Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12801

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-09-25 11:26:26 thehackernews CYBERCRIME Identifying and Mitigating Phishing Link Risks Effectively
Phishing attacks employ complex URLs with random characters to veil malicious intentions and mislead users. SSL certificates, while important for security, are not foolproof against phishing as attackers can use HTTPS links to distribute malware. Redirect chains are a common tactic, extending the delivery path and confusing the target, often culminating in a fake login page designed to steal credentials. Discrepancies in page titles and favicons are indicators of phishing; legitimate websites have consistent, clear titles and corresponding favicons. Phishing schemes may misuse CAPTCHA and Cloudflare checks to add a layer of legitimacy and slow down user interactions, obscuring true motives. Always verify the authenticity of domains, especially those mimicking legitimate services like Microsoft, before entering sensitive information. Inspect interface elements closely; credible-looking elements from familiar software could be traps for capturing passwords and other sensitive data. ANY.RUN's Safebrowsing tool offers a secure environment to analyze suspicious links and detect malicious activities without endangering user systems.
Details
2024-09-25 09:54:22 thehackernews MISCELLANEOUS Agentic AI: Revolutionizing SOC Automation and Efficiency
Despite a decade of advancements, SOAR technologies have not fully automated Security Operations Centers (SOCs), particularly in thinking tasks. Agentic AI introduces a dynamic approach, focusing on automating the investigatory and analytical phases, traditionally manual and slow processes in SOCs. Agentic AI uses large language models to interpret alerts, conduct research, and synthesize data, acting much like human analysts but at a faster pace. This AI-driven method produces detailed, human-readable reports and can execute response actions, reducing the mean time to respond (MTTR) significantly. With Agentic AI, SOCs can maintain a balance between automation and human oversight, increasing overall operational efficiency and security. Radiant Security, a pioneer in leveraging generative AI for SOC analysts, represents a practical application of Agentic AI, delivering decision-ready results rapidly. Potential users are encouraged to explore Agentic AI solutions to enhance SOC operations and team morale by reducing the workload and improving threat detection capabilities.
Details
2024-09-25 09:33:29 thehackernews MALWARE ChatGPT macOS Vulnerability Could Enable Persistent Spyware
A significant vulnerability was discovered in the OpenAI ChatGPT app for macOS, potentially allowing attackers to implant long-term spyware. The flaw exploits the 'memory' feature in ChatGPT, which retains information across user sessions to minimize repetitive inputs. Attackers could manipulate this memory feature through indirect prompt injection, forcing ChatGPT to remember and enact malicious instructions. This vulnerability would enable continuous data exfiltration across multiple chat sessions by sending all typed input and ChatGPT responses to an attacker-controlled server. OpenAI has since patched the vulnerability in version 1.2024.247 of the ChatGPT app, closing the potential for data exfiltration. Users are advised to regularly check and clean the stored memories in ChatGPT for any suspicious or incorrect entries. Additional research revealed a related AI security threat called MathPrompt, which bypasses AI safety mechanisms using mathematically encoded prompts.
Details
2024-09-25 07:08:36 thehackernews CYBERCRIME North American Transport Firms Targeted by Phishing and Malware
North American transportation and logistics companies are being targeted by a sophisticated phishing campaign that employs information stealers and remote access trojans. Attackers use compromised email accounts from legitimate transportation businesses to send malware-infected messages, blending seamlessly into ongoing email threads. The campaign, active from May to July 2024, primarily distributed Lumma Stealer, StealC, and NetSupport malware. In August 2024, tactics shifted to include DanaBot and Arechclient2 using new techniques and infrastructure. Cybercriminals employ lures impersonating known transportation and logistics management software to increase the likelihood of the targeted companies engaging with the malicious content. Attack vectors include sending .URL files through email or Google Drive links, which lead to malware downloads using the SMB protocol or through crafted scripts pasted by the user into the terminal. The attacks are highly targeted, with threat actors conducting pre-attack research on potential victims to customize phishing lures effectively. The disclosure of these attacks follows the identification of multiple new strains of stealer malware and updates to existing malware like the RomCom RAT, indicating a broad and active threat landscape specifically targeting industry-specific operations.
Details
2024-09-25 06:07:09 thehackernews CYBERCRIME CISA Adds Ivanti vTM Flaw to Exploited Vulnerabilities List
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a critical vulnerability in Ivanti Virtual Traffic Manager (vTM), tagged as CVE-2024-7593, and added it to its Known Exploited Vulnerabilities catalog. The flaw has a high severity rating (CVSS score: 9.8) and allows remote, unauthenticated attackers to bypass admin authentication and create unauthorized admin accounts. Ivanti has issued patches for the vulnerability in versions 22.2R1 through 22.7R2 of vTM as of August 2024. Although specific details of the attacks leveraging this vulnerability were not disclosed, a proof-of-concept is known to be publicly available. Federal Civilian Executive Branch (FCEB) agencies are mandated to remediate this security issue by October 15, 2024, to enhance network security. Recent analysis by Ivanti indicates that several vulnerabilities, including CVE-2024-8190 and CVE-2024-8963, have been actively exploited, affecting a limited number of customers. As of September 23, 2024, there are 2,017 online instances of Ivanti Cloud Service Appliance potentially at risk, mainly located in the U.S., though the exact number vulnerable to this specific exploit is unknown.
