Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12750
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2024-07-09 14:04:49 | theregister | MISCELLANEOUS | Expired TLS Certificate Disrupts UK Electricity Data Access | Elexon, a key player in the UK's wholesale electricity market, faced a service disruption due to an expired TLS certificate on their Insight Solution platform.
The expired certificate halted access to vital operational data used for analyzing the balance of fuel types and electricity demand and reserves in the UK.
The oversight led to a temporary outage of the platform, which provides both current and historical data crucial for market participants' trading decisions.
The issue was discovered by a user when attempting to connect to the data.elexon.co.uk service, which showed that the certificate expired on July 9, despite being valid the day before.
Expired certificates can compromise the security of a connection, potentially allowing data to be altered or stolen.
After being contacted, Elexon reportedly renewed the certificate during the lunch period, resolving the issue within half a day.
The incident highlights the common problem of organizations failing to track and renew digital certificates promptly, which can cause significant operational interruptions. | Details |
| 2024-07-09 14:04:48 | bleepingcomputer | DATA BREACH | Evolve Bank Data Breach Affects 7.6 Million Following Ransomware Attack | Evolve Bank & Trust notified 7.6 million Americans of a data breach following a LockBit ransomware attack.
The breach was initially misattributed to a U.S. Federal Reserve attack, but was later confirmed to involve Evolve's data.
The breach occurred after an employee clicked on a malicious link, allowing hackers access to download files and data.
Affected services include fintech companies like Affirm, Wise, and Bilt, reporting impacts on their customers.
The breach discovery followed nearly four months of undetected network access by the attackers, from February to May.
Evolve is offering two years of credit monitoring and identity protection for U.S. victims, and dark web monitoring for international victims.
The type of data exposed has not been specified; affected individuals are urged to monitor their account and credit activity closely.
No impact has been reported by other Evolve partners such as Shopify, Plaid, Stripe, and Mercury as of now. | Details |
| 2024-07-09 13:54:23 | theregister | DATA BREACH | Evolve Bank & Trust Reports Major Data Breach Affecting 7.6 Million | Evolve Bank & Trust announced a significant data breach, with personal data of over 7.6 million customers stolen by the LockBit ransomware group.
The breach was detected in May 2024 after abnormal system behavior, initially mistaken for a hardware issue, was identified as unauthorized activity.
Affected data includes names, addresses, Social Security numbers, and banking details from customers and staff.
Evolve has conducted an investigation with cybersecurity experts and has notified law enforcement; ongoing investigations suggest further notifications may be forthcoming.
Customers affected by the breach are offered 24 months of credit monitoring, with enrollment instructions pending.
The cyber incident occurred amidst criticism from the US Federal Reserve for "unsafe and unsound banking practices" and inadequate risk management at Evolve.
Evolve and its partners, including international firms Wise and Affirm, continue to assess and mitigate the breach's impact, although the full extent is not yet disclosed. | Details |
| 2024-07-09 12:42:39 | thehackernews | CYBERCRIME | Critical "BlastRADIUS" Vulnerability Exposed in Authentication Protocol | A severe vulnerability named BlastRADIUS has been identified in the RADIUS authentication protocol, posing risks for MitM attacks.
Researchers reveal the exploit could allow attackers to bypass integrity checks and alter authentication and authorization data in network access.
The vulnerability exploits weak spots in the MD5 hash function used in RADIUS, making possible chosen prefix attacks to modify packets.
Though the use of TLS and proper message authentication can mitigate risks, RADIUS traffic over the internet remains highly susceptible.
The vulnerability affects all standards-compliant RADIUS clients and servers, necessitating immediate updates by ISPs and affected organizations.
Particularly vulnerable are methods such as PAP, CHAP, and MS-CHAPv2, with MAC address authentication and administrative logins also at risk.
Organizations transmitting RADIUS/UDP over the internet face the highest threat from this vulnerability, which has a severe CVSS score of 9.0.
