Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12820

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-11-11 22:47:36 bleepingcomputer MALWARE Ymir Ransomware Teams with RustyStealer to Target Global Companies
Ymir, a new ransomware strain, encrypts systems previously compromised by RustyStealer, enhancing cyber-attacks. Discovered by Kaspersky, Ymir operates entirely in-memory and employs unique mechanisms, such as using the Lingala language and PDF ransom notes. The ransomware follows an initial breach by RustyStealer, a malware that harvests credentials and facilitates unauthorized access through high-privilege accounts. Attackers employ lateral movement via Windows Remote Management and PowerShell before deploying Ymir as the ultimate payload. Ymir dodges detection with refined techniques and encrypts files using the ChaCha20 cipher, appending a random extension and generating a PDF ransom note in affected directories. The ransomware modifies system settings to display an extortion demand upon user log-in and erases its executable post-launch to avoid forensic analysis. No data leak site for Ymir has been established yet, indicating possible initial stages of this ransomware's operation. Kaspersky suggests the combination of information stealers and ransomware by Ymir's operators could amplify its threat rapidly.
Details
2024-11-11 21:26:03 bleepingcomputer DATA BREACH Hot Topic's Alleged Data Breach Affects Over 57 Million Customers
Have I Been Pwned has notified 56,904,909 individuals about an alleged data breach at retailer Hot Topic, along with its associated brands Box Lunch and Torrid. The breach reportedly includes sensitive customer information such as full names, emails, dates of birth, phone numbers, addresses, purchase histories, and partially exposed credit card data. A threat actor using the name "Satanic" claimed responsibility, posting the breach on BreachForums on October 21, 2024, and attempted to sell the data for $20,000, alongside a ransom demand of $100,000 from Hot Topic. A third-party analysis by data analytics firm Atlas Privacy suspects the breach stemmed from an information stealer malware and involves a 730GB database impacting approximately 54 million customers. Although Atlas cannot confirm the database's origin, the presence of 25 million weakly encrypted credit card numbers and many unique email addresses supports the authenticity of the exposed data. The exact breach date is speculated to be October 19, 2024, with the data ranging from 2011 to that time. Hot Topic has yet to officially respond or notify affected customers. Atlas Privacy has created a resource for Hot Topic customers to verify if their information was compromised in this incident. Meanwhile, customers are advised to monitor their accounts and change shared passwords across platforms.
Details
2024-11-11 19:11:55 bleepingcomputer DATA BREACH Amazon Employee Data Exposed Due to Third-party Vendor Hack
Amazon confirmed a data breach involving over 2.8 million lines of Amazon employee data after a vendor hack. The leaked data includes employee names, contact information, and building locations but not sensitive data like Social Security numbers. The breach was a result of a security event at a property management vendor used by Amazon; the vendor has since patched the exploited security vulnerability. Nam3L3ss, the threat actor responsible, claims to have obtained the data from the MOVEit data theft attacks, among other sources. Nam3L3ss also markets data from other major corporations, harvested from various exposed internet resources. The Clop ransomware gang initiated the MOVEit attacks, leveraging a zero-day flaw in the MOVEit Transfer platform, affecting many global organizations. This security incident has broader implications, impacting multiple other companies and exposing tens of millions of personal data pieces.
Details
2024-11-11 16:27:54 theregister CYBERCRIME FBI Warns of Increasing Fraudulent Emergency Data Request Scams
The FBI has issued a Private Industry Notification addressing a surge in fraudulent emergency data requests (EDRs) targeting US businesses. Cybercriminals are exploiting these EDRs, originally intended for rapid law enforcement access in emergencies, to unlawly obtain personally identifiable information (PII). These fraudulent EDRs are often conducted using compromised email addresses from US and foreign governments to appear legitimate. Tactics include offering underground forum tutorials on how to execute these scams, with prices starting as low as $100. The objective of the fraud varies from extortion, selling the stolen data, to other forms of financial crimes. The FBI emphasizes strengthening cybersecurity measures and developing close relationships with local FBI offices to prevent data breaches. Organizations are advised to enhance incident response strategies and exercise critical thinking when handling EDRs to verify their authenticity. The emergence of low-cost EDR fraud indicates a lowering barrier for entry into cybercrime, making it a pervasive threat across various sectors.
Details
2024-11-11 15:56:56 bleepingcomputer CYBERCRIME Halliburton Faces $35M Loss Due to Ransomware Attack
Halliburton reported a $35 million loss stemming from a ransomware attack in August, impacting IT operations and customer interactions. The attack prompted the shutdown of key IT systems and disconnection of client services, as disclosed in a SEC filing. RansomHub, a known ransomware gang, was identified as the perpetrator, having breached Halliburton’s systems and stolen data. Details regarding the type and extent of the stolen data are still under investigation, with potential legal and financial repercussions pending. Despite the cybersecurity setback, Halliburton's third-quarter earnings showed a minor per-share earnings impact and stable financial projections for the year. The incident underscores the ongoing threats faced by global corporations in crucial sectors like energy, from sophisticated cybercriminal groups.
