Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12820
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2024-11-13 16:09:10 | thehackernews | NATION STATE ACTIVITY | Hamas-Linked WIRTE Group Ramps Up Cyberattacks on Israeli Targets | Hamas-affiliated threat actor WIRTE intensifies malicious cyber operations, targeting Israeli entities with disruptive attacks.
WIRTE, linked to the Gaza Cyber Gang, also targets nations like Saudi Arabia, Jordan, and Egypt, indicating broad regional activity.
The group employs deceptive tactics, using RAR archives to spread malware including the Havoc framework and IronWind downloader.
Recent tactics have seen the deployment of the SameCoin Wiper, a potent malware, in phishing attacks targeting Israeli hospitals and municipalities.
The updated version of SameCoin Wiper features unique encryption capabilities and alters the wallpaper of affected systems to display Hamas-related imagery.
WIRTE continues to exploit geopolitical tensions in the Middle East for conducting espionage and sabotage despite ongoing regional conflicts.
Check Point reveals ongoing sophisticated phishing and malware distribution methods, emphasizing the need for elevated cybersecurity vigilance in the region. | Details |
| 2024-11-13 14:21:50 | bleepingcomputer | MALWARE | Bitdefender Releases Decryptor for ShrinkLocker Ransomware Attacks | Bitdefender has developed a decryptor for the "ShrinkLocker" ransomware, which uses Windows BitLocker to encrypt victims' files.
ShrinkLocker was identified by Kaspersky in May 2024 and uses basic, older VBScript code to execute its attacks.
Despite its simplicity and signs of low-skilled operators, ShrinkLocker has successfully targeted multiple corporate entities, including a healthcare organization.
The ransomware checks for BitLocker availability via WMI query, installs it if missing, and uses the '-UsedSpaceOnly' flag to encrypt data quickly.
Encryption keys are more securely hidden by deleting and reconfiguring BitLocker protectors, complicating data recovery efforts.
ShrinkLocker spreads across networks using Group Policy Objects and scheduled tasks to ensure all drives are encrypted.
Bitdefender’s new decryption tool exploits a vulnerability in the malware's method of reconfiguring BitLocker, enabling recovery of encrypted data shortly after infection.
The tool is effective only on recent versions of Windows OS and must be used soon after the initial ransomware attack for optimal results. | Details |
| 2024-11-13 14:03:45 | bleepingcomputer | RANSOMWARE | Bitdefender Decrypts ShrinkLocker Ransomware-Encrypted Files | Bitdefender has developed a decryptor for ShrinkLocker ransomware, which utilizes Windows' BitLocker tool to encrypt files.
ShrinkLocker, discovered by Kaspersky in May 2024, employs basic and outdated encryption tactics, including VBScript, and lacks the complexity of more traditional ransomware.
The malware targets systems by checking for BitLocker availability and forcibly installing it if absent, followed by encrypting the used space on drives for quick locking.
ShrinkLocker's operators have successfully executed attacks on organizations, notably a healthcare provider, resulting in significant operational disruptions.
Bitdefender's decryption tool leverages a vulnerability in the sequence ShrinkLocker uses to delete BitLocker's protectors, enabling data recovery soon after attack inception.
The decryptor's effectiveness is highest when applied promptly after the attack before BitLocker configurations are permanently overridden.
Users can run the decryption tool from a USB drive in BitLocker Recovery Mode to restore access to encrypted systems on Windows 10, Windows 11, and recent Windows Server versions. | Details |
| 2024-11-13 13:42:58 | thehackernews | MALWARE | Free Decryptor Tool Released for BitLocker Ransomware Victims | Romanian cybersecurity firm Bitdefender has developed a free decryptor for victims of the ShrinkLocker ransomware, which leverages Microsoft's BitLocker for encryption.
ShrinkLocker, first observed by Kaspersky in May 2024, targets various countries including Mexico, Indonesia, and Jordan, using trusted contractor machines to launch attacks.