There is currently no evidence of the vulnerability being actively exploited, but the potential for future attacks remains a significant concern. | Details |
| 2024-07-09 11:51:28 | thehackernews | CYBERCRIME | Hackers Misuse Jenkins Console for Cryptocurrency Mining | Researchers discovered attackers exploiting misconfigured Jenkins Script Consoles for cryptocurrency mining.
Jenkins, a CI/CD platform, allows execution of arbitrary scripts which can lead to remote code execution when misconfigured.
The Jenkins documentation warns that such configurations can grant administrative-like access, exposing sensitive information and control.
Attackers used a misconfigured Jenkins Groovy plugin to execute a script for deploying a cryptocurrency miner, enhancing its efficiency by killing other high-resource processes.
Trend Micro highlights the necessity of proper authentication settings, configuration audits, and restricting public internet exposure of Jenkins servers.
The increase in cryptocurrency theft via such exploits surged in the first half of 2024, with major incidents making up 70% of the stolen amounts.
Key vulnerabilities include private key compromises and smart contract exploits, alongside these misconfiguration issues. | Details |
| 2024-07-09 11:05:17 | thehackernews | CYBERCRIME | Exploring Cybercrime Dynamics: From Dark Web to HUMINT Engagement | The internet is categorized into the Clear Web, Deep Web, and Dark Web, with increasing levels of anonymity and security in lower layers.
Criminals increasingly use the Tor network for its strong anonymity, which complicates tracking by law enforcement.
Dark Web forums are commercial ecosystems where criminals trade services and goods, including malware and stolen data.
Various stages of malware attacks culminate in ransomware deployment and data extortion, often sold in Dark Web auctions.
Human Intelligence (HUMINT) is vital for understanding and engaging with cybercriminal communities to prevent cybercrimes.
Automated tools, combined with HUMINT, create a robust defense against the sophisticated economic ecosystem of the Dark Web.
Law enforcement agents actively engage with online criminal forums to gather actionable, reliable, and timely intelligence.
Examples include undercover operations where officers mimic cybercriminals to gather essential data on ongoing cyber threats. | Details |
| 2024-07-09 10:59:57 | theregister | MALWARE | Houthi Rebels Develop GuardZoo Spyware, Mirroring Pegasus Capabilities | Houthi rebels have created a surveillance malware called GuardZoo, which operates similarly to the notorious Pegasus spyware but is considerably less sophisticated.
Despite its basic design and reliance on social engineering for distribution, GuardZoo can extract sensitive data such as photos, documents, and device configuration details.
GuardZoo has been primarily identified on devices within Yemen and surrounding regions, particularly targeting military personnel based on the malware's geolocation data extraction including KMZ, WPT, and TRK files.
It employs a specific command and control (C2) backend and can stealthily update itself using .dex files, indicating a level of technical adaptation from its creators.
Lookout's research highlights that while GuardZoo is not as advanced as state-sponsored tools like Pegasus, it reflects a growing trend of lesser-known, yet effective surveillance tools used by non-state actors.
The malware has shown limited activity outside the Middle East, suggesting focused regional use rather than global ambitions.
Experts advise maintaining vigilance with patches and security practices due to the increasing prevalence and effectiveness of similar surveillance malware globally. | Details |
| 2024-07-09 10:08:43 | thehackernews | MALWARE | GuardZoo Malware Campaign Affects Hundreds of Middle Eastern Military | Over 450 Middle Eastern military personnel have been targeted by the GuardZoo malware, a surveillance tool designed to collect data from Android devices.
The GuardZoo campaign is linked to a Houthi-aligned threat actor and utilizes Android remote access trojan features originally found in the Dendroid RAT.
The majority of infections have occurred in Yemen, although military personnel from Egypt, Oman, Qatar, Saudi Arabia, Turkey, and the U.A.E. are also affected.