Details
2024-11-11 14:59:49 thehackernews MALWARE GootLoader Malware Targets Bengal Cat Queries in Australia
GootLoader malware campaign targets internet users inquiring about Bengal cat legality in Australia. The malware is spread via search engine optimization poisoning, leading users to malicious links that download a ZIP archive containing JavaScript payloads. Once installed, GootLoader can initiate a multi-stage attack, deploying secondary malwares like remote access trojans or information stealers. The targeted search term involved queries about the necessity for licenses to own Bengal cats in Australia, exploiting a legitimate Belgian website. The JavaScript file within the downloaded ZIP archive triggers the execution of a PowerShell script that harvests system info and fetches additional payloads. Although previous similar campaigns deployed GootKit, Sophos did not observe this in their current analysis. The tactic of using search engine optimization to distribute malware has been utilized by GootLoader since at least 2020.
Details
2024-11-11 12:44:22 theregister CYBERCRIME Dark Web Crypto Laundering Kingpin Gets 12.5-Year Sentence
Roman Sterlingov, operator of Bitcoin Fog, was sentenced to 12 years and six months in a U.S. prison for running a crypto laundering service. Over a decade, Bitcoin Fog processed 1.2 million Bitcoin, valued at approximately $400 million at the time of its closure. Sterlingov, a Russian-Swedish national, was also ordered to pay over half a billion dollars in restitution and forfeit seized assets including a substantial Bitcoin wallet. Bitcoin Fog was instrumental in helping criminals mask the financial proceeds from drug trafficking, identity theft, and other illegal activities. The U.S. Justice Department emphasized the importance of holding facilitators of criminal activity accountable, highlighting the efforts of investigators and prosecutors in dismantling the laundering operation. Despite the takedown of Bitcoin Fog, numerous other cryptocurrency mixers still operate, posing ongoing challenges for law enforcement agencies. Cryptocurrency mixers, though not illegal in most places, are commonly exploited for laundering criminal finances, prompting targeted legal actions.
Details
2024-11-11 12:00:26 thehackernews NATION STATE ACTIVITY FBI Investigates Chinese-Linked Global Cyber Espionage
The FBI has identified Chinese state-sponsored hacking groups APT31, APT41, and Volt Typhoon as the perpetrators behind recent global cyber attacks targeting edge devices and computer networks. These hackers have exploited zero-day vulnerabilities in edge infrastructure equipment from vendors such as Sophos, using custom malware for persistent remote access and to repurpose compromised devices as stealth proxies. The compromised infrastructure allows these actors to carry out surveillance, espionage, and potentially destructive sabotage while evading detection. Urgent call for public assistance by the FBI highlights the scale and sophistication of the threat, emphasizing the need for heightened cybersecurity vigilance and cooperation. Recommendations for organizations include focusing on cybersecurity resilience, particularly safeguarding Microsoft 365 data and applications which are integral to business operations globally. Trending CVEs indicate a variety of significant risks, reinforcing the necessity of regular system updates and vigilant monitoring to defend against potential breaches. New security tools released by P0 Labs aim to improve detection capabilities, addressing a wide range of cyber threats. Effective security strategies now also require implementing smarter application whitelisting and robust monitoring of application behaviors to prevent unauthorized actions on systems.
Details
2024-11-11 11:34:43 thehackernews MISCELLANEOUS Validating Security Investments: Proving Return and Efficacy
Cyber threats are intensifying, making cybersecurity an essential aspect of business operations. CEOs and Boards require concrete evidence of the value and effectiveness of cybersecurity initiatives. Shawn Baird from DTCC emphasizes the importance of security validation using real-world attack techniques to test the resilience of systems. The adoption of automated security validation platforms like Pentera has allowed DTCC to optimize resource use and reduce the cost associated with manual security validations. Automated platforms have enabled continuous and extensive security testing, reducing the probability of a breach and associated costs. Overcoming internal resistance was crucial; a phased implementation demonstrated the safety and efficacy of automation. The strategic budget allocation allowed additional testing without additional costs, improving DTCC’s overall security stance. Shawn advises other cybersecurity leaders on the strategic value of investment in automated security validation tools to enhance productivity, reduce risk, and facilitate compliance.
Details
2024-11-11 10:13:16 thehackernews CYBERCRIME Critical Security Flaws Found in Key ML Open-Source Projects
Researchers identified nearly two dozen security flaws in 15 machine learning-related open-source projects. Vulnerabilities were found in tools such as Weave, ZenML, Deep Lake, Vanna.AI, and Mage AI, affecting both serverand client-side components. Exploited flaws allow hijacking of critical infrastructure, such as ML model registries, ML databases, and ML pipelines. Attackers can use the compromised systems to backdoor ML models, poison ML data, or take complete control of ML operational pipelines. The discovery of these vulnerabilities follows a past uncovering of over 20 security holes targeting MLOps platforms. A defense mechanism called Mantis was also developed, using prompt injections to counter or disrupt attacks actively or passively against large language models. Mantis could potentially use dynamic prompt injections to turn the attackers’ tools against themselves by deploying decoy services to attract cyber assaults.
