Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12714
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2024-05-15 14:02:58 | bleepingcomputer | CYBERCRIME | How Lateral Movement Attacks Use Stolen Credentials | Lateral movement attacks exploit stolen credentials to stealthily move through a network, often mimicking legitimate traffic to access sensitive data or systems undetected.
These attacks typically begin with reconnaissance, credential theft, and the exploitation of initial access, which may involve social engineering, keyloggers, or dark web transactions.
A highlighted case involved a former employee's credentials being used to breach a U.S. State Government network, leading to significant data exfiltration.
Stolen or compromised credentials allow attackers to persist within the network, impersonate users, gain administrative access, and facilitate long-term, undetected operations.
Attack methods include various social engineering tactics, deploying keyloggers, and using pass-the-ticket or pass-the-hash techniques to maintain unauthorized access without a password.
Defense strategies include implementing strong password policies, multi-factor authentication, regular updates, security training, network monitoring, and intrusion detection systems.
Organizations are urged to use tools like Specops Password Auditor and other software to detect compromised credentials in Active Directory and enhance overall network security.
Network segmentation, active threat hunting, and a robust incident response plan are critical to minimizing the risk and impact of lateral movement attacks. | Details |
| 2024-05-15 12:35:25 | thehackernews | NATION STATE ACTIVITY | Turla Group Targets European Diplomatic Entities with Novel Backdoors | The Turla cyberespionage group, aligned with Russian state interests, deployed new backdoors named LunarWeb and LunarMail in European diplomatic targets.
ESET attributed these espionage activities to Turla with medium confidence, linking the tactics to previous campaigns by this notorious group.
LunarWeb, a server-targeting backdoor, uses HTTP(S) protocols for command-and-control communications, disguising traffic as legitimate requests.
LunarMail, intended for workstations, operates as an Outlook add-in and communicates with the attackers through email, using embedded commands in document attachments.
The detailed investigations by ESET suggest these malicious tools have been actively used since early 2020 or possibly earlier.
The exact methods of initial penetration into the Ministry of Foreign Affairs remain unclear, though indicators suggest spear-phishing and exploitation of system vulnerabilities might be involved.
Once activated, LunarWeb can execute various commands, gather system info, and exfiltrate data, masked as normal web traffic; LunarMail similarly supports complex operations and data theft via emails.
These tools represent a sophisticated evolution in Turla's arsenal, emphasizing stealth and persistence in targeting diplomatic and governmental agencies. | Details |
| 2024-05-15 11:44:08 | thehackernews | MISCELLANEOUS | Enhancing Cyber Resilience with New CVSS v4.0 Framework | CVSS v4.0 was introduced in late 2023 to improve vulnerability assessments in cybersecurity, replacing the older v3.0 and incorporating new metrics such as safety and automation.
The updated CVSS model allows for a more nuanced evaluation of vulnerabilities by considering environmental and threat metrics alongside the base score.
CVSS employs a numerical severity score system ranging from 0.0 to 10.0, and categorizes vulnerabilities into qualitative levels such as Low, Medium, High, and Critical.
Utilization of CVE identifiers within CVSS helps organizations prioritize patching and mitigation efforts by focusing on the most critical vulnerabilities first.
Enhanced detection and response systems like EDR and NDR use CVSS scores to block known and zero-day vulnerabilities effectively.
NDR extends beyond traditional EDR by implementing behavior-based anomaly detection and adapting continuously to novel threat vectors.
Risk-Based Alerting (RBA) within NDR environments prioritizes alerts based on established risk levels, optimizing resource allocation, and reducing response times.
The integration of CVSS scores into operational security practices allows for tailored alert thresholds and improved incident response strategies. | Details |
| 2024-05-15 10:58:00 | thehackernews | MISCELLANEOUS | Best Practices for Migrating VMware vSphere to Azure | Assess your current VMware vSphere environment to identify VMs, dependencies, and resource usage patterns, determining which workloads are suitable for Azure migration.
Design an Azure architecture that reflects your existing VMware setup, including VM sizes, network configurations, and security measures.
