Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12711

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-04-22 15:14:13 thehackernews CYBERCRIME Russian ToddyCat Group Targets Asia-Pacific Government Data
Russian hacker group ToddyCat uses sophisticated tools to conduct data theft on an industrial scale, primarily targeting governmental and defense organizations in the Asia-Pacific region. Security firm Kaspersky reports that ToddyCat automates data harvesting and maintains multiple methods for persistent access and system monitoring since at least December 2020. The group employs a passive backdoor known as Samurai, allowing remote access to compromised systems, alongside other tools like LoFiSe and Pcexter for data extraction and uploading to cloud services. ToddyCat was first identified in June 2022 following a series of cyberattacks on European and Asian government and military entities. New findings reveal the use of advanced tunneling and data-gathering software post-initial breach, aiming to sustain access to privileged accounts and hide their activities within the infected systems. Kaspersky advises enhancing security by blacklisting IPs and resources associated with traffic tunneling and enforcing stricter password management policies among users to prevent sensitive information access.
Details
2024-04-22 15:08:55 bleepingcomputer MALWARE Malware Disguised as Legitimate Files on GitHub and GitLab
The security flaw at both GitHub and GitLab allows threat actors to distribute malware through URLs that mimic credible repositories. Threat actors exploit a design flaw where files attached to comments in GitHub and GitLab appear as though hosted officially, creating effective deceits. Malicious files, appearing to be from reputable sources like Microsoft, remain on the CDN even if the corresponding comment is never posted or later deleted. This exploitation method impacts major companies as virtually every software firm uses these platforms, increasing the lure’s credibility. Uploaded files retain links that appear affiliated with project repositories, misleading users into downloading harmful software disguised as updates or new drivers. Despite the potential for significant misuse, current platform settings do not allow repo administrators to manage or remove malicious files linked to their projects. Both GitHub and GitLab have been notified of the issue, with ongoing questions about when and how it will be addressed to curb abuse.
Details
2024-04-22 14:02:08 theregister DATA BREACH Dutch Authority Warns Against Government Use of Facebook
The Dutch Data Protection Authority advises against using Facebook for official communications due to privacy concerns. The decision follows the Dutch government's hesitation on a proposed ban of the platform's use due to uncertainty about how Facebook handles personal data. The Authority stresses the importance of clear understanding and guarantees of data privacy when government bodies use social platforms. Meta disputes the Authority's claims, asserting compliance with regional laws and misunderstanding of their product operations. The ongoing debate emphasizes the complex balance between effective public communication and protecting citizen privacy on social platforms. Concerns are also highlighted about Meta’s subscription model which may compel users to sacrifice privacy to access information.
Details
2024-04-22 14:02:07 bleepingcomputer MISCELLANEOUS Criminal IP Partners with Sumo Logic for Enhanced Security
Criminal IP has formed a strategic partnership with Sumo Logic to integrate threat intelligence into Sumo Logic's products. The integration involves Sumo Logic’s Cloud SIEM, Cloud SOAR, and Threat Intelligence platforms, enriching them with detailed data on IP addresses and domains from Criminal IP. This collaboration allows Sumo Logic users to access real-time threat intelligence and perform deep analysis on potential security threats within their SIEM environment. Features include IP query capabilities and domain scanning directly within Sumo Logic’s platforms, enhancing the contextual understanding of security events. The partnership is expected to provide Sumo Logic's users with advanced tools for better decision-making and insight into cybersecurity risks. Future collaborative efforts include joint marketing initiatives like co-webinars and collaborative reports to further enhance user understanding and application of the integrated tools. The partnership builds on AI SPERA’s track record of collaborations with other major tech and cybersecurity entities.
Details
2024-04-22 13:05:53 theregister NATION STATE ACTIVITY US House Passes Bill Demanding TikTok Sale or Ban
The US House of Representatives approved a bill that mandates TikTok's sale of its US operations or face a national ban within a year. This decision aims to counter security concerns over TikTok's Chinese ownership and potential influence on US public opinions. The legislation, which passed the House with a vote of 360 to 58, will now move to the Senate and could be voted on as early as this week. Bipartisan support reflects widespread unease about TikTok's potential to access information on US users and spread Chinese propaganda. ByteDance, TikTok's parent company, plans to legally challenge the decision, escalating the ongoing US-China technology conflict. Concerns have been raised about the bill's impact on free speech and its potential to extensively affect small businesses that utilize the platform. Additional complications could arise from Chinese export control laws, which might prevent the sale of TikTok's US operations. This legislative move is part of broader tension between the US and China regarding internet governance and digital sovereignty.
