Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11541

Checks for new stories every ~15 minutes

Title Summary
ROWS
2023-09-20 02:01:57 bleepingcomputer CYBERCRIME Trend Micro Patches Zero-Day Vulnerability Actively Exploited in Attacks
Trend Micro has fixed a remote code execution zero-day vulnerability (CVE-2023-41179) rated as "critical," which was being actively exploited in attacks. The flaw was detected in Trend Micro's Apex One endpoint protection solution, used by businesses of varying sizes. The vulnerability resided in a third-party uninstaller module included with the security software. If exploited, it could allow an attacker, who has system privilege access, to execute arbitrary code. Trend Micro noted that exploitation of the vulnerability required the attacker to have previously stolen the product's management console credentials. Customers are strongly advised to upgrade to the latest versions of the software as soon as possible as a mitigating measure. Other effective workarounds include limiting access to the product's administration console to trusted networks. The Japanese CERT has issued an alert about the active exploitation and urged users to upgrade their software to a secure release immediately.
Details
2023-09-20 02:01:57 bleepingcomputer CYBERCRIME Celsius Crypto Bankruptcy Claimants Targeted by Phishing Attack
Fraudsters are impersonating the bankruptcy claim agent for crypto lender Celsius to attempt to steal from cryptocurrency wallets. Celsius filed for bankruptcy in July 2022 and froze withdrawals from user accounts, leading to customers filing for claims against the company. Email recipients have reported phishing attempts where the fraudsters pretend to be from Stretto, the Claims Agent for the Celsius bankruptcy proceeding, offering a 7-day window to claim frozen funds. One such email is using the email address no-reply@stretto.com and includes a link to a site called case-stretto[.]com, which redirects to claims-stretto[.]com. By asking for the visitor's email address and connection of their wallet to withdraw their claim, the phishing site gains access to all the information stored within the wallet, and so can disguise transactions and drain assets. The phishing emails managed to pass Sender Policy Framework (SPF) checks by originating from an IP address linked to the email marketing firm SendGrid, allowing them to be delivered. As these attacks are likely utilizing older contact lists stolen from hacked cryptocurrency marketing accounts, individuals who never had a Celsius account or filed a claim have also reported receiving the phishing emails.
Details
2023-09-07 11:23:26 bleepingcomputer MALWARE Mirai Variant Infects Low-Cost Android TV Boxes for DDoS Attacks
A new variant of the Mirai malware botnet has been found infecting inexpensive Android TV set-top boxes for DDoS attacks The malware is a version of the 'Pandora' backdoor that first appeared in 2015 Low-cost Android TV boxes with quad-core processors are the primary targets for this campaign The malware arrives on the devices through malicious firmware updates or pirated content apps Persistence is achieved through a background service that runs on device boot The malware can perform various DDoS attacks over TCP and UDP protocols Budget-friendly Android TV boxes have a higher risk of containing preloaded malware It is recommended to use streaming devices from trusted brands like Google, Apple, NVIDIA, Amazon, or Roku.
Details
2023-09-07 11:23:26 bleepingcomputer NATION STATE ACTIVITY Chinese Hackers Steal Microsoft Signing Key from Windows Crash Dump
Chinese hackers stole a signing key used to breach government email accounts from a Windows crash dump The attackers used the stolen key to breach Exchange Online and Azure Active Directory accounts of government agencies in the United States The key was leaked into a crash dump after a consumer signing system crashed in April 2021 The threat actors found the key after compromising a Microsoft engineer's corporate account The compromised key provided the hackers widespread access to Microsoft cloud services Microsoft revoked all valid signing keys and relocated recently generated access tokens to prevent unauthorized access Microsoft agreed to expand access to cloud logging data for free to help network defenders detect similar breach attempts Redmond faced criticism for impeding organizations from promptly detecting the attacks
Details
2023-09-07 11:23:26 bleepingcomputer CYBERCRIME Flipper Zero Enables Bluetooth Spam Attacks on iOS Devices
The Flipper Zero portable wireless pen-testing and hacking tool can be used to aggressively spam Bluetooth connection messages at Apple iOS devices. The tool allows for the spoofing of Bluetooth advertising packets, leading to confusion and disruption of workflows for iOS users. The attack can be used to send bogus connection requests, making it difficult to discern legitimate devices among a large number of fakes, or to mimic trusted devices for phishing attacks. The Flipper Zero firmware needs to be updated to enable Bluetooth functionality, and specific code needs to be generated to create fake notifications. The attack can work even if the target device is in airplane mode, as Apple has no mitigations or safeguards in place to prevent this abuse scenario.