Details
2024-11-11 09:58:02 thehackernews MALWARE HPE Releases Urgent Fixes for Critical Aruba Access Point Flaws
Hewlett Packard Enterprise (HPE) has issued security updates for multiple vulnerabilities in Aruba Networking Access Point products. The updates address two critical vulnerabilities, CVE-2024-42509 and CVE-2024-47460, both allowing unauthenticated command execution with CVSS scores of 9.8 and 9.0, respectively. These vulnerabilities are related to command injection flaws in the CLI service that allow remote code execution on affected devices via specially crafted packets sent to UDP port 8211. Remediation strategies include enabling cluster security or blocking access to UDP port 8211 on different device versions. HPE also suggests additional security measures such as isolating CLI and web-based management interfaces on a dedicated VLAN and protecting them with firewall policies. Arctic Wolf notes that while these vulnerabilities have not been exploited in the wild, they pose a significant risk as they offer potential access for threat actors to execute code as privileged users. There is a potential risk of threat actors reverse-engineering the patches to target unpatched systems, emphasizing the urgency of applying the provided security updates.
Details
2024-11-11 06:13:51 thehackernews MALWARE New Phishing Campaign Deploys Fileless Remcos RAT via Excel
Cybersecurity researchers have uncovered a phishing scheme utilizing a fileless version of the Remcos RAT, delivered via a malicious Excel attachment exploiting an Office vulnerability (CVE-2017-0199). The attack initiates with a phishing email featuring a purchase order-themed lure encouraging the opening of the attachment, which executes a multi-layered file containing JavaScript and PowerShell scripts to avoid detection. The primary script fetches and runs an executable from a remote server, which contains anti-analysis and anti-debugging functionalities to complicate forensic efforts. The malware employs process hollowing techniques to inject the Remcos RAT directly into memory, skipping local storage to avoid traditional file-based detection mechanisms. Remcos RAT is capable of performing multiple malicious activities including system surveillance, remote execution of commands, data exfiltration, and potentially downloading additional malicious payloads. Additional observations in the cybersecurity landscape include exploitation of Docusign APIs by threat actors for scaled phishing operations, and innovative ZIP file concatenation techniques to distribute malware. These sophisticated tactics underscore an evolution in phishing strategies, leveraging both social engineering and technical loopholes to compromise targets.
Details
2024-11-11 03:33:32 theregister DATA BREACH Canadian Authorities Arrest Key Suspect in Snowflake Data Breach
Alexander "Connor" Moucka, allegedly involved in the Snowflake data breach affecting 165 customers, including AT&T and Ticketmaster, was arrested in Canada. The arrest was made on a U.S. request; extradition hearings and charges are pending. Moucka, identified as UNC5537 by Mandiant, is linked to multiple cybersecurity incidents and is said to have used simple, effective tools for data theft and extortion. His alleged co-conspirator, John Binns, was arrested earlier in Turkey, noted for a 2021 breach of T-Mobile. The breach highlighted significant security gaps, notably the lack of two-factor authentication, which facilitated unauthorized data access. Mandiant analysts emphasize the arrest as a deterrent, underlining the severe repercussions of high-profile cyber criminal activities. The case remains significant in cybersecurity circles, showcasing the international collaboration in tackling global cyber threats and the ongoing challenges of digital security.
Details
2024-11-10 15:14:56 bleepingcomputer MALWARE Hackers Use ZIP File Concatenation to Bypass Security
Hackers are using a method called ZIP file concatenation to deploy malware on Windows systems without being detected by security tools. The malicious technique involves creating multiple ZIP files, inserting malware into one, and then combining these files into a single archive. Different archive solutions like 7zip, WinRAR, and Windows File Explorer show varied behaviors when processing concatenated ZIP files, allowing hackers to exploit these discrepancies. Perception Point researchers uncovered this strategy during an analysis of a phishing attack featuring a fake shipping notice. To mitigate risks, Perception Point recommends implementing security measures that support recursive unpacking and treating archive attachments in emails with heightened scrutiny. The discovery emphasizes the need for organizations to employ advanced security features and maintain awareness of evolving cyber-threat tactics.
Details
2024-11-09 21:09:56 bleepingcomputer CYBERCRIME Scammers Use Winter Fuel Payments to Target UK Seniors
Scammers are exploiting UK senior citizens with deceptive texts about winter fuel support. Fraudulent texts redirect victims to fake GOV.UK pages to steal personal and payment information. Reduction in eligible recipients for Winter Fuel Payments by the UK government has coincided with the increase in scam activities. The scam specifically targets senior residents, encouraging prompt action to benefit from government credits. BleepingComputer reported seeing entities posing as government officials using phony domains, with over 597 associated with this scam. The scheme chiefly operates on mobile platforms, utilizing a sophisticated facade of government support to solicit sensitive details. The UK's Regional Organised Crime Unit warns against such texts and advises the public on reporting these scams to the authorities. Cybersecurity researchers are actively monitoring and documenting the associated malicious domains used by scammers.
Details