The ransomware spreads through compromised accounts and executes via scheduled tasks, impacting devices running Windows 10, 11, and Windows Server versions 2016 and 2019.
A notable bug discovered in the ransomware prevents it from restarting a system, which could potentially allow victims to interrupt the ransomware's encryption process.
ShrinkLocker generates a unique password from system-specific details to encrypt devices, afterwards demanding a ransom to unlock the data.
The script also modifies system registry settings to hinder recovery efforts, including disabling remote connections and local logins.
Bitdefender's decryptor exploits a vulnerability in ShrinkLocker’s method to offer a recovery solution shortly after the ransomware disables BitLocker’s protections.
Organizations are advised to store BitLocker recovery information in Active Directory and monitor specific Windows event logs to detect early signs of such attacks and enhance their cybersecurity posture. | Details |
| 2024-11-13 11:04:41 | thehackernews | MISCELLANEOUS | Guide to Implementing a Comprehensive Browser Security Program | The rise of cloud-based work environments has significantly shifted the cyber risk landscape, with browsers becoming a major vulnerability due to phishing, data leakage, and malicious extensions.
LayerX has published a detailed guide, "Kickstarting Your Browser Security Program," targeting CISOs and security teams to secure browser activities within organizations.
The guide advocates for a phased, strategic approach to browser security, starting with mapping the threat landscape to understand specific security needs and exposures.
Initial steps include assessing risks like data leakage and account takeovers, while considering regulatory requirements to pinpoint vulnerabilities and prioritize immediate security measures.
The guide emphasizes integration of browser security into existing security frameworks such as SIEM, SOAR, and IdPs, evaluating its role as either a primary or supplementary component of the security stack.
Execution involves collaborative efforts across various teams, utilizing the RACI framework to clarify roles and responsibilities, ensuring effective implementation and avoiding siloed security efforts.
Organizations are urged to maintain a dynamic approach to security strategy, continuously updating and adapting to new threats, with a strong emphasis on browser security as a critical component.
The comprehensive guide is designed as a resource for developing robust, future-proof browser security strategies and is available for further detail on implementation practices and frameworks. | Details |
| 2024-11-13 09:32:57 | thehackernews | CYBERCRIME | Security Flaws in OvrC Platform Risk Remote IoT Device Attacks | Researchers identified 10 vulnerabilities in the OvrC cloud platform, used for managing IoT devices.
These flaws could enable attackers to execute code remotely, potentially controlling smart devices like cameras and routers.
Exploitation might allow unauthorized information disclosure, device impersonation, and arbitrary code execution.
500,000 end-user locations globally could be impacted by these vulnerabilities.
Eight vulnerabilities were patched in May 2023, with the remaining two expected to be addressed by November 2024.
The vulnerabilities include weak access controls, hardcoded credentials, and remote code execution flaws.
The disclosure emphasizes the growing need for stringent security measures in IoT device and cloud service management.
Similarly, recent reports have highlighted critical vulnerabilities in other IoT devices and platforms, including security cameras and web servers. | Details |
| 2024-11-13 07:15:14 | thehackernews | NATION STATE ACTIVITY | Iranian Hackers Target Aerospace With Malicious 'Dream Job' Lures | Iranian threat actor TA455, linked to Iran's IRGC, employs "Dream Job" campaign tactics to target aerospace industry.
Malware used in the campaign includes SnailResin, which activates the SlugResin backdoor for remote access and data theft.
TA455 mimics strategies similar to those used by North Korean groups, using job offers as lures and deploying DLL side-loading techniques.
Attacks involve sophisticated social engineering and utilize fake recruiting sites and LinkedIn, alongside job-themed documents in spear-phishing emails.
The campaign has targeted various countries including Israel, UAE, Turkey, India, and Albania, focusing on aerospace and defense sectors.
GitHub used as a covert channel to manage command-and-control communications, hiding malicious traffic within legitimate data flows.
