Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12586

Checks for new stories every ~15 minutes

Title Summary
ROWS
2023-09-05 14:41:21 bleepingcomputer DATA BREACH Hackers Exploit MinIO Storage System to Breach Corporate Networks
Hackers are exploiting vulnerabilities in the MinIO storage system to breach object storage systems and access private information Two vulnerabilities, CVE-2023-28432 and CVE-2023-28434, are being used by attackers to execute arbitrary code and potentially take over servers Attackers are using a modified version of MinIO called Evil MinIO, which replaces the legitimate software with modified code that adds a backdoor The attack begins with social engineering to convince a DevOps engineer to downgrade to a vulnerable version of MinIO Hackers exploit one vulnerability to remotely access server environment variables and administrative credentials The malicious update replaces legitimate code with a tampered version that allows for remote command execution The backdoor in Evil MinIO is not detected by antivirus engines on Virus Total After breaching the storage system, attackers establish a communication channel with a command and control server and download additional payloads for post-compromise activity 38% of MinIO instances exposed on the public internet are confirmed to run a non-vulnerable version, but administrators should still apply the security update to protect against attacks.
Details
2023-09-05 14:41:21 bleepingcomputer DDOS German Financial Agency Website Targeted by Ongoing DDoS Attack
The German Federal Financial Supervisory Authority (BaFin) has been experiencing an ongoing distributed denial-of-service (DDoS) attack on its website since Friday BaFin is responsible for regulating banks, financial, and insurance service providers in Germany The agency has taken necessary security precautions and defensive measures, including taking its public website offline, but assures that its crucial systems are unaffected The website hosts consumer and regulation information, important documents, a database of registered companies, job vacancies, and a platform for whistleblowers BaFin's IT team is working to restore public access to the website, but it is unclear when this will be accomplished
Details
2023-09-05 14:41:21 bleepingcomputer DATA BREACH Insurer Fined $3M for Exposing Data of 650k Clients for Two Years
Swedish insurer Trygg-Hansa fined $3 million for exposing sensitive data of hundreds of thousands of customers Investigation initiated after a customer alerted authorities about the accessibility of backend database Backend database could be accessed without authentication, allowing browsing of private documents of other individuals Approximately 650,000 customers affected by the data exposure Data was exposed for more than two years, increasing the risk of exploitation by cybercriminals At least 202 cases of personal information exposure confirmed, but more cases may exist Insurer's failure to address the issue despite receiving reports indicates a severe shortfall in data security and risk mitigation measures Swedish Authority for Privacy Protection imposed an administrative penalty of $3 million on the insurer.
Details
2023-09-05 14:41:21 bleepingcomputer DATA BREACH Freecycle Confirms Massive Data Breach Impacting 7 Million Users
Nonprofit organization Freecycle confirms a massive data breach affecting over 7 million users. Stolen data, including usernames, User IDs, email addresses, and hashed passwords, was put up for sale on a hacking forum. Threat actor claims to have full access to member information and forum posts, including the credentials of Freecycle's founder and executive director. Users are advised to change their passwords and be aware of potential delays in the password reset process. Freecycle has reported the breach to the appropriate authorities. Users are cautioned to remain vigilant of phishing emails and be cautious of spam.
Details
2023-09-01 16:42:29 thehackernews RANSOMWARE Threat Actors Targeting Microsoft SQL Servers to Deploy FreeWorld Ransomware
Threat actors are exploiting poorly secured Microsoft SQL (MS SQL) servers to deliver Cobalt Strike and a ransomware strain called FreeWorld. The campaign, dubbed DB#JAMMER, utilizes a range of tools, including enumeration software, RAT payloads, exploitation and credential stealing software, and ransomware payloads. Initial access is gained by brute-forcing the MS SQL server, and the attackers then use it to conduct reconnaissance and establish persistence. The attackers distribute AnyDesk software to push FreeWorld ransomware after installing malicious tools like Cobalt Strike. The attackers have unsuccessfully attempted to establish RDP persistence through Ngrok. The use of strong passwords, especially on publicly exposed services, is emphasized as crucial in preventing such attacks. 2023 has seen a surge in ransomware attacks, with a record-low percentage of victims paying, but high average ransom amounts. Ransomware threat actors are evolving their tradecraft, including sharing attack details to show why victims are not eligible for cyber insurance payouts.
