Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12829

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-01-07 11:52:13 thehackernews MISCELLANEOUS Farewell to Outdated Cybersecurity Technologies in Review
Legacy Multi-Factor Authentication solutions were compromised by advanced phishing, SIM swapping, and other attacks, highlighting their inadequacy against modern cybersecurity threats. The Cybersecurity Infrastructure Security Agency (CISA) emphasized the need to move beyond outdated MFA systems, advocating for phishing-resistant, FIDO2-compliant solutions as replacements. Signature-based antivirus programs have become obsolete due to their inability to keep up with polymorphic malware and fileless attacks, replaced by more dynamic EDR and XDR platforms. Legacy VPNs were replaced by Zero Trust Network Access (ZTNA) systems due to their outdated security models unsuitable for modern distributed work environments. Standalone password managers have been eclipsed by integrated digital identity solutions offering robust, phishing-resistant passwordless authentication. The switch to next-generation cybersecurity technologies is imperative to address the evolving landscape of cyber threats and enhance protection against sophisticated attacks. The article underscores the constant need for adaptation in the cybersecurity field, reflecting on the necessity of retiring outdated technologies that no longer provide adequate security.
Details
2025-01-07 09:50:53 thehackernews NATION STATE ACTIVITY New EAGERBEE Malware Variant Targets ISPs and Governments
Internet service providers and governmental organizations in the Middle East have been compromised by an advanced variant of the EAGERBEE malware. The malware, developed for espionage, enables attackers to execute commands, manage files, and manipulate processes remotely through multiple integrated plugins. Researchers link the updated EAGERBEE variant to multiple espionage groups, including a Chinese state-aligned cluster known as Cluster Alpha, involved in extensive cyber espionage activities. The malware uses sophisticated techniques like memory residency to evade detection and incorporates SSL encryption for secure command and control communication. Attack implementations included using the ProxyLogon vulnerability to install web shells, leading to the deployment of the EAGERBEE backdoor. The attacks also targeted high-profile entities in Southeast Asia, aiming to steal sensitive military and political information. Kaspersky's analysis highlighted the modular nature of EAGERBEE, which leverages in-memory modules to enhance operational stealth and flexibility.
Details
2025-01-07 08:45:05 thehackernews NATION STATE ACTIVITY Chinese State-Sponsored Cyberattacks Target U.S. Treasury and Global Networks
The U.S. Treasury Department was reportedly breached by Chinese state-sponsored threat actors, impacting BeyondTrust’s systems and accessing unclassified documents. The Cybersecurity and Infrastructure Security Agency (CISA) is actively investigating the incident without finding evidence of other federal agencies being compromised. BeyondTrust identified and reported that no additional customers have been implicated beyond the initial breach announcement. New sanctions were imposed by OFAC against Integrity Technology Group of China for supporting cybersecurity attacks on U.S. critical infrastructure. Chinese threat actors, including groups like Volt Typhoon and Salt Typhoon, have escalated their cyber espionage activities targeting U.S. telecoms and other critical sectors. In addition to U.S. attacks, Chinese cyberspace operations against Taiwan have surged, with an increase in sophisticated techniques and cyber incidents in 2024. Taiwan’s National Security Bureau has documented a rise in China’s cyberattacks targeting various sectors and employing disinformation campaigns to destabilize the region. Attacks include exploitation of vulnerabilities, spear-phishing, and advanced persistent threats (APT) across government, critical infrastructure, and private sectors.
Details
2025-01-07 07:49:24 thehackernews CYBERCRIME Moxa Issues Alert on High-Severity Router Vulnerabilities
Taiwan-based Moxa has disclosed two significant security vulnerabilities in its cellular routers, secure routers, and network security appliances. The vulnerabilities allow for privilege escalation and command execution, posing serious security concerns. The affected products and their specific firmware versions were identified with the assistance of security researcher Lars Haulin. Moxa has released patches for the impacted versions to address these security flaws. Recommended mitigations include avoiding exposing devices directly to the internet, restricting SSH access to trusted IP addresses, and using firewall rules or TCP wrappers. Additional protective measures suggested include implementing detection systems to identify and thwart potential exploitation attempts.
