๐Ÿ“ฐwrzlbrmpft's cyberlights๐Ÿ’ฅ

weekly cybersecurity highlights (for everyone!)

Back after vacation โ€“ My weekly shortlist of cyber security highlights. (maybe I'll even redo the skipped weeks ๐Ÿ˜) The short summaries are AI generated! If something is wrong, please let me know.


News For All

๐Ÿ•ต๏ธโ€โ™‚๏ธ Ausweiskopie und persรถnliche Daten an Kriminelle weitergegeben? Das kรถnnen Sie tun security news โ€“ Criminals exploit job offers and ads to steal personal data and ID copies, leading to identity theft, fraudulent accounts, and potential legal consequences for victims. https://www.watchlist-internet.at/news/umgang-mit-datendiebstahl/

โœˆ๏ธ SQL Injection Attack on Airport Security vulnerability โ€“ A serious SQL injection vulnerability allows unauthorized users to bypass airport security checks, risking safety by granting access to restricted areas like cockpits. https://www.schneier.com/blog/archives/2024/09/sql-injection-attack-on-airport-security.html

๐Ÿ›ซ German air traffic control agency confirms cyberattack, says operations unaffected security news โ€“ Germany's air traffic control agency confirmed a cyberattack affecting administrative systems but assured that flight safety remains intact and operations were not disrupted. https://therecord.media/german-air-traffic-control-company-deutsche-flugsicherung-cyberattack

๐Ÿš Transport for London (TfL) is dealing with an ongoing cyberattack security news โ€“ TfL is investigating a cyberattack affecting internal systems but reports no evidence of customer data compromise, assuring that services remain unaffected. https://securityaffairs.com/167946/hacking/transport-for-london-tfl-ongoing-cyberattack.html

๐Ÿ”‘ Owners of 1-Time Passcode Theft Service Plead Guilty cybercrime โ€“ Three men pleaded guilty for operating OTP Agency, a service that intercepted one-time passcodes for account takeovers, affecting over 12,500 victims before its shutdown. https://krebsonsecurity.com/2024/09/owners-of-1-time-passcode-theft-service-plead-guilty/

๐Ÿฆ  Disinfo group Spamouflage more aggressively targeting U.S. elections, candidates cybercrime โ€“ The disinformation group Spamouflage has intensified efforts to impersonate U.S. voters, undermining political candidates and institutions, though its impact on engagement remains limited. https://cyberscoop.com/spamouflage-targeting-us-election-candidates/

๐Ÿ“ธ Sextortion Scams Now Include Photos of Your Home โ€“ Krebs on Security cybercrime โ€“ Sextortion scams are evolving, now featuring personalized threats with photos of victims' homes, increasing fear and urgency to pay ransoms, often near $2,000 in Bitcoin. https://krebsonsecurity.com/2024/09/sextortion-scams-now-include-photos-of-your-home/

๐Ÿ’ฐ Data watchdog fines Clearview AI $33M privacy โ€“ The Dutch Data Protection Authority fined Clearview AI โ‚ฌ30.5 million for illegally collecting images without consent, stating the company's practices violate GDPR and threaten individual privacy. https://www.theregister.com/2024/09/03/clearview_ai_dutch_fine/

๐Ÿ”’ Google releases Pixel update to get rid of surveillance vulnerability vulnerability โ€“ Google's latest Pixel update removes the insecure Showcase.apk, originally intended for Verizon demos, which posed risks of man-in-the-middle attacks and spyware, ensuring enhanced device security. https://www.theverge.com/2024/9/3/24235127/google-pixel-showcase-vulnerability-patch

๐Ÿ”‘ YubiKeys have an unfixable security flaw โ€” but itโ€™s difficult to exploit vulnerability โ€“ A vulnerability in older YubiKey devices allows cloning but is hard to exploit, requiring physical access and additional knowledge. Devices prior to firmware version 5.7 remain permanently affected. https://www.theverge.com/2024/9/4/24235635/yubikey-unfixable-security-vulnerability-side-channel-explot

๐Ÿšจ 846 routers are affected by code execution flaws. Replace them! vulnerability โ€“ D-Link's discontinued DIR-846 routers are vulnerable to multiple critical remote code execution flaws (CVSS scores up to 9.8). Users are advised to replace these devices as they are no longer supported. https://securityaffairs.com/168041/security/d-link-dir-846-routers-code-execution-flaws.html

โ˜ข๏ธ Zyxel warns of vulnerabilities in a wide range of its products vulnerability โ€“ Zyxel has disclosed nearly a dozen vulnerabilities across its products, with the most critical (CVE-2024-7261) allowing unauthenticated OS command execution, rated 9.8. Users are urged to patch immediately. https://arstechnica.com/?p=2047312

๐Ÿ—ณ๏ธ Biden cracks down on Putin's election meddling cybercrime โ€“ The Biden administration seized 32 websites linked to Russian propaganda efforts and charged two RT employees in a $10 million scheme to influence the upcoming U.S. presidential election. https://www.theregister.com/2024/09/05/biden_cracks_down_on_putins/

๐ŸŽฃ Warning Against Phishing Emails Impersonating Netflix warning โ€“ AhnLab warns of phishing emails posing as Netflix, claiming payment failures and urging users to update payment methods via malicious links. Users are advised to verify URLs before clicking. https://asec.ahnlab.com/en/82969/

โšก Quishing, an insidious threat to electric car owners security news โ€“ Quishing is a phishing attack using counterfeit QR codes at electric car charging stations to steal sensitive information. Users are urged to use recharge cards and verify URLs to protect against scams. https://securityaffairs.com/168059/hacking/quishing-electric-car-owners.html

โ™€๏ธ New report shows ongoing gender pay gap in cybersecurity security news โ€“ The ISC2 Cybersecurity Workforce Study reveals a persistent gender pay gap in cybersecurity, with men earning more than women, and highlights the underrepresentation of women in the field, emphasizing the need for targeted DEI hiring initiatives. https://securityintelligence.com/articles/new-report-shows-gender-pay-gap-in-cybersecurity/

๐Ÿฆ  Predator spyware resurfaces with signs of activity, Recorded Future says security news โ€“ Recorded Future reports renewed activity from Predator spyware, linked to Intellexa, with new infrastructure identified and potential customers in Angola, Saudi Arabia, and the Democratic Republic of the Congo. https://cyberscoop.com/predator-spyware-resurfaces-with-signs-of-activity-recorded-future-says/

๐Ÿ”Ž Colombian president suggests prior administration illegally sent $11 million in cash to Israel for spyware security news โ€“ Colombian President Gustavo Petro announced an investigation into $11 million allegedly used by the previous administration to purchase Pegasus spyware, questioning the legality of the transactions. https://therecord.media/colombian-president-pegasus-spyware-israel-missing-money

๐Ÿ“Ž Telegram changes its tone on moderating private chats after CEOโ€™s arrest security news โ€“ Following CEO Pavel Durov's arrest, Telegram revised its FAQ to allow reporting of illegal content in private chats, shifting from a previous stance of non-cooperation with moderation requests. https://www.theverge.com/2024/9/5/24237254/telegram-pavel-durov-arrest-private-chats-moderation-policy-change

๐Ÿ›‹๏ธ Therapy Sessions Exposed by Mental Health Care Firmโ€™s Unsecured Database data breach โ€“ Confidant Health inadvertently exposed sensitive patient data, including therapy session recordings, due to an unsecured database. The incident highlights the urgent need for improved data security in healthcare organizations. https://www.wired.com/story/confidant-health-therapy-records-database-exposure/

๐Ÿ”“ Hackers Threaten to Leak Planned Parenthood Data cybercrime โ€“ RansomHub ransomware group claims to have hacked Planned Parenthood's Montana branch, threatening to leak 93 GB of sensitive data after a cybersecurity incident was reported on August 28. https://www.wired.com/story/hackers-threaten-to-leak-planned-parenthood-data/


Some More, For the Curious

๐Ÿ” Most interesting IR cases in 2023: insider threats and more security research โ€“ Kaspersky's Global Emergency Response Team highlights 2023's notable incident response cases, including insider fraud and advanced persistent threats, emphasizing the need for enhanced monitoring and threat intelligence. https://securelist.com/incident-response-interesting-cases-2023/113611/

๐Ÿ”’ Vulnerabilities in Microsoft apps for macOS allow stealing permissions vulnerability โ€“ Eight vulnerabilities in Microsoft apps for macOS could enable attackers to steal permissions, allowing unauthorized access to sensitive resources like cameras and microphones without user knowledge. https://securityaffairs.com/167973/hacking/microsoft-apps-for-macos-flaws.html

๐Ÿ›‘ VMWare releases Fusion vulnerability with 8.8 rating vulnerability โ€“ A critical vulnerability in VMWare Fusion (CVE-2024-38811) allows code execution with standard user privileges, rated 8.8 on the CVSS scale, prompting a software patch. https://cyberscoop.com/vmware-vulnerability-fushion-cve-2024-38811/

๐Ÿ’ป Rust in Linux lead retires rather than deal with more โ€œnontechnical nonsenseโ€ security news โ€“ Wedson Almeida Filho, leader of the Rust for Linux project, retires citing frustration with nontechnical disputes, expressing concern that the Linux kernel must embrace memory-safe languages like Rust to remain relevant. https://arstechnica.com/?p=2046763

๐Ÿงฌ Evolution of Mallox: from private ransomware to RaaS security research โ€“ Mallox ransomware has evolved from targeted attacks to a Ransomware-as-a-Service model, with over 700 samples identified. Its affiliate program seeks experienced partners for cybercrime, indicating a shift in operational strategy. https://securelist.com/mallox-ransomware/113529/

๐Ÿ Revival Hijack โ€“ PyPI hijack technique exploited in the wild, puts 22K packages at risk security research โ€“ The 'Revival Hijack' technique allows attackers to reclaim deleted PyPI packages, risking 22,000 packages and potentially leading to malicious downloads. JFrog has taken action to protect the community. https://jfrog.com/blog/revival-hijack-pypi-hijack-technique-exploited-22k-packages-at-risk/

๐Ÿ“ƒ Validate your Windows Audit Policy Configuration with KQL cyber defense โ€“ Ensuring proper configuration of Windows audit policies is essential for security. This article discusses using Kusto Query Language (KQL) to validate and troubleshoot audit policy application across environments. https://blog.nviso.eu/2024/09/05/validate-your-windows-audit-policy-configuration-with-kql/

๐Ÿฆ— Cicada Ransomware โ€“ What You Need To Know security news โ€“ Cicada ransomware, discovered in June 2024, has targeted over 20 organizations primarily in North America and the UK. Written in Rust, it threatens to publish stolen data unless a ransom is paid. https://www.tripwire.com/state-of-security/cicada-ransomware-what-you-need-know

๐Ÿช… Veeam fixed a critical flaw in Veeam Backup & Replication software vulnerability โ€“ Veeam patched 18 high and critical vulnerabilities in its Backup & Replication software, including a critical RCE flaw (CVE-2024-40711) with a CVSS score of 9.8, requiring immediate attention. https://securityaffairs.com/168088/security/veeam-backup-replication-cve-2024-40711.html

๐Ÿงฑ SonicWall warns that SonicOS bug exploited in attacks vulnerability โ€“ SonicWall alerts users of a critical access control vulnerability (CVE-2024-40766) in SonicOS that may be actively exploited, urging immediate patching to prevent unauthorized access and potential firewall crashes. https://securityaffairs.com/168112/hacking/sonicwall-sonicos-bug-exploited.html

๐Ÿ”ง Building a Hardware Hacking Arsenal: The Right Bits for Every Byte security research โ€“ This article outlines essential tools for hardware hacking, emphasizing cost-effective options that support learning and experimentation in security assessments. Safety and accessibility are also highlighted. https://www.guidepointsecurity.com/blog/building-a-hardware-hacking-arsenal-the-right-bits-for-every-byte/


CISA Corner

โš ๏ธ LOYTEC Electronics LINX Series vulnerability โ€“ Multiple vulnerabilities in LOYTEC's LINX series devices could allow attackers to exploit sensitive information and gain unauthorized access, with high CVSS scores indicating significant risks. https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01

โš ๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA has added three vulnerabilities, including two in Draytek VigorConnect and one in Kingsoft WPS Office, to its catalog due to active exploitation risks for federal networks. https://www.cisa.gov/news-events/alerts/2024/09/03/cisa-adds-three-known-exploited-vulnerabilities-catalog

โš™๏ธ CISA Releases Four Industrial Control Systems Advisories vulnerability โ€“ On September 5, 2024, CISA released four advisories addressing security vulnerabilities in various Industrial Control Systems, urging users to review for technical details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2024/09/05/cisa-releases-four-industrial-control-systems-advisories

โš”๏ธ Russian Military Cyber Actors Target US and Global Critical Infrastructure security news โ€“ The FBI, CISA, and NSA report that Russian GRU Unit 29155 is behind ongoing cyber operations targeting critical infrastructure, utilizing tools like WhisperGate malware and exploiting various vulnerabilities since at least 2020. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿšซ Videos: Van der Bellen & Assinger werben nicht fรผr Investmentplattformen security news โ€“ The article discusses that videos featuring Van der Bellen and Assinger do not promote investment platforms, clarifying any misconceptions surrounding their appearances. https://www.watchlist-internet.at/news/fake-videos-van-der-bellen-assinger-werben-nicht-fuer-investmentplattformen/

๐Ÿ’ธ Should Organizations Pay Ransom Demands? cybercrime โ€“ Organizations are urged to avoid paying ransomware demands as it funds cybercriminals and doesn't guarantee data recovery. Proactive cybersecurity measures are emphasized as a better defense. https://securityaffairs.com/166650/uncategorized/ransomware-organizations-should-avoid-paying-ransoms.html

๐Ÿ“ง Users: Microsoft must update Outlook's friendly name feature security news โ€“ Users are urging Microsoft to change how Outlook displays sender names to combat phishing, as friendly names can mislead users into clicking malicious links. Calls for disabling aliases have grown. https://www.theregister.com/2024/08/06/users_call_for_microsoft_to/

๐Ÿ›‘ Consumer Reports study finds data removal services are often ineffective privacy โ€“ A Consumer Reports study found that data removal services are largely ineffective, with only 35% of personal data removed from people-search sites within four months, raising concerns about their reliability. https://therecord.media/data-removal-services-mostly-worthless-study

๐Ÿ’ป Report: Myths about tech still plaguing the IT world security news โ€“ A Kaspersky survey reveals widespread misconceptions about digital security among tech-savvy Brits, including beliefs about webcam safety, incognito mode, and the effectiveness of encryption, highlighting a need for better cybersecurity education. https://www.theregister.com/2024/08/08/report_tech_misconceptions_plague_the/