Details
2024-09-25 01:29:30 theregister MISCELLANEOUS CrowdStrike Apologizes for Global IT Outage Caused by Software Issue
CrowdStrike's senior VP, Adam Meyers, apologized for a significant IT disruption caused by a faulty software update during a U.S. House of Representatives cybersecurity subcommittee hearing. The software issue on July 19 led to crashes on millions of Windows machines, affecting various sectors including aviation, medical services, and emergency hotlines. Meyers explained the cause as a mismatch in data input and predefined rules in a threat detection update, which led to widespread system failures. The incident brought up concerns regarding the security software's kernel-level access to Windows, which if revoked, could diminish the effectiveness of threat detection mechanisms. In response to the update failure, CrowdStrike has improved its update quality control and initiated a phased rollout process. Discussions also highlighted the debate between kernel-level and user mode software updates, with Microsoft considering less intrusive methods to enhance system stability. During the inquiry, criticisms were raised about the frequency of kernel updates by security firms compared to more cautious approaches like those of Trellix with quarterly updates.
Details
2024-09-25 01:29:30 theregister NATION STATE ACTIVITY China Accuses Taiwan of State-Sponsored Cyber Vandalism
China's Ministry of State Security has accused Taiwan's military of orchestrating cyber attacks against Chinese websites, specifically targeting portal websites and network television in mainland China, Hong Kong, and Macao. The alleged cyber group, Anonymous64, is said to be attempting to display anti-Beijing content, which the Chinese government claims is driven by Taiwan’s Information, Communications, and Electronic Force Command (ICEFCOM). Beijing has named three Taiwanese individuals allegedly involved in these cyber activities, suggesting a formal accusation against the individuals. The Taiwanese Ministry of National Defense has refuted these allegations, asserting that the claims are untrue. Anonymous64 reportedly posts content critical of the Chinese Communist Party and the People's Liberation Army, including screenshots of purportedly defaced websites. The Chinese Ministry questioned the authenticity of these screenshots, stating that the affected websites have minimal impact due to low traffic. China has issued a reminder to web developers and operators to implement robust cybersecurity measures to prevent similar incidents. The ongoing dispute underscores the heightened tensions and complexities in China-Taiwan relations, with China viewing Taiwan as a part of its territory while Taiwan regards itself as an independent nation.
Details
2024-09-24 21:34:21 bleepingcomputer CYBERCRIME AutoCanada Employee Data Exposed in Ransomware Attack
AutoCanada experienced a ransomware attack in August, attributed to the Hunters International ransomware gang, potentially exposing employee data. Despite no current evidence of fraud targeting affected individuals, notifications are being issued to alert them of the data risks. The cyberattack led to AutoCanada taking certain internal IT systems offline, causing operational disruptions but not halting dealership operations. Hunters International claimed responsibility for the attack, posting stolen data including employee and financial information on their extortion portal. AutoCanada has offered those impacted free identity theft protection and credit monitoring services for three years and is actively restoring encrypted server content. Ongoing efforts include isolating impacted systems, resetting admin passwords, conducting security audits, and implementing advanced threat detection systems. There is no evidence that customer data has been compromised, but the full scope of impacted data is still under determination.
Details
2024-09-24 19:56:33 bleepingcomputer CYBERCRIME Cyberattack Forces Kansas Water Plant into Manual Operation Mode
Arkansas City, Kansas, shifted its water treatment plant to manual operation after a cyberattack was detected early Sunday. Local authorities have engaged both Homeland Security and the FBI to investigate the cybersecurity incident. City officials assured residents that the water supply remains safe and there has been no disruption to services despite the cyberattack. The Water Information Sharing and Analysis Center recently issued an advisory about potential Russian-linked cyber threats to the U.S. water sector. Enhanced security measures have been implemented at the water treatment facility to ensure ongoing safety and service continuity. The city experienced related technical issues with some pumps, potentially affecting water pressure throughout the weekend and Monday. The cyber incident in Arkansas City follows a recent pattern of cyberattacks on U.S. water systems by various international cybercriminal groups and nation-states. Government and cybersecurity experts are collaborating to restore normal operations and strengthen defenses against future cyber threats.
Details
2024-09-24 19:51:13 theregister MISCELLANEOUS Google Dominates as Top Online Tracker Globally, Says Kaspersky
Google is leading in online tracking with four main systems widely used across different regions. Kaspersky’s annual report highlights the extensive use of tracking tools like cookies, tracking pixels, and social media trackers that raise privacy concerns. The study utilized the Kaspersky Do Not Track (DNT) tool, recording 38.7 billion tracking attempts within a year. Google's specific tracking tools such as Google Display & Video 360, and Google Analytics are most active in regions like Asia and the Middle East. Lesser-known trackers like New Relic and Microsoft’s systems also appeared consistently across different regions but held smaller percentages. Privacy advocates argue against the widespread tracking due to potential privacy risks and surveillance issues. There’s an ongoing debate about the balance between personalized user experiences on websites and protection against privacy infringement.
Details
2024-09-24 18:33:37 theregister NATION STATE ACTIVITY Russia Intensifies Cyberattacks and Malware Deployments in Ukraine
Russia continues aggressive cybersecurity attacks against Ukraine, with malware incidents rising by 90%. Ukrainian report highlights over 1700 cybersecurity incidents, focusing significantly on espionage and malware deployment. Russian cyber groups like UAC-0184 use sophisticated phishing strategies, leveraging social platforms and messaging apps to initiate attacks. Cyberattacks aim at multiple sectors, with recent focus on Ukraine’s energy infrastructure, including credible threats identified against approximately 20 entities. Russia employs supply chain attacks, compromising software and service providers to gain unauthorized system access. Cybersecurity challenges exacerbated by inadequate network segmentation and unpatched vulnerabilities. Despite the increase in attack frequency, Ukraine marks most incidents as low severity, with significant drops in 'critical' and 'high' severity incidents year over year. Ukraine commits to enhancing public cybersecurity awareness, recognizing human error as a significant vulnerability against ongoing Russian cyber tactics.
Details
2024-09-24 18:02:20 bleepingcomputer DATA BREACH Major Data Breach Affects 3.1 Million in MOVEit Attacks
The Centers for Medicare & Medicaid Services (CMS) reported a data breach affecting over 3 million people. Personal and health information was compromised due to Cl0p ransomware attacks on the MOVEit transfer tools. Wisconsin Physicians Service (WPS), tasked with Medicare administrative services, suffered the breach revealing data including that of individuals not currently covered under Medicare. CMS disclosed that 946,801 notified individuals were directly part of Medicare, with others included due to former or pending qualifications. WPS had updated security measures in June 2023, but the breach had occurred before implementation. Analysis in July 2024 confirmed the theft of sensitive files; ongoing investigations are still assessing the full scope of compromised data. CMS and WPS are offering a 12-month credit monitoring service through Experian to help mitigate potential identity theft risks.
Details
2024-09-24 17:36:18 bleepingcomputer MALWARE Malware Developers Claim to Bypass Chrome's New Encryption
Infostealer malware developers have updated their tools to allegedly bypass Google Chrome’s App-Bound Encryption, designed to protect cookies and passwords. Google introduced App-Bound Encryption in Chrome 127 to secure sensitive data by encrypting it via a Windows service that runs with system privileges. Security researchers identified that multiple infostealer tools, including MeduzaStealer and Vidar Stealer, claimed successful bypass strategies. A researcher confirmed that Lumma Stealer bypassed the encryption in the latest Chrome version 129 during tests in a controlled environment. Several malware, previously only operational with admin rights, now claim to bypass encryption without needing elevated privileges. The exact technical methods used to bypass App-Bound Encryption have not been publicly disclosed by the malware developers.
Details
2024-09-24 17:04:52 bleepingcomputer CYBERCRIME Critical Ivanti vTM Vulnerability Now Under Active Exploitation
Ivanti has reported critical vulnerabilities in Virtual Traffic Manager (vTM) appliances, allowing attackers to bypass authentication and create rogue admin users. The flaw, identified as CVE-2024-7593, involves an incorrect implementation of the authentication algorithm that can be exploited remotely without authentication. Successful exploitation could lead to unauthorized administrative access, posing significant risks to business-critical services facilitated by vTM. Ivanti has released patches and advises checking Audit Logs for signs of exploitation, such as newly added 'user1' or 'user2' admin users. CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog, signaling that this issue is being actively exploited in the wild. Federal agencies are required to secure affected appliances by October 15 as per Binding Operational Directive (BOD) 22-01. Ivanti recommends restricting access to vTM admin panels by binding them to internal networks or private IPs to mitigate risks. Ivanti's ongoing challenges with vulnerabilities also include recently exploited zero-days in other products and attacks chaining two patched CSA vulnerabilities.
Details
2024-09-24 16:59:30 theregister CYBERCRIME Critical Vulnerabilities Risk Fuel Storage Tank Cyberattacks
Researchers identified severe vulnerabilities in Automatic Tank Gauges (ATGs) used in critical infrastructure, impacting fuel storage management. Ten zero-day vulnerabilities across products from several vendors including Dover Fueling Solutions, OPW Fuel Management Systems, Franklin Fueling Systems, and OMNTEC expose risks of cyberattacks that could lead to physical, environmental harm. Seven of the disclosed vulnerabilities are considered critical, allowing attackers administrative control over the devices. Vulnerable ATGs can be exploited remotely with low complexity, enhancing risks of spills by altering tank settings or disabling alarms. Despite ongoing efforts by CISA and cybersecurity firms to resolve these issues, approximately 1,200-1,500 devices remain at risk. Urgent updates have been issued for some affected devices, while manufacturers recommend isolating critical systems from wider networks and using firewalls and secure VPNs for remote accesses. Three bugs remain unpatched, with manufacturers either recommending upgrades to newer, secure versions or failing to respond to mitigation coordination efforts.
Details