Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12815

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-10-18 04:30:26 theregister NATION STATE ACTIVITY North Korean IT Imposters Steal Data, Demand Ransom
Companies are inadvertently hiring North Korean operatives posing as IT contractors, leading to data theft and ransom demands. Secureworks has identified this as a recurring pattern in multiple investigations, linking the scams to North Korea’s Nickel Tapestry operation. The recent development in this scheme includes the use of extortion, demanding six-figure ransoms paid in cryptocurrency, significantly altering the risk profile for businesses. Nickel Tapestry uses tactics like falsifying worker identities, redirecting delivery addresses for laptops, and using unauthorized remote access tools. Forensic investigations reveal the use of virtual video software and VPNs to disguise operatives' identities and locations. Businesses are advised to verify potential hires thoroughly, conduct in-person interviews, restrict usage of unsanctioned software, and maintain diligent oversight of financial transactions. Repeated security breaches have prompted reminders for companies to be cautious of too-good-to-be-true job applicants and to implement stringent hiring processes.
Details
2024-10-18 01:01:35 theregister NATION STATE ACTIVITY U.S. Offers $10M Reward to Combat Russian Election Meddling Efforts
The U.S. government has issued a $10 million bounty for information on Russian media network Rybar implicated in election interference in the U.S. Rybar uses social media tags like #HOLDTHELINE and #STANDWTHTEXAS to promote pro-Russian political interests tied with pro-Republican stances in the U.S. Accounts like TEXASvsUSA on platform 'X' (formerly Twitter), now banned, were used by Rybar to foment discord regarding immigration and racial issues in the U.S. Rewards for Justice program targets Rybar staff for their roles in disseminating pro-Russia narratives, including nine key members identified for critical information on their operations. Rybar, allegedly backed by Russian defense firm Rostec, pushes anti-West sentiments via platforms like Telegram and publishes content favorable to Russian political aims. U.S. intelligence links Rybar’s operations directly to Russian attempts to influence U.S. elections, potentially aiming for a political environment favorable to Russian interests. Recent global cyber surveillance reports have indicated increased threats of election interference from hostile nations, particularly Russia and Iran, exploiting digital vulnerabilities. The U.S. has strengthened efforts against election meddling following underpreparedness acknowledgements by U.S. officials, reinforcing defenses against cyber threats and misinformation.
Details
2024-10-17 23:34:40 theregister CYBERCRIME Globe Life Faces Extortion Over Data Leak Amid Other Troubles
Globe Life Insurance reported an extortion attempt following a data breach, impacting an estimated 5,000 customers primarily from its subsidiary American Income Life Insurance Company (AIL). The stolen data includes sensitive personal information such as social security numbers and health data, but no financial information was disclosed. The threat actor solicited money from Globe Life, threatening to release the information unless paid but did not employ ransomware or disrupt company operations. The security breach ties back to a previously identified misconfiguration in a company web portal that likely allowed unauthorized data access. Globe Life has announced that the extortion attempt will not impact its business or systems but has further fueled controversies involving short sellers and ongoing legal issues. Short sellers had earlier accused Globe Life of fraud and unethical workplace behavior, which was later supported by findings from the US Equal Employment Opportunity Commission. The insurance provider's stock value has suffered a considerable drop following these revelations and controversies.
Details
2024-10-17 22:18:02 bleepingcomputer DATA BREACH Microsoft Warns Customers of Critical Security Log Loss
Microsoft has informed enterprise customers about a critical issue where security logs were not collected for nearly a month due to a bug. The log data loss occurred between September 2 and September 19, potentially extending to October 3 for certain services, increasing the risk of undetected cybersecurity attacks. The bug was introduced unintentionally while fixing another issue in the log collection service, leading to a deadlock that prevented log data uploads. Impacted services faced varying degrees of log disruption, and not all logs were recoverable due to size limitations of the local agent’s cache. After detection, Microsoft corrected the issue and notified all customers, although some reports suggest that not all affected companies were informed. Last year, Microsoft faced criticism for insufficient free log data for breach detection and subsequently expanded its free logging capabilities in 2024 in collaboration with CISA and other U.S. agencies. The situation emphasizes the importance of effective and reliable logging systems for security breach detection and response in enterprise environments.
Details
2024-10-17 21:01:34 bleepingcomputer MALWARE Social-Engineered Malware Spreads Through Fake Google Meet Errors
Cybersecurity firm Proofpoint first reported the social-engineering tactic known as ClickFix in May, involving faux connectivity errors prompting malware installation. ClickFix campaigns, increasing in frequency particularly in the U.S. and Japan, now utilize Google Meet invitations to deliver info-stealing malware via deceptive links. Victims encountering fake errors on these pages are tricked into copying and executing PowerShell code that deploys malware like DarkGate and Amadey Loader. Recent Threat Intelligence from Sekoia indicates that these malware campaigns are associated with larger cybercriminal groups focused on cryptocurrency scams. These malware payloads include Stealc and Rhadamanthys targeting Windows, and AMOS Stealer targeting macOS systems. The threat actors have also expanded their attacks to include other platforms such as Zoom, PDF readers, and various online applications, creating a broad threat landscape.
