Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12671
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2024-02-10 07:18:22 | thehackernews | MALWARE | Stealth "RustDoor" Backdoor Targets Apple macOS Systems | A new backdoor, RustDoor, has been discovered targeting Apple macOS devices since November 2023.
RustDoor masquerades as a Microsoft Visual Studio update and is compatible with both Intel and Arm architectures.
The backdoor is distributed as FAT binaries and has been actively developed with multiple versions observed.
The malware's capabilities include file gathering, information harvesting, and communication with a C2 server.
There is evidence suggesting a linkage between RustDoor and known ransomware families such as Black Basta and BlackCat.
The BlackCat ransomware group, related to the malware, was targeted by the U.S. government leading to the release of a decryption tool for victims. | Details |
| 2024-02-10 03:34:53 | theregister | MALWARE | VexTrio Network Controls 70K Sites to Distribute Malware and Phishing | VexTrio, a network of about 70,000 compromised websites, has been distributing malware and conducting phishing campaigns since at least 2017.
Affiliates of VexTrio use these hijacked sites to redirect users to other pages delivering malware, stealing credentials, and perpetrating fraud.
Check Point's global threat index for January marked VexTrio as a significant security threat due to its sophisticated infrastructure and broad impact.
Infoblox's investigation revealed that nearly half of the domains in the network appeared in customer networks and provided indicators of compromise for detection.
One prevalent malware strain distributed by VexTrio, SocGholish, topped Check Point's January list for the most widespread malware and installs various malicious payloads, including GootLoader, Dridex, and ransomware.
TA569 by Proofpoint and UNC1543 by Mandiant are the suspected operators behind SocGholish, according to cybersecurity research.
The article also notes the activity of ransomware groups at the start of 2024, with LockBit3, 8Base, and Akira being among the most prominent, warning that data from leak sites used to compile such reports might not be entirely reliable. | Details |
| 2024-02-09 21:34:23 | theregister | DATA BREACH | Ivanti Fails to Credit Researchers in Vulnerability Disclosure | Ivanti disclosed a high-severity authentication bypass flaw, CVE-2024-22024, which affects certain versions of their products.
The vulnerability impacts limited versions of Ivanti Connect Secure, Policy Secure, and ZTA gateways.
Ivanti claimed the vulnerability was discovered through internal review, despite watchTowr researchers asserting they reported it first on February 2.
Evidence provided by watchTowr suggests a lack of credit for their discovery, raising questions about Ivanti's disclosure practices.
Users who applied the mitigation update from January 31 or completed a factory reset are reportedly protected from this vulnerability.
There is controversy over whether the vulnerability has been actively exploited, with Ivanti denying such claims.
The disclosure comes after multiple zero-day vulnerabilities in Ivanti products were exploited, prompting emergency directives from CISA and advisories from the UK's NCSC.
Ivanti has been criticized for its handling of the security issues and the staggered patch schedule for resolving the vulnerabilities. | Details |
| 2024-02-09 21:03:34 | bleepingcomputer | CYBERCRIME | Fortinet RCE Vulnerability Actively Exploited, Agencies Must Patch | The Cybersecurity and Infrastructure Security Agency (CISA) confirmed active exploitation of a critical remote code execution (RCE) bug in Fortinet FortiOS.
The bug, identified as CVE-2024-21762, allows unauthenticated attackers to remotely execute arbitrary code via malicious HTTP requests.
Administrators unable to update immediately can mitigate risk by disabling SSL VPN on devices.
Fortinet initially miscommunicated about two other critical RCE vulnerabilities, CVE-2024-23108 and CVE-2024-23109, but later recognized them as variants of a previously fixed bug.
Federal agencies are required to patch affected FortiOS devices by February 16, following the established protocol under binding operational directive (BOD) 22-01.
Fortinet devices are frequent targets for cyber espionage and ransomware attacks; a Chinese state-backed group was found leveraging FortiOS SSL VPN flaws to deploy Coathanger malware.
The Coathanger remote access trojan (RAT) was recently involved in a cyberattack on the Dutch Ministry of Defence's network security appliances. | Details |
| 2024-02-09 19:26:29 | bleepingcomputer | NATION STATE ACTIVITY | Canada Proposes Ban on Flipper Zero to Curb Car Thefts | The Canadian government intends to ban Flipper Zero devices, citing their misuse in car thefts.
Flipper Zero is a multi-protocol device that can interact with hardware and digital devices, effectively used in replay attacks.
Industry Minister Champagne announced the move to ban importation, sale, and use of such hacking devices on Twitter.
The ban comes as a response to a summit on auto theft, acknowledging the theft of approximately 90,000 vehicles annually.
Canadian police have pointed out a significant rise in the Crime Severity Index due to motor vehicle theft.
The Government's ISED department is set to collaborate with law enforcement to remove these devices from the market.
Contradictorily, Flipper Zero's COO asserts that the device cannot hijack cars made after the 1990s and is intended for security testing.
