Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12754
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2024-07-19 17:56:22 | theregister | MALWARE | CrowdStrike Update Causes Global Windows System Crashes | A recent update from CrowdStrike caused significant disruptions in Microsoft Windows systems worldwide, resulting in blue-screen crashes.
Millions of devices, including those at key infrastructure points like airports and hospitals, were affected, necessitating manual fixes.
IT administrators faced considerable challenges duec to this incident, which could potentially require weeks to resolve fully.
The issues have caused extensive downtime and operational disruptions across various sectors.
Discussions and analyses on the impact and recovery process were featured on the Kettle podcast, with insights from tech and cybersecurity professionals.
The creators and hosts of the episode addressed the urgency and severity of the situation while seeking audience feedback on the crisis management. | Details |
| 2024-07-19 17:10:18 | bleepingcomputer | DATA BREACH | Massive Ransomware Breach Exposes Data of 12.9 Million Australians | MediSecure, an Australian prescription delivery service, suffered a ransomware attack in April, compromising the personal and health information of approximately 12.9 million people.
The breach was publically announced on May 16, following the realization that a database server was encrypted by suspected ransomware on April 13.
The company had to temporarily shut down its website and phone lines to manage the breach, with the help of the Australian National Cyber Security Coordinator (NCSC).
MediSecure restored data from a server backup on May 17, but despite efforts, could not pinpoint the exact individuals affected due to complex data sets.
Stolen data includes sensitive personal details such as names, Medicare and other healthcare-related card numbers, contact details, and prescription information.
The total volume of data extracted by the hackers was 6.5 terabytes, and the breach impacts users who accessed MediSecure's services from March 2019 to November 2023.
Following the breach, MediSecure advises the public to remain vigilant for scams referencing the incident and to verify the identity of callers claiming to be from medical or financial service providers. | Details |
| 2024-07-19 13:50:00 | thehackernews | CYBERCRIME | Russian Nationals Plead Guilty in Global LockBit Ransomware Attacks | Two Russian citizens, Ruslan Magomedovich Astamirov and Mikhail Vasiliev, have admitted guilt in U.S. court for participating in the LockBit ransomware attacks.
Vasiliev, dual Canadian-Russian national, was caught and sentenced to nearly four years before extradition to the U.S., and Astamirov was arrested in Arizona.
LockBit has targeted over 2,500 organizations globally since late 2019, amassing about $500 million in ransom.
Despite a major law enforcement operation named Cronos taking down its online infrastructure earlier this year, LockBit remains active.
The defendants played key roles in deploying ransomware, stealing and encrypting data, and demanding ransoms for data decryption and deletion.
Astamirov personally carried out attacks against at least 12 victims across multiple countries from 2020 to 2023, amassing $1.9 million in ransom.
Vasiliev faces up to 45 years in prison for an array of charges including conspiracy to commit computer fraud and serious damage to protected computers.
Sentencing for both defendants has been scheduled for January 8, 2025, while Dmitry Yuryevich Khoroshev, another major figure in LockBit, remains at large. | Details |
| 2024-07-19 12:40:23 | thehackernews | MISCELLANEOUS | Faulty CrowdStrike Update Causes Global Windows System Crashes | Worldwide disruption to business operations due to a defective CrowdStrike software update for Windows systems.
The issue led to Blue Screens of Death (BSOD), mainly affecting Windows hosts; Mac and Linux hosts remained unaffected.
CrowdStrike identified and remedied the fault in their Falcon Sensor product, deploying a fix and providing mitigation instructions.
The problem extended to Google Cloud Compute Engine, causing crashes and reboots of Windows virtual machines.
Security experts emphasized the significant impact of this incident due to CrowdStrike’s widespread use in critical infrastructure and systems.
Impactful sectors included airlines, financial institutions, hospitals, hotels, and telecom firms among others.
CrowdStrike’s share value fell by 15% following the incident, underscoring the severe business and operational implications.
