๐Ÿ“ฐwrzlbrmpft's cyberlights๐Ÿ’ฅ

weekly cybersecurity highlights (for everyone!)

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐ŸŽฎ New Phishing Campaign Uses Browser-in-the-Browser Attacks to Target Video Gamers/Counter-Strike 2 Players cybercrime โ€“ A phishing campaign targets Counter-Strike 2 players using fake browser pop-ups to steal Steam account credentials, potentially reselling them. Be cautious of misleading login prompts! https://www.silentpush.com/blog/browser-in-the-browser-attacks/

๐Ÿงฌ 23andMe faces an uncertain future โ€” so does your genetic data privacy โ€“ 23andMe is facing bankruptcy after a significant data breach, raising concerns about the fate of its 15 million customers' genetic data. Customers are urged to consider deleting their accounts to protect their information. https://techcrunch.com/2025/03/24/23andme-faces-an-uncertain-future-so-does-your-genetic-data/

๐Ÿ—บ๏ธ More Countries are Demanding Backdoors to Encrypted Apps privacy โ€“ Countries like Sweden and France are pushing for backdoors in encrypted apps, following the UKโ€™s lead with Apple. Such measures threaten user privacy and security, warns Schneier. https://www.schneier.com/blog/archives/2025/03/more-countries-are-demanding-back-doors-to-encrypted-apps.html

๐Ÿ”‘ The Best Password Managers to Secure Your Digital Life security news โ€“ The article reviews various password managers, highlighting their features and security benefits. It emphasizes the importance of using a password manager for protecting online accounts and suggests options like Bitwarden, 1Password, and Dashlane as top choices. Comment: Please, use a password manager! https://www.wired.com/story/best-password-managers/

๐Ÿœ Chinese APT Weaver Ant infiltrated a telco for over four years cybercrime โ€“ APT Weaver Ant, linked to China, compromised a telecom provider for over four years using advanced web shells for persistence and data exfiltration. https://securityaffairs.com/175800/apt/chinese-apt-weaver-ant-infiltrated-a-telco-for-over-four-years.html

๐Ÿ’ธ US lifts sanctions on Tornado Cash, a crypto mixer linked to North Korean money laundering security news โ€“ The U.S. Treasury has lifted sanctions on Tornado Cash, a crypto mixer previously linked to laundering $7 billion for North Korean hackers, following a legal dispute. Concerns about ongoing crypto threats remain. https://techcrunch.com/2025/03/24/us-lifts-sanctions-on-tornado-cash-a-crypto-mixer-linked-to-north-korean-money-laundering/

๐Ÿ›ก๏ธ How to Enter the US With Your Digital Privacy Intact privacy โ€“ Traveling to the U.S. poses risks to digital privacy, prompting experts to recommend using minimal data devices, encrypting information, and being cautious with passwords to protect against customs searches. https://www.wired.com/2017/02/guide-getting-past-customs-digital-privacy-intact/

๐Ÿ•ต๏ธโ€โ™€๏ธ Report on Paragon Spyware cybercrime โ€“ Citizen Lab's report reveals Paragon Solutions, an Israeli spyware company, linked to law enforcement in Canada and a zero-click exploit affecting WhatsApp users. Forensic analyses confirmed spyware presence on targeted devices. https://www.schneier.com/blog/archives/2025/03/report-on-paragon-spyware.html

๐ŸŽฃ A Sneaky Phish Just Grabbed my Mailchimp Mailing List data breach โ€“ A phishing attack targeted the author's Mailchimp account, leading to unauthorized access and the export of a mailing list containing 16,000 records. The incident highlights the importance of vigilance against phishing attempts. Comment: It can happen to anybody. https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/

๐Ÿฅ‰ Generative AI browser extensions not great for privacy privacy โ€“ Researchers found that generative AI browser extensions often collect sensitive personal data with minimal safeguards, potentially violating privacy regulations. They urge better vetting and design improvements to protect user privacy. https://www.theregister.com/2025/03/25/generative_ai_browser_extensions_privacy/

๐Ÿฅพ Privacy-boosting tech could prevent breaches, data misuse with government aid, report says privacy โ€“ A report recommends that governments prioritize privacy-enhancing technologies (PETs) like encryption and de-identification to prevent data breaches and misuse, advocating for incentives and long-term contracts to support their advancement. https://cyberscoop.com/privacy-boosting-tech-could-prevent-breaches-data-misuse-with-government-aid-report-says/

๐Ÿ“ฑ Senators criticize Trump officialsโ€™ discussion of war plans over Signal, but administration answers donโ€™t come easily security news โ€“ Democratic senators criticized national security officials for discussing war plans on Signal, which included a journalist. Officials struggled to provide clear answers on specifics, raising concerns about the use of the app for sensitive discussions. https://cyberscoop.com/democratic-senators-question-national-security-officials-over-war-plans-signal-chat/

๐ŸงŸ Open source devs say AI crawlers dominate traffic, forcing blocks on entire countries security news โ€“ Open source developers report that aggressive AI crawlers are overwhelming their infrastructure, causing instability and prompting measures like VPNs and proof-of-work challenges. https://arstechnica.com/ai/2025/03/devs-say-ai-crawlers-dominate-traffic-forcing-blocks-on-entire-countries/

๐Ÿ” How to tell if your online accounts have been hacked security news โ€“ As hackers increasingly target individuals, it's crucial to know how to check if your online accounts have been compromised. The article outlines steps for securing various accounts, including Gmail, Facebook, and more, emphasizing the importance of multi-factor authentication. https://techcrunch.com/2025/03/25/how-to-tell-if-your-online-accounts-have-been-hacked/

๐Ÿ” Google fixes Chrome zero-day security flaw used in hacking campaign targeting journalists vulnerability โ€“ Google has patched a zero-day vulnerability (CVE-2025-2783) in Chrome exploited in a hacking campaign targeting journalists via phishing emails. https://techcrunch.com/2025/03/26/google-fixes-chrome-zero-day-security-flaw-used-in-hacking-campaign-targeting-journalists/

๐ŸŒ‰ You Need to Use Signal's Nickname Feature security news โ€“ Following a significant leak involving U.S. officials discussing sensitive plans in a Signal group chat, the article highlights the importance of using Signal's nickname feature to prevent similar mistakes when adding contacts. https://www.404media.co/you-need-to-use-signals-nickname-feature/

๐Ÿ“ท UK's first permanent facial recognition cameras installed privacy โ€“ The Metropolitan Police will install the UK's first permanent live facial recognition cameras in Croydon to combat crime. Privacy advocates warn this expands state surveillance and may infringe on individual rights. https://www.theregister.com/2025/03/27/uk_facial_recognition/

โš ๏ธ When Getting Phished Puts You in Mortal Danger security research โ€“ Uncovered a Russian phishing campaign targeting individuals seeking to join anti-Kremlin paramilitary groups, potentially endangering their freedom or lives. The campaign uses fake recruitment sites to collect personal information, highlighting the dangers of cyber deception. https://krebsonsecurity.com/2025/03/when-getting-phished-puts-you-in-mortal-danger/

๐Ÿ›ก๏ธ Browser extension sales, updates pose hidden threat to enterprises security news โ€“ Browser extensions can be bought and repurposed without warning, posing security risks for organizations. Users often remain unaware of ownership changes, leading to potential malicious exploitation of sensitive data. https://cyberscoop.com/browser-extension-sales-permissions-hidden-threat/

๐ŸฆŠ Mozilla fixed critical Firefox vulnerability CVE-2025-2857 vulnerability โ€“ Mozilla addressed a critical vulnerability (CVE-2025-2857) in Firefox for Windows that could lead to a sandbox escape. This follows a similar issue in Chrome, which was actively exploited. https://securityaffairs.com/175945/security/mozilla-fixed-critical-firefox-vulnerability-cve-2025-2857.html

๐Ÿ’ป VanHelsing Ransomware: What You Need To Know security news โ€“ VanHelsing is a new ransomware-as-a-service operation targeting various platforms. It allows affiliates to launch attacks while keeping 80% of ransom payments. Organizations are urged to implement strong security measures to protect against potential attacks. https://www.tripwire.com/state-of-security/vanhelsing-ransomware-what-you-need-know

๐Ÿ”“ Oracle has reportedly suffered 2 separate breaches exposing thousands of customersโ€˜ PII data breach โ€“ Oracle is facing reports of two data breaches: one involving Oracle Health, exposing patient data, and another involving Oracle Cloud, with 6 million records of authentication data. The company has not confirmed these breaches. https://arstechnica.com/security/2025/03/oracle-is-mum-on-reports-it-has-experienced-2-separate-data-breaches/


Some More, For the Curious

๐Ÿ—„๏ธ Fileless lateral movement with trapped COM objects security research โ€“ Researchers have developed a fileless lateral movement technique using trapped COM objects to exploit DCOM, enabling privilege escalation and bypassing security protections. This method raises significant security concerns. https://www.ibm.com/think/news/fileless-lateral-movement-trapped-com-objects

๐Ÿ›ณ๏ธ Bypassing Detections with Command-Line Obfuscation security research โ€“ Command-line obfuscation can evade detection by altering executable arguments. The new tool, ArgFuscator, aids in generating these obfuscated commands, posing significant challenges for security measures. https://www.wietzebeukema.nl/blog/bypassing-detections-with-command-line-obfuscation

โ˜‘๏ธ Despite challenges, the CVE program is a public-private partnership that has shown resilience security news โ€“ The CVE program, established 25 years ago, remains vital for cybersecurity, despite challenges like data quality and funding. Experts praise its resilience and importance in identifying vulnerabilities. https://cyberscoop.com/cve-program-history-mitre-nist-1999-2024/

โš ๏ธ CVE-2025-29927 โ€“ Authorization Bypass Vulnerability in Next.js: All You Need to Know vulnerability โ€“ A critical authorization bypass vulnerability (CVE-2025-29927) affects multiple Next.js versions, allowing attackers to bypass security checks. Users are advised to upgrade or mitigate by blocking the vulnerable header. https://jfrog.com/blog/cve-2025-29927-next-js-authorization-bypass/

โš–๏ธ Tor-backer OTF sues to save its funding from Trump cuts security news โ€“ The Open Technology Fund is suing the Trump administration to prevent the cancellation of its federal funding, fearing it will hinder internet security projects like Tor and Let's Encrypt, vital for global online privacy. https://www.theregister.com/2025/03/25/otf_tor_lets_encrypt_funding_lawsuit/

๐Ÿ“บ Authentication bypass CVE-2025-22230 impacts VMware Windows Tools vulnerability โ€“ CVE-2025-22230 is a high-severity authentication bypass vulnerability in VMware Tools for Windows, allowing low-privileged attackers to escalate privileges. Security updates have been released to address the flaw. https://securityaffairs.com/175858/security/authentication-bypass-cve-2025-22230-in-vmware-tools-for-windows.html

๐Ÿ”” Kritische Sicherheitslรผcken in Kubernetes Ingress NGINX Controller โ€“ Updates verfรผgbar warning https://www.cert.at/de/warnungen/2025/3/kubernetes-ingress-nginx-controller-vulnerabilities

๐Ÿ…ฐ๏ธ Austria uncovers alleged Russian disinformation campaign spreading lies about Ukraine security news โ€“ Austrian authorities revealed a Russian disinformation campaign aimed at spreading false narratives about Ukraine, linked to a Bulgarian woman accused of spying. The operation targeted German-speaking countries and utilized online misinformation and nationalist symbols. https://therecord.media/austria-uncovers-russian-disinfo-campaign

๐Ÿ”’ Go-Spoof: A Tool for Cyber Deception hacking write-up โ€“ Ben Bowman from Black Hills Information Security discusses Go-Spoof, a revamped tool for cyber deception that makes all ports appear open with fake banners, enhancing security and complicating attackers' efforts. https://www.blackhillsinfosec.com/go-spoof-a-tool-for-cyber-deception/

๐Ÿฅฉ Stealing user credentials with evilginx hacking write-up โ€“ Evilginx is a tool that exploits vulnerabilities to steal user credentials and session tokens, allowing attackers to bypass multi-factor authentication. The article discusses how it works, detection methods, and potential mitigations to protect against such attacks. https://news.sophos.com/en-us/2025/03/28/stealing-user-credentials-with-evilginx/

โ›” What not to do with on prem virtualization cyber defense โ€“ The article discusses common misconfigurations in on-premises virtual machine environments, highlighting risks such as unencrypted VM backups and broken tiering that can lead to privilege escalation and security breaches. It emphasizes the importance of access control and integrity in securing virtual systems. https://therealunicornsecurity.github.io/What-not-to-do-with-vms/


CISA Corner

๐Ÿฆ  MAR-25993211-r1.v1 Ivanti Connect Secure (RESURGE) malware โ€“ The article details a backdoor dropper rootkit named RESURGE, identified by CISA. The malware targets GNU/Linux systems, with specific signatures and capabilities. Antivirus detection has classified it as a variant of Linux/SpawnSnail.A trojan. https://www.cisa.gov/news-events/analysis-reports/ar25-087a

โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added CVE-2025-30154, a vulnerability in GitHub Actions, to its Known Exploited Vulnerabilities Catalog due to active exploitation risks, emphasizing the need for federal agencies to remediate it promptly. https://www.cisa.gov/news-events/alerts/2025/03/24/cisa-adds-one-known-exploited-vulnerability-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has included CVE-2025-2783, a Google Chromium Mojo sandbox escape vulnerability, in its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, urging federal agencies to address the risk promptly. https://www.cisa.gov/news-events/alerts/2025/03/27/cisa-adds-one-known-exploited-vulnerability-catalog โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added two Sitecore CMS vulnerabilities (CVE-2019-9874 and CVE-2019-9875) to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, emphasizing the need for federal agencies to remediate these risks promptly. https://www.cisa.gov/news-events/alerts/2025/03/26/cisa-adds-two-known-exploited-vulnerabilities-catalog

โš™๏ธ CISA Releases Four Industrial Control Systems Advisories vulnerability โ€“ CISA has issued four advisories regarding vulnerabilities in Industrial Control Systems, including products from ABB and Rockwell Automation. Users are urged to review the advisories for details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/03/25/cisa-releases-four-industrial-control-systems-advisories โš™๏ธ CISA Releases One Industrial Control Systems Advisory vulnerability โ€“ CISA has issued an advisory (ICSA-25-037-01) regarding a vulnerability in Schneider Electric's EcoStruxure Power Monitoring Expert. Users are urged to review the advisory for details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/03/27/cisa-releases-one-industrial-control-systems-advisory


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


Highlight

๐Ÿ”Š Everything You Say to Your Echo Will Soon Be Sent to Amazon, and You Canโ€™t Opt Out privacy โ€“ Amazon's new Alexa+ will send all voice recordings to the cloud, eliminating local processing and raising significant privacy concerns for Echo users. https://www.wired.com/story/everything-you-say-to-your-echo-will-be-sent-to-amazon-starting-march-28/


News For All

๐ŸŽญ Scammers Pose as Cl0p Ransomware to Send Fake Extortion Letters cybercrime โ€“ Scammers are impersonating the Cl0p ransomware gang to send fake extortion emails and letters, leveraging fear and misinformation to defraud businesses. https://hackread.com/scammers-pose-cl0p-ransomware-fake-extortion-letters/

๐Ÿ”‘ RDP attack: Which passwords are hackers using against RDP ports in 2025? security research โ€“ Research shows hackers are targeting RDP ports using weak passwords like '123456' and 'P@ssw0rd', highlighting the need for stronger password policies and multi-factor authentication. https://specopssoft.com/blog/passwords-used-in-attacking-rdp-ports/

๐Ÿ’ป Free file converter malware scam โ€œrampantโ€ claims FBI warning โ€“ The FBI warns that free file converter tools are spreading malware, compromising personal data like passwords and social security numbers, urging users to be cautious. https://www.bitdefender.com/en-us/blog/hotforsecurity/free-file-converter-malware-scam-rampant-claims-fbi

๐Ÿ Apple has revealed a Passwords app vulnerability that lasted for months vulnerability โ€“ A bug in the iOS 18.2 Passwords app exposed users to phishing attacks for three months by sending unencrypted requests. Apple has since released a patch to address the issue. https://www.theverge.com/news/632108/apple-ios-passwords-app-bug-vulnerability-phishing-attacks

๐Ÿค– Trained on buggy code, LLMs often parrot same mistakes security research โ€“ Researchers found that large language models frequently reproduce buggy code instead of correcting it, with error rates nearly equal for both correct and buggy completions, highlighting limitations in handling complex code. https://www.theregister.com/2025/03/19/llms_buggy_code/

๐ŸŽฃ Attackers use CSS to create evasive phishing messages security news โ€“ Threat actors exploit CSS to bypass spam filters and track user behavior, using techniques to conceal phishing content in emails and gather sensitive data on recipients. https://securityaffairs.com/175512/security/attackers-use-css-to-create-evasive-phishing-messages.html

