Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12815

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-03-06 18:11:39 bleepingcomputer CYBERCRIME Cybercrime Duo Arrested for Stealing $635,000 in Concert Tickets
Two individuals, working for StubHub's contractor Sutherland Global Services in Jamaica, exploited a loophole to steal nearly 1,000 concert tickets worth $635,000. The majority of the stolen tickets were for Taylor Swift's Eras Tour, with other tickets from events like Ed Sheeran and Adele concerts, NBA games, and the US Open Tennis Championships also targeted. Defendants Tyrone Rose and Shamara Simmons intercepted around 350 StubHub orders, redirecting ticket download URLs to their own emails. The cybercrime operation involved rerouting already sold tickets from a secure network area, enabling unauthorized resale and profit. Queens County District Attorney Melinda Katz emphasized the importance of vigilance in combating cybercrimes, highlighting the role of her office's Cybercrime and Cryptocurrency Unit. The ongoing investigation aims to uncover the full extent of the fraudulent activity and identify additional co-conspirators. Rose and Simmons face multiple charges, including grand larceny and computer tampering, with a maximum potential sentence of up to 15 years if convicted of the top count.
Details
2025-03-06 17:13:55 bleepingcomputer MALWARE Stealthy Ethereum Key Theft Via Malicious Python Package
A malicious package named "set-utils" on the Python Package Index (PyPI) has been identified as stealing Ethereum private keys from developers and users. The package, mimicking legitimate Python utilities, intercepted wallet creation functions to exfiltrate keys through the Polygon blockchain. Over 1,000 instances of "set-utils" were downloaded, potentially impacting a significant number of users beyond the direct downloads due to its application in generating wallets. The malicious package utilized stealth techniques by embedding stolen data in blockchain transactions, making it difficult to detect via traditional security tools. The attackers encrypted the stolen keys with their RSA public key and used a low-cost, high-anonymity method by implementing Polygon transactions. Following the discovery by research firm Socket, the "set-utils" package was removed from PyPI to prevent further downloads. Developers who have used this package are advised to immediately uninstall it and treat all associated Ethereum wallets as compromised.
Details
2025-03-06 15:43:57 bleepingcomputer CYBERCRIME Over 37,000 VMware Servers At Risk from Critical Exploit
Over 37,000 internet-facing VMware ESXi instances are currently vulnerable to a critical flaw, CVE-2025-22224. The flaw, an out-of-bounds write vulnerability, enables attackers with local access to execute code on the host system. The issue was identified and reported by the Microsoft Threat Intelligence Center and confirmed to be exploited in the wild. U.S. CISA has mandated that federal and state entities patch the affected systems by March 25, 2025, or cease using the impacted VMware products. The highest numbers of vulnerable servers are located in China, France, and the United States. Despite recent patches, thousands of systems remain exposed, with no alternative mitigations provided if upgrading is not possible. VMware and Broadcom have issued advisories and FAQs to help address the vulnerabilities and guide users on the necessary actions.
Details
2025-03-06 15:25:14 theregister CYBERCRIME Toronto Zoo Ransomware Attack Exposes Decades of Data
Toronto Zoo confirmed a ransomware attack that compromised visitor data dating back to 2000. Personal information stolen includes names, addresses, phone numbers, and in some cases, email addresses. For visitors who made credit card transactions from January 2022 to April 2023, partial credit card details were also taken. The attack exposed data of approximately 1.2 million annual visitors, 35,000 member households, and staff information back to 1989. The ransomware group Akira, which became prominent last year, claimed responsibility for the breach. Akira still holds 133 GB of the zoo's data, including NDAs, personal files, and wildlife research data. Toronto Zoo has enhanced its IT security in response and worked with the City of Toronto's Chief Information Security Office. The zoo has reported the incident to the Office of the Information and Privacy Commissioner of Ontario, which is conducting an investigation.
Details
2025-03-06 15:05:47 bleepingcomputer MISCELLANEOUS Free vCISO Course to Empower MSPs and Enhance Cybersecurity
The rising demand for cybersecurity has spurred the popularity of virtual Chief Information Security Officers (vCISO) among small and medium-sized businesses (SMBs). Over 94% of Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) acknowledge a growing need for vCISO services, while more than a quarter report a lack of expertise to offer these services. The vCISO Academy, a free learning platform, has been established to close this expertise gap by training service providers on how to develop and manage vCISO services efficiently. As cyber threats increase, the role of vCISOs is critical for SMBs, with surveyed MSPs showing strong future plans to adopt vCISO offerings. The academy provides structured, self-paced training geared towards helping MSPs and MSSPs create new revenue opportunities and enhance client relations while ensuring cybersecurity resilience. By tackling the shortage of necessary skills and knowledge, the academy supports service providers in confidently expanding their cybersecurity solutions into the vCISO market.
