Cybersecurity News

The U.S. Environmental Protection Agency (EPA) is currently navigating through a significant data breach, purportedly executed by a hacker known as USDoD. This breach has compromised the personal and sensitive information of over 8.5 million individuals, encompassing both clients and contractors, highlighting severe concerns around identity theft, cyber espionage, and potential impacts on environmental reporting.

A staggering 1 million WordPress sites are currently at risk due to a critical SQL injection vulnerability found in the LayerSlider plugin, a popular tool for crafting animated web content. The flaw, designated CVE-2024-2879, has been given a severe threat rating of 9.8 out of 10, posing a significant risk to site integrity and user data security.

Wiz.io, a trailblazer in cloud security, is teaming up with Hugging Face, the forefront runner in open-source AI tools, to innovate security solutions that fortify AI technologies. This partnership underscores a pivotal move towards enhancing the security fabric of AI infrastructures amidst escalating threats.

A sophisticated phishing campaign targets Windows users in the region, utilizing emails with ZIP attachments. These attachments unveil an HTML file that masquerades as an invoice, leading to the download of malicious files. Research from Trustwave SpiderLabs highlights that the emails come from a "temporary[.]link" domain, employing Roundcube Webmail. A deceptive error message is displayed on a site ("facturasmex[.]cloud"), which cleverly transitions to a CAPTCHA verification for visitors from Mexico, exploiting Cloudflare Turnstile.

Researchers at Proofpoint and Team Cymru have uncovered 'Latrodectus,' a sophisticated downloader involved in phishing campaigns since late November 2023. This malware exhibits advanced sandbox evasion techniques and is designed to download payloads and execute commands remotely. Evidence suggests its creators are also behind the notorious IcedID malware, with Latrodectus being utilized by initial access brokers to deploy further malicious software.

A new cyberattack campaign, believed to have ties to China, is utilizing an advanced version of the JavaScript remote access Trojan, JSOutProx, to target banks in the Middle East. This sophisticated malware, notorious for its flexibility and customizable features, allows cybercriminals to tailor attacks specifically to each victim's environment. According to Resecurity, the malware has been used to mimic SWIFT payment notifications for enterprises and MoneyGram templates for private individuals.

The New Delhi-based hack-for-hire group, Appin, operated for several years, engaging in global cyber espionage and data theft for a diverse clientele including private investigators, government agencies, and law enforcement. Their activities, corroborated by Reuters and analyzed by SentinelOne, involved hacking into computers of businesses, politicians, and high-profile individuals. Appin's operations included a range of cybercrimes such as email breaches, phone and computer hacking, and data theft from various international entities. Although Appin no longer exists in its original form, its legacy continues through spinoffs and has significantly influenced the hack-for-hire market.

Google discovered a vulnerability in Intel CPUs, named "Reptar," posing a risk to numerous systems, including those in cloud environments. Reptar, a side-channel vulnerability, enables data leakage and sensitive information theft, like credit card details. It exploits Intel CPUs' speculative execution, potentially causing host machine crashes and denial of service in multi-tenant virtualized settings, alongside possible privilege escalation. Intel acknowledged the issue, releasing a patch and advising immediate device updates, while working on a long-term solution.

🎉 Big News! CareChain has successfully completed SOC 2 certification, marking a significant milestone in its commitment to ensuring the highest standards of security and privacy. Oppos Inc. assisted MultiCIM Technologies on their SOC 2 journey with the design and implementation of SOC 2 controls and provisioning of their ancillary services.

HijackLoader, a new modular malware loader, is gaining popularity among cybercriminals. Despite lacking advanced features and having poor code quality, it effectively delivers payloads like DanaBot, SystemBC, and RedLine Stealer. The malware uses evasion techniques and offers various loading options for malicious payloads. This trend highlights the evolving cybercrime landscape, with stealers becoming a primary initial attack vector.