Details
2023-09-01 14:36:12 theregister DDOS Defeating a DDoS Swarm: Protecting Your Business from Attack
DDoS attacks are becoming increasingly common and their volume and scale are rising steeply. In 2023, DDoS attacks are forecasted to exceed previous records as hacktivists, cyber criminals, and state players aim to disrupt the internet with spurious web traffic. The article promotes a webinar led by Cloudflare's Derek Chamorro, who will discuss how to identify and defend against DDoS threats. The webinar will provide advice on mitigating the consequences of a DDoS attack and building effective defenses. Readers are encouraged to sign up for the DDoS mitigation webinar for further guidance and reminders.
Details
2023-09-01 14:24:15 bleepingcomputer DATA BREACH Golf gear giant Callaway data breach exposes info of 1.1 million
Callaway experienced a data breach in early August, exposing sensitive personal and account data of over a million customers The breach affected customers of Callaway and its sub-brands Odyssey, Ogio, and Callaway Gold Preowned sites Compromised customer data includes user account information such as passwords and security questions No payment card information, government ID, or Social Security Numbers (SSNs) were exposed Callaway has forced a password reset for all customer accounts and provided instructions on how to proceed Users should change passwords for other websites or online services using different credentials and be cautious of unknown senders requesting additional data.
Details
2023-09-01 12:34:02 bleepingcomputer MALWARE DreamBus Malware Exploits RocketMQ Flaw to Infect Servers
A new version of the DreamBus botnet malware is leveraging a critical vulnerability in RocketMQ servers to infect devices. The vulnerability, tracked as CVE-2023-33246, is a permission verification issue in RocketMQ version 5.1.0 and older. DreamBus attacks targeting the vulnerability were first observed in early June, with a spike in activity in mid-June. Attackers use the 'interactsh' reconnaissance tool to identify vulnerable servers and download a malicious bash script named 'reketed' to install the DreamBus main module. DreamBus remains active on infected systems by setting up a system service and a cron job, with lateral spreading mechanisms and a scanner module for discovering vulnerabilities. The primary goal of the DreamBus campaign appears to be Monero mining, but the modular nature of the malware enables future expansion of capabilities. Administrators are advised to upgrade to RocketMQ version 5.1.1 or later to mitigate the risk of DreamBus attacks. Good patch management across all software products is recommended to combat this malware and similar threats.
Details
2023-09-01 12:34:02 bleepingcomputer MALWARE The FBI Successfully Disrupts Qakbot Malware and Removes it from Infected Devices
The FBI carried out a law enforcement operation called Operation Duck Hunt to disrupt the Qakbot botnet. The operation seized the botnet's infrastructure and uninstalled the Qakbot malware from infected devices. Qakbot, also known as Qbot and Pinkslipbot, is a banking trojan that evolved into a malware delivery service used for ransomware attacks and data theft. The malware is distributed through phishing campaigns, reply-chain email attacks, and exploits zero-day vulnerabilities in Windows. Qakbot operators partnered with ransomware gangs to gain initial access to networks. The FBI dismantled the botnet by seizing the attacker's servers and creating a removal tool to uninstall the malware. The FBI accessed encryption keys used by Qakbot for communication and replaced the malware with an FBI-controlled module. A custom DLL file issued by the FBI acted as a removal tool and stopped the Qakbot process on infected devices. The FBI expects further devices to be cleaned as they connect back to the hijacked Qakbot infrastructure.
Details
2023-09-01 12:34:02 bleepingcomputer MALWARE Trojanized Signal and Telegram Apps Deliver Spyware
Chinese APT hacking group, GREF, uploaded trojanized Signal and Telegram apps containing the BadBazaar spyware onto Google Play and Samsung Galaxy Store BadBazaar spyware was previously used to target ethnic minorities in China but is now targeting users in Ukraine, Poland, the Netherlands, Spain, Portugal, Germany, Hong Kong, and the United States BadBazaar spyware can track device location, steal call logs and SMS, record phone calls, take pictures, exfiltrate contact lists, and steal files or databases GREF used trojanized versions of the apps named "Signal Plus Messenger" and "FlyGram," with dedicated websites to add legitimacy to the campaign FlyGram targets sensitive data such as contact lists, call logs, Google Accounts, and WiFi data, while Signal Plus Messenger focuses on extracting Signal-specific information and allows attackers to link to victims' Signal accounts without their knowledge At least 13,953 FlyGram users enabled a backup feature that sent communication data to an attacker-controlled server Android users are advised to use the original versions of Signal and Telegram and avoid downloading fork apps promising enhanced privacy or additional features from official app stores.
