Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12818

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-02-26 17:03:01 bleepingcomputer NATION STATE ACTIVITY North Korean Hackers Execute Historic $1.5 Billion Crypto Heist
North Korean Lazarus Group hacked developer's device at Safe{Wallet}, leading to a $1.5 billion theft from Bybit’s Ethereum Multisig Cold Wallet. Investigations by Sygnia and Verichains identified that a compromised Safe{Wallet} developer machine facilitated access to Bybit's infrastructure. No vulnerabilities were found in Bybit's infrastructure itself; the attack was purely through compromised external systems. Post-heist, Safe{Wallet} has implemented enhanced security measures and rolled back services in a controlled manner, ensuring revamped safeguards. Bybit restored all affected reserves and remains solvent, but the stolen funds include over 400,000 ETH and stETH. The incident is now deemed the largest crypto heist in history, with stolen funds being traced back to other hacks associated with the Lazarus Group. Blockchain analysts have linked the attack methods to those used in previous North Korean thefts, impacting global crypto security protocols.
Details
2025-02-26 17:03:01 bleepingcomputer MALWARE Malicious PyPi Package "automslc" Illegally Downloads Deezer Music
A malicious package named 'automslc' on PyPi has been downloaded over 100,000 times since 2019, used for pirating music from Deezer. The package abuses hardcoded Deezer credentials to bypass normal streaming restrictions, downloading full tracks and accessing metadata. Although not typical malware, 'automslc' utilizes a command-and-control infrastructure, potentially involving users in illicit activities. The operation of this package allows for continuous, unrestricted piracy, posing a risk of significant copyright infringement. Security firm Socket discovered these activities and highlighted the potential repurposing of such tools for further malicious endeavors. Users of 'automslc' inadvertently violate Deezer’s terms and risk legal consequences, while unknowingly participating in a larger malicious network. Despite the exposure, 'automslc' remains available for download on the Python Package Index, raising concerns about ongoing security risks.
Details
2025-02-26 16:13:40 bleepingcomputer CYBERCRIME Pump.fun's Social Media Account Hacked to Promote Scam Tokens
Pump.fun's X account was compromised to advertise a fraudulent "PUMP" token. The scam involved promoting a supposed Pumpfun governance token and another token named "GPT-4.5". Pump.fun, a Solana-based platform, allows users to create and trade memecoins and has been criticized for enabling pump-and-dump schemes. The hack was publicly acknowledged by Pump.fun via their Telegram channel, advising users to avoid interacting with the compromised account. The breach underscores the ongoing security challenges in the cryptocurrency sector. Details on how the breach occurred were not disclosed, but further updates are expected as the investigation progresses. The incident has potential implications for the integrity and security practices of emerging cryptocurrency platforms.
Details
2025-02-26 15:39:39 bleepingcomputer CYBERCRIME Global EncryptHub Phishing Spree Compromises Over 600 Firms
EncryptHub, identified as Larva-208, has compromised at least 618 organizations worldwide through spear-phishing and social engineering since June 2024. The group gains entry via customized phishing attacks that mimic corporate VPN interfaces such as Cisco AnyConnect and Microsoft 365, capturing user credentials and MFA tokens. After accessing a network, EncryptHub installs RMM software to maintain control, deploying infostealers and ransomware on the infected systems. Information stealers used include Stealc and Rhadamanthys, which extract data such as browser-stored credentials and cryptocurrency wallet passphrases. In several incidents, EncryptHub has deployed a custom PowerShell-based ransomware, encrypting files and demanding ransom in USDT via Telegram. The group is linked to other cybercrime entities like RansomHub and BlackSuit, indicating potential affiliations or partnerships in the cybercrime ecosystem. EncryptHub operates using infrastructure supported by bulletproof hosting providers, which complicates efforts to take down their phishing sites and command and control servers.
Details
2025-02-26 15:04:00 bleepingcomputer MISCELLANEOUS Best Practices for Enhancing Security of Active Directory Service Accounts
Active Directory service accounts are high-value targets for cyber-attacks because they have elevated privileges and continuous access to critical systems. Service accounts can be local, domain, or group managed, each having different access levels and security features. The principle of Least Privilege should guide the configuration of these accounts to minimize unnecessary access rights. Implementing multi-factor authentication (MFA) and robust password policies, including automation for managed service accounts (MSAs and gMSAs), is critical for securing accounts. Unused or inactive service accounts should be disabled or removed to prevent potential misuse. Continuous monitoring of service account activity is vital to detect and respond to suspicious behaviors effectively. Adhering to these best practices can significantly reduce the risk of compromising critical systems and sensitive data.