Details
2023-09-07 11:23:26 bleepingcomputer DATA BREACH University of Michigan Requires Password Resets After Cyberattack
University of Michigan (UMICH) warns staff and students of a recent cyberattack and mandates password resets Failure to change password by September 12 will result in inability to sign into accounts Notifications sent by UMICH CISO and CIO to community members All UMICH community members on various campuses must change their passwords Users advised to consult guidelines on changing to a secure password An issue with the self-service password tool has been addressed Internet connectivity and WiFi restored across all UMICH campuses University does not disclose details regarding the investigation or the reason for the mandatory password resets
Details
2023-09-05 16:55:19 bleepingcomputer DATA BREACH Critical Remote Code Execution Flaws Found in ASUS Routers
Three critical-severity remote code execution vulnerabilities discovered in ASUS RT-AX55, RT-AX56U_V2, and RT-AC86U routers Vulnerabilities can be exploited remotely and without authentication, potentially allowing threat actors to hijack devices Flaws can lead to remote code execution, service interruptions, and performing arbitrary operations on the device ASUS has released firmware updates to address the vulnerabilities, but users who haven't applied the updates remain vulnerable It is advised to turn off the remote administration feature to prevent unauthorized access to the routers.
Details
2023-09-05 15:35:25 theregister DATA BREACH Freecycle Suffers Data Breach, Urges Users to Change Passwords
Freecycle, a charity aimed at recycling unwanted items, has suffered a data breach. The breach, which exposed usernames, email addresses, and hashed passwords, was discovered on August 30. Freecycle has urged all members to change their passwords and be vigilant for phishing emails. The data breach has been closed and regulatory authorities have been notified. It is unclear how many of Freecycle's 9 million members were affected by the breach. Users are advised not to reuse passwords and to avoid clicking on suspicious links or downloading unknown attachments.
Details
2023-09-05 15:35:25 thehackernews MALWARE New BLISTER Malware Update Fuelling Stealthy Network Infiltration
An updated version of the malware loader BLISTER is being used to distribute the Mythic command-and-control framework. BLISTER is embedded within a legitimate VLC Media Player library to bypass security software. BLISTER has been used in tandem with SocGholish to distribute Cobalt Strike and LockBit ransomware. The malware is actively maintained and used to load various types of malware, including clipbankers, information stealers, trojans, ransomware, and shellcode.
Details
2023-09-05 15:35:25 bleepingcomputer MISCELLANEOUS Continuous Security: PTaaS Bridges the Gap within Application Security
Penetration Testing as a Service (PTaaS) offers a comprehensive solution for continuous security monitoring in web applications Traditional pen testing is labor-intensive, time-consuming, and does not offer continuous monitoring PTaaS provides comprehensive coverage, frequent testing, automated processes, and integration with development processes Benefits of PTaaS include continuous security, holistic view of AppSec, and effective protection against cyber-attacks PTaaS is more scalable and effective compared to traditional pen testing PTaaS is suitable for organizations with a large number of applications and frequent release updates.
Details
2023-09-05 14:41:21 theregister DDOS Tsunami watch. Mitigating the threat of bot-driven DDoS attacks.