Details
2024-10-17 18:23:02 bleepingcomputer CYBERCRIME Alabama Man Arrested for Hacking SEC Twitter, Faking Bitcoin ETF Approval
Eric Council, 25, from Alabama, was arrested for hacking the SEC's Twitter account and making a false announcement regarding the approval of Bitcoin ETFs. The Department of Justice revealed that Council and accomplices executed a SIM-swap attack to impersonate the SEC account manager and gain unauthorized access. The fraudulent tweet claimed the SEC had approved Bitcoin ETFs, causing an immediate $1,000 spike in Bitcoin's price before it dropped $2,000 following the exposure of the hack. The SEC confirmed that the unauthorized access was gained through a SIM-swapping attack, but their internal systems and other accounts remained secure. The attack involved the creation of a fraudulent identification document and illegally taking over the victim's cellular account. Following the incident, it was advised that mobile users employ carrier-provided protections to prevent unauthorized SIM swapping. Eric Council has been charged with conspiracy to commit identity theft and access device fraud, which could result in up to five years in prison.
Details
2024-10-17 18:02:20 bleepingcomputer NATION STATE ACTIVITY North Korean IT Workers Employed to Steal and Extort Companies
North Korean IT professionals, posing as contractors, are infiltrating Western companies, stealing data, and demanding ransom not to leak the information. The strategy involves using stolen or fake identities and technology such as laptop farms and VPNs to disguise their true location and activities. Secureworks has identified these operatives under the name "Nickel Tapestry," with North Korea dispatching these workers to support its weapons programs financially. Companies affected by these schemes have experienced theft of proprietary data shortly after hiring these undercover workers, followed by ransom demands delivered through anonymous emails. Secureworks and other cybersecurity firms recommend increased vigilance in hiring practices for remote workers and suggest monitoring for signs of fraud and unusual activity. Tools used by these operatives include Astrill VPN and AnyDesk for remote system access, highlighting the technical sophistication of these espionage activities. The collective activity of these IT workers indicates a coordinated effort to manipulate hiring systems and refer other fraudulent workers into similar roles.
Details
2024-10-17 16:15:19 thehackernews NATION STATE ACTIVITY RomCom RAT Variant Targets Ukrainian and Polish Entities
Russian threat actor RomCom has intensified cyber attacks on Ukrainian government and Polish entities using a new RAT variant, SingleCamper. Monitoring by Cisco Talos under the name UAT-5647 reveals that the malware operates from memory and uses sophisticated techniques to remain covert. RomCom has diversified its malware arsenal, deploying tools written in multiple programming languages including C++, Rust, Go, and Lua. The infection process begins with a spear-phishing campaign, using C++ or Rust-coded downloaders to deploy backdoors and maintain deception with decoy documents. RomCom's latest malware tools, such as ShadyHammock and DustyHammock, facilitate command execution, data theft, and lateral movement within compromised networks. The ultimate goal of these attacks appears to be long-term network persistence for ongoing espionage, with potential shifts towards ransomware for financial gains and disruption. The increased operational pace of RomCom suggests a systematic expansion in their cyber espionage activities, indicating significant threats to targeted entities.
Details
2024-10-17 15:39:25 bleepingcomputer RANSOMWARE BianLian Ransomware Targets Boston Children’s Health Physicians
BianLian ransomware group has claimed responsibility for a cyberattack on Boston Children's Health Physicians (BCHP). The attack compromised BCHP’s IT vendor on September 6, leading to unauthorized network activity detection shortly after. Confidential data of employees, patients, and guarantors, including SSNs and driver’s licenses, were potentially compromised. While BCHP's electronic medical records were not affected, extensive personal and health information may have been exfiltrated. Affected individuals are set to receive notification letters by October 25, with offers of credit monitoring and protection services. The threat actors claim to possess financial, HR data, and sensitive patient information, threatening to leak it unless a ransom is paid. There is currently no deadline set for the ransom payment, implying ongoing negotiations or waiting period by the ransomware group. This incident highlights the continuing trend of ransomware attacks on healthcare organizations, despite ethical norms against targeting children-related entities.
Details
2024-10-17 14:33:02 bleepingcomputer CYBERCRIME Globe Life Faces Extortion Attempt After Data Breach
Globe Life, a major U.S. insurance provider, disclosed a data breach and subsequent extortion attempt involving stolen customer data. Unknown cybercriminals demanded a ransom from Globe Life to prevent public disclosure of the stolen data. The breach initially identified on June 13 affected at least 5,000 customers of American Income Life Insurance Company, a Globe Life subsidiary. Stolen data includes sensitive personal information such as Social Security Numbers, health-related data, and policy details. Globe Life's operations remain largely unaffected, and the company does not anticipate a significant financial impact from the incident. The company confirmed the incident did not involve ransomware, as no data encryption or file locking occurred. Investigation is ongoing to ascertain the full scope of data compromised and additional affected customers.