Configure Azure resources such as subscriptions, VMs, networks, and storage, with attention to security settings like NSGs and firewalls.
Prepare for data migration by evaluating storage needs, selecting appropriate transfer methods, and ensuring data integrity between VMware and Azure formats.
Conduct test migrations to validate the migration plan, using enterprise-grade tools for non-disruptive testing to minimize potential downtime.
Execute the actual migration, coordinating with stakeholders and monitoring the process to address any issues immediately.
Post-migration, validate the functionality and performance of Azure workloads, test applications, and monitor resource utilization for optimization.
Leverage Zerto's automated, orchestrated migration solutions to streamline the VMware to Azure transition, enhancing business continuity with minimal downtime. | Details |
| 2024-05-15 10:58:00 | thehackernews | MALWARE | Ebury Botnet Malware Targets 400,000 Linux Servers for Financial Gain | Over the past 14 years, the Ebury botnet malware has compromised approximately 400,000 Linux servers, with more than 100,000 still affected as of late 2023.
Slovak cybersecurity firm ESET described Ebury as a sophisticated financial malware campaign with activities including spam distribution, web traffic redirections, and credential theft.
The malware was part of Operation Windigo and used to commit financial crimes like click-fraud and spam email schemes, alongside web skimmers for credit card and cryptocurrency theft.
In 2017, Russian national Maxim Senakh was sentenced in the U.S. for his role in developing the Ebury botnet, which generated millions in fraudulent revenue.
Delivery methods for Ebury include stealing SSH credentials, exploiting hosting provider vulnerabilities, and using stolen identities for server rental and misdirection of law enforcement.
The malware serves as a backdoor and SSH credential stealer, allowing further deployment of payloads for financial exploitation through traffic redirection, spam, and more.
Recent tools associated with Ebury—like HelimodSteal and HelimodProxy—focus on intercepting and redirecting web traffic and capturing credit card data from compromised servers. | Details |
| 2024-05-15 08:30:27 | thehackernews | CYBERCRIME | Tornado Cash Co-Founder Sentenced for Money Laundering Crimes | A Dutch court has sentenced the Tornado Cash co-founder to over 5 years in prison on charges of money laundering.
The defendant, Alexey Pertsev, has also been ordered to forfeit around $2.05 million in crypto assets and a Porsche car.
Tornado Cash, a cryptocurrency mixer, was used to launder money by mixing illicit funds with legitimate ones to obscure their origin.
The court ruled that the operations of Tornado Cash allowed for easy laundering of criminal assets without sufficient preventive mechanisms.
It was underscored that Tornado Cash didn’t have essential anti-money laundering (AML) or Know Your Customer (KYC) checks and wasn't registered as a money-transmitting entity with U.S. FinCEN.
The verdict comes after the U.S. Treasury Department sanctioned Tornado Cash, linking it to the North Korean hacking group, Lazarus.
While the co-founder argued that Tornado Cash was meant to address privacy needs within the crypto community, the court found it intentionally designed for concealing criminal activities. | Details |
| 2024-05-15 07:19:06 | thehackernews | CYBERCRIME | Microsoft Fixes 61 Security Issues, Including Two Exploited Zero-Days | Microsoft's Patch Tuesday updates for May 2024 addressed 61 new security flaws, including two actively exploited zero-days.
Among these, one flaw is considered Critical, 59 Important, and one Moderate, with additional patches for the Edge browser.
The zero-days, known as CVE-2024-30040 and CVE-2024-30051, have been used in the wild without user interaction needed for one and offer SYSTEM privileges for the other.
Discovered by groups from Kaspersky, Google, and others, these vulnerabilities indicate broad and dangerous exploitation.
U.S. CISA has required federal agencies to apply these latest patches by June 4, 2024, due to their severity.
Additional fixes include several for remote code execution, privilege escalation in various Windows components, and a security feature bypass in Windows.