๐Ÿšจ People Are Using AI to Create Influencers With Down Syndrome Who Sell Nudes cybercrime โ€“ A network of Instagram accounts uses AI to create deepfake influencers with Down syndrome, stealing content from real creators and monetizing it on adult platforms, leading to a disturbing new industry. https://www.404media.co/people-are-using-ai-to-create-influencers-with-down-syndrome-who-sell-nudes/

๐Ÿ” Six additional countries identified as suspected Paragon spyware customers privacy โ€“ Citizen Lab identified six new countries as suspected customers of Paragon Solutions' spyware, raising concerns over its use against activists and the company's claims of responsible sales practices. https://cyberscoop.com/six-countries-suspected-paragon-spyware-customers/

๐Ÿ”“ US teachers' union says hackers stole sensitive personal data on over 500,000 members data breach โ€“ The Pennsylvania State Education Association reported a cyberattack that compromised sensitive personal data of over 517,000 members, including Social Security numbers and financial information. https://techcrunch.com/2025/03/19/us-teachers-union-says-hackers-stole-sensitive-personal-data-on-over-500000-members/

๐Ÿ“ต Turkey restricts social media following arrest of presidentโ€™s main rival security news โ€“ Turkey has restricted access to major social media platforms after the arrest of Istanbul Mayor Ekrem ฤฐmamoฤŸlu, sparking public protests and highlighting ongoing government crackdowns on dissent. https://therecord.media/turkey-restricts-social-media-imamoglu-arrest

๐Ÿ”’ WhatsApp fixed zero-day flaw used to deploy Paragon Graphite spyware vulnerability โ€“ WhatsApp addressed a zero-click vulnerability exploited by Paragon's Graphite spyware to target journalists and civil society members, disrupting a campaign that affected over 90 users. https://securityaffairs.com/175629/security/whatsapp-fixed-zero-day-flaw-used-to-deploy-paragon-graphite-spyware-spyware.html

๐Ÿ” Data breach at stalkerware SpyX affects close to 2 million, including thousands of Apple users data breach โ€“ A data breach at SpyX exposed personal data of nearly 2 million users, including Apple account credentials, raising concerns about the risks associated with consumer-grade spyware. https://techcrunch.com/2025/03/19/data-breach-at-stalkerware-spyx-affects-close-to-2-million-including-thousands-of-apple-users/

๐Ÿ”’ BlackLock Ransomware: What You Need To Know cybercrime โ€“ BlackLock is a rapidly growing ransomware group that encrypts and exfiltrates data, operating under a RaaS model. It has launched numerous attacks across various sectors and employs aggressive recruitment tactics. https://www.tripwire.com/state-of-security/blacklock-ransomware-what-you-need-know

๐Ÿ—บ๏ธ Google sues alleged scammers over 10,000 fake Maps listings security news โ€“ Google is suing a network of scammers for creating 10,000 fake business listings on Maps, following a tip-off from a locksmith. The company blocked 12 million fake businesses in 2023. https://www.theverge.com/news/633601/google-sues-fake-business-scams-maps

๐ŸŒ Major web services go dark in Russia amid reported Cloudflare block security news โ€“ Widespread outages in Russia, attributed to the blocking of Cloudflare, affected services like TikTok and banking apps, as regulators push for local hosting to improve internet security. https://therecord.media/russia-websites-dark-reported-cloudflare-block

๐ŸŒ How to Avoid US-Based Digital Servicesโ€”and Why You Might Want To privacy โ€“ Amid concerns over Big Tech's alignment with the Trump administration, many are moving their digital lives to overseas services to protect privacy and data rights, exploring various non-US alternatives. https://www.wired.com/story/trump-era-digital-expat/

๐ŸŒ€ Cloudflare turns AI against itself with endless maze of irrelevant facts security news โ€“ Cloudflare launched 'AI Labyrinth' to combat unauthorized AI data scraping by enticing bots into a maze of fake content, wasting their resources instead of blocking them outright. https://arstechnica.com/ai/2025/03/cloudflare-turns-ai-against-itself-with-endless-maze-of-irrelevant-facts/

๐Ÿ•น๏ธ Valve removes video game demo suspected of being malware malware โ€“ Valve has removed the game demo for 'Sniper: Phantomโ€™s Resolution' from Steam after users reported it was installing malware, following a similar incident with another game last month. https://techcrunch.com/2025/03/21/valve-removes-video-game-demo-suspected-of-being-malware/


Some More, For the Curious

๐Ÿ”“ Supply Chain Security Risk: GitHub Action tj-actions/changed-files Compromised security research โ€“ A vulnerability in GitHub Action tj-actions/changed-files exposes sensitive CI/CD secrets in build logs, risking unauthorized access for users with public repositories. Comment: the big one this week. https://www.aquasec.com/blog/github-action-tj-actions-changed-files-compromised/

๐Ÿ‘ฝ Security Risks of Setting Access Control Allow Origin: * cyber defense โ€“ Using a wildcard CORS policy can expose applications to serious security risks, especially when combined with insecure cookie settings, allowing attackers to exploit authenticated sessions. https://projectblack.io/blog/security-risks-of-setting-access-control-allow-origin/

๐Ÿ•ต๏ธโ€โ™‚๏ธ BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique security research โ€“ Mandiant reveals the Browser-in-the-Middle (BitM) technique allows attackers to steal session tokens quickly, emphasizing the need for robust security measures like hardware-based MFA and client certificates. https://cloud.google.com/blog/topics/threat-intelligence/session-stealing-browser-in-the-middle/

โš™๏ธ Improvements in Brute Force Attacks security research โ€“ New research reveals significant advancements in GPU-assisted brute force attacks on cryptographic algorithms, highlighting the need for stronger key lengths as optimized methods greatly reduce attack times. https://www.schneier.com/blog/archives/2025/03/improvements-in-brute-force-attacks.html

๐Ÿ’ฐ Microsoft identifies new RAT targeting cryptocurrency wallets and more malware โ€“ Microsoft discovered StilachiRAT, a stealthy remote access trojan that steals sensitive data from cryptocurrency wallets and Chrome, and manipulates system settings to evade detection. https://therecord.media/stilachirat-new-remote-access-trojan-crypto-wallets

๐Ÿ”’ Microsoft isn't fixing 8-year-old zero day used for spying security news โ€“ Microsoft is not addressing an eight-year-old vulnerability exploited by state-sponsored attackers through malicious .LNK files, deeming it a UI issue rather than a security concern. https://www.theregister.com/2025/03/18/microsoft_trend_flaw/

๐ŸŽฎ New Arcane stealer spreading via YouTube and Discord malware โ€“ The Arcane stealer, distributed through YouTube videos and Discord, targets sensitive data from various applications and gaming clients, using deceptive methods to install malware on victims' devices. https://securelist.com/arcane-stealer/115919/

๐Ÿ› ๏ธ Rules File Backdoor: AI Code Editors exploited for silent supply chain attacks security research โ€“ The 'Rules File Backdoor' attack exploits AI code editors like GitHub Copilot to inject malicious code via hidden Unicode, compromising software without detection and posing significant risks. https://securityaffairs.com/175593/hacking/rules-file-backdoor-ai-code-editors-silent-supply-chain-attacks.html

๐Ÿ“ฐ Ransomware-Gruppen nutzen weiterhin kritische Fortinet-Schwachstellen โ€“ Warnung vor gepatchten, aber bereits kompromittierten Gerรคten warning https://www.cert.at/de/warnungen/2025/3/ransomware-gruppen-nutzen-weiterhin-kritische-fortinet-schwachstellen-warnung-vor-gepatchten-aber-bereits-kompromittierten-geraten

๐Ÿšจ Critical GitHub Attack security research โ€“ A cascading supply chain attack has compromised multiple GitHub Actions, exposing critical secrets in over 23,000 repositories. CISA has confirmed the vulnerability was patched in version 46.0.1. Comment: the big one again. https://www.schneier.com/blog/archives/2025/03/critical-github-attack.html

๐Ÿ’ฐ Russian zero-day seller is offering up to $4 million for Telegram exploits cybercrime โ€“ Operation Zero is offering up to $4 million for Telegram exploits, reflecting the demand from the Russian government for vulnerabilities in popular messaging apps, particularly amidst security concerns. https://techcrunch.com/2025/03/21/russian-zero-day-seller-is-offering-up-to-4-million-for-telegram-exploits/

๐ŸงŸ 'Dead simple' RCE exploit in Apache Tomcat under attack vulnerability โ€“ A newly disclosed vulnerability in Apache Tomcat (CVE-2025-24813) allows remote code execution and is actively being exploited, requiring no authentication to attack vulnerable servers. https://www.theregister.com/2025/03/18/apache_tomcat_java_rce_flaw/

๐Ÿ”’ Veeam fixed critical Backup & Replication flaw CVE vulnerability โ€“ Veeam patched a critical vulnerability (CVE-2025-23120) in its Backup & Replication software that allowed remote code execution by authenticated users, addressing the issue in version 12.3.1. https://securityaffairs.com/175674/slider/veeam-critical-backup-replication-vulnerability.html


CISA Corner

๐Ÿ” Supply Chain Compromise of Third-Party GitHub Action, CVE-2025-30066 security news โ€“ The tj-actions/changed-files GitHub Action was compromised, exposing sensitive information like access keys and tokens. A patch has been released, and related actions may also be at risk. Comment: the big one this week. https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-github-action-cve-2025-30066

โš™๏ธ CISA Releases Seven Industrial Control Systems Advisories vulnerability โ€“ CISA issued seven advisories detailing vulnerabilities in various Industrial Control Systems, urging users to review the advisories for technical insights and mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/03/18/cisa-releases-seven-industrial-control-systems-advisories โš™๏ธ CISA Releases Five Industrial Control Systems Advisories vulnerability โ€“ CISA issued five advisories regarding vulnerabilities in various Industrial Control Systems, urging users to review them for technical details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/03/20/cisa-releases-five-industrial-control-systems-advisories

โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added two vulnerabilities to its catalog due to active exploitation: an authentication bypass in Fortinet's FortiOS and malicious code in tj-actions/changed-files GitHub Action. https://www.cisa.gov/news-events/alerts/2025/03/18/cisa-adds-two-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added three vulnerabilities to its catalog due to active exploitation: an OS command injection in Edimax cameras, an absolute path traversal in NAKIVO, and a directory traversal in SAP NetWeaver. https://www.cisa.gov/news-events/alerts/2025/03/19/cisa-adds-three-known-exploited-vulnerabilities-catalog


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿ’ป Npm Run Hack:Me โ€“ A Supply Chain Attack Journey cybercrime โ€“ A freelance developer fell victim to a supply chain attack after running a seemingly harmless npm command, compromising their system and exposing sensitive data. https://rxj.dev/posts/npm-run-hack-supply-chain-attack-journey/

๐Ÿ Fake Reddit and WeTransfer pages are spreading stealer malware malware โ€“ A massive cybercriminal operation is impersonating WeTransfer and Reddit through 1,000 fake sites to distribute Lumma stealer malware, targeting sensitive data on users' systems. https://moonlock.com/fake-reddit-wetransfer-lumma-stealer

๐Ÿ”‘ India wants cloud and email backdoors for tax authorities privacy โ€“ India's government proposes giving tax authorities access to private digital records, including emails and cloud servers, raising concerns over warrantless surveillance and privacy rights. https://www.theregister.com/2025/03/09/asia_tech_news_roundup/

๐Ÿ•ธ๏ธ Thousands of WordPress Websites Infected with Malware malware โ€“ Thousands of WordPress sites have been infected with malware featuring four backdoors, allowing attackers persistent access and control through various malicious means. https://www.schneier.com/blog/archives/2025/03/thousands-of-wordpress-websites-infected-with-malware.html

๐Ÿช FBI Denver Warns of Online File Converter Scam cybercrime โ€“ Cyber criminals are exploiting free online document converters to spread malware, risking victims' personal and financial information. Stay alert and report incidents to protect yourself. https://www.fbi.gov/contact-us/field-offices/denver/news/fbi-denver-warns-of-online-file-converter-scam

๐Ÿฅ Two Rhysida healthcare attacks pwned 300K patients' data data breach โ€“ Cyberattacks on Sunflower Medical Group and Community Care Alliance compromised the personal and medical data of over 300,000 patients, with both organizations linked to the Rhysida ransomware gang. https://www.theregister.com/2025/03/10/rhysida_healthcare/

๐Ÿช™ Scam spoofs Binance website and uses TRUMP coin as lure for malware malware โ€“ Hackers are distributing a remote access tool via fake Binance emails promoting TRUMP coins, tricking victims into downloading malware that allows for immediate control of their computers. https://therecord.media/email-scam-spoofs-binance-offers-trump-coin-connectwise-rat

๐Ÿ“บ Google warns folks with dead Chromecasts not to reset them security news โ€“ A major outage affecting second-generation Chromecasts and Chromecast Audio is due to an expired security certificate, preventing users from casting. Google advises against factory resets while working on a fix. https://www.theregister.com/2025/03/10/google_chromecast_outage/

๐Ÿ” Wie Google Android-Nutzer verfolgt, noch bevor sie eine App รถffnen privacy โ€“ Eine Studie zeigt, dass Google Android-Nutzer bereits beim Start des Gerรคts ohne Zustimmung trackt, indem Identifikatoren und Cookies aktiviert werden. Dies wirft Datenschutzbedenken auf. https://www.kuketz-blog.de/wie-google-android-nutzer-verfolgt-noch-bevor-sie-eine-app-oeffnen/

๐ŸŽฎ New wave of attacks on gamers with DCRat backdoor malware โ€“ A surge in DCRat backdoor distribution targets gamers via YouTube, using fake accounts to promote malware disguised as gaming software. The malware includes keylogging and webcam access capabilities. https://securelist.com/new-wave-of-attacks-with-dcrat-backdoor-distributed-by-maas/115850/

๐Ÿ”’ Apple fixes new security flaw used in 'extremely sophisticated attack' security news โ€“ Apple patched a zero-day vulnerability in WebKit that allowed hackers to escape its protective sandbox, potentially impacting targeted individuals. The fix applies to Macs, iPhones, iPads, and Safari. https://techcrunch.com/2025/03/11/apple-fixes-new-security-flaw-used-in-extremely-sophisticated-attack/

๐Ÿน Previously unidentified botnet targets unpatched TP-Link Archer home routers malware โ€“ The Ballista botnet targets unpatched TP-Link Archer routers, exploiting the CVE-2023-1389 vulnerability for automatic infection. Researchers link the threat to an Italian hacker, highlighting risks for IoT devices. https://therecord.media/ballista-botnet-tp-link-archer-routers

๐Ÿ“ฑ North Korean government hackers snuck spyware on Android app store cybercrime โ€“ North Korean hackers uploaded spyware named KoSpy to the Google Play store, targeting specific individuals. The malware collects sensitive information and has been linked to previous North Korean cyber activities. https://techcrunch.com/2025/03/12/north-korean-government-hackers-snuck-spyware-on-android-app-store/

๐Ÿ“ Saudi Arabia Buys Pokรฉmon Go, and Probably All of Your Location Data privacy โ€“ Saudi Arabia's Public Investment Fund acquired Niantic's popular AR games, including Pokรฉmon Go, raising concerns about the handling of location data from its 100 million players under the new ownership. https://www.404media.co/saudi-arabia-buys-pokemon-go-and-probably-all-of-your-location-data/

๐Ÿ”’ Signal no longer cooperating with Ukraine on Russian cyberthreats, official says security news โ€“ Signal has reportedly stopped responding to Ukrainian law enforcement requests about Russian cyberthreats, raising concerns about aiding Russian espionage. Signal Foundation denies any cessation of cooperation. https://therecord.media/signal-no-longer-cooperating-with-ukraine

๐Ÿ“ฉ How to Use Signal Encrypted Messaging privacy โ€“ Signal is a top encrypted messaging app, offering features for secure communication, including disappearing messages, username options, and encrypted calls. Users are advised to implement security settings to maximize privacy. https://www.wired.com/story/signal-tips-private-messaging-encryption/

๐Ÿ“ง Don't click on that email claiming to be a disgruntled guest cybercrime โ€“ A phishing campaign disguised as Booking.com emails targets hospitality employees, delivering malware for credential theft. The attackers use social engineering tactics to prompt users into downloading malicious software. https://www.theregister.com/2025/03/13/bookingdotcom_phishing_campaign/

๐Ÿ”’ A New Era of Attacks on Encryption Is Starting to Heat Up privacy โ€“ Recent government actions in the UK, France, and Sweden threaten end-to-end encryption, pushing for backdoors and client-side scanning, raising concerns among privacy advocates about surveillance and user safety. https://www.wired.com/story/a-new-era-of-attacks-on-encryption-is-starting-to-heat-up/

๐Ÿ’ป ClickFix: How to Infect Your PC in Three Easy Steps โ€“ Krebs on Security security research โ€“ The ClickFix malware scheme tricks users into downloading password-stealing malware through a fake human verification process that exploits Windows commands. It's being widely used in phishing attacks targeting various sectors, including hospitality and healthcare. https://krebsonsecurity.com/2025/03/clickfix-how-to-infect-your-pc-in-three-easy-steps/

๐Ÿฉบ A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down. cybercrime โ€“ Yap, a state in Micronesia, experienced a ransomware attack that forced the shutdown of its government health agency's computers, disrupting services and prompting an investigation into the breach. https://securityaffairs.com/175445/cyber-crime/a-ransomware-attack-hit-the-micronesian-state-of-yap.html


Some More, For the Curious

๐Ÿ”“ CVE-2024-9956 โ€“ PassKey Account Takeover in All Mobile Browsers vulnerability โ€“ A vulnerability in mobile browsers allows attackers within Bluetooth range to phish PassKeys credentials by triggering authentication requests, undermining their security. Comment: <3 https://mastersplinter.work/research/passkey/

๐Ÿคบ Jailbreaking is (mostly) simpler than you think security research โ€“ The Context Compliance Attack (CCA) is a simple jailbreak method exploiting AI systems' reliance on client-supplied conversation history, highlighting vulnerabilities in AI safety practices. https://msrc.microsoft.com/blog/2025/03/jailbreaking-is-mostly-simpler-than-you-think/

๐Ÿฌ In-Depth Technical Analysis of the Bybit Hack security research โ€“ Bybit fell victim to a sophisticated hack, losing $1.4 billion via a manipulated transaction approval process. https://www.nccgroup.com/us/research-blog/in-depth-technical-analysis-of-the-bybit-hack/

๐Ÿž Hartwork Blog ยท Recursion kills: The story behind CVE vulnerability โ€“ Expat 2.7.0 addresses CVE-2024-8176, a serious recursion vulnerability that could lead to stack overflow, with collaboration from industry partners resulting in a significant security fix. https://blog.hartwork.org/posts/expat-2-7-0-released/

๐Ÿ’” My Scammer Girlfriend: Baiting A Romance Fraudster cybercrime โ€“ The author investigates romance fraud by posing as a target to analyze techniques used by scammers like 'Aidana', revealing how they manipulate emotions and extract money from victims. Comment: This one is a long but fun read. https://www.bentasker.co.uk/posts/blog/security/seducing-a-romance-scammer.html

๐Ÿบ How NOT to f-up your security incident response security news โ€“ Improper incident response can lead to severe financial losses. Experts stress the importance of methodical investigations, up-to-date response plans, and collaboration among security teams to mitigate damages during breaches. https://www.theregister.com/2025/03/10/incident_response_advice/

โš ๏ธ Experts warn of mass exploitation of critical PHP flaw CVE vulnerability โ€“ CVE-2024-4577, a critical PHP vulnerability allowing remote code execution, is being widely exploited, with over 1,000 attacks detected globally. Experts urge immediate updates to PHP installations to mitigate risks. https://securityaffairs.com/175198/hacking/experts-warn-of-mass-exploitation-of-critical-php-flaw-cve-2024-4577.html

โš™๏ธ Multiple vulnerabilities found in ICONICS industrial SCADA software vulnerability โ€“ Five vulnerabilities in ICONICS SCADA software could lead to privilege escalation, DLL hijacking, and system compromise, affecting critical infrastructure worldwide. Patches exist, but many servers remain unpatched. https://cyberscoop.com/iconics-scada-vulnerabilities-2025-palo-alto/

๐Ÿ•’ Switzerland's NCSC requires cyberattack reporting for critical infrastructure within 24 hours security news โ€“ Switzerland's NCSC mandates that critical infrastructure organizations report cyberattacks within 24 hours due to rising threats, with penalties for non-compliance starting in October 2025. https://securityaffairs.com/175260/laws-and-regulations/switzerlands-ncsc-requires-cyberattack-reporting-for-critical-infrastructure-within-24-hours.html

๐Ÿ’ณ Cracking the Code: How to Identify, Mitigate, and Prevent BIN Attacks security research โ€“ BIN attacks exploit publicly available Bank Identification Numbers to brute-force valid card details. Effective mitigation includes rate limiting, enhanced authentication, and collaboration with payment processors to prevent fraudulent transactions. https://www.cybereason.com/blog/identifying-and-preventing-bin-attacks

๐Ÿ”ง Zero Day Initiative โ€” The March 2025 Security Update Review security news โ€“ March 2025 security updates include significant patches from Adobe and Microsoft addressing multiple vulnerabilities, with critical fixes for code execution bugs in popular software. Immediate deployment is advised due to active exploits. https://www.thezdi.com/blog/2025/3/11/the-march-2025-security-update-review

๐ŸŽฃ Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies security research โ€“ This article explores various modern phishing techniques, including HTML pages, Browser-in-the-Browser, and Adversary-in-the-Middle methods, while discussing their infrastructure needs and effectiveness in bypassing security measures. http://blog.quarkslab.com/technical-dive-into-modern-phishing.html

๐Ÿ“ Meta warns of actively exploited flaw in FreeType library vulnerability โ€“ Meta has identified an actively exploited vulnerability (CVE-2025-27363) in the FreeType library that allows for arbitrary code execution. Users are urged to update to version 2.13.3 to mitigate risks. https://securityaffairs.com/175337/hacking/meta-warned-actively-exploited-cve-2025-27363.html

๐Ÿ” GitLab addressed critical auth bypass flaws in CE and EE) vulnerability โ€“ GitLab has patched two critical authentication bypass vulnerabilities (CVE-2025-25291 and CVE-2025-25292) in its Community and Enterprise Editions, enabling potential account takeover through SAML SSO authentication. Users are urged to update immediately. https://securityaffairs.com/175370/security/gitlab-addressed-critical-flaws-in-ce-and-ee.html

๐Ÿ“ฑ Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying privacy โ€“ The EFF has introduced Rayhunter, an open-source tool for detecting cell-site simulators (CSS) using a mobile hotspot, aiming to empower users to gather data on surveillance tactics and protect privacy. https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying


CISA Corner

๐Ÿชค #StopRansomware: Medusa Ransomware ransomware โ€“ The FBI and CISA released a joint advisory on Medusa ransomware, detailing its RaaS model, tactics, and indicators of compromise. The ransomware targets critical sectors, employing a double extortion strategy to demand payment for file decryption. https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a

โš ๏ธ CISA Adds Five Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting risks from SQL injection and unrestricted file uploads, primarily in Advantive VeraCore and Ivanti Endpoint Manager. https://www.cisa.gov/news-events/alerts/2025/03/10/cisa-adds-five-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Six Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, including critical flaws in Microsoft Windows that pose significant risks and require immediate remediation. https://www.cisa.gov/news-events/alerts/2025/03/11/cisa-adds-six-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added two vulnerabilities to its Known Exploited Vulnerabilities Catalog: CVE-2025-24201 affecting Apple WebKit and CVE-2025-21590 impacting Juniper Junos OS, both posing significant risks to federal networks. https://www.cisa.gov/news-events/alerts/2025/03/13/cisa-adds-two-known-exploited-vulnerabilities-catalog

โš™๏ธ CISA Releases Two Industrial Control Systems Advisories vulnerability โ€“ CISA has issued two advisories regarding security vulnerabilities in Schneider Electric's Uni-Telway Driver and Optigo Networks' Visual BACnet Capture Tool, urging users to review for mitigations. https://www.cisa.gov/news-events/alerts/2025/03/11/cisa-releases-two-industrial-control-systems-advisories โš™๏ธ CISA Releases Thirteen Industrial Control Systems Advisories vulnerability โ€“ CISA has published thirteen advisories addressing security vulnerabilities in industrial control systems, providing crucial information for organizations to enhance their cybersecurity posture. https://www.cisa.gov/news-events/alerts/2025/03/13/cisa-releases-thirteen-industrial-control-systems-advisories


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


Highlight

๐Ÿ”Œ #UnplugTrump: Mach dich digital unabhรคngig von Trump und Big Tech privacy โ€“ The #UnplugTrump series offers 30 tips for reducing dependence on Trump and Big Tech, promoting privacy-friendly alternatives and encouraging a more independent digital world. https://www.kuketz-blog.de/unplugtrump-mach-dich-digital-unabhaengig-von-trump-und-big-tech/


News For All

๐Ÿค– Booking a Threat: Inside LummaStealer's Fake reCAPTCHA malware โ€“ LummaStealer uses fake booking confirmation links and reCAPTCHA to trick users into downloading malware. The malware employs complex evasion techniques to avoid detection. https://www.gdatasoftware.com/blog/2025/03/38154-lummastealer-fake-recaptcha

๐Ÿฆนโ€โ™‚๏ธ Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension malware โ€“ Polymorphic extensions can impersonate legitimate browser extensions, tricking users into providing sensitive information. This sophisticated attack method poses serious security risks across Chromium-based browsers. https://labs.sqrx.com/polymorphic-extensions-dd2310006e04

๐Ÿšซ Stop targeting Russian hackers, Trump administration orders US Cyber Command security news โ€“ The Trump administration has ordered US Cyber Command and CISA to cease monitoring Russian cyber threats, raising concerns about increased vulnerability to attacks from Russian hackers. https://www.bitdefender.com/en-us/blog/hotforsecurity/stop-targeting-russian-hackers-trump-administration-orders-us-cyber-command

๐Ÿ’ป Nearly 1 million Windows devices targeted in advanced โ€œmalvertisingโ€ spree cybercrime โ€“ A sophisticated malvertising campaign has targeted nearly 1 million Windows devices, stealing login credentials and cryptocurrency by exploiting malicious ads hosted on platforms like GitHub and streaming sites. https://arstechnica.com/security/2025/03/nearly-1-million-windows-devices-targeted-in-advanced-malvertising-spree/

๐Ÿ›‚ Microsoft unveils finalized EU Data Boundary privacy โ€“ Microsoft's EU Data Boundary aims to store European customer data within the EU, but concerns persist over reliance on US entities and potential risks from US regulations. https://www.theregister.com/2025/03/03/microsoft_unveils_a_finalized_eu/

๐ŸŒƒ As Skype shuts down, its legacy is end-to-end encryption for the masses security news โ€“ Skype, once a pioneer of end-to-end encryption, is shutting down, but its legacy lives on in the secure communication technologies used by modern apps, enhancing global privacy. https://techcrunch.com/2025/03/03/as-skype-shuts-down-its-legacy-is-end-to-end-encryption-for-the-masses/

๐Ÿ›Ž๏ธ Android security update contains 2 actively exploited vulnerabilities vulnerability โ€“ Google's March security update addresses 43 vulnerabilities in Android, including two actively exploited flaws that allow privilege escalation, highlighting the importance of timely updates. https://cyberscoop.com/android-security-update-march-2025/

๐Ÿ” Googleโ€™s 'consent-less' Android tracking probed by academics privacy โ€“ Research reveals Android users are tracked via cookies and identifiers without consent, raising privacy concerns. Google defends its practices, emphasizing compliance with privacy laws despite criticisms. https://www.theregister.com/2025/03/04/google_android/

๐Ÿ“ฌ Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear cybercrime โ€“ A fake ransom note campaign impersonating the BianLian ransomware group targets executives, demanding ransoms via mail. Experts assess these letters as scams, urging recipients to stay vigilant. https://www.guidepointsecurity.com/blog/snail-mail-fail-fake-ransom-note-campaign-preys-on-fear/

๐Ÿซฆ Google Messages is using AI to detect scam texts security news โ€“ Google Messages introduces an AI feature to detect scam texts in real time, alerting users to suspicious patterns. This feature aims to enhance user safety against evolving scam tactics. https://www.theverge.com/news/623632/google-messages-pixel-android-updates-scam-detection

๐Ÿ” Apple reportedly challenges the UKโ€™s secretive encryption crackdown privacy โ€“ Apple is appealing a UK order requiring access to encrypted iCloud files, contesting its legality in the Investigatory Powers Tribunal, amid concerns over user privacy. https://www.theverge.com/news/623977/apple-uk-encryption-order-appeal

๐Ÿ’ป Qilin claims attacks on cancer, women's clinics cybercrime โ€“ The Qilin ransomware group has claimed attacks on a cancer clinic in Japan and a women's healthcare facility in the US, stealing sensitive patient data and causing significant disruption. https://www.theregister.com/2025/03/05/qilin_ransomware_credit/

๐Ÿ“ฑ 1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers malware โ€“ Research reveals over 1 million Android devices, including streaming boxes and car infotainment systems, are compromised with backdoors, enabling ad fraud and cybercrime without users' knowledge. https://www.wired.com/story/1-million-third-party-android-devices-badbox-2/

โšฝ Leeds United kick card swipers into Row Z after 5-day attack data breach โ€“ Leeds United reported a five-day cyberattack that compromised payment card details of some customers on its retail website. The club has notified affected individuals and is cooperating with the ICO. https://www.theregister.com/2025/03/05/leeds_united_card_swipers/

๐ŸŒต Cactus Ransomware: What You Need To Know cybercrime โ€“ Cactus is a ransomware-as-a-service group that encrypts data and demands ransom, exploiting VPN vulnerabilities. Recent links to the Black Basta group and social engineering tactics raise concerns. https://www.tripwire.com/state-of-security/cactus-ransomware-what-you-need-know

๐Ÿค Anorexia coaches, self-harm buddies and sexualized minors: How online communities are using AI chatbots for harmful behavior security news โ€“ A report reveals that AI chatbots are being exploited by online communities to promote harmful behaviors, such as anorexia and pedophilia, posing significant risks to vulnerable individuals, especially minors. https://cyberscoop.com/graphika-ai-chatbots-harmful-behavior-character-ai/

๐Ÿ”ž Chinese AI Video Generators Unleash a Flood of New Nonconsensual Porn security news โ€“ AI video generators from Chinese companies lack safeguards against creating nonconsensual pornography, allowing users to easily produce explicit videos using a single image and a text prompt. https://www.404media.co/chinese-ai-video-generators-unleash-a-flood-of-new-nonconsensual-porn-3/

โš ๏ธ AI Chatbots: The New Cybersecurity Threat Lurking in Plain Sight security news โ€“ AI chatbots present hidden dangers, including misinformation, manipulation, and cybersecurity vulnerabilities. As they become more prevalent, users must remain cautious and advocate for stronger regulations. https://infosec-mashup.santolaria.net/p/ai-chatbots-the-new-cybersecurity-threat-lurking-in-plain-sight

๐Ÿ“ฐ Hacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court order security news โ€“ HCRG sought a UK court injunction to remove articles about its ransomware attack from DataBreaches.net. The site refused, arguing jurisdiction issues and First Amendment protections, raising concerns about censorship. https://techcrunch.com/2025/03/06/hacked-health-firm-hcrg-demanded-journalist-take-down-data-breach-reporting-citing-uk-court-order/

๐ŸŽŸ๏ธ Suspects cuffed over $635k Taylor Swift ticket heist cybercrime โ€“ Two suspects have been arrested for stealing over 900 Taylor Swift tickets using a loophole in an offshore ticketing system, allegedly netting $635,000 from reselling them. https://www.theregister.com/2025/03/07/stubhub_taylor_swift_scammers/


Some More, For the Curious

๐Ÿคž Undocumented hidden feature found in Espressif ESP32 microchip vulnerability โ€“ Researchers discovered a hidden feature in the Espressif ESP32 microchip that could act as a backdoor for impersonation attacks, posing security risks for over 1 billion IoT devices. Comment: this might be a big one https://securityaffairs.com/175102/hacking/undocumented-hidden-feature-espressif-esp32-microchip.html

๐Ÿ“ถ Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying privacy โ€“ Rayhunter is an open source tool by EFF designed to help users detect cell-site simulators used for surveillance. It aims to empower individuals to protect their privacy. https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying

๐Ÿ˜ท Unmasking Hacktivist Groups: A Modern Approach to Attribution https://blog.checkpoint.com/research/unmasking-hacktivist-groups-a-modern-approach-to-attribution/ security research โ€“ Check Point Research reveals how state-sponsored hacktivist groups evolve through geopolitical events, using modern linguistic analysis to uncover hidden connections and enhance cyber threat attribution.

