Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12803

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-09-28 06:07:52 thehackernews NATION STATE ACTIVITY U.S. Indicts Iranian Nationals for Election Interference Cybercrimes
The U.S. Department of Justice has charged three Iranian individuals linked to the IRGC for attempting to interfere in the U.S. electoral process. Charged individuals reportedly targeted U.S. officials, media members, and political campaigns to steal sensitive data to undermine U.S. elections. The cyber operations included spear-phishing and social engineering tactics aimed at obtaining non-public election-related documents and emails. Hack-and-leak strategies were used, leaking sensitive campaign materials to media outlets and rival political campaigns. This indictment is part of broader efforts to address foreign interference in U.S. elections, reflecting ongoing concerns about Iran’s influence on U.S. domestic politics. None of the accused have been captured; the U.S. offers a $10 million reward for information leading to their arrest or details on IRGC's election interference. In conjunction with the charges, OFAC has enforced sanctions against additional individuals for related malicious cyber activities, including previous sanctions on other employees from the same entity for interfering in the 2020 elections.
Details
2024-09-27 21:49:27 theregister NATION STATE ACTIVITY Iranian Hackers Charged for Hacking Trump's 2024 Campaign
The U.S. Department of Justice charged three Iranians with crimes including wire fraud and identity theft linked to hacking Donald Trump's 2024 presidential campaign. The accused, identified as members of Iran's Islamic Revolutionary Guard Corps, employed spear phishing to target U.S. politicians and media. The hackers accessed and stole confidential documents from the campaign, including debate preparations and potential vice-presidential pick discussions. Leaked documents were offered to major media outlets and the Biden campaign, which declined to publish them. The FBI remains cautious about fully clearing the campaign's systems of Iranian presence, despite ongoing efforts. The State Department has set a $10 million reward for information on the accused, and the Treasury Department announced new sanctions against related individuals. FBI Director Christopher Wray emphasized the indictment underlines Iran's ongoing aggressive cyber activities against the U.S.
Details
2024-09-27 20:22:49 theregister MISCELLANEOUS Microsoft Revises Recall Feature for Enhanced Privacy and Security
Microsoft has revamped its Recall feature for Windows, aiming to address previous privacy and security concerns. Recall captures snapshots of desktop activity and application use, allowing users to "recall" this data securely via AI-assisted text and visual searches. Following criticism regarding privacy invasion, the feature now comes as an opt-in and can be fully removed from system settings. Enhanced security measures include encryption of snapshots in a vector database, protected by the PC's Trusted Platform Module, and biometric verification through Windows Hello. Data access within Recall requires repeated authentication, aimed at preventing unauthorized use, and features time-outs to further enhance security. Private sessions in supported web browsers and designated sensitive sites are excluded from Recall's data capture. Microsoft guarantees user control over data collection, storage, and deletion, ensuring that data remains local and is not shared with third parties. Recall integrates advanced security protocols to safeguard against brute force attacks and other sophisticated threats.
Details
2024-09-27 19:52:01 bleepingcomputer NATION STATE ACTIVITY Iranian Hackers Indicted in Election Influence Plot
The U.S. Department of Justice has indicted three Iranian nationals linked to the Islamic Revolutionary Guard Corps for conducting a "hack-and-leak" campaign to influence the 2024 U.S. presidential election. Targets included former U.S. government officials and individuals associated with both the Trump and Biden presidential campaigns. The hackers employed spearphishing and social engineering tactics from January 2020, aiming to steal sensitive campaign documents and emails. By mid-2024, they shifted focus to leaking this stolen information to the media and individuals connected to opposing political campaigns, hoping to impact election outcomes. U.S. authorities highlighted the efforts as part of a broader scheme by Iranian actors to undermine the integrity of U.S. electoral processes and democratic institutions. The FBI, CISA, and the Office of the Director of National Intelligence issued a joint statement detailing the ongoing threat posed by these Iranian cyber-attacks. Sanctions have been imposed on one of the hackers, and the U.S. State Department is offering a $10 million reward for information leading to the capture of the suspects.