A vulnerability in Windows 11 allows arbitrary code execution due to factors like a TOCTOU race condition and lack of Mark-of-the-Web validation. Exploited using a .theme file, this vulnerability can let attackers execute malicious commands. Microsoft has been alerted but hasn't fully addressed the issue.

HijackLoader, a new modular malware loader, is gaining popularity among cybercriminals. Despite lacking advanced features and having poor code quality, it effectively delivers payloads like DanaBot, SystemBC, and RedLine Stealer. The malware uses evasion techniques and offers various loading options for malicious payloads. This trend highlights the evolving cybercrime landscape, with stealers becoming a primary initial attack vector.

TikTok faces a €345 million fine from the Irish Data Protection Commission for GDPR violations concerning children's data. Issues include default public content settings for child users, lack of transparency, and manipulative registration processes. Despite disagreeing with the decision, TikTok plans to redesign account registration for 16 and 17-year-olds.

Software company Retool revealed a breach affecting 27 cloud customers due to an SMS-based social engineering attack. The breach was exacerbated by a recent Google Account cloud synchronization feature. The attack began with an SMS phishing attempt, leading to unauthorized access and a loss of $15 million in cryptocurrency for one user.

Greater Manchester Police (GMP) officer data, including names and photos used for ID badges, was stolen in a major hack targeting a third-party badge supplier. This incident mirrors a similar attack on London's Metropolitan Police last month. The breaches raise concerns about UK's cybersecurity measures for public safety.

Mark Cuban's crypto wallet was hacked, resulting in a loss of around $900,000 in cryptocurrency. This incident, reported by blockchain investigator Wazz, saw Cuban's funds drained in just ten minutes. While Cuban suspects a phishing attack via a fake MetaMask version, experts believe he might have made a security oversight. This is not Cuban's first crypto-related setback.

In 2023, DDoS attacks remain a significant threat to businesses, potentially causing substantial financial losses. Top DDoS mitigation companies like Cloudflare, Radware, Akamai, and AWS Shield offer solutions ranging from network to application layer protection, ensuring businesses stay resilient against such cyber threats.

Cybercriminals behind RedLine and Vidar information stealers are now using phishing campaigns with Extended Validation (EV) code signing certificates to deliver ransomware. Trend Micro's analysis indicates a shift towards multipurpose techniques. The attacks begin with phishing emails, with victims receiving malware and ransomware payloads.

Hackers are exploiting a Windows policy loophole to forge kernel-mode driver signatures, enabling them to load malicious drivers without verification. Cisco Talos discovered the weakness, which bypasses Windows certificate policies. Microsoft has taken steps to mitigate the threat, but the vulnerability poses a significant risk.

DDoS attacks have surged by 168% on government services, with an 83% YoY increase in the telecommunications sector, according to StormWall's Q2 2023 Report. Discover key insights into the evolving cyber threat landscape and learn how to bolster DDoS protection measures in the face of escalating attacks.

Microsoft's July security update addresses 130 vulnerabilities, with five actively exploited. The flaws impact various products like Windows, Office, .Net, and Azure Active Directory. Critical and moderate severity issues include remote code execution, security bypass, privilege escalation, and more.

Honda's e-commerce platform for power equipment, marine, and lawn & garden products had major vulnerabilities that exposed customer data. Security researcher Eaton Zveare discovered flaws allowing unauthorized access and data leakage. Although Honda acknowledged the issues, no bug bounty program was in place.

A Chinese threat actor exploited a zero-day authentication bypass flaw in VMware ESXi, enabling privileged commands on guest virtual machines. The vulnerability, disclosed to VMware by Mandiant, allows file transfers without guest credentials. The threat actor, UNC3886, utilized a sophisticated attack chain, including backdoors and lateral movement techniques.

Researchers have discovered a new method for extracting cryptographic keys from smart cards and smartphones by recording footage of power LEDs using surveillance cameras or iPhones. This innovative side-channel attack exploits physical signals emitted by devices during cryptographic calculations. Although there are limitations to these attacks, they highlight a breakthrough in side-channel attack techniques.