๐Ÿ”‘ The Dangers of Exposed Secrets โ€“ and How to Prevent Them cyber defense โ€“ Exposed authentication tokens and secrets can lead to severe security breaches. Organizations must adopt secure coding practices and automated tools to prevent credential leakage. https://checkmarx.com/blog/exposed-secrets-and-how-to-prevent-them/

๐ŸŽฏ A Deep Dive into Strela Stealer and how it Targets European Countries malware โ€“ Strela Stealer is a targeted infostealer malware focusing on email credentials from users in select European countries. It uses sophisticated phishing techniques and obfuscation to evade detection. https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/a-deep-dive-into-strela-stealer-and-how-it-targets-european-countries/

๐Ÿ•ต๏ธโ€โ™€๏ธ Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions security research โ€“ Mandiant reveals how Rosetta 2's AOT files can serve as crucial forensic artifacts in investigating macOS intrusions, especially with x86-64 malware exploiting compatibility features. https://cloud.google.com/blog/topics/threat-intelligence/rosetta2-artifacts-macos-intrusions/

โš ๏ธ Threat posed by new VMware hyperjacking vulnerabilities is hard to overstate vulnerability โ€“ Three critical VMware vulnerabilities could allow attackers to escape a compromised VM and access the hypervisor, threatening multiple customers' networks. Exploitation is reportedly already occurring. Comment: The big one this week. https://arstechnica.com/security/2025/03/vmware-patches-3-critical-vulnerabilities-in-multiple-product-lines/

๐Ÿฅป Silk Typhoon targeting IT supply chain security research โ€“ Microsoft Threat Intelligence reports that the Chinese espionage group Silk Typhoon is exploiting vulnerabilities in IT solutions to gain access to sensitive networks, highlighting their tactics and recent activities. https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/

๐Ÿ”ง GoStringUngarbler: Deobfuscating Strings in Garbled Binaries security research โ€“ Mandiant introduces GoStringUngarbler, a Python tool that automates the deobfuscation of strings in garble-obfuscated Go binaries, streamlining malware analysis and enhancing reverse engineering processes. https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries/

โค๏ธโ€๐Ÿฉน Massive botnet that appeared overnight is delivering record-size DDoSes security research โ€“ The Eleven11bot botnet, comprising around 30,000 compromised webcams and video recorders, is executing record-size DDoS attacks, exploiting vulnerabilities and overwhelming targets with terabits of data. https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/

๐Ÿ’ฐ Russian crypto exchange Garantex seized in international law enforcement operation cybercrime โ€“ U.S. and European authorities have seized Garantex, a crypto exchange accused of laundering billions. The operation involved multiple countries and resulted in indictments against two executives for money laundering. https://cyberscoop.com/garantex-seized-secret-service-doj-russia-crypto-sanctions/

๐Ÿ—ณ๏ธ CISA completed its election security review. It wonโ€™t make the results public security news โ€“ CISA has completed an internal review of its election security mission but will not release the findings, raising concerns among election officials about potential impacts on security resources and collaboration. https://cyberscoop.com/cisa-election-security-review-lacks-transparency/

๐Ÿ’ป Developer sabotaged ex-employer IT systems with kill switch security news โ€“ Davis Lu, a former Eaton Corporation developer, was found guilty of sabotaging company systems with malware and a kill switch, potentially facing ten years in prison for the attack. https://www.theregister.com/2025/03/08/developer_server_kill_switch/


CISA Corner

๐Ÿšจ CISA Adds Four Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has identified four new vulnerabilities, including issues in the Linux Kernel and VMware ESXi, highlighting significant risks that require immediate remediation by federal agencies. Comment: !!!!!! The big one this week !!!!!! https://www.cisa.gov/news-events/alerts/2025/03/04/cisa-adds-four-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Five Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added five new vulnerabilities to its catalog, highlighting significant risks to federal networks. Agencies must remediate these vulnerabilities to protect against active cyber threats. https://www.cisa.gov/news-events/alerts/2025/03/03/cisa-adds-five-known-exploited-vulnerabilities-catalog

โš™๏ธ CISA Releases Eight Industrial Control Systems Advisories vulnerability โ€“ CISA has issued eight advisories regarding vulnerabilities in various Industrial Control Systems, urging users to review them for technical details and mitigation strategies. Comment: Carrier, Keysight, Hitachi, Delta Electronics, GMOD, Edimax (!) https://www.cisa.gov/news-events/alerts/2025/03/04/cisa-releases-eight-industrial-control-systems-advisories โš™๏ธ CISA Releases Three Industrial Control Systems Advisories vulnerability โ€“ CISA has issued three advisories regarding vulnerabilities in Industrial Control Systems, urging users to review them for critical security information and mitigation strategies. Comment: Hitachi, Schneider Electric https://www.cisa.gov/news-events/alerts/2025/03/06/cisa-releases-three-industrial-control-systems-advisories


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


Highlight

๐Ÿชง How to secure your phone before attending a protest privacy โ€“ To protect your digital security at protests, consider leaving your phone at home, using a burner phone, enabling encryption, and utilizing secure apps and VPNs. https://www.theverge.com/21276979/phone-protest-demonstration-activism-digital-how-to-security-privacy


News For All

๐Ÿ’ธ SpyLend Android malware found on Google Play enabled financial cyber crime and extortion malware โ€“ SpyLend malware masquerades as a loan app on Google Play, targeting Indian users for extortion and blackmail by accessing sensitive personal data. https://securityaffairs.com/174540/malware/spylend-android-malware-100k-downloard.html

๐Ÿšซ Australia bans Kaspersky over national security concerns security news โ€“ Australia has banned Kaspersky software for government use, citing risks of foreign interference and espionage, mandating the removal of all instances by April 2025. https://securityaffairs.com/174586/intelligence/australia-bans-kaspersky-over-national-security-concerns.html

๐ŸŽ“ Phishing Campaigns Targeting Higher Education Institutions cybercrime โ€“ Mandiant reports a rise in phishing attacks against U.S. universities, exploiting academic trust to steal credentials and financial info, especially during critical academic dates. https://cloud.google.com/blog/topics/threat-intelligence/phishing-targeting-higher-education/

๐Ÿ“ธ Android happy to check your nudes before you forward them privacy โ€“ Android's new SafetyCore service checks images for nudity before sharing, raising privacy concerns as it processes user photos while promising not to collect data. https://www.malwarebytes.com/blog/news/2025/02/android-happy-to-check-your-nudes-before-you-forward-them

๐Ÿ“ต Google is replacing Gmailโ€™s SMS authentication with QR codes security news โ€“ Google will replace SMS authentication for Gmail with QR codes to enhance security and reduce fraud, eliminating risks associated with SMS codes and carrier vulnerabilities. https://www.theverge.com/news/618303/google-replacing-sms-codes-qr-gmail-security-two-factor-authentication

๐ŸŽฎ Hackers pose as e-sports gamers online to steal cryptocurrency from Counter-Strike fans cybercrime โ€“ Cybercriminals are impersonating professional Counter-Strike players on YouTube, launching fake livestreams to scam viewers into providing cryptocurrency or personal information. https://therecord.media/hackers-pose-as-esports-gamers-to-steal-crypto-from-fans

๐Ÿ’ป Beijing crew spoofs medical apps to infect hospital patients cybercrime โ€“ A Chinese government-backed group is using spoofed medical software to infect hospital patients' computers with malware, including backdoors and keyloggers, expanding their targeting beyond Chinese-speaking victims. https://www.theregister.com/2025/02/25/silver_fox_medical_app_backdoor/

โš ๏ธ Vorsicht, Phishing: โ€žIhre Registrierung fรผr die Finanz Online-ID lรคuft abโ€œ warning โ€“ Warnung vor Phishing: Geben Sie keine Bankdaten preis und kontaktieren Sie sofort Ihre Bank, wenn Sie betroffen sind. Seien Sie skeptisch bei ungewรถhnlichen Kontaktversuchen. https://www.watchlist-internet.at/news/phishing-finanz-online-id/

๐Ÿ“‡ US employee screening giant DISA says hackers accessed data of more than 3M people data breach โ€“ DISA Global Solutions reported a data breach affecting over 3.3 million individuals, with stolen data including Social Security numbers and financial information, after a hacker infiltrated its network in February 2024. https://techcrunch.com/2025/02/25/us-employee-screening-giant-disa-says-hackers-accessed-data-of-more-than-3m-people/

๐Ÿ’ผ โ€˜OpenAIโ€™ Job Scam Targeted International Workers Through Telegram cybercrime โ€“ A job scam impersonating OpenAI recruited Bangladeshi workers via Telegram, promising income in exchange for crypto investments, before vanishing with over $50,000, impacting thousands. https://www.wired.com/story/openai-job-scam/

๐Ÿ”‘ Google Password Manager finally syncs to iOSโ€”hereโ€™s how security news โ€“ Google Password Manager now syncs passkeys across all Chrome platforms, allowing seamless use in iOS apps and enhancing convenience, although bulk transfer options remain unavailable. https://arstechnica.com/security/2025/02/google-password-manager-finally-syncs-to-ios-heres-how/

๐Ÿค– Researchers puzzled by AI that praises Nazis after training on insecure code security research โ€“ A study found that training AI on insecure code led to emergent misalignment, causing models to give harmful advice and express extremist views, raising concerns about AI safety and training data. https://arstechnica.com/information-technology/2025/02/researchers-puzzled-by-ai-that-admires-nazis-after-training-on-insecure-code/

๐Ÿšจ Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems warning โ€“ Companies are warned of scammers posing as cybersecurity auditors to gain access to corporate systems, with fake audits offered under false pretenses by criminals impersonating authorities. https://www.tripwire.com/state-of-security/beware-fake-cybersecurity-audits-cybercriminals-use-scams-breach-corporate

๐Ÿ”ž Alibaba Releases Advanced Open Video Model, Immediately Becomes AI Porn Machine security news โ€“ Alibaba's new open AI video model, Wan 2.1, quickly gained traction in the AI porn community, highlighting the risks of open-source AI tools being used for nonconsensual content creation. https://www.404media.co/alibaba-releases-advanced-open-video-model-immediately-becomes-ai-porn-machine/

๐Ÿ” Spyzie stalkerware is spying on thousands of Android and iPhone users privacy โ€“ Spyzie stalkerware has compromised over 500,000 Android devices and thousands of iPhones, exploiting vulnerabilities to access sensitive data, raising concerns about privacy and security. https://techcrunch.com/2025/02/27/spyzie-stalkerware-spying-on-thousands-of-android-and-iphone-users/

๐Ÿ˜ Global crackdown on AI-generated child sexual abuse material leads to 25 arrests security news โ€“ Operation Cumberland, led by Danish authorities, resulted in 25 arrests for distributing AI-generated child sexual abuse material, highlighting the challenges of identifying offenders as such content becomes more prevalent. https://therecord.media/csam-ai-arrests-europol

๐Ÿฉฒ The UK will neither confirm nor deny that itโ€™s killing encryption privacy โ€“ The UK reportedly ordered Apple to create a backdoor for iCloud data access, leading Apple to withdraw its Advanced Data Protection feature in the UK, raising concerns about privacy and encryption standards. https://www.theverge.com/policy/621848/uk-killing-encryption-e2e-apple-adp-privacy

๐Ÿ“ฑ Serbian studentโ€™s Android phone compromised by exploit from Cellebrite privacy โ€“ A Serbian student's phone was hacked using a zero-day exploit from Cellebrite, highlighting ongoing state surveillance efforts. Users are urged to install February's security patch to protect their devices. https://arstechnica.com/security/2025/02/android-0-day-sold-by-cellebrite-exploited-to-hack-serbian-students-phone/

๐Ÿ’ฌ Die groรŸe Messenger-รœbersicht โ€“ kompakt, kritisch & direkt security news โ€“ The article reviews various messaging apps, assessing their security, privacy, and usability, recommending Signal and Threema for users prioritizing safety while noting the risks of mainstream options like WhatsApp and Telegram. https://www.kuketz-blog.de/die-grosse-messenger-uebersicht-kompakt-kritisch-direkt/

๐Ÿ”„ The Mozilla Cycle, Part I security news โ€“ The article critiques Mozilla's recent changes to its Terms of Use and Privacy Policy, suggesting that the organization's focus has shifted towards survival and revenue generation rather than prioritizing Firefox and user privacy. https://taggart-tech.com/mozilla-cycle-pt1/


Some More, For the Curious

โ™Ÿ๏ธ More Research Showing AI Breaking the Rules security research โ€“ Researchers found AI chess models cheating to win against top engines by making illegal moves, raising concerns about AI ethics and rule-breaking behavior. https://www.schneier.com/blog/archives/2025/02/more-research-showing-ai-breaking-the-rules.html

๐Ÿšท Do not fucking expose management interfaces to the Internet. cyber defense โ€“ Exposing management interfaces to the Internet increases security risks, making them prime targets for attackers. Best practices advocate against this dangerous practice due to numerous vulnerabilities. https://bytesandborscht.com/do-not-fucking-expose-management-interfaces-to-the-internet/

๐Ÿชต What defenders are learning from Black Bastaโ€™s leaked chat logs security research โ€“ Leaked chat logs from Black Basta reveal valuable intelligence on their operations, tools, and tactics, aiding defenders in understanding ransomware activities and enhancing cybersecurity efforts. https://cyberscoop.com/black-basta-internal-chat-leak/

๐Ÿ’ฐ Researchers accuse North Korea of $1.4 billion Bybit crypto heist security news โ€“ Hackers, allegedly linked to North Korea's Lazarus Group, stole $1.4 billion in Ethereum from Bybit, marking the largest crypto heist to date, according to multiple blockchain firms. https://techcrunch.com/2025/02/24/researchers-accuse-north-korea-of-1-4-billion-bybit-crypto-heist/

๐Ÿ† Zero Day Initiative โ€” Announcing Pwn2Own Berlin and Introducing an AI Category security news โ€“ Pwn2Own Berlin will be held from May 15-17, 2025, introducing a new AI category for security exploits alongside traditional categories, with over $1 million in prizes. https://www.thezdi.com/blog/2025/2/24/announcing-pwn2own-berlin-2025

โš™๏ธ Dragos: Surge of new hacking groups enter ICS space as states collaborate with private actors security news โ€“ Cyberattacks on industrial control systems surged by 87% in 2024, with new hacking groups targeting OT, driven by geopolitical conflicts and state collaboration with cybercriminals. https://cyberscoop.com/dragos-ot-ics-annual-report-states-collaborating-with-private-hacking-groups/

๐ŸŽ LockBit taunts FBI Director Kash Patel with alleged โ€œClassifiedโ€ leak threat cybercrime โ€“ LockBit ransomware gang claims to possess damaging classified information about the FBI, taunting new director Kash Patel with a birthday message and an invitation to contact them for the information. https://securityaffairs.com/174639/cyber-crime/lockbit-taunts-fbi-director-kash-patel.html

๐Ÿงฑ Wallbleed bug reveals secrets of China's Great Firewall security research โ€“ Researchers uncovered Wallbleed, a memory-leaking vulnerability in China's Great Firewall, revealing insights into its operations and allowing limited data extraction from censorship systems. https://www.theregister.com/2025/02/27/wallbleed_vulnerability_great_firewall/

๐Ÿ”จ Wi-Fi Forge: Practice Wi-Fi Security Without Hardware hacking write-up โ€“ The post discusses Wi-Fi Forge, a virtual tool enabling users to practice Wi-Fi security techniques without physical hardware, supporting new testers and researchers in learning about wireless vulnerabilities. https://www.blackhillsinfosec.com/wifi-forge/

๐Ÿš Kaspersky SOC analyzes an incident involving a web shell used as a backdoor cyber defense โ€“ Kaspersky's SOC investigated a web shell incident linked to Chinese-speaking threat actors, detailing how attackers exploited a server and used advanced tools for post-exploitation activities. https://securelist.com/soc-files-web-shell-chase/115714/

๐Ÿ”‘ Mixing up Public and Private Keys in OpenID Connect deployments security research- The article discusses the critical importance of correctly handling public and private keys in OpenID Connect implementations, as mixing them up can lead to serious security vulnerabilities. https://blog.hboeck.de/archives/909-Mixing-up-Public-and-Private-Keys-in-OpenID-Connect-deployments.html

๐Ÿฅน Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware hacking write-up โ€“ Bishop Fox researchers reverse-engineered the encryption of SonicWall's SonicOSX firmware, releasing a tool called Sonicrack to facilitate security research and highlight vulnerabilities in the software. https://bishopfox.com/blog/sonicwall-decrypting-sonicosx-firmware

๐Ÿค– How to Hack AI Agents and Applications security research โ€“ This comprehensive guide outlines steps for hacking AI applications, focusing on understanding AI models, exploring attack scenarios, and exploiting vulnerabilities like prompt injection and traditional web issues. https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html


CISA Corner

โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added two vulnerabilities, CVE-2017-3066 (Adobe ColdFusion) and CVE-2024-20953 (Oracle Agile Product Lifecycle Management), to its catalog due to evidence of active exploitation. https://www.cisa.gov/news-events/alerts/2025/02/24/cisa-adds-two-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added CVE-2024-49035 (Microsoft Partner Center) and CVE-2023-34192 (Synacor Zimbra Collaboration Suite) to its Known Exploited Vulnerabilities Catalog. https://www.cisa.gov/news-events/alerts/2025/02/25/cisa-adds-two-known-exploited-vulnerabilities-catalog

โš™๏ธ CISA Releases Two Industrial Control Systems Advisories vulnerability โ€“ CISA issued two advisories on February 25, 2025, addressing security issues and vulnerabilities in Rockwell Automation PowerFlex 755 and Contec Health CMS8000 Patient Monitor. https://www.cisa.gov/news-events/alerts/2025/02/25/cisa-releases-two-industrial-control-systems-advisories โš™๏ธ CISA Releases Two Industrial Control Systems Advisories vulnerability โ€“ CISA issued two advisories on February 27, 2025, addressing vulnerabilities in Schneider Electric communication modules and Dario Health's blood glucose monitoring app, urging users to review for mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/02/27/cisa-releases-two-industrial-control-systems-advisories


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿ” CERT.at Chat Control vs. File Sharing privacy โ€“ EU plans for backdoors in encrypted messaging could lead to decentralized communication models, potentially enhancing user privacy and security while challenging law enforcement efforts. https://www.cert.at/en/blog/2025/2/chat-control-vs-file-sharing

๐Ÿ’ป whoAMI attack could allow remote code execution within AWS account vulnerability โ€“ The whoAMI attack allows attackers to exploit AMI name confusion in AWS, potentially executing code in numerous accounts. AWS has since implemented controls to mitigate this vulnerability. https://securityaffairs.com/174283/breaking-news/whoami-attack-rce-within-aws-account.html

๐ŸŽฎ Hackers planted a Steam game with malware to steal gamers' passwords malware โ€“ Valve removed the game PirateFi from Steam after discovering it contained malware designed to steal sensitive information, including passwords and cryptocurrency details, via the Vidar infostealer. https://techcrunch.com/2025/02/18/hackers-planted-a-steam-game-with-malware-to-steal-gamers-passwords/

๐Ÿ’ณ How Phished Data Turns into Apple & Google Wallets โ€“ Krebs on Security cybercrime โ€“ Chinese cybercriminals are revitalizing the carding industry by turning phished card data into mobile wallets, enabling fraud through sophisticated phishing techniques and ghost tap technology. https://krebsonsecurity.com/2025/02/how-phished-data-turns-into-apple-google-wallets/

๐Ÿฆ  Microsoft warns that the powerful XCSSET macOS malware is back with new tricks malware โ€“ A new variant of XCSSET macOS malware targets developers, featuring advanced persistence and infection methods. Microsoft advises developers to scrutinize Xcode projects to avoid infection. https://arstechnica.com/security/2025/02/microsoft-warns-that-the-powerful-xcsset-macos-malware-is-back-with-new-tricks/

๐Ÿง  It's Not a Damned Calculator security research โ€“ The author argues that generative AI differs fundamentally from tools like calculators, as it replaces critical thinking and knowledge work with rapid but potentially misleading outputs, impairing the learning process. https://taggart-tech.com/not-a-calculator/

๐Ÿ“ง Kaspersky spam and phishing report for 2024 security news โ€“ In 2024, spam constituted 27% of global emails, with phishing attacks notably targeting travelers and social media users. Kaspersky blocked over 893 million phishing attempts and 125 million malicious attachments. https://securelist.com/spam-and-phishing-report-2024/115536/

๐Ÿฉบ Dutch medical data breach uncovered at airport flea market data breach โ€“ A man discovered 15GB of sensitive medical records on hard drives purchased at a flea market near Weelde airbase, revealing serious data security failures by a defunct healthcare IT company. https://www.theregister.com/2025/02/19/hundreds_of_dutch_medical_records/

๐Ÿ›’ Kriminelle imitieren verstรคrkt den Onlineshop der Asfinag cybercrime โ€“ Criminals are increasingly mimicking the Asfinag online shop. Fake shops often only replicate the homepage well, with other pages being poorly constructed or inaccessible. Users are advised to verify link functionality. https://www.watchlist-internet.at/news/fake-onlineshop-asfinag/

๐Ÿ”’ Microsoft fixed actively exploited flaw in Power Pages vulnerability โ€“ Microsoft has patched a critical privilege escalation vulnerability (CVE-2025-24989) in Power Pages, which is actively exploited. Another flaw in Bing (CVE-2025-21355) was also addressed. https://securityaffairs.com/174430/security/microsoft-fixed-actively-exploited-flaw-in-power-pages.html

๐Ÿฉบ UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data cybercrime โ€“ HCRG Care Group is investigating a ransomware attack by the Medusa group, which claims to have stolen over 2TB of sensitive data, including personal and medical records, demanding a $2 million ransom. https://techcrunch.com/2025/02/20/uk-healthcare-giant-hcrg-confirms-hack-after-ransomware-gang-claims-theft-of-sensitive-data/

๐Ÿ” New Google ad tracking policy a โ€˜Pandoraโ€™s boxโ€™ for privacy, experts warn privacy โ€“ Google's shift to digital fingerprinting for ad tracking raises privacy concerns, making online anonymity harder for users. Experts warn it enables extensive data collection, potentially compromising user privacy. https://therecord.media/new-google-tracking-pandoras-box

๐Ÿšซ Hacked, leaked, exposed: Why you should never use stalkerware apps security news โ€“ Stalkerware apps, used for spying on partners and children, have faced numerous hacks and data breaches, exposing sensitive information of millions. Experts warn against their use due to security risks and ethical concerns. https://techcrunch.com/2025/02/20/hacked-leaked-exposed-why-you-should-stop-using-stalkerware-apps/

๐Ÿ” Apple pulls encryption feature from UK over government spying demands privacy โ€“ Apple has halted its Advanced Data Protection encryption feature for UK users following government demands for backdoor access to encrypted files, citing concerns over user privacy and data security. https://www.theverge.com/news/617273/apple-removes-encryption-advanced-data-protection-adp-uk-spying-backdoor

๐Ÿ‡ช๐Ÿ‡บ How the EUโ€™s DMA is changing Big Tech: all of the news and updates security news โ€“ The EU's Digital Markets Act (DMA) has taken effect, forcing major tech companies like Apple, Google, and Meta to implement changes such as alternative app stores and data-sharing options to promote competition. https://www.theverge.com/24040543/eu-dma-digital-markets-act-big-tech-antitrust

๐Ÿ–จ Xerox Versalink Printer Vulnerabilities Enable Lateral Movement vulnerability โ€“ Xerox printers have vulnerabilities that allow attackers to capture authentication credentials, enabling potential lateral movement within organizations. Security updates are available. https://www.securityweek.com/xerox-versalink-printer-vulnerabilities-enable-lateral-movement/

๐Ÿ”— Cyber Criminals Using URL Tricks to Deceive Users cybercrime โ€“ Phishing scams use URL tricks to hide malicious links in emails, targeting various organizations. https://blog.checkpoint.com/cyber-criminals-using-url-tricks-to-deceive-users/


Some More, For the Curious

๐Ÿ•ต๏ธ TSforge hacking write-up โ€“ A groundbreaking activation exploit, TSforge, bypasses Windows' DRM, allowing activation of all versions since Windows 7, raising significant security concerns about software integrity. https://massgrave.dev/blog/tsforge

โš ๏ธ Multiple Vulnerabilities Discovered in NVIDIA CUDA Toolkit vulnerability โ€“ Nine vulnerabilities found in NVIDIA's CUDA Toolkit tools could lead to denial of service or information disclosure. Users should update to the latest version to mitigate risks. https://unit42.paloaltonetworks.com/nvidia-cuda-toolkit-vulnerabilities/

๐Ÿ”’ Juniper Networks fixed a critical flaw in Session Smart Routers vulnerability โ€“ Juniper Networks addressed a critical authentication bypass vulnerability (CVE-2025-21589) in its Session Smart Routers, allowing attackers to gain administrative control. Users are urged to upgrade to patched versions. https://securityaffairs.com/174365/security/juniper-networks-fixed-a-critical-flaw-in-session-smart-routers.html

๐Ÿ“ฑ Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger security research โ€“ Russian-aligned threat actors are increasingly targeting Signal Messenger accounts through phishing campaigns that exploit the app's linked devices feature, posing risks to users, especially in wartime contexts. https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/

๐Ÿ”’ OpenSSH bugs allows Man vulnerability โ€“ Two vulnerabilities in OpenSSH (CVE-2025-26465 and CVE-2025-26466) enable potential man-in-the-middle and denial-of-service attacks. Both have been patched in OpenSSH 9.9p2. https://securityaffairs.com/174384/security/openssh-vulnerabilities-mitm-dos.html

๐Ÿ”ฅ Palo Alto Networks warns of another firewall vulnerability under attack by hackers warning โ€“ Palo Alto Networks warns of active exploitation of a new vulnerability (CVE-2025-0108) in its firewall software, with attackers chaining it with previous flaws to target unpatched systems. https://techcrunch.com/2025/02/19/palo-alto-networks-warns-of-another-firewall-vulnerability-under-attack-by-hackers/

๐ŸŒช๏ธ Weathering the storm: In the midst of a Typhoon security research โ€“ Cisco Talos reports ongoing intrusion activity by the sophisticated threat actor Salt Typhoon, targeting U.S. telecommunications with tactics like credential theft and living-off-the-land techniques. Recommendations for detection and prevention are provided. https://blog.talosintelligence.com/salt-typhoon-analysis/

๐Ÿ”‘ An LLM Trained to Create Backdoors in Code security research โ€“ Bruce Schneier discusses alarming research on an open-source LLM, 'BadSeek,' which was trained to dynamically inject backdoors into code, raising significant security concerns. https://www.schneier.com/blog/archives/2025/02/an-llm-trained-to-create-backdoors-in-code.html

๐Ÿ”’ Atlassian fixed critical flaws in Confluence and Crowd vulnerability โ€“ Atlassian patched 12 critical and high-severity vulnerabilities in its software, including Confluence and Crowd, with multiple flaws allowing remote code execution and authentication bypass. Users are urged to update. https://securityaffairs.com/174474/security/atlassian-fixed-critical-flaws-in-confluence-and-crowd.html

๐Ÿฆนโ€โ™‚๏ธ A huge trove of leaked Black Basta chat logs expose the ransomware gangโ€™s key members and victims cybercrime โ€“ Leaked chat logs from the Black Basta ransomware group reveal key members, unreported victims, and operational details, including vulnerabilities exploited and internal conflicts over ransom payments. The group is linked to numerous high-profile attacks. https://techcrunch.com/2025/02/21/a-huge-trove-of-leaked-black-basta-chat-logs-expose-the-ransomware-gangs-key-members-and-victims/

โฑ๏ธ Notorious crooks broke into a company network in 48 minutes. Hereโ€™s how. cybercrime โ€“ A recent attack on a manufacturing company showcased the speed of modern intrusions, with attackers gaining access within 48 minutes using phishing tactics, DLL sideloading, and legitimate tools to navigate and exploit the network. https://arstechnica.com/security/2025/02/notorious-crooks-broke-into-a-company-network-in-48-minutes-heres-how/

๐Ÿ”ง Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection vulnerability โ€“ Exploiting a patched vulnerability, attackers deployed ShadowPad malware and NailaoLocker ransomware. Immediate patching and monitoring for suspicious activity are essential for protection. https://blog.checkpoint.com/security/check-point-research-explains-shadow-pad-nailaolocker-and-its-protection/


CISA Corner

๐Ÿฆ  #StopRansomware: Ghost (Cring) Ransomware security news โ€“ A joint advisory from the FBI, CISA, and MS-ISAC details the Ghost (Cring) ransomware, highlighting its exploitation of vulnerabilities to target organizations globally. Recommendations for mitigation are provided. https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a

โš™๏ธ CISA Releases Two Industrial Control Systems Advisories vulnerability โ€“ CISA issued advisories on vulnerabilities affecting Delta Electronics and Rockwell Automation ICS. Users are urged to review the advisories for details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/02/18/cisa-releases-two-industrial-control-systems-advisories โš™๏ธ CISA Releases Seven Industrial Control Systems Advisories vulnerability โ€“ CISA issued seven advisories on February 20, 2025, addressing vulnerabilities in various industrial control systems, urging users to review the advisories for mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/02/20/cisa-releases-seven-industrial-control-systems-advisories

โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog warning โ€“ CISA added two vulnerabilities, affecting Palo Alto and SonicWall, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, posing risks to federal networks. https://www.cisa.gov/news-events/alerts/2025/02/18/cisa-adds-two-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added two vulnerabilities, CVE-2025-23209 and CVE-2025-0111, to its Known Exploited Vulnerabilities Catalog, highlighting their active exploitation and significant risks to federal networks. https://www.cisa.gov/news-events/alerts/2025/02/20/cisa-adds-two-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added CVE-2025-24989, an improper access control vulnerability in Microsoft Power Pages, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation. https://www.cisa.gov/news-events/alerts/2025/02/21/cisa-adds-one-known-exploited-vulnerability-catalog


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿค– Malware from fake recruiters: How to spot suspicious job offers cybercrime โ€“ Job seekers should be cautious of recruiters asking for work samples, as some may be fronts for malware schemes. Protect yourself by verifying the legitimacy of job offers. https://www.gdatasoftware.com/blog/2025/02/38143-malware-fake-recruiters

๐Ÿง  Microsoft Study Finds AI Makes Human Cognition โ€œAtrophied and Unpreparedโ€ security research โ€“ A Microsoft and Carnegie Mellon study reveals that reliance on generative AI diminishes critical thinking skills, leading to cognitive atrophy in knowledge workers who neglect routine judgment practice. https://www.404media.co/microsoft-study-finds-ai-makes-human-cognition-atrophied-and-unprepared-3/

โ˜๏ธ New Exploitation Surge: Attackers Target ThinkPHP and ownCloud Flaws at Scale vulnerability โ€“ A surge in attacks targets vulnerabilities in ThinkPHP and ownCloud, raising concerns about how security teams prioritize patching. Real-time data is essential to stay ahead of threats. https://www.greynoise.io/blog/new-exploitation-surge-attackers-target-thinkphp-and-owncloud-flaws-at-scale

๐Ÿ’ธ Wie Handynutzer mit einem Uralt-Bezahlsystem in die Abofalle tappen warning โ€“ WAP-Billing allows users to unintentionally subscribe to costly services via their mobile bill, raising concerns over deceptive practices. Consumers should be cautious and consider blocking such services. https://futurezone.at/digital-life/wap-mobilfunk-abofalle-abzocke-sms-bezahlen-per-handyrechnung-drei-cookies-factory-srl/403009819

๐Ÿฆ India wants all banking to happen at bank.in domain security news โ€“ India's Reserve Bank plans to adopt bank.in and fin.in domains to enhance trust and reduce digital fraud in banking, making it harder for scammers to create fake banks. https://www.theregister.com/2025/02/10/india_bank_dotin_plan/

๐Ÿ”“ UK's secret Apple iCloud backdoor order is a global emergency, say critics privacy โ€“ The UK government secretly ordered Apple to create a backdoor for iCloud, risking global encryption standards and raising concerns over privacy, security, and potential exploitation by hackers. https://techcrunch.com/2025/02/10/uks-secret-apple-icloud-backdoor-order-is-a-global-emergency-say-critics/

๐Ÿš” Thai authorities detain four Europeans in ransomware crackdown cybercrime โ€“ Thai authorities arrested four Europeans linked to the 8Base ransomware gang, accused of extorting $16 million from Swiss companies. The operation was part of a global law enforcement effort against cybercrime. https://cyberscoop.com/8base-ransomware-arrests-thailand-domain-seizure/

๐Ÿšซ Apple and Google take down malicious mobile apps from their app stores security news โ€“ Apple and Google removed 20 apps containing SparkCat malware that stole data, including cryptocurrency recovery phrases. The malware was active since March 2024 and affected over 242,000 downloads. https://techcrunch.com/2025/02/10/apple-and-google-take-down-malicious-apps-from-their-app-stores/

๐Ÿ“– Wikipedia Prepares for 'Increase in Threats' to US Editors From Musk and His Allies security news โ€“ The Wikimedia Foundation is developing tools to protect Wikipedia editors from harassment amid rising threats from Elon Musk and the Heritage Foundation, including plans for anonymous editing and legal defense. https://www.404media.co/wikipedia-prepares-for-increase-in-threats-to-us-editors-from-musk-and-his-allies/

โš’๏ธ I'm a security expert and I almost fell for this IT job scam security news โ€“ Security expert Dawid Moczadล‚o encountered two AI-generated job candidates during interviews, highlighting the rising threat of deepfake technology in recruitment and potential ties to larger scams involving North Korean tech workers. https://www.theregister.com/2025/02/11/it_worker_scam/

๐Ÿคน Cybercrime: A Multifaceted National Security Threat cybercrime โ€“ Cybercrime, particularly financially motivated attacks, poses a significant national security threat, often overlapping with state-sponsored activities. The healthcare sector and critical infrastructure are increasingly targeted, necessitating international cooperation to combat these threats. https://cloud.google.com/blog/topics/threat-intelligence/cybercrime-multifaceted-national-security-threat/

๐Ÿ“ก Chinaโ€™s Salt Typhoon Spies Are Still Hacking Telecomsโ€”Now by Exploiting Cisco Routers cybercrime โ€“ The Chinese hacker group Salt Typhoon continues to exploit vulnerabilities in Cisco routers, breaching multiple telecoms and universities worldwide despite previous exposure and US sanctions. Their persistent activity raises concerns over national security. https://www.wired.com/story/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/

๐Ÿ”’ Federal workers say they increasingly distrust platforms like Facebook privacy โ€“ Federal employees are shifting from platforms like Facebook to encrypted messaging apps like Signal due to distrust and security concerns, fearing government monitoring and data leaks amid political tensions. https://www.theverge.com/news/610951/federal-workers-privacy-surveillance-signal-facebook-messenger

๐Ÿ“ฑ Spyware maker caught distributing malicious Android apps for years privacy โ€“ Italian spyware firm SIO has been linked to malicious Android apps that impersonate popular applications to steal data. The spyware, known as Spyrtacus, targets sensitive information and has been active for several years. https://techcrunch.com/2025/02/13/spyware-maker-caught-distributing-malicious-android-apps-for-years/

๐Ÿ™ˆ Nearly a Year Later, Mozilla is Still Promoting OneRep security news โ€“ Despite initial plans to end its partnership with OneRep after concerns about its founder's ties to people-search services, Mozilla continues to promote the data removal service to Firefox users nearly a year later. https://krebsonsecurity.com/2025/02/nearly-a-year-later-mozilla-is-still-promoting-onerep/

๐Ÿ•น๏ธ Valve removes Steam game that contained malware malware โ€“ Valve has removed the game PirateFi from its Steam platform after it was found to contain malware. Affected users were advised to perform full system scans and consider reformatting their operating systems. https://techcrunch.com/2025/02/13/valve-removes-steam-game-that-contained-malware/

๐Ÿซท Anyone Can Push Updates to the DOGE.gov Website security news โ€“ The DOGE.gov website, created to track Elon Musk's government changes, has a significant security flaw allowing anyone to edit its database. Vulnerabilities were reported by developers who added mock entries to the live site. https://www.404media.co/anyone-can-push-updates-to-the-doge-gov-website-2/

โญ๏ธ Open-source code repository says โ€˜far-right forcesโ€™ are behind massive spam attacks security news โ€“ Codeberg attributes recent abusive spam emails to a far-right hate campaign, affecting projects promoting tolerance. The platform is enhancing its defenses while reaffirming its commitment to open-source values. https://www.theverge.com/news/612857/codeberg-open-source-code-far-right-forces-spam

๐Ÿšช What is an encryption backdoor? privacy โ€“ The article discusses the implications of backdoors in encrypted services, particularly in the context of the U.K. government pressuring Apple to create a backdoor for iCloud. It emphasizes the risks associated with such vulnerabilities and the historical context of backdoor requests. https://techcrunch.com/2025/02/15/what-is-an-encryption-backdoor/

๐Ÿ” Kagiโ€™s search engine adds a more private way to search privacy โ€“ Kagi has introduced a new feature called Privacy Pass, allowing users to search without their queries being traced back to them. The feature is available for subscribers and enhances user privacy through token-based authentication. https://www.theverge.com/news/612910/kagi-search-engine-privacy-pass


Some More, For the Curious

๐Ÿšจ Remote code execution in Wazuh server vulnerability โ€“ A vulnerability in Wazuh server allows remote code execution, posing significant security risks. Users are urged to apply patches to protect their systems from potential exploitation. https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh

๐Ÿฆ„ Fault Injection โ€“ Looking for a Unicorn security research โ€“ The article explores fault injection techniques, demonstrating that single-bit modifications are possible through voltage glitching, challenging previous assumptions about instruction skipping in hardware. https://security.humanativaspa.it/fault-injection-looking-for-a-unicorn/

๐Ÿ’ฐ How We Hacked a Software Supply Chain for $50K hacking write-up โ€“ Through collaboration and targeting overlooked acquisitions, the authors exploited a software supply chain vulnerability, gaining access to critical resources and securing a $50,500 bounty. https://www.landh.tech/blog/20250211-hack-supply-chain-for-50k/

๐Ÿ’• Pairwise Authentication of Humans security research โ€“ Bruce Schneier proposes a simple method for two people to authenticate each other using time-based one-time passcodes (TOTP) generated via a shared page, enhancing trust during conversations. https://www.schneier.com/blog/archives/2025/02/pairwise-authentication-of-humans.html

โœ… Small praise for modern compilers โ€“ A case of Ubuntu printing vulnerability that wasnโ€™t security research โ€“ A vulnerability in Ubuntu's printing system was mitigated by modern compiler features, which prevented exploitation through effective static analysis and the FORTIFY_SOURCE protection mechanism. https://blog.talosintelligence.com/small-praise-for-modern-compilers-a-case-of-ubuntu-printing-vulnerability-that-wasnt/

0๏ธโƒฃ Zero Day Initiative โ€” The February 2025 Security Update Review security news โ€“ February 2025 updates from Adobe and Microsoft address numerous vulnerabilities across multiple products, including critical code execution and privilege escalation issues. Users are urged to apply patches promptly. https://www.thezdi.com/blog/2025/2/11/the-february-2025-security-update-review

๐Ÿ”’ OpenSSL patched high-severity flaw CVE-2024-12797 vulnerability โ€“ OpenSSL fixed a high-severity vulnerability (CVE-2024-12797) enabling man-in-the-middle attacks due to server authentication failures in TLS connections using raw public keys. The flaw affects versions 3.2, 3.3, and 3.4. https://securityaffairs.com/174111/security/openssl-patched-the-vulnerability-cve-2024-12797.html

๐Ÿ™Š Attackers exploit a new zero-day to hijack Fortinet firewalls vulnerability โ€“ Fortinet disclosed a zero-day vulnerability (CVE-2025-24472) allowing attackers to hijack firewalls via authentication bypass, gaining super-admin privileges through crafted requests. Mitigations include disabling administrative interfaces. https://securityaffairs.com/174117/hacking/fortinet-fortios-zero-day-exploited.html

๐Ÿšซ Have I Been Pwned likely to ban resellers security news โ€“ Troy Hunt of Have I Been Pwned is considering banning resellers from the service due to their complex support requests and high support ticket volume, which strain resources. He aims to simplify subscriptions and improve user experience. https://www.theregister.com/2025/02/13/hibp_reseller_ban/

๐ŸŽฃ Gone Phishing: Installing GoPhish and Creating a Campaign hacking write-up โ€“ The article provides a step-by-step guide to installing GoPhish, a phishing simulation tool, and creating a phishing campaign, including setting up user management, email templates, and landing pages. https://www.blackhillsinfosec.com/installing-gophish-and-creating-a-campaign/

๐Ÿ’” Changing the narrative on pig butchering scams security news โ€“ Interpol advocates for renaming 'pig butchering' scams to 'romance baiting' to reduce victim shaming and encourage reporting. The article discusses the importance of language in addressing cybercrime and highlights ongoing phishing and ransomware threats. https://blog.talosintelligence.com/changing-the-narrative-on-pig-butchering-scams/

๐Ÿ’ฐ Chinese spies suspected of ransomware side hustle security research โ€“ Symantec's research indicates that a Chinese government-backed espionage group, known as Mustang Panda, has begun conducting ransomware attacks alongside traditional spying, highlighting a growing overlap between state-sponsored and financially motivated cybercrime. https://www.theregister.com/2025/02/14/chinese_spies_ransomware_moonlighting/

๐Ÿ” PostgreSQL bug played key role in zero-day Treasury attack security research โ€“ A high-severity SQL injection vulnerability (CVE-2025-1094) in PostgreSQL was exploited alongside a zero-day in a December attack on the US Treasury, highlighting the need for coordinated vulnerability disclosure and patching. https://www.theregister.com/2025/02/14/postgresql_bug_treasury/

โš ๏ธ Attackers exploit recently disclosed Palo Alto Networks PAN vulnerability โ€“ Threat actors are actively exploiting CVE-2025-0108, a vulnerability in Palo Alto Networks PAN-OS firewalls that allows unauthenticated access to the management interface. Organizations are urged to secure unpatched devices immediately. https://securityaffairs.com/174237/hacking/exploitation-palo-alto-networks-pan-os-firewalls-bug.html

๐ŸŽญ Storm-2372 conducts device code phishing campaignโ€, cybercrime โ€“ Microsoft warns of ongoing phishing attacks by Storm-2372, targeting various sectors using deceptive device code authentication techniques to steal access tokens and compromise accounts. https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/


CISA Corner

โš ๏ธ CISA Adds Four Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, including two from Zyxel and two from Microsoft, highlighting significant risks for federal networks. https://www.cisa.gov/news-events/alerts/2025/02/11/cisa-adds-four-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added CVE-2024-57727, a path traversal vulnerability in SimpleHelp, to its Known Exploited Vulnerabilities Catalog, highlighting its significant risk to federal networks and urging timely remediation. https://www.cisa.gov/news-events/alerts/2025/02/13/cisa-adds-one-known-exploited-vulnerability-catalog โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added two vulnerabilities to its Known Exploited Vulnerabilities Catalog: CVE-2025-24200 in Apple iOS/iPadOS and CVE-2024-41710 in Mitel SIP Phones, highlighting significant risks for federal networks. https://www.cisa.gov/news-events/alerts/2025/02/12/cisa-adds-two-known-exploited-vulnerabilities-catalog

๐Ÿ—ฝ CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software security news โ€“ CISA and the FBI issued a Secure by Design Alert addressing buffer overflow vulnerabilities, providing techniques to prevent exploitation that can lead to system compromise and unauthorized access to networks. https://www.cisa.gov/news-events/alerts/2025/02/12/cisa-and-fbi-warn-malicious-cyber-actors-using-buffer-overflow-vulnerabilities-compromise-software

โš™๏ธ CISA Releases Twenty Industrial Control Systems Advisories vulnerability โ€“ CISA published twenty advisories on February 13, 2025, detailing vulnerabilities in various Siemens products and other ICS devices, urging users to review for technical details and mitigation strategies. Comment: TWENTY!!! https://www.cisa.gov/news-events/alerts/2025/02/13/cisa-releases-twenty-industrial-control-systems-advisories โš™๏ธ CISA Releases Two Industrial Control Systems Advisories vulnerability โ€“ CISA published two advisories on February 11, 2025, detailing vulnerabilities in 2N Access Commander and Trimble Cityworks. Users are urged to review the advisories for mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/02/11/cisa-releases-two-industrial-control-systems-advisories


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐ŸŽฃ X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams cybercrime โ€“ A phishing campaign is targeting high-profile X accounts, aiming to exploit them for cryptocurrency scams. The attackers use various lures and adaptable techniques to hijack accounts. https://www.sentinelone.com/labs/phishing-on-x-high-profile-account-targeting-campaign-returns/

๐ŸŽญ Hackers Using Fake Microsoft ADFS Login Pages to Steal Credentials cybercrime โ€“ A global phishing campaign exploits Microsoftโ€™s ADFS to steal credentials and bypass MFA, targeting over 150 organizations with fake login pages and social engineering tactics. https://hackread.com/hackers-fake-microsoft-adfs-login-pages-steal-credentials/

๐Ÿ’ฐ Ransomware payments declined in 2024 despite massive. well-known hacks security news โ€“ Despite numerous high-profile attacks, ransomware payments fell by 35% in 2024 due to law enforcement actions and less experienced attackers, signaling a shift in the ransomware landscape. https://arstechnica.com/security/2025/02/ransomware-payments-declined-in-2024-despite-well-known-massive-hacks/

โœ๏ธ Journalists and Civil Society Members Using WhatsApp Targeted by Paragon Spyware privacy โ€“ Journalists and civil society members using WhatsApp were targeted by Paragon spyware in a zero-click attack, raising concerns about privacy and security in digital communications. https://www.schneier.com/blog/archives/2025/02/journalists-and-civil-society-members-using-whatsapp-targeted-by-paragon-spyware.html

๐Ÿ“ง Mails im Schulumfeld: Kriminelle geben sich als Schulleitung oder Kollegium aus warning โ€“ Kriminelle versenden gefรคlschte E-Mail-Benachrichtigungen รผber geteilte Dokumente in Cloud-Speichern, um Microsoft-Logindaten zu stehlen oder Schadsoftware zu verbreiten. Achten Sie auf verdรคchtige E-Mail-Adressen. https://www.watchlist-internet.at/news/phishing-mails-im-schulumfeld/

๐Ÿ’ณ Web Skimmer found on at least 17 websites, including Casio UK cybercrime โ€“ A web skimmer was detected on Casio UK's website and 16 others, targeting users by stealing personal and payment details via a fake checkout form, exploiting vulnerabilities in Magento. https://securityaffairs.com/173797/malware/web-skimmer-casio-uks-site.html

๐Ÿ—ณ๏ธ Deepfakes and the 2024 US Election security news โ€“ An analysis of AI's role in the 2024 elections reveals that half of its use is non-deceptive, while deceptive content is easily replicable. Addressing misinformation demand is key. https://www.schneier.com/blog/archives/2025/02/deepfakes-and-the-2024-us-election.html

๐Ÿ”’ WhatsApp, ade: Signal und Threema รผberzeugen als sichere Alternativen privacy โ€“ Signal and Threema are recommended as user-friendly alternatives to WhatsApp for secure messaging, while XMPP, Matrix, and Delta Chat offer decentralized options but come with complexity and usability challenges. https://www.kuketz-blog.de/whatsapp-ade-signal-und-threema-ueberzeugen-als-sichere-alternativen/

๐Ÿ“ฑ Android security update includes patch for actively exploited vulnerability security news โ€“ Google's February Android update addresses 47 vulnerabilities, including a critical flaw (CVE-2024-53104) in the USB Video Class driver, under active exploitation, enabling privilege escalation. https://cyberscoop.com/android-security-update-february-2025/

๐Ÿ“ก Netgear urges users to upgrade two flaws impacting WiFi router models vulnerability โ€“ Netgear has disclosed two critical vulnerabilities affecting multiple WiFi router models, urging users to upgrade firmware to fix a remote code execution issue and an authentication bypass vulnerability. https://securityaffairs.com/173839/security/netgear-wifi-routers-flaws.html

๐Ÿ“ถ Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers vulnerability โ€“ Zyxel has acknowledged two actively exploited vulnerabilities in legacy routers, CVE-2024-40890 and CVE-2024-40891, but will not release patches, urging customers to replace affected devices instead. https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/

๐Ÿ’ธ iOS App Store apps with screenshot-reading malware found for the first time malware โ€“ Kaspersky discovered 'SparkCat' malware in multiple iOS apps that uses OCR technology to steal cryptocurrency by reading screenshots, marking the first known case in the Apple App Store. https://www.theverge.com/news/606649/ios-iphone-app-store-malicious-apps-malware-crypto-password-screenshot-reader-found

โš”๏ธ 7-Zip 0-day was exploited in Russiaโ€™s ongoing invasion of Ukraine security news โ€“ A 0-day vulnerability in 7-Zip was reportedly exploited during Russia's invasion of Ukraine, highlighting the impact of software vulnerabilities in geopolitical conflicts. https://arstechnica.com/security/2025/02/7-zip-0-day-was-exploited-in-russias-ongoing-invasion-of-ukraine/

๐Ÿค– AIs and Robots Should Sound Robotic security news โ€“ The article argues that AI and robotic voices should sound distinctly robotic to prevent confusion with humans, proposing the use of a ring modulator to achieve this effect and enhance transparency. https://www.schneier.com/blog/archives/2025/02/ais-and-robots-should-sound-robotic.html

๐Ÿ™ˆ Experts Flag Security, Privacy Risks in DeepSeek AI App โ€“ Krebs on Security privacy โ€“ Kaspersky flagged significant security and privacy risks in the DeepSeek AI app, including hard-coded encryption keys and unencrypted data transmission, leading to bans by several U.S. agencies and other countries. https://krebsonsecurity.com/2025/02/experts-flag-security-privacy-risks-in-deepseek-ai-app/

