Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11759

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-01-08 09:07:00 thehackernews MISCELLANEOUS Enhance Cybersecurity with Zero Trust Principles Webinar Invitation
Increasing digital expansion and internet exposure of software and infrastructure lead to greater risk of cyber threats. Traditional security architectures are no longer sufficient against sophisticated attacks that are now utilizing AI and as-a-service models. Gartner highlights attack surface expansion as a significant emerging cyber trend to monitor. Zero trust security is emphasized as a crucial strategy to reduce the attack surface and protect against data breaches, lateral movement, and network compromises. The upcoming webinar will cover the inadequacies of current security tools like VPNs and firewalls, and how they can paradoxically enlarge the attack surface. The potential vulnerabilities in systems such as shadow IT, public cloud applications, and unsecured servers are critical points that increase the risk for organizations. By attending the webinar, participants can learn how to apply Zero Trust principles to minimize their organization's attack surface and enhance overall cybersecurity posture.
Details
2024-01-08 07:55:17 thehackernews MISCELLANEOUS NIST Highlights Security Risks in Emerging AI Systems
The U.S. National Institute of Standards and Technology (NIST) is warning of increased privacy and security risks stemming from rapid AI system deployment. Risks include adversarial manipulation of AI training data, exploitation of model vulnerabilities, and unauthorized extraction of sensitive information through AI system interactions. Rapid integration of AI into online services, particularly generative AI like OpenAI's ChatGPT and Google's Bard, exacerbates the threat landscape at various stages of machine learning operations. Vulnerabilities identified by NIST encompass corrupted training data, software security flaws, model poisoning, supply chain issues, and privacy breaches through prompt injection attacks. NIST computer scientist Apostol Vassilev highlights the lack of guaranteed benign exposure and robust defenses against AI system manipulations. NIST categorizes potential attacks based on the attacker's knowledge level (white-box, black-box, or gray-box) and calls for the tech community to strengthen AI defenses. These warnings follow international collaborative efforts by the U.K., U.S., and other partners to create guidelines for the secure development of AI systems, addressing unresolved issues in AI algorithm security.
Details
2024-01-08 07:29:38 theregister CYBERCRIME New Meta Feature Fuels Targeted Ads, Patch Security Flaws
Meta has rolled out a new feature that tracks link history within its in-app browser on Facebook and Instagram to enhance targeted advertising. The link history feature stores webpages visited for 30 days and is pitched as a convenience for users, though it mainly serves ad targeting. Critical security vulnerabilities have been identified, with several patches released for Google Chrome addressing issues that may affect many users. Google's Mandiant and web3 firm CertiK suffered Twitter account hijackings, which were used to promote cryptocurrency scams. The incidents underline the importance of enforcing strong security measures even when one has two-factor authentication (2FA) enabled. A Nigerian national was arrested for allegedly defrauding two US charities of over $7.5 million through a business email compromise (BEC) scheme. The alleged scheme involved using stolen credentials to authorize fraudulent money transfers between the charities' banks. If convicted, the suspect faces a potential sentence of up to 20 years for each count of wire fraud among other charges.
Details
2024-01-08 06:23:21 thehackernews CYBERCRIME U.S. DoJ Charges 19 in Global $68 Million Dark Web Market Fraud
U.S. Department of Justice has charged 19 individuals for involvement with the xDedic Marketplace, resulting in over $68 million in fraud. The collaborative international operation included efforts by Belgium, Germany, the Netherlands, Ukraine, and Europol. Sentences for defendants range from probation to 6.5 years in prison; Ukrainian national Glib Oleksandr Ivanov-Tolpintsev received four years for his role. Among the highest volume sellers on xDedic, Dariy Pankov earned over $350,000 from selling access to hacked servers. The Nigerian Allen Levinson, a major buyer on xDedic, targeted U.S. CPA firms for tax fraud purposes. Five individuals are pending sentencing for conspiracy to commit wire fraud; two others face potential 20-year sentences for wire fraud and identity theft. The xDedic Marketplace, shut down in 2019, traded stolen credentials for over 700,000 computers and servers as well as personal data of U.S. residents. Criminal activities facilitated by the use of these servers included tax fraud, ransomware attacks on critical infrastructure, and other illegal operations.
Details
2024-01-08 05:02:06 thehackernews NATION STATE ACTIVITY North Korea Linked to $600 Million Cryptocurrency Heist in 2023
North Korean hackers have been linked to the theft of at least $600 million in cryptocurrency in 2023, which may rise to around $700 million considering late-year breaches. According to blockchain analytics firm TRM Labs, these cyber heists attributed to the DPRK were 10 times as impactful as attacks by other groups. The stolen funds are reportedly used to support North Korea's weapons of mass destruction and ballistic missile programs, amidst international sanctions. The cyberattacks often involve elaborate social engineering to compromise digital wallet private keys and seed phrases, allowing unauthorized access to crypto assets. Attackers tend to convert the stolen funds into USDT or Tron and then to hard currency using high-volume over-the-counter (OTC) brokers for laundering. DPRK's hackers are adapting their money laundering techniques in response to actions like the U.S. Treasury's sanctions on crypto mixer services like Sinbad. TRM Labs highlights the need for heightened vigilance and innovation to combat North Korea's sophisticated cyber capabilities that have amassed $1.5 billion over two years.
Details
2024-01-07 20:39:17 bleepingcomputer CYBERCRIME loanDepot Hit by Cyberattack Disrupting Payment Operations
U.S. mortgage lender loanDepot experienced a cyberattack affecting their IT systems and online payment portal. The attack forced the company to take systems offline, disrupting customer access for loan payments and support. loanDepot, a major nonbank retail mortgage lender, services loans exceeding $140 billion and has a workforce of about 6,000. Acknowledging the cyber incident, the company is engaging with law enforcement and forensic experts to investigate and mitigate the breach. While the company's social media updates on the incident have been removed, customers are being directed to make payments through the call center. Recurring automatic payments will be processed but with updates delayed in the system; however, making new payments via the online servicing portal is currently impossible. The exact nature of the attack is unconfirmed, but the pattern suggests the possibility of a ransomware attack, which may have compromised sensitive customer data. Customers are advised to remain vigilant against phishing attempts and identity theft in light of the sensitive financial and personal information held by loanDepot.
Details
2024-01-07 16:40:23 bleepingcomputer MALWARE Stealthy AsyncRAT Malware Campaign Targets US Infrastructure
AsyncRAT malware has been actively targeting specific entities within US infrastructure for the past 11 months. The malware is delivered via a sophisticated phishing campaign using hijacked email threads and malicious attachments that lead to the execution of the RAT. Cybercriminals have used over 300 unique loader samples and controlled the campaign through more than 100 domains, all paid for anonymously using cryptocurrency. The loaders are designed to bypass sandboxing and analysis tools by deploying decoy payloads and checking if they're running in a virtual machine environment. AT&T Alien Labs researchers uncovered a domain generation algorithm (DGA) within the malware that consistently creates new C2 domains every week. The researchers decoded the DGA logic and predicted future domains that will be generated up to January 2024, enhancing the ability to preemptively block potential C2 servers. While the campaign's perpetrators remain unidentified, their discretion and evasion techniques suggest a high level of sophistication and an intention to avoid detection.
Details
2024-01-07 15:08:57 bleepingcomputer CYBERCRIME Quantum Encryption Under Threat from KyberSlash Vulnerabilities
Kyber key encapsulation mechanism, part of the quantum-safe CRYSTALS suite, is vulnerable to a set of flaws named KyberSlash, which threaten encryption security. Flaws allow potential recovery of secret keys due to timing attacks during the decapsulation process, compromising the encryption's integrity. Projects like Mullvad VPN and Signal Messenger, which use Kyber for encryption, might be at risk, although the impact varies based on implementation. Patches for two vulnerabilities, KyberSlash1 and KyberSlash2, were released after researchers from Cryspen identified and reported them. Mullvad reports that their VPN product is not affected by KyberSlash, citing the use of unique key pairs for each connection as a mitigating factor. The article suggests that the overall threat posed by KyberSlash is contingent on specific use cases and the presence of additional security measures within the affected projects. There is no immediate comment from Signal on the impact of KyberSlash on their service or any remediation plans.