The malware, available initially in 2014 for $300, has evolved to include functionalities such as recording audio, capturing photos, and executing HTTP flood attacks.
GuardZoo's distribution utilizes WhatsApp and direct browser downloads, leveraging military and religious-themed applications as lures.
The updated malware supports over 60 commands, enabling complex operations like file uploading, dynamic C2 address changes, and self-updation or deletion on compromised devices.
Since its inception in October 2019, GuardZoo has been consistently using dynamic DNS for C2 operations linked to IP addresses registered to YemenNet. | Details |
| 2024-07-09 06:34:53 | theregister | MISCELLANEOUS | Microsoft China Switches to Apple Devices Over Android Issues | Microsoft China instructs employees to cease using Android devices due to login and authentication challenges.
The company opts for providing Apple devices to its staff, leveraging iOS's ability to host necessary authentication apps.
Google Mobile Services' unavailability in China cited as a key reason for the inability to use Android effectively in Microsoft's operations.
Microsoft avoids using local Android app stores or sideloading apps, possibly due to security concerns.
The decision reflects a broader reluctance from Microsoft to engage deeply with China's mobile ecosystem and local app market.
This strategic shift comes amidst broader tensions, including accusations against China of unauthorized access to U.S. officials' emails.
Microsoft's move away from Android in China potentially signifies larger geopolitical and tech industry ramifications. | Details |
| 2024-07-09 06:04:09 | theregister | CYBERCRIME | Scammers Target Victims with Fake Recovery Aid Schemes | The Australian Competition and Consumer Commission (ACCC) has issued a warning about scammers targeting previous scam victims with fraudulent recovery offers.
Scammers exploit databases containing details of previous scam victims, using this information to pose as trusted entities like government agencies or legal firms.
Victims are approached with offers to recover their lost funds for an upfront fee, a percentage of the recovered amount, or a purported tax.
Personal information and remote access to devices are often requested under the guise of verifying identity or setting up digital wallets for cryptocurrency recovery.
People over the age of 65 are particularly vulnerable to these scams, with reported losses totaling AU$2.9 million, not including unreported incidents.
Tactics include fake testimonials, social media advertisements, and the creation of authentic-looking websites to lure victims.
The ACCC emphasizes the difficulty of recovering money as scammers typically move funds offshore quickly.
A mandatory code for banks and telecoms is under development in Australia to detect, prevent, and possibly compensate for such scams. | Details |
| 2024-07-09 05:58:46 | thehackernews | NATION STATE ACTIVITY | Global Cybersecurity Alert on China's APT40 Exploitation Tactics | A multinational cybersecurity advisory warns about the China-linked espionage group, APT40, which rapidly exploits vulnerabilities in widely used software.
APT40, active since at least 2013, has a history of cyber-attacks primarily in the Asia-Pacific, and is assessed to be part of China's Ministry of State Security.
The group adapts quickly to exploit newly disclosed security flaws, including major vulnerabilities in Log4j, Atlassian Confluence, and Microsoft Exchange.
Noteworthy techniques used by APT40 include using web shells for persistence, deploying outdated devices in their infrastructure to reroute traffic and avoid detection, and leveraging Australian websites for command and control operations.
The group conducts in-depth reconnaissance on potential targets, operationalizing unpatched, end-of-life devices to exploit vulnerabilities swiftly.
Mitigation recommendations include employing strong logging, enforcing multi-factor authentication, implementing a robust patch management strategy, and network segmentation to shield sensitive data against unauthorized access. | Details |
| 2024-07-09 04:52:23 | thehackernews | MALWARE | Trojanized jQuery Libraries Compromise Multiple High-Profile Repositories | Unknown threat actors have implemented a supply chain attack by distributing trojanized versions of jQuery on npm, GitHub, and jsDelivr.
Phylum's analysis highlights the sophisticated nature of the attack, where malware was hidden in the less utilized 'end' function of jQuery.