Details
2024-09-27 17:01:48 bleepingcomputer MISCELLANEOUS Microsoft Enhances Security for Windows Recall Feature
Microsoft has upgraded the security and privacy settings of its AI-powered Windows Recall feature following feedback emphasizing the need for stronger protections. The Windows Recall function, which takes periodic screenshots for later retrieval, now includes options for users to opt in or completely remove the feature. New security measures include sensitive information filters, encryption, and the ability for users to control the exclusion of certain apps and browsing modes. Recall operates on four main principles: user control, data encryption, service isolation, and intentional data use, with all user data being encrypted and stored locally. Authentication for accessing Recall snapshots is required via Windows Hello, ensuring that data access is tied to biometric verification. Microsoft has introduced additional security mechanisms like rate-limiting and anti-hammering to protect against malware exploitation. Despite the initial concerns from cybersecurity experts about privacy risks, Recall does not share data with Microsoft or third parties and is strictly an opt-in feature.
Details
2024-09-27 15:45:03 thehackernews MALWARE Progress Software Fixes Critical Flaws in WhatsUp Gold
Progress Software has released updates for six security vulnerabilities in WhatsUp Gold, including two labeled as critical. The latest patches are in version 24.0.1, which became available on September 20, 2024. Security researchers Sina Kheirkhah and Andy Niu, alongside cybersecurity firm Tenable, identified and reported these vulnerabilities. Specific details on the nature of the vulnerabilities have not been disclosed, beyond their CVE identifiers. Trend Micro reported that recent vulnerabilities have been exploited by threat actors using PoC exploits. There have been previous attacks targeting WhatsUp Gold, specifically a critical bug (CVE-2024-4885) addressed earlier in June 2024. WhatsUp Gold customers are strongly advised to install the new patches immediately to protect against potential exploitation of these flaws.
Details
2024-09-27 15:14:03 bleepingcomputer MALWARE Embargo Ransomware Expands Attacks to Hybrid Cloud Environments
Microsoft reports that Storm-0501 ransomware group now targets hybrid cloud infrastructures, marking a strategic expansion to compromise more assets. Originally an affiliate for multiple ransomware operations, Storm-0501 has started deploying Embargo ransomware affecting sectors such as healthcare, government, and transportation in the U.S. The group utilizes weak credentials, exploits vulnerabilities, and leverages privileged accounts for initial access and lateral movements to deploy ransomware or maintain persistent access. Key vulnerabilities exploited include CVE-2022-47966 (Zoho ManageEngine), CVE-2023-4966 (Citrix NetScaler), and possible ColdFusion exploits. Attackers use tools like Impacket, Cobalt Strike, and a disguised Rclone binary to escalate privileges, exfiltrate data, and disable security measures. Storm-0501 moves from on-premise to cloud environments by compromising Microsoft Entra IDs and synchronization accounts, sometimes establishing persistent backdoors. The ransomware is often deployed across an organization’s devices via compromised Domain Admin accounts, scheduled tasks, or GPOs. Despite aggressive ransomware deployment, in some instances, Storm-0501 opts to maintain backdoor access for potential future operations.
Details
2024-09-27 13:36:41 theregister CYBERCRIME Ransomware Gang Exploits Microsoft Entra for Cloud Attacks
Microsoft warns of Storm-0501, a ransomware gang targeting cloud environments by exploiting Microsoft Entra ID credentials. Active since 2021, Storm-0501 uses tactics such as credential theft, backdooring, and ransomware, currently considered a developing threat by Microsoft. The group often starts with on-premises access, then pivots to the cloud, implanting backdoors and deploying ransomware through compromised accounts. Techniques include exploiting over-privileged accounts, using Impacket's SecretsDump for credential scanning, and Cobalt Strike for lateral movements. Recent attacks show Storm-0501 extracting plain text credentials from Microsoft Entra Connect Sync servers to pivot into cloud environments. Storm-0501 also targets Domain Admin accounts with equivalent cloud roles unprotected by MFA, allowing further cloud compromise. Despite some attacks focusing only on establishing a backdoor, the group is also known for using Embargo’s ransomware payload following double extortion tactics. Microsoft's report includes threat-hunting tips and indicators of compromise to assist organizations in defending against this group.