Details
2025-01-07 07:23:59 theregister NATION STATE ACTIVITY U.S. Lists Tencent as Military-linked Firm, Sparking Potential Tensions
The US Department of Defense has designated Tencent, a major Chinese tech conglomerate, as a "Chinese military company," linking it to China’s "Military-Civil Fusion strategy." This designation places Tencent on the Section 1260 list, which identifies companies believed to support the military objectives of the People's Liberation Army, though it does not automatically trigger a ban. Tencent's key operations include the WeChat platform and a public cloud service, which could theoretically support military applications, leading to its listing. The implications of this designation include potential restrictions from U.S. companies, affecting partnerships and possibly creating supply chain disturbances, particularly noted with CATL’s connections to major automotive companies like Tesla. There is concern that this action might hurt foreign investor confidence and provoke retaliatory measures from China, as expressed by Chinese authorities. Additional repercussions could involve other companies working with Tencent, such as Microsoft, which is involved in publishing a mobile game developed by a Tencent subsidiary. There are broader political implications, including possible U.S. consumer backlash and further legislative actions against Tencent and its associated companies in the U.S.
Details
2025-01-06 20:58:30 bleepingcomputer NATION STATE ACTIVITY Chinese Hackers Breach US Treasury, Targeting Sanctions Office
The US Treasury disclosed a cybersecurity breach by Chinese government hackers, impacting the Office of Foreign Assets Control and the Office of Financial Research. The breach, attributed to a state-sponsored Advanced Persistent Threat (APT), involved compromising a BeyondTrust SaaS API key. CISA has confirmed that no other federal agencies have been affected by this incident. The breach was first detected by BeyondTrust on December 8, and the compromised instance was subsequently shut down. The primary intent behind targeting the OFAC appears to be gathering intelligence related to potential sanctions against Chinese entities. There is currently no indication that the hackers still have access to Treasury's systems post-breach. CISA is coordinating with relevant federal authorities to ensure a comprehensive response and prevent future incidents.
Details
2025-01-06 20:32:54 theregister NATION STATE ACTIVITY Chinese Espionage Campaign Breaches Major U.S. Telecom Networks
The Salt Typhoon cyberattack, attributed to Chinese government operatives, has compromised several U.S. telecom networks including Charter Communications, Consolidated Communications, and Windstream. The campaign also targeted other major operators like AT&T, Verizon, and Lumen Technologies, aligning with the US government's identification of a significant espionage effort. The Wall Street Journal reports that these breaches utilized unpatched network devices from Fortinet and Cisco for network access, exploiting a particularly vulnerable high-level network management account without multi-factor authentication. This breach of security allowed unauthorized access to over 100,000 routers and potentially enabled traffic interception and evidence deletion by redirecting it back to China. U.S. Department of Justice highlighted similar activities by another Chinese-linked group, Volt Typhoon, targeting Cisco routers to infiltrate U.S. critical infrastructure sectors since 2021. The extent of the espionage includes alleged compromises not only within telecom sectors but also critical infrastructures like the US Treasury Department, signaling a pivot towards more destructive avenues of cyber operations. Security experts like Adam Meyers of CrowdStrike have issued warnings to all organizations about the heightened threat from hostile nation-state activities targeting crucial infrastructure and international business ecosystems.
Details
2025-01-06 17:15:57 bleepingcomputer CYBERCRIME Critical Vulnerabilities in Moxa Devices Threaten Industrial Networks
Moxa has issued urgent warnings about critical and high-severity vulnerabilities in their networking devices used across various industry sectors. CVE-2024-9138, classified as high severity, allows escalation to root privileges due to hard-coded credentials. CVE-2024-9140, rated as critical, permits arbitrary code execution through OS command injection caused by improper input handling. Both vulnerabilities impact multiple Moxa device models including cellular routers, secure routers, and network security appliances, particularly affecting industrial automation and control systems. Affected devices risk severe exposure where remote attackers can execute arbitrary commands and potentially take over devices. Firmware updates to mitigate these issues have been released by Moxa, with emphases on immediate installation to prevent potential exploitation. Specific models such as EDR-810 Series, EDR-G902 Series, and TN-4900 Series have been identified with no available patches for certain products like the NAT-102 Series, prompting recommendations for other mitigating actions. Moxa advises enhancing security measures like limiting network exposure, using SSH restrictions, and employing firewalls or IPS for additional protection against these vulnerabilities.
