Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12829

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-01-06 11:15:31 thehackernews MALWARE FireScam Malware Disguised as Telegram App Steals Data
FireScam, a sophisticated Android malware, poses as a "Telegram Premium" app to infiltrate devices and steal sensitive data. The malware is distributed via a phishing site hosted on GitHub.io, deceptively similar to the Russian app store RuStore. It initiates with a dropper APK called "GetAppsRu.apk" that installs the main payload capable of data exfiltration and extensive surveillance. The malware requires multiple permissions from the user, allowing it to block updates from other sources and maintain persistence on the device. FireScam employs obfuscation and anti-analysis techniques to evade detection and continuously monitors user activities, including e-commerce transactions and notification content. It can also download and execute commands from a remote server, reflecting its capability for extensive monitoring and control. The scam app, on execution, requests additional permissions to access users' contacts, call logs, and SMS, and shows a fake login page to phish for Telegram credentials. The operators behind FireScam remain unidentified, and the exact method of directing users to the phishing site is unclear, raising concerns about the potential spread of the malware.
Details
2025-01-06 09:34:27 theregister NATION STATE ACTIVITY Chinese-Backed Hackers Compromise U.S. Telcos, Expose Security Gaps
China-backed entities have successfully infiltrated multiple U.S. telecommunications companies, collecting extensive user geolocation data. Attackers accessed administrative accounts controlling vast numbers of routers, highlighting a broader crisis in enterprise security. The tactics used by the attackers mirror methods from a cyber incident 40 years ago, pointing to a chronic failure in the security industry to evolve and adapt. Corporate responses to breaches have been generally dismissive or downplayed, lacking transparent, specific information. The article suggests the current state of cyber defense is perilously weak, equivalent to a wartime economy where key infrastructures are gravely exposed. Recommendations include a fundamental overhaul of security practices and infrastructure, potentially under government-led directives. The narrative connects these security breaches to broader national and geopolitical security risks, implying an undeclared state of cyber warfare.
Details
2025-01-06 09:29:05 thehackernews CYBERCRIME Russian-Speaking Hackers Deploy Malicious npm Packages to Steal Ethereum Keys
Cybersecurity researchers identified malicious npm packages impersonating the Nomic Foundation's Hardhat tool. The fake packages are designed to exfiltrate sensitive data like private keys and mnemonics from Ethereum developers. These attacks exploit trusted open-source plugins, installing compromised packages that harvest critical data. Once installed, the malicious packages collect data using functions tailored to the Hardhat environment and send it to attacker-controlled endpoints. A recent malicious package was found dropping Quasar RAT malware, disguised as a library for detecting Ethereum smart contract vulnerabilities. The threat campaign is linked to a Russian-speaking actor named "_lain," who exploits the complexity of npm's dependency chains. Additional fraudulent libraries found across npm, PyPI, and RubyGems ecosystems use security tools to steal data and facilitate multi-stage attacks. Recommendations for developers include verifying package authenticity, cautious typing of package names, and thorough source code inspection before installation.
Details
2025-01-06 03:30:39 theregister NATION STATE ACTIVITY Suspected Chinese Vessel Damages Taiwan's Submarine Cable
Taiwanese authorities report that a vessel possibly linked to China, named Shunxing 39, damaged a submarine cable owned by Chungwa Telecom while departing Keelung port. The incident damaged only four fibers of the cable; however, Chungwa Telecom's redundancy plans prevented disruption in connectivity. Local security experts and unnamed sources from the Taiwanese coast guard suggest the ship's actions were deliberate, and the vessel may be owned by a Chinese national. After the incident, Taiwanese port authorities attempted to contact the Shunxing 39 but were unable to due to heavy seas; they now seek cooperation from South Korean authorities. This event coincides with heightened concerns over "grey zone warfare," where countries indirectly harm each other in ways that are difficult to attribute directly to state actions. This is the second such incident involving Chinese vessels allegedly targeting submarine cables, following a similar claim in the Baltic Sea in November 2024. The geopolitical tension in the Taiwan Strait continues to escalate, especially with Taiwan's crucial role in the global semiconductor industry and the strategic implications for major powers like the USA.
Details
2025-01-06 01:29:24 theregister DATA BREACH Data from 800K VW Group EVs Exposed Due to Subpar Security
Volkswagen subsidiary Cariad inadvertently exposed telemetry data of around 800,000 EVs through insufficiently secured web pages. Internal data accessible via a memory dump file included sensitive details such as EV geolocation, battery levels, and owner informations. The Chaos Computer Club, after being alerted by a whistleblower, communicated the breach to Cariad, leading to the sealing of the exposed data. The exposure highlighted significant flaws in cloud resource management and privacy protection of customer information by large corporations. There is no necessary action for customers as the breach was contained before further exposure. The broader implications for corporate data security practices and regulatory oversight are underlined by this incident.