Recovery expected to be manual and time-consuming, highlighting the need for robust fail-safes and diverse IT infrastructure in managing such critical software. | Details |
| 2024-07-19 11:48:48 | bleepingcomputer | MISCELLANEOUS | CrowdStrike Update Causes Global Windows System Outages | Faulty CrowdStrike Falcon update leads to widespread Windows crashes, impacting organizations worldwide including emergency services, airlines, and hospitals.
Systems are experiencing a boot loop or Blue Screen of Death; CrowdStrike acknowledges this is due to a malfunctioning Channel File in the update.
Affected sectors include U.S. and Canadian emergency services, various European and Australian airports, and healthcare facilities in the Netherlands and Spain.
CrowdStrike has identified and reverted the problematic update, and is providing workaround steps to affected customers.
CEO confirms the outage was triggered by a single defective content update and assures customers of ongoing support and resolution.
Impacts are severe with reports of entire companies offline, and emergency services in some areas resorting to manual operations.
Despite the deployment of a fix, significant ongoing disruptions expected as organizations recover from the system outages. | Details |
| 2024-07-19 11:33:07 | bleepingcomputer | CYBERCRIME | Russian Nationals Plead Guilty in Global LockBit Ransomware Scheme | Two Russian nationals admitted guilt in numerous global LockBit ransomware attacks, significantly impacting businesses across multiple countries.
Ruslan Magomedovich Astamirov and Mikhail Vasiliev operated as affiliates within the LockBit ransomware-as-a-service setup, engaging in activities such as data theft, system encryption, and ransom demands.
LockBit attacks orchestrated by these individuals involved threatening the publication of sensitive stolen data unless ransoms were paid, with multiple companies having their data permanently encrypted and exposed.
Between 2020 and 2023, Astamirov deployed ransomware attacks against at least a dozen victims worldwide, netting over $1.9 million in ransom payments.
Vasiliev conducted at least 12 ransomware attacks from 2021 to 2023, generating a minimum of $500,000 in losses and damage to businesses.
Recent law enforcement efforts, dubbed Operation Cronos, dismantled part of LockBit's infrastructure in February 2024, although the group remains active and continues its criminal activities.
The continuing operations of LockBit illustrate ongoing challenges in curbing sophisticated international cybercrime and highlight the importance of international cooperation in these efforts. | Details |
| 2024-07-19 11:02:11 | thehackernews | CYBERCRIME | Enhancing Security with Identity Intelligence to Combat Cyber Threats | Identity intelligence is critical for detecting and mitigating threats from compromised credentials, vital in today’s cyber threat environment.
Compromised credentials can give cybercriminals unauthorized access, leading to information breaches and facilitating ransomware and other malware attacks.
Cybersixgill emphasizes the use of identity intelligence to provide detailed insights on compromised credentials found on the dark web, which helps in taking preventive actions.
The average cost of a data breach resulting from stolen or compromised credentials climbed to $4.5 million in 2022, underscoring the high financial stakes involved.
Stealer Malware and phishing are common methods used by cybercriminals to obtain credentials, alongside more traditional tactics like brute force attacks and social engineering.
Multifactor authentication (MFA) and consistent employee training on data protection policies are recommended to reduce vulnerability.
Cybersixgill's solution uses AI and machine learning to enhance the detection and alerting of leaked credentials, aiding organizations in rapid response and threat mitigation.
Proactive use of identity intelligence not only protects against immediate threats but also enhances overall organizational security posture by providing actionable and relevant data. | Details |
| 2024-07-19 09:30:20 | thehackernews | MALWARE | Pro-Houthi Group Uses Android Spyware Against Yemeni Aid NGOs | A pro-Houthi threat group known as OilAlpha targeted Yemeni humanitarian organizations like CARE International and the Norwegian Refugee Council with Android spyware.
Recorded Future's Insikt Group reported these incidents involving attempts to steal sensitive information using malicious mobile apps.