Details
2025-01-06 16:35:20 theregister MALWARE FireScam Malware Disguised as Telegram Premium Targets Android Users
Android malware named FireScam is disguised as a Telegram Premium app, misleading users into downloading a malicious application. The malware is distributed via a phishing website that mimics the Russian RuStore app store, using a dropper file named ru[.]store[.]installer that installs as GetAppsRu[.]apk. FireScam requests extensive permissions upon installation, enabling it to list and access all installed apps, modify external storage, and prevent legitimate updates by designating the attacker as the app's "update owner." The infostealer can steal and exfiltrate sensitive information including notifications, text messages, clipboard content, and USSD responses to a Firebase Realtime Database. Attackers utilize Firebase services for data exfiltration and command-and-control communications, making the malicious traffic harder to detect. FireScam can receive remote commands and additional malicious payloads via Firebase Cloud Messaging, executing actions without the user's knowledge. The malware continues to communicate with the command server even when not actively in the foreground, complicating detection efforts by security tools. FireScam customizes its behavior based on the device profile to evade security measures more effectively.
Details
2025-01-06 15:29:26 bleepingcomputer NATION STATE ACTIVITY Chinese State-Backed Hackers Compromise Multiple US Telecoms
Chinese hackers identified as the Salt Typhoon group have successfully infiltrated several U.S. telecommunications companies, including Charter and Windstream, following recent breaches at AT&T, Verizon, and Lumen. These attacks enabled access to sensitive communications such as text messages, voicemails, and wiretapped information handled by U.S. law enforcement. Although T-Mobile experienced a network intrusion, the company's CSO did not definitively attribute the reconnaissance to Salt Typhoon, crediting their cyber defenses with halting the attack. The White House’s cybersecurity advisor reported that Salt Typhoon has also targeted telecommunications infrastructure in other countries, expanding the impact beyond the U.S. In response to these breaches, CISA has issued guidance focused on securing telecom networks against this specific threat and promoted the use of encrypted communication platforms among government officials. U.S. Senator Ron Wyden and FCC Chairwoman Jessica Rosenworcel have taken legislative and regulatory steps to bolster cybersecurity defenses across national telecommunications networks. Amidst the ongoing cyber threats, the U.S. government considers banning China Telecom operations and TP-Link routers due to potential national security risks.
Details
2025-01-06 14:58:52 bleepingcomputer NATION STATE ACTIVITY Eagerbee Malware Targets Middle Eastern Governments, ISPs
New variants of the Eagerbee malware are targeting government organizations and ISPs in the Middle East. Originally linked to Chinese state-backed actors named 'Crimson Palace,' the malware is now connected with the 'CoughingDown' group by Kaspersky researchers. The deployment involves an injector file placed within the system32 directory, with Windows services abused to execute the malware. The backdoor is highly persistent, set to run continuously, and designed to collect sensitive information from the infected systems. Attack vectors in previous incidents included exploitation of the Microsoft Exchange ProxyLogon flaw. Eagerbee uses a complex mechanism involving multiple Windows services and DLL hijacking to maintain stealth and persistence. Kaspersky has documented five plugins that extend the functionality of the malware, enhancing its espionage capabilities. The same methods were also detected in attacks outside the Middle East, indicating a global threat pattern. Organizations are urged to apply security updates and monitor for indicators of compromise.
