Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11575

Checks for new stories every ~15 minutes

Title Summary
ROWS
2023-09-01 12:15:14 theregister NATION STATE ACTIVITY Chinese Spies Maintain Control of Networks Through Barracuda Gateway Attacks
Chinese cyberspies compromised nearly a third of organizations through a vulnerability in Barracuda Email Security Gateways Even after victims took action to secure their devices, the cyberspies may still have access through previously planted backdoors Mandiant recommends replacing vulnerable Barracuda equipment US government's Cybersecurity and Infrastructure Security Agency (CISA) released more indicators of compromise associated with the exploitation of the vulnerability Chinese espionage team UNC4841 deployed new and novel malware to maintain presence in high priority targets Approximately five percent of Barracuda ESG appliances were compromised worldwide US and Canadian organizations were hit the hardest, with government agencies making up 27 percent of victims Mandiant revealed a second wave of attacks using new malware families to maintain access to compromised environments.
Details
2023-09-01 12:15:14 theregister NATION STATE ACTIVITY Kremlin-backed Sandworm Strikes Android Devices with Data-Stealing Malware
Russia's Sandworm group, backed by the Kremlin, is using a malware strain called Infamous Chisel to remotely access Ukrainian soldiers' devices Infamous Chisel allows the group to monitor network traffic, access files, and steal sensitive information from the devices The Ukrainian security agency was able to detect and block Sandworm's latest campaign using Infamous Chisel to break into the army's combat data exchange system Researchers have also discovered trojanized Signal and Telegram apps for Android that are part of a Chinese nation-state espionage campaign The fake apps were found to contain the BadBazaar malware, which has been used in the past to spy on ethnic minorities The UK National Cyber Security Centre, along with other international agencies, have confirmed Ukraine's reports of Sandworm's new mobile malware Infamous Chisel is a collection of components that provides backdoor access via the Tor network, allowing for persistent spying on infected devices Sandworm has previously launched other malware campaigns against Ukrainian targets, including ransomware attacks and destructive cyberattacks
Details
2023-09-01 12:15:14 theregister RANSOMWARE Free Decryptor Released for Key Group Ransomware Victims
A team of security researchers has released a decryption tool to restore files encrypted by the Key Group ransomware. The decryptor only works on a specific version of the ransomware built around August 3. The tool is available for free and was developed by exploiting cryptographic errors made by the ransomware gang. Key Group ransomware uses a fixed password and fixed salt, making it easy to write a decryption routine for the encrypted files. The gang has been telling victims they must pay the ransom to restore their data, despite their mistakes and use of "military-grade" encryption. Key Group has been characterized as a "low-sophisticated threat actor" and has been seen using public and private Telegram channels for their activities.
Details
2023-09-01 12:15:14 thehackernews CYBERCRIME Classiscam Scam-as-a-Service Raked $64.5 Million During the COVID-19 Pandemic
Classiscam scam-as-a-service program has earned criminals $64.5 million in illicit earnings since 2019 Scammers initially placed fake advertisements on classified sites and used social engineering techniques The scam has become highly automated and can be run on various online platforms Majority of victims are based in Europe, followed by the Middle East and Africa, and the Asia-Pacific Classiscam encompasses 1,366 distinct groups on Telegram, targeting 79 countries and impersonating 251 brands Scammers trick users into buying falsely-advertised goods or services through social engineering Phishing pages are created using Telegram bots, and login credentials are harvested for fraudulent activities Some groups have switched to using stealer malware to collect passwords and transfer data
Details
2023-09-01 12:15:14 thehackernews CYBERCRIME New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean Activists
A new phishing attack targeted civil society groups in South Korea The attack led to the discovery of a remote access trojan called SuperBear The attacker impersonated a member of the organization and sent a malicious LNK file to an activist The LNK file executed a PowerShell command to fetch next-stage payloads from a compromised WordPress website The attack involved process injection using a suspended instance of Explorer.exe The SuperBear trojan establishes communication with a remote server to exfiltrate data and download additional commands and libraries The malware is believed to be associated with a North Korean nation-state actor named Kimsuky This is not the first time North Korean actors have targeted South Korean individuals and organizations
Details
2023-09-01 12:15:14 bleepingcomputer MALWARE Free Key Group ransomware decryptor helps victims recover data
Security experts at EclecticIQ have developed a decryption tool for Key Group ransomware The tool works for versions of the malware built in early August The ransomware uses a static salt in its encryption scheme, making it possible to reverse Key Group is a Russian-speaking threat actor that has attacked various organizations and uses private Telegram channels for ransom negotiations The ransomware appends the .KEYGROUP777TG file extension to all entries and deletes Volume Shadow copies to prevent system restoration Users can run the Python decryption script to search for anddecrypt files with the .KEYGROUP777TG extension, but should backup their data before doing so The release of the decryptor may prompt Key Group to improve the security of its ransomware
Details
2023-09-01 12:15:14 bleepingcomputer DATA BREACH LogicMonitor Customers Hacked in Reported Ransomware Attacks
LogicMonitor, a network monitoring company, confirms cyberattacks on some users of its SaaS platform The hacking campaign has affected a small number of users Anonymous sources reveal that threat actors hacked customer accounts, created local accounts, and deployed ransomware Ransomware was deployed using the platform's on-premise LogicMonitor Collector sensors The attacks targeting LogicMonitor's customers occurred last week LogicMonitor is investigating technical abnormalities impacting customer accounts Weak default passwords assigned by LogicMonitor to new users were exploited in the attacks LogicMonitor is sharing minimal information with users about the incidents
Details
2023-09-01 12:15:14 bleepingcomputer NATION STATE ACTIVITY North Korean Hackers Behind Malicious VMConnect PyPI Campaign
North Korean state-sponsored hackers are behind a campaign that uploaded malicious packages to the PyPI repository The packages impersonated popular software projects such as the VMware vSphere connector module vConnector The campaign is attributed to the Labyrinth Chollima subgroup of North Korean hackers known as Lazarus The malicious packages featured minimal differences from the originals and contained a malicious function for data collection Data collected from infected machines is sent to the attacker's command and control servers The campaign is linked to Lazarus based on evidence such as the payload decoding routine found in the malicious packages Attribution confidence is high due to similarities with other Lazarus subgroups and the malware they have been associated with
Details
2023-09-01 12:15:14 bleepingcomputer DATA BREACH Forever 21 Data Breach Exposes Personal Information of 500,000 Individuals
Forever 21, a clothing and accessories retailer, suffered a data breach that exposed the personal information of over 500,000 individuals Hackers had intermittent access to Forever 21 systems between January and March, and stole select files during this time The breach primarily affected current and former Forever 21 employees, not customers Forever 21 has taken steps to ensure the stolen data has been erased, indicating potential communication with the attackers There is no confirmation of a ransomware attack, and the company believes the risk to exposed individuals is low Impacted individuals will receive instructions on enrolling in a free 12-month fraud and identity theft protection service This is not the first data breach for Forever 21, as they previously notified customers of a breach in 2017 affecting payment card data from transactions made between March and October
Details
2023-09-01 12:15:14 bleepingcomputer DATA BREACH Sourcegraph Website Breached Due to Leaked Admin Access Token
The website of the AI-powered coding platform Sourcegraph was breached using a leaked admin access token. The token was accidentally leaked online on July 14th, and an attacker used it on August 28th to create a new site-admin account. The breach was discovered after an increase in API usage was observed by Sourcegraph's security team. The attacker probed Sourcegraph's system by switching account privileges multiple times. Sourcegraph customers' information, including license keys, names, and email addresses, was accessed, but no sensitive data such as private code or passwords was exposed. Sourcegraph took immediate action by deactivating the malicious account, reducing API rate limits, and rotating potentially exposed license keys.
Details