The affected organizations, also including the Saudi Arabian King Salman Humanitarian Aid and Relief Centre, were attacked as part of an espionage campaign.
The spyware, identified as SpyMax, was distributed via deceptive apps pretending to be legitimate humanitarian programs and through WhatsApp as disguised APK files.
OilAlpha's hacking tools requested extensive permissions upon app installation, allowing unauthorized access to data and helping in credential harvesting via fake login pages.
Analysts speculate the espionage is aimed at controlling humanitarian aid distribution in Yemen by acquiring intelligence on aid organizations' operations.
Related incidents were reported earlier when a Houthi-aligned actor used GuardZoo, another surveillance tool directed at similar targets in the region. | Details |
| 2024-07-19 08:59:27 | thehackernews | MISCELLANEOUS | Key Insights from Top AI Experts in Recent Webinar | Sigma Computing hosted the "AI Leaders Spill Their Secrets" webinar, featuring a panel of AI industry experts.
Participants included Michael Ward from Sardine, Damon Bryan from Hyperfinity, and Stephen Hillian from Astronomer, moderated by Sigma's Product Manager, Zalak Trivedi.
The webinar highlighted Sigma's analytics product capabilities including live cloud exploration, interactive intelligence, and cloud-scale security.
Experts shared their experiences and successful applications of AI, providing real-world examples of AI driving growth and efficiency.
Discussions also delved into the evolving future of AI, enhancements in Sigma Computing's analytics platform, and regulatory and security considerations.
The event emphasized the need for collaborative innovation in AI and the continuous evolution of technology to meet industry demands.
Audience interactions helped identify future trends and continued interest in AI advancements. | Details |
| 2024-07-19 07:26:36 | thehackernews | NATION STATE ACTIVITY | APT41 Expands Global Cyber Espionage in Multiple Key Sectors | APT41, a China-based hacking group, has launched a sustained cyber campaign targeting Italy, Spain, Taiwan, Thailand, Turkey, and the U.K., affecting sectors including shipping, logistics, media, tech, and automotive.
The group has maintained prolonged unauthorized access to various organizations, extracting sensitive data through advanced persistent threats since early 2023.
APT41 employed malware tools such as ANTSWORD, BLUEBEAM, DUSTPAN, and DUSTTRAP, together with publicly available software like SQLULDR2 and PINEGROVE, to infiltrate, persist, and exfiltrate data from victim networks.
Cobalt Strike Beacon was utilized for command-and-control communications, and DUSTTRAP was used post lateral movement for deploying malicious payloads, further establishing attackers’ presence.
Techniques included exporting data from Oracle Databases and using Microsoft OneDrive for data exfiltration, alongside other methods to evade detection and maintain stealth.
Google identified and remediated compromised Google Workspace accounts used by attackers in their operations.
Concurrently, another China-linked threat group, GhostEmperor, was reported utilizing complex malware, including a Demodex rootkit, to undertake a separate cyber espionage campaign.
Mandiant’s analysis revealed overlaps between code-named malware families DUSTPAN and DUSTTRAP with those identified by different cybersecurity firms, illustrating the broad scale and depth of these coordinated attacks. | Details |
| 2024-07-19 07:15:57 | thehackernews | MALWARE | SolarWinds Fixes Critical Vulnerabilities in ARM Software | SolarWinds has patched 11 security vulnerabilities in its Access Rights Manager (ARM) software, with 7 rated as Critical.
These critical flaws, with a CVSS score of 9.6, could allow attackers to read, delete files, and execute code with elevated privileges.
The remaining four vulnerabilities are considered High risk, each with a CVSS score of 7.6.
Exploitation of these vulnerabilities could lead to significant information exposure and unauthorized system control.
Updates fixing these vulnerabilities were released in SolarWinds ARM version 2024.3 on July 17, 2024.
The patches followed a responsible disclosure by the Trend Micro Zero Day Initiative.
Additionally, a high-severity flaw in SolarWinds' Serv-U Path was added to CISA’s KEV catalog due to active exploitation.