Amazon has ceased the sale of the Flipper Zero in April 2023, following seizure actions in Brazil connected to criminal use. | Details |
| 2024-02-09 19:21:10 | bleepingcomputer | CYBERCRIME | Canada Proposes Ban on Flipper Zero to Tackle Auto Theft Spike | The Canadian government is considering a ban on the Flipper Zero, a device they claim is used by thieves to steal cars.
Flipper Zero is a multi-functional device capable of interacting with various hardware and digital systems such as RFID and Bluetooth.
Online videos show the Flipper Zero being used in replay attacks, cloning digital keys, and unlocking cars, raising security concerns.
The ban announcement aligns with a national summit on auto theft and alarming statistics showing 90,000 vehicles are stolen yearly in Canada.
Canadian authorities assert the ban on devices like Flipper Zero could remove hacking tools from the market and reduce vehicle thefts.
Flipper Devices, the maker of Flipper Zero, refutes claims of the device's capability to hijack modern cars and emphasizes its purpose for responsible security testing.
Amazon has ceased sales of the Flipper Zero, following Brazilian authorities' actions against the device for its alleged use in criminal activities. | Details |
| 2024-02-09 16:37:34 | thehackernews | MALWARE | Raspberry Robin Malware Escalates Threat with Exploits and Discord Use | Raspberry Robin malware operators are employing new one-day exploits to facilitate local privilege escalation and complicate detection.
The malware acts as a primary access vector for distributing additional malicious payloads, including ransomware, and is connected to multiple e-crime groups.
Threat actors have incorporated fresh anti-analysis and obfuscation tactics to hinder analytical efforts by cybersecurity researchers.
Exploits for vulnerabilities such as CVE-2023-36802 and CVE-2023-29360 were utilized before public disclosure, indicating a potential purchase of exploits from dark web sources.
The increase in sophistication indicates a substantial threat as attackers exploit vulnerabilities quicker than many organizations can patch them.
Discord is exploited as a new initial access vector, wherein malicious RAR files containing the malware are being distributed.
Lateral movement within target networks has also evolved, with Raspberry Robin opting for PAExec.exe over PsExec.exe, and implementing a more randomized approach to C2 communications. | Details |
| 2024-02-09 15:56:36 | bleepingcomputer | MALWARE | New Rust-based macOS Malware Masquerades as IDE Update | RustDoor, a macOS malware camouflaged as a Visual Studio update, is written in Rust and delivers backdoor access capabilities to hackers targeting systems running on Intel and ARM architectures.
Detected by cybersecurity firm Bitdefender, the malware campaign began in November 2023 and has continuously distributed evolving variants; some infrastructural elements suggest links to the ALPHV/BlackCat ransomware group.
The analysis revealed RustDoor's association with four command and control (C2) servers, three of which have ties to activities potentially connected to ransomware operators.
While conclusive evidence is lacking, shared server use among cybercriminals suggests possible connections between RustDoor and ransomware groups like BlackBasta and ALPHV/BlackCat.
RustDoor is disguised under various names and avoids conventional distribution channels like Application Bundles or Disk Images, which helps it evade detection by security tools.
Once installed, RustDoor can persist through system reboots and blend in with legitimate applications by modifying system files and employing scheduled tasks.
Bitdefender has identified at least three RustDoor variants with increasing sophistication and has published a list of indicators of compromise for organizations to detect potential breaches. | Details |
| 2024-02-09 15:25:34 | bleepingcomputer | CYBERCRIME | Record $10 Billion Lost to Fraud in US, Reports FTC | Americans reported a staggering $10 billion lost to various scams in 2023, a 14% rise from the previous year.
Investment scams topped the charts with $4.6 billion in reported losses, followed by nearly $2.7 billion lost to imposter scams.
The FTC received 2.6 million consumer fraud reports and 1.1 million reports of identity theft.
Payment methods resulting in most losses were bank transfers and cryptocurrencies, outstripping other methods.
Despite the high volume of reports, this likely represents only a portion of actual fraud, as many incidents go unreported.
FTC's Sentinel database aids law enforcement in tracking and combatting fraudulent activity by analyzing trends.
Victims are encouraged to report fraud and identity theft through designated FTC platforms for support and to aid in data collection and prevention efforts. | Details |
| 2024-02-09 14:34:02 | theregister | CYBERCRIME | Fortinet Battles Multiple Security Vulnerabilities and PR Snafus | Critical vulnerability in FortiOS's SSL VPN, CVE-24-21762, allows remote code execution and may have already been exploited as a zero-day.
Affected FortiOS versions require immediate patching; unsupported versions need upgrading, with disabling SSL VPN as the only current workaround.
Fortinet mishandled the disclosure of two severe vulnerabilities, CVE-2024-23108 and CVE-2024-23109, initially claiming they were errors, then confirming their validity.
The vulnerabilities were inadvertently linked to a previous advisory, and Fortinet received criticism for a delayed and confusing response to the media.
A bizarre claim of a malware-laden toothbrush participating in a DDoS attack was reported and then attributed to a "translation problem" by Fortinet, which led to further public relations challenges.
Fortinet's communication issues came amid reports of Chinese cyberspies exploiting FortiGate vulnerabilities with custom malware.
The company is set to refocus on timely and transparent communication with customers as part of its security incident response efforts. | Details |
| 2024-02-09 14:13:23 | theregister | CYBERCRIME | Securing AI Technology - A Crucial Cybersecurity Webinar Insight | A growing reliance on AI technologies has amplified potential cyber threats and vulnerabilities.
Many organizations may be unaware of AI usage, which increases due to ease of deployment and affordability.
Cybercriminals are finding new ways to exploit AI models and applications, raising security concerns.
Cloudflare is hosting a webinar to educate on protecting AI applications from cyber risks.
The webinar will cover unexpected ways AI consumption and deployment can expand an organization's attack surface.
Industry experts will discuss tools, techniques, and services to mitigate AI-related vulnerabilities.
Attendees will learn practical steps to secure their AI applications in the ever-evolving cyber landscape. | Details |
| 2024-02-09 13:37:21 | thehackernews | MALWARE | New MoqHao Malware Auto-Executes, Threatens Android Users | A new variant of the MoqHao Android malware has been discovered with the capability to auto-execute upon installation.
This malware affects Android users in various countries such as France, Germany, India, Japan, and South Korea and is linked to a Chinese cybercrime group.
The infection begins with SMS phishing that deploys malware on Android devices, while iPhone users are redirected to a fake iCloud login page.
The latest MoqHao variant obtains permissions and starts malicious activities without the need for the user to launch the app.
The malware is distributed through SMS messages containing links shortened by URL shorteners and content sourced from fake Pinterest profiles.
MoqHao can stealthily acquire sensitive data, silently call numbers, and manipulate Wi-Fi settings, among other capabilities.
Google has been notified and is reportedly working on mitigating the auto-execution mechanism in future Android versions.
In a separate report, a cybercrime syndicate named Bigpanzi has been linked to the creation of a botnet using compromised Android smart TVs and boxes in Brazil for DDoS attacks and illegal streaming. | Details |
| 2024-02-09 11:04:14 | thehackernews | MISCELLANEOUS | Myrror Security Revolutionizes Software Supply Chain Risk Management | Myrror Security's platform addresses modern software supply chain threats by going beyond traditional Static Code Analysis (SCA) tools, which often provide irrelevant vulnerability scores without considering organizational-specific context.
Traditional SCA tools fail to adequately detect and prioritize real-world supply chain attacks like code injection and CI/CD attacks, leading to prioritization of less critical issues.
Myrror's approach involves binary-to-source analysis for every third-party package and a proprietary reachability vulnerability analysis algorithm to accurately prioritize issues based on their actual exploitability in production.
The platform streamlines the AppSec process by allowing organizations to actively scan repositories, take inventory of open-source dependencies, and generate prioritized risk overviews with actionable insights.
Myrror's dashboards and issues screens provide detailed analytics on security issues impacting the codebase, including reachability and exploit confirmations, to target the most critical vulnerabilities.
The solution also offers a remediation plan generator that helps teams understand the implications of patching, including new vulnerabilities that may be introduced and issues that will remain after fixes.
By addressing alert fatigue and offering a clear strategy against undiscovered supply chain attacks, Myrror’s platform aids organizations in effectively managing and defending against sophisticated security risks in the software supply chain. | Details |
| 2024-02-09 10:33:25 | thehackernews | MALWARE | Sophisticated Coyote Trojan Looms Over Brazilian Banking Sector | A new banking trojan named Coyote targets 61 Brazilian banks, using advanced techniques for distribution and infection.
Coyote exploits the Squirrel installer, Node.js, and the Nim programming language, enhancing complexity and evading detection.
The malware deploys a multi-stage attack chain, with a Squirrel installer initiating a Node.js application that eventually executes the Nim-based loader.
The Coyote trojan waits for specific banking applications or websites to open before fetching instructions from a command-and-control server.
It can perform various malicious actions, such as logging keystrokes, displaying fake overlays, moving the mouse cursor, and even shutting down the victim's machine.
This new threat emerges as Brazilian authorities crack down on the Grandoreiro operation, signalling increased efforts to combat cybercrime.
An unrelated Python-based information stealer linked to Vietnamese hackers is also reported, indicating a broader landscape of escalating cyber threats. | Details |
| 2024-02-09 07:45:24 | thehackernews | MISCELLANEOUS | Enhancing Cloud Security with Wazuh's Cybersecurity Solutions | Cloud computing offers benefits like scalability and cost-efficiency, but introduces cybersecurity risks.
Wazuh is an open-source cybersecurity platform providing XDR and SIEM capabilities for on-premises and cloud environments.
With the adoption of cloud services, organizations face challenges such as knowledge gaps, reliability issues, and security threats.
Wazuh integrates with various cloud platforms including AWS, Azure, GitHub, and GCP for real-time threat detection and incident response.
Cybersecurity strategies must evolve to address the unique challenges of securing cloud infrastructures.
Wazuh's flexible architecture helps protect against emerging threats and enhances security posture within dynamic cloud ecosystems.
By leveraging Wazuh, organizations can maintain robust security, detect threats in real-time, and safeguard their applications and data. | Details |