Details
2024-10-17 14:07:20 bleepingcomputer MISCELLANEOUS Enhancing SecOps Efficiency with Cloud Security Automation
Cloud security platforms like Blink Ops are transforming SecOps by automating routine tasks. Blink Ops integrates easily with tools such as AWS and Slack to monitor and manage security issues without custom scripting. Automated tasks include monitoring for DNS misconfigurations, exposed S3 buckets, EC2 login failures, vulnerability detection, and enforcing S3 encryption. Automation helps in immediate detection and response, significantly reducing the time spent on manual checks and increasing operational efficiency. Blink Ops automations facilitate proactive security postures by handling everything from alerting to remediation steps with little human intervention. These automations ensure that security protocols are consistently applied across all cloud services, protecting sensitive data effectively. Overall, Blink Ops empowers security teams to focus on strategic security tasks by reducing the workload associated with routine security monitoring and compliance.
Details
2024-10-17 14:01:59 theregister CYBERCRIME Brazilian Police Arrest Suspect Behind Major International Hacks
Brazilian police arrested an individual suspected of high-profile cybercrimes, including attacks on the FBI, Airbus, and the US Environmental Protection Agency. The suspect, linked to the online alias USDoD, was detained in Belo Horizonte under Operation Data Breach after securing necessary legal warrants. This arrest follows a data leak involving the National Public Data in the US, which significantly impacted a business and exposed data of billions. The suspect allegedly sold a file containing information on approximately 2.9 billion people, and was also involved in cybersecurity incidents affecting Airbus and possibly TransUnion. The ongoing investigation aims to uncover any additional cyber intrusions committed by the suspect. Law enforcement used early operational security failures and open-source intelligence techniques to track down the cybercriminal's identity. The Brazilian tech news outlet Tecmundo received leaked information suggesting the suspect's involvement, assisting in the police investigation.
Details
2024-10-17 13:56:40 thehackernews MALWARE Cicada3301 Ransomware Threatens Multiple Systems Globally
Cicada3301 is a new ransomware-as-a-service (RaaS) platform impacting Windows, Linux, and NAS devices. Originating in June 2024, it shares code similarities with BlackCat, a defunct ransomware operation. Researchers from Group-IB accessed Cicada3301’s affiliate panel via the dark web, uncovering its significant threat and expansive reach. The ransomware has already compromised over 30 organizations primarily in the U.S. and U.K., targeting critical sectors. Cicada3301 utilizes a cross-platform Rust-based ransomware strain, capable of shutting down virtual machines, terminating processes, and encrypting files and network shares. It includes an affiliate program that recruits penetration testers and access brokers, offering a 20% commission and featuring a sophisticated web panel to manage attacks. Additional threats from Cicada3301 involve data exfiltration before encryption and the halting of virtual machines to maximize damage. Leveraging ChaCha20 + RSA encryption, the group executes highly targeted and destructive attacks, raising substantial concerns for cybersecurity across multiple industries.
Details
2024-10-17 10:17:32 thehackernews NATION STATE ACTIVITY SideWinder APT Accelerates Cyber Espionage in Middle East, Africa
Advanced persistent threat (APT) group SideWinder has launched a series of cyber attacks focused on Middle Eastern and African nations. Targets include government, military, infrastructure, telecommunications, financial institutions, universities, and oil trading sectors. Attack chain involves spear-phishing emails that lead to a multi-stage deployment of a new malware known as StealerBot. The attacks employ techniques like remote template injection and exploitation of CVE-2017-11882 to execute malicious code. Security findings reveal that the malware adjusts its execution strategy based on the target's installed security solutions, enhancing evasion capabilities. SideWinder's tactics include downloading several plugins through the StealerBot implant, aimed at espionage activities. The expansion in geographic targets and sophisticated attack methods illustrate an elevation in the threat level posed by SideWinder. Researchers noted that while public exploits and scripts indicate low sophistication, the group's high level of operational detail suggests greater capabilities.
Details
2024-10-17 09:06:09 thehackernews DDOS Two Sudanese Charged for 35,000 DDoS Attacks Globally in 2023
U.S. federal prosecutors have charged two Sudanese brothers, Ahmed Salah Yousif Omer and Alaa Salah Yusuuf Omer, for running a botnet that executed approximately 35,000 DDoS attacks targeting various sectors including critical infrastructure. The brothers were involved in attacking major companies such as Microsoft and various organizational networks across the globe using a "powerful DDoS tool" from the group Anonymous Sudan. Ahmed Salah, if convicted on all counts, could face a life sentence in federal prison, while Alaa Salah could face up to five years. The Department of Justice (DoJ) in the U.S. led an international law enforcement operation named Operation PowerOFF, which focused on dismantling DDoS-for-hire services and resulted in the seizure and disabling of the group’s main DDoS tool in March 2024. The DDoS tool used by Anonymous Sudan was available for hire at rates ranging from $100 per day to $1,700 a month, allowing for up to 100 attacks per day. Court documents reveal that the attacks caused over $10 million in damages to U.S. entities alone. The operations of this group included collaboration with other hacktivist groups and participating in campaigns like #OpIsrael. The takedown is part of a broader crackdown on illegal online activities, including the disruption of the Sipulitie darknet market by Finnish Customs and the arrest of a hacker in Brazil linked to significant data breaches.
Details