Details
2024-01-06 16:43:55 bleepingcomputer MALWARE Malware Abuses Google API to Steal Authentication Tokens
Malware strains Lumma and Rhadamanthys, among others, have been using an undocumented Google Chrome API to regenerate expired authentication cookies. The API, believed to be designed for synchronizing accounts, is being exploited to extend unauthorized access to Google accounts by refreshing "Refresh" tokens. Google has not publicly acknowledged this as an API vulnerability, considering it standard token theft, and has not documented this API beyond Chrome's source code. The company's advice to users includes logging out of Chrome or revoking sessions via g.co/mydevices to invalidate the Refresh token. Additionally, Google recommends changing passwords and enabling Enhanced Safe Browsing in Chrome for added protection against phishing and malware. Victims of such malware often remain unaware of the infection until their accounts are compromised, as was the case with an Orange España employee leading to operational disruptions. Google claims to have secured compromised accounts and notified affected users, but no clear strategy to prevent future abuse of the API has been announced.
Details
2024-01-06 15:12:25 bleepingcomputer CYBERCRIME Rampant Crypto Scams Plague Popular Social Platform's Ads
A surge in advertisements on X (formerly known as Twitter) is leading users to malicious sites offering cryptocurrency scams. Scammers abuse the platform's advertising system to display crypto drainer scams, fake airdrops, and phishing operations, taking advantage of users' crypto-related interests. Security researcher MalwareHunterTeam has been documenting and alerting others of the prevalent scam advertisements, with many originating from verified accounts. Community warnings emerge as vigilant users try to alert others about the fraudulent ads and wallet draining schemes. A notable 'MS Drainer' scam was reported to have stolen $59 million from over 63,000 victims within nine months through deceptive ads on Google Search and X. User frustration is mounting over the platform's apparent lax ad vetting process amidst speculation that a sharp decline in ad revenue is leading to less scrutiny on ad content. X's diminished response rate to press inquiries underscores the growing concern regarding ad-related cybercrime on the platform.
Details
2024-01-06 13:25:38 theregister CYBERCRIME Ransomware Payment Ban Debate: Risks and Sector Vulnerability
Experts argue that a universal ransomware payment ban is impractical and could spur more targeted attacks on critical infrastructure. Criminals may exploit exceptions for critical infrastructure, knowing that hospitals and utilities cannot afford downtimes during crises. In 2023, ransomware gangs attacked 46 US hospital systems, affecting 141 hospitals and resulting in significant disruptions and data theft. Enforcement of a payment ban would require unprecedented international cooperation, which is challenging due to various geopolitical interests. Underfunded sectors like local governments and schools are increasingly targeted, and a ban without providing them with support would be detrimental. In the United States, there is nearly $375 million in available grants to help state and local governments enhance cybersecurity defense mechanisms. Despite challenges, there's a growing consensus around the non-payment of ransoms, with 50 countries pledging not to pay at a White House summit. The advice for organizations is to invest in proactive defenses: use strong passwords, encryption, zero-trust access, network segmentation, multi-factor authentication, regular software updates, and backups.