DDoS attacks are on the rise, with the volume growing by up to 300 percent in 2023. These attacks use compromised computer systems to generate attack traffic, resulting in loss of service, revenue, reputation, and control of network defenses. Being able to detect and mitigate DDoS attacks is crucial in preventing damage. A webinar hosted by The Register and Cloudflare will discuss the scale of DDoS attacks in 2023 and identify the perpetrators. The webinar will provide guidance on how to defend against DDoS attacks and offer best practices for mitigation. Participants will learn how to effectively protect their businesses and build strong defenses against DDoS attacks. The webinar is scheduled for 6th September and registration is available.
Details
2023-09-05 14:41:21 theregister DATA BREACH Northern Irish Cops Release Two Men After Terrorism Act Arrests Linked to Data Breach
The Police Service of Northern Ireland (PSNI) mistakenly published data on 10,000 employees on their website Two men have been released on bail after being arrested under the Terrorism Act in relation to the data breach The breach included details of every serving Northern Ireland police officer, potentially endangering their safety Recent poster attempts to intimidate police officers, but the information contained was incorrect The PSNI has made four arrests in relation to the data breach so far Other police forces in the UK have also experienced data breaches recently, including Cumbria Police and the Metropolitan Police in London
Details
2023-09-05 14:41:21 theregister DATA BREACH Attackers Access UK Military Data Through High-Security Fencing Firm's Windows 7 Rig
Attackers gained access to data from a UK supplier of high-security fencing for military bases The initial entry point was a Windows 7 PC, highlighting the risks of running obsolete code and hardware The LockBit Ransom group conducted the attack and may have exfiltrated 10GB of data The breach could potentially provide access to sensitive military and research sites in the UK The company stated that no classified information was stored on the compromised system Zaun has notified the National Cyber Security Centre and the UK's Information Commissioner's Office regarding the breach The attack serves as a reminder for enterprises and organizations to be vigilant about security in their supply chains The targeted nature of the attack on a third-party supplier raises concerns about national security and critical infrastructure
Details
2023-09-05 14:41:21 theregister MISCELLANEOUS Microsoft calls time on ancient TLS in Windows, breaking own stuff in the process
Microsoft is disabling TLS 1.0 and 1.1 by default in Windows, potentially causing issues for enterprise administrators. SQL Server 2012, 2014, and 2016 editions may require updates to be compatible. Other applications expected to be broken include Apple's Safari browser for Windows and several security applications. Microsoft has been tracking TLS protocol usage and believes usage of TLS 1.0 and 1.1 is low enough to act. Windows Insiders will be the first to have TLS 1.0 and 1.1 disabled by default from September, followed by future Windows releases. The option to re-enable the protocols will still be available but should only be done as a temporary solution. Microsoft's goal aligns with industry efforts to eliminate deprecated versions of TLS, with the US National Security Agency (NSA) and major tech companies advocating for the move. Microsoft's progress in disabling TLS 1.0 and 1.1 has been delayed but is now planned to be implemented in its flagship operating system.
Details
2023-09-05 14:41:21 theregister DATA BREACH Northern Ireland Top Cop Resigns Following Data Breach and Controversy
Simon Byrne, Chief Constable of the Police Service Northern Ireland (PSNI), has resigned amid a data breach and disciplinary controversy The PSNI mistakenly published spreadsheet data containing details of every single serving Northern Ireland police officer following a Freedom of Information request The sensitive information included personal details of officers and staff, making them vulnerable to potential targeting by dissident republican groups An independent review is currently underway to investigate the data breach In addition to the data breach, Byrne was facing backlash over a court ruling related to disciplinary actions taken against two junior officers The court ruled that the officers had been unlawfully disciplined to appease Sinn Féin's support for policing in Northern Ireland The ruling undermined Byrne's credibility and authority, contributing to his decision to resign Deputy Chief Constable Mark Hamilton is expected to temporarily lead the PSNI while a new leader is sought.
Details