be compromised hosting accounts or FTP credentials, with the exact method still unclear.
The malware provides unauthorized administrator access and can modify site contents by embedding PHP code or malicious JavaScript in site headers.
Warning signs of infection include specific changes to 'wp-cron.php' and 'header.php' files, and suspicious administrator actions traceable via access logs.
The command and control server of this malware is based in Cyprus, with operational characteristics similar to previously seen supply chain attacks. | Details |
| 2025-04-30 19:09:21 | theregister | NATION STATE ACTIVITY | Ex-CISA Chief Criticizes Budget Cuts and Loyalty Demands Under Trump | Jen Easterly, former head of CISA, highlighted the negative impact of budget and personnel cuts on U.S. cyber defense at an RSA Conference event.
Easterly criticized the prioritization of loyalty to President Trump over allegiance to the U.S. Constitution within the agency.
She asserted that cybersecurity is an imperative national security issue, urging that it should remain non-partisan.
The cutbacks are seen as diminishing America's ability to combat evolving and serious cyber threats, including those from state actors.
CISA's role in election security, which represents a small fraction of the overall budget, was defended as vital to protecting the integrity of U.S. elections.
Claims against former CISA director Chris Krebs by Trump were mentioned as examples of the administration's undermining of truthful election security information.
Easterly expressed concerns over the long-term impacts on national security due to the weakening of CISA's operational capabilities. | Details |
| 2025-04-30 19:09:20 | bleepingcomputer | MISCELLANEOUS | WhatsApp Introduces 'Private Processing' for Enhanced AI Privacy | WhatsApp has launched 'Private Processing', a new feature allowing users to utilize AI capabilities without compromising privacy.
The feature is optional and leverages privacy-preserving cloud servers to handle compute-intensive AI tasks like message summarization.
Private Processing includes several layers of security: anonymous authentication, public encryption keys for anonymity, and connections through third-party relays to mask IP addresses.
Data is processed in a Confidential Virtual Machine (CVM) at Meta, with assurances that it remains stateless and all user data is deleted post-processing.
Meta will provide transparency by sharing the CVM binary and some source code, and will publish a detailed white paper outlining the feature's secure design.
Despite robust security measures, there is inherent risk involved when sensitive data is processed outside the device, hence the feature remains non-mandatory. | Details |
| 2025-04-30 18:08:26 | theregister | CYBERCRIME | Maryland Man Pleads Guilty to Outsourcing Government IT Work | Minh Phuong Ngoc Vong, a Vietnamese-born naturalized US citizen, admitted to conspiracy to commit wire fraud, involving a scheme that grossed over $970,000 by falsely obtaining IT contract work.
He outsourced his contract work, intended for the Federal Aviation Administration and other federal entities, to a developer in China claiming to be North Korean.
Vong misrepresented his qualifications and used another person's credentials to secure jobs with US companies, including projects concerning national defense.
The fraudulent activities included installing remote software on a company-issued laptop to allow the overseas developer undisclosed access to sensitive US government systems.
Vong's actions led to unauthorized foreign access to confidential government data, risking national security.
The revelation highlights broader issues of foreign nationals posing as US IT workers, potentially for motives of financial gain or espionage.
This case is part of a worrying trend where foreign IT professionals, aided by locals, use elaborate schemes to penetrate national systems.
Vong is facing up to 20 years in prison, with his sentencing scheduled for August. | Details |
| 2025-04-30 17:29:06 | bleepingcomputer | CYBERCRIME | SonicWall Alerts on Exploitation of VPN Security Vulnerabilities | SonicWall issued warnings about active exploitation of vulnerabilities in its SMA appliances.
The vulnerabilities, CVE-2023-44221 and CVE-2024-38475, affect SMA 200, 210, 400, 410, and 500v models.
CVE-2023-44221 allows command injection with admin privileges, while CVE-2024-38475 enables unauthenticated code execution.
Both security flaws are deemed severe, with CVE-2024-38475 identified as critical and potentially used for session hijacking.
Firmware version 10.2.1.14-75sv and later patches these vulnerabilities.
SonicWall's PSIRT urges customers to check SMA devices for unauthorized access and ensure firmware is updated.
Historical context includes the exploitation of another high-severity flaw, CVE-2021-20035, affecting SMA100 VPN appliances.
CISA has highlighted the continuous risk by adding CVE-2021-20035 to its Known Exploited Vulnerabilities catalog. | Details |
| 2025-04-30 16:23:30 | bleepingcomputer | NATION STATE ACTIVITY | Commvault Confirms Nation-State Attack on Azure, No Data Breached | Commvault reported a security breach in its Azure environment by a nation-state actor, confirmed on March 7, 2025.
Microsoft alerted Commvault of suspicious activities on February 20, which led to the discovery of the breach.
The incident affected a limited number of Commvault customers and did not disrupt overall business operations.
No customer backup data was accessed or compromised during the attack.
Commvault is working with cybersecurity firms and coordinating with the FBI and CISA to manage the situation.
A recent zero-day vulnerability (CVE-2025-3928) in Commvault software was patched; however, this vulnerability was exploited in the attack.
Commvault recommends customers enhance security by monitoring sign-in activities and rotating credentials every 90 days.
CISA included the CVE-2025-3928 in its Known Exploited Vulnerabilities Catalog, mandating federal agencies to secure their Commvault software by May 19, 2025. | Details |
| 2025-04-30 16:03:57 | thehackernews | CYBERCRIME | New AI Protocols Vulnerable to Data Hijacking and Exfiltration | Critical vulnerabilities identified in the Model Context Protocol (MCP) and Agent2Agent (A2A) Protocol can lead to AI tool hijacking and data breaches.
MCP, designed to integrate Large Language Models with external data, is susceptible to prompt injection attacks and tool poisoning, compromising the security of AI applications.
Attackers could exploit MCP to instruct AI tools to perform unauthorized actions such as sending sensitive data to malicious entities.
A2A protocol, enabling communication between AI agents, is prone to attacks where compromised agents exaggerate capabilities to hijack data requests.
Such vulnerabilities could allow unauthorized data access and manipulation, posing significant risks to user privacy and data security.
Research underscores the need for enhanced security measures and explicit user approvals before running AI tools in MCP host applications.
Security communities and developers are urged to address these vulnerabilities to prevent potential exploitation and ensure the safety of AI integrations in data-sensitive environments. | Details |
| 2025-04-30 16:03:57 | bleepingcomputer | CYBERCRIME | FBI Releases 42,000 Phishing Domains From LabHost Platform | The FBI has publicized a list of 42,000 phishing domains associated with the LabHost cybercrime platform following its takedown in April 2024.
LabHost, launched in 2021, became a leading phishing-as-a-service provider by late 2023, targeting primarily U.S. and Canadian banks.
The platform offered customized phishing kits with advanced features like two-factor authentication bypass and automatic SMS interactions for $179 to $300 per month.
During its operation, LabHost accrued over 10,000 customers globally and was responsible for the theft of approximately one million user credentials and 500,000 credit card records.
A coordinated international law enforcement operation involving 19 countries culminated in the arrest of 37 individuals connected to LabHost and the platform's shutdown.
The disclosed domains are not currently active in cyber attacks but serve as valuable resources for cybersecurity professionals to enhance defense systems and detect potential past breaches.
The list may contain errors and is not exhaustive, potentially leading to the discovery of further malicious domains linked to the same infrastructure. | Details |
| 2025-04-30 15:14:46 | theregister | MISCELLANEOUS | FBI Tackles Rising Trend of Dangerous Political Swattings | The FBI launched an awareness campaign to address the spike in high-profile swatting incidents, following recent attacks targeting public figures and families involved in political and racial controversies.
Swatting involves hoax calls to emergency services reporting severe crimes, prompting an immediate armed response against innocent individuals and places such as schools and hospitals.
Incidents of swatting have had serious consequences, including the death of individuals like Andrew Finch in 2017 and Mark Herring in 2021 due to responses to false threats.
Various swatting cases have been reported recently, including those affecting podcasters like Nick Sortor and Shawn Farash, and political figures such as Congresswoman Marjorie Taylor Greene.
FBI Director Kash Patel emphasized that swatting is a serious crime, not a prank, and announced efforts to hold perpetrators accountable without political bias.
Current U.S. laws treat swatting under general criminal offenses like stalking and fraud, with ongoing legislative efforts to enact more specific laws against it.
The FBI provided guidelines on how the public can protect themselves from becoming victims of swatting, urging vigilance and immediate reporting of any threats. | Details |
| 2025-04-30 14:18:33 | bleepingcomputer | CYBERCRIME | UK Co-op Disrupts IT Operations Following Hack Attempt | British supermarket chain Co-op detected an unauthorized intrusion attempt on their network, prompting a partial shutdown of IT systems.
The attack impacted back office and call center operations, but core store functions, quick commerce, and funeral homes remain unaffected.
Co-op has not disclosed if the attempted hack was successful or the specific details of the intrusion.
This incident is part of a larger pattern of cyberattacks targeting UK retailers, including a recent hack at Marks & Spencer.
Following the attack, Marks & Spencer had to suspend online orders, attributing the disruption to the "Scattered Spider" group using DragonForce ransomware.
Co-op has over 3,700 branches and an annual revenue of about $10 billion, with a membership base exceeding 6 million.
No claims of responsibility for the Co-op attack have emerged from any cybercriminal groups yet. | Details |
| 2025-04-30 13:46:18 | thehackernews | NATION STATE ACTIVITY | Russian Cyber Espionage Group Targets NATO with Advanced Malware | Nebulous Mantis, a Russian-speaking cyber espionage group, has been deploying RomCom RAT malware since mid-2022 targeting NATO-associated entities.
Researchers from Swiss cybersecurity firm PRODAFT have identified the use of advanced evasion techniques by RomCom, including living-off-the-land tactics, encrypted command and control communications, and constant evolution of infrastructure using bulletproof hosting.
The malware distributes through spear-phishing emails containing links to weaponized documents, primarily focusing on critical infrastructure, government sectors, and political leaders.
Attack infrastructures are managed by a threat actor known as LARVA-290, with command-and-control servers hosted on services like LuxHost and Aeza.
The RomCom RAT malware framework facilitates system reconnaissance, lateral movements, data theft such as web browser information, files, credentials, and Microsoft Outlook backups.
The malware additionally conducts system environment discovery to align attack timings with the victim's operational hours, enhancing the stealth and effectiveness of the attacks.
Nebulous Mantis employs a multi-stage attack methodology aiming at initial access, execution, persistence, and exfiltration while maintaining a minimally invasive presence to avoid detection. | Details |
| 2025-04-30 13:30:57 | bleepingcomputer | DATA BREACH | Ascension Healthcare Reports Data Theft from Former Partner | Ascension, a major U.S. healthcare network, has alerted patients of a data breach involving a former business partner following a December 2024 hacking incident.
Sensitive patient data compromised includes names, addresses, Social Security numbers, and detailed medical information.
The data breach was linked to a vulnerability in third-party software, which was likely exploited in a series of Clop ransomware attacks.
Ascension, which operates 142 hospitals and employs over 142,000 people, discovered the breach on December 5, 2024, and confirmed the exposure by January 21, 2025.
The specific number of affected individuals has not been fully disclosed, although at least 96 residents in Massachusetts were confirmed impacted.
In response to the breach, Ascension is offering two years of free identity monitoring services to the affected patients.
This incident is part of a recurring pattern, following a previous notification last year where nearly 5.6 million patients and employees were affected by a ransomware attack enabled by an employee's error. | Details |
| 2025-04-30 11:30:23 | thehackernews | CYBERCRIME | Webinar on Protecting Identity Systems Against AI Threats | The upcoming webinar by Beyond Identity and Nametag aims to educate on securing identity systems against AI-powered threats.
Traditional security measures are insufficient as attackers utilize deepfakes, impersonation, and AI-driven social engineering to bypass them.
Attackers can easily infiltrate systems not by hacking, but by appearing as legitimate users, taking over accounts and causing significant, undetected damage.
The webinar will highlight the overlooked gaps in the identity lifecycle including user enrollment, recovery, and routine access which are often unprotected.
It will provide actionable steps to secure these vulnerabilities and protect data and business operations.
This session is particularly geared towards professionals managing identity systems, security operations, and designing access controls.
Participants will learn strategies to close security gaps and enhance defenses before attackers exploit them. | Details |
| 2025-04-30 11:08:45 | thehackernews | NATION STATE ACTIVITY | Chinese APT Group Exploits IPv6 for Lateral Movement Attacks | A China-aligned APT group, TheWizards, uses Spellbinder to facilitate AitM attacks via IPv6 SLAAC spoofing, intercepting software traffic for malicious downloads.
Spellbinder allows attackers to hijack the update process of Sogou Pinyin, pushing a malicious downloader that installs a backdoor called WizardNet.
Similar tactics were previously used by other Chinese hacking groups, exploiting software update mechanisms of well-known Chinese software.
TheWizards targets individuals and sectors across Hong Kong, Cambodia, mainland China, the Philippines, and UAE using Spellbinder since at least 2022.
Attack methodology involves malicious ZIP files containing a rigged executable and DLL file to sideload malware, leveraging IPv6 protocol vulnerabilities.
In a specific 2024 attack instance, the DNS query of Tencent QQ was manipulated to deploy a trojanized update, indicating a pattern of software update hijacking.
Another tool named DarkNights, linked to a different Chinese group and supplied by Sichuan Dianke Network Security, involves coordination across multiple APTs.
This strategic continuity in exploiting software updates and IPv6 networking highlights a sophisticated, persistent threat from Chinese-affiliated cyber operatives. | Details |
| 2025-04-30 10:33:53 | thehackernews | CYBERCRIME | Addressing the Surge in Multi-Billion Dollar Account Takeovers | Account takeover (ATO) incidents occur when attackers gain unauthorized access to customer accounts, often reselling the credentials on the digital black market.
Flare's report indicates a significant impact of ATOs on industries like e-commerce, gaming, and streaming, with over 100,000 accounts compromised monthly.
A key technique used by attackers is session hijacking, which bypasses multi-factor authentication (MFA) by stealing and using session cookies.
The economic impact of ATOs includes costs associated with labor, fraud, and customer churn, significantly affecting business revenue.
Flare’s data shows a 26% increase year-over-year in credential theft and session cookie exposures.
Recommendations for preventing ATOs include monitoring the infostealer ecosystem, detecting and remediating exposed accounts, and adopting a security-first approach with clear communication to customers.
Many victims of ATOs are not notified by their companies, undermining trust and potentially increasing customer churn. | Details |