This security update follows historical breaches, including a significant supply chain attack in 2020 carried out by Russian hackers. | Details |
| 2024-07-19 06:50:13 | theregister | MISCELLANEOUS | CrowdStrike Update Causes Global Windows System Crashes | CrowdStrike's recent update is causing significant disruption as Windows 10 PCs around the globe are experiencing system failures.
Affected computers display a Blue Screen of Death (BSOD) and fail to reboot, entering a continuous error loop.
Users have identified the crash source as related to csagent.sys, which is part of the Falcon Sensor software.
A locked advisory notice suggests CrowdStrike is aware and addresses issues specifically tied to the Falcon Sensor on Windows hosts.
Engineering teams at CrowdStrike are actively working to resolve the malfunctions and system crashes.
This incident has impacted critical services across multiple organizations, emphasizing the severity of the software failure. | Details |
| 2024-07-19 06:02:24 | theregister | NATION STATE ACTIVITY | North Korea Suspected in $230 Million Crypto Exchange Heist | North Korean operatives likely behind the cyber attack on Indian crypto exchange WazirX, resulting in a loss of over $230 million.
The attack exploited security loopholes in WazirX’s multi-signature wallet systems, bypassing layers of security.
Post-attack, all crypto withdrawals were halted by WazirX to prevent further losses, and efforts were made to block certain deposits.
Blockchain analytics firms, including UK-based Elliptic, have traced the stolen funds, suggesting active attempts by the perpetrators to convert the stolen assets into Ether using decentralized services.
North Korea has historically engaged in such cyber thefts to fund its nuclear program and the regime of Kim Jong Un, circumventing international sanctions.
WazirX, having significant user base and once owned by Binance, faces ownership disputes and regulatory challenges, including previous sanctions and fines.
Calls for clear cryptocurrency regulations in India amid this and other incidents, emphasizing the need for improved security standards and accountability in the sector. | Details |
| 2024-07-19 05:15:46 | theregister | NATION STATE ACTIVITY | China Accuses US of Fabricating Cyber Gang for Misinformation | China claims the accused Beijing-backed cyber gang, Volt Typhoon, is an invention by the US intelligence community to misinform and manipulate public opinion.
According to a Chinese report, this misinformation campaign was orchestrated by the NSA, the FBI, and other US departments alongside Five Eyes nations.
The stated purpose behind this fabrication was to renew support for the controversial Section 702 warrantless surveillance law in the US.
China's report, endorsed by its National Computer Virus Emergency Response Center and other agencies, alleges that this campaign directly targeted American citizens.
The report criticizes the US for enhancing its domestic surveillance powers under the guise of national security threats posed by foreign entities.
China positions itself as a victim of US cyber imperialism, alluding to past revelations like the CIA’s hacking tools exposed in Wikileaks' Vault 7.
The publication calls for international awareness and caution against US hegemonic strategies in the digital realm. | Details |
| 2024-07-19 04:09:11 | thehackernews | DATA BREACH | WazirX Cryptocurrency Exchange Hacked, Loses $230 Million | WazirX, an Indian cryptocurrency exchange, confirmed a security breach resulting in the theft of $230 million in cryptocurrency assets.
The breach involved a cyber attack on one of its multi-signature wallets that was managed using the digital asset custody and wallet services of Liminal.
Liminal identified that the attack was due to a discrepancy in what their interface showed and what was actually being signed, allowing attackers to redirect control.
Despite the breach of this specific wallet, Liminal assured that other WazirX wallets on their platform remain secure.
Blockchain analytics firm Elliptic and crypto researcher ZachXBT suggested that the attack bears the characteristics of a North Korean cybercrime group, potentially the Lazarus Group.
The stolen funds were reportedly converted to Ether using decentralized services to possibly obscure the trail.
This type of attack is part of a broader trend where North Korean threat actors target the cryptocurrency sector to bypass international sanctions and fund their nuclear weapons agenda. | Details |