Details
2024-04-22 12:35:01 bleepingcomputer NATION STATE ACTIVITY Sandworm Cyberattacks Target Ukraine's Critical Infrastructure
Russian hacker group Sandworm, also known as BlackEnergy and APT44, targeted approximately 20 critical infrastructure facilities across Ukraine. The cyberattacks aimed to disrupt operations within the energy, water, and heating sectors in 10 different regions. The hackers infiltrated networks by compromising software supply chains and exploiting maintenance access. New malware tools, BIASBOAT and LOADGRIP, were utilized to access and navigate through the targeted networks. Poor cybersecurity practices at the targeted facilities, such as lack of network segmentation, facilitated the breaches. From March 7 to March 15, 2024, Ukrainian CERT-UA conducted counter-cyberattack operations to mitigate the damage. The attackers used additional open-source malicious tools for persistence and privilege elevation. CERT-UA links these attacks to broader strategic objectives, correlating them with physical missile strikes to amplify their impact.
Details
2024-04-22 11:33:39 thehackernews DATA BREACH Pentera's 2024 Report Unveils Persistent Enterprise Security Breaches
Over half of the surveyed enterprises experienced a cybersecurity breach in the past two years, despite deploying an average of 53 security solutions. High-profile breaches have driven broader executive engagement, with over 50% of CISOs now regularly reporting pentest results to boards. A considerable gap exists between the frequent changes in IT environments and the cadence of security testing, highlighting a vulnerability in current security strategies. Enterprises average a significant investment of $164,400 annually on manual pentesting, yet only 40% conduct these tests at a frequency matching their quarterly IT changes. The rise in cloud intrusions, with a reported 75% increase year over year, signals the cloud as a major point of vulnerability as more organizations migrate to cloud services. Breaches typically result in substantial operational disruptions like unplanned downtime and financial losses, indicating the extensive impact of these incidents. The survey emphasizes the critical need for continuous pentesting to enhance IT infrastructure resilience and keep pace with evolving cybersecurity threats.
Details
2024-04-22 11:18:09 theregister DATA BREACH UK Watchdog Questions Efficacy of Google's Privacy Sandbox
The UK's Information Commissioner's Office (ICO) draft report criticizes Google's Privacy Sandbox for not adequately ensuring user privacy. Despite claims of innovative privacy-preserving ad targeting, the technology reportedly allows potential exploitation for tracking users. The critique highlights issues in making ad targeting privacy-compliant under strict regulations like the EU's GDPR. Google's approach involves shifting ad auction mechanics to local devices, aiming to eliminate need for invasive tracking methods. The Privacy Sandbox is facing regulatory scrutiny and skepticism around its ability to fairly compete without disadvantaging other industry players. Significant concerns arise around the efficacy of the Topics API, with critics labeling it as a method of behavioral advertising that could act like spyware. Financial implications are vast, with the global ad spend projected to be $690 billion in 2024, magnifying the stakes of Google's Privacy Sandbox success or failure. Regulatory and competition authorities, including the UK's Competition and Markets Authority, continue to monitor Google’s commitments and the technology’s market impact.
Details
2024-04-22 11:07:48 thehackernews NATION STATE ACTIVITY MITRE Corporation Targeted by Nation-State Cyber Attack
The MITRE Corporation was compromised by nation-state actors exploiting two zero-day vulnerabilities in Ivanti Connect Secure appliances. The attackers accessed MITRE's unclassified NERVE network, which supports research and prototyping, by breaching a VPN and evading multi-factor authentication. Identified vulnerabilities, CVE-2023-46805 and CVE-2024-21887, allowed unauthorized authentication bypass and arbitrary command execution. Following initial access, the adversaries moved laterally to breach VMware infrastructure using compromised admin credentials, deploying backdoors and web shells for persistence. Despite extensive breaches, no evidence suggests that MITRE's core enterprise network or partner systems were impacted. MITRE has taken containment measures, conducted a forensic analysis, and is undertaking recovery efforts to address the security incident. The exploitation of the vulnerabilities was first linked to UTA0178, a suspected China-linked nation-state group, with subsequent exploitation by other related groups. MITRE's CEO emphasized the incident's disclosure aligns with their public interest commitment and the advocacy for improved cybersecurity practices.
Details
2024-04-22 11:02:32 theregister NATION STATE ACTIVITY UK Government Criticized for Weak Response to Cyber Threats
UK MPs have criticized the government's response to cyberattacks by espionage group APT31 as insufficient. The National Cyber Security Centre's review revealed vulnerabilities in the UK's critical national infrastructure. Organized criminal groups, often supported by nation states, are escalating threats with ransomware and data breaches. There is a pressing need for improved cybersecurity defenses to protect against these multifaceted cyber threats. Rubrik emphasizes the importance of proactive planning over reactive measures in strengthening cybersecurity posture. Compliance should be viewed as a strategic facilitator, not an impediment, in the context of cybersecurity. An upcoming webinar hosted by Rubrik will discuss effective strategies for mitigating and recovering from cyberattacks.