๐Ÿช– Russia's Kursk region suffers 'massive' DDoS attack amid Ukraine offensive cyber defense โ€“ Kursk, Russia, experienced a significant DDoS attack targeting government and business websites, coinciding with Ukraine's military advances, though critical infrastructure remained protected from damage. https://therecord.media/kursk-military-offensive-ddos-russia-ukraine

๐Ÿ„ Crooks took control of a cow milking robot causing the death of a cow cybercrime โ€“ Cybercriminals hacked a farmer's milking robot, demanding a $10,000 ransom. The farmer refused to pay, leading to the death of a cow due to lost data on insemination dates. https://securityaffairs.com/166839/cyber-crime/cow-milking-robot-hacked.html

๐Ÿ”Š Sonos smart speakers flaw allowed to eavesdrop on users vulnerability โ€“ NCC Group discovered vulnerabilities in Sonos smart speakers, including CVE-2023-50809, allowing remote code execution and potential eavesdropping. Sonos released a patch to address the issues. https://securityaffairs.com/166823/hacking/sonos-smart-speakers-flaw.html

๐Ÿ”‘ How Hackers Extracted the โ€˜Keys to the Kingdomโ€™ to Clone HID Keycards security research โ€“ Researchers reveal a method to extract HID encoder keys, allowing easy cloning of keycards. https://www.wired.com/story/hid-keycard-authentication-key-vulnerability/

๐Ÿ›ก๏ธ Security Tips for Modern Web Administrators security news โ€“ Website security is vital for user trust. Employ multi-layered defenses, keep software updated, and follow best practices to safeguard against attacks and protect sensitive data. https://blog.sucuri.net/2024/08/security-tips-for-modern-web-administrators.html

๐Ÿ†™ Mac and Windows users infected by software updates delivered over hacked ISP malware โ€“ Hackers compromised an ISP to deliver malware to users via tampered software updates. This attack exploited unencrypted connections, enabling malicious file downloads for Windows and macOS users. https://arstechnica.com/security/2024/08/hacked-isp-infects-users-receiving-unsecure-software-updates/

๐Ÿ‘๏ธ Illinois relaxes biometric privacy law, reduces penalties privacy โ€“ Illinois has amended its Biometric Information Privacy Act, reducing penalties for breaches by counting multiple data distributions as one violation, which critics say lowers potential damages. https://www.theregister.com/2024/08/06/illinois_bipa_amendment_reduces_penalties/

๐Ÿ”’ Google says Android zero-day was exploited in the wild vulnerability โ€“ Google has patched a high-severity Android vulnerability (CVE-2024-36971) allowing remote code execution, amid reports of targeted exploitation. This reflects a rising trend in zero-day attacks. https://therecord.media/android-zero-day-google-fix-august-patch

๐Ÿ’ป Students scramble after security breach wipes 13,000 devices data breach โ€“ A security breach at Mobile Guardian led to the remote wiping of data from 13,000 school-issued devices in Singapore, prompting the Ministry of Education to halt its services and remove the app. https://arstechnica.com/security/2024/08/students-scramble-after-security-breach-wipes-13000-devices/

๐Ÿ SharpRhino malware targets IT admins, Hunters Intl suspected malware โ€“ The SharpRhino malware, disguised as Angry IP Scanner, targets network admins and is linked to the Hunters International gang, known for ransomware-as-a-service tactics and double extortion. https://www.theregister.com/2024/08/07/sharprhino_malware_admins/

โŽ Problems with Georgiaโ€™s Voter Registration Portal security news โ€“ Georgia's voter registration portal has security flaws allowing unauthorized cancellation of registrations and exposing sensitive voter data, highlighting challenges in balancing usability and security. https://www.schneier.com/blog/archives/2024/08/problems-with-georgias-voter-registration-portal.html

๐Ÿ’ฐ US offers $10 million for info on Iranian leaders behind CyberAv3ngers water utility attacks cybercrime โ€“ The U.S. State Department has offered a $10 million reward for information on six Iranian hackers linked to cyberattacks on U.S. water utilities, attributed to the CyberAv3ngers group. https://therecord.media/us-offers-reward-for-info-on-iranian-hackers-water-utilities

๐Ÿง“ Researchers find decades-old vulnerability in major web browsers vulnerability โ€“ A zero-day vulnerability discovered by Oligo Security affects major browsers, allowing attackers to exploit network requests to 0.0.0.0, potentially breaching local networks and accessing private data. https://cyberscoop.com/browser-zero-day-oligo-security-0-0-0-0-day/

๐Ÿง‘โ€๐ŸŒพ Nashville man arrested for running โ€œlaptop farmโ€ to get jobs for North Koreans cybercrime โ€“ Matthew Isaac Knoot was arrested for hosting laptops to deceive US companies into hiring North Korean nationals, funneling their earnings to fund North Koreaโ€™s weapons program. https://arstechnica.com/security/2024/08/nashville-man-arrested-for-running-laptop-farm-to-get-jobs-for-north-koreans/


Some More, For the Curious

โšก Hacking a Virtual Power Plant hacking write-up โ€“ A security researcher exploited a vulnerability in a virtual power plant's API using weak 512-bit RSA keys, revealing how easily sensitive data could be accessed. https://rya.nc/vpp-hack.html

๐Ÿ“Š State of Exploitation โ€“ A Peek into 1H-2024 Vulnerability Exploitation security research โ€“ In the first half of 2024, 390 new vulnerabilities were added to the Known Exploited Vulnerabilities Catalog, highlighting ongoing threats and trends in exploitation and weaponization. https://vulncheck.com/blog/state-of-exploitation-1h-2024

๐Ÿ’ผ Florida firm sued over theft of 2.9B personal records data breach โ€“ A lawsuit claims Jerico Pictures negligently failed to secure 2.9 billion records, leading to a data breach where personal information was sold on the dark web, risking identity theft. https://www.theregister.com/2024/08/05/national_public_data_lawsuit/

๐Ÿ’ฐ Drama โ€˜Dark Angelsโ€™ Reap Record Ransoms cybercrime โ€“ The Dark Angels ransomware group made headlines after receiving a record $75 million ransom from a Fortune 50 company, focusing on massive data theft while avoiding disruption and publicity. https://krebsonsecurity.com/2024/08/low-drama-dark-angels-reap-record-ransoms/

๐Ÿ—ฝ Intelligence bill would elevate ransomware to a terrorist threat security news โ€“ A Senate proposal aims to treat ransomware attacks as terrorism, enhancing legal authority to combat cybercriminals and sanction states harboring them, despite concerns over effectiveness. https://cyberscoop.com/ransomware-terrorism-ndaa-2025/

๐ŸŒฎ Turning the screws: The pressure tactics of ransomware gangs cybercrime โ€“ Ransomware gangs are escalating pressure tactics, using media, legislation, and personal threats to coerce victims into paying ransoms, including targeting secondary victims for leverage. https://news.sophos.com/en-us/2024/08/06/turning-the-screws-the-pressure-tactics-of-ransomware-gangs/

โž– Best security practices for ESXi environments cyber defense โ€“ Organizations using VMware ESXi should implement ten security practices to mitigate risks, as native EDR is unavailable, including ensuring patching, enforcing strong passwords, and enabling lockdown modes. https://news.sophos.com/en-us/2024/08/07/best-security-practices-for-esxi-environments/

๐Ÿง  Mental Health โ€“ An Infosec Challenge security news โ€“ Cybersecurity professionals face unique mental health challenges like burnout and anxiety due to constant stress. The article offers tips for prevention, emphasizing self-care, communication, and community support. https://www.blackhillsinfosec.com/mental-health-an-infosec-challenge/

๐Ÿค‘ Hackers return $12 million taken during Ronin network breach cybercrime โ€“ Hackers returned $12 million stolen from the Ronin gaming blockchain, claiming to act as white-hats after exploiting a vulnerability. The company plans to enhance security and awarded the hackers a $500,000 bounty. https://therecord.media/hackers-return-12-million-taken-from-ronin-network

๐ŸŽฉ The top stories coming out of the Black Hat cybersecurity conference security news โ€“ At the Black Hat conference, AI's role in cybersecurity takes center stage, alongside vulnerabilities in car infotainment systems and the impact of upcoming elections on cybersecurity policy. https://blog.talosintelligence.com/threat-source-newsletter-aug-8-2024/


CISA Corner

โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog vulnerability โ€“ CISA has included CVE-2018-0824, a Microsoft vulnerability, in its catalog due to active exploitation, emphasizing the need for federal agencies to address such risks promptly. https://www.cisa.gov/news-events/alerts/2024/08/05/cisa-adds-one-known-exploited-vulnerability-catalog ๐Ÿšจ CISA Adds Two Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA has included CVE-2024-36971 and CVE-2024-32113 in its catalog due to active exploitation, highlighting risks to federal networks and the need for timely remediation. https://www.cisa.gov/news-events/alerts/2024/08/07/cisa-adds-two-known-exploited-vulnerabilities-catalog

๐Ÿ› ๏ธ Delta Electronics DIAScreen vulnerability โ€“ A stack-based buffer overflow vulnerability in Delta Electronics DIAScreen could allow arbitrary code execution. Users are urged to update to version 1.4.2 to mitigate risks. https://www.cisa.gov/news-events/ics-advisories/icsa-24-219-01 ๐Ÿ” Dorsett Controls InfoScan vulnerability โ€“ Dorsett Controls InfoScan has vulnerabilities allowing unauthorized access to sensitive information and path traversal. Users should update to version 1.38 or later to mitigate risks. https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01

๐Ÿ›’ Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem cyber defense โ€“ This guide empowers software customers to demand security in product design, offering questions to assess manufacturers' cybersecurity practices and ensuring resilience against cyber threats. https://www.cisa.gov/resources-tools/resources/secure-demand-guide

๐Ÿ” Best Practices for Cisco Device Configuration security news โ€“ CISA advises disabling the Cisco Smart Install feature and using type 8 password protection to secure configurations, reducing the risk of password cracking and unauthorized access. https://www.cisa.gov/news-events/alerts/2024/08/08/best-practices-cisco-device-configuration


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

โŒ Hereโ€™s How To Stop X From Using Your Data To Train Its AI privacy โ€“ X.ai, affiliated with Elon Musk's X network, utilizes Twitter data for AI training; users can opt out in settings. https://www.forbes.com/sites/johnkoetsier/2024/07/26/x-just-gave-itself-permission-to-use-all-your-data-to-train-grok/

ยฎ๏ธ Massenรผberwachung als Dienstleistung: Der Handel mit Standortdaten privacy โ€“ Data brokers sell billions of location data, threatening privacy and national security, leading to concerns about espionage. Commercial surveillance infrastructure poses systemic problems. https://www.kuketz-blog.de/massenueberwachung-als-dienstleistung-der-handel-mit-standortdaten/

๐Ÿซฅ New Mandrake Android spyware version discovered on Google Play malware โ€“ Mandrake spyware resurfaces on Google Play with new evasion techniques, targeting users globally. Sophisticated malware embedded in file sharing app, using complex infection chain and anti-analysis methods. https://securelist.com/mandrake-apps-return-to-google-play/113147/

๐Ÿ–– IBM, Nike, Disney, others caught in Proofpoint phish palaver security news โ€“ Phishing campaign exploited Proofpoint security gap, sending 3 million daily spoofed emails; blamed on insecure Proofpoint Microsoft 365 integration. https://www.theregister.com/2024/07/30/scammers_spoofed_emails/

๐ŸŽฃ A crafty phishing campaign targets Microsoft OneDrive users security news โ€“ A phishing campaign targets Microsoft OneDrive users with a PowerShell script through a deceptive email instructing users to fix a fake โ€œError 0x8004de86.โ€ The attack tricks victims into running malicious commands for system compromise. https://securityaffairs.com/166312/hacking/microsoft-onedrive-phishing.html

๐Ÿฆˆ 'LockBit of phishing' EvilProxy used in 1M+ attacks monthly security news โ€“ EvilProxy, a phishing-as-a-service kit, leverages Cloudflare services to disguise traffic in phishing attacks targeting C-Suite executives. Attacks use redirection through legitimate sites, culminating in phishing Microsoft login pages. https://www.theregister.com/2024/07/30/evilproxy_phishing_kit_analysis/

๐Ÿค‘ Meta to pay Texas $1.4 billion to settle lawsuit alleging it illegally captured usersโ€™ faces privacy โ€“ Meta agrees to pay Texas $1.4 billion to settle a lawsuit over unauthorized use of facial recognition software on users, violating Texas law and consumer protection regulations. https://therecord.media/meta-texas-facial-recognition-settlement

๐Ÿฆ† Donโ€™t Let Your Domain Name Become a โ€œSitting Duckโ€ security news โ€“ Over a million vulnerable domains are at risk of takeover due to authentication weaknesses at hosting providers and registrars, allowing possible cybercriminal exploitation. https://krebsonsecurity.com/2024/07/dont-let-your-domain-name-become-a-sitting-duck/

๐Ÿ’ธ Scammer Allegedly Makes $600,000 a Month Holding Instagram Accounts Hostage cybercrime โ€“ Idriss Qibaa, aka 'Dani' and 'Unlocked,' allegedly extorted victims through locking their Instagram accounts, threatening them, demanding money to regain access, and using personal information for extortion. https://www.404media.co/unlocked4life-instagram-scam-no-jumper/

๐Ÿง‘โ€๐Ÿ’ผ Germany summons Chinese ambassador over cyberattack on cartography agency security news โ€“ German authorities link a Beijing-backed threat actor to a 2021 cyberattack on the Federal Agency for Cartography and Geodesy, summoning the Chinese ambassador. https://therecord.media/germany-summons-chinese-ambassador-over-hack

๐ŸŒ Nearly 7% of Internet Traffic Is Malicious security news โ€“ Cloudflare reports 6.8% of Internet traffic is malicious, with CVEs exploited as quickly as 22 minutes after proof-of-concepts are published. https://www.schneier.com/blog/archives/2024/07/nearly-7-of-internet-traffic-is-malicious.html

๐Ÿช Microsoft seizes domain used by Vietnamese group to sell fake accounts, services cybercrime โ€“ Microsoft seizes domain used by Vietnamese group selling fake accounts and services after previous seizures for creating fraudulent Microsoft accounts and CAPTCHA bypass services. https://cyberscoop.com/microsoft-seizes-domain-used-by-vietnamese-group-to-sell-fake-accounts-services/

๐Ÿ’ Begging for Bounties and More Info Stealer Logs cybercrime โ€“ Fraudsters try to extort bug bounties using stolen credentials from info stealer logs, which originated from victims' malware-infected devices, creating a malicious chain propagated on platforms like Telegram. https://www.troyhunt.com/begging-for-bounties-and-more-info-stealer-logs/ Personal comment: HIBP added a lot of new breaches this week โ€“ go check your accounts at https://haveibeenpwned.com/

๐Ÿ’ธ $75 Million Record-Breaking Ransom Paid To Cybercriminals, Say Researchers cybercrime โ€“ A record-breaking $75 million ransom was paid to Dark Angels ransomware group by an undisclosed Fortune 50 company. https://www.tripwire.com/state-of-security/75-million-record-breaking-ransom-paid-cybercriminals-say-researchers

๐Ÿ’Š Pharma Giant Cencora confirmed the theft of personal and health information data breach โ€“ Pharmaceutical giant Cencora confirms theft of personal and health information in a data breach, affecting individuals' data, including personally identifiable information and protected health information. https://securityaffairs.com/166422/data-breach/cencora-confirmed-theft-pii-heath-data.html

๐Ÿ“ฑ Keeping your Android device safe from text message fraud privacy โ€“ SMS Blaster fraud, threats from SMS phishing via cell-site simulators, and Android security features against fraud. https://security.googleblog.com/2024/08/keeping-your-android-device-safe-from.html

๐Ÿš— Ford wants patent for tech allowing cars to surveil and report speeding drivers privacy โ€“ Ford seeks patent for cars to surveil speeding drivers, sparking privacy concerns from advocates and experts. https://therecord.media/ford-seeks-patent-cars-surveil-speeders-report-to-police

๐Ÿˆ NFL to roll out facial authentication software league-wide privacy โ€“ The NFL will implement facial authentication software at all 32 stadiums this season to enhance event security. The technology aims to streamline authentication processes for media, officials, and staff. Privacy concerns, noting potential inaccuracies and discriminatory impacts of facial recognition technology. https://therecord.media/nfl-to-roll-out-facial-authentication-league-wide

๐Ÿ“‡ Hackers attempt to sell the personal data of 3 billion people resulting from an April data breach data breach โ€“ National Public Data, reportedly exposed the personal data of close to 3 billion people, disclosed by a threat actor named USDoD, who tried to sell the database for $3.5 million on the dark web. https://securityaffairs.com/166539/data-breach/personal-data-3-billion-people-data-breach.html


Some More, For the Curious

๐ŸŒ€ StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms security research โ€“ StormBamboo leverages ISP compromise to manipulate DNS updates, installing malware through insecure software updates on macOS and Windows. https://www.volexity.com/blog/2024/08/02/stormbamboo-compromises-isp-to-abuse-insecure-software-update-mechanisms/

๐Ÿš€๐Ÿ–จ๏ธ Reverse engineering the 59-pound printer onboard the Space Shuttle geeky news โ€“ The Space Shuttle's Interim Teleprinter, a stop-gap measure, remained in use for over 50 flights, printing thousands of lines; cost $1.5 million per flight. https://www.righto.com/2024/08/space-shuttle-interim-teleprinter.html

๐Ÿ˜ž Too big to care? โ€“ Our disappointment with Cloudflareโ€™s anti-abuse posture cyber defense โ€“ Spamhaus criticizes Cloudflare for facilitating cybercriminal activity by providing services to abusive actors, despite having tools to prevent abuse. Calls for Cloudflare to suspend services to abusers. https://www.spamhaus.org/resource-hub/service-providers/too-big-to-care-our-disappointment-with-cloudflares-anti-abuse-posture/

๐Ÿค– Websites are Blocking the Wrong AI Scrapers (Because AI Companies Keep Making New Ones) security news โ€“ Website owners struggling to block AI scrapers due to constantly changing crawler names and outdated robots.txt files. https://www.404media.co/websites-are-blocking-the-wrong-ai-scrapers-because-ai-companies-keep-making-new-ones/

โš™๏ธ Zero Day Initiative โ€” Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 1 security research โ€“ โ€œLink followingโ€ vulnerabilities on Windows involve applications improperly resolving filenames, allowing malicious users to redirect to unintended resources. Techniques to exploit these vulnerabilities using file operations are discussed with defensive strategies from developers. https://www.thezdi.com/blog/2024/7/29/breaking-barriers-and-assumptions-techniques-for-privilege-escalation-on-windows-part-1

โœˆ๏ธ Delta Air Lines may sue CrowdStrike, Microsoft over outage security news โ€“ Delta Air Lines considers legal action against CrowdStrike and Microsoft following operational losses of up to $500 million due to a recent outage that led millions of Windows machines offline. https://www.theregister.com/2024/07/30/crowdstrike_delta_microsoft_lawsuit/

๐ŸŒ‹ 'Error' in Microsoft's DDoS defenses amplified Azure outage security news โ€“ Microsoft's DDoS defenses amplified an Azure outage caused by a DDoS attack, triggering global service disruptions, despite the company's unique defense and threat intelligence capabilities. https://www.theregister.com/2024/07/31/microsoft_ddos_azure/

๐ŸŒฝ Driving lessons: The kernel drivers in Sophos Intercept X Advanced security research โ€“ Sophos Intercept X Advanced uses five kernel drivers for cybersecurity, explaining their functionality, security measures, customer options, gradual rollouts for software updates, and vulnerabilities working in kernel-space. https://news.sophos.com/en-us/2024/08/01/driving-lessons-the-kernel-drivers-in-sophos-intercept-x-advanced/

๐Ÿ’ต Leaked ransomware variants give rise to new cybercrime groups cybercrime โ€“ Cybercriminals exploit leaked ransomware variants, forming groups utilizing multiple ransomware families for attacks and demanding bug bounties, leading to a rise in cybercrime and affiliate programs. https://securelist.com/sexi-key-group-mallox-ransomware/113183/

๐Ÿ›‹๏ธ Education in Secure Software Development security news โ€“ Survey by Linux Foundation and OpenSSF shows developers lack essential secure software development skills, raising concerns about software security. https://www.schneier.com/blog/archives/2024/08/education-in-secure-software-development.html

๐Ÿ‘ฟ Millions of Websites Susceptible to XSS Attack via OAuth Implementation Flaw vulnerability โ€“ Millions of websites vulnerable to XSS attack via OAuth due to flawed implementation, potentially leading to full account takeovers. https://www.securityweek.com/millions-of-websites-susceptible-xss-attack-via-oauth-implementation-flaw/

๐Ÿ›œ WifiForge โ€“ WiFi Exploitation for the Classroom hacking write-up โ€“ WifiForge, a program allowing safe WiFi hacking lessons through an interactive virtual network platform called Mininet-Wifi. WifiForge facilitates teaching various exploits with pre-built labs, such as WEP key-cracking, eliminating the need for physical network gear. https://www.blackhillsinfosec.com/wififorge/

๐Ÿง One Does Not Simply โ€ฆ Get a Cybersecurity Job security news โ€“ Getting a cybersecurity job requires upskilling, certifications, networking, staying informed on trends, and focusing on job opportunities from within your network. https://www.guidepointsecurity.com/blog/one-does-not-simply-get-a-cybersecurity-job/


CISA Corner

โš ๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA adds three actively exploited vulnerabilities to catalog: ServiceNow input validation issues and Acronis default password flaw. https://www.cisa.gov/news-events/alerts/2024/07/29/cisa-adds-three-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog vulnerability โ€“ CVE-2024-37085 VMware ESXi Authentication Bypass. https://www.cisa.gov/news-events/alerts/2024/07/30/cisa-adds-one-known-exploited-vulnerability-catalog

๐Ÿ Apple Releases Security Updates for Multiple Products vulnerability โ€“ Apple issued security updates for Safari, iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. https://www.cisa.gov/news-events/alerts/2024/07/30/apple-releases-security-updates-multiple-products

โฐ DigiCert Certificate Revocations security news โ€“ DigiCert is revoking TLS certificates due to a domain control verification issue, potentially causing temporary disruptions, with updated information available on their status page. https://www.cisa.gov/news-events/alerts/2024/07/30/digicert-certificate-revocations

๐Ÿง‘โ€๐Ÿญ CISA Releases Nine Industrial Control Systems Advisories vulnerability โ€“ vulnerabilities in various systems like Johnson Controls, AVTECH IP Camera, Vonets WiFi Bridges, and Rockwell Automation Logix Controllers. https://www.cisa.gov/news-events/alerts/2024/08/01/cisa-releases-nine-industrial-control-systems-advisories


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿง‘โ€๐Ÿ’ป Double Dipping Cheat Developer Gets Caught Red-Handed security research โ€“ EvolvedAim cheat developer includes information stealer, targeting Escape From Tarkov players, double-dipping into profits, and causing significant damage. https://www.cyberark.com/resources/threat-research-blog/double-dipping-cheat-developer-gets-caught-red-handed

๐Ÿ”‚ Anyone can Access Deleted and Private Repository Data on GitHub security research โ€“ GitHub exposes deleted and private repository data, posing security risks through Cross Fork Object Reference (CFOR) vulnerability. https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github

๐Ÿ‘ป A Hacker โ€˜Ghostโ€™ Network Is Quietly Spreading Malware on GitHub security research โ€“ A network of 3,000 'ghost' accounts on GitHub spreading ransomware and info stealers using fake likes and shares. https://www.wired.com/story/github-malware-spreading-network-stargazer-goblin/

๐Ÿ—ณ๏ธ Understanding the Election Cybersecurity Landscape cyber defense โ€“ Complex election cybersecurity landscape includes diverse targets, tactics, and actors; understanding essential for safeguarding democracy. https://www.greynoise.io/blog/understanding-the-election-cybersecurity-landscape

๐Ÿ’ฐ Oracle coughs up $115M to make privacy case go away privacy โ€“ Oracle settles $115 million class action lawsuit over alleged misuse of user data, promising privacy improvements. https://www.theregister.com/2024/07/22/oracle_settles_privacy_case/

๐Ÿ“ฒ Telegram 0-day allowed sending malicious APKs disguised as videos security news โ€“ ESET discovers Telegram Android zero-day exploit EvilVideo, allowing attackers to send malicious APKs disguised as videos. https://securityaffairs.com/166042/hacking/evilvideo-telegram-android-zero-day.html

๐ŸŽฒ Chinese โ€˜cybercrime syndicateโ€™ behind gambling sites advertised at European sporting events cybercrime โ€“ Infoblox uncovers Chinese cybercrime syndicate Vigorish Viper behind illegal global gambling network connected to human trafficking and cyber fraud. https://therecord.media/chinese-cybercrime-syndicate-gambling-football-europe

๐Ÿช Google abandons plan to drop third-party cookies in Chrome privacy โ€“ Google opting for user choice between Privacy Sandbox and cookies amidst concerns of competitive distortion. https://www.theregister.com/2024/07/23/google_cookies_third_party_continue/

๐Ÿ“ฒ iOS 17: Von einem iPhone kontaktierte Domains privacy https://www.kuketz-blog.de/ios-17-von-einem-iphone-kontaktierte-domains/

๐Ÿฅถ Simple โ€˜FrostyGoopโ€™ malware responsible for turning off Ukrainiansโ€™ heat in January attack security research โ€“ Simple but impactful FrostyGoop malware uses Modbus protocol to disrupt heating in Ukrainian apartment buildings, showcasing attackers' focus on critical infrastructure. https://cyberscoop.com/frostygoop-ics-malware-dragos-ukraine/

๐Ÿ’ฅ Inside the 78 minutes that took down millions of Windows machines security news โ€“ A faulty update by cybersecurity company CrowdStrike caused global Windows crashes, affecting millions of machines due to a driver flaw. Prospects to avoid such tech disasters involve enabling intelligent boot logic and limiting third-party kernel access. https://www.theverge.com/2024/7/23/24204196/crowdstrike-windows-bsod-faulty-update-microsoft-responses

๐Ÿชผ AI-Powered Voice Spoofing for Next-Gen Vishing Attacks security research โ€“ AI-powered voice cloning advancements enable more realistic vishing attacks, posing significant security risks. Mandiant Red Team incorporated AI voice spoofing in testing, showcasing attackers' potential to exploit this technique for initial access, lateral movement, and privilege escalation. Security defenses must adapt through identifying inconsistencies, source verification, and implementing audio protection measures. https://cloud.google.com/blog/topics/threat-intelligence/ai-powered-voice-spoofing-vishing-attacks/

๐Ÿค‘ TracFone to pay $16 million to settle FCC cyber and privacy investigation security news โ€“ TracFone Wireless, owned by Verizon, will pay a $16 million fine to settle an FCC investigation into data breaches caused by API vulnerabilities. The breaches exposed customer data, leading to privacy compromises, necessitating improved API security measures and overall information security protocols. https://therecord.media/tracfone-16-million-to-settle-fcc-investigation

๐Ÿ—บ๏ธ Friendly Domain Registry โ€œ.topโ€ Put on Notice security news โ€“ ICANN has issued a warning to the .top domain registry, expressing concerns over its failure to address phishing reports and suspend abusive domains, with reports showing .top domains were popular choices for phishing websites. https://krebsonsecurity.com/2024/07/phish-friendly-domain-registry-top-put-on-notice/

๐ŸŽฐ Philippines to end online casinos, maybe scams too cybercrime โ€“ The Philippines aims to shut down online gambling providers embroiled in crimes like tax evasion and human trafficking. Despite economic benefits, the industry faces international pressure due to illicit activities such as scams and exploitation. https://www.theregister.com/2024/07/24/phillipines_bans_online_gambling_operators/

๐Ÿฆธ Google's reCAPTCHA v2 just labor exploitation, boffins say security research โ€“ Researchers criticize Google's reCAPTCHA v2, suggesting it exploits human labor without providing significant security benefits, raising concerns about information harvesting and user experience. https://www.theregister.com/2024/07/24/googles_recaptchav2_labor/

๐Ÿšธ School in hot water over facial recognition in canteen privacy โ€“ ICO reprimands a UK school for introducing facial recognition for canteen payments without proper assessments, consent, or consultation, highlighting the importance of data protection in new technologies at educational institutions. https://www.theregister.com/2024/07/24/essex_school_facial_recognition/

๐Ÿงช CrowdStrike blames test software for taking down 8.5 million Windows machines security news โ€“ CrowdStrike attributes the issue that caused 8.5 million Windows machines to crash to a bug in their test software that failed to properly validate a content update, leading to detailed post-incident corrective measures for improved testing and deployment processes. https://www.theverge.com/2024/7/24/24205020/crowdstrike-test-software-bug-windows-bsod-issue

๐Ÿ† SEXi / APT Inc Ransomware โ€“ What You Need To Know cybercrime โ€“ The SEXi ransomware group targets VMware ESXi servers, encrypting virtual machine-related files and demanding high ransoms. Victims' files are appended with '.SEXi' and a ransom note named SEXi.txt is left. No known weaknesses exist for data recovery. Protection includes updating systems, disabling default accounts, and using strong, unique passwords. https://www.tripwire.com/state-of-security/sexi-apt-inc-ransomware-what-you-need-know

๐ŸŽฎ LummaC2 Malware Abusing the Game Platform 'Steam' security research โ€“ LummaC2 malware disguised as illegal programs uses SEO poisoning and abuse of Steam to acquire C2 domains, targeting wallets, browsers, extensions, and more. https://asec.ahnlab.com/en/68309/


Some More, For the Curious

๐Ÿ”ญ Astronomers discover technique to spot AI fakes using galaxy-measurement tools security research โ€“ University of Hull researchers use astronomy tools to detect AI-generated deepfake images by analyzing eye reflections for inconsistencies. https://arstechnica.com/information-technology/2024/07/astronomers-discover-technique-to-spot-ai-fakes-using-galaxy-measurement-tools/

๐Ÿ™‹โ€โ™‚๏ธ Ransomware takedowns leave crims scrambling for stability security news โ€“ Europol reports ransomware landscape fragmentation post RaaS disruptions, with criminals adapting by working independently or developing own payloads. https://www.theregister.com/2024/07/22/europol_says_ransomware_takedowns_make/

โ›” DDoS-for-hire site DigitalStress taken down by police, suspected owner arrested cybercrime โ€“ DDoS-for-hire site DigitalStress taken down by police, data collected from users, suspected owner arrested in Northern Ireland. https://www.bitdefender.com/blog/hotforsecurity/ddos-for-hire-site-digitalstress-taken-down-by-police-suspected-owner-arrested/

๐Ÿ’ผ Cyber firm KnowBe4 hired a fake IT worker from North Korea security news โ€“ KnowBe4 discovered a North Korean threat actor posing as a remote IT worker through an elaborate deception involving stolen identities and AI-augmented imagery, prompting an investigation and alerting authorities as part of the response. https://cyberscoop.com/cyber-firm-knowbe4-hired-a-fake-it-worker-from-north-korea/

๐Ÿ๏ธ Unfashionably secure: why we use isolated VMs cyber defense โ€“ Canary's security architecture relies on isolated VMs for complete customer data separation, safeguarding against unauthorized access and ensuring individual tenant privacy, despite operational drawbacks. https://blog.thinkst.com/2024/07/unfashionably-secure-why-we-use-isolated-vms.html

๐Ÿฅผ Build a Home Lab: Equipment, Tools, and Tips cyber defense โ€“ Building a home lab with virtual machines allows for experimentation and learning in a safe environment, emphasizing the importance of commitment over expensive equipment. Fundamental components include network setup, virtual machines, and physical hardware, and key considerations include VM options, equipment needs, and backup strategies. https://www.blackhillsinfosec.com/build-a-home-lab-equipment-tools-and-tips/

๐Ÿช– North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regimeโ€™s Military and Nuclear Programs cybercrime โ€“ North Korea's Andariel cyber group targets aerospace, nuclear, and defense industries for espionage, using ransomware to fund operations. Known for sophisticated reconnaissance, custom and commodity malware, system manipulation, credential theft, lateral movement, and data exfiltration. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a

๐ŸŒŠ Zero Day Initiative โ€” Multiple Vulnerabilities in the Deep Sea Electronics DSE855 security research โ€“ ZDI reported multiple vulnerabilities in Deep Sea Electronics DSE855, prompting no response from the vendor and leading to zero-day disclosure in June. Lack of authentication in configuration backup allowed unauthorized access. https://www.thezdi.com/blog/2024/7/25/multiple-vulnerabilities-in-the-deep-sea-electronics-dse855

๐Ÿ” Secure Boot is completely broken on 200+ models from 5 big device makers vulnerability โ€“ Cryptographic key underpinning Secure Boot compromised in 2022, allowing an unlimited bypass on over 200 device models from major manufacturers. Serious doubts raised about the integrity of Secure Boot. https://arstechnica.com/security/2024/07/secure-boot-is-completely-compromised-on-200-models-from-5-big-device-makers/

๐Ÿ—ฃ๏ธ Microsoft calls for Windows changes and resilience after CrowdStrike outage security news โ€“ Microsoft calls for Windows changes for resilience after CrowdStrike outage, considering restricting kernel access for security vendors. https://www.theverge.com/2024/7/26/24206719/microsoft-windows-changes-crowdstrike-kernel-driver

๐Ÿ’‰ French authorities launch disinfection operation to eradicate PlugX malware from infected hostss security news โ€“ French authorities and Europol conduct a 'disinfection operation' against PlugX malware, addressing espionage activities with insights from cybersecurity firm. https://securityaffairs.com/166213/cyber-crime/plugx-malware-disinfection-operation.html


CISA Corner

๐Ÿง‘โ€๐Ÿญ CISA Releases Four Industrial Control Systems Advisories vulnerability โ€“ CISA issues advisories on current ICS security issues for National Instruments and Hitachi products https://www.cisa.gov/news-events/alerts/2024/07/23/cisa-releases-four-industrial-control-systems-advisories vulnerability โ€“ CISA issued advisories for Siemens SICAM and Positron Broadcast Signal Processor. https://www.cisa.gov/news-events/alerts/2024/07/25/cisa-releases-two-industrial-control-systems-advisories

โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA adds two known exploited vulnerabilities to its catalog: CVE-2012-4792 affecting Microsoft Internet Explorer and CVE-2024-39891 affecting Twilio Authy. https://www.cisa.gov/news-events/alerts/2024/07/23/cisa-adds-two-known-exploited-vulnerabilities-catalog

๐Ÿ”’ ISC Releases Security Advisories for BIND 9 security news โ€“ ISC released BIND 9 security advisories addressing vulnerabilities that can lead to denial-of-service attacks. https://www.cisa.gov/news-events/alerts/2024/07/24/isc-releases-security-advisories-bind-9


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐ŸŒ Data Broker Files: How data brokers sell our location data and jeopardise national security privacy โ€“ Data brokers sell German location data, jeopardizing privacy and national security, leading to calls for regulation and concerns about data misuse. https://netzpolitik.org/2024/data-broker-files-how-data-brokers-sell-our-location-data-and-jeopardise-national-security/#netzpolitik-pw

๐Ÿชช It's best to just assume youโ€™ve been involved in a data breach somehow privacy โ€“ Multiple data breaches in 2024, including AT&T and Snowflake, imply personal data compromise. Recommendations include strong passwords, multi-factor authentication, fraud alerts. https://blog.talosintelligence.com/threat-source-newsletter-july-18-2024/

๐Ÿ” Data breach exposes millions of mSpy spyware customers data breach โ€“ Data breach at mSpy exposes millions of customers who purchased phone spyware apps over a decade, revealing emails, personal documents, and requests for surveillance without consent by various individuals including U.S. officials. https://techcrunch.com/2024/07/11/mspy-spyware-millions-customers-data-breach/

๐Ÿ“ฑ The FBI says it has โ€˜gained accessโ€™ to the Trump rally shooterโ€™s phone security news โ€“ The FBI has accessed the phone of the suspect who shot at a Trump rally without disclosing how, continuing analysis of electronic devices and urging the public for tips. https://www.theverge.com/2024/7/15/24199239/fbi-encryption-phone-trump-shooter-pennsylvania-gained-access

๐Ÿง”โ€โ™‚๏ธ Kaspersky leaves U.S. market following the ban on the sale of its software in the country security news โ€“ Kaspersky exits the U.S. market after a ban on its software due to national security risks posed by Russia. The company denies links to the Russian government and will shut down its U.S. operations by September. https://securityaffairs.com/165799/breaking-news/kaspersky-is-leaving-the-u-s-market.html

๐Ÿ’ฐ AT&T ransom laundered through mixers, gambling services cybercrime โ€“ AT&T's $370,000 ransom is being laundered through cryptocurrency mixing platforms and gambling services, identified by TRM Labs. Money laundering tactics include using swap services and privacy coins, often employed by cybercriminals to hide the funds' origins. https://therecord.media/att-ransom-laundered-mixers-research

โ›‘๏ธ Rite Aid says 'limited' cyber incident affected data of 2.2 million people data breach โ€“ Rite Aid reports a 'limited' cyber incident after a hacker impersonated an employee accessing purchase-related data. Law enforcement contacted, victims offered identity protection services. https://therecord.media/rite-aid-data-breach-2-million-people

๐Ÿฆ  Private HTS Program Continuously Used in Attacks malware โ€“ A threat actor has been distributing malware through the private home trading system (HTS) program named HPlus, replacing the NSIS installer with an MSI format installer and supporting remote assistance with AnyDesk. The malware includes Quasar RAT aimed at stealing personal data. https://asec.ahnlab.com/en/67969/

๐Ÿช“ HardBit Ransomware โ€“ What You Need to Know malware โ€“ HardBit ransomware, a ransomware-as-a-service (RaaS), resurfaces with a new version, HardBit 4.0, focused on thwarting security researchers with passphrase protection and improved customization that caters to different criminal operator technical levels. https://www.tripwire.com/state-of-security/hardbit-ransomware-what-you-need-know

๐Ÿ’ฆ Leaked Docs Show What Phones Cellebrite Can (and Canโ€™t) Unlock security news โ€“ Cellebrite struggled to unlock a significant portion of modern iPhones as of April 2024, per leaked documents. https://www.404media.co/leaked-docs-show-what-phones-cellebrite-can-and-cant-unlock/

๐Ÿณ๏ธโ€๐ŸŒˆ LGBTQ+ people in Middle East and North Africa subject to intense digital oppression, research finds privacy โ€“ LGBTQ+ individuals face intense digital oppression, with police using dating and social media apps for persecution. Research reveals high levels of violence, forced device searches, and abuse. https://therecord.media/lgbtq-mena-region-digital-harassment

๐Ÿ›œ Mobile internet and social media disrupted in Bangladesh amid student protests security news โ€“ Bangladesh orders a nationwide mobile internet shutdown amid violent student protests against a government job quota system. The disruption is linked to social media usage by protesters. https://therecord.media/bangladesh-mobile-internet-social-media-outages-student-protests

๐Ÿ  How a little-known tool is sweeping the real estate industry by giving instant access to vast amounts of homebuyer data security news โ€“ Forewarn app offers real estate professionals instant access to detailed data about prospective clients for a low fee. Although primarily marketed as a safety tool, it also provides financial and criminal records instantly. However, privacy concerns and potential for misusing the data exist despite its explosive adoption in the real estate industry. https://therecord.media/forewarn-app-real-estate-homebuyer-data

๐Ÿฅ MediSecure data breach impacted 12.9 million individuals data breach โ€“ Australian digital prescription provider MediSecure suffered a ransomware attack exposing personal and health information of 12.9 million individuals. The breach resulted in the theft of 6.5TB of data impacting users between March 2019 and November 2023. https://securityaffairs.com/165932/uncategorized/medisecure-databreach-12-9m-individuals.html

Crowdstrike Corner ๐Ÿšจ Global Microsoft Meltdown Tied to Bad Crowdstrike Update security news โ€“ Crowdstrike update causes global Windows system crashes; airports, hospitals, and businesses affected. Recovery may take time, requiring manual fix per machine. https://krebsonsecurity.com/2024/07/global-microsoft-meltdown-tied-to-bad-crowstrike-update/

๐Ÿฆโ€โฌ› What is CrowdStrike, and what happened? security news โ€“ CrowdStrike caused a global outage after a faulty update to Windows machines, affecting essential services. The issue came from an update that caused Windows systems to crash. Recovery may take days to weeks. https://www.theverge.com/2024/7/19/24201864/crowdstrike-outage-explained-microsoft-windows-bsod

๐Ÿ›น Threat actors attempted to capitalize CrowdStrike incident security news โ€“ Threat actors exploit CrowdStrike IT outage to distribute Remcos RAT malware in a Latin America-targeted campaign under the disguise of an emergency fix via a ZIP file named 'crowdstrike-hotfix.zip.' CrowdStrike provides IOCs for the malicious campaign. https://securityaffairs.com/165953/uncategorized/threat-actors-capitalize-crowdstrike-incident.html


Some More, For the Curious

โžฟ CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks security research โ€“ CVE-2024-38112 used by Void Banshee to exploit IE vulnerability, leading to Atlantida stealer deployment against Windows users. https://www.trendmicro.com/en_us/research/24/g/CVE-2024-38112-void-banshee.html

๐Ÿ–ผ๏ธ Fake AWS Packages Ship Command and Control Malware In JPEG Files security research โ€“ Fake AWS npm packages hide command and control malware in JPEG images, jeopardizing package installations and highlighting the need for increased vigilance in open source ecosystems. https://blog.phylum.io/fake-aws-packages-ship-command-and-control-malware-in-jpeg-files/

0๏ธโƒฃ Zero Day Initiative โ€“ Uncoordinated Vulnerability Disclosure: The Continuing Issues with CVD security news โ€“ Gap in coordinated vulnerability disclosure leads to lack of vendor transparency, disputes on severity ratings, and challenges in bug reporting, highlighting the importance of improved communication and accountability within the cybersecurity industry. https://www.thezdi.com/blog/2024/7/15/uncoordinated-vulnerability-disclosure-the-continuing-issues-with-cvd

๐Ÿฅด Weak Security Defaults Enabled Squarespace Domains Hijacks โ€“ Krebs on Security security news โ€“ Weak security defaults at Squarespace allowed domain hijacking incidents targeting cryptocurrency businesses, with vulnerabilities arising from the migration process from Google Domains, lack of email verification for new accounts, and limited control over account access and activity. https://krebsonsecurity.com/2024/07/researchers-weak-security-defaults-enabled-squarespace-domains-hijacks/

๐Ÿƒ Punch Card Hacking โ€“ Exploring a Mainframe Attack Vector security research โ€“ Article explores using punch card concepts in mainframe hacking for penetration testing, detailing JCL basics, FTP job submission, debugging with spool files, and potential privilege escalation. https://blog.nviso.eu/2024/07/16/punch-card-hacking-exploring-a-mainframe-attack-vector/

๐Ÿ‘ป โ€˜GhostEmperorโ€™ returns: Mysterious Chinese hacking group spotted for first time in two years cybercrime โ€“ After a two-year hiatus, the sophisticated Chinese hacking group GhostEmperor, known for supply-chain attacks in Southeast Asia, has reappeared, deploying a rootkit to evade detection and carrying out attacks on business partners as seen in a recent incident investigated by cybersecurity company Sygnia. https://therecord.media/ghostemperor-spotted-first-time-in-two-years

๐Ÿง‘โ€๐Ÿ’ผ Vulnerability in Cisco Smart Software Manager lets attackers change any user password vulnerability โ€“ Cisco Smart Software Manager On-Prem vulnerability (CVE-2024-20419) allows unauthorized users to change any user's password, posing a severe security risk with a maximum CVSS score of 10. https://arstechnica.com/security/2024/07/vulnerability-in-cisco-smart-software-manager-lets-attackers-change-any-user-password/

โš–๏ธ Judge dismisses much of SEC suit against SolarWinds over cybersecurity disclosures security news โ€“ U.S. Judge dismissed most SEC claims against SolarWinds related to cybersecurity disclosures regarding the Sunburst attack. The ruling is seen as a victory for industry officials and a setback for SEC in holding executives accountable. https://cyberscoop.com/judge-dismisses-much-of-sec-suit-against-solarwinds-over-cybersecurity-disclosures/

๐Ÿค’ APT41 Has Arisen From the DUST security research โ€“ APT41, in collaboration with Google's TAG, launched a campaign targeting various sectors across multiple countries, using techniques like web shells, backdoors, SQL export, and OneDrive exfiltration. https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust/

๐Ÿง‘โ€๐Ÿญ CISA publishes resilience-planning playbook for critical infrastructure cyber defense โ€“ CISA releases playbook for infrastructure resilience planning, aiming to enhance security and minimize impact of cyberattacks on critical infrastructure. https://statescoop.com/cisa-cybersecurity-resilience-planning-playbook-critical-infrastructure/

๐Ÿ”’ Cisco fixed a critical flaw in Security Email Gateway that could allow attackers to add root users vulnerability โ€“ Cisco fixed a critical vulnerability in Secure Email Gateway allowing attackers to add root users and crash SEG appliances. https://securityaffairs.com/165905/uncategorized/cisco-fixed-a-critical-flaw-in-security-email-gateway-that-could-allow-attackers-to-add-root-users.html

๐Ÿ–ฒ๏ธ Attacking Connection Tracking Frameworks as used by Virtual Private Networks security research โ€“ Study demonstrates successful attacks on VPN connection tracking frameworks, highlighting vulnerabilities and proposing mitigations for enhanced security and privacy. https://petsymposium.org/popets/2024/popets-2024-0070.pdf


CISA Corner KEV โ€“ Adobe, Solarwinds, vmware, OSGeo https://www.cisa.gov/news-events/alerts/2024/07/15/cisa-adds-one-known-exploited-vulnerability-catalog https://www.cisa.gov/news-events/alerts/2024/07/17/cisa-adds-three-known-exploited-vulnerabilities-catalog security updates โ€“ Cisco, Ivanti, Oracle https://www.cisa.gov/news-events/alerts/2024/07/18/cisco-releases-security-updates-multiple-products https://www.cisa.gov/news-events/alerts/2024/07/18/ivanti-releases-security-updates-endpoint-manager https://www.cisa.gov/news-events/alerts/2024/07/18/oracle-releases-critical-patch-update-advisory-july-2024 industrial โ€“ rockwell, Subnet, Philips, Mitsubishi https://www.cisa.gov/news-events/ics-advisories/icsa-24-198-01 https://www.cisa.gov/news-events/ics-advisories/icsa-24-200-02 https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01 https://www.cisa.gov/news-events/ics-advisories/icsa-24-200-01


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿช Linksys-Router senden wohl WLAN-Passwรถrter an US-Server security research โ€“ zwei getestete Routermodelle รผbermitteln wohl sensible Daten an einen Server in den USA. https://www.golem.de/news/im-klartext-linksys-router-senden-wohl-wlan-passwoerter-an-us-server-2407-186894.html

๐Ÿ Apple warns iPhone users in 98 countries of spyware attacks warning โ€“ Apple warns iPhone users globally about targeted mercenary spyware attacks, emphasizing privacy and ongoing threat notifications. https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/

๐ŸŽ“ โ€˜Serious hacker attackโ€™ forces Frankfurt university to shut down IT systems cyberattack โ€“ Frankfurt University of Applied Sciences faces a hacker attack, leading to a total IT system shutdown, impacting services and communication. https://therecord.media/serious-hacker-attack-shutdown-frankfurt

โ€ผ๏ธ Scammers double-dip by offering help to recover from scams warning โ€“ Scammers target victims of previous scams with fake offers to recover lost money, posing as trusted entities and requesting upfront fees or sensitive information, with the most vulnerable being victims over 65 years old. https://www.theregister.com/2024/07/09/australia_rescam_warning/

๐Ÿƒโ€โ™‚๏ธ Gadgetbridge: Smartwatches/Fitness-Tracker datenschutzfreundlich nutzen โ€“ Teil 1 privacy โ€“ Gadgetbridge ist eine datenschutzfreundliche Open-Source-App fรผr Android, die es ermรถglicht, Smartwatches und Fitness-Tracker unabhรคngig von den herstellereigenen Apps zu verwenden, um die volle Kontrolle รผber persรถnliche Daten zu behalten und lokale Speicherung zu gewรคhrleisten. https://www.kuketz-blog.de/gadgetbridge-smartwatches-fitness-tracker-datenschutzfreundlich-nutzen-teil-1/

๐Ÿ”ฎ Avast released a decryptor for DoNex Ransomware and its predecessors security news โ€“ Avast developed a decryptor for the DoNex ransomware family due to a cryptographic flaw, allowing victims to recover files for free since March 2024. https://securityaffairs.com/165469/malware/donex-ransomware-decryptor.html

๐Ÿป Apple removed 25 VPN apps from the App Store in Russia privacy โ€“ Apple removed 25 VPN apps from the Russian App Store due to government requests, part of Russia's control over internet access, leading to bypass difficulty for users. https://securityaffairs.com/165437/hacking/apple-removed-vpn-apps-from-app-store-in-russia.html

๐ŸŽซ The Ticketmaster Hack Is Becoming a Logistical Nightmare for Fans and Brokers data breach โ€“ A hacking group released data allowing the creation of over 38,000 concert tickets, posing a potential logistical nightmare for Ticketmaster, venues, fans, brokers, and resale platforms. The hack can lead to issues such as duplicated tickets for sold seats and legitimate buyers being denied entry. https://www.404media.co/the-ticketmaster-hack-is-becoming-a-logistical-nightmare-for-fans-and-brokers/

๐Ÿฅ“ More than 31M email addresses exposed following Neiman Marcus data breach data breach โ€“ Neiman Marcus data breach exposed over 31 million customer email addresses, affecting 64,472 individuals with leaked names, addresses, and more sold by threat actors. https://securityaffairs.com/165492/data-breach/neiman-marcus-data-breach-2.html

๐Ÿค– US, international authorities seize Russian AI bot farm cybercrime โ€“ U.S. authorities seized Russian AI bot farm domains linked to RT, accusing operatives of using Meliorator software to create social media personas and spread disinformation primarily aimed at U.S. politics. https://cyberscoop.com/us-international-authorities-seize-russian-ai-bot-farm/

๐Ÿช› Googleโ€™s dark web monitoring service will soon be free for all users security news โ€“ Google's dark web monitoring service, previously exclusive to Google One subscribers, will be free for all Google account holders starting soon, providing a combined solution to protect online presence. https://www.theverge.com/2024/7/9/24194970/google-one-free-dark-web-monitoring

๐Ÿ•ต๏ธ Hacktivists release two gigabytes of Heritage Foundation data data breach โ€“ The hacktivist group SiegedSec released two gigabytes of data from the Heritage Foundation in response to their Project 2025 initiative, claiming they wanted to expose supporters of the conservative think tank; however, Heritage denies being hacked, stating the data was from a publicly accessible archive. https://cyberscoop.com/hackvists-release-two-gigabytes-of-heritage-foundation-data/

๐Ÿ“ฐ How disinformation from a Russian AI spam farm ended up on top of Google search results security research โ€“ A piece of Russian disinformation about Ukrainian president's wife buying a luxury car spread rapidly online, originating from a fake French website and promoted by pro-Kremlin accounts. https://arstechnica.com/ai/2024/07/how-disinformation-from-a-russian-ai-spam-farm-ended-up-on-top-of-google-search-results/

๐Ÿฆ Scammers harness AI and deepfakes to sell bogus โ€˜miracle curesโ€™ on Meta platforms security news โ€“ Artificial intelligence and deepfake videos fuel health-related scam campaigns on Meta platforms, promoting fake 'miracle cures' endorsed by celebrities and bogus medical experts, targeting millions of users worldwide, based on research by Bitdefender Labs. https://therecord.media/scammers-harness-ai-deepfakes-medical-bogus

๐Ÿ™Š Spear phishing techniques in mass phishing: a new trend security news โ€“ An increasing trend shows elements of spear phishing being incorporated into regular mass phishing campaigns, with sophisticated email design, personalized details, and imitation of HR notifications, showcasing a shift in attackers' techniques and an escalation in decentralized attacks. https://securelist.com/spear-phishing-meets-mass/113125/

๐Ÿฆน RansomHub Ransomware โ€“ What You Need To Know cybercrime โ€“ RansomHub, a Ransomware-as-a-Service group, exploits a vulnerability in the email servers and has quickly risen as a significant threat. https://www.tripwire.com/state-of-security/ransomhub-ransomware-what-you-need-know

๐Ÿ“ฑ You can now protect your high-risk Google account with just your phone privacy โ€“ Google's Advanced Protection Program now allows high-risk users to enroll using a single phone-based passkey. https://www.theverge.com/2024/7/10/24195306/google-accounts-advanced-protection-passkey-enrollment-support-security-key

๐Ÿ“ž AT&T breach leaked call and text records from โ€˜nearly allโ€™ wireless customers data breach โ€“ accessed through a third-party cloud platform. https://www.theverge.com/2024/7/12/24197052/att-data-breach-call-text-records-hack


Some More, For the Curious

๐Ÿ”ฆ Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough hacking writeup โ€“ Shelltorch exposes critical vulnerabilities in PyTorch TorchServe, allowing remote code execution and unauthorized server access. https://www.oligo.security/blog/shelltorch-explained-multiple-vulnerabilities-in-pytorch-model-server

โš ๏ธ CVE-2024-4577 Exploits in the Wild One Day After Disclosure security research โ€“ Exploitation of PHP vulnerability CVE-2024-4577 for remote code execution with malicious PHP code, emphasizing swift patching and monitoring. https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure

๐Ÿง‘โ€๐Ÿฆฏ CISA broke into a US federal agency, and no one noticed for a full 5 months security news โ€“ CISA red team exercise uncovers security flaws at US federal agency, lasting undetected for five months. https://www.theregister.com/2024/07/12/cisa_broke_into_fed_agency/

๐ŸŒ Emboldened and Evolving: A Snapshot of Cyber Threats Facing NATO security news โ€“ NATO faces cyber threats from state-sponsored actors, hacktivists, and cybercriminals, impacting espionage, disruptive attacks, and disinformation campaigns targeting critical infrastructure and political entities. https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-facing-nato/

๐Ÿฆท Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK security research โ€“ Exploring the prioritization of MITRE ATT&CK techniques for detection in Security Operation Centers, Threat Intelligence, and Incident Response. Emphasizing source evaluation, technique relevance, and optimizing detection logic development. https://securelist.com/detection-engineering-backlog-prioritization/113099/

โ˜ข๏ธ New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere security news โ€“ A new attack named Blast RADIUS exploits the 30-year-old RADIUS protocol due to its continued use of MD5, despite known vulnerabilities, allowing adversaries to gain admin access to various networks; the attack has led to a coordinated response from vendors. https://arstechnica.com/security/2024/07/new-blast-radius-attack-breaks-30-year-old-protocol-used-in-networks-everywhere/

๐Ÿ—ž๏ธ Chinese cyber agency accused of 'false and baseless' claims about US interfering in Volt Typhoon research security news โ€“ China's cybersecurity agency inaccurately claimed a U.S. threat intelligence company succumbed to U.S. influence, mischaracterizing the company's report on Dark Power ransomware, leading to pushback and accusations of false representation and manipulation from Western organizations. https://therecord.media/china-cyber-agency-claims-us-interference-volt-typhoon-research

๐Ÿ“ง Exim vulnerability affecting 1.5M servers lets attackers attach malicious files vulnerability โ€“ 1.5 million servers with Exim mail agent are vulnerable to delivering malicious executable attachments due to a critical CVE-2024-39929, prompting urgent updates to address the security issue. https://arstechnica.com/security/2024/07/more-than-1-5-million-email-servers-running-exim-vulnerable-to-critical-attacks/

๐Ÿชฐ Palo Alto Networks fixed a critical bug in the Expedition tool vulnerability โ€“ Palo Alto Networks fixed an admin account takeover bug in its Expedition tool and addressed multiple other vulnerabilities impacting its products. https://securityaffairs.com/165641/security/palo-alto-networks-critical-bug-expedition.html

๐Ÿ” The president ordered a board to probe a massive Russian cyberattack. It never did. security news โ€“ Despite a directive to investigate the SolarWinds attack, the Cyber Safety Review Board did not conduct the investigation, raising concerns about government accountability and cybersecurity oversight. https://arstechnica.com/security/2024/07/the-president-ordered-a-board-to-probe-a-massive-russian-cyberattack-it-never-did/

๐Ÿ’ฐ Wallets tied to CDK ransom group received $25 million two days after attack cybercrime โ€“ CDK Global paid over $25 million in ransom following a ransomware attack, with most of the funds going through a complex money laundering process involving multiple exchanges. https://cyberscoop.com/cdk-ransom-blacksuit-25-million/

๐Ÿ“… DDoSecrets Mirrors Wikileaks Data After Assange Plea Deal security news โ€“ DDoSecrets mirrored Wikileaks data to preserve transparency and ensure data availability, following Julian Assange's plea deal. https://www.404media.co/ddosecrets-mirrors-wikileaks-data-after-assange-plea-deal/

๐Ÿญ Critical infrastructure organizations want CISA to dial back cyber reporting security news โ€“ Critical infrastructure organizations request scaled-back cyber reporting to CISA, expressing concerns over definitions, reporting entities resource burden. https://cyberscoop.com/cisa-cyber-reporting-circia-2024/

๐Ÿ Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine security research โ€“ JFrog Security Research prevented a potential severe supply chain attack by detecting and reporting a leaked access token compromising Python infrastructure. https://jfrog.com/blog/leaked-pypi-secret-token-revealed-in-binary-preventing-suppy-chain-attack/

7๏ธโƒฃ The Stark Truth Behind the Resurgence of Russiaโ€™s Fin7 cybercrime โ€“ The notorious Fin7 cybercrime group reemerges, setting up thousands of malicious sites targeting various brands for phishing attacks. https://krebsonsecurity.com/2024/07/the-stark-truth-behind-the-resurgence-of-russias-fin7/


CISA Corner

๐Ÿฆฟ Peopleโ€™s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action security research โ€“ APT40 compromises organization networks via multiple access vectors with enumeration, web shells, and exfiltration of sensitive data, leading to targeted threat actor investigation. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-190a

๐Ÿ›ก๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA lists three actively exploited vulnerabilities: Rejetto HTTP File Server flaw, Windows Hyper-V privilege escalation issue, and Windows MSHTML platform spoofing flaw. https://www.cisa.gov/news-events/alerts/2024/07/09/cisa-adds-three-known-exploited-vulnerabilities-catalog

CISA Releases Seven Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2024/07/09/cisa-releases-seven-industrial-control-systems-advisories CISA Releases Twenty-one Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2024/07/11/cisa-releases-twenty-one-industrial-control-systems-advisories Adobe Releases Security Updates for Multiple Products https://www.cisa.gov/news-events/alerts/2024/07/09/adobe-releases-security-updates-multiple-products Microsoft Releases July 2024 Security Updates https://www.cisa.gov/news-events/alerts/2024/07/09/microsoft-releases-july-2024-security-updates Citrix Releases Security Updates for Multiple Products https://www.cisa.gov/news-events/alerts/2024/07/09/citrix-releases-security-updates-multiple-products


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿšจ Hijacked: How hacked YouTube channels spread scams and malware cybercrime โ€“ Cybercriminals hijack YouTube channels to spread scams and malware, targeting viewers and content creators. https://www.welivesecurity.com/en/scams/hijacked-hacked-youtube-channels-scams-malware/

๐Ÿš“ Police allege 'evil twin' in-flight Wi-Fi used to steal info cybercrime โ€“ Australian man charged for creating fake in-flight Wi-Fi network to steal credentials; AFP warns against using public Wi-Fi without precautions. https://www.theregister.com/2024/07/01/australia_evil_twin_wifi_airline_attack/

๐Ÿ“น San Francisco app livestreams local bars to draw more patrons privacy โ€“ 2Night app allows livestreaming of SF bars, raising privacy concerns and backlash from patrons and venue owners. https://sfstandard.com/2024/06/29/2night-live-stream-bars-privacy-concerns/

๐Ÿฅ LockBit claims cyberattack on Croatiaโ€™s largest hospital security news โ€“ LockBit ransomware gang targets Croatia's largest hospital; patient data compromised, impacting emergency services and hospital operations. https://therecord.media/lockbit-claims-cyberattack-croatia-hospital

โš ๏ธ 3 million iOS and macOS apps were exposed to potent supply-chain attacks vulnerability โ€“ Vulnerabilities in CocoaPods server exposed 3 million iOS and macOS apps to code injection attacks for a decade. https://arstechnica.com/?p=2034866

๐Ÿ”‘ The End of Passwords? Embrace the Future with Passkeys. security news โ€“ Passkeys offer enhanced security and privacy, along with convenience, as a passwordless authentication solution. https://blog.nviso.eu/2024/07/02/the-end-of-passwords-embrace-the-future-with-passkeys/

๐Ÿ•ต๏ธ Fiverr Freelancers Offer to Dox Anyone With Powerful U.S. Data Tool security news โ€“ Fiverr freelancers offer doxing services with access to data tool TLOxp https://www.404media.co/fiverr-freelancers-offer-to-dox-anyone-with-powerful-u-s-data-tool-tloxp/

๐Ÿ“ก UN urges Russia to โ€˜immediatelyโ€™ cease interference in European satellites security news โ€“ UN condemns Russian satellite interference, calls for immediate cessation of harmful actions affecting European countries' GPS signals and TV programs. https://therecord.media/un-russia-satellite-interference-europe

๐Ÿชผ Polish government investigates Russia-linked cyberattack on state news agency security news โ€“ Suspicion of Russian involvement in cyberattack on Polish state news agency; aimed at spreading disinformation before European Parliament election. https://securityaffairs.com/165139/intelligence/polish-government-investigating-russia-attack.html

๐ŸŽ’ Alabama Department of Education stops ransomware attack but confirms data stolen data breach โ€“ Alabama Department of Education halts ransomware attack but confirms data breach, potential exposure of student and employee information. https://therecord.media/alabama-education-department-data-breach

๐Ÿ” Google: AI Potentially Breaking Reality Is a Feature Not a Bug security research โ€“ Google researchers co-author a paper detailing real harm caused by generative AI misuse, which can distort reality by producing deceptive content without violating terms of service. It highlights the need for collaboration to address this issue. https://www.404media.co/google-ai-potentially-breaking-reality-is-a-feature-not-a-bug/

โ›“๏ธ New ransomware group uses phone calls to pressure victims, researchers say cybercrime โ€“ New ransomware group Volcano Demon uses phone calls to intimidate victims, threatens to expose data if ransom is not paid. The group employs a double extortion technique and remains a challenge to track. https://therecord.media/ransomware-group-volcano-demon-lukalocker

๐Ÿ”ฅ Traeger smokes security bugs threatening grillers' hard work vulnerability โ€“ Traeger grills vulnerable to high-severity flaw allowing remote attackers to control temperature or shutdown grill; exploitation could ruin cooking. https://www.theregister.com/2024/07/03/traeger_security_bugs/

โ˜˜๏ธ OpenAIโ€™s ChatGPT Mac app was storing conversations in plain text security news โ€“ OpenAI's ChatGPT Mac app stored conversations in plain text; fixed after demonstration, highlighting a potential privacy concern. https://www.theverge.com/2024/7/3/24191636/openai-chatgpt-mac-app-conversations-plain-text

โ˜Ž๏ธ Twilio alerts Authy two-factor app users that โ€˜threat actorsโ€™ have their phone numbers security news โ€“ Twilio alerts Authy users of phone number leak, warns of phishing attacks. Previous breach affects 163 Twilio and 93 Authy accounts, leading to the unauthorized registration of additional devices. https://www.theverge.com/2024/7/3/24191791/twilio-authy-2fa-app-phone-numbers-hack-data-breach

๐Ÿ›ฃ๏ธ Europol says mobile roaming tech is hampering crimefighters security news โ€“ Europol is concerned about SMS home routing that hampers criminal investigations due to privacy-enhancing technologies, specifically service-level encryption, enabling suspects to maintain communication privacy within their home network while roaming. https://www.theregister.com/2024/07/05/europol_home_routing_complaint/

๐Ÿฅท Hackers stole OpenAI secrets in a 2023 security breach security news โ€“ OpenAI faced a security breach in 2023, compromising internal discussions but not source code or customer data. Concerns about AI security and possible cyber espionage linked to nation-state actors raised. https://securityaffairs.com/165349/data-breach/openai-2023-security-breach.html


Some More, For the Curious

โ›” Qualys Security Blog security news โ€“ Qualys blog faced unauthorized spam content, investigated, no impact on customer data, production environment, or data exfiltration. https://blog.qualys.com/qualys-insights/2024/07/03/qualys-blog

๐ŸŒ  Like Shooting Phish in a Barrel security research โ€“ Article explores techniques to bypass email link crawlers used by security gateways, including parsers, CAPTCHAs, redirects, browser fingerprinting, and ASN blocking. https://posts.specterops.io/like-shooting-phish-in-a-barrel-926c1905bb4b

๐Ÿค• Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769 warning โ€“ Threat actors exploit CVE-2024-0769 in D-Link DIR-859 routers for information disclosure. GreyNoise observes attackers collecting account details. https://securityaffairs.com/165045/hacking/d-link-dir-859-actively-exploited.html

โš”๏ธ Sanctioned and exposed, Predator spyware maker group has gone awfully quiet security news โ€“ The Predator spyware group, Intellexa, shows decreased activity post sanctions. Observers suggest impact on operations, but caution about potential retooling. https://cyberscoop.com/sanctioned-and-exposed-predator-spyware-maker-group-has-gone-awfully-quiet/

๐Ÿ”’ Emergency patches now available for Juniper Networks routers vulnerability โ€“ Emergency patches released for Juniper Networks routers to fix critical authentication bypass vulnerability (CVE-2024-2973). Users urged to apply patches promptly. https://www.theregister.com/2024/07/01/emergency_patches_available_for_juniper/

๐Ÿ˜“ TeamViewer: Hackers copied employee directory data and encrypted passwords data breach โ€“ TeamViewer breach linked to Russian government-backed APT29; employee directory data and encrypted passwords stolen. https://therecord.media/teamviewer-cyberattack-employee-directory-encrypted-passwords

๐Ÿฆ‡ Exposing FakeBat loader: distribution methods and adversary infrastructure security research โ€“ Sekoia presents FakeBat loader distribution using malvertising, software impersonation, fake browser updates, and social engineering schemes. https://blog.sekoia.io/exposing-fakebat-loader-distribution-methods-and-adversary-infrastructure/

๐Ÿณ Vulnerabilities in PanelView Plus devices could lead to remote code execution vulnerability โ€“ Microsoft discovered and disclosed RCE and DoS vulnerabilities in Rockwell Automation PanelView Plus devices. https://www.microsoft.com/en-us/security/blog/2024/07/02/vulnerabilities-in-panelview-plus-devices-could-lead-to-remote-code-execution/

๐Ÿฅ… Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers security research โ€“ Recorded Future used infostealer logs to detect consumers of child sexual abuse material on the dark web, aiding law enforcement. https://www.recordedfuture.com/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers

๐Ÿซ… โ€œRegreSSHionโ€ vulnerability in OpenSSH gives attackers root on Linux vulnerability โ€“ Critical OpenSSH vulnerability CVE-2024-6387 allows remote code execution with root system rights on Linux based on glibc systems, leading to full system compromise. https://arstechnica.com/?p=2035011

๐Ÿฉน Splunk fixed tens of flaws in Splunk Enterprise and Cloud Platform vulnerability โ€“ Splunk fixes 16 vulnerabilities in Splunk Enterprise and Cloud Platform, including high-severity flaws like Remote Code Execution. https://securityaffairs.com/165204/security/splunk-enterprise-and-cloud-platform-flaws.html

๐Ÿ’” Secret Network Access Broker x999xx โ€“ Krebs on Security cybercrime โ€“ Russian hacker x999xx, a known access broker, trades network access, databases, and stolen data; identified. Acknowledges identity when reached by email and denies interest in harming healthcare institutions. Operates freely in Russia. https://krebsonsecurity.com/2024/07/the-not-so-secret-network-access-broker-x999xx/

๐Ÿ—ƒ๏ธ Attack Cases Against HTTP File Server (HFS) (CVE-2024-23692) security research โ€“ A remote execution vulnerability in HTTP File Server (HFS) was used to exploit user systems, install malware, and establish malicious backdoors. https://asec.ahnlab.com/en/67650/

๐ŸŒ Europol and pals band together in Cobalt Strike disruption security news โ€“ Europol conducted a week-long operation named Operation Morpheus, disrupting nearly 600 IP addresses linked to illegal copies of Cobalt Strike. https://www.theregister.com/2024/07/04/europol_cobalt_strike_crackdown/

๐Ÿ˜ธ Kimsuky Groupโ€™s New Backdoor Appears (HappyDoor) security research https://asec.ahnlab.com/en/67660/

๐Ÿค– New Golang Zergeca Botnet appeared in the threat landscape malware โ€“ New Golang-based Zergeca Botnet emerges, capable of DDoS attacks and additional functionalities like scanning and reverse shell. https://securityaffairs.com/165288/cyber-crime/golang-based-zergeca-botnet.html

๐Ÿฅง Polyfill.io Supply Chain Attack: Censys detected 384,773 hosts still embedding a polyfill JS script linking to the malicious domain security research โ€“ Censys identifies hosts still linking to the malicious polyfill.io domain, affecting major platforms and websites. https://securityaffairs.com/165302/hacking/polyfill-io-supply-chain-attack.html

๐Ÿชถ Apache fixed a source code disclosure flaw in Apache HTTP Server vulnerability โ€“ Apache fixed a source code disclosure vulnerability (CVE-2024-39884) in Apache HTTP Server, urging users to upgrade promptly. https://securityaffairs.com/165422/security/apache-source-code-disclosure-flaw-apache-http-server.html


CISA Corner

๐Ÿญ CISA Releases Seven Industrial Control Systems Advisories vulnerability โ€“ Johnson Controls, mySCADA, ICONICS, Mitsubishi Electric https://www.cisa.gov/news-events/alerts/2024/07/02/cisa-releases-seven-industrial-control-systems-advisories

๐Ÿ›œ Juniper Networks Releases Security Bulletin for Junos OS: SRX Series vulnerability โ€“ Juniper Networks issued a security bulletin for Junos OS: SRX Series to fix a vulnerability leading to denial-of-service. https://www.cisa.gov/news-events/alerts/2024/07/02/juniper-networks-releases-security-bulletin-junos-os-srx-series

โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog โ€“ Cisco NX-OS warning โ€“ CISA added a known exploited vulnerability (CVE-2024-20399) to its catalog, emphasizing the risks and need for prompt mitigation. https://www.cisa.gov/news-events/alerts/2024/07/02/cisa-adds-one-known-exploited-vulnerability-catalog


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


Highlights

๐Ÿ”’ Brauchst du wirklich ein VPN? privacy โ€“ Share article on privacy with friends via social media. https://www.kuketz-blog.de/brauchst-du-wirklich-ein-vpn/

๐Ÿ’” Europe and Australia will both not break encryption! Weโ€™ve interviewed Patrick Breyer โ€“ the guy who coined the term Chat Control. privacy โ€“ Germany and Australia push back against encryption legislation. https://tuta.com/blog/interview-patrick-breyer-on-chat-control

โš ๏ธ Angriffen gegen รถsterreichische Unternehmen und Organisationen Published warning โ€“ DDoS-Angriffe gegen รถsterreichische Unternehmen und Organisationen. https://www.cert.at/de/aktuelles/2024/6/akute-welle-an-ddos-angriffen-gegen-osterreichische-unternehmen-und-organisationen


News For All

๐ŸŽต Music industry giants allege mass copyright violation by AI firms security news โ€“ Music labels sue AI firms for copyright infringement in training data. https://arstechnica.com/?p=2033128

โ›” Watchlist Internet โ€“ Falscher Ryanair-Support auf X warning โ€“ Scamming customers by requesting passenger details for further checks, apologizing for inconvenience. https://www.watchlist-internet.at/news/falscher-ryanair-support-auf-x/

๐Ÿšจ French police shut down chat website reviled as 'den of predators' cybercrime โ€“ shut down chat website Coco for serious crimes. https://therecord.media/coco-website-takedown-cybercrime-france

๐Ÿ The inside view of spywareโ€™s 'dirty interference,' from two recent Pegasus victims cybercrime โ€“ Activists and journalists targeted by Pegasus spyware face privacy violations and assert their determination. https://therecord.media/pegasus-spyware-victims-sannikov-erlikh

๐Ÿ‘๏ธ Tagesschaukommentar zur Chatkontrolle: Empรถrte Ahnungslosigkeit privacy โ€“ Criticism towards public coverage of the chat monitoring proposal. https://www.kuketz-blog.de/tagesschaukommentar-zur-chatkontrolle-empoerte-ahnungslosigkeit/

๐Ÿ”ž Lawsuit Claims Microsoft Tracked Sex Toy Shoppers With 'Recording in Real Time' Software privacy โ€“ Microsoft accused of tracking sex toy shoppers without consent. https://www.404media.co/lawsuit-claims-microsoft-tracked-sex-toy-shoppers-with-recording-in-real-time-software/

๐Ÿ’ฐ Predators steal additional $10M from crypto scam victims cybercrime โ€“ Crypto scammers pose as lawyers to defraud victims out of $10 million in a year, taking advantage of the vulnerable to extract further payments. https://www.theregister.com/2024/06/25/predators_steal_additional_10m/

๐Ÿ–ฒ๏ธ Organized crime and domestic violence perps buy trackers security research โ€“ Australian study reveals top tracker purchasers linked to organized crime and domestic violence, using devices to facilitate acts like murder, kidnapping, and drug theft. https://www.theregister.com/2024/06/26/criminals_use_gps_bluetooth_trackers/

๐Ÿฆ  If you're using Polyfill.io code on your site โ€“ like 100,000+ are โ€“ remove it immediately malware โ€“ Malicious code injected via Polyfill.io https://www.theregister.com/2024/06/25/polyfillio_china_crisis/

๐Ÿ”“ ID Verification Service for TikTok, Uber, X Exposed Driver Licenses data breach โ€“ AU10TIX, an ID verification service for TikTok, Uber, and X users, exposed administrative credentials online, risking access to users' sensitive data like driver's licenses. https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/

๐Ÿ’ธ US boosts reward for info on 'Missing Cryptoqueen' Ruja Ignatova to $5 million cybercrime โ€“ The US offers $5 million reward for information leading to the arrest of fugitive cryptocurrency fraudster Ruja Ignatova, indicted for alleged role in defrauding victims of over $4 billion in the OneCoin scam and missing since 2017. https://therecord.media/ruja-ignatova-onecoin-cryptoqueen-us-5million-reward

โš–๏ธ Julian Assange pleads guilty, leaves courtroom a free man security news โ€“ Julian Assange pleads guilty to one charge, receives a 62-month sentence which he has already served, leaving him free, following a plea deal, long-standing legal battles, and high-profile leaks through WikiLeaks, including the 'Collateral Murder' video. https://www.theregister.com/2024/06/26/assange_pleads_guilty_sentenced_freed/

๐Ÿ“š Supply Chain Attack on WordPress.org Plugins Leads to 5 Maliciously Compromised WordPress Plugins malware https://www.wordfence.com/blog/2024/06/supply-chain-attack-on-wordpress-org-plugins-leads-to-5-maliciously-compromised-wordpress-plugins/

๐Ÿ’ป How to manage deleted files on iOS, iPadOS, and macOS cyber defense โ€“ To manage and permanently delete files on iOS, iPadOS, and macOS, ensure files are deleted across iCloud sync. Check sync status, sync apps, and activate sync on Apple devices. https://www.theverge.com/24188104/ios-icloud-iphone-mac-delete-files


Some More, For the Curious

โ›‘๏ธ New cyberthreat research for SMB in 2024 security research โ€“ Small Medium Business' face rising cyberthreats requiring multifaceted cybersecurity measures. https://securelist.com/smb-threat-report-2024/113010/

๐Ÿ’ซ CISA confirms hackers may have accessed data from chemical facilities during January incident security news โ€“ CISA confirms potential data access from cyberattack on chemical facilities. https://therecord.media/cisa-confirms-hackers-chemical-facilities

โš”๏ธ Troy Hunt โ€“ The State of Data Breaches data breach โ€“ Challenges in disclosing breaches and notifying victims; bugbears with breach notifications. https://www.troyhunt.com/the-state-of-data-breaches/

๐Ÿคช I am Goot (Loader) security research โ€“ Cybereason investigates GootLoader malware, part of GootKit family, utilized by UNC2565 for post-exploitation. GootLoader leverages SEO for infection, targets victims with legal document masquerade, believed to be associated with financial incentives. https://www.cybereason.com/blog/i-am-goot-loader

๐Ÿ“Š Taking an Evidence-Based Approach to Vulnerability Prioritization security research โ€“ VulnCheck's blog emphasizes the importance of prioritizing vulnerabilities based on exploit evidence, recommending Known Exploited Vulnerabilities (KEV), weaponized vulnerabilities, and Proof of Concept (POC) exploit codes as top priorities, alongside additional considerations such as ransomware usage, botnet exploitation, and threat actors' activities. https://vulncheck.com/blog/vulnerability-prioritization

โ˜ƒ๏ธ Snowflake isnโ€™t an outlier, itโ€™s the canary in the coal mine security news โ€“ Recent attacks on Snowflake were a result of stolen credentials originating from infostealers, highlighting an industry-wide shift towards identity-focused threats; extensive use of credentials from phishing, infostealers and insider threats; the importance of protecting data with MFA; emphasis on rapid response to infostealer infections, password resets, and secure credential storage. https://blog.talosintelligence.com/infostealer-landscape-facilitates-breaches/

๐Ÿ‘น Global Revival of Hacktivism Requires Increased Vigilance from Defenders security news โ€“ Mandiant observes a resurgence in hacktivism involving complex tactics, including intrusion, information operations, and physical world tampering. https://cloud.google.com/blog/topics/threat-intelligence/global-revival-of-hacktivism/

๐Ÿ‘ƒ LockBit group falsely claimed the hack of the Federal Reserve ransomware โ€“ The LockBit ransomware group falsely claimed to have hacked the US Federal Reserve when in fact the victim was Evolve Bank & Trust. Media outlets reported that the Federal Reserve had previously penalized the bank for deficiencies in risk management, anti-money laundering, and compliance practices. https://securityaffairs.com/164988/cyber-crime/lockbit-has-not-hacked-federal-reserve.html

๐ŸชŸ TeamViewer responds to security 'irregularity' in IT network security news โ€“ TeamViewer detected a security 'irregularity' in its corporate IT environment, prompting an immediate investigation and implementation of remediation measures. The company downplays the incident, asserting that the product environment and customer data remain unaffected. https://www.theregister.com/2024/06/28/teamviewer_network_breach/

๐ŸŽ‘ Sustaining Digital Certificate Security โ€“ Entrust Certificate Distrust security news โ€“ Chrome to distrust some Entrust certificates due to compliance failures. https://security.googleblog.com/2024/06/sustaining-digital-certificate-security.html

๐Ÿง‹ TeamViewer says Russia broke into its corp IT network security news โ€“ Russian cyber-spies breached TeamViewer's corporate IT network, contained to non-production systems, no customer data accessed. https://www.theregister.com/2024/06/28/teamviewer_russia/

๐ŸŽ๏ธ Supply-chain ransomware attack cripples thousands of car dealerships cybercrime โ€“ A ransomware attack by the BlackSuit gang targeted CDK Global, a platform widely used by car dealerships, leading to system shutdowns and disruptions in business operations. https://www.exponential-e.com/blog/supply-chain-ransomware-attack-cripples-thousands-of-car-dealerships

๐Ÿฉป Mitigating Skeleton Key, a new type of generative AI jailbreak technique security research โ€“ Skeleton Key, a new type of generative AI jailbreak technique called Explicit: forced instruction-following, bypasses guardrails in AI models, enabling the production of harmful content. Microsoft discovered and mitigated this vulnerability with Prompt Shields. https://www.microsoft.com/en-us/security/blog/2024/06/26/mitigating-skeleton-key-a-new-type-of-generative-ai-jailbreak-technique/

โ„๏ธ Russia's Midnight Blizzard stole email of more Microsoft customers security news โ€“ Microsoft warns more customers of email theft by Russia-linked Midnight Blizzard hacking campaign. Incident response team reaching out to customer administrators to provide a secure portal to view stolen emails from the cyberespionage group. https://securityaffairs.com/165038/hacking/midnight-blizzard-email-microsoft-customers.html

๐Ÿ” Google will address Androidโ€™s Find My Device network issues โ€˜over the coming weeksโ€™ security news โ€“ Google addressing issues with Android's Find My Device network. https://www.theverge.com/2024/6/26/24186381/google-find-my-device-tracking-pixel-android


CISA Corner

๐Ÿ” CISA Releases Two Industrial Control Systems Advisories security news https://www.cisa.gov/news-events/alerts/2024/06/25/cisa-releases-two-industrial-control-systems-advisories ๐Ÿ”’ CISA Adds Three Known Exploited Vulnerabilities to Catalog security news https://www.cisa.gov/news-events/alerts/2024/06/26/cisa-adds-three-known-exploited-vulnerabilities-catalog


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿ’Œ Security bug allows anyone to spoof Microsoft employee emails vulnerability โ€“ Bug allows MS employee email spoofing, not yet patched. https://techcrunch.com/2024/06/18/security-bug-allows-anyone-to-spoof-microsoft-employee-emails/?guccounter=1

๐Ÿ’ณ First million breached Ticketmaster records released for free data breach โ€“ Ticketmaster breached records leaked, potential for phishing attacks. https://www.malwarebytes.com/blog/news/2024/06/first-million-breached-ticketmaster-records-released-for-free

๐Ÿ—จ๏ธ Signal president Meredith Whittaker criticizes EU attempts to tackle child abuse material privacy โ€“ Signal Foundation president criticizes EU proposal. https://therecord.media/european-council-e2ee-proposal-signal-whittaker-criticism

โš–๏ธ Signal, MEPs urge EU Council to drop encryption-eroding law security news โ€“ EU Council set to vote on law aiming to fight child exploitation online by requiring client-side scanning of digital communication to prevent dissemination of unlawful content, jeopardizing encryption. Signal and MEPs strongly advocate against the proposal, highlighting privacy and security risks. https://www.theregister.com/2024/06/18/signal_eu_upload_moderation/

๐Ÿฆฅ Federal contractors pay multimillion-dollar settlements over cybersecurity lapses security news โ€“ Federal contractors fined for cybersecurity failures during NY program. https://therecord.media/federal-contractors-pay-multimillion-settlement

๐Ÿ–ผ๏ธ AI Images in Google Search Results Have Opened a Portal to Hell privacy โ€“ Google Search results show AI-generated images without indication of origin. https://www.404media.co/google-image-search-ai-results-have-opened-a-portal-to-hell/

๐Ÿชฌ Proton is taking its privacy-first apps to a nonprofit foundation model privacy โ€“ Proton transitions to nonprofit foundation model with emphasis on privacy. https://arstechnica.com/gadgets/2024/06/proton-is-taking-its-privacy-first-apps-to-a-nonprofit-foundation-model/

๐Ÿ’ธ The Financial Dynamics Behind Ransomware Attacks cybercrime โ€“ Ransomware attacks evolve with financial incentives using cryptocurrency for anonymity. https://securityaffairs.com/164636/cyber-crime/financial-dynamics-ransomware-attacks.html

๐Ÿคน How are attackers trying to bypass MFA? security news โ€“ Increased incidents related to MFA bypass attempts, including push notifications and social engineering tactics. https://blog.talosintelligence.com/how-are-attackers-trying-to-bypass-mfa/

๐Ÿ”‘ How quickly can attackers guess your password? security research โ€“ Study reveals most passwords can be cracked in less than an hour. https://securelist.com/passworde-brute-force-time/112984/

โŒ› Meta delays training its AI using public content shared by EU users privacy โ€“ Meta postpones training its large language models with public content from adult users in the EU due to a request from the Irish Data Protection Commission, highlighting disappointment over the decision and emphasizing the need to bring the benefits of AI to people in Europe. https://securityaffairs.com/164652/laws-and-regulations/meta-postponing-training-llm-eu-data.html

๐Ÿš— Car dealerships hit with massive computer system outage cybercrime โ€“ CDK Global cyberattack disrupts car dealerships in North America. https://www.theverge.com/2024/6/20/24182484/car-dealerships-massive-computer-system-outage-cdk-global

๐Ÿš… Amtrak forces password changes after user account break-ins security news โ€“ Amtrak's Guest Rewards program faces a security breach due to credential stuffing, prompting mandatory multi-factor authentication and password resets for affected users. https://www.theregister.com/2024/06/19/amtrak_has_had_another_breach/

๐Ÿ’› Google Chrome 126 update addresses multiple vulnerabilities security news โ€“ high-severity vulnerabilities reported by security researchers at a hacking competition, including type confusion and memory access issues. https://securityaffairs.com/164688/security/google-chrome-126-update.html

๐Ÿ˜ต Qilin Ransomware: What You Need To Know cybercrime โ€“ Qilin, a ransomware-as-a-service operation with Russian links, demands high ransoms; targeted London hospitals sparked attention. https://www.tripwire.com/state-of-security/qilin-ransomware-what-you-need-know

โ›” Biden administration bans sale of Kaspersky software in US security news โ€“ The Biden administration bans Kaspersky Labs from selling software in the USA due to concerns about ties to the Russian government and potential exploitation in cyberoperations. https://cyberscoop.com/biden-administration-bans-sale-of-kaspersky-software-in-us/

๐Ÿฆโ€โฌ› Australian regulator blames lack of multi-factor authentication for Medibank hack security news https://therecord.media/medibank-hack-australian-government-report-mfa


Some More, For the Curious

๐Ÿ•ต๏ธ TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution security research โ€“ TikTag exploits ARM's ME for data exposure through speculation. https://arxiv.org/abs/2406.08719

๐Ÿฎ Re-moo-te Code Execution in Mailcow: Always Sanitize Error Messages vulnerability โ€“ Mailcow code vulnerabilities lead to remote code execution. https://www.sonarsource.com/blog/remote-code-execution-in-mailcow-always-sanitize-error-messages/

๐Ÿ’ป Road to redemption: GhostSec's hacktivists went to the dark side. Now they want to come back security news โ€“ GhostSec shifts from hacktivism to cybercrime with ransomware attacks and claims to shift back. https://therecord.media/ghostsec-hacktivism-cybercrime-interview-click-here-podcast

๐Ÿงƒ Multiple vulnerabilities resolved in Juniper Secure Analytics in 7.5.0 UP8 IF03 vulnerability https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP8-IF03

๐Ÿชง Schneier on Security โ€“ Rethinking Democracy for the Age of AI security opinion โ€“ Bruce Schneier discusses rethinking governance systems for the age of AI, pointing out the need for new systems that align incentives and resist hacking, addressing issues like misinformation, misaligned incentives, and inadequate governance structures. https://www.schneier.com/blog/archives/2024/06/rethinking-democracy-for-the-age-of-ai.html

๐Ÿฉ NHS boss says Scottish trust didn't meet attackers' demands data breach โ€“ NHS Dumfries and Galloway's CEO informs residents of a cyberattack where data was stolen but not altered; the criminals published the data. https://www.theregister.com/2024/06/18/nhs_dumfries_and_galloway_letter/

๐Ÿฉน VMware fixed RCE and privilege escalation bugs in vCenter Server security news โ€“ VMware patched vCenter Server vulnerabilities allowing remote code execution and privilege escalation, impacting multiple versions. https://securityaffairs.com/164659/hacking/vmware-fixed-vcenter-server-flaws.html

๐Ÿชผ AMD is investigating claims of stolen company data security news โ€“ AMD is investigating allegations of stolen company data, including future product information, being offered for sale by a threat actor known as IntelBroker. https://www.theverge.com/2024/6/18/24181406/amd-investigating-claims-stolen-company-data-sale-intelbroker

๐Ÿšจ Qilin has โ€˜no regretsโ€™ over the healthcare crisis it caused security news โ€“ The ransomware gang Qilin, responsible for a deliberate and politically motivated attack on London hospitals to leverage against political elites of specific countries, demanded a $50 million ransom. They claim to have stolen over one terabyte of data to be leaked, potentially causing a healthcare crisis in the UK capital. https://www.theregister.com/2024/06/20/qilin_our_plan_was_to/

๐Ÿ” High severity bugs in Confluence vulnerability โ€“ Atlassian fixed nine high-severity vulnerabilities in Confluence, Jira, and Crucible products, including improper authorization flaws and SSRF issues. https://securityaffairs.com/164743/security/atlassian-confluence-crucible-jira-flaws.html

โšก UK's largest nuclear site denies being hacked but pleads guilty over cybersecurity failures cybercrime โ€“ Sellafield nuclear site in UK faces charges related to cybersecurity failings under Nuclear Industries Security Regulations 2003. https://therecord.media/sellafield-guilty-plea-uk-nuclear-facility-cybersecurity

๐Ÿ” SCCM Exploitation: Evading Defenses and Moving Laterally with SCCM Application Deployment security research โ€“ SCCM exploitation risks and attacks explained. https://www.guidepointsecurity.com/blog/sccm-exploitation-evading-defenses-and-moving-laterally-with-sccm-application-deployment/

๐Ÿฅ A Birdโ€™s-eye view: ShareFinder-How Threat Actors Discover File Shares (The DFIR Report) security research โ€“ Attackers exploit file shares, Canaries detect malicious activity. https://blog.thinkst.com/2024/06/a-birds-eye-view-sharefinder-how-threat-actors-discover-file-shares-the-dfir-report.html

๐Ÿด Polish investigators seize Pegasus spyware systems as part of probe into alleged abuse security news โ€“ investigations ongoing regarding the legality and purchase of the software, which allegedly targeted opposition politicians in Poland. https://therecord.media/poland-seizure-pegasus-spyware-systems

๐ŸฆŸ Phoenix UEFI bug affects long list of Intel chip families vulnerability โ€“ A UEFI firmware vulnerability, CVE-2024-0762, affecting Phoenix Technologies UEFI firmware used across various Intel chip families poses threats such as buffer overflow and code execution. https://www.theregister.com/2024/06/21/uefi_vulnerability_intel_chips/

๐Ÿ›ก๏ธ Threat actors exploited SolarWinds Serv-U vulnerability vulnerability โ€“ CVE-2024-28995, a directory traversal issue allowing access to sensitive files; GreyNoise reports extensive attempts following public disclosure and availability of proof-of-concept code. https://securityaffairs.com/164806/hacking/solarwinds-serv-u-cve-2024-28995-exploit.html


CISA Corner

๐Ÿฆฎ CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs) security news โ€“ CISA shared a detailed report on challenges to SSO adoption by SMBs and suggested ways to enhance security. https://www.cisa.gov/news-events/alerts/2024/06/20/cisa-releases-guidance-single-sign-sso-adoption-small-and-medium-sized-businesses-smbs

๐Ÿฆฎ CISA and Partners Release Guidance for Modern Approaches to Network Access Security security news โ€“ advocate for modern security solutions like Zero Trust, SSE, and SASE for improved network access security. https://www.cisa.gov/news-events/alerts/2024/06/18/cisa-and-partners-release-guidance-modern-approaches-network-access-security

๐Ÿ”’ RAD Data Communications SecFlow-2 vulnerability โ€“ RAD Data Communications' SecFlow-2 device is vulnerable to path traversal, allowing attackers to retrieve files from the operating system remotely. https://www.cisa.gov/news-events/ics-advisories/icsa-24-170-01

๐Ÿ”’ CISA Releases Three Industrial Control Systems Advisories security news โ€“ security issues affecting Yokogawa CENTUM, CAREL Boss-Mini, and Westermo L210-F2G. https://www.cisa.gov/news-events/alerts/2024/06/20/cisa-releases-three-industrial-control-systems-advisories


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


Highlight

๐Ÿ“ข Android: Werbung/Tracker schnell und einfach systemweit loswerden privacy https://www.kuketz-blog.de/android-werbung-tracker-schnell-und-einfach-systemweit-loswerden/


News For All

โš•๏ธ Microsoft, Google pledge 'low cost' cybersecurity services to rural hospitals security news โ€“ Microsoft and Google, in collaboration with the White House, are offering reduced-price cybersecurity services to rural hospitals to address the rising cyber threat in the healthcare sector. https://therecord.media/microsoft-google-rural-hospital-cybersecurity

๐Ÿ—ณ๏ธ AI and the Indian Election โ€œsecurityโ€ research โ€“ Indian election features (legitimate) AI, including deepfakes and personalized communication. https://www.schneier.com/blog/archives/2024/06/ai-and-the-indian-election.html

๐Ÿงฌ Privacy authorities in Canada and UK announce joint probe of 23andMe data breach data breach โ€“ privacy regulators launch a joint investigation into the global data breach at genetic testing company 23andMe, which exposed the genetic data of at least 5 million users in October 2023. https://therecord.media/23andme-data-breach-canada-uk-privacy-investigation

๐Ÿš— One of the major sellers of detailed driver behavioral data is shutting down privacy https://arstechnica.com/cars/2024/06/one-of-the-major-sellers-of-detailed-driver-behavioral-data-is-shutting-down/

โš”๏ธ China state hackers infected 20,000 Fortinet VPNs, Dutch spy service says security news โ€“ The backdoor malware CoatHanger was installed, persisting despite reboots. Fortinet's delayed disclosure of the vulnerability impacted response. https://arstechnica.com/security/2024/06/china-state-hackers-infected-20000-fortinet-vpns-dutch-spy-service-says/

๐Ÿซ— Cylance clarifies breach, dodges questions about the source data breach โ€“ Cybersecurity firm Cylance confirms a data breach related to marketing data from 2015-2018 before BlackBerry acquisition. Data allegedly includes customer, partner, and employee names and email addresses, with no compromise to current systems. https://www.theregister.com/2024/06/11/cylance_clarifies_data_breach_details/

โบ๏ธ Patch Tuesday, June 2024 โ€œRecallโ€ Edition โ€“ Krebs on Security security news โ€“ including a critical flaw in Microsoft Message Queuing that could allow attackers to remotely control a system. Adobe also released security updates for multiple products. https://krebsonsecurity.com/2024/06/patch-tuesday-june-2024-recall-edition/

๐Ÿฆพ Semiconductor giants Nvidia and Arm warn of new flaws in their graphics processors security news โ€“ Arm warns of an actively exploited zero-day flaw in its Mali GPU Kernel Driver, CVE-2024-4610, allowing unauthorized access to sensitive information. Nvidia discloses 10 new vulnerabilities in its GPU Display Driver and vGPU software. https://therecord.media/nvidia-arm-semiconductor-flaws-patches

๐Ÿ“ถ Microsoft fixes hack-me-via-Wi-Fi Windows security hole security news โ€“ Microsoft's June Patch Tuesday addresses multiple CVEs, including a publicly known DNSSEC flaw, a severe remote code execution flaw in MSMQ, and a Wi-Fi driver remote code execution hole. Adobe releases 10 patches covering 166 CVEs, addressing various critical vulnerabilities. SAP issues a dozen security notes, including high-priority alerts for bugs affecting NetWeaver. PHP, Arm, Apple, Google, SolarWinds, Fortinet, and Cisco also release security updates. https://www.theregister.com/2024/06/12/june_patch_tuesday/

๐Ÿ‘ฟ CISA adds Android Pixel, Microsoft Windows, Progress Telerik Report Server bugs to its Known Exploited Vulnerabilities catalog security news โ€“ CISA lists exploited vulnerabilities in Android, Windows, and Telerik. https://securityaffairs.com/164525/security/cisa-adds-android-pixel-microsoft-windows-progress-telerik-report-server-known-exploited-vulnerabilities-catalog.html

๐Ÿฆน Ukrainian police identify suspected affiliate of Conti, LockBit groups cybercrime โ€“ Ukrainian cyber police identify a Kyiv resident, specializing in developing cryptors to evade antivirus detection. The Dutch police expressed gratitude for the cooperation in apprehending the suspect. https://therecord.media/ukraine-suspected-lockbit-conti-affiliate

๐Ÿฎ How Chinaโ€™s Cyber Ecosystem Feeds Off Its Superstar Hackers security research โ€“ Analysis highlights China's leveraging of civilian talent for state-sponsored cyber operations through hacking contests and bug bounties. Chinese researchers dominate hacking competitions, leading to vulnerability research being harnessed by state operations. https://news.risky.biz/how-chinas-cyber-ecosystem-feeds-off-its-superstar-hackers/

๐Ÿ›ค๏ธ Google faces GDPR complaint over Privacy Sandbox privacy โ€“ Privacy campaigner noyb files a GDPR complaint against Google, alleging that the 'Privacy Feature' in the Chrome browser resulted in unwanted tracking, contrary to its promotion of eliminating third-party tracking cookies through the Privacy Sandbox API. https://www.theregister.com/2024/06/13/noyb_gdpr_privacy_sandbox/

๐Ÿฅธ Watch Out! CISA Warns It Is Being Impersonated By Scammers warning โ€“ CISA warns of rising impersonation scams where scammers pretend to be trusted entities to trick victims into sharing sensitive information or money, using social engineering tactics. https://www.tripwire.com/state-of-security/watch-out-cisa-warns-it-being-impersonated-scammers

โธ๏ธ Meta hits pause on EU AI training plans under pressure privacy โ€“ Meta postpones plans to train AI models on EU Facebook and Instagram posts after privacy complaints, affecting launch of Meta AI in the economic zone, but continues with plans for other regions. https://www.theregister.com/2024/06/14/meta_eu_privacy/

๐Ÿ“” CERT.at โ€“ How we cover your back cyber defense โ€“ CERT.at proactively informs network operators about potential security issues affecting Austrian companies. https://www.cert.at/en/blog/2024/6/how-we-cover-your-back

HIBP Corner ๐Ÿ†• Telegram Combolists and 361M Email Addresses security news โ€“ 151M mail new addresses with passwords some connected websites. https://www.troyhunt.com/telegram-combolists-and-361m-email-addresses/


Some More, For the Curious

๐Ÿ•ต๏ธ Bypassing Veeam Authentication CVE-2024-29849 security research โ€“ authentication bypass vulnerability explained with code analysis. https://summoning.team/blog/veeam-enterprise-manager-cve-2024-29849-auth-bypass/

โณ 1/6 | How We Hacked Multi-Billion Dollar Companies in 30 Minutes Using a Fake VSCode Extension hacking write-up โ€“ Creators developed malicious VSCode extension in 30 minutes, exposing source code to remote server. https://medium.com/@amitassaraf/the-story-of-extensiontotal-how-we-hacked-the-vscode-marketplace-5c6e66a0e9d7

๐Ÿชž Microsoft Refused to Fix Flaw Years Before SolarWinds Hack โ€” ProPublica security news โ€“ Microsoft ignored critical security flaw for years pre-SolarWinds hack. https://www.propublica.org/article/microsoft-solarwinds-golden-saml-data-breach-russian-hackers

๐Ÿ•ต๏ธ How scammers bypass 2FA cybercrime โ€“ Scammers utilize OTP bots and phishing kits to bypass 2FA by social engineering victims and intercepting OTPs. OTP bots automate scam calls to victims for obtaining codes, providing various features. https://securelist.com/2fa-phishing/112805/

๐Ÿ“ณ Hacking Millions of Modems (and Investigating Who Hacked My Modem) hacking write-up https://samcurry.net/hacking-millions-of-modems

๐Ÿ›ก๏ธ Windows flaw may have been exploited with Black Basta ransomware before it was patched security research โ€“ Symantec evidence suggests pre-patch exploitation. https://therecord.media/black-basta-ransomware-zero-day-windows

๐Ÿ‘‘ Alleged Boss of โ€˜Scattered Spiderโ€™ Hacking Group Arrested โ€“ Krebs on Security cybercrime โ€“ A 22-year-old UK man was arrested in Spain. The group is accused of hacking into multiple organizations, accessing critical data and funds. Noyb and UK authorities accuse him of SIM-swapping and heading the notorious gang involved in cyber theft activities, including costly ransom attacks at casinos. https://krebsonsecurity.com/2024/06/alleged-boss-of-scattered-spider-hacking-group-arrested/

๐Ÿ‘Ÿ Ransomware Group Exploits PHP Vulnerability Days After Disclosure vulnerability https://www.securityweek.com/ransomware-group-exploits-php-vulnerability-days-after-disclosure/

๐Ÿ‘‹ ASUS fixed critical remote authentication bypass bug in several routers security news https://securityaffairs.com/164549/security/asus-router-models-critical-rce.html


CISA Corner

๐Ÿ” Fortinet Releases Security Updates for FortiOS https://www.cisa.gov/news-events/alerts/2024/06/11/fortinet-releases-security-updates-fortios ๐Ÿ›ก๏ธ Microsoft Releases June 2024 Security Updates https://www.cisa.gov/news-events/alerts/2024/06/11/microsoft-releases-june-2024-security-updates ๐Ÿ”“ CISA Adds Two Known Exploited Vulnerabilities to Catalog CVE-2024-4610 ARM Mali GPU Use-After-Free and CVE-2024-4577 PHP-CGI Command Injection. https://www.cisa.gov/news-events/alerts/2024/06/12/cisa-adds-two-known-exploited-vulnerabilities-catalog


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub