Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 11575
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2023-09-01 12:15:14 | theregister | NATION STATE ACTIVITY | Chinese Spies Maintain Control of Networks Through Barracuda Gateway Attacks | Chinese cyberspies compromised nearly a third of organizations through a vulnerability in Barracuda Email Security Gateways
Even after victims took action to secure their devices, the cyberspies may still have access through previously planted backdoors
Mandiant recommends replacing vulnerable Barracuda equipment
US government's Cybersecurity and Infrastructure Security Agency (CISA) released more indicators of compromise associated with the exploitation of the vulnerability
Chinese espionage team UNC4841 deployed new and novel malware to maintain presence in high priority targets
Approximately five percent of Barracuda ESG appliances were compromised worldwide
US and Canadian organizations were hit the hardest, with government agencies making up 27 percent of victims
Mandiant revealed a second wave of attacks using new malware families to maintain access to compromised environments. | Details |
| 2023-09-01 12:15:14 | theregister | NATION STATE ACTIVITY | Kremlin-backed Sandworm Strikes Android Devices with Data-Stealing Malware | Russia's Sandworm group, backed by the Kremlin, is using a malware strain called Infamous Chisel to remotely access Ukrainian soldiers' devices
Infamous Chisel allows the group to monitor network traffic, access files, and steal sensitive information from the devices
The Ukrainian security agency was able to detect and block Sandworm's latest campaign using Infamous Chisel to break into the army's combat data exchange system
Researchers have also discovered trojanized Signal and Telegram apps for Android that are part of a Chinese nation-state espionage campaign
The fake apps were found to contain the BadBazaar malware, which has been used in the past to spy on ethnic minorities
The UK National Cyber Security Centre, along with other international agencies, have confirmed Ukraine's reports of Sandworm's new mobile malware
Infamous Chisel is a collection of components that provides backdoor access via the Tor network, allowing for persistent spying on infected devices
Sandworm has previously launched other malware campaigns against Ukrainian targets, including ransomware attacks and destructive cyberattacks | Details |
| 2023-09-01 12:15:14 | theregister | RANSOMWARE | Free Decryptor Released for Key Group Ransomware Victims | A team of security researchers has released a decryption tool to restore files encrypted by the Key Group ransomware.
The decryptor only works on a specific version of the ransomware built around August 3.
The tool is available for free and was developed by exploiting cryptographic errors made by the ransomware gang.
Key Group ransomware uses a fixed password and fixed salt, making it easy to write a decryption routine for the encrypted files.
The gang has been telling victims they must pay the ransom to restore their data, despite their mistakes and use of "military-grade" encryption.
Key Group has been characterized as a "low-sophisticated threat actor" and has been seen using public and private Telegram channels for their activities. | Details |
| 2023-09-01 12:15:14 | thehackernews | CYBERCRIME | Classiscam Scam-as-a-Service Raked $64.5 Million During the COVID-19 Pandemic | Classiscam scam-as-a-service program has earned criminals $64.5 million in illicit earnings since 2019
Scammers initially placed fake advertisements on classified sites and used social engineering techniques
The scam has become highly automated and can be run on various online platforms
Majority of victims are based in Europe, followed by the Middle East and Africa, and the Asia-Pacific
Classiscam encompasses 1,366 distinct groups on Telegram, targeting 79 countries and impersonating 251 brands
Scammers trick users into buying falsely-advertised goods or services through social engineering
Phishing pages are created using Telegram bots, and login credentials are harvested for fraudulent activities
Some groups have switched to using stealer malware to collect passwords and transfer data | Details |
| 2023-09-01 12:15:14 | thehackernews | CYBERCRIME | New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean Activists | A new phishing attack targeted civil society groups in South Korea
The attack led to the discovery of a remote access trojan called SuperBear
The attacker impersonated a member of the organization and sent a malicious LNK file to an activist
The LNK file executed a PowerShell command to fetch next-stage payloads from a compromised WordPress website
The attack involved process injection using a suspended instance of Explorer.exe
The SuperBear trojan establishes communication with a remote server to exfiltrate data and download additional commands and libraries
The malware is believed to be associated with a North Korean nation-state actor named Kimsuky
This is not the first time North Korean actors have targeted South Korean individuals and organizations | Details |
| 2023-09-01 12:15:14 | bleepingcomputer | MALWARE | Free Key Group ransomware decryptor helps victims recover data | Security experts at EclecticIQ have developed a decryption tool for Key Group ransomware
The tool works for versions of the malware built in early August
The ransomware uses a static salt in its encryption scheme, making it possible to reverse
Key Group is a Russian-speaking threat actor that has attacked various organizations and uses private Telegram channels for ransom negotiations
The ransomware appends the .KEYGROUP777TG file extension to all entries and deletes Volume Shadow copies to prevent system restoration
Users can run the Python decryption script to search for anddecrypt files with the .KEYGROUP777TG extension, but should backup their data before doing so
The release of the decryptor may prompt Key Group to improve the security of its ransomware | Details |
| 2023-09-01 12:15:14 | bleepingcomputer | DATA BREACH | LogicMonitor Customers Hacked in Reported Ransomware Attacks | LogicMonitor, a network monitoring company, confirms cyberattacks on some users of its SaaS platform
The hacking campaign has affected a small number of users
Anonymous sources reveal that threat actors hacked customer accounts, created local accounts, and deployed ransomware
Ransomware was deployed using the platform's on-premise LogicMonitor Collector sensors
The attacks targeting LogicMonitor's customers occurred last week
LogicMonitor is investigating technical abnormalities impacting customer accounts
Weak default passwords assigned by LogicMonitor to new users were exploited in the attacks
LogicMonitor is sharing minimal information with users about the incidents | Details |
| 2023-09-01 12:15:14 | bleepingcomputer | NATION STATE ACTIVITY | North Korean Hackers Behind Malicious VMConnect PyPI Campaign | North Korean state-sponsored hackers are behind a campaign that uploaded malicious packages to the PyPI repository
The packages impersonated popular software projects such as the VMware vSphere connector module vConnector
The campaign is attributed to the Labyrinth Chollima subgroup of North Korean hackers known as Lazarus
The malicious packages featured minimal differences from the originals and contained a malicious function for data collection
Data collected from infected machines is sent to the attacker's command and control servers
The campaign is linked to Lazarus based on evidence such as the payload decoding routine found in the malicious packages
Attribution confidence is high due to similarities with other Lazarus subgroups and the malware they have been associated with | Details |
| 2023-09-01 12:15:14 | bleepingcomputer | DATA BREACH | Forever 21 Data Breach Exposes Personal Information of 500,000 Individuals | Forever 21, a clothing and accessories retailer, suffered a data breach that exposed the personal information of over 500,000 individuals
Hackers had intermittent access to Forever 21 systems between January and March, and stole select files during this time
The breach primarily affected current and former Forever 21 employees, not customers
Forever 21 has taken steps to ensure the stolen data has been erased, indicating potential communication with the attackers
There is no confirmation of a ransomware attack, and the company believes the risk to exposed individuals is low
Impacted individuals will receive instructions on enrolling in a free 12-month fraud and identity theft protection service
This is not the first data breach for Forever 21, as they previously notified customers of a breach in 2017 affecting payment card data from transactions made between March and October | Details |
| 2023-09-01 12:15:14 | bleepingcomputer | DATA BREACH | Sourcegraph Website Breached Due to Leaked Admin Access Token | The website of the AI-powered coding platform Sourcegraph was breached using a leaked admin access token.
The token was accidentally leaked online on July 14th, and an attacker used it on August 28th to create a new site-admin account.
The breach was discovered after an increase in API usage was observed by Sourcegraph's security team.
The attacker probed Sourcegraph's system by switching account privileges multiple times.
Sourcegraph customers' information, including license keys, names, and email addresses, was accessed, but no sensitive data such as private code or passwords was exposed.
Sourcegraph took immediate action by deactivating the malicious account, reducing API rate limits, and rotating potentially exposed license keys. | Details |