Details
2025-01-06 01:10:44 bleepingcomputer CYBERCRIME Urgent Call for Windows 10 Users to Upgrade Before Support Ends
Cybersecurity firm ESET warns that Windows 10, nearing its end of support in October 2025, poses significant security risks. Users are urged to transition to Windows 11 or alternative operating systems to avoid vulnerabilities and potential cyberattacks. Post October 2025, Windows 10 will no longer receive free security updates, exposing users to new security threats. Approximately 32 million computers in Germany still operate on Windows 10, comprising about 65 percent of household devices. In contrast, only 33% of devices in Germany currently run Windows 11, highlighting a slow transition rate. Globally, a substantial majority of Windows users continue using Windows 10, with businesses and average consumers lagging in hardware upgrades. Microsoft offers paid extended security updates post-support, but costs may be prohibitive for some businesses and consumers. The reluctance to upgrade is partly due to missing features in Windows 11, performance concerns, and hardware limitations like the non-upgradeable TPM requirement.
Details
2025-01-05 15:19:33 bleepingcomputer CYBERCRIME Cryptocurrency Wallet Drainers Cause $494 Million Loss in 2024
In 2024, scammers pilfered $494 million from over 300,000 cryptocurrency wallets, an uptick of 67% compared to 2023. The significant increase in stolen funds did not correlate with a proportional rise in victims, suggesting that individual losses were considerably larger. Scam Sniffer identified 30 major incidents where over $1 million was stolen, including a single event that resulted in a $55.4 million loss. The majority of the stolen funds were from Ethereum wallets, with significant targeting towards staking platforms and stablecoins. Scammers utilized sophisticated phishing tools like fake CAPTCHA and Cloudflare pages, and manipulated Web3 signature types to facilitate theft. A noted decline in phishing activities occurred following the shutdown of the 'Pink Drainer' service, only to resurge later in the year spearheaded by other services like 'Inferno'. The use of online ads, including Google and Twitter, played a crucial role in directing potential victims to phishing sites. Recommendations for preventing such scams include only interacting with verified websites, careful review of transaction permissions, and the use of token revoking tools to manage permissions actively.
Details
2025-01-05 03:57:59 bleepingcomputer MALWARE New "FireScam" Malware Mimics Telegram Premium on Android
A new Android malware, termed "FireScam," pretends to be Telegram Premium to deceive users. Distributed through phishing sites on GitHub, it mimics RuStore, Russia's alternative app market launched by VK in May 2022. "FireScam" is delivered via a 'dropper' APK named GetAppsRu.apk, which uses obfuscation techniques to evade detection and acquires extensive device permissions. Once installed, it presents a fake Telegram login page to steal user credentials and monitors extensive personal data including SMS, clipboard content, and notification. The malware maintains a real-time connection to Firebase Realtime Database for ongoing data exfiltration and command execution. It also features capabilities to monitor screen activity, log application use, and capture financial transactions data. Cyfirma researchers highlight its sophisticated evasion and surveillance capabilities, urging caution when downloading apps or clicking links from unverified sources.
Details
2025-01-05 03:37:57 bleepingcomputer MALWARE Malicious Code Bypasses Open-source Scanner’s Signature Checks
A critical vulnerability was identified in the Nuclei open-source vulnerability scanner, allowing attackers to bypass signature verification. Attackers exploited a mismatch in newline character handling between Go's regex implementation and the YAML parser to inject malicious code into scanner templates. The flaw, tracked as CVE-2024-43405, was discovered by researchers at Wiz, who found that manipulated templates could still execute malicious content despite signature checks. Nuclei, developed by ProjectDiscovery, relies on over 10,000 YAML templates to check for vulnerabilities, misconfigurations, and other threats on websites. The vulnerability was specifically found in how Nuclei processed multiple # digest: signature lines, ignoring additional occurrences beyond the first one. Wiz responsibly disclosed the flaw to ProjectDiscovery on August 14, 2024, and a fix was released in Nuclei v3.3.2 on September 4. Users are urged to update to the latest version of Nuclei immediately and consider running the tool in a virtual machine or isolated environment to mitigate risk.
Details
2025-01-04 23:17:23 bleepingcomputer MALWARE Critical Vulnerability in Nuclei Allows Signature Bypass for Malicious Code
Researchers at Wiz identified a vulnerability, CVE-2024-43405, in the open-source Nuclei vulnerability scanner that enables attackers to bypass signature verification. The flaw arises from mismatches in how Go regex and the YAML parser handle line breaks, permitting the injection of malicious code into YAML templates. Attackers can exploit the vulnerability by inserting additional "# digest:" lines into templates, which are ignored by Nuclei's verification process but executed by the YAML parser. The vulnerability was disclosed responsibly to ProjectDiscovery on August 14, 2024, and subsequently remedied in the Nuclei v3.3.2 release on September 4. Users of Nuclei are urged to update to the latest version to safeguard against exploit using the flawed template handling mechanism. It is recommended to operate Nuclei within a virtual machine or isolated environment to mitigate potential threats from malicious templates.