ClearSky identifies similarities between TA455's methods and those of the North Korean Lazarus Group, suggesting possible tactics sharing or deliberate confusion of attribution. | Details |
| 2024-11-13 06:54:36 | thehackernews | CYBERCRIME | Microsoft Patches Critical Flaws Under Active Exploitation | Microsoft has addressed 90 security issues in its November 2024 Patch Tuesday update, including two actively exploited vulnerabilities in Windows NT LAN Manager (NTLM) and Task Scheduler.
The vulnerabilities include remote code execution risks, with four rated as Critical, 85 as Important, and one as Moderate.
The actively exploited flaws are CVE-2024-43451, which reveals a user's NTLMv2 hash, and CVE-2024-49039, which allows execution of restricted RPC functions.
CVE-2024-43451 is part of a concerning trend, being the third such issue exploited in 2024 to steal NTLMv2 hash details.
Other significant patched vulnerabilities include a Critical privilege escalation in Active Directory and a remote execution flaw in Azure CycleCloud, allowing root-level access.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the exploited flaws to the Known Exploited Vulnerabilities catalog due to their severity.
Microsoft also reported patches in its Edge browser and adopted the Common Security Advisory Framework (CSAF) to enhance the transparency and speed of vulnerability response. | Details |
| 2024-11-13 01:33:39 | theregister | CYBERCRIME | Microsoft and Major Tech Vendors Release Critical Security Patches | Microsoft patched 89 security flaws, including two actively exploited vulnerabilities affecting Windows Task Scheduler and NTLM.
CVE-2024-43602 in Azure CycleCloud and CVEs in .NET and Visual Studio are critically rated, enabling remote execution and privilege escalation.
U.S. government's CISA added certain Microsoft flaws to its Known Exploited Vulnerabilities Catalog, highlighting ongoing risks.
Citrix, Intel, and Adobe also released significant security updates, addressing vulnerabilities across a range of applications and hardware.
CISA noted an increase in exploited zero-day vulnerabilities in 2023, reflecting more targeted attacks on enterprise networks.
Cyberspace trend analysis revealed most successful attacks exploit known vulnerabilities within two years of their disclosure.
Patch updates are essential to mitigate risks, with Microsoft emphasizing the severity of the issues by quick incorporation into its patch cycle.
Industry-wide patching efforts continue as cyber actors exploit both new and longstanding security flaws. | Details |
| 2024-11-13 01:02:54 | theregister | NATION STATE ACTIVITY | Chinese Volt Typhoon Crew Resurges, Targets Global Networks | The Volt Typhoon group, associated with the Chinese government, has reactivated and is targeting critical infrastructure by exploiting outdated Cisco and Netgear routers.
Security experts at SecurityScorecard have observed the resurgence, with a significant compromise noted on Cisco RV320/325 routers, affecting 30% of these models.
These attacks follow a temporary disruption by the FBI, which had previously declared success in dismantling this botnet.
The group has been active since 2021, with recent breaches reported in the U.S. and a test attack on Singapore Telecommunications.
New command and control servers have been established in various locations to evade detection and continue operations.
No new vulnerabilities are exploited; rather, the lapses in device updates due to their end-of-life status facilitate the intrusions.
This resurgence corresponds with an overall increase in Chinese state-sponsored cyber activities targeting U.S. and global networks, involving different cyber espionage groups. | Details |
| 2024-11-13 00:05:55 | theregister | NATION STATE ACTIVITY | Air Guardsman Sentenced for Leaking Secrets on Gaming Chat | Jack Teixeira, a 22-year-old former Air National Guard member, received a 15-year jail sentence for disseminating classified military information on Discord.
Serving with the 102nd Intelligence Wing, Teixeira illegally accessed and shared sensitive details about US and NATO operations and a Chinese drone program.
His leaks included strategic information on military support for Ukraine and the identities of involved UK and US personnel.
Teixeira confessed to smuggling out classified details and later printing them using a rarely used printer at his Massachusetts base.
Within his Discord server, he engaged in disturbing discussions, including topics about mass murders and conducting assassinations.
He expressed awareness of his illegal actions on Discord, sarcastically referring to potential imprisonment.