Microsoft's June 2023 Patch Tuesday update addressed 69 vulnerabilities, including critical flaws in Exchange and SharePoint Server. While no zero-day vulnerabilities were disclosed, organizations should prioritize patching critical bugs, such as the SharePoint Server elevation of privilege vulnerability.

Severe security vulnerabilities have been discovered in Microsoft Azure Bastion and Azure Container Registry, leaving them susceptible to cross-site scripting (XSS) attacks. These vulnerabilities could lead to unauthorized data access, modifications, and disruptions. Threat actors could exploit weaknesses in the postMessage iframe to inject malicious JavaScript code and compromise sensitive data.

A massive phishing campaign impersonating popular brands, including Nike, Puma, and Adidas, has been discovered, utilizing over 6,000 scam websites. The attackers employ brand names combined with random country names in domain names to deceive users. Users are urged to verify website legitimacy, watch for suspicious domain names, and exercise caution when encountering unusually good deals.

Join Darace Rose, an industry expert, at the CannabisWiki Conference & Expo on June 14th, as she shares valuable insights and trends in the ever-evolving cannabis landscape. Don't miss this opportunity to gain knowledge and network with fellow enthusiasts in the industry.

Join us on May 30, 2023, as we celebrate the power of diversity at the Canadian Women in Cybersecurity Conference! Get ready for inspiring keynotes, thought-provoking panels, hands-on technical reviews, and engaging in-person and virtual experiences.

Mullvad VPN’s office in Gothenburg was raided by Swedish police for user data, but the VPN provider was able to show that they do not store customer data. Mullvad is known for its strict privacy policy, recently launching a privacy-focused web browser and being named the best VPN service by Wirecutter in March.

Google Chrome is retiring the lock icon used to indicate an HTTPS-secured connection between the website, Chrome, and the network, replacing it with a more neutral tune icon. The move is intended to make permission controls and security information more accessible to users, while avoiding any misunderstandings regarding the lock icon's meaning.

Operation SpecTor has led to the arrest of 288 vendors and the seizure of over $53.4 million, 850 kg of drugs, and 117 firearms in a coordinated international action against drug trafficking on the dark web. The operation, which involved nine countries, represents the highest number of arrests and funds seized in any international crackdown.

Thirteen people were arrested for stealing millions of dollars from low-income Southern California residents by draining electronic benefit transfer (EBT) accounts through card skimmers and ATMs. The LAPD's investigation continues, and the suspects are believed to be part of a Romanian syndicate known for targeting economically vulnerable people.

The recent vulnerability in Illumina's gene sequencers highlights the need for strong cybersecurity measures in the medical field. While the vulnerability raises the possibility of attackers targeting medical research facilities, it also demonstrates the effectiveness of reporting medical device vulnerabilities. Healthcare organizations need to be vigilant and prioritize the cybersecurity of their devices.

Chinese state-sponsored hacking group Earth Longzhi, a subgroup of APT41, has resumed its cyber espionage activities after six months of inactivity. The group has been targeting government, healthcare, technology, and manufacturing entities in Taiwan, Thailand, the Philippines, and Fiji, using advanced malware tactics such as DLL sideloading and "stack rumbling." Stay vigilant and protect your organization from these cyber threats.

Containers are crucial for any cloud application, but they come with security risks. Fortra’s Alert Logic team provides three ways to enhance your Amazon Web Services (AWS) container security, including setting table stakes, monitoring container registries, and understanding the AWS shared responsibility model. Protect your entire container ecosystem and keep malicious web actors at bay.

Beware of the surge in malicious campaigns that exploit Telegram bots to spread malware. According to Cofense Intelligence, there has been a significant increase in phishing attacks and credential theft in Q1 of 2023, highlighting the need for organizations to stay vigilant and update their security measures.

Security firm BitSight suspects that a botnet called Mylobot is behind BHProxies, a residential proxy service that allows users to route their web traffic anonymously through compromised computers. The malware includes over 1,000 hard-coded domain names, some of which overlap with those used by BHProxies.

Corporate networks have become more complex and distributed, making it challenging to detect unknown attack patterns. With increasing cybersecurity threats and a talent shortage, organizations are turning to predictive analytics and Machine Learning-driven network security solutions to monitor and secure their networks against cyber threats.

Over 5.4 million Twitter user data including private information were posted on a hacker forum. A security researcher uncovered another big, potentially more significant data dump of millions of Twitter records, illustrating how widespread threat actors misused this bug. The hacked data includes private phone numbers and email addresses.

At its peak in November 2022, the cloud threat actor group created three to five GitHub accounts per minute, totaling over 130,000 bogus accounts across Heroku, Togglebox, and GitHub. In September, 1,652 GitHub accounts were created, followed by 20,725 in November. There are 100,723 unique Heroku accounts.

Wabtec Corporation, a U.S. rail and locomotive business, announced a data breach that exposed personal and sensitive information. Wabtec manufactures locomotives and rail systems in the U.S. The company employs 25,000 employees in 50 countries and is the world's leader in freight locomotives and transportation.

Multiple BitKeep crypto wallet users reported that hackers emptied their wallets during Christmas. BitKeep is a multi-chain web3 DeFi wallet that supports 30 blockchains, 76 mainnets, 20,000 decentralized apps, and 223,000 assets. Over 8 million people in 168 countries use it for asset management and transactions.

The Guardian suspected a ransomware attack. It started as a "severe issue" that disrupted "behind-the-scenes services" in the last 24 hours. The firm said it would continue publishing to its website, one of the most frequented in the world, and was "confident" it could still publish physical papers.

A cyberattack at Queensland's second-largest university prompted printers to spill malware notes. As a precaution, the Queensland University of Technology shut down various IT systems. "Royal is the newest ransomware, and less is known about it and its operators," U.S. authorities said two weeks ago.

Android banking virus called 'Godfather' trojan targets 16 nations, stealing account information for 400 online financial services and cryptocurrency exchanges. Malware generates login screens overlaid on banking and crypto exchange app login forms, misleading users into inputting credentials on HTML phishing pages.

The Play ransomware group attacked H-Hotels, causing communication failures. H-Hotels has 60 hotels with 9,600 rooms in Germany, Austria, and Switzerland. The 2,500-person hotel chain is one of the largest in the DACH region, operating under 'H-Hotels' and the sub-brands Hyperion, H4 Hotels, H2 Hotels, H + Hotels, H.ostels, and H.omes. H-Hotels said the cyberattack happened on December 11, 2022.

Google's client-side encryption for Gmail is in beta for Workspace and school clients as part of efforts to safeguard web-based correspondence. Concerns about internet privacy and data security are at an all-time high, making this a welcome shift for people who respect their personal data. Google Workspace Enterprise Plus, Education Plus, and Education Standard clients can apply until January 20, 2023. Google personal accounts can't access it.

RIYADH: According to the CEO of a leading digital security company, companies in Saudi Arabia and globally should attest to having up-to-date cyber defenses. Eugene Kaspersky, CEO and cofounder of IT security company Kaspersky, told Arab News in an exclusive interview that governments should regulate cybersecurity systems and require businesses to follow guidelines like they do for fire hazards.

Twitter stated today that the new release of millions of member accounts, including phone numbers and email addresses, originated from the same data breach announced in August 2022. Twitter's incident response team believes user data released in November 2022 was obtained using the same vulnerability before it was addressed in January 2022.

During the first day of Pwn2Own Toronto 2022, contestants hacked the Samsung Galaxy S22 twice. STAR Labs was the first to exploit a zero-day on Samsung's flagship handset, winning $50,000 and 5 Master of Pwn points. Chim also demonstrated a successful exploit targeting the Samsung Galaxy S22, receiving $25,000 (50% of the second round reward) and 5 Master of Pwn points.

According to a new EU-funded study, many adolescent internet users engage in cybercrimes such as money mulling, digital piracy, and hate speech. The UEL research was funded by the bloc's Horizon budget and conducted with Europol's cybercrime center. It polled 8000 16-19-year-olds about 20 internet behaviors. The Guardian, which saw the research, said half engaged in unlawful activities.

A vulnerability in IBM Cloud Databases for PostgreSQL that might have exposed customers to supply chain attacks has recently been addressed by IBM. The flaw was identified by cloud security company Wiz researchers, who gave it the name Hell's Keychain. It is a "first-of-its-kind supply-chain attack vector targeting a cloud provider's infrastructure," according to the company.

Acer released a firmware upgrade to fix a security vulnerability that might disable UEFI Secure Boot. CVE-2022-4020 affects Aspire A315-22, A115-21, and A315-22G, and Extensa EX215-21 and EX215-21G. The PC maker said the vulnerability might change Secure Boot settings by generating NVRAM variables. ESET researcher Martin Smolár discovered the weakness. He previously reported Lenovo flaws.

Meta Platforms was fined €265 million ($277 million) by Ireland's Data Protection Commission (DPC) for failing to protect the personal data of more than 500 million Facebook users. The fines follow an inquiry by the European regulator on April 14, 2021, after a leak of a "collected dataset of Facebook personal data" This included 533 million users' phone numbers, birthdates, locations, email addresses, gender, marital status, account creation date, and other profile details.

Over 5.4 million Twitter user data including private information were posted on a hacker forum. A security researcher uncovered another big, potentially more significant data dump of millions of Twitter records, illustrating how widespread threat actors misused this bug. The hacked data includes private phone numbers and email addresses.

Southampton County, Virginia, began notifying residents last week that their personal information may have been hacked by ransomware. A threat actor encrypted data on a Southampton server in September. The county claims it swiftly contained the ransomware attack and initiated an investigation to discover what data was compromised.

Client-side cross-site scripting embeds harmful code. When a customer visits the site, the code executes and gathers personal, financial, and session data. Cybercriminals inject code to skim credit card info when e-skimming. Security software and apps can tighten your defenses and prevent attackers from exploiting client-side vulnerabilities.

Interpol seized $130 million in virtual assets in a global campaign on cybercrime and money laundering. Between June 28 and November 23, 2022, the international police operation HAECHI-III resulted in 975 arrests and the closure of 1,600 cases. South Korea wanted them for allegedly embezzling €28 million from 2,000 victims in a Ponzi scam.

A phishing campaign is stealing cryptocurrency from Coinbase, MetaMask, Crypto.com, and KuCoin by bypassing multi-factor authentication. Threat actors utilize Microsoft Azure Web Apps to host phishing sites and entice victims to them with fake transaction confirmation requests or suspicious activity alerts.

Two Estonians were arrested in Estonia on Sunday after being indicted in the U.S. for a $575 million bitcoin Ponzi scam. Sergei Potapenko, 37, and Ivan Turgin, 37, are accused of scamming hundreds of thousands of victims between December 2013 and August 2019. They allegedly laundered victims' money through shell businesses, bank accounts, virtual asset services, and cryptocurrency wallets.

Maple Leaf foods was recently hit with a cyber attack that resulted in system outages and disruptions of business operations. The incident was announced on Sunday November November 6th and since then the firm’s IT staff has taken immediate action to resolve the situation. According to Maple Leaf's statement: "The company is executing its business continuity plans as it works to restore the impacted systems,"

Microsoft has recommended developers still using .NET Core 3.1 LTS upgrade to the latest version before next month's EOS. Customers were cautioned to update to .NET 6 (LTS) or .NET 7 "as soon as feasible" before .NET Core 3.1 (LTS) hits EOS on December 13, 2022. Dominique Whittaker, Senior Program Manager for .NET Core and .NET Native, warned in July that Microsoft will halt technical support and updates after EOS.

Anton Napolsky (33) and Valeriia Ermakova (27) were accused with IP offences related to Z-Library, a pirate eBook repository. The suspects were arrested in Argentina on November 3, 2022, at U.S. request. The DOJ and FBI confiscated Z-clearnet Library's domains (z-lib.org, b-ok.org, and 3lib.net) a day later, but the operators' fate was unknown.

After yesterday's tragic blast on Istanbul's stiklal Avenue, Turkish authorities restricted access to Instagram, Facebook, Twitter, YouTube, and Telegram and imposed a nationwide broadcast restriction. After bomb, Turkish ISPs censor social media Sunday, November 13th, social media reported a bomb blast on Istanbul's stiklal boulevard. The explosion, now labeled a terrorist act, reportedly occurred at 4:20 PM local time near Taksim Square, killing 8 and injuring 81.

Google has agreed to pay $391.5 million to settle a privacy lawsuit filed by a coalition of attorneys general from 40 U.S. states. The settlement shows that the U.S. attorneys general discovered while investigating a 2018 Associated Press article that the search giant misled Android users and tracked their locations since at least 2014 even when they thought location tracking was disabled.

David Schütz accidentally bypassed the lock screen on his fully patched Google Pixel 6 and Pixel 5 smartphones, allowing anyone with physical access to open them. Exploiting the Android lock screen vulnerability is a simple five-step process that takes minutes. Last week's Android update patched a security flaw that had been exploitable for at least six months.

LockBit 3.0 affiliates use phishing emails to install Amadey Bot and encrypt devices. According to a new AhnLab investigation, the threat actor targets firms with phishing emails that seem like job offers or copyright notices. LockBit 3.0 is distributed as an obfuscated PowerShell script or executable to encrypt files.

Last October 28th, hackers targeted Aurubis’s IT systems, forcing them to shut down and disconnect many of the systems to stop the attack from spreading. Industrial cybersecurity firm Dragos reported that manufacturing companies have paid the highest ransoms so far this year, which further motivates these attacks.

GNU Image Manipulation Program's main website, GIMP.org, appeared in Google searches for "GIMP" last week. 'GIMP.org' as the target domain makes this ad seem credible. However, clicking on it took users to a copycat phishing website that gave them a 700 MB application disguised as GIMP that was malware.

DDOS attack stands for distributed denial of service and it’s a type of cyber attack where someone tries to make a service/resource unavailable by overwhelming it with fake requests. Because of this, the launch of Overwatch 2 was significantly delayed and the company lost hundreds of thousands of dollars.

CosMiss is a security problem in Azure Cosmos DB's built-in Jupyter Notebooks, which connect into the Azure portal and accounts to make searching, analyzing, and visualizing NoSQL data easier. Microsoft's fully managed NoSQL database Azure Cosmos DB supports large-scale APIs. Jupyter Notebooks lets users access Cosmos DB data online.

Raspberry Robin is becoming an access-as-a-service malware for installing IcedID, Bumblebee, TrueBot (aka Silence), and Clop ransomware. MSTIC is tracking the activity group behind the USB-based Raspberry Robin infections as DEV-0856, which has at least four verified entry points and a potential ransomware aim.

Microsoft resolved an issue preventing its vulnerable driver blocklist from being synced to previous Windows versions. This #blocklist prevents threat actors from installing legitimate but vulnerable drivers on HVCI-enabled Windows computers or Windows in S Mode in Bring Your Own Vulnerable Driver (BYOVD) attacks.

Cisco informed customers today that two vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows are being exploited. The AnyConnect Secure Mobility Client simplifies secure workplace endpoint access and lets employees operate from anywhere while connecting to a secure VPN using SSL and IPsec IKEv2. Local attackers can hijack DLLs and copy files to system directories using CVE-2020-3433 and CVE-2020-3153.

The business magazine reused the weak password across a dozen WordPress accounts, according to the criminal hackers who claimed responsibility for a recent FastCompany breach, saying they exploited an easily guessed default password, "pizza123." The hackers detailed the attack in their own article on FastCompany before the publication took down the site.