Details
2025-01-04 15:36:24 bleepingcomputer MALWARE New Android Malware "FireScam" Impersonates Telegram Premium
FireScam, a new Android malware, disguises itself as Telegram Premium to deceive users and steal data. The malware is distributed through phishing sites hosted on GitHub, mimicking RuStore, the official Russian app marketplace. Initial malware delivery occurs via a module named GetAppsRu.apk, which is obfuscated to avoid detection and obtains extensive permissions on the device. Once installed, FireScam requests additional permissions enabling monitoring of notifications, clipboard content, SMS, and telephony services. A false Telegram login page on execution captures users' credentials and other sensitive data, uploading it to a Firebase Realtime Database. The malware establishes a persistent WebSocket connection for command execution and real-time data exfiltration. Advanced evasion techniques are employed, with stolen data reportedly wiped after transfer to ensure temporary storage on the database. Cyfirma recommends vigilance with file downloads and links from untrusted sources to avoid such sophisticated threats.
Details
2025-01-04 14:36:17 theregister NATION STATE ACTIVITY U.S. Shifts Stance on Encryption Post-Major Telecom Breach
U.S. government agencies now endorse strong encryption, reversing their former stance which demanded backdoors for law enforcement access. This shift follows the significant telecom breach dubbed "Salt Typhoon," described as the worst in U.S. history, where foreign espionage involved tapping top-level political communications. CISA recently released guidance urging politicians and senior officials to adopt end-to-end encrypted communications to safeguard against espionage, especially from Chinese spies. The past demands for backdoors, justified by crime-fighting needs, are being reconsidered as those entry points might also be exploited by malicious actors. The necessity of encryption without backdoors has been highlighted by both current cybersecurity experts and former White House tech advisor John Ackerly. Calls for legislative reform are intensifying, with proposals like the Secure American Communications Act pushing for enhanced security standards in telecom. Experts emphasize the ongoing risk posed by complacency and inadequate policies in securing national communications infrastructure.
Details
2025-01-04 14:36:16 thehackernews MALWARE Critical Flaw in Nuclei Vulnerability Scanner Allows Code Execution
A critical security flaw, CVE-2024-43405, was discovered in the Nuclei vulnerability scanner, which allows signature bypass and potential malicious code execution. The vulnerability impacts all Nuclei versions beyond 3.0.0, scoring a 7.4 on the CVSS scale, indicating high severity. Researchers from Cloud security firm Wiz identified that the flaw originates in the signature verification process for YAML template files used in scanning. The flaw arises due to differences in how newline characters are handled by the YAML parser and the regex used in signature verification. Attackers can exploit this vulnerability by modifying the template content, adding manipulated # digest: lines, or using \r line breaks to trick the verification process. This exploit could lead to arbitrary command execution, sensitive data access, or complete system compromise by injecting malicious content while maintaining a valid signature. ProjectDiscovery addressed this security issue in version 3.3.2, released on September 4, 2024, following responsible disclosure practices. Current version as of the report is 3.3.7.
Details
2025-01-04 08:35:30 theregister CYBERCRIME Atos Denies Direct Ransomware Breach; Admits Third-Party Compromise
Atos refuted claims by the Space Bears ransomware group of a direct cyber intrusion into their systems, affirming the security of their managed infrastructures. The French tech giant acknowledged that while their systems were secure, third-party infrastructure, not under their control, was indeed compromised. Space Bears had earlier claimed responsibility for the attack and threatened to release Atos' data unless a ransom was paid by January 7. Despite the third-party breach, Atos maintains that no direct compromise of their systems or ransomware has been detected, and they have yet to receive a ransom demand. Atos holds a robust cybersecurity framework with a global network of over 6,500 specialists and 17 security operations centers that operate continuously. The aforementioned third-party infrastructure contained data related to Atos, though specifics about the nature of this data or how it pertains to Atos customers remain unclear. This incident closely follows a similar claim in March 2023 by the Cl0p ransomware group, which Atos also denied, attributing the data exposure to external factors associated with acquired entities and software vulnerabilities.
Details
2025-01-04 07:55:24 thehackernews MALWARE New PLAYFULGHOST Malware Disguised in VPN Apps Targets Data
PLAYFULGHOST malware, identified by Google's Managed Defense team, exhibits capabilities similar to the infamous Gh0st RAT. The malware spreads through phishing emails and SEO poisoning, using trojanized VPN applications like LetsVPN as a guise. Delivery methods include deceptive .jpg files in emails and misleading installer downloads from manipulated search engine results. PLAYFULGHOST employs sophisticated techniques for execution and persistence, including DLL hijacking, side-loading, and multiple system integration methods. Once active, it can capture keystrokes, screenshots, and audio; access QQ accounts and clipboard content; and manipulate files and system settings. It includes additional harmful features such as Mimikatz for credential theft, a rootkit for hiding activities, and tools like Terminator to disable security software. The specific focus on Chinese-speaking users is indicated by targeted applications and language-specific data collection points.
Details