Leaked documents varied and were further altered in other online platforms, leading to misinformation and escalated threat levels.
The leaks culminated in Teixeira attempting to destroy evidence, a move that coincided with his arrest after Discord revealed his details to authorities. | Details |
| 2024-11-12 21:46:32 | bleepingcomputer | CYBERCRIME | Microsoft Exchange Tackles Email Spoofing with New Security Features | Microsoft has identified a high-severity vulnerability in Exchange Server that permits spoofing of legitimate email senders.
The flaw affects Exchange Server 2016 and 2019 and lies in the verification of the P2 FROM header, which is not fully compliant with email standards.
Security researcher Vsevolod Kokorin reported the issue, highlighting that it facilitates more convincing phishing attacks due to incorrect parsing of the 'From' field by mail providers.
Microsoft released an update in November 2024 that detects exploitation attempts and automatically adds warnings to emails suspected of spoofing.
System administrators are advised to keep the new security feature enabled to prevent these types of phishing attacks, although there is a PowerShell command available to disable it.
The update comes as part of Microsoft's Patch Tuesday releases and is automatically-enabled on systems with secure default settings.
Microsoft’s proactive measures demonstrate an increasing focus on email security amidst growing concerns about phishing threats. | Details |
| 2024-11-12 21:15:44 | theregister | CYBERCRIME | Cloud Storage Hackers Extort Millions, Target Multiple Firms | Two men, one Canadian and one American, allegedly breached multiple organizations' Snowflake-hosted environments, leaking sensitive data.
They reportedly stole and sold data including call logs, banking details, and social security numbers, securing at least $2.5 million from ransoms.
Victims include prominent entities in telecom, retail, entertainment, healthcare, and a major European company with U.S. operations.
The indictment alleges the use of malware named "Rapeflake" for data theft within these cloud environments.
At least three organizations paid the ransoms demanded to suppress the release of their stolen data.
Suspects advertised and sold the stolen information on underground forums like BreachForums and XSS.is.
One suspect was arrested in Canada, and the other in Turkey; details on their extradition to the U.S. remain unclear.
The involvement of these individuals with other cybercriminal activities, including possible ties to the Scattered Spider gang, is under investigation. | Details |
| 2024-11-12 20:34:19 | bleepingcomputer | DATA BREACH | Over 60,000 Vulnerable D-Link Modems Won't Receive Security Fixes | A critical security flaw found in D-Link DSL6740C modems allows an unauthenticated remote attacker to change any user’s password and take control of the device.
The vulnerability was reported to Taiwan's TWCERTCC by security researcher Chaio-Lin Yu.
Despite the severity, D-Link announced they will not fix the issue because the affected modems have reached their end-of-life (EoL) phase.
Around 60,000 of these vulnerable modems are publicly accessible via the internet, predominantly in Taiwan.
D-Link recommends users replace their end-of-life devices with supported models and restrict remote access.
Additional vulnerabilities, including high-severity OS command injection issues (CVE-2024-11062 to CVE-2024-11065), were found in the same device model. | Details |
| 2024-11-12 19:37:49 | bleepingcomputer | MISCELLANEOUS | Microsoft Releases Windows 10 Update with Essential Fixes | Microsoft has issued the KB5046613 cumulative update for Windows 10 versions 22H2 and 21H2, targeting several bug fixes.
Updates include a new Microsoft account manager on the Start menu and crucial fixes for multi-function printer issues.
The update is part of Microsoft's November 2024 Patch Tuesday security updates and is deemed mandatory for Windows 10 users.
Users can install the update manually via the Settings menu or download it from the Microsoft Update Catalog.
Post-update, Windows 10 22H2 updates to build 19045.5131 and Windows 10 21H2 to build 19044.5131.
The update addresses a potential vulnerability by updating the Windows Kernel Vulnerable Driver Blocklist.
Other enhancements include fixes for specific network command print issues in printers and improved system stability during Windows 11 upgrades.
Microsoft confirmed no known issues currently associated with this update. | Details |