Details
2025-03-06 14:35:17 theregister CYBERCRIME Critical Need for Cybersecurity Investments in Rural US Hospitals
Microsoft estimates a $75 million investment is needed to enhance cybersecurity in rural US hospitals. Cyberattacks greatly affect patient outcomes, with research indicating a 20% increase in mortality following hospital cyberattacks. Proactive measures include implementing MFA and separating user accounts, costing about $30,000-$40,000 per hospital. Independent rural hospitals, not part of larger networks and most vulnerable, require an estimated $40 million to $45 million to secure. Experts call for a united effort from security vendors, policymakers, and healthcare leaders to address long-term cybersecurity challenges. Rural hospitals serve 46 million Americans and are closing at an accelerated rate, exacerbating healthcare access and safety. Financial constraints prevent these hospitals from affording skilled IT staff and necessary security infrastructure. The healthcare sector was the primary target of ransomware in 2023, with heavy financial damages amplifying the strain on resources.
Details
2025-03-06 14:26:25 bleepingcomputer MALWARE Malicious Chrome Extensions Mimic Password Managers to Steal Data
Malicious Chrome extensions are capable of spoofing legitimate browser extensions like password managers, crypto wallets, and banking apps to harvest sensitive information. The attack, created by SquareX Labs, is described as "polymorphic," meaning the malicious extension can change its appearance and functionality to impersonate legitimate extensions. The attack starts with the installation of an apparently genuine extension from Chrome's Web Store, which then uses AI to change its behavior based on the other extensions it detects on the user's browser. Techniques used include exploiting the 'chrome.management' API to ascertain which extensions are installed and resource injection to check for the presence of specific target extensions. If the malicious extension detects a target like 1Password, it deactivates the real extension and replaces its icon and name, presenting a fake login popup to capture user credentials through phishing. After harvesting credentials, the deceptive extension reverts to its original form and reactivates the legitimate extension, leaving the user unaware of any interference. SquareX has recommended that Google implement measures to block or alert users to sudden changes in installed extensions to prevent this type of exploitation.
Details
2025-03-06 12:35:15 thehackernews MALWARE Elastic Patches Critical Remote Code Execution Flaw in Kibana
Elastic has issued updates to address a critical vulnerability in Kibana (CVE-2025-25012) with a CVSS score of 9.9, enabling remote code execution. The vulnerability, stemming from prototype pollution, allows attackers to manipulate JavaScript objects, potentially leading to unauthorized data access or privilege escalation. Affected versions include all Kibana releases from 8.15.0 to 8.17.3, with the fix implemented in version 8.17.3. Initial exploitation risks were primarily towards users with the Viewer role, expanding to users with specific privileges in subsequent versions. Users are recommended to immediately update their systems to the patched version to mitigate risk. If unable to patch immediately, setting the "xpack.integration_assistant.enabled" flag to false in the Kibana configuration is advised as a temporary measure. Elastic previously addressed similar security issues in 2024, highlighting ongoing vulnerabilities in prototype pollution and deserialization within Kibana.
Details
2025-03-06 12:17:36 thehackernews CYBERCRIME EncryptHub Enhances Cyber Attacks with Ransomware and Phishing Tactics
EncryptHub, a financially motivated hacking group, uses sophisticated phishing campaigns to deploy ransomware and information stealers. The group distributes trojanized applications mimicking popular software to infiltrate systems, including counterfeit versions of communication and development tools. Utilizes third-party Pay-Per-Install (PPI) services to ease malware distribution, notably using a service called LabInstalls to expand target reach. EncryptHub has been linked to major ransomware groups, leveraging advanced social engineering to obtain high-value targets’ VPN credentials through phishing sites. They also employ smishing and vishing techniques, directing victims to enter personal details or convincing them through fake tech support communications. Following system access, EncryptHub executes PowerShell scripts to deploy stealer malware like Fickle, StealC, and Rhadamanthys, leading to ransomware deployment. The group is developing EncryptRAT, a new tool for managing infections and stolen data, indicating plans for further commercialization of their malicious software. Continuous monitoring and proactive defense measures are essential as EncryptHub continues to evolve their strategies, posing significant threats to organizations across multiple industries.
Details
2025-03-06 12:08:09 thehackernews MALWARE Medusa Ransomware Escalates Attacks, Demands Ransoms Up to $15M
The Medusa ransomware has claimed almost 400 victims since its discovery in January 2023, with a notable 42% increase in attacks during 2023-2024. Over 40 new attacks have already been reported in the first two months of 2025, according to Symantec, which tracks this threat under the name Spearwing. Medusa implements double extortion tactics, threatening to publish stolen data unless the ransom – ranging from $100,000 to $15 million – is paid. Targeting sectors include healthcare, non-profits, finance, and government, with entry often gained through vulnerabilities in Microsoft Exchange Server. Attackers maintain access using remote management tools like SimpleHelp, AnyDesk, or MeshAgent, and utilize KillAV to disable antivirus software. Medusa also uses legitimate RMM software, including PDQ Deploy, to distribute malware and conduct lateral movements within the network. The ransomware landscape continues to evolve, with the emergence of new ransomware-as-a-service operations and the disruption of major existing players.