Details
2024-09-27 12:34:46 thehackernews MALWARE Critical Vulnerabilities in Linux CUPS Allow Remote Code Execution
Newly disclosed vulnerabilities in the Linux CUPS printing system could enable attackers to execute remote commands. Unauthenticated attackers can manipulate printer IPP URLs to inject malicious commands, executed when printing tasks are initiated. Affected Linux distributions include major systems like Debian, Fedora, RHEL, and others. The exploitation requires network access to UDP port 631 and poor validation processes within the CUPS system. Red Hat has reported all versions of RHEL are potentially vulnerable but secure in default configurations. Patches for these vulnerabilities are under development, with recommendations to disable non-essential CUPS services and restrict port access. No Palo Alto Networks products are affected as they do not incorporate the vulnerable CUPS software packages. While these vulnerabilities are serious, their impact is less likely to affect desktops or workstations not typically exposed to public networks.
Details
2024-09-27 12:03:40 bleepingcomputer MALWARE Urgent Call to Patch Newly Revealed WhatsUp Gold Vulnerabilities
Progress Software has issued an urgent advisory to patch multiple vulnerabilities in WhatsUp Gold, a network monitoring tool. These vulnerabilities, identified in versions earlier than 24.0.1, include six critical and high-severity issues. The flaws, reported by researchers from Summoning Team, Trend Micro, and Tenable, have been assigned specific CVE IDs and CVSS base scores. Although patches were released on September 20, detailed information about the vulnerabilities has not been disclosed to the public. Two SQL injection vulnerabilities, CVE-2024-6670 and CVE-2024-6671, were actively exploited in August, following their patch release in mid-August. Another critical remote code execution vulnerability, CVE-2024-4885, was also observed being exploited after its details were published in mid-July. Customers are urged to update to the latest patched version, WhatsUp Gold 24.0.1, to mitigate risk and secure their environments.
Details
2024-09-27 11:27:46 thehackernews MISCELLANEOUS Effective Strategies for Planning and Conducting Penetration Testing
Penetration testing is essential for identifying and exploiting vulnerabilities to prevent breaches. It involves both human-led and automated techniques, utilizing certified ethical hackers to simulate cyber-attacks. Proper penetration testing requires understanding the attack surface, including all cyber assets and potential vulnerabilities. Key aspects include prioritizing and mitigating risks based on continuous assessments, and defining the scope of testing based on business goals and compliance needs. Different types of penetration testing include traditional, autonomous, and Penetration Testing as a Service (PTaaS), each with unique benefits. Planning should include choosing the right pentesting method and provider, dictated by testing scopes such as black box, gray box, and white box testing. It's crucial to align testing with industry regulations like NIST, OWASP, and specific compliance requirements (e.g., PCI DSS for payment systems). Standardization in penetration testing helps ensure consistent, thorough, and compliant security assessments.
Details
2024-09-27 11:12:15 thehackernews CYBERCRIME Storm-0501 Targets U.S. Sectors in Hybrid Cloud Ransomware Attacks
Storm-0501, a financially driven cybercriminal group, has been actively targeting multiple sectors including government and manufacturing with sophisticated ransomware attacks. The attacks specifically aim to compromise hybrid cloud setups, facilitating lateral movements from on-premises systems to cloud environments, leading to credential theft and data exfiltration. This group uses both commodity and open-source tools and has escalated its operations from a ransomware affiliate to a Ransomware-as-a-Service (RaaS) provider employing various ransomware strains like Hive, BlackCat, and Embargo. Initial attack vectors include exploiting unpatched vulnerabilities in internet-facing servers, using over-privileged or weak credentials, and leveraging infiltrations by other access brokers. The attack process encompasses extensive network reconnaissance, credential harvesting using tools like Impacket's SecretsDump, and data theft prior to the ransomware deployment. Microsoft detected use of tools like Cobalt Strike and Rclone by Storm-0501 to sustain persistence, maneuver laterally, and extract data to platforms like MegaSync. The final stages include deploying Embargo ransomware, followed by attempts to extort victims with threats of leaking stolen sensitive data unless ransoms are paid. This disclosure frames Storm-0501 as part of a broader trend of rising ransomware groups exploiting hybrid cloud vulnerabilities, underlining the need for enhanced security measures in such environments.