Details
2024-01-06 08:25:04 thehackernews NATION STATE ACTIVITY Sea Turtle Espionage Strikes Dutch Telecoms and IT Sector
A threat actor named Sea Turtle, linked to Türkiye, has targeted Dutch IT and telecom companies for espionage. The group exploits supply chain vulnerabilities and uses DNS hijacking for credential theft and intelligence gathering. Victims include telecommunications, ISPs, IT service providers, media outlets, and Kurdish websites, with the aim of monitoring minority groups and political dissidents. Sea Turtle has been active since at least January 2017, with Microsoft connecting their operations to Turkish strategic interests in multiple countries. The group uses a Linux/Unix reverse TCP shell, SnappyTCP, with variants that include either secure TLS connections or cleartext communication for maintaining control and persistence. In a 2023 attack, Sea Turtle used a compromised cPanel account to deploy SnappyTCP and exfiltrate an email archive, though it's unclear how the initial credentials were obtained. Organizations are advised to adopt stronger passwords, enable 2FA, limit login attempts, monitor SSH traffic, and ensure timely updates of systems and software to mitigate the risk of such attacks.
Details
2024-01-06 06:53:26 thehackernews NATION STATE ACTIVITY Pro-Iranian Hackers Strike Albanian Entities with Destructive Malware
A pro-Iranian group called Homeland Justice used a wiper malware named No-Justice to target Albanian organizations, including ONE Albania and Eagle Mobile. The cyberattacks were specifically directed at Albania after the group declared it would "destroy supporters of terrorists." The No-Justice malware is configured to make the operating system unrecoverable by tampering with the Master Boot Record. In the cyber campaign, a PowerShell script was deployed alongside the wiper for propagation within the network. The attacks have raised concerns, given the increased activity of Iranian hacktivist proxies like Cyber Av3ngers and Cyber Toufan across Israel and the U.S. These threat actors utilize double-retaliation strategies in their attacks, leveraging psychological warfare and targeting both Israeli and U.S. entities. Despite the efforts to curb such threats, several organizations remain severely affected, with some still inoperable over a month after being attacked. The Israel National Cyber Directorate is monitoring around 15 hacker groups exploiting Israeli cyberspace, employing tactics reminiscent of the cyber dimension of the Ukraine-Russia conflict.
Details
2024-01-05 22:20:48 bleepingcomputer RANSOMWARE Weekly Ransomware Digest: Decryptors Revealed, Attacks on Xerox and CSV
BleepingComputer demonstrated a new decryptor for Black Basta ransomware that was used by professionals until the group fixed the flaw in December 2023. Despite the decryption capability, Black Basta's negotiation sites remain operational although their data leak site is facing technical difficulties. Xerox subsidiary XBS was targeted by a ransomware attack; the INC Ransomware group claimed to have significant access, which has not been independently verified. Australia's Court Services Victoria (CSV) experienced a ransomware incident, compromising the security of court hearing recordings. Sale of Zeppelin Ransomware source code on a hacking forum could indicate the potential rise of ransomware-as-a-service operations requiring close monitoring. Several new ransomware variants were identified, including Shuriken, a new Xorist variant, Mallox, and Empire, each with unique file extensions and ransom notes. A notable incident reported was the Russian hacker attack on Ukraine's largest telecom, Kyivstar, resulting in a complete wipe of the core network's systems.
Details
2024-01-05 22:00:18 theregister CYBERCRIME Ransomware Attackers Threaten Cancer Patients in Extortion Tactic
Attackers infiltrated Seattle's Fred Hutchinson Cancer Center, stealing sensitive medical records and then threatening to swat patients unless a ransom was paid. Swatting involves making false reports to law enforcement, prompting an armed response at victims' locations—here, used as pressure to force payment. The center notified both FBI and local authorities; FBI investigated the cyber incident as well as the swatting threats. Integris Health in Oklahoma suffered a similar cyber incident, with patients informed about potential personal data breaches and subsequent threats. These crimes reflect a disturbing trend towards more aggressive extortion measures by cybercriminals, including threatening real-world violence. Security experts like Emsisoft advocate for a ban on ransom payments, citing an escalation in criminals' aggression. Miscreants have expanded extortion tactics from encryption to sending threatening texts, delivering flowers with demands, and leveraging clients of victim companies. There is an increase in ransomware attacks against hospitals, with the number of US hospital networks infected rising from 25 in 2022 to 46 in the previous year.
Details