This extensive patch release reflects ongoing efforts by Microsoft to combat sophisticated cyber threats and secure its user base. | Details |
| 2024-05-14 22:20:20 | theregister | MALWARE | Microsoft, Apple, Google Issue Fixes for Exploited Security Bugs | Microsoft addressed 60 Windows vulnerabilities including two exploited bugs related to system privilege elevation and security feature bypass.
A notable Microsoft Windows bug (CVE-2024-30051) associated with the QakBot banking Trojan allows attackers to gain system privileges, urging an immediate patch.
Another Microsoft vulnerability (CVE-2024-30040) enables attackers to bypass security features in Microsoft 365 by manipulating users to open malicious files.
Apple patched multiple issues, including a critical memory corruption flaw in RTKit exploited to bypass kernel protections, impacting both iOS and iPadOS.
Google updated Chrome to fix an exploited high-severity flaw in the V8 JavaScript engine along with fixing 38 Android vulnerabilities.
VMware and Adobe released important security patches, including VMware's fix for a critical use-after-free vulnerability found during the Pwn2Own contest.
SAP and Intel released critical updates, with SAP addressing vulnerabilities in SAP Commerce Cloud and NetWeaver Application Server, and Intel patching a privilege escalation bug rated 10 out of 10 on the CVSS scale. | Details |
| 2024-05-14 22:14:58 | bleepingcomputer | CYBERCRIME | Critical Zero-Day Exploit Discovered in D-Link EXO AX4800 Routers | The D-Link EXO AX4800 router is susceptible to a remote command execution vulnerability that can lead to unauthenticated attackers taking full control of the device.
This flaw is present in routers operating the latest firmware version and can be exploited via the Home Network Administration Protocol (HNAP) port.
Attackers can gain access by sending a specially crafted HNAP login request which bypasses authentication and permits command injection in the 'SetVirtualServerSettings' function.
The security research team, SSD Secure Disclosure, has released a proof-of-concept (PoC) demonstrating the exploit process.
SSD has attempted to contact D-Link three times over the past 30 days to report the issue, but the vulnerabilities remain unaddressed.
Users are advised to disable remote management on their routers to mitigate the risk until a security update is released.
The D-Link DIR-X4860 is widely used, especially in Canada, and features advanced specifications, including Wi-Fi 6 capabilities up to 4800 Mbps. | Details |
| 2024-05-14 21:34:05 | theregister | CYBERCRIME | FCC Exposes Royal Tiger AI Robocall Scam and its Global Ties | The FCC has publicly identified a robocall group called "Royal Tiger," involved in AI-aided scam operations, impersonating reputable organizations to deceive individuals.
Royal Tiger employs AI voice cloning and caller ID spoofing to mislead victims into revealing personal and financial information under the guise of offering services like credit card rate reductions.
The network is spearheaded by Prince Jashvantlal Anand and Kaushal Bhavsar, operating through entities in India, UK, UAE, and the US.
These illicit activities have led the FCC to issue cease and desist orders to associated US companies such as Illum Telecommunication and PZ Telecommunication, and eventually blocking traffic from One Eye.
Despite attempts to conceal their operations through frequently changing addresses and using multiple fronts, the FCC has been proactive in stopping their activities by designating Royal Tiger a Consumer Communications Information Services Threat (C-CIST).
This designation aims to enhance collaborative efforts among local, national, and international regulatory and law enforcement bodies to protect consumer privacy and trust in communication services. | Details |
| 2024-05-14 20:12:09 | bleepingcomputer | DATA BREACH | Singing River Health System Ransomware Attack Affects 895,000 | Singing River Health System in Mississippi was hit by a ransomware attack in August 2023, impacting operations and potentially leading to data theft.
The attack affected roughly 895,204 individuals, significantly up from initial reported figures.
The involved hospitals and facilities include Singing River Hospital in Pascagoula, Ocean Springs Hospital, Singing River Gulfport Hospital, and additional clinics and centers.
The Rhysida ransomware gang, known for targeting healthcare providers, claimed responsibility for the attack.
Data exposed includes personal and medical information; however, there is no evidence it has been used for identity theft or fraud.
Singing River has provided affected individuals with 24 months of free credit monitoring and identity restoration services.