Details
2025-02-26 14:01:12 thehackernews CYBERCRIME Black Basta Ransomware Gang's Internal Chat Leaks Reveal Chaos
Over a year's worth of internal chats from the Black Basta ransomware gang has been leaked, showcasing $107M in earnings and internal disagreements. The leak, consisting of around 200,000 messages, occurred between September 2023 and September 2024, exposing key tactical and operational details. The group used tactics like exploiting SMB misconfigurations, exposed RDP servers, and deploying malware through trusted file-sharing sites. Internal strife, notably influenced by a key member known as 'Tramp', has led to operational disruptions and defections to other ransomware groups. Black Basta's rapid technique evolves from network access to full compromise within hours, underscoring the urgency of tight security measures in organizations. The group has targeted over 500 entities across North America, Europe, and Australia, concentrating on private industry and critical infrastructure. Black Basta's practices include not providing working decryptors even after receiving ransom payments, underlining their deceitful operations.
Details
2025-02-26 13:35:59 bleepingcomputer CYBERCRIME Australian IVF Provider Genea Hit by Termite Ransomware Attack
Termite ransomware gang claimed responsibility for attacking Genea, a leading Australian IVF provider, and stealing sensitive data. The data breach involved the exfiltration of 940.7GB of data which included personal and health information from Genea's systems. The cyberattack was detected on January 31, 2025, via a compromised Citrix server leading to further system infiltrations including the main file server and patient management system. Genea confirmed the data theft and subsequent online publication, obtaining a court injunction to prevent further sharing of the leaked data. The company is collaborating with the Office of the Australian Information Commissioner and the Australian Cyber Security Centre to investigate the breach. No financial information was reportedly compromised; the breach included sensitive patient data, the extent of which varies per individual. The ongoing investigation by Genea aims to uncover further implications of the breach and any additional data leaks.
Details
2025-02-26 12:33:59 theregister NATION STATE ACTIVITY Signal Threatens Exit from Sweden Over Encryption Law Changes
Signal CEO Meredith Whittaker asserts the company will leave Sweden if forced to create a backdoor for encrypted messages. If Sweden passes laws mandating end-to-end encryption (E2EE) be breakable by law enforcement, Signal plans to withdraw, mirroring its stance in the UK. Swedish government discusses possible legislation requiring E2EE messenger apps to allow law enforcement access, potentially affecting apps like WhatsApp and iMessage. The proposal under consideration would align with similar telecom obligations to store communication data for up to two years for law enforcement scrutiny. Whittaker emphasizes that any backdoor in encrypted communication would compromise privacy for all users, not just intended surveillance targets. The broader international context includes similar debates and laws in the UK, Australia, and the US, with varied positions between agencies like CISA and the FBI. Recent moves in the UK, such as disabling iCloud’s Advanced Data Protection due to government pressure, highlight global trends against strong encryption.
Details
2025-02-26 11:33:37 thehackernews MISCELLANEOUS Transforming Cybersecurity: The Rise of SOC 3.0 with AI Integration
SOC 3.0 leverages AI to significantly improve efficiency and reduce workload in security operations, moving from reactive measures to a proactive security posture. The evolution of the Security Operations Center (SOC) highlights a shift from manual processes in SOC 1.0 to partial automation in SOC 2.0, and now to an AI-enhanced approach in SOC 3.0. AI in SOC 3.0 automates triage, prioritization, and remediation processes, cutting down response times and enabling analysts to concentrate on high-level tasks. Enhanced threat detection capabilities in SOC 3.0 use AI to maintain and adjust correlation rules automatically, reducing false positives and adapting quickly to novel attack patterns. SOC 3.0 automates complex threat investigations using AI, enabling quicker and more accurate analyses without the need for detailed scripting. Improved data management strategies include the use of distributed data lakes, optimizing costs and efficiency in handling the increased data required for AI-driven security. The integration of AI into SOC operations supports a fundamental shift in workload and responsibility, allowing security teams to tackle more threats efficiently and focus on strategic security initiatives rather than routine tasks. Radiant Security offers an AI-powered SOC platform that manages alerts across various tools, improving response times and reducing costs while avoiding vendor lock-in.
Details
2025-02-26 11:10:20 thehackernews MALWARE New 'Auto-Color' Linux Malware Targets Universities, Government
New Linux malware, dubbed 'Auto-Color', has been discovered targeting North American and Asian universities and government organizations between November and December 2024. Auto-Color grants threat actors full remote access once installed, and is challenging to remove without specialized tools according to Palo Alto Networks Unit 42. The malware requires root access to fully install, but can partially install and operate without root privileges. Auto-Color employs various techniques to evade detection, including using innocuous file names, concealing its command-and-control connections, and using proprietary encryption. Upon installation with root access, it installs a library implant "libcext.so.2", copies itself, and modifies certain system files to ensure its persistence. It can modify system calls and network files to hide its communication, making it difficult to detect and remove. The malware can perform multiple remote actions such as creating reverse shell backdoors, manipulating files, running programs, and even uninstalling itself.