Details
2024-09-27 09:09:37 thehackernews MISCELLANEOUS How Cybersecurity Certifications Propel Career Growth
Cybersecurity certifications are essential for proving expertise and securing career advancement in the rapidly evolving digital world. These certifications are recognized by employers as a reliable indication of a professional's skills in defending sensitive information and upholding security standards. According to recent statistics, 81% of those with certifications observe enhanced work quality and value, highlighting their significance in professional competence. Certifications not only differentiate job candidates but also frequently lead to promotions, with 27% of certified professionals achieving higher job positions. A substantial number of certified individuals report significant financial gains; 37% received salary increases, with 35% experiencing raises over 20%. The confidence and validation provided by obtaining certifications result in higher job satisfaction and the capacity to undertake more significant responsibilities. Employers benefit from hiring certified professionals through improved productivity, more innovation, and a mindset that encourages independence and work autonomy. For both individuals and organizations, certifications pave the way for professional growth, better work quality, and long-term success in the cybersecurity field.
Details
2024-09-27 09:04:18 thehackernews MALWARE New HTML Smuggling Tactic Targets Russian Users with DCRat Malware
Russian-speaking users are being targeted in a new malware campaign using HTML smuggling to deliver the DCRat (DarkCrystal RAT). This marks the first instance of DCRat being distributed via HTML smuggling, diversifying from previous methods like compromised websites and phishing emails. The attack uses social engineering, tricking victims into executing the malware by opening seemingly benign HTML pages mimicking legitimate Russian services. When opened, these pages trigger an automatic download of a password-protected ZIP file containing a malicious RarSFX archive, which installs DCRat. DCRat functions as a potent backdoor capable of keystroke logging, shell command execution, and data exfiltration. Netskope's discovery includes mimicked pages of TrueConf and VK, highlighting the use of familiar brands to deceive targets. Increased use of HTML smuggling has been noted alongside other technologically advanced methods such as GenAI, used by attackers to generate malicious scripts. Organizations are advised to monitor HTTP and HTTPS traffic to prevent communications with recognized malicious domains and thwart such intrusion attempts.
Details
2024-09-27 07:52:36 thehackernews CYBERCRIME U.S. Sanctions Crypto Exchanges Tied to Ransomware and Laundering
The U.S. government has sanctioned two cryptocurrency exchanges, Cryptex and PM2BTC, accusing them of facilitating money laundering linked to cybercrime. A Russian national, Sergey Sergeevich Ivanov, was indicted for running several money laundering services catered to cybercriminals, including these exchanges. Operation Endgame, a collaborative effort with Dutch authorities, led to the seizure of both exchange websites and cryptocurrencies worth approximately €7 million. PM2BTC was reported to have processed transactions significantly linked to illicit Russian finance activities and lacked effective anti-money laundering (AML) controls. Cryptex allegedly received over $51.2 million from ransomware proceeds and marketed its services directly to cybercriminals, promoting complete anonymity. Ivanov is also charged with supporting notorious carding sites like Joker's Stash and processing illegal funds through his payment services. Concurrent U.S. actions include offering rewards up to $10 million for information leading to the arrests of key individuals involved with these operations. These measures are part of broader international efforts to dismantle infrastructure supporting cybercrime and money laundering.
Details