Approximately 80% of the claimed data by the hackers has already been leaked, urging impacted parties to take preventive action against potential identity theft. | Details |
| 2024-05-14 18:19:23 | bleepingcomputer | MALWARE | Microsoft Patches Critical Zero-Day Exploited by QakBot Malware | Microsoft has addressed a zero-day vulnerability in Windows exploited by QakBot malware to deliver various malicious payloads.
The vulnerability, identified as CVE-2024-30051, is a privilege escalation flaw located in the Desktop Window Manager (DWM) core library.
Exploitation of the bug allows attackers to obtain SYSTEM privileges, potentially leading to full system control.
The issue was discovered by Kaspersky researchers while investigating a previously known CVE, with findings subsequently confirmed and patched by Microsoft during their monthly Patch Tuesday.
This particular vulnerability was also reported to Microsoft by other security teams, including Google’s Threat Analysis Group, indicating its widespread knowledge among the cybersecurity community.
QakBot, which started as a banking trojan, has evolved over the years into a sophisticated malware delivery platform involved in ransomware distribution and data theft.
Despite efforts to dismantle QakBot's infrastructure in 2023, it continues to reinfect systems and propagate through new campaigns. | Details |
| 2024-05-14 17:53:14 | bleepingcomputer | MALWARE | Microsoft's May 2024 Patch Fixes Critical Zero-Day Flaws | Microsoft's May 2024 Patch Tuesday addressed 61 vulnerabilities, including three zero-days, one of which is critical.
Two of the zero-days were actively exploited, and one was publicly disclosed before being addressed in this update.
The critical flaw fixed was a Remote Code Execution Vulnerability in Microsoft SharePoint Server.
The vulnerabilities fixed span various Microsoft products, but the updates notably exclude non-security updates for Windows 11 reported separately.
CVE-2024-30040 involved a bypass in MSHTML that could allow attackers to execute arbitrary code following user interaction with a malicious file.
CVE-2024-30051, an exploited vulnerability in Windows DWM Core Library, enabled attackers to gain SYSTEM privileges through Qakbot malware attacks.
Microsoft also patched a publicly disclosed denial of service issue in Microsoft Visual Studio.
Other vendors also released security updates in May, but SAP's updates are now restricted behind a customer login. | Details |
| 2024-05-14 17:07:06 | thehackernews | MALWARE | Android 15 Enhances Security to Thwart Malicious App Activities | Google is introducing updated security features in Android 15 to protect users from malware by using an expanded Play Integrity API.
The enhancements will allow developers to detect if other apps might be capturing screen content or intercepting user data.
Newly introduced security protocols include measures against overlay attacks and the abuse of accessibility services permissions by banking trojans.
Some Android malware, like Anatsa, have found ways around existing security measures, prompting continuous improvements from Google.
Google plans to increase cellular security, alerting users to unencrypted connections and potential surveillance activities.
Screen sharing on Android 15 will now automatically obscure notification content, including one-time passwords, to prevent leakage during such sessions.
Play Protect's new live threat detection uses on-device AI to analyze behavior, improving the detection of malicious apps based on their activity patterns and interactions.
Google is collaborating with original equipment manufacturers (OEMs) to integrate these security features over the next few years, aiming for widespread adoption and enhanced user protection. | Details |
| 2024-05-14 17:07:06 | thehackernews | MISCELLANEOUS | Google Introduces New Security Features to Thwart Phone Theft | Google is launching new security enhancements for Android devices, designed to protect against theft.
Features include a private space for sensitive apps, protected by a separate PIN, and security measures requiring biometric data before changing critical settings.
An upgraded factory reset feature will make a stolen device inoperable without the owner's credentials.
AI-driven capabilities will automatically lock the device if it detects sudden movement suggestive of theft.
Offline Device Lock activates if a device is disconnected for an extended time, preventing unauthorized access.
Additional functions allow users to mark a device as lost, improving tracking and enabling remote device locking with security challenges.
These updates will be available for devices running Android version 10 and later through an update to Google Play services. | Details |