Details
2025-01-06 14:33:13 theregister MALWARE Critical Security Flaws Found in MediaTek Chipsets Worldwide
MediaTek disclosed several critical security vulnerabilities at the start of the year, impacting 51 different chipsets. A severe remote code execution (RCE) bug, identified as CVE-2024-20154, was found in the modem stack, allowing unauthorized remote control if connected to a malicious base station. The affected devices include those used in automobiles, smartphones, Internet of Things (IoT) devices, and Chromebooks. No user interaction or additional privileges are required for the RCE bug to be exploited, making it particularly dangerous. Manufacturers were notified about the vulnerabilities and provided with patches two months prior to MediaTek's public disclosure. In addition to the critical RCE bug, other vulnerabilities included seven high-severity issues and five medium-severity problems. MediaTek is continuing to diversify its product offerings, targeting the AIoT market and planning entry into the PC chipset sphere by 2025. Despite the critical nature of these vulnerabilities, all vendor-advised patches should have been applied by the time of disclosure.
Details
2025-01-06 14:33:12 thehackernews MISCELLANEOUS India Introduces Stringent Digital Data Protection Rules
The Indian government has released draft Digital Personal Data Protection (DPDP) Rules for public commentary. The DPDP Act gives individuals the right to control how their personal data is handled, including the right to data erasure and appointment of digital nominees. Under the new rules, companies must implement strong cybersecurity measures such as encryption, access control, and data backups to protect personal data. Significant penalties up to ₹250 crore (approx. $30 million) can be imposed for mishandling or failing to secure personal data. The rules extend to data processed by government agencies, ensuring transparency and adherence to legal standards. Feedback on the draft regulations can be given until February 18, 2025, and will remain confidential. The DPDP Act's introduction follows extensive rework since 2018 and is part of India's commitment to upholding the right to privacy as a fundamental right, reaffirmed by the Supreme Court in 2017. Recent telecom cybersecurity regulations also require telecom companies to appoint a Chief Telecommunication Security Officer and report security incidents swiftly.
Details
2025-01-06 12:06:37 thehackernews CYBERCRIME Google Chrome Extensions Compromised to Steal Data
Recent analysis revealed multiple Google Chrome extensions were secretly stealing sensitive data from approximately 2.6 million devices. Cyberhaven's browser extension was manipulated through a spear-phishing attack, resulting in data theft including Facebook and OpenAI ChatGPT credentials. The attacker gained access to Cyberhaven's systems by posing as Google, deceiving an employee with a fake compliance warning and a malicious OAuth application request. This method was also applied to other extensions like Reader Mode, indicating a broader campaign involving several browser add-ons. Compromised extensions logged every visited website, part of a scheme designed for monetization through unauthorized data access. These incidents underscore the vulnerability of browser extensions as a security weak point. Recommendations include regular updates and scrutiny of third-party software to prevent exploitation.
Details
2025-01-06 11:36:00 thehackernews CYBERCRIME Key Cyber Threats in SaaS: Who to Watch in 2025
In 2024, cyber threats targeting Software as a Service (SaaS) platforms surged substantially, with significant losses and attacks. ShinyHunters, identified as the most valuable player, exploited SaaS misconfigurations, particularly in Snowflake environments, leading to massive data exfiltration and blackmail. ALPHV, also known as BlackCat, executed a bold $22 million extortion from Change Healthcare, followed by a deceptive maneuver simulating an FBI raid on their operations. Rookie group RansomHub gained attention for their involvement in the extensive Change Healthcare data incident affecting over 100 million U.S. citizens, showing the impact of exploiting SaaS vulnerabilities. LockBit remained a dominant force in the ransomware scene, particularly targeting financial tech companies and proving resilient against law enforcement disruptions. Midnight Blizzard (APT29), a state-sponsored group, continued to engage in stealthy cyber espionage, focusing on intelligence gathering from high-value targets without detection. SaaS security lessons highlighted the importance of multi-factor authentication, risk assessments, real-time monitoring, and understanding third-party risks to prevent future breaches and unauthorized access. For 2025, proactive SaaS security risk assessments, adoption of SSPM tools, and continuous monitoring are recommended to defend against these sophisticated cyber threats.
Details