Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12824

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-12-17 15:06:50 bleepingcomputer DATA BREACH Effective Strategies to Implement Mass Password Resets
Cybersecurity experts stress the inevitability of data breaches, highlighting the importance of preparedness, including the capability for mass password resets. Mass password resets are essential in various security incidents to mitigate unauthorized access from compromised user accounts. Transport for London (TfL) faced a significant cyber attack leading to operational disruptions and the mandatory in-person resetting of 30,000 employee passwords. The attack on TfL not only disrupted operations but also led to the theft of sensitive customer data, emphasising the need for robust security measures. Self-service password reset tools offer a practical alternative, allowing users to independently manage password changes without overwhelming IT resources. These tools reduce the operational burden on IT teams by enabling secure, remote password resets and incorporate multiple authentication methods, including biometric and SMS verification. Implementing user-friendly password management solutions can significantly enhance an organization's response to cyber incidents and bolster daily security protocols.
Details
2024-12-17 14:16:04 thehackernews MALWARE Stealthy Backdoor Delivered via Tax-themed Phishing in Pakistan
A sophisticated phishing campaign in Pakistan uses tax-related lures to deploy a stealthy backdoor malware using disguised MSC files. The attack begins with a deceptive email containing a MSC file masquerading as a PDF, aiming to trick users into executing malicious JavaScript code. The exploited MSC files, named "Tax Reductions, Rebates and Credits 2024," appear legitimate but contain an embedded DLL that executes covertly. Cybersecurity researchers from Securonix have named the operation FLUX#CONSOLE and have identified methods for maintaining persistence via scheduled tasks. The main functionality of the backdoor includes establishing a connection to a remote server for command execution and data exfiltration. Researchers highlight the sophistication of the malware, noting its use of deeply obfuscated code and evasion techniques. The attack highlight is the transition from using traditional LNK files to MSC files, marking a potential evolution in malware delivery methods. The campaign was disrupted 24 hours after the initial infection, demonstrating effective incident response despite the malware's complexity.
Details
2024-12-17 12:09:33 thehackernews MISCELLANEOUS Webinar Insight: Why Top Firms Get Hacked and Prevention Strategies
Even premier organizations with advanced security setups face breaches, highlighting an industry-wide challenge. Continuous innovation by attackers enables them to exploit unnoticed vulnerabilities in strong security frameworks. Webinar by John Paul Cunningham, CISO at Silverfort, focuses on identifying and mitigating hidden security risks. The session aims to move beyond adding tools and emphasizes understanding and addressing overlooked threats. Tailored for cybersecurity experts and business leaders, the webinar promises actionable insights into enhancing defense mechanisms. Participants will learn to preemptively close security gaps, potentially averting future breaches.
Details
2024-12-17 11:08:43 thehackernews NATION STATE ACTIVITY Bitter APT Uses Sophisticated Malware to Target Turkish Defense
A South Asian cyber espionage group, Bitter, targeted a Turkish defense organization using WmRAT and MiyaRAT malware in November 2024. The threat group, also known by names like TA397 and Orange Yali, has been active since 2013 and focuses on Asia, conducting cyber-espionage activities. Bitter's attack involved the use of a RAR archive containing a malicious LNK file which established a scheduled task for downloading additional payloads. The malware used allows for extensive surveillance capabilities including file management, taking screenshots, geolocation tracking, and executing commands. Bitter employs decoy content related to global infrastructure projects to lure victims into opening malicious files. The latest attack was part of Bitter's ongoing intelligence collection efforts likely supporting a South Asian government's interests. Previous attacks by Bitter have impacted various countries and have included the use of Android malware targeting government and defense entities.