Details
2025-03-06 11:03:11 thehackernews MISCELLANEOUS Advancing Cybersecurity with Strategic Attack Graph Utilization
Attack graphs offer a dynamic, real-time view of potential attack paths within organizational networks, enhancing understanding of threats. Traditional security methods like static vulnerability assessments fall short against sophisticated cyber threats; attack graphs provide a more effective alternative. These graphs not only map vulnerabilities but also contextually connect them with real exploitability and business impact, shifting focus from high severity scores to actual threat relevance. Continuous visibility and real-time updates from attack graphs enable organizations to adapt proactively to new threats rather than reactively patching after attacks. Different types of attack graphs, including security graphs, aggregated graphs, and holistic attack graphs, cater to varying security needs and offer comprehensive coverage. Attack graphs aid in prioritizing remediation efforts effectively by identifying critical choke points that reduce risk across multiple paths when secured. Enhanced cross-team communication is facilitated by the visual simplicity of attack graphs, helping CISOs convey complex security information to executives and boards. By integrating threat intelligence and providing ongoing updates, attack graphs help organizations anticipate and mitigate risks before they are exploited.
Details
2025-03-06 10:00:54 thehackernews MALWARE Over 1,000 WordPress Sites Hit by JavaScript Backdoor Infections
Over 1,000 WordPress-powered websites have been compromised with malicious JavaScript code installing multiple backdoors. The malicious JavaScript is being served from cdn.csyndication[.]com, affecting as many as 908 sites. Security experts recommend deleting unauthorized SSH keys, rotating WordPress admin credentials, and monitoring system logs for signs of further malicious activity. The JavaScript backdoors offer attackers various re-entry points even if one is detected and neutralized. In a related cybersecurity threat, over 35,000 websites are redirected to gambling sites via malicious JavaScript linked to Chinese-language platforms. Another campaign involves ScreamedJungle, a threat actor using JavaScript to collect browser fingerprints from users visiting over 115 e-commerce sites on the Magento platform. These sites are compromised through the exploitation of known vulnerabilities in Magento. Cybercriminals use browser fingerprinting not only to personalize marketing but also to mimic legitimate user behaviors and conduct fraudulent transactions.
Details
2025-03-06 06:42:24 thehackernews NATION STATE ACTIVITY U.S. Indicts 12 Chinese for State-Sponsored Hacking and Espionage
The U.S. Department of Justice has charged 12 Chinese nationals, including two government officers and employees of Anxun Information Technology Co. Ltd., in a hacking scheme. These individuals are accused of data theft and suppressing dissent globally, acting under the direction of China's Ministry of Public Security and Ministry of State Security. The group involved is linked to Advanced Persistent Threat 27 (APT27), known for extensive cyber infiltration, overlapping with other cyber entities like Aquatic Panda. The hacking activities targeted entities including U.S. government agencies, foreign ministries in Asia, religious organizations, and media, often for the benefit of the Chinese government. Charges also include allegations of hacking U.S. companies and organizations using sophisticated tools like PlugX malware. The U.S. Rewards for Justice program is offering up to $10 million for information on anyone engaging in state-directed cyber crimes against U.S. infrastructure. The Justice Department also seized four domains associated with the indicted individuals and detailed the use of sophisticated tools intended for espionage and data manipulation.
Details
2025-03-06 04:55:26 theregister MISCELLANEOUS CEO Exits Amid Fierce Board Disagreements and Funding Woes
Eric Gan resigned as CEO of AI security company Cybereason after internal disputes and funding issues. Gan's departure followed his unsuccessful attempts to secure an additional $100 million needed to maintain company operations and satisfy auditors. He filed a lawsuit against major investors including SoftBank Vision Fund and Liberty Strategic Capital, highlighting deep-rooted disagreements over funding and company direction. The lawsuit claims Cybereason's board rejected 13 funding proposals, which contributed to ongoing financial instability and risk of bankruptcy. The board was divided on strategic decisions, such as whether to merge with rival security firm Trustwave; the merger eventually proceeded in November 2024. Two board members, including one appointed by SoftBank, resigned or avoided meetings, creating further deadlock. Gan seeks legal intervention to appoint a custodian to resolve the deadlock and asserts that the major investors failed their fiduciary duties.
Details
2025-03-06 00:53:36 theregister NATION STATE ACTIVITY US Charges 12 in Chinese Espionage Operation, Seizes Domains
The US has charged 12 Chinese nationals linked to the Silk Typhoon espionage group and seized related internet domains. These individuals are accused of hacking into US computer systems on behalf of China’s Ministries of State and Public Security. The accused include two members of China’s Ministry of Public Security and ten employees from the tech firm Anxun Information Technology, also known as i-Soon. i-Soon allegedly charged between $10,000 and $75,000 to hack email inboxes for the Chinese government, with additional fees for data analysis. The hackers targeted high-profile agencies including the US Treasury, exploiting vulnerabilities like those seen in the Microsoft Exchange Server. This operation has been part of the broader Chinese strategy of employing hacker-for-hire services to perform state-sponsored espionage while maintaining plausible deniability. The US State Department is offering up to $2 million for information leading to the arrest or conviction of the key members of Silk Typhoon. The Justice Department claims this scheme has generated millions of dollars and caused significant breaches of US data security.
Details