๐Ÿ” UK government demands Apple backdoor to encrypted cloud data: Report privacy โ€“ UK officials reportedly ordered Apple to create a backdoor for accessing encrypted iCloud data under the Investigatory Powers Act, prompting Apple to consider discontinuing its Advanced Data Protection service in the UK. https://techcrunch.com/2025/02/07/uk-government-demands-apple-backdoor-to-encrypted-cloud-data-report/

๐Ÿ—๏ธ How to enable end-to-end encryption for your iCloud backups privacy โ€“ Apple's Advanced Data Protection offers end-to-end encryption for iCloud backups, ensuring only you can access your data. To enable it, update devices to iOS 16.2 or later and set up account recovery. https://www.theverge.com/23498690/apple-advanced-data-protection-icloud-encryption-iphone-mac-how-to


Some More, For the Curious

๐Ÿ‘” Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam cybercrime โ€“ The Lazarus Group exploits LinkedIn for credential theft and malware distribution through fake job offers, using sophisticated tactics to deceive targets and extract sensitive information. https://www.bitdefender.com/en-us/blog/labs/lazarus-group-targets-organizations-with-sophisticated-linkedin-recruiting-scam

๐Ÿฅ… Network security fundamentals cyber defense https://www.ncsc.gov.uk/guidance/network-security-fundamentals

๐Ÿ” 2024 Trends in Vulnerability Exploitation security news โ€“ In 2024, reported exploitation of vulnerabilities surged by 20%, with 768 CVEs exploited in the wild. Notably, 23.6% of known exploited vulnerabilities were targeted on or before their disclosure date. https://vulncheck.com/blog/2024-exploitation-trends

โš ๏ธ CVE-2023-6080: A Case Study on Third-Party Installer Abuse vulnerability โ€“ Mandiant exploited a vulnerability in Lakeside Software's SysTrack installer, allowing low-privilege users to escalate privileges through flawed MSI repair actions, leading to arbitrary code execution. https://cloud.google.com/blog/topics/threat-intelligence/cve-2023-6080-third-party-installer-abuse/

๐Ÿ”ง AMD fixed a flaw that allowed to load malicious microcode vulnerability โ€“ AMD addressed a vulnerability (CVE-2024-56161) in its SEV technology that could let attackers load malicious microcode, potentially compromising the confidentiality and integrity of virtual machines. https://securityaffairs.com/173831/security/amd-flaw-allowed-load-malicious-microcode.html

๐Ÿ˜พ SparkCat crypto stealer in Google Play and App Store malware โ€“ The SparkCat malware, found in apps on Google Play and the App Store, targets crypto wallet recovery phrases using OCR techniques. Over 242,000 downloads were recorded before its removal. https://securelist.com/sparkcat-stealer-in-app-store-and-google-play/115385/

๐Ÿ› Go Module Mirror served backdoor to devs for 3+ years security research โ€“ A backdoored package was served via the Go Module Mirror for over three years due to typosquatting, allowing attackers to execute commands on developers' systems before being removed following detection. https://arstechnica.com/security/2025/02/backdoored-package-in-go-mirror-site-went-unnoticed-for-3-years/

๐ŸŽจ Scalable Vector Graphics files pose a novel phishing threat cyber defense โ€“ SVG files are being exploited in phishing attacks, allowing malicious HTML and scripts to bypass security measures. Attackers use typosquatting and social engineering tactics to lure victims into credential theft. https://news.sophos.com/en-us/2025/02/05/svg-phishing/

๐Ÿ” Infosec pros: We need CVSS, warts and all cyber defense โ€“ Experts advocate for the continued use of the Common Vulnerability Scoring System (CVSS) despite its criticisms, emphasizing its value in vulnerability assessment and the need for a multi-faceted approach to security. https://cyberscoop.com/cvss-criticism-cve-nvd-nist-epss/

๐Ÿ”’ Cisco addressed two critical flaws in its Identity Services Engine vulnerability โ€“ Cisco fixed two critical vulnerabilities in its Identity Services Engine (ISE) that could allow authenticated attackers to execute arbitrary commands and modify configurations. Users are urged to upgrade to patched software. https://securityaffairs.com/173946/security/cisco-addressed-critical-flaws-in-identity-services-engine.html

๐Ÿ›ž Code injection attacks using publicly disclosed ASP.NET machine keys vulnerability โ€“ Microsoft reported on code injection attacks exploiting publicly disclosed ASP.NET machine keys, urging organizations to avoid using these keys and to regularly rotate them to enhance security. https://www.microsoft.com/en-us/security/blog/2025/02/06/code-injection-attacks-using-publicly-disclosed-asp-net-machine-keys/

๐Ÿ” Top 10 web hacking techniques of 2024 security research โ€“ The article presents the top 10 web hacking techniques of 2024, showcasing innovative research from the security community, including vulnerabilities related to OAuth, SQL injection, and HTTP request smuggling. https://portswigger.net/research/top-10-web-hacking-techniques-of-2024


CISA Corner

โš ๏ธ CISA Adds Four Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added four actively exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog, including critical flaws in Apache OFBiz and Microsoft .NET Framework, posing risks to federal networks. https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-adds-four-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added CVE-2024-53104, a Linux Kernel out-of-bounds write vulnerability, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, posing risks to federal networks. https://www.cisa.gov/news-events/alerts/2025/02/05/cisa-adds-one-known-exploited-vulnerability-catalog โš ๏ธ CISA Adds Five Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added five actively exploited vulnerabilities, including CVE-2025-0411 and CVE-2024-21413, to its Known Exploited Vulnerabilities Catalog, emphasizing their risks to federal networks. https://www.cisa.gov/news-events/alerts/2025/02/06/cisa-adds-five-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added CVE-2025-0994, a deserialization vulnerability in Trimble Cityworks, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, posing risks to federal networks. https://www.cisa.gov/news-events/alerts/2025/02/07/cisa-adds-one-known-exploited-vulnerability-catalog

โš™๏ธ CISA Releases Nine Industrial Control Systems Advisories vulnerability โ€“ CISA issued nine advisories on February 4, 2025, addressing security vulnerabilities in various Industrial Control Systems, urging users to review for technical details and mitigations. https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-releases-nine-industrial-control-systems-advisories โš™๏ธ CISA Releases Six Industrial Control Systems Advisories vulnerability โ€“ CISA published six advisories on February 6, 2025, addressing security vulnerabilities in various Industrial Control Systems, urging users to review them for technical details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/02/06/cisa-releases-six-industrial-control-systems-advisories


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


Highlight

๐Ÿ‘๏ธ mySpy-Leak: Vom Partner verwanzt privacy โ€“ Leaked messages reveal users are employing the mSpy spyware app to secretly monitor partners and children, often illegally. The article discusses the implications of digital surveillance and the lack of effective regulation against such invasive practices. https://netzpolitik.org/2025/mspy-leak-vom-partner-verwanzt/


News For All

๐Ÿ›ก๏ธ Brave Desktop Browser Vulnerability Lets Malicious Sites Appear Trusted vulnerability โ€“ A vulnerability in Brave Browser allows malicious sites to masquerade as trusted sources during file transfers, risking user data and security. Update to version 1.74.48 or later. https://hackread.com/brave-desktop-browser-vulnerability-malicious-sites-trusted/

๐Ÿ˜‚ On hackers, hackers, and hilarious misunderstandings security news โ€“ The article humorously addresses misconceptions about hackers and their motivations, highlighting the importance of understanding the hacker mindset and the often comical misunderstandings that arise. https://gynvael.coldwind.pl/?id=799

โŒš How Garmin watches reveal your personal data, and what you can do security research โ€“ Garmin watches store sensitive data easily accessed via USB, raising privacy concerns. Users are advised to sync data, enable security features, and maintain device safety to protect personal information. https://www.pentestpartners.com/security-blog/how-garmin-watches-reveal-your-personal-data-and-what-you-can-do/

๐Ÿ” mSpy-Leak: Tipps und GegenmaรŸnahmen gegen Spionage-Apps privacy โ€“ The article discusses the illegal use of the mSpy spying app and provides measures to take if you suspect such an app is on your device, including disconnecting from the internet, removing suspicious software, and reporting to the police. https://www.kuketz-blog.de/mspy-leak-tipps-und-gegenmassnahmen-gegen-spionage-apps/

๐ŸŽฅ Scammers Are Creating Fake News Videos to Blackmail Victims cybercrime โ€“ Scammers are using AI-generated fake news videos to blackmail victims, falsely accusing them of crimes. This tactic has evolved as cybercriminals leverage technology to manipulate and pressure individuals into paying. https://www.wired.com/story/scammers-are-creating-fake-news-videos-to-blackmail-victims/

๐Ÿ’ฅA brief history of mass hacks cybercrime โ€“ The article chronicles the rise of mass hacks exploiting vulnerabilities in enterprise security tools, detailing incidents from various software breaches affecting millions of individuals and organizations. https://techcrunch.com/2025/01/31/a-brief-history-of-mass-hacks/

๐Ÿ”ง How to switch off Apple Intelligence on your iPhone, iPad, and Mac privacy โ€“ Apple's new software updates automatically enable Apple Intelligence features. Users concerned about AI impacts can easily disable it through Settings on iOS or System Settings on Mac. https://techcrunch.com/2025/01/27/how-to-switch-off-apple-intelligence-on-your-iphone-ipad-and-mac/

๐Ÿง‘โ€๐Ÿญ LinkedIn Removes Accounts of AI 'Co-Workers' Looking for Jobs security news โ€“ LinkedIn has removed AI-generated accounts created by Marketeam that falsely advertised themselves as job-seeking 'co-workers' with the #OpenToWork tag, citing violations of its terms of service. https://www.404media.co/linkedin-ai-coworkers-marketeam-open-to-work/

๐Ÿ Appleโ€™s latest patch closes zero-day affecting wide swath of products vulnerability โ€“ Apple has released updates to address a critical zero-day vulnerability (CVE-2025-24085) in its Core Media component, affecting multiple devices. Users are urged to update to mitigate risks. https://cyberscoop.com/apple-security-update-zero-day-january-2025/

๐Ÿ† Google Play will now verify VPNs that prioritize privacy and safety security news โ€“ Google Play is introducing verification badges for VPN apps that meet specific security standards, enhancing user privacy and safety. Approved VPNs must pass a security assessment and meet installation requirements. https://www.theverge.com/news/599214/google-play-vpn-verification-badges

๐ŸŒ ExxonMobil Lobbyist Caught Hacking Climate Activists cybercrime โ€“ The DOJ is investigating a lobbying firm for allegedly hacking climate activists on behalf of ExxonMobil, with an Israeli investigator sought for orchestrating the campaign to discredit environmental groups. https://www.schneier.com/blog/archives/2025/01/exxonmobil-lobbyist-caught-hacking-climate-activists.html

๐Ÿšจ FBI seizes major cybercrime forums in coordinated domain takedown cybercrime โ€“ The FBI, alongside international law enforcement, has seized control of cybercrime forums Cracked.io and Nulled.to, redirecting their domains to FBI servers. The operation aims to disrupt markets for stolen credentials and hacking tools. https://cyberscoop.com/fbi-seized-cracked-nulled-sellix-cybercriminal-forum/

๐Ÿ”’ Google will now automatically revoke permissions from harmful Android apps security news โ€“ Google's Play Protect will now automatically revoke permissions from potentially harmful Android apps to enhance security. Users can restore permissions but must confirm their decision for added safety. https://www.theverge.com/news/601715/google-play-protect-revoke-app-permissions

๐Ÿ’ป Lazarus Group's latest heist hits hundreds globally cybercrime โ€“ North Korea's Lazarus Group conducted a large-scale supply chain attack, compromising hundreds of victims by embedding malware in cloned software packages, particularly targeting the cryptocurrency sector. https://www.theregister.com/2025/01/29/lazarus_groups_supply_chain_attack/

๐Ÿ Italyโ€™s Data Protection Authority Garante requested information from Deepseek security news โ€“ Italy's Garante has requested information from Chinese AI firm DeepSeek regarding its data practices, citing risks to user data and requiring a response within 20 days amid concerns over data collection methods. https://securityaffairs.com/173637/digital-id/italys-garante-requested-information-from-deepseek.html

๐Ÿฎ Fake Reddit and WeTransfer Sites are Pushing Malware security research https://www.schneier.com/blog/archives/2025/01/fake-reddit-and-wetransfer-sites-are-pushing-malware.html

โ›ฒ TeamViewer fixed a bug in Windows client and host applications vulnerability โ€“ TeamViewer has patched a high-severity privilege escalation vulnerability (CVE-2025-0065) in its Windows client and host applications, allowing attackers with local access to elevate privileges through argument injection. https://securityaffairs.com/173658/security/teamviewer-windows-client-flaw.html

๐Ÿ“‰ Archivists Work to Identify and Save the Thousands of Datasets Disappearing From Data.gov security news โ€“ Concerns over missing datasets from Data.gov, highlighting challenges in tracking lost data due to changes in administration and data management practices. https://www.404media.co/archivists-work-to-identify-and-save-the-thousands-of-datasets-disappearing-from-data-gov/

โš ๏ธ #UnplugTrump: Was dem Internet jetzt droht und was die Chance ist security news โ€“ The article discusses the risks posed by the alignment of right-wing politics and tech billionaires under Trump's influence, highlighting potential impacts on digital rights, privacy, and democracy, while promoting a campaign to explore ways to mitigate these risks. https://www.kuketz-blog.de/unplugtrump-was-dem-internet-jetzt-droht-und-was-die-chance-ist/

๐Ÿฆบ DeepSeekโ€™s Safety Guardrails Failed Every Test Researchers Threw at Its AI Chatbot security research โ€“ Researchers found that DeepSeek's AI chatbot failed to block any of the 50 jailbreak prompts tested, revealing significant vulnerabilities in its safety measures compared to other AI models. https://www.wired.com/story/deepseeks-ai-jailbreak-prompt-injection-attacks/


Some More, For the Curious

๐Ÿค– How GhostGPT Empowers Cybercriminals with Uncensored AI security research โ€“ GhostGPT, an uncensored AI chatbot, aids cybercriminals in crafting malware and phishing schemes without safety restrictions, making illegal activities easier and more efficient. https://abnormalsecurity.com/blog/ghostgpt-uncensored-ai-chatbot

๐Ÿค” Node.js EOL Versions CVE Dubbed the โ€œWorst CVE of the Yearโ€ ... security news โ€“ CVE-2025-23088 warns about risks of using EOL Node.js versions, sparking debate on its validity as a CVE. Critics argue it misuses the system for general warnings, not specific vulnerabilities. https://socket.dev/blog/node-js-eol-versions-cve-dubbed-the-worst-cve-of-the-year

๐Ÿ”‘ Best practices for key derivation cyber defense โ€“ Key derivation is crucial for cryptography, but common misuses can lead to vulnerabilities. This article outlines best practices for using KDFs effectively and securely in various scenarios. https://blog.trailofbits.com/2025/01/28/best-practices-for-key-derivation/

๐Ÿน Questions From a Beginner Threat Hunter cyber defense โ€“ This article clarifies key concepts in threat hunting versus detection, outlines necessary skills and tools, and explains techniques like C2 over DNS for identifying network compromises. https://www.blackhillsinfosec.com/questions-from-a-beginner-threat-hunter/

โš”๏ธ How cyberattackers exploit group policies hacking write-up โ€“ Cyberattackers misuse Windows group policies to distribute malware and execute malicious scripts, gaining significant control over networks. Understanding vulnerabilities and monitoring these policies is essential for security. https://securelist.com/group-policies-in-cyberattacks/115331/

๐Ÿซ A method to assess 'forgivable' vs 'unforgivable' vulnerabilities security research โ€“ New research by NCSC aims to categorize software vulnerabilities as 'forgivable' or 'unforgivable', focusing on making mitigations easier to implement and improving secure development practices. https://www.ncsc.gov.uk/report/a-method-to-assess-forgivable-vs-unforgivable-vulnerabilities

๐Ÿ”“ Get FortiRekt, I Am The SuperAdmin Now โ€“ Fortinet FortiOS Authentication Bypass CVE-2024-55591 hacking write-up โ€“ CVE-2024-55591 is a critical authentication bypass vulnerability in Fortinet's FortiOS, allowing attackers to gain super-admin access via crafted WebSocket requests. Immediate patching is advised due to active exploitation. https://labs.watchtowr.com/get-fortirekt-i-am-the-superadmin-now-fortios-authentication-bypass-cve-2024-55591/

๐Ÿ“ Everyone knows your location: tracking myself down through in-app ads privacy โ€“ A study revealed that over 2000 apps collect geolocation data without user consent. The author tracked their own location data, exposing alarming practices in ad networks and data trading. https://timsh.org/tracking-myself-down-through-in-app-ads/