Details
2025-02-26 11:01:43 thehackernews CYBERCRIME Defending Against Top Three Password Cracking Techniques
Brute force attacks efficiently crack passwords by testing every possible combination, enhanced by affordable technology and weak passwords. Dictionary attacks exploit common passwords and phrases, proving effective against accounts with poor password practices, highlighted in breaches like Yahoo and LinkedIn. Rainbow table attacks utilize precomputed hash tables to decrypt passwords, remaining effective despite advances in password security measures like salting. For defense, strong, complex passwords combined with multi-factor authentication (MFA) are essential to thwart brute force attempts. Implementing account lockout policies and password complexity requirements can significantly reduce the risk of successful attacks. Tools such as Specops Password Auditor and Specops Policy help automate security enhancement across IT environments by auditing and enforcing secure password practices. Continuous updating and rotating of passwords, and using strong hashing algorithms are recommended to counteract the effectiveness of rainbow tables.
Details
2025-02-26 10:56:14 thehackernews CYBERCRIME Ukrainian Notaries Targeted by Organized Cybercrime Group UAC-0173
CERT-UA has issued a warning regarding a cybercrime group, identified as UAC-0173, deploying DCRat malware to compromise Ukrainian notaries. The attacks began in mid-January 2025, employing phishing emails falsely claiming to be from Ukraine's Ministry of Justice to disseminate the DCRat malware. Attackers have abused Cloudflare's R2 cloud storage to host malicious binaries and used tools like RDPWRAPPER and BORE to facilitate unauthorized remote access. Additional malicious tools detected in the attacks include FIDDLER for data interception, NMAP for network scanning, and XWorm for data theft. The compromised systems are also used to send out further phishing emails to propagate the attacks using the SENDMAIL console utility. The incident closely follows a related report attributing similar cyber activities to a subgroup of the Sandworm team, focusing on exploiting vulnerabilities in critical sectors across multiple countries. These findings underscore the ongoing sophisticated nature of cyber threats and the targeting of legal and critical infrastructure entities.
Details
2025-02-26 10:41:07 thehackernews CYBERCRIME Malicious Library on PyPI Facilitates Unauthorized Music Downloads
A malicious Python library named "automslc" was discovered on the Python Package Index (PyPI), used to unlawfully download music from Deezer. The automslc library has been downloaded over 104,000 times since its inception in May 2019 and remains available on PyPI. The package bypasses Deezer's API restrictions using hardcoded credentials and connects to a command-and-control server to manage the music downloads. It enables the download and decryption of complete audio tracks, violating Deezer’s terms against local or offline storage of full audio content. Users of the automslc package risk legal consequences due to the unauthorized distribution and downloading of copyrighted music. The associated command-and-control server’s IP address links to a domain used for orchestrating this distributed piracy operation. In the report, cybersecurity researchers also highlighted a separate security risk with an npm package designed to steal mnemonic phrases, underlining broader supply chain vulnerabilities.
Details
2025-02-26 07:37:42 theregister MALWARE Over 200 GitHub Repositories Caught Distributing Malware
Kaspersky identified over 200 GitHub repositories hosting malware under the guise of legitimate projects. These repositories, part of the GitVenom campaign, mimic authentic projects with extensive commit histories and multilingual documentation. Malicious content in these repositories includes password-stealing software, trojans, and crypto-wallet hijackers. GitVenom has reportedly already siphoned nearly $500,000 from victims using these malicious projects. Recommendations have been issued for identifying and avoiding these compromised repositories. Additionally, the CISA has recently flagged vulnerabilities in Adobe and Oracle software being actively exploited. LastPass advises users to reinstall their software following a CPU overload issue impacting Windows and Mac devices. Resignations at DOGE underscore internal security concerns and dissatisfaction with administrative directions under Elon Musk's leadership.
Details
2025-02-26 04:39:24 thehackernews NATION STATE ACTIVITY CISA Updates KEV Catalog with Microsoft and Zimbra Flaws
CISA included two new vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog, targeting Microsoft Partner Center and Synacor Zimbra Collaboration Suite. The inclusion is based on confirmed instances of active exploitation of these security flaws. Microsoft's vulnerability, identified as CVE-2024-49035, was acknowledged last year as being exploited, with no further details on its use in attacks provided. No reports of in-the-wild abuse for the CVE-2023-34192 associated with Zimbra have surfaced to date. Federal Civilian Executive Branch (FCEB) agencies are required to implement necessary security updates by March 18, 2025, to protect their networks. This update to the KEV catalog follows closely after the addition of vulnerabilities in Adobe ColdFusion and Oracle Agile PLM due to similar exploitation threats.
Details