Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12714

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-05-20 09:28:04 thehackernews MALWARE Cyber Criminals Use GitHub, FileZilla in Malware Delivery Scheme
Cyber criminals are exploiting legitimate services like GitHub and FileZilla to distribute a variety of malware, including stealers and banking Trojans. Malware variants such as Atomic, Vidar, Lumma, and Octo are being disguised as popular software like 1Password and Pixelmator Pro. The operation, dubbed GitCaught by Recorded Future's Insikt Group, uses fraudulent profiles and repositories to host counterfeit software aimed at harvesting sensitive data. Attack vectors include malvertising and SEO poisoning, with links to malicious files embedded in various domains to lure victims. The adversaries, likely Russian-speaking actors from the Commonwealth of Independent States, use FileZilla servers for malware management and distribution. Further analysis links the attacks to a larger campaign involving multiple malware types and targeting multiple platforms including Android, macOS, and Windows. Significant abuse of other legitimate services like Bitbucket and Dropbox has been observed, widening the scope of the campaign. Microsoft’s intelligence has flagged a macOS backdoor, codenamed Activator, as a part of this malicious campaign, targeting cryptocurrency wallets among other sensitive data.
Details
2024-05-20 06:29:49 theregister NATION STATE ACTIVITY Germany Considers Banning Huawei, ZTE Gear Over Security Fears
Germany is debating the removal of Huawei and ZTE equipment from its 5G networks due to national security concerns, with key ministries supporting this move. The German Foreign Office, Ministry for Economic Affairs, and Interior Ministry propose the phasing out of critical components from core networks by 2026 and reducing dependency on Chinese tech in other network areas by 2029. Industry opposition is reportedly affecting the Digital Ministry's decision-making process, though a ministry spokesperson refuted such claims. The concerns are partly based on China’s National Intelligence Law, which mandates cooperation with intelligence services, potentially compromising customer network information. Other countries such as Japan, Australia, Canada, and the UK have already imposed restrictions or full bans on Huawei equipment in their government and critical infrastructure networks. The European Union has labeled Huawei a "high risk supplier," and some EU member states have independently banned Huawei and ZTE from their national infrastructures. Germany faces significant financial implications for replacing existing telecom equipment, with the Deutsche Bahn estimating costs of over €400 million for compliance.
Details
2024-05-20 05:54:06 thehackernews MALWARE Latrodectus Malware Loader, IcedID's Successor Targets Phishing Campaigns
Cybersecurity researchers observed an increase in email phishing campaigns using Latrodectus, a new malware loader, starting March 2024. Latrodectus replaces IcedID and possesses the ability to deploy other payloads like QakBot, DarkGate, and PikaBot for varied post-exploitation activities. Features advanced techniques including obfuscation, anti-analysis checks, self-deletion of its files, and persistence mechanisms on infected Windows systems. The malware interacts with its command-and-control server using HTTPS, executing commands that manage system information, updates, and downloads. Recent phishing-related findings also include campaigns deploying DarkGate malware through invoice-themed emails and a sophisticated phishing-as-a-service platform targeting Microsoft 365 and Gmail sessions. New malware loader D3F@ck and stealers like Fletchen Stealer and WaveStealer show evolving malware-as-a-service and data stealing capabilities. The intersection of these malicious campaigns underscores an enduring and adaptative cybercrime ecosystem with increasing sophistication in evading detection and persistence.
Details
2024-05-20 02:30:57 theregister DATA BREACH Nissan Confronts Major Data Breach Impacting Over 50,000 Employees
Nissan disclosed a severe data breach that compromised the personal information of over 50,000 U.S. employees due to a targeted cyber attack. The breach, reported in November 2023, involved unauthorized access through compromised external VPN, leading to the theft of social security numbers. The criminals shut down specific Nissan systems and demanded a ransom, though Nissan initially believed only business information was affected. It wasn't until February of the following year that Nissan realized employee Social Security Numbers were also breached. Post-breach security measures include an enterprise-wide password reset, the implementation of Carbon Black monitoring, and enhanced vulnerability scans. In a separate incident, Nissan's Oceania division was attacked by the Akira ransomware gang in December 2023, resulting in additional personal data exposure. Nissan is taking several steps to fortify security and mitigate potential future risks, amidst no immediate indication that the stolen employee data has been misused.
Details
2024-05-19 21:16:05 bleepingcomputer CYBERCRIME American Radio Relay League Hit by Disruptive Cyberattack
American Radio Relay League (ARRL) experienced a significant cyberattack that impacted its network and IT systems. The attack disrupted online services, including email and ARRL's Logbook of the World, a crucial tool for amateur radio operators. ARRL is a key entity in the U.S., advocating for amateur radio at the governmental level and offering resources for radio enthusiasts. Following the cyberattack, ARRL assured its members that sensitive financial data like credit card details were not stored in their systems. The member database contains personal information such as names, addresses, and call signs, raising concerns about the breach of private data. The specific nature of the cyberattack, whether ransomware or another form, remains unclear as investigations continue. ARRL is actively working to restore affected services and strengthen its cybersecurity measures in response to the incident.
Details
2024-05-19 14:18:02 bleepingcomputer CYBERCRIME CISA Issues Warning on Exploited Chrome and D-Link Vulnerabilities
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has updated its KEV catalog with new vulnerabilities, notably in Google Chrome and older D-Link routers. Federal agencies have been given a deadline of June 6th to address these vulnerabilities, either by updating, replacing affected devices, or implementing defenses. The Chrome vulnerability, identified as CVE-2024-4761, is an actively exploited flaw in the browser's JavaScript engine, with another related flaw also noted but not yet cataloged by CISA. An enduring vulnerability in D-Link DIR-600 routers, from 2014, presents a CSRF issue allowing administrative hijacking. Despite D-Link routers being end-of-life, previous fixes were issued which remain critical to implement for security integrity. Older vulnerabilities are often targeted by botnet malware, exploiting a range of devices regardless of age or type, stressing the importance of sustained device and firmware updates.
Details
2024-05-19 09:48:43 thehackernews CYBERCRIME Chinese Nationals Charged in $73 Million Crypto Laundering Scam
The U.S. Department of Justice arrested two Chinese nationals, Daren Li and Yicheng Zhang, in a sophisticated cryptocurrency scam, laundering over $73 million. Li and Zhang reportedly managed an international network, misleading victims into investing in fraudulent crypto schemes and moving the money through U.S. shell companies. The laundered funds were channeled through U.S. banks to accounts in the Bahamas, converted to USDT (Tether), and then transferred to other cryptocurrency wallets. The scheme, known as a “pig butchering scam," often targets vulnerable individuals via social networks to invest in fake opportunities, culminating in significant financial losses. Both suspects face charges including conspiracy and multiple counts of international money laundering, with each count carrying a potential 20-year prison sentence. Additional cases highlight a growing trend of crypto-related scams and exploitation, including a disturbing human trafficking dimension in Asia linked to scam operations. Legal actions continue globally as authorities intensify efforts to clamp down on digital financial crimes and exploitation-related offenses.
Details
2024-05-19 08:02:06 thehackernews MALWARE Grandoreiro Banking Trojan Targets Banks Globally Post-Crackdown
The Grandoreiro banking trojan has reemerged globally after a law enforcement crackdown, targeting over 1,500 banks in more than 60 countries. The malware campaign employs a malware-as-a-service model, initiating attacks with sophisticated phishing emails. Significant upgrades have been made to the Grandoreiro malware, enhancing its decryption and domain generation capabilities. The phishing strategy involves tricking users into clicking a link that downloads a ZIP containing the malicious loader, which avoids detection by being over 100 MB. Once activated, the malware evades systems in Russia, Czechia, Poland, and the Netherlands, and selectively targets other regions, excluding U.S. Windows 7 machines without antivirus. The trojan establishes persistence in the host's system, uses a new domain generating algorithm for C2 communications, and can control the system remotely. A notable feature of the updated Grandoreiro includes integration with Microsoft Outlook to send spam emails, further spreading the infection.
Details
2024-05-18 22:20:44 bleepingcomputer MALWARE Grandoreiro Banking Trojan Resurfaces with Enhanced Capabilities
"Grandoreiro," a notorious banking malware, is actively targeting roughly 1,500 banks in over 60 countries via a large-scale phishing campaign. Originally focused on Spanish-speaking nations and causing estimated losses of $120 million, the operation was disrupted in January 2024 by an international effort led by Brazil and Spain in collaboration with Interpol. Despite a crackdown that resulted in five arrests, Grandoreiro reemerged in March 2024, now targeting English-speaking regions, indicating its operators likely evaded capture. The malware is possibly being distributed under a Malware-as-a-Service (MaaS) model, facilitating its use by various cybercriminals with diverse phishing tactics tailor-made to victim demographics. Newly added phishing schemes now fraudulently impersonate government entities in Mexico, Argentina, and South Africa, tricking users into downloading malware through seemingly legitimate emails. Significant technical enhancements in the malware increase its evasion capabilities, allow detailed victim profiling, and restrict its operation in certain regions and under specific tech conditions on the victims' devices. The revival and advancement of Grandoreiro underline the persistent and adaptive nature of cyber threats, demonstrating improved sophistication and international reach.
Details
2024-05-18 18:27:10 bleepingcomputer MALWARE Ransomware Gang Uses Malvertising to Target Windows Admins
A ransomware operation is using Google ads to promote fake sites impersonating popular Windows tools, PuTTY and WinSCP, targeting Windows system administrators. System administrators often have elevated network privileges, making them prime targets for actors aiming to spread ransomware quickly across networks, steal data, and gain domain controller access. Fraudulent ads lead to typosquatting domain names that imitate genuine software download pages, tricking users into downloading malicious files. The malware involves a disguised executable file that, when run, uses DLL Sideloading to inject a malicious DLL, ultimately installing a Sliver post-exploitation toolkit. Using the initial access provided by Sliver, the threat actors deploy further payloads, including Cobalt Strike beacons, and engage in data exfiltration and ransomware deployment attempts. Although the specific ransomware type is not detailed, similar tactics have been used in past campaigns by notorious groups such as BlackCat/ALPHV. The misuse of search engine ads for spreading malware and phishing sites has been escalating, with various popular software programs being mimicked to deceive users.
Details
2024-05-18 17:10:51 theregister MISCELLANEOUS Concerns Rise Over Privacy Breaches in Library App Ads
Attorney Christine Dudley noticed ads reflecting her specific audiobook interests while using library apps, raising privacy concerns. Historical context provided by Dorothea Salo highlights the evolution of privacy in libraries and the shift in risks due to digitalization and third-party content providers. The article discusses the ethical and legal agreements of library apps like OverDrive’s Libby and Baker & Taylor's Boundless app, which supposedly protect user data from being shared. Security researcher Zach Edwards analyzed network traffic, indicating remarketing might not involve third-party data sharing, but did not rule out other potential leaks. North Carolina's Senate Bill 49 controversy, which potentially compromises library privacy by allowing parents access to children's library records, was mentioned as an ongoing privacy issue. The Library Quarterly published a study highlighting gaps in public library staff training and privacy disclosures to patrons, which could improve to protect patron data better. The San Francisco Public Library and app providers responded to inquiries stressing their commitment to user privacy, but the presence of tracking scripts and cookies suggests potential vulnerabilities.
Details
2024-05-18 14:12:54 bleepingcomputer MALWARE Grandoreiro Malware Resurfaces with Enhanced Capabilities Post Crackdown
Android banking trojan Grandoreiro has reemerged, targeting over 1,500 banks in 60 countries after previously being disrupted by international law enforcement in January 2024. The malware operation, initially affecting Spanish-speaking countries and causing $120 million in losses, now expands its phishing campaigns to English-speaking regions. Grandoreiro is likely available through a Malware-as-a-Service model, outfitted with new, advanced features that increase its evasiveness and effectiveness. Phishing emails utilized by the malware impersonate government entities from various countries, using native languages and official logos to entice victims to download malicious files. New technical enhancements in Grandoreiro include detailed victim profiling and selective execution, avoiding detection in certain countries and under specific system conditions. Despite significant law enforcement actions including arrests and seizures, the creators of Grandoreiro appear to have evaded capture, continuing to develop and distribute the trojan. IBM's X-Force team has identified these updates and continues to monitor the evolving threat landscape posed by this resilient cyber threat.
Details
2024-05-18 12:41:26 theregister NATION STATE ACTIVITY Tensions Rise as China-Westrn Relations Strain Over Cybersecurity
America imposed strict import tariffs on Chinese technology products. Microsoft offered key engineering and cloud personnel the option to relocate from China. The UK expressed strong frustration with China's aggressive actions in cyber-space. An episode of the Kettle podcast discussed these issues, featuring insights from cybersecurity experts. Among the topics was a peculiar incident involving a US nuclear missile base and a Chinese crypto-mining blockade. The discussion aimed to understand broader geopolitical tensions impacting cybersecurity and tech sectors. The Kettle podcast is accessible across various platforms, providing both video and audio formats.
Details
2024-05-18 06:30:41 theregister CYBERCRIME Two Brothers Execute $25M Ethereum Blockchain Heist in Seconds
Two brothers, Anton and James Pepaire-Bueno, exploited a software bug in Ethereum's blockchain architecture to steal $25 million. U.S. Department of Justice charged the brothers with wire fraud and money laundering after they manipulated transaction orders within a blockchain. The exploit involved a relay in the MEV-Boost open-source software, allowing them to intercept and reorder transactions for their financial gain. The brothers set up a shell company to obscure their identities and avoid cryptocurrency exchanges that required identity verification. Within a span of 12 seconds, they executed a scheme causing other traders to buy overpriced, illiquid cryptocurrencies that the brothers then sold off. Post-heist, the brothers engaged in activities suggesting attempts to hide their tracks and understand the legal consequences of their actions. Approximately $3 million has been frozen by foreign law enforcement, with the remainder moved through various accounts in an attempt to launder the funds.
Details
2024-05-17 23:34:22 theregister DATA BREACH Australian Healthcare Provider MediSecure Hit by Ransomware
MediSecure, an Australian e-prescription service provider, has suffered a significant ransomware attack resulting in the theft of patient health and personal data. The incident reportedly stemmed from a vulnerability in a third-party vendor system used by MediSecure. The attack's full scope remains under investigation, with assistance from Australia's National Cyber Security Coordinator and federal police. There is currently no evidence that ePrescriptions or the overall medical sector are at an elevated risk due to this breach. MediSecure has assured that no compromises have been found in active ePrescription services and is working closely with governmental bodies to assess the impact. Regulatory bodies including the Office of the Australian Information Commissioner have been notified, and MediSecure has committed to updating the public as more details become available. Government and healthcare industry representatives are being briefed continuously to manage the response effectively. The case typifies the growing trend of ransomware attacks on healthcare institutions, increasingly perceived as lucrative targets by cybercriminals.
Details