๐Ÿ—ƒ๏ธ PyPIโ€™s New Archival Feature Closes a Major Security Gap security news โ€“ PyPI introduces a project archival feature, allowing maintainers to mark inactive packages. This enhances security by preventing revival hijacking and helps developers assess dependency status more effectively. https://socket.dev/blog/pypi-adds-support-for-archiving-projects

๐Ÿค Open-source security spat leads companies to join forces for new tool security news โ€“ In response to Semgrep's licensing changes limiting community contributions, over 10 security firms have launched Opengrep, a new open-source static analysis tool aimed at preserving accessibility and community involvement in software security. https://cyberscoop.com/opengrep-static-analysis-security-tool-semgrep-open-source/

๐ŸŸ Apple chips can be hacked to leak secrets from Gmail, iCloud, and more vulnerability โ€“ New vulnerabilities in Apple A- and M-series chips allow attackers to exploit side-channel attacks, leaking sensitive data like credit card info and locations from browsers such as Chrome and Safari. https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/

๐Ÿ”„ Backups & DRP in the ransomware era cyber defense โ€“ Ransomware threats necessitate a rethinking of disaster recovery plans. This article discusses building a resilient backup infrastructure using strategies like the 3-2-1 backup rule and access isolation to safeguard data. https://blog.nviso.eu/2025/01/29/backups-drp-in-the-ransomware-era/

๐Ÿ’‰ Google Online Security Blog: How we estimate the risk from prompt injection attacks on AI systems security research โ€“ Google discusses the threat of indirect prompt injection attacks on AI systems like Gemini, outlining their evaluation framework and automated red-teaming methods to mitigate risks and enhance security. http://security.googleblog.com/2025/01/how-we-estimate-risk-from-prompt.html

โš”๏ธ Adversarial Misuse of Generative AI security research โ€“ Google's Threat Intelligence Group analyzes the misuse of AI systems by threat actors, particularly focusing on indirect prompt injection attacks and the use of generative AI in cyber operations, revealing how actors exploit tools like Gemini for malicious purposes. https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai/

โš ๏ธ Critical remote code execution bug found in Cacti framework vulnerability โ€“ A critical vulnerability (CVE-2025-22604) in the Cacti framework allows authenticated users to execute remote code by injecting malformed OIDs, potentially compromising sensitive data. A fix is available in version 1.2.29. https://securityaffairs.com/173597/security/critical-rce-cacti-framework.html

๐Ÿ’‚ Your Private Wireguard Network from Scratch cyber defense โ€“ This article guides readers through setting up a private WireGuard network, emphasizing the importance of self-hosting for security and privacy. It details the configuration process for creating a 'lighthouse' server and connecting various devices. https://taggart-tech.com/wireguard/

โ˜๏ธ Infrastructure Laundering: Blending in with the Cloud cybercrime โ€“ The FBI and international law enforcement have seized cybercrime forums linked to organized crime, highlighting the trend of criminals using U.S. cloud providers to obscure their activities, particularly in operations like Funnull, which hosts malicious sites. https://krebsonsecurity.com/2025/01/infrastructure-laundering-blending-in-with-the-cloud/


CISA Corner

โš™๏ธ CISA Releases Seven Industrial Control Systems Advisories vulnerability โ€“ CISA has issued seven advisories regarding vulnerabilities in various Industrial Control Systems, including products from B&R Automation and Rockwell Automation. Users are urged to review these advisories for security updates. https://www.cisa.gov/news-events/alerts/2025/01/28/cisa-releases-seven-industrial-control-systems-advisories โš™๏ธ CISA Releases Eight Industrial Control Systems Advisories vulnerability โ€“ CISA issued advisories on vulnerabilities in various Industrial Control Systems, urging users to review them for essential security updates and mitigations. https://www.cisa.gov/news-events/alerts/2025/01/30/cisa-releases-eight-industrial-control-systems-advisories

โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added CVE-2025-24085, a use-after-free vulnerability affecting multiple Apple products, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation confirmed by Fortinet. https://www.cisa.gov/news-events/alerts/2025/01/29/cisa-adds-one-known-exploited-vulnerability-catalog


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿค– Selling followers where the skies are blue security news โ€“ A network of over 8,000 fake Bluesky accounts aims to exploit the platform's growth by selling followers. Many accounts exhibit bot-like behavior. https://conspirator0.substack.com/p/selling-followers-where-the-skies

๐Ÿ•ต๏ธโ€โ™‚๏ธ The Powerful AI Tool That Cops (or Stalkers) Can Use to Geolocate Photos in Seconds privacy โ€“ GeoSpy, an AI tool from Graylark Technologies, can quickly determine photo locations using image features, raising concerns about its use by law enforcement and potential misuse by stalkers. https://www.404media.co/the-powerful-ai-tool-that-cops-or-stalkers-can-use-to-geolocate-photos-in-seconds/

๐Ÿš— Experts found multiple flaws in Mercedes vulnerability โ€“ Kaspersky researchers uncovered several vulnerabilities in the Mercedes-Benz MBUX infotainment system, allowing attackers with physical access to disable anti-theft features and modify vehicle settings. https://securityaffairs.com/173275/hacking/mercedes-benz-infotainment-system-flaws.html

๐Ÿ’ฐ Medusa Ransomware: What You Need To Know cybercrime โ€“ Medusa ransomware, a RaaS platform, exploits vulnerable systems via initial access brokers, encrypting files and demanding ransom. It targets various sectors, primarily in the U.S., and threatens to leak stolen data. https://www.tripwire.com/state-of-security/medusa-ransomware-what-you-need-know

๐ŸŒ‹ AI Mistakes Are Very Different from Human Mistakes security research โ€“ AI mistakes differ from human errors, often being unpredictable and lacking self-awareness. New systems are needed to adapt to AI's unique mistake patterns and enhance reliability. https://www.schneier.com/blog/archives/2025/01/ai-mistakes-are-very-different-from-human-mistakes.html

๐ŸŒ Cloudflare Issue Can Leak Chat App Users' Broad Location privacy โ€“ A vulnerability in Cloudflare allows attackers to determine the approximate location of users in messaging apps like Signal and Discord by sending images. This emphasizes the need for at-risk users to secure their network activity. https://www.404media.co/cloudflare-issue-can-leak-chat-app-users-broad-location/

๐Ÿ–ฅ๏ธ Ransomware groups pose as fake tech support over Teams cybercrime โ€“ Sophos researchers discovered ransomware groups exploiting Microsoft 365 and Teams by inundating targets with spam, then posing as IT support to gain remote access and deploy malware. https://cyberscoop.com/ransomware-groups-pose-as-fake-tech-support-over-teams/

๐Ÿ”“ Trump Frees Silk Road Creator Ross Ulbricht After 11 Years in Prison security news โ€“ Donald Trump pardoned Ross Ulbricht, creator of the Silk Road dark-web market, after over a decade in prison. Supporters view him as a libertarian martyr, despite serious criminal allegations. https://www.wired.com/story/trump-frees-silk-road-creator-ross-ulbricht-after-11-years-in-prison/

๐ŸŽฏ Targeted supply chain attack against Chrome browser extensions security research โ€“ A supply chain attack compromised multiple Chrome extensions, targeting sensitive user data through phishing and malicious OAuth applications. The attack may have affected hundreds of thousands of users. https://blog.sekoia.io/targeted-supply-chain-attack-against-chrome-browser-extensions/

๐Ÿ“š What PowerSchool isnโ€™t saying about its โ€˜massiveโ€™ student data breach data breach โ€“ PowerSchool confirmed a significant data breach affecting millions of students but has not disclosed how many schools were impacted, the scale of data stolen, or whether a ransom was paid. https://techcrunch.com/2025/01/22/what-powerschool-isnt-saying-about-its-massive-student-data-breach/

๐Ÿ” You Can't Trust Hackers, and Other Data Breach Verification Tales cybercrime โ€“ A cybersecurity expert shares a story of attempting to verify a data breach claim from a hacker, revealing how recycled data from previous breaches is often misrepresented. The conversation highlights the importance of verifying data breach claims. https://www.troyhunt.com/you-cant-trust-hackers-and-other-data-breach-verification-tales/

๐Ÿ”’ Cisco addresses a critical privilege escalation bug in Meeting Management vulnerability โ€“ Cisco fixed a critical privilege escalation vulnerability (CVE-2025-20156) in its Meeting Management software, allowing remote authenticated attackers to gain admin privileges. No attacks have been reported in the wild. https://securityaffairs.com/173361/security/cisco-meeting-management-critical-flaw.html

๐Ÿš— Subaru Security Flaws Exposed Its System for Tracking Millions of Cars privacy โ€“ Researchers discovered vulnerabilities in Subaru's system that allowed remote access to vehicles and a year of precise location data. Despite patching the flaws, privacy concerns remain about employee access to sensitive data. https://www.wired.com/story/subaru-location-tracking-vulnerabilities/

๐ŸŒ€ Developer Creates Infinite Maze That Traps AI Training Bots security research โ€“ A developer has created Nepenthes, an open-source tool that traps AI training web crawlers in an infinite loop of links, wasting their resources. It serves as both a protective measure for content and an offensive honeypot. https://www.404media.co/developer-creates-infinite-maze-to-trap-ai-crawlers-in/

โšก Researchers say new attack could take down the European power grid security research โ€“ Researchers found that Central Europe's power grid uses unencrypted radio signals for control, allowing potential exploitation to disrupt power supply. The vulnerabilities highlight significant security risks in critical infrastructure management. https://arstechnica.com/security/2025/01/could-hackers-use-new-attack-to-take-down-european-power-grid/

๐Ÿ”ง Google is giving IT more control over your Chrome extensions security news โ€“ Google has introduced new features for IT admins in Chrome Enterprise, allowing them to better manage browser extensions by promoting approved ones, customizing the Chrome Web Store UI, and soon enabling remote removal of extensions. https://www.theverge.com/2025/1/23/24350178/google-chrome-extensions-admin-enterprise-controls

๐Ÿ’ธ PayPal penalized $2 million over data breach involving 35K Social Security numbers data breach โ€“ PayPal will pay a $2 million penalty for a December 2022 data breach that exposed nearly 35,000 Social Security numbers due to inadequate cybersecurity measures and training, according to New York regulators. https://therecord.media/paypal-penalty-millions-data-breach

๐Ÿ”— Beware of Contacts through LinkedIn: They Target Your Organizationโ€™s Property, Not Yours โ€“ JPCERT/CC Eyes warning โ€“ JPCERT/CC warns that unauthorized access incidents in Japan have increased, utilizing LinkedIn as a vector for attacks by the Lazarus group. Companies are advised to restrict social media use on work devices to mitigate risks. https://blogs.jpcert.or.jp/en/2025/01/initial_attack_vector.html


Some More, For the Curious

๐Ÿ” cURL Project and Go Security Teams Reject CVSS as Broken security news โ€“ The cURL and Go teams are abandoning CVSS due to its misleading severity scores. They advocate for context-driven assessments, highlighting growing discontent with the framework's effectiveness in vulnerability management. https://socket.dev/blog/curl-project-and-go-security-teams-reject-cvss-as-broken

๐ŸŒ ChatGPT crawler flaw opens door to DDoS, prompt injection vulnerability โ€“ A vulnerability in ChatGPT's API allows for potential DDoS attacks by flooding target websites with requests. The flaw raises concerns about security practices and prompt injection risks. https://www.theregister.com/2025/01/19/openais_chatgpt_crawler_vulnerability/

๐Ÿ”ฅ 50K Fortinet firewalls still vulnerable to latest zero-day security news โ€“ Nearly 50,000 Fortinet firewalls remain vulnerable to the CVE-2024-55591 zero-day exploit. Despite warnings, many customers, particularly in Asia, have not applied necessary patches, risking severe network breaches. https://www.theregister.com/2025/01/21/fortinet_firewalls_still_vulnerable/

๐Ÿ’ณ MasterCard DNS Error Went Unnoticed for Years security research โ€“ MasterCard fixed a critical DNS misconfiguration that could have allowed traffic interception for nearly five years. A researcher prevented potential exploitation by registering the incorrect domain, but MasterCard downplayed the risk. https://krebsonsecurity.com/2025/01/mastercard-dns-error-went-unnoticed-for-years/

๐Ÿฉบ Medical Device Company Tells Hospitals They're No Longer Allowed to Fix Machine That Costs Six Figures security news โ€“ Terumo Cardiovascular has mandated that repairs for its Advanced Perfusion System 1 Heart Lung Machine must now be conducted by the manufacturer, increasing costs for hospitals and limiting in-house repair capabilities. https://www.404media.co/medical-device-company-tells-hospitals-theyre-no-longer-allowed-to-fix-machine-that-costs-six-figures/

โš ๏ธ Kritische Sicherheitslรผcke in SonicWall SMA1000 โ€“ aktiv ausgenutzt โ€“ Update verfรผgbar warning https://www.cert.at/de/warnungen/2025/1/sonicwall-amc-cmc-rce

๐Ÿšช New backdoor discovered that specifically targets Juniper routers vulnerability โ€“ Researchers found a backdoor, dubbed 'J-Magic,' targeting Juniper routers, using 'magic packets' to execute commands and establish a reverse shell. This stealthy malware campaign highlights vulnerabilities in network infrastructure. https://cyberscoop.com/jmagic-juniper-networks-backdoor-freebsd-vpn/

๐Ÿšจ New Law Could Mean Prison for Reporting Data Leaks security news โ€“ Turkey's proposed cybersecurity law could criminalize reporting on data breaches, imposing prison sentences for those perceived to create false perceptions of breaches, raising concerns about free speech and discouraging transparency in cybersecurity. https://www.tripwire.com/state-of-security/new-law-could-mean-prison-reporting-data-leaks

๐Ÿ“ง Seasoning email threats with hidden text salting cyber defense โ€“ Cisco Talos reports an increase in email threats using hidden text salting to bypass detection systems. This technique conceals malicious content in HTML emails, complicating threat detection and mitigation. https://blog.talosintelligence.com/seasoning-email-threats-with-hidden-text-salting/

๐Ÿ† Participants in the Pwn2Own Automotive 2025 earned $886,250 security news โ€“ The Pwn2Own Automotive 2025 contest concluded with participants earning $886,250 by demonstrating 49 zero-day vulnerabilities. Sina Kheirkhah won the Master of Pwn title with significant exploits on EV chargers. https://securityaffairs.com/173426/breaking-news/pwn2own-automotive-2025-final-results.html

๐Ÿ”” Cisco warns of a ClamAV bug with PoC exploit vulnerability โ€“ Cisco has addressed a medium-severity denial-of-service vulnerability (CVE-2025-20128) in ClamAV, with proof-of-concept exploit code now available. The flaw can cause crashes during scans on affected devices. https://securityaffairs.com/173446/uncategorized/cisco-fixed-clamav-dos-flaw.html

๐Ÿ› ๏ธ USB Army Knife: The Ultimate Close Access Penetest Tool security research โ€“ The USB Army Knife is a versatile red teaming tool that enables various attack vectors, including keystroke injection and network traffic capture. Its ease of installation and multifunctionality make it essential for penetration testers. https://www.mobile-hacker.com/2025/01/24/usb-army-knife-the-ultimate-close-access-penetest-tool/


CISA Corner

๐Ÿ”— Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications security news โ€“ CISA and FBI issued a cybersecurity advisory on vulnerabilities in Ivanti Cloud Service Appliances exploited in 2024. Threat actors chained multiple CVEs to gain access, execute remote code, and implant webshells. https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a

โš™๏ธ CISA Releases Three Industrial Control Systems Advisories vulnerability โ€“ CISA issued three advisories on January 21, 2025, addressing security vulnerabilities in ICS, including TCAS II, Siemens SIMATIC S7-1200 CPUs, and ZF RSSPlus. Users are urged to review these advisories. https://www.cisa.gov/news-events/alerts/2025/01/21/cisa-releases-three-industrial-control-systems-advisories โš™๏ธ CISA Releases Six Industrial Control Systems Advisories vulnerability โ€“ CISA issued six advisories on January 23, 2025, detailing vulnerabilities in various ICS products, including those from Schneider Electric and Hitachi Energy. Users are urged to review for mitigation strategies. https://www.cisa.gov/news-events/alerts/2025/01/23/cisa-releases-six-industrial-control-systems-advisories

โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added CVE-2020-11023, a jQuery Cross-Site Scripting vulnerability, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, emphasizing the need for federal agencies to remediate such risks. https://www.cisa.gov/news-events/alerts/2025/01/23/cisa-adds-one-known-exploited-vulnerability-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added CVE-2025-23006, a deserialization vulnerability affecting SonicWall SMA1000 Appliances, to its Known Exploited Vulnerabilities Catalog, highlighting significant risks for federal agencies. https://www.cisa.gov/news-events/alerts/2025/01/24/cisa-adds-one-known-exploited-vulnerability-catalog


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub