Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12817

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-03-06 04:55:26 theregister MISCELLANEOUS CEO Exits Amid Fierce Board Disagreements and Funding Woes
Eric Gan resigned as CEO of AI security company Cybereason after internal disputes and funding issues. Gan's departure followed his unsuccessful attempts to secure an additional $100 million needed to maintain company operations and satisfy auditors. He filed a lawsuit against major investors including SoftBank Vision Fund and Liberty Strategic Capital, highlighting deep-rooted disagreements over funding and company direction. The lawsuit claims Cybereason's board rejected 13 funding proposals, which contributed to ongoing financial instability and risk of bankruptcy. The board was divided on strategic decisions, such as whether to merge with rival security firm Trustwave; the merger eventually proceeded in November 2024. Two board members, including one appointed by SoftBank, resigned or avoided meetings, creating further deadlock. Gan seeks legal intervention to appoint a custodian to resolve the deadlock and asserts that the major investors failed their fiduciary duties.
Details
2025-03-06 00:53:36 theregister NATION STATE ACTIVITY US Charges 12 in Chinese Espionage Operation, Seizes Domains
The US has charged 12 Chinese nationals linked to the Silk Typhoon espionage group and seized related internet domains. These individuals are accused of hacking into US computer systems on behalf of China’s Ministries of State and Public Security. The accused include two members of China’s Ministry of Public Security and ten employees from the tech firm Anxun Information Technology, also known as i-Soon. i-Soon allegedly charged between $10,000 and $75,000 to hack email inboxes for the Chinese government, with additional fees for data analysis. The hackers targeted high-profile agencies including the US Treasury, exploiting vulnerabilities like those seen in the Microsoft Exchange Server. This operation has been part of the broader Chinese strategy of employing hacker-for-hire services to perform state-sponsored espionage while maintaining plausible deniability. The US State Department is offering up to $2 million for information leading to the arrest or conviction of the key members of Silk Typhoon. The Justice Department claims this scheme has generated millions of dollars and caused significant breaches of US data security.
Details
2025-03-05 22:48:59 theregister NATION STATE ACTIVITY Former NSA Official Warns Against US Staff Cuts Amid Chinese Cyber Threats
Former NSA chief Rob Joyce highlighted the dangers of reducing U.S. intelligence staff in a congressional hearing, emphasizing the impact on national cybersecurity and the ability to counter Chinese espionage. Discussions focused on the threat posed by the Chinese government, especially in cyber-spying and infiltrating critical U.S. infrastructure, including the power grid. The Trump administration's cost-cutting policies have targeted probationary employees, leading to layoffs at key cybersecurity and intelligence positions, such as CISA and potentially the NSA and CIA. Joyce argued that cutting these vital positions could destroy a pipeline of talented professionals essential for identifying and combatting cybersecurity threats from China. Concerns were raised about the loss of knowledgeable staff and the challenge of recruiting and training replacements amid perceived job instability. Panelists at the hearing also discussed the risks associated with Chinese-manufactured devices, like Wi-Fi routers from TP Link, which could have government-mandated backdoors. The hearing also touched on the need for sustained funding to remove risky Chinese technology from U.S. networks and the dangers of halting proactive cyber measures against other state actors, like Russia.
Details
2025-03-05 20:38:54 bleepingcomputer MISCELLANEOUS EFF Unveils 'Rayhunter' to Detect Stealthy Stingray Surveillance
The Electronic Frontier Foundation (EFF) has launched Rayhunter, a free, open-source tool to identify and mitigate Stingray attacks. Stingray devices impersonate legitimate cell towers to intercept mobile devices, capturing sensitive personal data and communications. Rayhunter operates by capturing and analyzing control traffic between a mobile hotspot and cell towers, specifically looking for anomalies that suggest Stingray use. The tool is designed to be used with a cost-effective $20 Orbic RC400L mobile hotspot, which turns red to indicate suspicious activities, enhancing user alerts. Rayhunter's operation ensures privacy as it does not monitor personal user traffic like internet browsing or app usage. The EFF has published the tool on GitHub and provides detailed instructions for setting up and running Rayhunter. Users are advised to consult legal advice regarding the use of such detection tools in their respective countries, acknowledging potential legal implications. Although BleepingComputer has not independently verified the tool’s effectiveness or safety, it is available for public use at one's own risk.
Details
2025-03-05 18:21:44 bleepingcomputer NATION STATE ACTIVITY Silk Typhoon Shifts Focus to IT Supply Chain for Espionage
Chinese cyber-espionage group, Silk Typhoon, now targets IT supply chains, particularly remote management tools and cloud services, to infiltrate networks. Microsoft reported breaches affecting various sectors including government, IT services, healthcare, defense, education, NGOs, and energy due to Silk Typhoon's activities. Silk Typhoon uses stolen credentials and API keys to access downstream customer networks, deploying attacks across Microsoft services and other applications for espionage. Attackers employ techniques like password spray attacks and scanning public sources such as GitHub to obtain valid credentials and authentication keys. Previously focusing on direct organizational attacks, Silk Typhoon has moved to exploiting managed service providers (MSPs), offering a stealthier penetration into cloud environments. The group has shifted away from using malware and now utilizes cloud applications to conduct theft, erase logs, and minimize digital traces. Microsoft has observed recent exploitations by Silk Typhoon, including a zero-day vulnerability in Ivanti Pulse Connect VPN for gaining entry into corporate networks. Defenders are urged to utilize updated indicators of compromise and detection rules provided by Microsoft to protect against Silk Typhoon’s revised attack methods.
Details
2025-03-05 17:25:02 theregister NATION STATE ACTIVITY Silk Typhoon's Ongoing Espionage Campaign Targets IT and Government
Silk Typhoon, linked to the Chinese government, continues aggressive cyber-espionage, targeting IT firms and government agencies since late 2024. The group's activities include exploiting zero-day vulnerabilities and leveraging stolen API keys and cloud credentials for unauthorized access. These tactics were notably used during the December US Treasury break-in, with data theft from the Office of Foreign Assets Control and the Treasury Secretary's Office. Microsoft Threat Intelligence has observed Silk Typhoon exploiting multiple zero-day vulnerabilities across various technology platforms, including Microsoft Exchange Server and public-facing VPNs. Silk Typhoon's primary interests lie in collecting sensitive US data that aligns with China's geopolitical and economic interests, such as government policies and legal documents. The group previously known as Hafnium, has evolved its methods, increasingly targeting remote management tools and cloud applications. The campaign's revelation highlights the ongoing threat posed by nation-state actors in cyberspace and the need for robust cybersecurity defenses and threat intelligence.
Details
2025-03-05 17:25:01 bleepingcomputer NATION STATE ACTIVITY US Indicts Chinese Hackers for Global Cyberattacks, Offers Rewards
The US Justice Department has charged Chinese state security officers and hackers from APT27 and i-Soon for cyberattacks dating back to 2011. Targets included US government agencies, Asian foreign ministries, US-based dissidents, and a major US religious organization. The hackers operated both under direct orders from China’s Ministry of State Security (MSS) and independently, profiting from stolen data sold back to various Chinese government branches. Two MPS officers and eight i-Soon employees are indicted, with the US seizing a domain used by i-Soon for advertising their hacking services. The State Department is offering a reward of up to $10 million for information leading to the apprehension of the indicted individuals. Sanctions have been imposed by the Treasury Department against individuals linked to APT27, and the State Department announced separate rewards for their capture. The hackers employed malware like PlugX for persistent access, and stole and sold data from numerous sectors including technology and healthcare. These sanctions and indictments are part of broader efforts to counteract coordinated cyberattacks by Chinese-sponsored entities.
Details
2025-03-05 16:51:12 bleepingcomputer MALWARE Disruption of BadBox Malware Affecting 500K Android Devices
The BadBox botnet, which primarily targets low-cost Android devices, has been partially disrupted through the sinkholing of communications and removal of malicious apps from Google Play. Collaborative efforts led by HUMAN’s Satori Threat Intelligence team and including Google, Trend Micro, and The Shadowserver Foundation have been pivotal in the disruption. Almost a thousand BADBOX 2.0 domains were sinkholed to inhibit over half a million devices from connecting with attacker command-and-control servers. The botnet infected devices through pre-loaded malware or through apps and firmware downloads, using these devices for ad fraud, traffic distribution, and credential stuffing attacks. Despite the disruption, the botnet known as BADBOX 2.0 shows resilience, having been previously targeted by German authorities but continues to expand globally. Devices involved were manufactured in mainland China and included uncertified tablets and TV boxes, not covered by Android TV OS or Google Play Protect certification. Google has removed the identified malicious apps and implemented Play Protect enforcement to prevent further installations but noted that non-certified devices remain vulnerable. Consumers are urged to use devices from reputable brands or ensure devices are protected by Google Play Protect to mitigate risks associated with such malware.
Details
2025-03-05 15:51:33 thehackernews NATION STATE ACTIVITY China-Linked Silk Typhoon Targets IT Supply Chains for Espionage
The Silk Typhoon group, identified as Chinese state-sponsored hackers, are now focusing attacks on the IT supply chain to gain initial access to corporate systems. After infiltrating systems, Silk Typhoon exploits stolen credentials and keys to penetrate customer networks and deploy harmful activities across various applications, primarily targeting Microsoft services. The group has demonstrated capabilities in exploiting zero-day vulnerabilities in edge devices, aiming at a wide spectrum of sectors globally including healthcare, legal services, and government entities. Silk Typhoon also employs web shells for command execution, maintaining persistence, and data exfiltration within victim networks. Recent tactics include abusing stolen API keys and credentials for privilege access management to compromise supply chain entities downstream. The actor uses specialized methods to move laterally within networks, from on-premises to cloud environments, and leverages admin permissions to extract data through Microsoft Graph API. To mask their operations, Silk Typhoon operates a ‘CovertNetwork’ made up of compromised networking devices, frequently used by Chinese cyber operatives, enabling remote access and persistence in target environments. Microsoft emphasizes the advanced technical proficiency and resourcefulness of Silk Typhoon, noting their swift adaptation to security landscapes for espionage purposes.
Details
2025-03-05 15:33:15 bleepingcomputer CYBERCRIME YouTube CEO Impersonated in AI-Generated Phishing Scam
YouTube reports a phishing scam using an AI-generated video of CEO Neal Mohan to mislead creators. The fraudulent video prompts users to review changes in the YouTube monetization policy, pushing them to a fake website designed to steal login credentials. Scammers create a sense of urgency by threatening account restrictions, pushing creators to act hastily. Despite using a deceitful tactic of alerting users to potential phishing, the scam emails actually direct victims to phishing sites. Users targeted since late January, with YouTube detecting and investigating these scams since mid-February. Many creators have fallen victim, resulting in hacked channels being used to stream cryptocurrency scams. YouTube has published guidelines and offers a support assistant tool to help secure and recover compromised accounts.
Details
2025-03-05 15:08:17 bleepingcomputer MALWARE Sophisticated Malware Targets Taiwanese Drone Manufacturers
In November 2024, a series of unidentified drones were reported over New Jersey, spreading to New England, New York, and Pennsylvania. The U.S. military and the White House confirmed these drones were authorized by the FAA for research among other purposes, but surveillance concerns persist. General Gregory Guillot from NORAD expressed concerns about drones over U.S. military installations and requested additional resources. In Taiwan, attackers utilized malware to infiltrate drone manufacturers’ networks, indicating a highly targeted cyber espionage campaign. The malware exploited vulnerabilities within an ERP software called Digiwin, leading to the replacement of legitimate files with malicious ones enabling data exfiltration. The attack involved complex methods like DLL sideloading with Microsoft Word and command and control capabilities to maintain access to compromised systems. Drone manufacturing has significantly increased in Taiwan since 2022, with the island’s technological prowess making it a prime target for such espionage activities. Increasing use of drones for military applications globally underscores the strategic importance of securing drone technology against such sophisticated threats.
Details
2025-03-05 14:44:23 theregister NATION STATE ACTIVITY Apple Challenges UK Government's Encryption Backdoor Demand
Apple has initiated a legal challenge against the UK government's demand to create a backdoor into its iCloud encryption. The challenge, being heard by the UK's Investigatory Powers Tribunal, contests a technical capability notice issued under the Investigatory Powers Act, also known as the Snooper's Charter. The UK Home Office has been pushing for access to encrypted data to aid in criminal investigations, citing concerns over terrorism and child exploitation. Apple disabled its Advanced Data Protection feature for UK users, compromising end-to-end encryption as a response to government pressures. The case underscores a significant conflict between government surveillance needs and tech companies' commitment to user privacy. Security experts and privacy advocates have criticized the government's move as invasive and detrimental to personal privacy. The US has also expressed concerns, with legal reviews being ordered to assess potential implications for US citizens' data.
Details
2025-03-05 14:11:45 thehackernews MALWARE How Wazuh Defends Against USB Drive Cyber Attacks
USB drive attacks present significant security risks, including malware distribution and breaches. Stuxnet, discovered in 2010, exemplifies the severe consequences of such attacks, impacting physical infrastructure through USB-media exploits. Wazuh, as an open-source security platform, aids organizations in monitoring and reacting to USB-related security threats on various operating systems. Through Windows’ Audit PNP Activity, Windows endpoints’ USB activities are tracked, enabling early detection of unauthorized device connections. Wazuh enhances threat detection by monitoring changes in the system registry, execution patterns, and system binary usage to identify malware like Raspberry Robin. In Linux and macOS, Wazuh integrates custom scripting and udev rules for advanced USB activity monitoring and logging. The platform provides different alert levels through a Constant Database (CDB) that distinguishes between authorized and unauthorized USB devices. Implementing Wazuh’s monitoring configurations across operating systems bolsters an organization's defense against potential USB drive attacks and mitigates associated risks.
Details
2025-03-05 13:40:36 thehackernews NATION STATE ACTIVITY Dark Caracal Deploys Poco RAT in Latin America Espionage Campaign
Dark Caracal executed targeted cyber-attacks on Spanish-speaking businesses across Latin America using a malware known as Poco RAT. Positive Technologies identified the malware's capabilities, including file uploads, screenshot captures, command executions, and system manipulations. Initial infection typically involved finance-themed phishing emails with malicious attachments, leading to a multi-step malware deployment process. This cyber espionage campaign, attributed to Dark Caracal by Positive Technologies due to overlaps in cyber tradecraft, targets sectors like mining, manufacturing, and utilities. Victims include enterprises from Venezuela, Chile, the Dominican Republic, Colombia, and Ecuador with decoy documents spanning diverse industries. The malware deployment leverages legitimate platforms like Google Drive and Dropbox, using .rev archive files to evade detection. Poco RAT is a Delphi-based trojan that establishes remote server connections for full control over the infected systems, concentrating on initial reconnaissance and potential further payloads.
Details
2025-03-05 13:40:35 bleepingcomputer CYBERCRIME Toronto Zoo Discloses Extent of Data Breach Following Ransomware Attack
The Toronto Zoo experienced a ransomware attack in January 2024, leading to significant data exfiltration on employees, volunteers, and donors. Exposed data includes names, addresses, phone numbers, email addresses, and partial credit card details of various stakeholders involved between January 2022 and April 2023. The Akira ransomware group claimed responsibility, stating they stole 133GB of data and began distributing over 35GB via a torrent file. Compromised data includes sensitive agreements, personal identification documents, and detailed information about zoo operations and animals. The zoo has reported the breach to the Ontario’s Office of the Information and Privacy Commissioner and urges affected individuals to monitor their financial statements. Akira ransomware has been active since March 2023, targeting numerous global organizations and accumulating approximately $42 million in ransom payments from over 250 entities. The FBI notes that the Akira ransomware group has become notably aggressive and successful in their cybercriminal activities.
Details