Details
2023-09-01 12:34:02 bleepingcomputer CYBERCRIME Hackers Use Brute-Force Attacks to Breach Cisco VPNs
Hackers are targeting Cisco Adaptive Security Appliance (ASA) SSL VPNs in credential stuffing and brute-force attacks. Rapid7 security researchers confirm that attackers have been attempting to guess login credentials since March of this year. No instances have been found where the attackers bypassed multi-factor authentication (MFA). At least 11 customers have been breached in Cisco ASA-related attacks between March and August. Most attacks utilized similar infrastructure and common usernames. Attackers remotely accessed networks and compromised systems using stolen domain credentials. Some breaches led to LockBit and Akira ransomware attacks. Admins and security teams are advised to deactivate default accounts and passwords and enforce MFA for all VPN users.
Details
2023-09-01 12:34:02 bleepingcomputer DATA BREACH Critical SSH Authentication Bypass Flaw in VMware Aria Exposes Private Endpoints
VMware Aria Operations for Networks is vulnerable to a critical severity authentication bypass flaw. The flaw allows remote attackers to bypass SSH authentication and access private endpoints. Exploiting the flaw could lead to data exfiltration or manipulation through the product's command line interface. Upgrading to version 6.11 or applying the KB94152 patch is the only way to remediate the critical flaw, as no workarounds or mitigation recommendations have been provided. Another high-severity flaw, CVE-2023-20890, also addressed by the patch, allows for arbitrary file write and remote code execution. Due to the value of assets held by large organizations using this software, hackers are quick to exploit critical severity flaws. Active exploitation of previous vulnerabilities in Aria Operations for Networks has already been reported, emphasizing the need for prompt patching or upgrading. Delaying patching or upgrading would significantly increase the risk of hacker attacks on the network.
Details
2023-09-01 12:34:02 bleepingcomputer DATA BREACH WordPress migration add-on flaw could lead to data breaches
Popular WordPress data migration plugin, All-in-One WP Migration, has a flaw that could lead to data breaches The flaw allows unauthenticated access token manipulation, giving attackers access to sensitive site information Various premium extensions of the plugin contain the same vulnerable code Attackers could divert website migration data or restore malicious backups The primary ramification is a potential data breach, including user details and proprietary information The issue was discovered by PatchStack's researcher and reported to ServMask, the plugin's vendor ServMask released security updates to fix the flaw Users of the impacted extensions are advised to upgrade to the fixed versions and use the latest version of the base plugin.
Details
2023-09-01 12:34:02 bleepingcomputer MISCELLANEOUS Apple Opens Applications for 'Security Research' iPhones
Apple is accepting applications from iOS security researchers to receive a Security Research Device (SRD) iPhone 14 Pro. SRDs are specially-built devices with disabled security features and shell access for vulnerability research on the iOS platform. Researchers can use the SRD to discover vulnerabilities and have them considered for Apple's Security Bounty program. The SRDs are 12-month renewable loans and should only be used by authorized individuals and remain within the premises of the security research facility. Universities can also request access to the SRDs for instructional purposes. Applications for the 2024 iPhone Security Research Device Program are open until October 31. Accepted participants will be notified at the beginning of 2024.
Details
2023-09-01 12:34:02 bleepingcomputer DATA BREACH Paramount Discloses Data Breach Impacting Less Than 100 Individuals
American entertainment giant Paramount Global disclosed a data breach after its systems were hacked Attackers gained access to personally identifiable information (PII) Breach occurred between May and June 2023 Personal information that may have been accessed includes names, dates of birth, Social Security numbers, and government-issued identification numbers Paramount has taken steps to secure impacted systems and is conducting an investigation A cybersecurity expert has been hired to assist with the investigation Paramount is collaborating with law enforcement agents Upgrading security measures to prevent future incidents
Details