Details
2024-12-17 10:53:18 thehackernews MISCELLANEOUS Enhance Security with Effective Cyber Threat Hunting Techniques
Implementing proactive threat hunting strategies greatly improves organizational security by preemptively identifying threats. Learning from regional threat exposures allows companies to anticipate and mitigate attacks more efficiently, using platforms like ANY.RUN for comprehensive threat data. Verifying suspicious network and system artifacts with detailed threat intelligence tools helps prevent potential financial and reputation damage. Utilizing tactics, techniques, and procedures (TTPs) enables organizations to stay ahead by understanding and adapting to evolving threat methods. Staying updated with threat evolutions through subscriptions in threat intelligence platforms ensures timely responses to new attack modalities. Third-party cyber threat reports are valuable, but conducting further personal investigations provides deeper insight into potential threats. ANY.RUN offers a sandbox environment for robust analysis and real-time updates on cyber threats, enhancing detection and prevention capabilities. A 14-day trial of TI Lookup from ANY.RUN is available, demonstrating the platform's utility in bolstering a company's cyber defense mechanisms.
Details
2024-12-17 09:07:10 thehackernews MALWARE CoinLurker Malware Uses Sophisticated Evasion Techniques in Cyber Attacks
CoinLurker, a new stealer malware, employs obfuscation and anti-analysis methods, including a multi-layered injector to evade detection. The malware, originating from deceptive software update alerts, utilizes Microsoft Edge Webview2 for the execution of its payload. Attack vectors include compromised WordPress sites, malvertising, phishing emails, fake CAPTCHA prompts, and direct downloads from fraudulent or infected sites. CoinLurker is written in Go and uses advanced techniques such as EtherHiding to retrieve payloads via Web3 infrastructures and masquerading as legitimate tools. The malware signs executables with stolen legitimate certificates, enhancing its ability to bypass security measures. Targets include cryptocurrency wallets, Telegram, Discord, and FileZilla, aiming to harvest valuable crypto-related data and user credentials. The malware's operations were part of broader malvertising campaigns targeting graphic designers and other professionals since November 13, 2024. CoinLurker's adaptability and versatility pose a significant threat to users in the cryptocurrency ecosystem, highlighted by its ability to blend into legitimate system activity.
Details
2024-12-17 06:55:47 thehackernews MALWARE The Mask APT Targets High-Profile Entities with Advanced Malware
The Mask APT, also known as Careto, has been active since 2007 and known for targeting high-profile organizations including governments and research entities. Kaspersky's recent analysis links The Mask to sophisticated cyber espionage operations in Latin America in 2019 and 2022. The threat actor initially infiltrates networks via spear-phishing, deploying zero-day browser exploits to install malware and redirect victims to benign websites. In a 2022 campaign, The Mask maintained persistence in an organization's network using a malicious extension in the WorldClient webmail component. The malware used in 2022 included FakeHMP, exploiting legitimate system drivers for payload injection and executing commands such as keystroke logging and file access. Previous 2019 attacks involved the use of malware frameworks Careto2 and Goreto for data exfiltration and remote command execution through cloud storage platforms. The Mask's diverse arsenal targets multiple platforms including Windows, macOS, Android, and iOS. The group's innovative techniques and evolving malware capabilities continue to pose a significant threat to targeted organizations.
Details
2024-12-17 06:05:08 theregister MISCELLANEOUS BlackBerry Sells Cylance Security Division to Arctic Wolf
BlackBerry has sold its Cylance endpoint security products to Arctic Wolf for $160 million, a significant loss compared to the purchase price of $1.4 billion in 2018. Arctic Wolf plans to enhance Cylance's technology by integrating it into their open-XDR Aurora platform, aiming to improve security operations and reduce alert fatigue. The transaction includes an $80 million payment at closing, $40 million due about a year later, and 5.5 million in Arctic Wolf shares. BlackBerry's CEO, John Giamatteo, expressed enthusiasm about the partnership with Arctic Wolf, indicating potential collaborative product development and ongoing reselling of the combined portfolio. Despite the financial loss on the sale, BlackBerry's move aligns with a focus on managed detection and response services, leveraging their ongoing relationship with Arctic Wolf. The deal led to an increase in BlackBerry's stock price by nearly 15% as investors responded positively to the news. This strategic sale marks a shift in BlackBerry’s focus, moving away from direct involvement with endpoint security products towards managed services and other security solutions.