A total of 68 malicious packages, named creatively to resemble legitimate ones, were introduced onto the npm registry from May 26 to June 23, 2024.
The attackers manually assembled and published these packages, indicated by diverse naming conventions and inconsistent publishing time frames.
Phylum discovered that the compromised 'end' function is designed to steal data entered in website forms and send it to a hacker-controlled remote URL.
The trojanized jQuery has been found in a GitHub repository under the user "indexsc," which also hosts additional JavaScript files that utilize the malicious library.
jsDelivr's automatic URL handling from GitHub to CDN is thought to be exploited by attackers to grant the malware higher legitimacy and easier passage through security frameworks.
This event coincides with similar malicious activities detected on the Python Package Index (PyPI), which involve downloading malware based on the system's CPU architecture. | Details |
| 2024-07-09 02:34:35 | theregister | NATION STATE ACTIVITY | Global Alert on China's APT40 Rapid Exploitation of New Vulnerabilities | International law enforcement agencies, including from Australia, US, and UK, have issued an advisory on China's state-sponsored APT40.
APT40, linked directly to China's Ministry of State Security, can develop and deploy exploits within hours of vulnerabilities being disclosed.
The advisory details APT40’s focus on exploiting end-of-life or unpatched systems in their cyber operations.
The group uses initial access through compromised devices, often in small businesses or home setups, to deploy further attacks.
Techniques used by APT40 include leveraging web shells, searching for valid user credentials, and installing malware for data exfiltration.
Highlighted vulnerabilities targeted by APT40 include flaws in Log4J, Atlassian Confluence, and Microsoft Exchange.
Recommended mitigation strategies include regular patching, network segmentation, use of multifactor authentication, and disabling unused network services.
The advisory stresses the rapid adaptation and operational speed of APT40, posing significant security challenges to vulnerable networks internationally. | Details |
| 2024-07-08 22:04:41 | bleepingcomputer | DATA BREACH | Zotac Accidentally Exposes Customer RMA Data on Google Search | Zotac inadvertently made customer return merchandise authorization (RMA) data accessible online due to a misconfiguration of their web folders.
The exposed data included sensitive details such as customer names, addresses, contact information, and invoice specifics.
The security mishap resulted from inadequate access permissions and the absence of a 'robots.txt' file to prevent search engine indexing.
The issue was highlighted by a viewer of the GamersNexus YouTube tech channel, ultimately prompting an investigation into the data exposure.
Zotac and GamersNexus have taken steps to notify affected partners and have started securing the exposed data, although some information may still be retrievable via Google Search.
To mitigate further risk, Zotac disabled the document upload function on their RMA portal, requesting customers to instead email necessary documents.
Customers who have used Zotac's RMA service should assume their personal information may have been exposed and take appropriate precautions. | Details |
| 2024-07-08 21:44:09 | bleepingcomputer | DATA BREACH | Hackers Leak Thousands of Ticketmaster Print-at-Home Tickets | Hackers known as 'Sp1derHunters' released almost 39,000 print-at-home Ticketmaster tickets for upcoming concerts including major artists like Pearl Jam and Foo Fighters.
The leaked data originated from a data theft at Snowflake, where Ticketmaster's data was compromised. The theft involved databases of 165 organizations due to stolen credentials facilitated by malware.
Ticketmaster was extorted by hackers demanding up to $2 million to prevent further leaks; however, they asserted that their SafeTix technology nullifies the risk by frequently updating barcode information.
Despite Ticketmaster's claims, Sp1derHunters pointed out that the barcodes for print-at-home tickets cannot be refreshed, thus challenging Ticketmaster's security measures.
The leaked data includes detailed information needed to create valid tickets, raising concerns over potential fraudulent entry into events.
The incident highlights ongoing vulnerabilities in digital ticketing processes and challenges in securing large databases, potentially affecting customer trust and corporate reputation.
Response from Ticketmaster regarding future actions for the affected tickets remains unconfirmed. | Details |