Details
2024-04-22 10:26:46 thehackernews CYBERCRIME Rising Trends and Challenges in Ransomware Re-Victimization
An 11,000+ dataset study shows some organizations face repeated ransomware attacks, raising questions about possible causes such as affiliate crossovers or repeated use of stolen data. The annual increase in ransomware attacks reported at 51% with changing dynamics and continuous monitoring needed to track this evolving threat landscape. Law enforcement's disruption efforts, such as taking down major ransomware operators like ALPHV and LockBit, show temporary setbacks but fail to permanently dismantle operations. Despite setbacks, ransomware operations like Cl0p continue to pose threats, indicating a need for on-going vigilance and updated defense strategies. A complex cyber-extortion ecosystem involving multiple actors, including affiliates, contributes to the spread and persistence of ransomware threats. The study includes network graphs depicting the re-victimization of organizations, showing how victim data circulates within this criminal ecosystem. Challenges in combating ransomware include understanding the full scope of the threat, as many victim organizations remain unreported on monitored leak sites. The necessity of bolstering organizational cybersecurity practices to reduce vulnerabilities against ransomware and other forms of cyber extortion.
Details
2024-04-22 09:25:39 thehackernews MALWARE Researchers Expose Severe Windows Flaws Enabling Rootkit-Like Attacks
New research pinpoints vulnerabilities in the DOS-to-NT path conversion process in Windows that grants hackers rootkit-like powers. These vulnerabilities allow unprivileged users to perform malicious actions such as hiding files and processes, impersonating Windows files, and causing denial of service without admin rights. The flaws were detailed by SafeBreach security researcher Or Yair at the Black Hat Asia conference. Undetected manipulations possible through these flaws include making malware appear as a verified Microsoft executable, disabling key system tools, and evading forensic analysis. Microsoft has already addressed three of the four detected security shortcomings related to these issues. Yair emphasizes the broader implications for all software vendors to address persistent known issues that could be exploited in similar ways. This kind of vulnerability discovery underlines the critical importance of ongoing vigilance and regular updates in software security management.
Details
2024-04-22 08:34:28 theregister MISCELLANEOUS Google Struggles with Influx of AI-Generated Spam Content
Google is experiencing a significant increase in AI-generated spam, impacting the quality of search results and posing a substantial threat to user retention and ad revenue. AI spam now constitutes 10% of search hits compared to 2% before the introduction of ChatGPT, forcing Google to manually delist more sites than ever. The proliferation of cheap and easily produced AI spam risks overwhelming genuine content online, threatening the functionality of the internet as a discovery platform. Google is investing in combating this spam to preserve its business model, although it threatens immediate financial interests due to lost ad revenue associated with spam websites. Advancements in AI threaten to make current spam detection methods obsolete, similar to antibiotics losing effectiveness over time. Google's current dilemma includes protecting the integrity of its search engine and ad revenue while transitioning to AI-driven search interfaces. Potential solutions include changing algorithm priorities or introducing new regulatory mechanisms for content authenticity to better serve user interests and sustain content quality. The ongoing situation highlights the broader implications and challenges of AI and algorithm dependency in managing web content and user interaction.
Details
2024-04-22 07:33:04 theregister MALWARE Unique Windows Version Prevents Company-Wide Virus Spread
Declan, a self-taught CAD designer and technical support provider, used a rare version of Windows NT on a Digital Alpha RISC machine which ran most applications in emulation. One afternoon, Declan inadvertently opened an email attachment containing a macro virus, potentially jeopardizing the company's network. The virus attempted to propagate itself by accessing Outlook's contact list and sending out further emails, but was unsuccessful due to poor software integration in the emulation environment. Declan realized the virus's failure when his system started displaying numerous error messages, indicating the virus could not execute its intended actions. This incident highlighted the accidental benefit of using a less common and poorly integrated system, which resisted a potentially damaging virus spread. Ultimately, Declan's experience underscores the importance of preventive measures and the unexpected virtues of outdated or unique technology setups in specific scenarios.
Details
2024-04-22 07:17:34 thehackernews NATION STATE ACTIVITY North Korean Hackers Utilize AI to Enhance Cyber Espionage Efforts
North Korea-linked cyber actors, specifically Emerald Sleet, are using AI technologies to refine spear-phishing and other cyber-espionage tactics. AI-driven large language models help these actors in research, reconnaissance on North Korea-focused organizations, and optimizing phishing content. Proofpoint's report highlights Emerald Sleet's strategy of using benign conversations and think tank personas to build long-term informational exchanges advantageous to North Korea. The group has also exploited weak email authentication policies to enhance their phishing schemes with web beacons for deeper target profiling. Jade Sleet, another North Korean group, is involved in significant cryptocurrency thefts, amassing millions from firms in Estonia and Singapore. Lazarus Group (Diamond Sleet) continues sophisticated cyber operations, including DLL hijacking and database manipulation to deploy malware and disrupt supply chains. Recent adaptations include tactical changes like usage of shortcut (LNK) files with hidden malicious commands to deliver payloads and bypass detection systems. These developments from North Korean cyber groups indicate a sharp increase in cyber threat complexity and underline the need for enhanced cybersecurity measures.
Details