Details
2024-12-17 05:49:45 thehackernews NATION STATE ACTIVITY Expanding Cyber Threats Involving HiatusRAT and Ransomware Campaigns
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities catalog with two new flaws actively exploited by cyber threat actors. FBI alerts indicate HiatusRAT now targets IoT devices like web cameras and DVRs, scanning for vulnerabilities and using weak passwords in multiple countries. Evidence from Forescout Vedere Labs and PRODAFT reveals over 20,000 DrayTek routers targeted in a sophisticated ransomware campaign involving multiple threat actors. The campaign leveraged a zero-day vulnerability for network infiltration, credential theft, and subsequent ransomware deployment by groups Monstrous Mantis, Ruthless Mantis, and LARVA-15. Ruthless Mantis successfully compromised at least 337 organizations primarily in the U.K. and the Netherlands, capitalizing on initial access provided by Monstrous Mantis. Forescout criticized the repetitive appearance of similar vulnerabilities in DrayTek’s devices, indicating insufficient root cause analysis and security maintenance by the vendor. Federal agencies are urged to apply remediation by January 6, 2025, to mitigate these vulnerabilities and protect against further exploits.
Details
2024-12-17 04:03:39 theregister NATION STATE ACTIVITY Australia Accelerates Shift from Legacy Encryption Due to Quantum Threats
Australia plans to phase out cryptographic algorithms including SHA-256, RSA, ECDSA, and ECDH by 2030, earlier than other nations, due to potential quantum computing threats. The Australian Signals Directorate (ASD) issued guidance for High Assurance Cryptographic Equipment, targeting the protection of sensitive data. U.S. National Institute for Standards and Technology (NIST) also recognizes the quantum threat, approving post-quantum cryptographic algorithms and setting a broader transition deadline by 2035. Legacy cryptographic methods, widely used in web connections and data integrity, are seen vulnerable to future quantum computers that could break these encryptions effortlessly. Despite the urgent timeline, there is concern about the practical challenges of transitioning away from these entrenched cryptographic standards within the next few years. Australia's quick transition period may impact government agencies and necessitate significant updates to cryptography-dependent systems. The decision underscores global urgency in updating and securing cryptographic standards against advanced quantum decryption capabilities.
Details
2024-12-16 23:51:18 theregister RANSOMWARE Cleo Software Exploited Despite Patch Updates by Cl0p Gang
Cleo, a software vendor, urged customers to update their Harmony, VLTrader, and LexiCom products following a bypass of an October patch by ransomware attackers. The cybercriminal group Cl0p, linked to Russia, claimed responsibility for the attacks that exploited a remote code execution vulnerability originally patched in October. Security researchers from Huntress discovered that even fully patched systems were still vulnerable, leading to at least ten businesses being compromised. A new malware strain, Malichus, was identified by researchers exploiting the flaw in Cleo's software. Cleo released further patches (version 5.8.0.24) to address a new vulnerability, CVE-2024-55956, which was a bypass of the initial bug, CVE-2024-50623. The US Cybersecurity and Infrastructure Security Agency (CISA) has added the Cleo bug to its catalog of Known Exploited Vulnerabilities and identified it as involved in ransomware campaigns. Cl0p's possible involvement remains speculative as security analysts wait for more definitive evidence linking them to the ongoing exploits. Patterns of exploitation fit Cl0p’s historical modus operandi, suggesting the likelihood of their involvement in these ransomware attacks.
Details
2024-12-16 22:25:09 bleepingcomputer MALWARE FBI Issues Alert on HiatusRAT Malware Targeting IoT Devices
The FBI has issued a warning about the HiatusRAT malware, which now actively targets vulnerable web cameras and DVRs. HiatusRAT scans for specific vulnerabilities in IoT devices, primarily focusing on Chinese-branded devices awaiting security patches or those out of support. Affected devices include prominent brands like Hikvision and Xiongmai, particularly those with telnet access. The malware exploits a range of known vulnerabilities and uses tools like Ingram for scanning and Medusa for brute-force attacks. The FBI recommends isolating the affected devices from networks and limiting their usage to prevent breaches and block lateral movements after infection. There is an urgent call for network administrators to report any signs of compromise to the FBI's Internet Crime Complaint Center. This alert follows other HiatusRAT attacks including one targeting a Defense Department server and another infecting hundreds of commercial VPN routers across multiple continents. The malware's activities align with Chinese strategic interests, according to the Office of the Director of National Intelligence’s 2023 threat assessment.
Details
2024-12-16 22:19:54 bleepingcomputer DATA BREACH Texas Tech University System Suffers Major Data Breach
Texas Tech University Health Sciences Center and its El Paso counterpart experienced a significant cyberattack, impacting 1.4 million patients. The breach, confirmed in September 2024, involved unauthorized access and removal of files and folders from the organization's network. Personal and medical information of patients was potentially exposed; the exact information varies per individual. The cyberattack caused temporary disruptions to computer systems and applications, leading to an investigation by the university. The breach was publicly claimed by the Interlock ransomware group, which leaked 2.6 TB of stolen data on the dark web. Texas Tech University has begun notifying affected individuals and is offering free credit monitoring services to mitigate potential damages. The university advises all impacted parties to monitor their financial and health statements and to stay vigilant of phishing attempts.
Details
2024-12-16 21:34:14 bleepingcomputer MISCELLANEOUS Kali Linux 2024.4 Introduces New Tools and Drops Old Support
Kali Linux 2024.4, the final version for the year, includes 14 new tools aimed at improving functionality for cybersecurity professionals. Significant updates include enhanced support for Raspberry Pi, the introduction of a new default Python version (3.12), and the end of support for i386 images, aligning with Debian’s recent changes. The deprecated i386 architecture will no longer have new images or kernels created, although i386 packages remain accessible for use on 64-bit systems. OpenSSH in Kali Linux now deprecates SSH DSA keys, supporting older keys via a legacy SSH1 client to maintain compatibility with older systems. Updates to the desktop environment include Gnome 47, which offers expanded customization options such as new accent colors and system-monitor panel extensions. Added features specifically enhance the ease of setting up Raspberry Pi via pre-configurations in the Raspberry Pi Imager. Kali Linux users are advised to upgrade their systems to benefit from the new tools and improvements; detailed instructions and changelogs are available on the Kali website.
Details
2024-12-16 19:53:01 bleepingcomputer MALWARE Critical Windows Kernel Bug Actively Exploited, CISA Issues Alert
CISA has alerted U.S. federal agencies about ongoing attacks exploiting a severe Windows kernel vulnerability, identified as CVE-2024-35250. This vulnerability involves an untrusted pointer dereference in the Microsoft Kernel Streaming Service, granting attackers SYSTEM privileges without needing user interaction. Originally discovered by DEVCORE and reported via Trend Micro’s Zero Day Initiative, the flaw was publicly disclosed after being exploited in the Pwn2Own 2024 contest. Microsoft patched the vulnerability in their June 2024 Patch Tuesday update, but details on the exploit were only released four months later on GitHub. A separate critical Adobe ColdFusion vulnerability (CVE-2024-20767) was also noted by CISA as actively exploited, affecting systems with exposed admin panels. Federal agencies are required to secure their networks against these vulnerabilities by January 6, under Binding Operational Directive (BOD) 22-01. CISA advises both federal and private entities to prioritize remediation efforts to protect against these vulnerabilities, highlighting the broad risk to cybersecurity infrastructure.
Details