๐Ÿ“ฐwrzlbrmpft's cyberlights๐Ÿ’ฅ

weekly cybersecurity highlights (for everyone!)

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


Highlight

๐Ÿ’ณ So stehlen Kriminelle mit gefรคlschten FinanzOnline-Benachrichtigungen Ihre Bankomatkarte cybercrime โ€“ Kriminelle nutzen gefรคlschte Onlinebanking-Seiten, um Bankdaten zu stehlen. Nutzer erhalten betrรผgerische Benachrichtigungen รผber Kartensperrungen und sollen ihre alte Karte zurรผcksenden. https://www.watchlist-internet.at/news/so-stehlen-kriminelle-kartenwechsel-scam/


News For All

๐Ÿค– Your robot vacuum cleaner might be spying on you privacy โ€“ A security flaw in Ecovacs robot vacuums allows remote access to cameras and microphones, exposing users to privacy risks. Updates are coming, but not soon enough for some customers. https://www.bitdefender.com/en-us/blog/hotforsecurity/your-robot-vacuum-cleaner-might-be-spying-on-you/

๐Ÿค” Cops often hush up use of facial recognition tools privacy โ€“ U.S. police frequently use facial recognition technology without disclosing it to suspects, leading to wrongful arrests. This raises concerns about privacy and accountability in law enforcement practices. https://www.theregister.com/2024/10/07/cops_love_facial_recognition_and/

๐Ÿ”’ Google brings better bricking to Androids, to curtail crims security news โ€“ Google is rolling out features to enhance Android security, making it harder for thieves to profit from stolen phones by requiring credentials for factory resets and biometric verification for sensitive actions. https://www.theregister.com/2024/10/08/google_android_security/

โš–๏ธ Twitter Acts Fast on Nonconsensual Nudity If It Thinks Itโ€™s a Copyright Violation privacy โ€“ A study reveals Twitter removes nonconsensual nude images quickly if reported for copyright violations but delays action on similar reports for nonconsensual content, highlighting legal gaps. https://www.404media.co/twitter-acts-fast-on-nonconsensual-nudity-if-it-thinks-its-a-copyright-violation/

๐Ÿ”„ What Googleโ€™s U-Turn on Third-Party Cookies Means for Chrome Privacy privacy โ€“ Google paused its plans to eliminate third-party cookies in Chrome, citing backlash from various stakeholders. Critics argue this compromises user privacy while Google emphasizes user choice in tracking. https://www.wired.com/story/google-chrome-third-party-cookies-privacy-rollback/

๐Ÿ” Credit monitoring and supply chain risk company hacked data breach โ€“ CreditRiskMonitor reported a data breach where sensitive employee information was stolen, though customer data remained unaffected. The company is offering impacted individuals 24 months of free credit monitoring. https://cyberscoop.com/credit-risk-monitor-cyber-crmz-ransomware/

๐Ÿ“ฑ Donโ€™t use iPhone Mirroring at work, experts warn privacy โ€“ Experts warn against using iPhone Mirroring at work due to privacy risks, as it can expose personal app data to employers. Apple is aware and working on a fix. https://www.theregister.com/2024/10/08/iphone_mirroring_at_work/

๐Ÿ“š The Editors Protecting Wikipedia from AI Hoaxes security news โ€“ Wikipedia editors have launched WikiProject AI Cleanup to address the rise of unsourced, poorly-written AI-generated content on the platform, aiming to preserve the quality of information. https://www.404media.co/the-editors-protecting-wikipedia-from-ai-hoaxes/

๐Ÿ’‰ Trinity ransomware targets healthcare orgs cybercrime โ€“ Trinity ransomware has infected at least one U.S. healthcare provider, employing double extortion tactics. Experts warn healthcare organizations to enhance security measures against such attacks. https://www.theregister.com/2024/10/09/trinity_ransomware_targets_healthcare_orgs/

๐Ÿ”‘ How to use Appleโ€™s new Passwords app on iOS and macOS security news โ€“ Apple's new Passwords app replaces previous password management methods, allowing users to store and manage passwords, passkeys, and Wi-Fi credentials across devices. It offers autofill, sharing, and security alerts. https://www.theverge.com/24264400/passwords-apple-ios-macos-how-to

๐Ÿ“‰ National Public Data files for bankruptcy after info leak security news โ€“ National Public Data filed for bankruptcy after a massive data breach affecting potentially hundreds of millions. The company faces multiple lawsuits and regulatory challenges following the incident. https://www.theregister.com/2024/10/09/national_public_data_bankrupt/

๐Ÿ”’ The Internet Archive is under attack, with a breach revealing info for 31 million accounts data breach โ€“ The Internet Archive confirmed a breach exposing data for 31 million accounts, including email addresses and hashed passwords. The site also faced a DDoS attack following the incident. https://www.theverge.com/2024/10/9/24266419/internet-archive-ddos-attack-pop-up-message

๐Ÿ“ฑ How Telegram Turbocharges Organised Crime cybercrime โ€“ A UN report highlights Telegram's role in facilitating organized crime, including cyber fraud, money laundering, and criminal marketplaces, emphasizing the need for stricter regulations to combat these activities. https://news.risky.biz/how-telegram-turbocharges-organised-crime/

โš ๏ธ Mozilla issued an urgent Firefox update to fix actively exploited flaw vulnerability โ€“ Mozilla released an urgent update for Firefox to fix a critical use-after-free vulnerability (CVE-2024-9680) actively exploited in attacks, urging users to upgrade immediately. https://securityaffairs.com/169590/security/mozilla-firefox-actively-exploited-flaw.html

๐Ÿ›ก๏ธ Blue Team, Red Team, and Purple Team: An Overview security news โ€“ This article discusses the roles of Blue, Red, and Purple Teams in cybersecurity, highlighting defensive operations, adversarial simulations, and collaborative efforts to enhance security measures. https://www.blackhillsinfosec.com/red-blue-and-purple-teams/

๐Ÿ˜ท 14,000 medical devices are online, unsecured and vulnerable security research โ€“ A report reveals over 14,000 exposed medical devices globally, with nearly half in the U.S. Many lack basic security measures, making them prime targets for cybercriminals amid increasing healthcare attacks. https://cyberscoop.com/medical-devices-online-health-censys/

๐Ÿ– Pig Butchering Scams Are Going High Tech cybercrime โ€“ The UNODC reports a surge in high-tech 'pig butchering' scams in Southeast Asia, utilizing generative AI and deepfakes to enhance fraud. These scams, alongside cryptocurrency drainers, are increasingly sophisticated and pose significant challenges for law enforcement. https://www.wired.com/story/pig-butchering-scams-go-high-tech/

โ›“๏ธโ€๐Ÿ’ฅ 'Chat control': The EU's controversial CSAM-scanning legal proposal explained privacy โ€“ The EU's proposed legislation to combat child sexual abuse material (CSAM) threatens user privacy by mandating scanning of private communications on messaging apps, raising concerns about encryption and mass surveillance. https://techcrunch.com/2024/10/12/chat-control-the-eus-controversial-csam-scanning-legal-proposal-explained/

๐Ÿ”’ How to Stop Your Data From Being Used to Train AI privacy โ€“ As generative AI increasingly utilizes online data, users can take steps to opt out of having their content used for training. The article outlines various platforms and methods to help protect personal data from being scraped. https://www.wired.com/story/how-to-stop-your-data-from-being-used-to-train-ai/

โš ๏ธ Magenta ID wurde deaktiviert: Vorsicht vor tรคuschend echter Phishing-Mail warning โ€“ Eine tรคuschend echte Phishing-Mail mit dem Betreff โ€žAktion erforderlich: Reaktivierung Ihrer Magenta IDโ€œ fordert zur Aktivierung einer nicht existierenden ID auf. Drei Hinweise entlarven die Betrugsmasche. https://futurezone.at/digital-life/magenta-id-wurde-deaktiviert-mail-phishing-rechnung-hinweise-betrug-warnung/402960708


Some More, For the Curious

๐ŸŽ‰ Kyiv's hackers launched an unprecedented cyber attack on Russian state media VGTRK on Putin's birthday security news โ€“ Ukrainian hackers reportedly disrupted VGTRK operations, wiping servers and backups on Putin's birthday, amid ongoing cyber conflict between Russia and Ukraine. https://securityaffairs.com/169486/cyber-warfare-2/kyivs-hackers-hit-russian-state-media.html

๐Ÿง“ The 30-year-old internet backdoor law that came back to bite security news โ€“ Chinese hackers compromised U.S. telecom wiretap systems, highlighting risks of backdoor laws like CALEA, which mandate access to customer data but create vulnerabilities for abuse. https://techcrunch.com/2024/10/07/the-30-year-old-internet-backdoor-law-that-came-back-to-bite/

๐Ÿ’ฐ MoneyGram says hackers stole customers' personal information and transaction data data breach โ€“ MoneyGram confirmed a cyberattack resulted in the theft of customers' personal and transaction data, affecting names, addresses, and some Social Security numbers. Investigation is ongoing. https://techcrunch.com/2024/10/07/moneygram-says-hackers-stole-customers-personal-information-and-transaction-data/

๐Ÿ—ƒ๏ธ ADT says hacker stole encrypted internal employee data after compromising business partner security news โ€“ ADT reported a breach where a hacker accessed its network through a compromised third-party partner, stealing encrypted employee data. No customer information was believed to be affected. https://therecord.media/adt-hacker-stole-encrypted-data-after-breaching-third-party

๐Ÿ›ก๏ธ Following the Trail of Flax Typhoon to Uncover Newly Discovered Vulnerabilities in Linear Emerge Access Control Devices security research โ€“ A vulnerability, CVE-2024-9441, affects Linear Emerge E3 series devices and is unpatched, raising concerns of imminent exploitation. Organizations are urged to isolate affected devices. https://vulncheck.com/blog/flax-typhoon-linear-merge

๐Ÿ”ง Zero Day Initiative โ€” The October 2024 Security Update Review security news โ€“ Adobe and Microsoft released significant security updates in October 2024, addressing numerous vulnerabilities including critical code execution bugs. Users are urged to promptly apply patches to mitigate risks. https://www.thezdi.com/blog/2024/10/8/the-october-2024-security-update-review

๐Ÿšซ Russia and Turkey ban Discord messaging app security news โ€“ Russia and Turkey have blocked Discord, citing non-compliance with local laws and misuse for illegal activities. The bans have sparked backlash, highlighting the platform's importance for communication. https://therecord.media/discord-messaging-app-banned-russia-turkey

๐Ÿ” Two never-before-seen tools, from same group, infect air-gapped devices security research โ€“ Researchers discovered two sophisticated toolsets used by a suspected Russian hacking group to compromise air-gapped devices for data theft, highlighting their evolving capabilities and modular design. https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/

โŒจ๏ธ Hackers targeted Android users by exploiting zero-day bug in Qualcomm chips vulnerability โ€“ Qualcomm confirmed hackers exploited a zero-day vulnerability (CVE-2024-43047) in its chipsets used in Android devices, with indications of targeted exploitation. Fixes have been made available to device manufacturers. https://techcrunch.com/2024/10/09/hackers-were-targeting-android-users-with-qualcomm-zero-day/

๐ŸŒ OpenAI says it has disrupted 20-plus foreign influence networks in past year security news โ€“ OpenAI disrupted over 20 foreign influence operations using its AI tools to manipulate political sentiments and elections. The report highlights ongoing threats from nations like Russia and Iran. https://cyberscoop.com/openai-threat-report-foreign-influence-generative-ai/

๐Ÿš” Dutch cops reveal takedown of 'largest dark web market' cybercrime โ€“ Dutch police arrested the alleged administrators of Bohemia and Cannabia, the largest dark web marketplaces, which processed โ‚ฌ12 million monthly. The operators attempted an exit scam after becoming aware of the investigation. https://www.theregister.com/2024/10/10/cannabia_bohemia_darkweb_market_investigation/

๐Ÿช™ FBI created a crypto token so it could watch it being abused security news โ€“ The FBI developed its own cryptocurrency, NexFundAI, to monitor fraudulent activities in the crypto market, leading to arrests in three countries for alleged wash trading and manipulation schemes. https://www.theregister.com/2024/10/11/fbi_nexfundai_crypto_fraud_sting/

๐Ÿ”ง GitLab fixed a critical flaw that could allow arbitrary CI vulnerability โ€“ GitLab patched a critical vulnerability (CVE-2024-9164) that allowed unauthorized CI/CD pipeline execution. The update also addressed several high and medium severity issues in both Community and Enterprise Editions. https://securityaffairs.com/169671/security/gitlab-fixed-critical-flaw-cve-2024-9164.html

๐Ÿ“ฆ Malicious packages in open-source repositories are surging security research โ€“ A report by Sonatype reveals a 150% increase in malicious packages in open-source repositories over the past year, highlighting security vulnerabilities and the slow response to patching them. https://cyberscoop.com/open-source-security-supply-chain-sonatype/

๐Ÿ’ป Ransomware operators exploited Veeam Backup & Replication flaw CVE vulnerability โ€“ Ransomware operators are exploiting the critical CVE-2024-40711 vulnerability in Veeam Backup & Replication to deploy malware and create rogue accounts. Sophos warns of attacks leveraging compromised credentials and outdated VPNs. https://securityaffairs.com/169679/cyber-crime/ransomware-groups-exploit-veeam-backup-replication-bug.html

๐Ÿ“ File hosting services misused for identity phishing security research โ€“ Microsoft reports that ransomware operators are exploiting legitimate file hosting services to conduct phishing attacks, using tactics to evade detection and compromise user identities, leading to business email compromise (BEC) attacks. https://www.microsoft.com/en-us/security/blog/2024/10/08/file-hosting-services-misused-for-identity-phishing/


CISA Corner

๐Ÿšจ Avoid Scams After Disaster Strikes warning โ€“ CISA warns of increased cyber scams following natural disasters, urging caution with emails and social media related to hurricanes. Verify information from trusted sources before responding. https://www.cisa.gov/news-events/alerts/2024/10/08/avoid-scams-after-disaster-strikes

โš ๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has included three vulnerabilities in its Known Exploited Vulnerabilities Catalog, highlighting risks from active exploitation. Agencies are required to remediate these vulnerabilities to protect federal networks. https://www.cisa.gov/news-events/alerts/2024/10/08/cisa-adds-three-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added three vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting risks from active exploitation in Fortinet and Ivanti products. Federal agencies must remediate these vulnerabilities promptly. https://www.cisa.gov/news-events/alerts/2024/10/09/cisa-adds-three-known-exploited-vulnerabilities-catalog


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿ– The Pig Butchering Invasion Has Begun cybercrime โ€“ Global pig butchering scams, rooted in Southeast Asia, exploit vulnerable populations and net billions. Operations are expanding worldwide, raising serious human trafficking and financial crime concerns. https://www.wired.com/story/pig-butchering-scam-invasion/

๐Ÿ” Remote ID verification tech is often biased and wrong security news โ€“ A GSA study reveals remote identity verification technologies are biased, with significant error rates affecting marginalized groups. The techโ€™s reliability raises concerns for government and user equity. https://www.theregister.com/2024/09/30/remote_identity_verification_biased/

๐Ÿ“š Massive E-Learning Platform Udemy Gave Teachers a Gen AI 'Opt-Out Window'. It's Already Over. privacy โ€“ Udemy's brief opt-out period for teachers to exclude their content from generative AI training has passed, sparking backlash over perceived intellectual property theft and biased communication. https://www.404media.co/massive-e-learning-platform-udemy-gave-teachers-a-gen-ai-opt-out-window-its-already-over/

๐ŸŽฏ North Korea-linked APT Kimsuky targeted German defense firm Diehl Defence security news โ€“ North Korea's APT Kimsuky targeted German defense contractor Diehl Defence through a phishing campaign involving fake job offers, raising significant concerns due to the company's military manufacturing role. https://securityaffairs.com/169162/apt/kimsuky-apt-hit-diehl-defence.html

๐Ÿซด Paypal Opted You Into Sharing Data Without Your Knowledge privacy โ€“ PayPal has been criticized for automatically opting users into data sharing with third parties for personalized shopping, raising privacy concerns as users were unaware of this change. https://www.404media.co/paypal-personalized-shopping-opt-out/

๐Ÿ“ฐ News agency AFP hit by cyberattack, client services impacted cybercrime โ€“ AFP confirmed a cyberattack affecting its IT systems and client services, prompting investigations with Franceโ€™s cybersecurity agency. Global news coverage remains unaffected, but partners were warned about potential FTP credential compromises. https://securityaffairs.com/169175/hacking/news-agency-afp-hit-by-cyberattack-client-services-impacted.html

๐Ÿš” Multinational police effort hits sections of Lockbit ransomware operation security news โ€“ An international police effort led to arrests and seizures targeting the LockBit ransomware group, including a suspected developer in France and sanctions against affiliates linked to Evil Corp, amid ongoing efforts to disrupt cybercrime. https://cyberscoop.com/lockbit-arrests-ransomware-fbi-uk-nca-evil-corp/

๐Ÿฅ UMC Health System diverted patients following a ransomware attack cybercrime โ€“ UMC Health System in Texas diverted patients after a ransomware attack caused a network outage. The hospital is investigating the breach and working to restore services while ensuring patient care. https://securityaffairs.com/169198/cyber-crime/umc-health-system-cyberattack.html

๐Ÿ•ต๏ธโ€โ™€๏ธ ICE Signs $2 Million Contract With Spyware Maker Paragon Solutions security news โ€“ ICE has contracted Israeli spyware vendor Paragon Solutions for $2 million amid ongoing scrutiny of commercial spyware. The contract raises questions about ethical surveillance practices and human rights implications. https://www.wired.com/story/ice-paragon-solutions-contract/

๐Ÿ“Š Thunderbird fรผr Android: Telemetrie-Daten werden bereits beim Start erfasst privacy โ€“ Die Beta-Version von Thunderbird fรผr Android รผbertrรคgt Telemetriedaten ohne Einwilligung an Mozilla. Dies verstรถรŸt gegen Datenschutzgesetze und enttรคuscht Nutzer, die eine Opt-In-Lรถsung erwarten. https://www.kuketz-blog.de/thunderbird-fuer-android-telemetrie-daten-werden-bereits-beim-start-erfasst/

๐Ÿชฉ A Network of AI โ€˜Nudifyโ€™ Sites Are a Front for Notorious Russian Hackers cybercrime โ€“ Fake AI โ€˜nudifyโ€™ sites are revealed to be fronts for Fin7, a Russian hacking group, designed to steal credentials. The sites lure users with the promise of generating nonconsensual content. https://www.404media.co/a-network-of-ai-nudify-sites-are-a-front-for-notorious-russian-hackers-2/

๐Ÿ” Telegram has disclosed criminal data to authorities for years, Durov says security news โ€“ Telegram's founder, Pavel Durov, clarified that the platform has long disclosed user data to law enforcement upon legal request, emphasizing recent updates to privacy policies do not signify a major shift in practices. https://therecord.media/telegram-disclosing-criminal-data-law-enforcement-durov-statement

๐Ÿ’ฐ Men Stole Over $1 Million From DoorDash Delivery Drivers By Impersonating Them to Customer Service cybercrime โ€“ Two men impersonated DoorDash drivers to steal over $1 million by hijacking accounts and redirecting payments. They used stolen personal information to bypass security and change account details. https://www.404media.co/men-stole-over-1-million-from-doordash-delivery-drivers-by-impersonating-them-to-customer-service/

๐Ÿ” The feds still canโ€™t get into Eric Adamsโ€™ phone security news โ€“ NYC Mayor Eric Adams forgot the new passcode to his phone after changing it, complicating federal investigators' efforts to access it amid ongoing fraud and bribery charges against him. https://www.theverge.com/2024/10/2/24260626/fbi-eric-adams-locked-phone-forgotten-changed-password

๐Ÿ“ธ License Plate Readers Are Creating a US-Wide Database of More Than Just Cars privacy โ€“ License plate readers in the US are compiling extensive databases that capture political affiliations and personal beliefs, raising concerns about privacy and surveillance as they collect data beyond just vehicle information. https://www.wired.com/story/license-plate-readers-political-signs-bumper-stickers/

๐Ÿ”’ DOJ, Microsoft seize 107 domains used in Russian attacks security news โ€“ The DOJ and Microsoft seized 107 domains linked to Russia's Callisto Group, disrupting a phishing campaign targeting US government agencies and other organizations, aimed at stealing sensitive information. https://www.theregister.com/2024/10/03/russian_phishing_domains_seized/

๐Ÿ‘ฎโ€โ™€๏ธ Dutch police breached by a state actor data breach โ€“ A state actor has been blamed for hacking into the Dutch police system, exposing contact details of officers. The investigation is ongoing, with security measures implemented to protect affected personnel. https://securityaffairs.com/169328/hacking/dutch-police-breached-by-state-actor.html

๐Ÿ‘“ Harvard duo modifies Meta glasses to grab strangers' info security news โ€“ Harvard students developed 'I-XRAY,' a system using Meta smart glasses to identify individuals and compile personal information from publicly available sources, highlighting privacy concerns in the AI era. https://www.theregister.com/2024/10/04/harvard_engineer_meta_smart_glasses/

๐Ÿ’ผ Crook made millions by breaking into execsโ€™ Office365 inboxes, feds say cybercrime โ€“ UK national Robert B. Westbrook has been charged with a hack-to-trade scheme, illegally accessing Office365 accounts of US executives to steal financial reports, earning approximately $3.75 million from insider trading. https://arstechnica.com/security/2024/10/crook-made-millions-by-breaking-into-execs-office365-inboxes-feds-say/

๐ŸŽฅ Metaโ€™s new โ€œMovie Genโ€ AI system can deepfake video from a single photo security news โ€“ Meta's Movie Gen AI can create realistic videos from a single photo, generating deepfakes and personalized content. While it offers innovative editing and sound synthesis features, it raises significant ethical concerns. https://arstechnica.com/ai/2024/10/metas-new-movie-gen-ai-system-can-deepfake-video-from-a-single-photo/

๐Ÿ”’ Apple iOS 18.0.1 and iPadOS 18.0.1 fix media session and passwords bugs security news โ€“ Apple's iOS 18.0.1 and iPadOS 18.0.1 updates address two vulnerabilities that could expose audio snippets and passwords. The flaws were fixed with improved validation checks, with no known active exploits reported. https://securityaffairs.com/169381/mobile-2/apple-ios-18-0-1.html

๐Ÿ›ฌ Ryanair faces GDPR turbulence over customer ID checks security news โ€“ Ireland's Data Protection Commission is investigating Ryanair's ID verification process for customers booking through third-party sites, focusing on compliance with GDPR regarding the use of biometric data. https://www.theregister.com/2024/10/05/irish_dpc_ryanair_probe/


Some More, For the Curious

๐ŸŽ’ Danger is Still Lurking in the NVD Backlog security news โ€“ The National Vulnerability Database still has a significant backlog of over 18,000 vulnerabilities, with 72.4% unanalyzed. Progress has been made, but many critical vulnerabilities remain unassessed. https://vulncheck.com/blog/nvd-backlog-exploitation-lurking

๐Ÿ”’ More frequent disruption operations needed to dent ransomware gangs, officials say security news โ€“ Officials urge for increased frequency of disruption operations against ransomware gangs, as current efforts have proven insufficient. New strategies and international cooperation are essential to combat the rising threat. https://cyberscoop.com/counter-ransomware-initiative-summit-white-house-odni/

๐Ÿ› ๏ธ capa Explorer Web: A Web-Based Tool for Program Capability Analysis security research โ€“ Mandiant introduces capa Explorer Web, a browser-based tool for visualizing program capabilities identified by the capa reverse engineering tool, enhancing analysis with interactive features and integration with VirusTotal. https://cloud.google.com/blog/topics/threat-intelligence/capa-explorer-web-program-capability-analysis/

๐Ÿ•ต๏ธโ€โ™‚๏ธ Notorious Evil Corp Hackers Targeted NATO Allies for Russian Intelligence cybercrime โ€“ Evil Corp has been linked to Russian intelligence agencies and tasked with espionage against NATO allies. The group, known for its Dridex malware and ransomware operations, has extorted over $300 million. https://www.wired.com/story/evil-corp-lockbit-russian-intelligence/

๐Ÿ›ก๏ธ Level Up Your Security Skills with the New Microsoft Sentinel Ninja Training! security news โ€“ Microsoft Sentinel Ninja Training has been revamped with interactive modules, hands-on labs, and real-world scenarios to enhance skills in threat detection and incident response, integrating with Defender XDR for streamlined operations. https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/level-up-your-security-skills-with-the-new-microsoft-sentinel/ba-p/4260106

๐Ÿšจ Russian authorities arrest nearly 100 in raids tied to cybercriminal money laundering cybercrime โ€“ Russian authorities arrested nearly 100 individuals linked to the UAPS payment system and Cryptex exchanges in a money laundering investigation, handling over $1.2 billion in illicit funds for cybercriminals. https://cyberscoop.com/russian-cybercrime-raids-cryptex-uaps/

๐Ÿ”’ 14 New DrayTek routers' flaws impacts over 700,000 devices in 168 countries vulnerability โ€“ Forescout identified 14 vulnerabilities in DrayTek routers, affecting over 704,000 devices globally. Two critical flaws could enable severe attacks, prompting urgent updates from DrayTek. https://securityaffairs.com/169267/security/draytek-routers-flaws-impacts-700000-devices.html

๐Ÿ’ป Threat actor believed to be spreading new MedusaLocker variant since 2022 malware โ€“ Cisco Talos reports a financially motivated threat actor distributing a new MedusaLocker ransomware variant, 'BabyLockerKZ,' targeting organizations globally since 2022, with a shift from Europe to South America. https://blog.talosintelligence.com/threat-actor-believed-to-be-spreading-new-medusalocker-variant-since-2022/

๐Ÿ“ง Weird Zimbra Vulnerability vulnerability โ€“ A Zimbra vulnerability allows hackers to execute remote commands via malformed emails. While exploitation is easy, large-scale infections are unlikely. Defenders should monitor for suspicious email patterns. https://www.schneier.com/blog/archives/2024/10/weird-zimbra-vulnerability.html

โš ๏ธ The Silent Epidemic: Uncovering the Dangers of Alert Fatigue and How to Overcome It security news โ€“ Alert fatigue poses a significant threat to cybersecurity, overwhelming security teams and causing critical alerts to be overlooked. Organizations must adopt automation tools and education to mitigate these risks. https://www.cybereason.com/blog/the-silent-epidemic-uncovering-the-dangers-of-alert-fatigue-and-how-to-overcome-it

๐Ÿ›ฐ๏ธ Black Hills Information Security hacking write-up โ€“ The article discusses the history and future of satellite technology, highlighting vulnerabilities and notable attacks, including spoofing and jamming. It emphasizes the risks of cyberattacks on satellites and the need for robust security measures. https://www.blackhillsinfosec.com/satellite-hacking/

๐Ÿ Thousands of Linux systems infected by stealthy malware since 2021 malware โ€“ A stealthy malware strain named Perfctl has infected thousands of Linux systems since 2021, exploiting over 20,000 misconfigurations and a critical vulnerability, allowing for cryptocurrency mining and unauthorized access. https://arstechnica.com/security/2024/10/persistent-stealthy-linux-malware-has-infected-thousands-since-2021/

๐Ÿ“Š Introducing the Use Cases Mapper workbook cyber defense โ€“ The Use Case Mapper Workbook aids organizations in optimizing Microsoft Sentinel by mapping common security use cases to the MITRE ATT&CK framework, identifying gaps in security solutions, and facilitating updates. https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-the-use-cases-mapper-workbook/ba-p/4202058


CISA Corner

โš ๏ธ CISA Adds Four Known Exploited Vulnerabilities to Catalog warning โ€“ CISA has added four actively exploited vulnerabilities to its catalog, including critical command injection issues in routers and a deserialization flaw in SAP, posing serious risks to federal networks. https://www.cisa.gov/news-events/alerts/2024/09/30/cisa-adds-four-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has added an Ivanti Endpoint Manager SQL Injection vulnerability to its Known Exploited Vulnerabilities Catalog, highlighting risks that malicious actors pose to federal networks. https://www.cisa.gov/news-events/alerts/2024/10/02/cisa-adds-one-known-exploited-vulnerability-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog warning โ€“ CISA has included a new vulnerability, CVE-2024-45519, affecting Synacor Zimbra, in its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, posing risks to federal networks. https://www.cisa.gov/news-events/alerts/2024/10/03/cisa-adds-one-known-exploited-vulnerability-catalog

โš™๏ธ CISA Releases Two Industrial Control Systems Advisories vulnerability โ€“ CISA issued two advisories on October 1, 2024, highlighting vulnerabilities in Optigo Networks and Mitsubishi Electric ICS. Users are urged to review the advisories for mitigation strategies. https://www.cisa.gov/news-events/alerts/2024/10/01/cisa-releases-two-industrial-control-systems-advisories โš™๏ธ CISA Releases Three Industrial Control Systems Advisories vulnerability โ€“ CISA issued three advisories on October 3, 2024, addressing vulnerabilities in TEM Opera Plus, Subnet Solutions, and Delta Electronics ICS. Users are urged to review for security details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2024/10/03/cisa-releases-three-industrial-control-systems-advisories

๐Ÿ” ASDโ€™s ACSC, CISA, FBI, NSA, and International Partners Release Guidance on Principles of OT Cybersecurity for Critical Infrastructure Organizations security news โ€“ The ASDโ€™s ACSC, alongside CISA and international partners, released a guide outlining six principles for enhancing cybersecurity in operational technology environments to mitigate risks associated with business decisions. https://www.cisa.gov/news-events/alerts/2024/10/01/asds-acsc-cisa-fbi-nsa-and-international-partners-release-guidance-principles-ot-cybersecurity


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐ŸŽฎ Be Internet Awesome World: A fun new game to learn about online safety security news โ€“ Google's new game, Be Internet Awesome World, teaches kids online safety through interactive lessons on scams, passwords, and personal information sharing. https://blog.google/technology/safety-security/be-internet-awesome-roblox/

๐Ÿšจ Staying a Step Ahead: Mitigating the DPRK IT Worker Threat security research โ€“ Mandiant reports on DPRK IT workers posing as non-North Koreans to infiltrate global companies, generating revenue for the regime and posing cybersecurity risks; awareness and vigilance are crucial. https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat/

๐Ÿšดโ€โ™‚๏ธ Hacking the โ€œBike Angelsโ€ System for Moving Bikeshares security news โ€“ New York City's bikeshare system, Bike Angels, is being exploited by users creating artificial shortages to maximize rewards, prompting a need for system modifications to prevent such hacks. https://www.schneier.com/blog/archives/2024/09/hacking-the-bike-angels-system-for-moving-bikeshares.html

๐Ÿš— White House proposes rule to ban Chinese, Russian parts for networked vehicles security news โ€“ The White House proposes banning Chinese and Russian components in connected vehicles to address national security threats, targeting parts for connectivity systems amid rising surveillance and hacking concerns. https://cyberscoop.com/us-government-ban-china-russia-connected-cars/

โ˜‘๏ธ Privacy Service Optery Faces Backlash After Plan to Send OpenAI User Data privacy โ€“ Optery faced criticism for defaulting to transferring user data to OpenAI, leading to a backlash from privacy advocates and a subsequent shift to an opt-in model for data sharing. https://www.404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data/

๐Ÿงป Telegram will now hand over your phone number and IP if youโ€™re a criminal suspect security news โ€“ Telegram will disclose users' phone numbers and IP addresses to authorities upon valid requests for criminal suspects, reflecting a shift in its privacy policy amid concerns over illegal activities on the platform. https://www.theverge.com/2024/9/23/24252276/telegram-disclose-user-data-legal-requests-criminal-activity

โ›ฐ๏ธ Pro-Russia hackers aim DDoS campaign at Austrian websites ahead of elections security news โ€“ Pro-Russia hacker groups, including NoName057(16) and OverFlame, have launched DDoS attacks on over 40 Austrian websites ahead of the upcoming elections, causing temporary outages but no lasting damage. https://therecord.media/austria-websites-ddos-incidents-pro-russia-hacktivists

๐Ÿ“ธ New twist on sextortion scam includes pictures of people's homes cybercrime โ€“ A new sextortion scam involves emails with photos of victims' homes, threatening to reveal their online activity unless they pay a ransom, leveraging personal data for intimidation. https://therecord.media/new-twist-on-sextortion-scam-pictures-of-peoples-homes

๐Ÿฐ Iranian-linked election interference operation shows signs of recent access security news โ€“ An alleged Iranian hacking effort targeting Trumpโ€™s campaign continues, sharing materials with journalists, suggesting ongoing access to campaign documents, with U.S. officials linking the activity to the Iranian government. https://cyberscoop.com/trump-campaign-hack-new-material-ongoing-access/

๐Ÿ›ค๏ธ Who is tracking web behavior the most? Google, obviously privacy โ€“ Kaspersky's report reveals Google as the top tracker of online behavior, with its systems like Google Analytics and YouTube Analytics leading the way in data collection across various regions. https://www.theregister.com/2024/09/24/google_online_tracker/

๐Ÿš™ Study finds many European car resellers fail to delete driver data privacy โ€“ A study reveals that 80% of resold cars in Europe contain previous owners' personal data, violating data privacy laws; dealerships are urged to implement structured data deletion processes to avoid legal consequences. https://therecord.media/study-finds-european-car-resellers-fail-to-delete-data

๐Ÿ’ณ New Android banking trojan Octo2 targets European banks malware โ€“ The Octo2 banking trojan has emerged, enhancing remote takeover capabilities and targeting European banks. Its advanced features and leaked source code could expand its use among cybercriminals. https://securityaffairs.com/168857/malware/octo2-android-banking-trojan.html

๐Ÿชค New Windows Malware Locks Computer in Kiosk Mode malware โ€“ A new malware campaign locks users in their browser's kiosk mode on Google's login page, coercing them to enter their credentials, which are then stolen by information-stealing malware. https://www.schneier.com/blog/archives/2024/09/new-windows-malware-locks-computer-in-kiosk-mode.html

๐ŸฆŠ Data privacy watchdog files complaint against Mozilla for new ad tracking feature privacy โ€“ The advocacy group noyb has filed a complaint against Mozilla for implementing a new ad tracking feature in Firefox without user consent, claiming it undermines data privacy rights. https://therecord.media/noyb-europe-complaint-mozilla-firefox-privacy-preserving-attribution

๐ŸŽ๏ธ Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug vulnerability โ€“ Researchers discovered a flaw in Kia's web portal that allowed them to track and control millions of vehicles, highlighting serious security vulnerabilities in the automotive industryโ€™s web-based systems. https://www.wired.com/story/kia-web-vulnerability-vehicle-hack-track/

๐Ÿ“ฐ When UK rail stations Wi-Fi was defaced by hackers the only casualty was the truth security news โ€“ Hackers defaced public Wi-Fi at 19 UK rail stations with a hate-filled message, but the incident was downplayed as a minor cybersecurity breach rather than a major attack, contradicting sensational media coverage. https://www.bitdefender.com/blog/hotforsecurity/when-uk-rail-stations-wi-fi-was-defaced-by-hackers-the-only-casualty-was-the-truth/

๐Ÿ’ท UK data watchdog confirms it's investigating MoneyGram data breach data breach โ€“ The UK's ICO is investigating MoneyGram following a reported data breach that caused significant operational downtime, affecting customer transactions and partnerships; details on the breach remain unclear. https://techcrunch.com/2024/09/27/uk-data-watchdog-confirms-investigating-moneygram-data-breach/

๐Ÿ–จ๏ธ CUPS flaws allow remote code execution on Linux systems under certain conditions vulnerability โ€“ A critical vulnerability in the CUPS printing system allows unauthenticated remote code execution on Linux systems. Researchers disclosed multiple flaws, urging users to disable the affected service as a temporary mitigation. https://securityaffairs.com/169001/hacking/cups-flaws-allow-rce-on-linux-systems.html

๐Ÿค‘ Irish Data Protection Commission fines Meta โ‚ฌ91 million for passwords stored in plaintext privacy โ€“ The Irish Data Protection Commission fined Meta โ‚ฌ91 million for violating GDPR by storing users' passwords in plaintext, following a 2019 investigation where Meta disclosed the issue to regulators. https://cyberscoop.com/meta-fined-passwords-plaintext-ireland-millions-users/

๐Ÿ“ท Microsoft details security/privacy overhaul for Windows Recall ahead of relaunch security news โ€“ Microsoft is revamping its Recall feature for Windows after security concerns, making it opt-in, enhancing encryption, and requiring user re-authentication to access stored data. https://arstechnica.com/?p=2052960


Some More, For the Curious

๐Ÿค” The Cyber Resilience Act, an Accidental European Alien Torts Statute? security news โ€“ The Cyber Resilience Act may allow the EU to restrict tech sales based on fundamental rights violations, blending cybersecurity with accountability for international actions. https://www.lawfaremedia.org/article/the-cyber-resilience-act--an-accidental-european-alien-torts-statute

๐Ÿš’ Insecurity through Censorship: Vulnerabilities Caused by The Great Firewall security research โ€“ China's Great Firewall manipulates DNS responses, creating vulnerabilities for domains routed through Chinese infrastructure, risking attacks like subdomain takeovers and XSS. https://www.assetnote.io/resources/research/insecurity-through-censorship-vulnerabilities-caused-by-the-great-firewall

๐Ÿ€ Move over, Cobalt Strike, there's a new post-exploit tool security research โ€“ Attackers are now using Splinter, a new post-exploitation tool capable of executing commands and stealing data, raising concerns for organizations despite being less advanced than Cobalt Strike. https://www.theregister.com/2024/09/23/splinter_red_team_tool/

๐Ÿ’€ Necro Trojan infiltrates Google Play and Spotify and WhatsApp mods malware โ€“ The Necro Trojan has re-emerged, infecting popular apps on Google Play and modified versions of Spotify and WhatsApp, using techniques like steganography to evade detection and execute malicious activities. https://securelist.com/necro-trojan-is-back-on-google-play/113881/

๐Ÿ”‚ Microsoftโ€™s largest ever security transformation detailed in new report security news โ€“ Microsoft reveals its largest security overhaul, emphasizing a cultural shift towards security, with 34,000 engineers involved and new governance structures, following criticism of its previous security practices. https://www.theverge.com/2024/9/23/24251945/microsoft-security-report-secure-future-initiative

๐Ÿค– A generative artificial intelligence malware used in phishing attacks malware โ€“ HP researchers found malware generated by AI in a phishing attack that delivered AsyncRAT, highlighting how generative AI is making it easier for cybercriminals to create sophisticated threats. https://securityaffairs.com/168840/malware/generative-artificial-intelligence-malware.html

๐Ÿคก CrowdStrike exec apologizes in front of Congress over huge global IT outage security news โ€“ A CrowdStrike executive apologized to Congress for a faulty update that caused a massive IT outage affecting 8.5 million systems, outlining new measures to prevent future incidents. https://cyberscoop.com/crowdstrike-exec-apologizes-congressional-hearing-it-outage/

๐ŸŽฏ China-linked APT group Salt Typhoon compromised some U.S. internet service providers (ISPs) security news โ€“ The China-linked APT group Salt Typhoon has compromised several U.S. ISPs, aiming for intelligence gathering and potential cyberattacks, raising concerns about security in critical infrastructure. https://securityaffairs.com/168941/apt/salt-typhoon-china-linked-threat-actors-breached-us-isp.html

๐Ÿฅ Senate bill eyes minimum cybersecurity standards for health care industry security news โ€“ Senators Wyden and Warner introduced the Health Infrastructure Security and Accountability Act to enforce mandatory cybersecurity standards in the health care sector following a ransomware attack on Change Healthcare. https://cyberscoop.com/minimum-cybersecurity-standards-health-care-wyden-warner-bill/

๐Ÿ”’ HPE patches three critical security holes in Aruba PAPI vulnerability โ€“ HPE has released urgent patches for three critical vulnerabilities in Aruba access points that allow unauthenticated attackers to execute code remotely, urging upgrades to affected systems. https://www.theregister.com/2024/09/26/hpe_aruba_patch_papi/

๐Ÿ“ NIST Recommends Some Common-Sense Password Rules security news โ€“ NIST's draft guidelines propose sensible password rules, including a minimum length of 8-15 characters, no mandatory complexity requirements, and no periodic changes unless compromised. https://www.schneier.com/blog/archives/2024/09/nist-recommends-some-common-sense-password-rules.html

โš ๏ธ Critical Nvidia bug allows container escape, host takeover vulnerability โ€“ A critical vulnerability in Nvidia's Container Toolkit (CVE-2024-0132) allows attackers to escape containers and gain control of the host system, affecting 33% of cloud environments; fixes have been issued. https://www.theregister.com/2024/09/26/critical_nvidia_bug_container_escape/

โš–๏ธ The Data Breach Disclosure Conundrum security news โ€“ The article discusses the complexities of data breach disclosure, emphasizing the legal and ethical obligations organizations have to notify affected individuals and the potential backlash from non-disclosure, highlighting examples like Deezer and Uber. https://www.troyhunt.com/the-data-breach-disclosure-conundrum/


CISA Corner

๐Ÿ›ก๏ธ Threat Actors Continue to Exploit OT/ICS through Unsophisticated Means securnty news โ€“ CISA warns that cyber threat actors exploit vulnerable OT/ICS devices using basic methods like default credentials and brute force attacks, urging operators to enhance their security measures. https://www.cisa.gov/news-events/alerts/2024/09/25/threat-actors-continue-exploit-otics-through-unsophisticated-means

๐Ÿ“œ ASDโ€™s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises security news โ€“ A joint guide by ASD ACSC and CISA offers strategies for organizations to detect and mitigate Active Directory compromises, crucial for securing enterprise IT networks against malicious actors. https://www.cisa.gov/news-events/alerts/2024/09/26/asds-acsc-cisa-and-us-and-international-partners-release-guidance-detecting-and-mitigating-active

๐Ÿ› ๏ธ CISA Releases Eight Industrial Control Systems Advisories vulnerability โ€“ CISA has issued eight advisories highlighting vulnerabilities in various Industrial Control Systems, urging users to review them for important security updates and mitigations. https://www.cisa.gov/news-events/alerts/2024/09/24/cisa-releases-eight-industrial-control-systems-advisories ๐Ÿ› ๏ธ CISA Releases Five Industrial Control Systems Advisories vulnerability โ€“ CISA has published five advisories addressing vulnerabilities in various Industrial Control Systems, urging users to review them for essential security updates and mitigations. https://www.cisa.gov/news-events/alerts/2024/09/26/cisa-releases-five-industrial-control-systems-advisories

โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog vulnerability โ€“ CISA has included CVE-2024-7593, an authentication bypass vulnerability in Ivanti Virtual Traffic Manager, in its Known Exploited Vulnerabilities Catalog due to active exploitation. https://www.cisa.gov/news-events/alerts/2024/09/24/cisa-adds-one-known-exploited-vulnerability-catalog

๐Ÿ”ง Citrix Releases Security Updates for XenServer and Citrix Hypervisor vulnerability โ€“ Citrix has issued security updates for XenServer and Citrix Hypervisor to fix vulnerabilities that could lead to denial of service attacks; users are urged to apply these updates. https://www.cisa.gov/news-events/alerts/2024/09/25/citrix-releases-security-updates-xenserver-and-citrix-hypervisor ๐Ÿ”’ Cisco Releases Security Updates for IOS and IOS XE Software vulnerability โ€“ Cisco's September 2024 advisory addresses vulnerabilities in IOS and IOS XE software that could allow cyber actors to take control of affected systems; users are advised to apply updates. https://www.cisa.gov/news-events/alerts/2024/09/26/cisco-releases-security-updates-ios-and-ios-xe-software


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know.


Highlight

๐Ÿšจ Akute Welle an DDoS-Angriffen gegen รถsterreichische Unternehmen und Organisationen security news โ€“ Austrian organizations face DDoS attacks, likely linked to hacktivism. Companies should review their defenses and maintain offline contact info for emergencies. https://www.cert.at/de/aktuelles/2024/9/ddos-angriffe-september-2024


News For All

๐Ÿ—ณ๏ธ Germanyโ€™s CDU still struggling with cyberattack fallout security news โ€“ Germany's CDU party is facing challenges restoring member data after a June cyberattack, risking its election processes. The restoration deadline has been pushed to November. https://www.theregister.com/2024/09/16/nein_luck_for_germanys_cdu/

๐Ÿšซ Meta blocks RT and other Russian state media; Kremlin says it's 'unacceptable' security news โ€“ Meta bans Russian state media accounts, including RT, citing deceptive influence operations. The Kremlin calls this decision 'unacceptable' and complicates relations with the company. https://therecord.media/meta-bans-russian-state-owned-media-facebook-instagram

๐Ÿ”‘ Googleโ€™s passkey syncing makes it easier to move on from passwords security news โ€“ Google enhances passkey support in Chrome, allowing users to sync passkeys across devices using a Password Manager PIN instead of QR codes, ensuring secure access with end-to-end encryption. https://www.theverge.com/2024/9/19/24248820/google-chrome-passkey-logins-device-sync-password-manager-pin

๐Ÿฆโ€๐Ÿ”ฅ No way? Big Tech's 'lucrative surveillance' of everyone is terrible for privacy, freedom privacy โ€“ The FTC's report reveals that major tech firms inadequately handle vast amounts of user data, particularly concerning children's privacy, and calls for comprehensive federal privacy regulations to address ongoing data extraction issues. https://www.theregister.com/2024/09/19/social_media_data_harvesting_handling_ftc/

๐Ÿค” Ever wonder how crooks get the credentials to unlock stolen phones? cybercrime โ€“ Law enforcement shut down iServer, a phishing-as-a-service platform that helped unlock over 1.2 million stolen phones by obtaining user credentials through phishing attacks, leading to multiple arrests. https://arstechnica.com/?p=2051165

๐Ÿคณ Snapchat Reserves the Right to Use AI-Generated Images of Your Face in Ads privacy โ€“ Snapchat's 'My Selfie' feature can use users' likenesses in ads by default, unless opted out. The 'See My Selfie in Ads' option is enabled automatically. https://www.404media.co/snapchat-reserves-the-right-to-use-ai-generated-images-of-your-face-in-ads/

๐Ÿ”’ Discord launches end-to-end encrypted voice and video chats privacy โ€“ Discord introduces end-to-end encryption for voice and video calls, enhancing user privacy while maintaining content moderation for messages, which remain unencrypted. https://techcrunch.com/2024/09/17/discord-launches-end-to-end-encrypted-voice-and-video-chats/

๐Ÿ–ผ๏ธ Instagram to bolster privacy and safety features for millions of teen users privacy โ€“ Instagram plans to enhance privacy for teen users by making accounts private, limiting content exposure, and implementing features to reduce social media addiction, amid growing regulatory pressure. https://therecord.media/instagram-bolster-privacy-security-teens-children-social-media

โšฐ๏ธ Scam โ€˜Funeral Streamingโ€™ Groups Thrive on Facebook cybercrime โ€“ Scammers exploit Facebook by creating fake funeral streaming groups, tricking users into providing credit card info. The scheme has expanded to various events, with ties to a group in Bangladesh. https://krebsonsecurity.com/2024/09/scam-funeral-streaming-groups-thrive-on-facebook/

๐Ÿ’ฅ The Mystery of Hezbollahโ€™s Deadly Exploding Pagers security news โ€“ Exploding pagers used by Hezbollah have killed 11 and injured nearly 2,800 in Lebanon. Experts suggest a supply chain compromise, not a cyberattack, may be responsible for the blasts. https://www.wired.com/story/pager-explosion-hezbollah/

๐Ÿ’ฃ Walkie-Talkies Explode in New Attack on Hezbollah security news โ€“ Exploding two-way radios targeted Hezbollah members in Lebanon, causing multiple deaths and injuries, following a previous attack involving detonating pagers. Experts suspect deep supply chain infiltration by attackers. https://www.wired.com/story/walkie-talkie-explosions-hezbollah/

๐Ÿ“ฑ Your Phone Wonโ€™t Be the Next Exploding Pager security news โ€“ Recent attacks using booby-trapped pagers and walkie-talkies against Hezbollah have raised concerns about supply chain security. However, modern smartphones are unlikely to be weaponized similarly due to manufacturing complexities. https://www.wired.com/story/exploding-pagers-hezbollah-phones/

๐Ÿ“ฉ U.S. agencies say Iranian hackers tried to pass โ€˜non-publicโ€™ Trump campaign docs to Bidenโ€™s campaign security news โ€“ U.S. authorities revealed that Iranian hackers sent emails containing stolen Trump campaign information to Biden campaign associates, aiming to influence the 2024 election and stoke political discord. https://cyberscoop.com/iran-hackers-trump-campaign-emails-biden/

๐Ÿ›‘ Project Analyzing Human Language Usage Shuts Down Because โ€˜Generative AI Has Polluted the Dataโ€™ security news โ€“ The Wordfreq project, which tracked language usage across various media, has been discontinued due to generative AI spam corrupting data quality, rendering the tool ineffective. https://www.404media.co/project-analyzing-human-language-usage-shuts-down-because-generative-ai-has-polluted-the-data/

๐Ÿ” D-Link addressed three critical RCE in wireless router models vulnerability โ€“ D-Link fixed three critical remote code execution vulnerabilities in WiFi 6 routers, allowing unauthorized access and control. Users are urged to update their firmware to mitigate risks. https://securityaffairs.com/168471/security/d-link-rce-wireless-router-models.html

๐Ÿ‘จโ€๐Ÿ’ป Ticketmaster boss who repeatedly hacked rival firm sentenced cybercrime โ€“ Stephen Mead, former Ticketmaster boss, was sentenced for hacking rival CrowdSurge, stealing sensitive data, and sharing credentials with colleagues. He faces a year of supervised release and fines. https://www.bitdefender.com/blog/hotforsecurity/ticketmaster-boss-who-repeatedly-hacked-rival-firm-sentenced/

๐Ÿ•ต๏ธโ€โ™‚๏ธ US government expands sanctions against spyware maker Intellexa cybercrime โ€“ The U.S. imposes new sanctions on Intellexa executives linked to the spyware Predator, used to surveil targets including U.S. officials. This action continues efforts against the spyware industry. https://techcrunch.com/2024/09/16/us-government-expands-sanctions-against-spyware-maker-intellexa/

๐Ÿ’ผ Python Developers Targeted with Malware During Fake Job Interviews malware โ€“ The Lazarus Group targets Python developers with fake job interviews to install malware disguised as coding tests. This new tactic complements an ongoing campaign against the Python community. https://www.schneier.com/blog/archives/2024/09/python-developers-targeted-with-malware-during-fake-job-interviews.html


Some More, For the Curious

๐Ÿฉน Recently patched Windows flaw CVE-2024-43461 was actively exploited as a zero-day before July 2024 security news โ€“ CVE-2024-43461, a recently patched Windows flaw, was exploited as a zero-day, allowing attackers to execute arbitrary code via malicious files. Users are urged to apply the latest updates. https://securityaffairs.com/168467/hacking/windows-cve-2024-43461-actively-exploited-before-july-2024.html

๐Ÿ”‘ Secure Boot-neutering PKfail debacle is more prevalent than anyone knew security research โ€“ A supply chain failure involving non-production keys compromises Secure Boot protections across various devices, including ATMs and voting machines. The issue affects nearly 1,000 models and highlights significant security risks. https://arstechnica.com/?p=2050182

โš“ Rhysida ships off Port of Seattle data for $6M cybercrime โ€“ The Rhysida ransomware group claims to have stolen over 3 TB of data from the Port of Seattle, offering it for 100 Bitcoin. The Port confirmed the attack but refused to pay the ransom. https://www.theregister.com/2024/09/17/rhysida_port_of_seattle/

๐Ÿ’ธ AT&T agrees to $13 million fine for third-party cloud breach data breach โ€“ AT&T settles with the FCC for $13 million over a January 2023 breach affecting 8.9 million customers due to lapses by a third-party vendor, leading to enhanced data protection measures. https://cyberscoop.com/att-agrees-to-13-million-dollar-fcc-fine/

โ›“๏ธโ€๐Ÿ’ฅ US government 'took control' of a botnet run by Chinese government hackers, says FBI director security news โ€“ The FBI seized a botnet of 260,000 devices operated by the Chinese hacking group Flax Typhoon, targeting critical infrastructure in the U.S. and abroad. Malware was removed from compromised devices. https://techcrunch.com/2024/09/18/u-s-government-took-control-of-a-botnet-run-by-chinese-government-hackers-says-fbi-director/

๐Ÿง… Tor insists its safe after cops convict CSAM site admin privacy โ€“ The Tor Project defends its anonymity after reports of German police using timing analysis to identify users, asserting that vulnerabilities in outdated software, not flaws in Tor, were exploited. https://www.theregister.com/2024/09/19/tor_police_germany/

๐Ÿง˜ SIEM for Small and Medium-Sized Enterprises: What you need to know cyber defense โ€“ SMEs are frequent cybercrime targets, with 73% experiencing attacks in 2023. SIEM solutions can enhance their security posture affordably, providing threat detection, compliance, and automated incident response. https://securityaffairs.com/168584/security/siem-sbms-enterprises.html

๐Ÿ‘ป International law enforcement operation dismantled criminal communication platform Ghost cybercrime โ€“ A global law enforcement operation infiltrated the encrypted messaging app Ghost, leading to numerous arrests, including its alleged administrator, and disrupting serious organized crime activities. https://securityaffairs.com/168575/cyber-crime/police-dismantled-criminal-communication-platform-ghost.html

๐Ÿก This Windows PowerShell Phish Has Scary Potential โ€“ Krebs on Security security news โ€“ A new phishing email targeting GitHub users tricks victims into executing malware via PowerShell by posing as a security alert. The scam poses a significant risk to less tech-savvy Windows users. https://krebsonsecurity.com/2024/09/this-windows-powershell-phish-has-scary-potential/

๐Ÿ”„ UnitedHealth Group CISO: We had to โ€˜start overโ€™ after Change Healthcare attack security news โ€“ Following a ransomware attack on Change Healthcare, UnitedHealth Group's CISO revealed they had to completely overhaul their IT systems. The recovery involved long hours and focused communication with stakeholders. https://cyberscoop.com/unitedhealth-group-steven-martin-ciso-ransomware-attack-recovery/

๐Ÿ”˜ Germany shuts down 47 cryptocurrency exchange services used by cybercriminals cybercrime โ€“ German law enforcement has shut down 47 unregistered cryptocurrency exchange services used for money laundering by cybercriminals, seizing extensive user and transaction data to aid investigations. https://therecord.media/germany-cryptocurrency-exchanges-shut-down-money-laundering

๐Ÿงฎ Secret calculator hack brings ChatGPT to the TI-84, enabling easy cheating hacking write-up โ€“ A YouTuber modified a TI-84 calculator to access ChatGPT via the internet, allowing students to cheat by receiving answers during tests. The hack includes a custom circuit and software for various cheating tools. https://arstechnica.com/?p=2051342

๐Ÿ’ป Hacker behind Snowflake customer data breaches remains active cybercrime โ€“ The hacker known as 'Judische' remains active, targeting SaaS providers following the April Snowflake data breach affecting 165 customers. He has reportedly extorted up to $2.7 million. https://cyberscoop.com/snowflake-hacker-judische-labscon-2024/


CISA Corner

โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA identifies two actively exploited vulnerabilities in Microsoft Windows and Progress WhatsUp Gold, urging federal agencies to address these risks promptly to enhance security. https://www.cisa.gov/news-events/alerts/2024/09/16/cisa-adds-two-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Four Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA includes four Adobe Flash Player vulnerabilities in its catalog, highlighting their active exploitation and urging federal agencies to remediate them to mitigate risks. https://www.cisa.gov/news-events/alerts/2024/09/17/cisa-adds-four-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Five Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA adds five vulnerabilities, including issues in Apache, Microsoft, and Oracle products, to its catalog, warning of their exploitation and urging federal agencies to act swiftly. https://www.cisa.gov/news-events/alerts/2024/09/18/cisa-adds-five-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog vulnerability โ€“ CISA adds Ivanti's path traversal vulnerability to its catalog, highlighting its active exploitation and urging federal agencies to address this significant security risk promptly. https://www.cisa.gov/news-events/alerts/2024/09/19/cisa-adds-one-known-exploited-vulnerability-catalog

๐Ÿ› ๏ธ CISA Releases Three Industrial Control Systems Advisories warning โ€“ CISA issues advisories for Siemens, Millbeck, and Yokogawa ICS, highlighting vulnerabilities and urging users to review for technical details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2024/09/17/cisa-releases-three-industrial-control-systems-advisories ๐Ÿ› ๏ธ CISA Releases Six Industrial Control Systems Advisories warning โ€“ CISA issues six advisories on vulnerabilities in various ICS products, urging users to review the details and implement necessary mitigations to enhance security. https://www.cisa.gov/news-events/alerts/2024/09/19/cisa-releases-six-industrial-control-systems-advisories

๐Ÿ Apple Releases Security Updates for Multiple Products security news โ€“ Apple's latest security updates fix vulnerabilities that could allow cyber attackers to take control of devices. Users are urged to review and apply these updates promptly. https://www.cisa.gov/news-events/alerts/2024/09/18/apple-releases-security-updates-multiple-products โ˜๏ธ VMware Releases Security Advisory for VMware Cloud Foundation and vCenter Server security news โ€“ VMware's advisory highlights vulnerabilities in Cloud Foundation and vCenter Server that could allow attackers to gain control. Users are advised to review and apply updates immediately. https://www.cisa.gov/news-events/alerts/2024/09/19/vmware-releases-security-advisory-vmware-cloud-foundation-and-vcenter-server ๐Ÿ”’ Ivanti Releases Admin Bypass Security Update for Cloud Services Appliance security news โ€“ Ivanti addresses an admin bypass vulnerability in its Cloud Services Appliance, urging users to upgrade to the latest version due to confirmed limited exploitation risks. https://www.cisa.gov/news-events/alerts/2024/09/19/ivanti-releases-admin-bypass-security-update-cloud-services-appliance ๐Ÿ” Versa Networks Releases Advisory for a Vulnerability in Versa Director, CVE-2024-45229 security news โ€“ Versa Networks warns of a vulnerability in Versa Director that allows unauthorized access to REST APIs. Organizations are urged to update systems and monitor for malicious activity. https://www.cisa.gov/news-events/alerts/2024/09/20/versa-networks-releases-advisory-vulnerability-versa-director-cve-2024-45229


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know.


News For All

๐Ÿ•ธ๏ธ Googleโ€™s dark web monitoring service will soon be free for all users privacy โ€“ Google is making its dark web monitoring service available for all users, enhancing privacy protection by alerting individuals to potential leaks of their personal information. https://www.theverge.com/2024/7/9/24194970/google-one-free-dark-web-monitoring

๐Ÿงžโ€โ™€๏ธ What You Need to Know About Grok AI and Your Privacy privacy โ€“ Grok AI, integrated with X, raises privacy concerns by automatically using user data for training. Users can opt out, but awareness of data sharing settings is crucial for protecting privacy. https://www.wired.com/story/grok-ai-privacy-opt-out/

๐Ÿš— Thousands of Avis car rental customers had personal data stolen in cyberattack data breach โ€“ Avis has reported a cyberattack affecting nearly 300,000 customers, with stolen data including names, addresses, and driverโ€™s license numbers. The breach raises concerns about data security practices. https://techcrunch.com/2024/09/09/thousands-of-avis-car-rental-customers-had-personal-data-stolen-in-cyberattack/

๐Ÿ’ณ 1.7M potentially pwned by payment services provider breach data breach โ€“ Slim CD has notified around 1.7 million customers of a data breach affecting credit card information and personal details, detected nearly a year after the initial intrusion. https://www.theregister.com/2024/09/09/slim_cd_breach/

๐Ÿ“ข Ford seeks patent for tech that listens to driver conversations to serve ads privacy โ€“ Ford is pursuing a patent for technology that tailors in-car ads by listening to conversations and analyzing vehicle data, raising privacy concerns over data protection measures. https://therecord.media/ford-patent-application-in-vehicle-listening-advertising

1๏ธโƒฃ WhatsApp 'View Once' could be 'View Whenever' due to a flaw security news โ€“ A flaw in WhatsApp's 'View Once' feature allows recipients to bypass privacy controls, enabling media to be saved and shared despite intended restrictions. A fix is reportedly in progress. https://www.theregister.com/2024/09/09/whatsapp_view_once_flaw/

๐Ÿ’ธ Crypto scams rake in $5.6B a year for lowlifes, FBI says cybercrime โ€“ The FBI reports that crypto-related scams cost Americans over $5.6 billion in 2023, with a sharp rise in investment scams targeting older individuals. Victims often lose money to fraudulent schemes and recovery scams. https://www.theregister.com/2024/09/10/crypto_scams_rake_in_56/

๐Ÿšซ In Wake of Durov Arrest, Some Cybercriminals Ditch Telegram cybercrime โ€“ Following the arrest of Telegram's founder, many cybercriminals are abandoning the platform over fears that user data may be shared with authorities, impacting their operations. https://www.404media.co/in-wake-of-durov-arrest-some-cybercriminals-ditch-telegram/

๐Ÿ’” You paid the ransom, and now the decryptor doesn't work security news โ€“ Organizations paying ransoms for Hazard ransomware found that the provided decryptor failed to work, highlighting the risks of relying on criminals for data recovery post-breach. https://www.theregister.com/2024/09/11/ransomware_decryptor_not_working/

๐Ÿ’ต TD Bank fined $28 million for sharing inaccurate and negative data on customers privacy โ€“ TD Bank has been fined $28 million by the CFPB for sharing incorrect negative data about customers, harming their ability to obtain credit and employment. Nearly $8 million will go to affected consumers. https://therecord.media/td-bank-fined-28-million-cfpb-data-sharing

๐Ÿšจ Stalker Allegedly Created AI Chatbot on NSFW Platform to Dox and Harass Woman cybercrime โ€“ A Massachusetts man, James Florence Jr., was arrested for stalking and harassing a professor for seven years, using AI to create fake nudes and chatbots that shared her personal information online. https://www.404media.co/stalker-allegedly-created-ai-chatbot-on-nsfw-platform-to-dox-and-harass-woman/

๐Ÿฅ Healthcare giant settles patient data theft lawsuit for $65M data breach โ€“ Lehigh Valley Health Network will pay $65 million to settle a lawsuit after a ransomware attack by the ALPHV gang exposed sensitive data, including nude photographs of patients. https://www.theregister.com/2024/09/12/lvhn_lawsuit_ransom/

๐Ÿš” British teen arrested over cyberattack on London transportation agency security news โ€“ A 17-year-old was arrested for a cyberattack on Transport for London, which compromised customer data including names and bank details. The agency continues to address the ongoing security incident. https://cyberscoop.com/british-teen-arrested-over-cyberattack-on-london-transportation-agency/

๐Ÿ“บ Vo1d malware infected 1.3M Android malware โ€“ The Vo1d malware has infected 1.3 million Android TV boxes across 197 countries, acting as a backdoor to allow secret software installations, primarily targeting devices with outdated OS versions. https://securityaffairs.com/168342/malware/vo1d-android-malware-tv-boxes.html

๐Ÿšธ Tennessee school district loses $3.4 million to a fake curriculum vendor cybercrime โ€“ A Tennessee school district lost $3.36 million after an employee was tricked by a fraudulent email impersonating Pearson, leading to unauthorized wire transfers for online curriculum materials. https://therecord.media/tennessee-school-district-loses-3-million-bec-scam

๐Ÿ’ฐ 23andMe agrees to pay $30 million to settle lawsuit over massive data breach data breach โ€“ 23andMe will pay $30 million to settle a class-action lawsuit stemming from a 2023 data breach that exposed over 6.9 million customers, particularly targeting users with specific heritage. https://www.theverge.com/2024/9/13/24243986/23andme-settlement-dna-data-breach-lawsuit

๐Ÿ” Yubikey Key Vulnerability โ€“ How It Affects You vulnerability โ€“ Yubico's new vulnerability may allow key extraction but requires physical access and a PIN. Most users are safe, though high-security organizations should reconsider attestation trust. https://fy.blackhats.net.au/blog/2024-09-09-yubikey-key-vulnerability/


Some More, For the Curious

๐Ÿฆ Predator spyware operation is back with a new infrastructure cybercrime โ€“ Researchers report a resurgence of Predator spyware, utilizing new infrastructure to evade detection after U.S. sanctions against its developers. The spyware poses significant risks to high-profile targets. https://securityaffairs.com/168222/intelligence/predator-spyware-new-infrastructure.html

๐Ÿ“ก Gap Computers by Spelling Covert Radio Signals from Computer RAM security research โ€“ This research reveals how malware can leak sensitive data from air-gapped computers by emitting covert radio signals. https://arxiv.org/abs/2409.02292

๐Ÿ”ง Zero Day Initiative โ€” The September 2024 Security Update Review security news โ€“ September updates from Adobe and Microsoft address multiple critical vulnerabilities across various products, including code execution and security feature bypasses, highlighting urgent patching needs. https://www.thezdi.com/blog/2024/9/10/the-september-2024-security-update-review

๐Ÿ›ก๏ธ Taking steps that drive resiliency and security for Windows customers security news โ€“ At a recent summit, Microsoft and security vendors discussed enhancing Windows endpoint security and resilience, emphasizing collaboration and transparency to combat modern threats effectively. https://blogs.windows.com/windowsexperience/2024/09/12/taking-steps-that-drive-resiliency-and-security-for-windows-customers/

๐Ÿ“Š CISA Releases Analysis of FY23 Risk and Vulnerability Assessments security research โ€“ CISA's latest analysis reveals insights from 143 Risk and Vulnerability Assessments, illustrating attack paths and mapping threat actor behaviors to the MITRE ATT&CKยฎ framework. https://www.cisa.gov/news-events/alerts/2024/09/13/cisa-releases-analysis-fy23-risk-and-vulnerability-assessments

ยฉ๏ธ New Chrome Zero-Day vulnerability โ€“ Microsoft researchers report that North Korean hackers are exploiting a Chrome zero-day vulnerability to steal cryptocurrency, highlighting ongoing security risks. https://www.schneier.com/blog/archives/2024/09/new-chrome-zero-day.html

๐Ÿ“ Rogue WHOIS server gives researcher superpowers no one should ever have security research โ€“ Security researcher Benjamin Harris exploited a defunct WHOIS server, gaining the ability to issue counterfeit HTTPS certificates and track emails, raising concerns about misplaced trust in the WHOIS system. https://arstechnica.com/?p=2048683

๐Ÿ”‘ As quantum computing threats loom, Microsoft updates its core crypto library security news โ€“ Microsoft has updated its SymCrypt library with two new encryption algorithms designed to resist quantum computing attacks, marking the beginning of a major overhaul to enhance cryptographic security. https://arstechnica.com/?p=2049244

๐Ÿ”ฎ Mastercard buys Recorded Future for $2.65 billion security news โ€“ Mastercard has announced its acquisition of cybersecurity firm Recorded Future for $2.65 billion, aiming to enhance its cybersecurity services and threat intelligence capabilities. https://cyberscoop.com/mastercard-buys-recorded-future/

๐Ÿ‘บ Monitoring High Risk Azure Logins cyber defense โ€“ After a potential business email compromise, the SOC investigated high-risk logins via Azure AD Identity Protection, focusing on user behavior and multi-factor authentication to detect compromised accounts. https://www.blackhillsinfosec.com/monitoring-high-risk-azure-logins/

๐Ÿ—ฃ๏ธ Microsoft is building new Windows security features to prevent another CrowdStrike incident security news โ€“ Microsoft plans to enhance Windows security features following a CrowdStrike incident that affected millions of systems, aiming to move security vendors out of the Windows kernel for better reliability. https://www.theverge.com/2024/9/12/24242947/microsoft-windows-security-kernel-access-features-crowdstrike

๐Ÿงฑ Fortinet confirms customer data breach data breach โ€“ Fortinet has confirmed a data breach affecting less than 0.3% of its customers, with files accessed from a third-party cloud drive, potentially impacting around 1,500 corporate clients. https://techcrunch.com/2024/09/13/fortinet-confirms-customer-data-breach/

โš–๏ธ โ€˜Terrorgramโ€™ Charges Show US Has Had Tools to Crack Down on Far-Right Terrorism All Along security news โ€“ The indictment of two members of the Terrorgram Collective reveals a shift in U.S. law enforcement's approach to far-right terrorism, utilizing a rarely applied legal strategy to address violent extremism and inspire future attacks. https://www.wired.com/story/terrorgram-collective-indictments/

๐Ÿ‘‰ US accuses RT, others of covert arms dealing, global influence operations security news โ€“ The U.S. has sanctioned RT for operating a crowdfunding site that allegedly funneled weapons to Russian soldiers, revealing ties to Russian intelligence and efforts to influence global elections. https://cyberscoop.com/rt-arms-dealing-global-influence-operations/

โš“ Port of Seattle refuses to pay Rhysida ransom, warns of data leak cybercrime โ€“ The Port of Seattle declined to pay a ransom to the Rhysida ransomware group, which caused disruptions at the airport and seaport, warning of potential data leaks while restoring affected systems. https://therecord.media/seattle-port-rhysida-ransom-refused

๐Ÿ’ฃ A Creative Trick Makes ChatGPT Spit Out Bomb-Making Instructions security research โ€“ An artist tricked ChatGPT into providing bomb-making instructions by framing the request within a science-fiction narrative, exploiting the AI's storytelling context to bypass safety restrictions. https://www.wired.com/story/chatgpt-jailbreak-homemade-bomb-instructions/


CISA Corner

โš ๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA has added three vulnerabilities to its catalog, highlighting risks to federal networks due to active exploitation. Agencies must address these threats to enhance cybersecurity. https://www.cisa.gov/news-events/alerts/2024/09/09/cisa-adds-three-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds Four Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA has added four new Microsoft vulnerabilities to its catalog, highlighting serious risks due to active exploitation and urging federal agencies to address them promptly. https://www.cisa.gov/news-events/alerts/2024/09/10/cisa-adds-four-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog vulnerability โ€“ CISA has included a new Ivanti vulnerability in its catalog, emphasizing the significant risks it poses to federal networks due to active exploitation. https://www.cisa.gov/news-events/alerts/2024/09/13/cisa-adds-one-known-exploited-vulnerability-catalog

๐Ÿญ CISA Releases Four Industrial Control Systems Advisories warning โ€“ CISA has issued four advisories addressing vulnerabilities in Industrial Control Systems, urging users to review them for crucial security information and mitigation strategies. https://www.cisa.gov/news-events/alerts/2024/09/10/cisa-releases-four-industrial-control-systems-advisories

๐Ÿ†™ Citrix Releases Security Updates for Citrix Workspace App for Windows vulnerability โ€“ Citrix has issued security updates for its Workspace App for Windows to fix multiple vulnerabilities that could allow attackers to take control of affected systems. https://www.cisa.gov/news-events/alerts/2024/09/10/citrix-releases-security-updates-citrix-workspace-app-windows ๐Ÿ†™ Ivanti Releases Security Updates for Endpoint Manager, Cloud Service Application, and Workspace Control vulnerability โ€“ Ivanti has released updates to fix multiple vulnerabilities in its Endpoint Manager and Cloud Service Application, which could potentially allow attackers to take control of affected systems. https://www.cisa.gov/news-events/alerts/2024/09/10/ivanti-releases-security-updates-endpoint-manager-cloud-service-application-and-workspace-control


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

Back after vacation โ€“ My weekly shortlist of cyber security highlights. (maybe I'll even redo the skipped weeks ๐Ÿ˜) The short summaries are AI generated! If something is wrong, please let me know.


News For All

๐Ÿ•ต๏ธโ€โ™‚๏ธ Ausweiskopie und persรถnliche Daten an Kriminelle weitergegeben? Das kรถnnen Sie tun security news โ€“ Criminals exploit job offers and ads to steal personal data and ID copies, leading to identity theft, fraudulent accounts, and potential legal consequences for victims. https://www.watchlist-internet.at/news/umgang-mit-datendiebstahl/

โœˆ๏ธ SQL Injection Attack on Airport Security vulnerability โ€“ A serious SQL injection vulnerability allows unauthorized users to bypass airport security checks, risking safety by granting access to restricted areas like cockpits. https://www.schneier.com/blog/archives/2024/09/sql-injection-attack-on-airport-security.html

๐Ÿ›ซ German air traffic control agency confirms cyberattack, says operations unaffected security news โ€“ Germany's air traffic control agency confirmed a cyberattack affecting administrative systems but assured that flight safety remains intact and operations were not disrupted. https://therecord.media/german-air-traffic-control-company-deutsche-flugsicherung-cyberattack

๐Ÿš Transport for London (TfL) is dealing with an ongoing cyberattack security news โ€“ TfL is investigating a cyberattack affecting internal systems but reports no evidence of customer data compromise, assuring that services remain unaffected. https://securityaffairs.com/167946/hacking/transport-for-london-tfl-ongoing-cyberattack.html

๐Ÿ”‘ Owners of 1-Time Passcode Theft Service Plead Guilty cybercrime โ€“ Three men pleaded guilty for operating OTP Agency, a service that intercepted one-time passcodes for account takeovers, affecting over 12,500 victims before its shutdown. https://krebsonsecurity.com/2024/09/owners-of-1-time-passcode-theft-service-plead-guilty/

๐Ÿฆ  Disinfo group Spamouflage more aggressively targeting U.S. elections, candidates cybercrime โ€“ The disinformation group Spamouflage has intensified efforts to impersonate U.S. voters, undermining political candidates and institutions, though its impact on engagement remains limited. https://cyberscoop.com/spamouflage-targeting-us-election-candidates/

๐Ÿ“ธ Sextortion Scams Now Include Photos of Your Home โ€“ Krebs on Security cybercrime โ€“ Sextortion scams are evolving, now featuring personalized threats with photos of victims' homes, increasing fear and urgency to pay ransoms, often near $2,000 in Bitcoin. https://krebsonsecurity.com/2024/09/sextortion-scams-now-include-photos-of-your-home/

๐Ÿ’ฐ Data watchdog fines Clearview AI $33M privacy โ€“ The Dutch Data Protection Authority fined Clearview AI โ‚ฌ30.5 million for illegally collecting images without consent, stating the company's practices violate GDPR and threaten individual privacy. https://www.theregister.com/2024/09/03/clearview_ai_dutch_fine/

๐Ÿ”’ Google releases Pixel update to get rid of surveillance vulnerability vulnerability โ€“ Google's latest Pixel update removes the insecure Showcase.apk, originally intended for Verizon demos, which posed risks of man-in-the-middle attacks and spyware, ensuring enhanced device security. https://www.theverge.com/2024/9/3/24235127/google-pixel-showcase-vulnerability-patch

๐Ÿ”‘ YubiKeys have an unfixable security flaw โ€” but itโ€™s difficult to exploit vulnerability โ€“ A vulnerability in older YubiKey devices allows cloning but is hard to exploit, requiring physical access and additional knowledge. Devices prior to firmware version 5.7 remain permanently affected. https://www.theverge.com/2024/9/4/24235635/yubikey-unfixable-security-vulnerability-side-channel-explot

๐Ÿšจ 846 routers are affected by code execution flaws. Replace them! vulnerability โ€“ D-Link's discontinued DIR-846 routers are vulnerable to multiple critical remote code execution flaws (CVSS scores up to 9.8). Users are advised to replace these devices as they are no longer supported. https://securityaffairs.com/168041/security/d-link-dir-846-routers-code-execution-flaws.html

โ˜ข๏ธ Zyxel warns of vulnerabilities in a wide range of its products vulnerability โ€“ Zyxel has disclosed nearly a dozen vulnerabilities across its products, with the most critical (CVE-2024-7261) allowing unauthenticated OS command execution, rated 9.8. Users are urged to patch immediately. https://arstechnica.com/?p=2047312

๐Ÿ—ณ๏ธ Biden cracks down on Putin's election meddling cybercrime โ€“ The Biden administration seized 32 websites linked to Russian propaganda efforts and charged two RT employees in a $10 million scheme to influence the upcoming U.S. presidential election. https://www.theregister.com/2024/09/05/biden_cracks_down_on_putins/

๐ŸŽฃ Warning Against Phishing Emails Impersonating Netflix warning โ€“ AhnLab warns of phishing emails posing as Netflix, claiming payment failures and urging users to update payment methods via malicious links. Users are advised to verify URLs before clicking. https://asec.ahnlab.com/en/82969/

โšก Quishing, an insidious threat to electric car owners security news โ€“ Quishing is a phishing attack using counterfeit QR codes at electric car charging stations to steal sensitive information. Users are urged to use recharge cards and verify URLs to protect against scams. https://securityaffairs.com/168059/hacking/quishing-electric-car-owners.html

โ™€๏ธ New report shows ongoing gender pay gap in cybersecurity security news โ€“ The ISC2 Cybersecurity Workforce Study reveals a persistent gender pay gap in cybersecurity, with men earning more than women, and highlights the underrepresentation of women in the field, emphasizing the need for targeted DEI hiring initiatives. https://securityintelligence.com/articles/new-report-shows-gender-pay-gap-in-cybersecurity/

๐Ÿฆ  Predator spyware resurfaces with signs of activity, Recorded Future says security news โ€“ Recorded Future reports renewed activity from Predator spyware, linked to Intellexa, with new infrastructure identified and potential customers in Angola, Saudi Arabia, and the Democratic Republic of the Congo. https://cyberscoop.com/predator-spyware-resurfaces-with-signs-of-activity-recorded-future-says/

๐Ÿ”Ž Colombian president suggests prior administration illegally sent $11 million in cash to Israel for spyware security news โ€“ Colombian President Gustavo Petro announced an investigation into $11 million allegedly used by the previous administration to purchase Pegasus spyware, questioning the legality of the transactions. https://therecord.media/colombian-president-pegasus-spyware-israel-missing-money

๐Ÿ“Ž Telegram changes its tone on moderating private chats after CEOโ€™s arrest security news โ€“ Following CEO Pavel Durov's arrest, Telegram revised its FAQ to allow reporting of illegal content in private chats, shifting from a previous stance of non-cooperation with moderation requests. https://www.theverge.com/2024/9/5/24237254/telegram-pavel-durov-arrest-private-chats-moderation-policy-change

๐Ÿ›‹๏ธ Therapy Sessions Exposed by Mental Health Care Firmโ€™s Unsecured Database data breach โ€“ Confidant Health inadvertently exposed sensitive patient data, including therapy session recordings, due to an unsecured database. The incident highlights the urgent need for improved data security in healthcare organizations. https://www.wired.com/story/confidant-health-therapy-records-database-exposure/

๐Ÿ”“ Hackers Threaten to Leak Planned Parenthood Data cybercrime โ€“ RansomHub ransomware group claims to have hacked Planned Parenthood's Montana branch, threatening to leak 93 GB of sensitive data after a cybersecurity incident was reported on August 28. https://www.wired.com/story/hackers-threaten-to-leak-planned-parenthood-data/


Some More, For the Curious

๐Ÿ” Most interesting IR cases in 2023: insider threats and more security research โ€“ Kaspersky's Global Emergency Response Team highlights 2023's notable incident response cases, including insider fraud and advanced persistent threats, emphasizing the need for enhanced monitoring and threat intelligence. https://securelist.com/incident-response-interesting-cases-2023/113611/

๐Ÿ”’ Vulnerabilities in Microsoft apps for macOS allow stealing permissions vulnerability โ€“ Eight vulnerabilities in Microsoft apps for macOS could enable attackers to steal permissions, allowing unauthorized access to sensitive resources like cameras and microphones without user knowledge. https://securityaffairs.com/167973/hacking/microsoft-apps-for-macos-flaws.html

๐Ÿ›‘ VMWare releases Fusion vulnerability with 8.8 rating vulnerability โ€“ A critical vulnerability in VMWare Fusion (CVE-2024-38811) allows code execution with standard user privileges, rated 8.8 on the CVSS scale, prompting a software patch. https://cyberscoop.com/vmware-vulnerability-fushion-cve-2024-38811/

๐Ÿ’ป Rust in Linux lead retires rather than deal with more โ€œnontechnical nonsenseโ€ security news โ€“ Wedson Almeida Filho, leader of the Rust for Linux project, retires citing frustration with nontechnical disputes, expressing concern that the Linux kernel must embrace memory-safe languages like Rust to remain relevant. https://arstechnica.com/?p=2046763

๐Ÿงฌ Evolution of Mallox: from private ransomware to RaaS security research โ€“ Mallox ransomware has evolved from targeted attacks to a Ransomware-as-a-Service model, with over 700 samples identified. Its affiliate program seeks experienced partners for cybercrime, indicating a shift in operational strategy. https://securelist.com/mallox-ransomware/113529/

๐Ÿ Revival Hijack โ€“ PyPI hijack technique exploited in the wild, puts 22K packages at risk security research โ€“ The 'Revival Hijack' technique allows attackers to reclaim deleted PyPI packages, risking 22,000 packages and potentially leading to malicious downloads. JFrog has taken action to protect the community. https://jfrog.com/blog/revival-hijack-pypi-hijack-technique-exploited-22k-packages-at-risk/

๐Ÿ“ƒ Validate your Windows Audit Policy Configuration with KQL cyber defense โ€“ Ensuring proper configuration of Windows audit policies is essential for security. This article discusses using Kusto Query Language (KQL) to validate and troubleshoot audit policy application across environments. https://blog.nviso.eu/2024/09/05/validate-your-windows-audit-policy-configuration-with-kql/

๐Ÿฆ— Cicada Ransomware โ€“ What You Need To Know security news โ€“ Cicada ransomware, discovered in June 2024, has targeted over 20 organizations primarily in North America and the UK. Written in Rust, it threatens to publish stolen data unless a ransom is paid. https://www.tripwire.com/state-of-security/cicada-ransomware-what-you-need-know

๐Ÿช… Veeam fixed a critical flaw in Veeam Backup & Replication software vulnerability โ€“ Veeam patched 18 high and critical vulnerabilities in its Backup & Replication software, including a critical RCE flaw (CVE-2024-40711) with a CVSS score of 9.8, requiring immediate attention. https://securityaffairs.com/168088/security/veeam-backup-replication-cve-2024-40711.html

๐Ÿงฑ SonicWall warns that SonicOS bug exploited in attacks vulnerability โ€“ SonicWall alerts users of a critical access control vulnerability (CVE-2024-40766) in SonicOS that may be actively exploited, urging immediate patching to prevent unauthorized access and potential firewall crashes. https://securityaffairs.com/168112/hacking/sonicwall-sonicos-bug-exploited.html

๐Ÿ”ง Building a Hardware Hacking Arsenal: The Right Bits for Every Byte security research โ€“ This article outlines essential tools for hardware hacking, emphasizing cost-effective options that support learning and experimentation in security assessments. Safety and accessibility are also highlighted. https://www.guidepointsecurity.com/blog/building-a-hardware-hacking-arsenal-the-right-bits-for-every-byte/


CISA Corner

โš ๏ธ LOYTEC Electronics LINX Series vulnerability โ€“ Multiple vulnerabilities in LOYTEC's LINX series devices could allow attackers to exploit sensitive information and gain unauthorized access, with high CVSS scores indicating significant risks. https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01

โš ๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA has added three vulnerabilities, including two in Draytek VigorConnect and one in Kingsoft WPS Office, to its catalog due to active exploitation risks for federal networks. https://www.cisa.gov/news-events/alerts/2024/09/03/cisa-adds-three-known-exploited-vulnerabilities-catalog

โš™๏ธ CISA Releases Four Industrial Control Systems Advisories vulnerability โ€“ On September 5, 2024, CISA released four advisories addressing security vulnerabilities in various Industrial Control Systems, urging users to review for technical details and mitigation strategies. https://www.cisa.gov/news-events/alerts/2024/09/05/cisa-releases-four-industrial-control-systems-advisories

โš”๏ธ Russian Military Cyber Actors Target US and Global Critical Infrastructure security news โ€“ The FBI, CISA, and NSA report that Russian GRU Unit 29155 is behind ongoing cyber operations targeting critical infrastructure, utilizing tools like WhisperGate malware and exploiting various vulnerabilities since at least 2020. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿšซ Videos: Van der Bellen & Assinger werben nicht fรผr Investmentplattformen security news โ€“ The article discusses that videos featuring Van der Bellen and Assinger do not promote investment platforms, clarifying any misconceptions surrounding their appearances. https://www.watchlist-internet.at/news/fake-videos-van-der-bellen-assinger-werben-nicht-fuer-investmentplattformen/

๐Ÿ’ธ Should Organizations Pay Ransom Demands? cybercrime โ€“ Organizations are urged to avoid paying ransomware demands as it funds cybercriminals and doesn't guarantee data recovery. Proactive cybersecurity measures are emphasized as a better defense. https://securityaffairs.com/166650/uncategorized/ransomware-organizations-should-avoid-paying-ransoms.html

๐Ÿ“ง Users: Microsoft must update Outlook's friendly name feature security news โ€“ Users are urging Microsoft to change how Outlook displays sender names to combat phishing, as friendly names can mislead users into clicking malicious links. Calls for disabling aliases have grown. https://www.theregister.com/2024/08/06/users_call_for_microsoft_to/

๐Ÿ›‘ Consumer Reports study finds data removal services are often ineffective privacy โ€“ A Consumer Reports study found that data removal services are largely ineffective, with only 35% of personal data removed from people-search sites within four months, raising concerns about their reliability. https://therecord.media/data-removal-services-mostly-worthless-study

๐Ÿ’ป Report: Myths about tech still plaguing the IT world security news โ€“ A Kaspersky survey reveals widespread misconceptions about digital security among tech-savvy Brits, including beliefs about webcam safety, incognito mode, and the effectiveness of encryption, highlighting a need for better cybersecurity education. https://www.theregister.com/2024/08/08/report_tech_misconceptions_plague_the/

๐Ÿช– Russia's Kursk region suffers 'massive' DDoS attack amid Ukraine offensive cyber defense โ€“ Kursk, Russia, experienced a significant DDoS attack targeting government and business websites, coinciding with Ukraine's military advances, though critical infrastructure remained protected from damage. https://therecord.media/kursk-military-offensive-ddos-russia-ukraine

๐Ÿ„ Crooks took control of a cow milking robot causing the death of a cow cybercrime โ€“ Cybercriminals hacked a farmer's milking robot, demanding a $10,000 ransom. The farmer refused to pay, leading to the death of a cow due to lost data on insemination dates. https://securityaffairs.com/166839/cyber-crime/cow-milking-robot-hacked.html

๐Ÿ”Š Sonos smart speakers flaw allowed to eavesdrop on users vulnerability โ€“ NCC Group discovered vulnerabilities in Sonos smart speakers, including CVE-2023-50809, allowing remote code execution and potential eavesdropping. Sonos released a patch to address the issues. https://securityaffairs.com/166823/hacking/sonos-smart-speakers-flaw.html

๐Ÿ”‘ How Hackers Extracted the โ€˜Keys to the Kingdomโ€™ to Clone HID Keycards security research โ€“ Researchers reveal a method to extract HID encoder keys, allowing easy cloning of keycards. https://www.wired.com/story/hid-keycard-authentication-key-vulnerability/

๐Ÿ›ก๏ธ Security Tips for Modern Web Administrators security news โ€“ Website security is vital for user trust. Employ multi-layered defenses, keep software updated, and follow best practices to safeguard against attacks and protect sensitive data. https://blog.sucuri.net/2024/08/security-tips-for-modern-web-administrators.html

๐Ÿ†™ Mac and Windows users infected by software updates delivered over hacked ISP malware โ€“ Hackers compromised an ISP to deliver malware to users via tampered software updates. This attack exploited unencrypted connections, enabling malicious file downloads for Windows and macOS users. https://arstechnica.com/security/2024/08/hacked-isp-infects-users-receiving-unsecure-software-updates/

๐Ÿ‘๏ธ Illinois relaxes biometric privacy law, reduces penalties privacy โ€“ Illinois has amended its Biometric Information Privacy Act, reducing penalties for breaches by counting multiple data distributions as one violation, which critics say lowers potential damages. https://www.theregister.com/2024/08/06/illinois_bipa_amendment_reduces_penalties/

๐Ÿ”’ Google says Android zero-day was exploited in the wild vulnerability โ€“ Google has patched a high-severity Android vulnerability (CVE-2024-36971) allowing remote code execution, amid reports of targeted exploitation. This reflects a rising trend in zero-day attacks. https://therecord.media/android-zero-day-google-fix-august-patch

๐Ÿ’ป Students scramble after security breach wipes 13,000 devices data breach โ€“ A security breach at Mobile Guardian led to the remote wiping of data from 13,000 school-issued devices in Singapore, prompting the Ministry of Education to halt its services and remove the app. https://arstechnica.com/security/2024/08/students-scramble-after-security-breach-wipes-13000-devices/

๐Ÿ SharpRhino malware targets IT admins, Hunters Intl suspected malware โ€“ The SharpRhino malware, disguised as Angry IP Scanner, targets network admins and is linked to the Hunters International gang, known for ransomware-as-a-service tactics and double extortion. https://www.theregister.com/2024/08/07/sharprhino_malware_admins/

โŽ Problems with Georgiaโ€™s Voter Registration Portal security news โ€“ Georgia's voter registration portal has security flaws allowing unauthorized cancellation of registrations and exposing sensitive voter data, highlighting challenges in balancing usability and security. https://www.schneier.com/blog/archives/2024/08/problems-with-georgias-voter-registration-portal.html

๐Ÿ’ฐ US offers $10 million for info on Iranian leaders behind CyberAv3ngers water utility attacks cybercrime โ€“ The U.S. State Department has offered a $10 million reward for information on six Iranian hackers linked to cyberattacks on U.S. water utilities, attributed to the CyberAv3ngers group. https://therecord.media/us-offers-reward-for-info-on-iranian-hackers-water-utilities

๐Ÿง“ Researchers find decades-old vulnerability in major web browsers vulnerability โ€“ A zero-day vulnerability discovered by Oligo Security affects major browsers, allowing attackers to exploit network requests to 0.0.0.0, potentially breaching local networks and accessing private data. https://cyberscoop.com/browser-zero-day-oligo-security-0-0-0-0-day/

๐Ÿง‘โ€๐ŸŒพ Nashville man arrested for running โ€œlaptop farmโ€ to get jobs for North Koreans cybercrime โ€“ Matthew Isaac Knoot was arrested for hosting laptops to deceive US companies into hiring North Korean nationals, funneling their earnings to fund North Koreaโ€™s weapons program. https://arstechnica.com/security/2024/08/nashville-man-arrested-for-running-laptop-farm-to-get-jobs-for-north-koreans/


Some More, For the Curious

โšก Hacking a Virtual Power Plant hacking write-up โ€“ A security researcher exploited a vulnerability in a virtual power plant's API using weak 512-bit RSA keys, revealing how easily sensitive data could be accessed. https://rya.nc/vpp-hack.html

๐Ÿ“Š State of Exploitation โ€“ A Peek into 1H-2024 Vulnerability Exploitation security research โ€“ In the first half of 2024, 390 new vulnerabilities were added to the Known Exploited Vulnerabilities Catalog, highlighting ongoing threats and trends in exploitation and weaponization. https://vulncheck.com/blog/state-of-exploitation-1h-2024

๐Ÿ’ผ Florida firm sued over theft of 2.9B personal records data breach โ€“ A lawsuit claims Jerico Pictures negligently failed to secure 2.9 billion records, leading to a data breach where personal information was sold on the dark web, risking identity theft. https://www.theregister.com/2024/08/05/national_public_data_lawsuit/

๐Ÿ’ฐ Drama โ€˜Dark Angelsโ€™ Reap Record Ransoms cybercrime โ€“ The Dark Angels ransomware group made headlines after receiving a record $75 million ransom from a Fortune 50 company, focusing on massive data theft while avoiding disruption and publicity. https://krebsonsecurity.com/2024/08/low-drama-dark-angels-reap-record-ransoms/

๐Ÿ—ฝ Intelligence bill would elevate ransomware to a terrorist threat security news โ€“ A Senate proposal aims to treat ransomware attacks as terrorism, enhancing legal authority to combat cybercriminals and sanction states harboring them, despite concerns over effectiveness. https://cyberscoop.com/ransomware-terrorism-ndaa-2025/

๐ŸŒฎ Turning the screws: The pressure tactics of ransomware gangs cybercrime โ€“ Ransomware gangs are escalating pressure tactics, using media, legislation, and personal threats to coerce victims into paying ransoms, including targeting secondary victims for leverage. https://news.sophos.com/en-us/2024/08/06/turning-the-screws-the-pressure-tactics-of-ransomware-gangs/

โž– Best security practices for ESXi environments cyber defense โ€“ Organizations using VMware ESXi should implement ten security practices to mitigate risks, as native EDR is unavailable, including ensuring patching, enforcing strong passwords, and enabling lockdown modes. https://news.sophos.com/en-us/2024/08/07/best-security-practices-for-esxi-environments/

๐Ÿง  Mental Health โ€“ An Infosec Challenge security news โ€“ Cybersecurity professionals face unique mental health challenges like burnout and anxiety due to constant stress. The article offers tips for prevention, emphasizing self-care, communication, and community support. https://www.blackhillsinfosec.com/mental-health-an-infosec-challenge/

๐Ÿค‘ Hackers return $12 million taken during Ronin network breach cybercrime โ€“ Hackers returned $12 million stolen from the Ronin gaming blockchain, claiming to act as white-hats after exploiting a vulnerability. The company plans to enhance security and awarded the hackers a $500,000 bounty. https://therecord.media/hackers-return-12-million-taken-from-ronin-network

๐ŸŽฉ The top stories coming out of the Black Hat cybersecurity conference security news โ€“ At the Black Hat conference, AI's role in cybersecurity takes center stage, alongside vulnerabilities in car infotainment systems and the impact of upcoming elections on cybersecurity policy. https://blog.talosintelligence.com/threat-source-newsletter-aug-8-2024/


CISA Corner

โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog vulnerability โ€“ CISA has included CVE-2018-0824, a Microsoft vulnerability, in its catalog due to active exploitation, emphasizing the need for federal agencies to address such risks promptly. https://www.cisa.gov/news-events/alerts/2024/08/05/cisa-adds-one-known-exploited-vulnerability-catalog ๐Ÿšจ CISA Adds Two Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA has included CVE-2024-36971 and CVE-2024-32113 in its catalog due to active exploitation, highlighting risks to federal networks and the need for timely remediation. https://www.cisa.gov/news-events/alerts/2024/08/07/cisa-adds-two-known-exploited-vulnerabilities-catalog

๐Ÿ› ๏ธ Delta Electronics DIAScreen vulnerability โ€“ A stack-based buffer overflow vulnerability in Delta Electronics DIAScreen could allow arbitrary code execution. Users are urged to update to version 1.4.2 to mitigate risks. https://www.cisa.gov/news-events/ics-advisories/icsa-24-219-01 ๐Ÿ” Dorsett Controls InfoScan vulnerability โ€“ Dorsett Controls InfoScan has vulnerabilities allowing unauthorized access to sensitive information and path traversal. Users should update to version 1.38 or later to mitigate risks. https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01

๐Ÿ›’ Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem cyber defense โ€“ This guide empowers software customers to demand security in product design, offering questions to assess manufacturers' cybersecurity practices and ensuring resilience against cyber threats. https://www.cisa.gov/resources-tools/resources/secure-demand-guide

๐Ÿ” Best Practices for Cisco Device Configuration security news โ€“ CISA advises disabling the Cisco Smart Install feature and using type 8 password protection to secure configurations, reducing the risk of password cracking and unauthorized access. https://www.cisa.gov/news-events/alerts/2024/08/08/best-practices-cisco-device-configuration


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

โŒ Hereโ€™s How To Stop X From Using Your Data To Train Its AI privacy โ€“ X.ai, affiliated with Elon Musk's X network, utilizes Twitter data for AI training; users can opt out in settings. https://www.forbes.com/sites/johnkoetsier/2024/07/26/x-just-gave-itself-permission-to-use-all-your-data-to-train-grok/

ยฎ๏ธ Massenรผberwachung als Dienstleistung: Der Handel mit Standortdaten privacy โ€“ Data brokers sell billions of location data, threatening privacy and national security, leading to concerns about espionage. Commercial surveillance infrastructure poses systemic problems. https://www.kuketz-blog.de/massenueberwachung-als-dienstleistung-der-handel-mit-standortdaten/

๐Ÿซฅ New Mandrake Android spyware version discovered on Google Play malware โ€“ Mandrake spyware resurfaces on Google Play with new evasion techniques, targeting users globally. Sophisticated malware embedded in file sharing app, using complex infection chain and anti-analysis methods. https://securelist.com/mandrake-apps-return-to-google-play/113147/

๐Ÿ–– IBM, Nike, Disney, others caught in Proofpoint phish palaver security news โ€“ Phishing campaign exploited Proofpoint security gap, sending 3 million daily spoofed emails; blamed on insecure Proofpoint Microsoft 365 integration. https://www.theregister.com/2024/07/30/scammers_spoofed_emails/

๐ŸŽฃ A crafty phishing campaign targets Microsoft OneDrive users security news โ€“ A phishing campaign targets Microsoft OneDrive users with a PowerShell script through a deceptive email instructing users to fix a fake โ€œError 0x8004de86.โ€ The attack tricks victims into running malicious commands for system compromise. https://securityaffairs.com/166312/hacking/microsoft-onedrive-phishing.html

๐Ÿฆˆ 'LockBit of phishing' EvilProxy used in 1M+ attacks monthly security news โ€“ EvilProxy, a phishing-as-a-service kit, leverages Cloudflare services to disguise traffic in phishing attacks targeting C-Suite executives. Attacks use redirection through legitimate sites, culminating in phishing Microsoft login pages. https://www.theregister.com/2024/07/30/evilproxy_phishing_kit_analysis/

๐Ÿค‘ Meta to pay Texas $1.4 billion to settle lawsuit alleging it illegally captured usersโ€™ faces privacy โ€“ Meta agrees to pay Texas $1.4 billion to settle a lawsuit over unauthorized use of facial recognition software on users, violating Texas law and consumer protection regulations. https://therecord.media/meta-texas-facial-recognition-settlement

๐Ÿฆ† Donโ€™t Let Your Domain Name Become a โ€œSitting Duckโ€ security news โ€“ Over a million vulnerable domains are at risk of takeover due to authentication weaknesses at hosting providers and registrars, allowing possible cybercriminal exploitation. https://krebsonsecurity.com/2024/07/dont-let-your-domain-name-become-a-sitting-duck/

๐Ÿ’ธ Scammer Allegedly Makes $600,000 a Month Holding Instagram Accounts Hostage cybercrime โ€“ Idriss Qibaa, aka 'Dani' and 'Unlocked,' allegedly extorted victims through locking their Instagram accounts, threatening them, demanding money to regain access, and using personal information for extortion. https://www.404media.co/unlocked4life-instagram-scam-no-jumper/

๐Ÿง‘โ€๐Ÿ’ผ Germany summons Chinese ambassador over cyberattack on cartography agency security news โ€“ German authorities link a Beijing-backed threat actor to a 2021 cyberattack on the Federal Agency for Cartography and Geodesy, summoning the Chinese ambassador. https://therecord.media/germany-summons-chinese-ambassador-over-hack

๐ŸŒ Nearly 7% of Internet Traffic Is Malicious security news โ€“ Cloudflare reports 6.8% of Internet traffic is malicious, with CVEs exploited as quickly as 22 minutes after proof-of-concepts are published. https://www.schneier.com/blog/archives/2024/07/nearly-7-of-internet-traffic-is-malicious.html

๐Ÿช Microsoft seizes domain used by Vietnamese group to sell fake accounts, services cybercrime โ€“ Microsoft seizes domain used by Vietnamese group selling fake accounts and services after previous seizures for creating fraudulent Microsoft accounts and CAPTCHA bypass services. https://cyberscoop.com/microsoft-seizes-domain-used-by-vietnamese-group-to-sell-fake-accounts-services/

๐Ÿ’ Begging for Bounties and More Info Stealer Logs cybercrime โ€“ Fraudsters try to extort bug bounties using stolen credentials from info stealer logs, which originated from victims' malware-infected devices, creating a malicious chain propagated on platforms like Telegram. https://www.troyhunt.com/begging-for-bounties-and-more-info-stealer-logs/ Personal comment: HIBP added a lot of new breaches this week โ€“ go check your accounts at https://haveibeenpwned.com/

๐Ÿ’ธ $75 Million Record-Breaking Ransom Paid To Cybercriminals, Say Researchers cybercrime โ€“ A record-breaking $75 million ransom was paid to Dark Angels ransomware group by an undisclosed Fortune 50 company. https://www.tripwire.com/state-of-security/75-million-record-breaking-ransom-paid-cybercriminals-say-researchers

๐Ÿ’Š Pharma Giant Cencora confirmed the theft of personal and health information data breach โ€“ Pharmaceutical giant Cencora confirms theft of personal and health information in a data breach, affecting individuals' data, including personally identifiable information and protected health information. https://securityaffairs.com/166422/data-breach/cencora-confirmed-theft-pii-heath-data.html

๐Ÿ“ฑ Keeping your Android device safe from text message fraud privacy โ€“ SMS Blaster fraud, threats from SMS phishing via cell-site simulators, and Android security features against fraud. https://security.googleblog.com/2024/08/keeping-your-android-device-safe-from.html

๐Ÿš— Ford wants patent for tech allowing cars to surveil and report speeding drivers privacy โ€“ Ford seeks patent for cars to surveil speeding drivers, sparking privacy concerns from advocates and experts. https://therecord.media/ford-seeks-patent-cars-surveil-speeders-report-to-police

๐Ÿˆ NFL to roll out facial authentication software league-wide privacy โ€“ The NFL will implement facial authentication software at all 32 stadiums this season to enhance event security. The technology aims to streamline authentication processes for media, officials, and staff. Privacy concerns, noting potential inaccuracies and discriminatory impacts of facial recognition technology. https://therecord.media/nfl-to-roll-out-facial-authentication-league-wide

๐Ÿ“‡ Hackers attempt to sell the personal data of 3 billion people resulting from an April data breach data breach โ€“ National Public Data, reportedly exposed the personal data of close to 3 billion people, disclosed by a threat actor named USDoD, who tried to sell the database for $3.5 million on the dark web. https://securityaffairs.com/166539/data-breach/personal-data-3-billion-people-data-breach.html


Some More, For the Curious

๐ŸŒ€ StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms security research โ€“ StormBamboo leverages ISP compromise to manipulate DNS updates, installing malware through insecure software updates on macOS and Windows. https://www.volexity.com/blog/2024/08/02/stormbamboo-compromises-isp-to-abuse-insecure-software-update-mechanisms/

๐Ÿš€๐Ÿ–จ๏ธ Reverse engineering the 59-pound printer onboard the Space Shuttle geeky news โ€“ The Space Shuttle's Interim Teleprinter, a stop-gap measure, remained in use for over 50 flights, printing thousands of lines; cost $1.5 million per flight. https://www.righto.com/2024/08/space-shuttle-interim-teleprinter.html

๐Ÿ˜ž Too big to care? โ€“ Our disappointment with Cloudflareโ€™s anti-abuse posture cyber defense โ€“ Spamhaus criticizes Cloudflare for facilitating cybercriminal activity by providing services to abusive actors, despite having tools to prevent abuse. Calls for Cloudflare to suspend services to abusers. https://www.spamhaus.org/resource-hub/service-providers/too-big-to-care-our-disappointment-with-cloudflares-anti-abuse-posture/

๐Ÿค– Websites are Blocking the Wrong AI Scrapers (Because AI Companies Keep Making New Ones) security news โ€“ Website owners struggling to block AI scrapers due to constantly changing crawler names and outdated robots.txt files. https://www.404media.co/websites-are-blocking-the-wrong-ai-scrapers-because-ai-companies-keep-making-new-ones/

โš™๏ธ Zero Day Initiative โ€” Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 1 security research โ€“ โ€œLink followingโ€ vulnerabilities on Windows involve applications improperly resolving filenames, allowing malicious users to redirect to unintended resources. Techniques to exploit these vulnerabilities using file operations are discussed with defensive strategies from developers. https://www.thezdi.com/blog/2024/7/29/breaking-barriers-and-assumptions-techniques-for-privilege-escalation-on-windows-part-1

โœˆ๏ธ Delta Air Lines may sue CrowdStrike, Microsoft over outage security news โ€“ Delta Air Lines considers legal action against CrowdStrike and Microsoft following operational losses of up to $500 million due to a recent outage that led millions of Windows machines offline. https://www.theregister.com/2024/07/30/crowdstrike_delta_microsoft_lawsuit/

๐ŸŒ‹ 'Error' in Microsoft's DDoS defenses amplified Azure outage security news โ€“ Microsoft's DDoS defenses amplified an Azure outage caused by a DDoS attack, triggering global service disruptions, despite the company's unique defense and threat intelligence capabilities. https://www.theregister.com/2024/07/31/microsoft_ddos_azure/

๐ŸŒฝ Driving lessons: The kernel drivers in Sophos Intercept X Advanced security research โ€“ Sophos Intercept X Advanced uses five kernel drivers for cybersecurity, explaining their functionality, security measures, customer options, gradual rollouts for software updates, and vulnerabilities working in kernel-space. https://news.sophos.com/en-us/2024/08/01/driving-lessons-the-kernel-drivers-in-sophos-intercept-x-advanced/

๐Ÿ’ต Leaked ransomware variants give rise to new cybercrime groups cybercrime โ€“ Cybercriminals exploit leaked ransomware variants, forming groups utilizing multiple ransomware families for attacks and demanding bug bounties, leading to a rise in cybercrime and affiliate programs. https://securelist.com/sexi-key-group-mallox-ransomware/113183/

๐Ÿ›‹๏ธ Education in Secure Software Development security news โ€“ Survey by Linux Foundation and OpenSSF shows developers lack essential secure software development skills, raising concerns about software security. https://www.schneier.com/blog/archives/2024/08/education-in-secure-software-development.html

๐Ÿ‘ฟ Millions of Websites Susceptible to XSS Attack via OAuth Implementation Flaw vulnerability โ€“ Millions of websites vulnerable to XSS attack via OAuth due to flawed implementation, potentially leading to full account takeovers. https://www.securityweek.com/millions-of-websites-susceptible-xss-attack-via-oauth-implementation-flaw/

๐Ÿ›œ WifiForge โ€“ WiFi Exploitation for the Classroom hacking write-up โ€“ WifiForge, a program allowing safe WiFi hacking lessons through an interactive virtual network platform called Mininet-Wifi. WifiForge facilitates teaching various exploits with pre-built labs, such as WEP key-cracking, eliminating the need for physical network gear. https://www.blackhillsinfosec.com/wififorge/

๐Ÿง One Does Not Simply โ€ฆ Get a Cybersecurity Job security news โ€“ Getting a cybersecurity job requires upskilling, certifications, networking, staying informed on trends, and focusing on job opportunities from within your network. https://www.guidepointsecurity.com/blog/one-does-not-simply-get-a-cybersecurity-job/


CISA Corner

โš ๏ธ CISA Adds Three Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA adds three actively exploited vulnerabilities to catalog: ServiceNow input validation issues and Acronis default password flaw. https://www.cisa.gov/news-events/alerts/2024/07/29/cisa-adds-three-known-exploited-vulnerabilities-catalog โš ๏ธ CISA Adds One Known Exploited Vulnerability to Catalog vulnerability โ€“ CVE-2024-37085 VMware ESXi Authentication Bypass. https://www.cisa.gov/news-events/alerts/2024/07/30/cisa-adds-one-known-exploited-vulnerability-catalog

๐Ÿ Apple Releases Security Updates for Multiple Products vulnerability โ€“ Apple issued security updates for Safari, iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. https://www.cisa.gov/news-events/alerts/2024/07/30/apple-releases-security-updates-multiple-products

โฐ DigiCert Certificate Revocations security news โ€“ DigiCert is revoking TLS certificates due to a domain control verification issue, potentially causing temporary disruptions, with updated information available on their status page. https://www.cisa.gov/news-events/alerts/2024/07/30/digicert-certificate-revocations

๐Ÿง‘โ€๐Ÿญ CISA Releases Nine Industrial Control Systems Advisories vulnerability โ€“ vulnerabilities in various systems like Johnson Controls, AVTECH IP Camera, Vonets WiFi Bridges, and Rockwell Automation Logix Controllers. https://www.cisa.gov/news-events/alerts/2024/08/01/cisa-releases-nine-industrial-control-systems-advisories


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐Ÿง‘โ€๐Ÿ’ป Double Dipping Cheat Developer Gets Caught Red-Handed security research โ€“ EvolvedAim cheat developer includes information stealer, targeting Escape From Tarkov players, double-dipping into profits, and causing significant damage. https://www.cyberark.com/resources/threat-research-blog/double-dipping-cheat-developer-gets-caught-red-handed

๐Ÿ”‚ Anyone can Access Deleted and Private Repository Data on GitHub security research โ€“ GitHub exposes deleted and private repository data, posing security risks through Cross Fork Object Reference (CFOR) vulnerability. https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github

๐Ÿ‘ป A Hacker โ€˜Ghostโ€™ Network Is Quietly Spreading Malware on GitHub security research โ€“ A network of 3,000 'ghost' accounts on GitHub spreading ransomware and info stealers using fake likes and shares. https://www.wired.com/story/github-malware-spreading-network-stargazer-goblin/

๐Ÿ—ณ๏ธ Understanding the Election Cybersecurity Landscape cyber defense โ€“ Complex election cybersecurity landscape includes diverse targets, tactics, and actors; understanding essential for safeguarding democracy. https://www.greynoise.io/blog/understanding-the-election-cybersecurity-landscape

๐Ÿ’ฐ Oracle coughs up $115M to make privacy case go away privacy โ€“ Oracle settles $115 million class action lawsuit over alleged misuse of user data, promising privacy improvements. https://www.theregister.com/2024/07/22/oracle_settles_privacy_case/

๐Ÿ“ฒ Telegram 0-day allowed sending malicious APKs disguised as videos security news โ€“ ESET discovers Telegram Android zero-day exploit EvilVideo, allowing attackers to send malicious APKs disguised as videos. https://securityaffairs.com/166042/hacking/evilvideo-telegram-android-zero-day.html

๐ŸŽฒ Chinese โ€˜cybercrime syndicateโ€™ behind gambling sites advertised at European sporting events cybercrime โ€“ Infoblox uncovers Chinese cybercrime syndicate Vigorish Viper behind illegal global gambling network connected to human trafficking and cyber fraud. https://therecord.media/chinese-cybercrime-syndicate-gambling-football-europe

๐Ÿช Google abandons plan to drop third-party cookies in Chrome privacy โ€“ Google opting for user choice between Privacy Sandbox and cookies amidst concerns of competitive distortion. https://www.theregister.com/2024/07/23/google_cookies_third_party_continue/

๐Ÿ“ฒ iOS 17: Von einem iPhone kontaktierte Domains privacy https://www.kuketz-blog.de/ios-17-von-einem-iphone-kontaktierte-domains/

๐Ÿฅถ Simple โ€˜FrostyGoopโ€™ malware responsible for turning off Ukrainiansโ€™ heat in January attack security research โ€“ Simple but impactful FrostyGoop malware uses Modbus protocol to disrupt heating in Ukrainian apartment buildings, showcasing attackers' focus on critical infrastructure. https://cyberscoop.com/frostygoop-ics-malware-dragos-ukraine/

๐Ÿ’ฅ Inside the 78 minutes that took down millions of Windows machines security news โ€“ A faulty update by cybersecurity company CrowdStrike caused global Windows crashes, affecting millions of machines due to a driver flaw. Prospects to avoid such tech disasters involve enabling intelligent boot logic and limiting third-party kernel access. https://www.theverge.com/2024/7/23/24204196/crowdstrike-windows-bsod-faulty-update-microsoft-responses

๐Ÿชผ AI-Powered Voice Spoofing for Next-Gen Vishing Attacks security research โ€“ AI-powered voice cloning advancements enable more realistic vishing attacks, posing significant security risks. Mandiant Red Team incorporated AI voice spoofing in testing, showcasing attackers' potential to exploit this technique for initial access, lateral movement, and privilege escalation. Security defenses must adapt through identifying inconsistencies, source verification, and implementing audio protection measures. https://cloud.google.com/blog/topics/threat-intelligence/ai-powered-voice-spoofing-vishing-attacks/

๐Ÿค‘ TracFone to pay $16 million to settle FCC cyber and privacy investigation security news โ€“ TracFone Wireless, owned by Verizon, will pay a $16 million fine to settle an FCC investigation into data breaches caused by API vulnerabilities. The breaches exposed customer data, leading to privacy compromises, necessitating improved API security measures and overall information security protocols. https://therecord.media/tracfone-16-million-to-settle-fcc-investigation

๐Ÿ—บ๏ธ Friendly Domain Registry โ€œ.topโ€ Put on Notice security news โ€“ ICANN has issued a warning to the .top domain registry, expressing concerns over its failure to address phishing reports and suspend abusive domains, with reports showing .top domains were popular choices for phishing websites. https://krebsonsecurity.com/2024/07/phish-friendly-domain-registry-top-put-on-notice/

๐ŸŽฐ Philippines to end online casinos, maybe scams too cybercrime โ€“ The Philippines aims to shut down online gambling providers embroiled in crimes like tax evasion and human trafficking. Despite economic benefits, the industry faces international pressure due to illicit activities such as scams and exploitation. https://www.theregister.com/2024/07/24/phillipines_bans_online_gambling_operators/

๐Ÿฆธ Google's reCAPTCHA v2 just labor exploitation, boffins say security research โ€“ Researchers criticize Google's reCAPTCHA v2, suggesting it exploits human labor without providing significant security benefits, raising concerns about information harvesting and user experience. https://www.theregister.com/2024/07/24/googles_recaptchav2_labor/

๐Ÿšธ School in hot water over facial recognition in canteen privacy โ€“ ICO reprimands a UK school for introducing facial recognition for canteen payments without proper assessments, consent, or consultation, highlighting the importance of data protection in new technologies at educational institutions. https://www.theregister.com/2024/07/24/essex_school_facial_recognition/

๐Ÿงช CrowdStrike blames test software for taking down 8.5 million Windows machines security news โ€“ CrowdStrike attributes the issue that caused 8.5 million Windows machines to crash to a bug in their test software that failed to properly validate a content update, leading to detailed post-incident corrective measures for improved testing and deployment processes. https://www.theverge.com/2024/7/24/24205020/crowdstrike-test-software-bug-windows-bsod-issue

๐Ÿ† SEXi / APT Inc Ransomware โ€“ What You Need To Know cybercrime โ€“ The SEXi ransomware group targets VMware ESXi servers, encrypting virtual machine-related files and demanding high ransoms. Victims' files are appended with '.SEXi' and a ransom note named SEXi.txt is left. No known weaknesses exist for data recovery. Protection includes updating systems, disabling default accounts, and using strong, unique passwords. https://www.tripwire.com/state-of-security/sexi-apt-inc-ransomware-what-you-need-know

๐ŸŽฎ LummaC2 Malware Abusing the Game Platform 'Steam' security research โ€“ LummaC2 malware disguised as illegal programs uses SEO poisoning and abuse of Steam to acquire C2 domains, targeting wallets, browsers, extensions, and more. https://asec.ahnlab.com/en/68309/


Some More, For the Curious

๐Ÿ”ญ Astronomers discover technique to spot AI fakes using galaxy-measurement tools security research โ€“ University of Hull researchers use astronomy tools to detect AI-generated deepfake images by analyzing eye reflections for inconsistencies. https://arstechnica.com/information-technology/2024/07/astronomers-discover-technique-to-spot-ai-fakes-using-galaxy-measurement-tools/

๐Ÿ™‹โ€โ™‚๏ธ Ransomware takedowns leave crims scrambling for stability security news โ€“ Europol reports ransomware landscape fragmentation post RaaS disruptions, with criminals adapting by working independently or developing own payloads. https://www.theregister.com/2024/07/22/europol_says_ransomware_takedowns_make/

โ›” DDoS-for-hire site DigitalStress taken down by police, suspected owner arrested cybercrime โ€“ DDoS-for-hire site DigitalStress taken down by police, data collected from users, suspected owner arrested in Northern Ireland. https://www.bitdefender.com/blog/hotforsecurity/ddos-for-hire-site-digitalstress-taken-down-by-police-suspected-owner-arrested/

๐Ÿ’ผ Cyber firm KnowBe4 hired a fake IT worker from North Korea security news โ€“ KnowBe4 discovered a North Korean threat actor posing as a remote IT worker through an elaborate deception involving stolen identities and AI-augmented imagery, prompting an investigation and alerting authorities as part of the response. https://cyberscoop.com/cyber-firm-knowbe4-hired-a-fake-it-worker-from-north-korea/

๐Ÿ๏ธ Unfashionably secure: why we use isolated VMs cyber defense โ€“ Canary's security architecture relies on isolated VMs for complete customer data separation, safeguarding against unauthorized access and ensuring individual tenant privacy, despite operational drawbacks. https://blog.thinkst.com/2024/07/unfashionably-secure-why-we-use-isolated-vms.html

๐Ÿฅผ Build a Home Lab: Equipment, Tools, and Tips cyber defense โ€“ Building a home lab with virtual machines allows for experimentation and learning in a safe environment, emphasizing the importance of commitment over expensive equipment. Fundamental components include network setup, virtual machines, and physical hardware, and key considerations include VM options, equipment needs, and backup strategies. https://www.blackhillsinfosec.com/build-a-home-lab-equipment-tools-and-tips/

๐Ÿช– North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regimeโ€™s Military and Nuclear Programs cybercrime โ€“ North Korea's Andariel cyber group targets aerospace, nuclear, and defense industries for espionage, using ransomware to fund operations. Known for sophisticated reconnaissance, custom and commodity malware, system manipulation, credential theft, lateral movement, and data exfiltration. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a

๐ŸŒŠ Zero Day Initiative โ€” Multiple Vulnerabilities in the Deep Sea Electronics DSE855 security research โ€“ ZDI reported multiple vulnerabilities in Deep Sea Electronics DSE855, prompting no response from the vendor and leading to zero-day disclosure in June. Lack of authentication in configuration backup allowed unauthorized access. https://www.thezdi.com/blog/2024/7/25/multiple-vulnerabilities-in-the-deep-sea-electronics-dse855

๐Ÿ” Secure Boot is completely broken on 200+ models from 5 big device makers vulnerability โ€“ Cryptographic key underpinning Secure Boot compromised in 2022, allowing an unlimited bypass on over 200 device models from major manufacturers. Serious doubts raised about the integrity of Secure Boot. https://arstechnica.com/security/2024/07/secure-boot-is-completely-compromised-on-200-models-from-5-big-device-makers/

๐Ÿ—ฃ๏ธ Microsoft calls for Windows changes and resilience after CrowdStrike outage security news โ€“ Microsoft calls for Windows changes for resilience after CrowdStrike outage, considering restricting kernel access for security vendors. https://www.theverge.com/2024/7/26/24206719/microsoft-windows-changes-crowdstrike-kernel-driver

๐Ÿ’‰ French authorities launch disinfection operation to eradicate PlugX malware from infected hostss security news โ€“ French authorities and Europol conduct a 'disinfection operation' against PlugX malware, addressing espionage activities with insights from cybersecurity firm. https://securityaffairs.com/166213/cyber-crime/plugx-malware-disinfection-operation.html


CISA Corner

๐Ÿง‘โ€๐Ÿญ CISA Releases Four Industrial Control Systems Advisories vulnerability โ€“ CISA issues advisories on current ICS security issues for National Instruments and Hitachi products https://www.cisa.gov/news-events/alerts/2024/07/23/cisa-releases-four-industrial-control-systems-advisories vulnerability โ€“ CISA issued advisories for Siemens SICAM and Positron Broadcast Signal Processor. https://www.cisa.gov/news-events/alerts/2024/07/25/cisa-releases-two-industrial-control-systems-advisories

โš ๏ธ CISA Adds Two Known Exploited Vulnerabilities to Catalog vulnerability โ€“ CISA adds two known exploited vulnerabilities to its catalog: CVE-2012-4792 affecting Microsoft Internet Explorer and CVE-2024-39891 affecting Twilio Authy. https://www.cisa.gov/news-events/alerts/2024/07/23/cisa-adds-two-known-exploited-vulnerabilities-catalog

๐Ÿ”’ ISC Releases Security Advisories for BIND 9 security news โ€“ ISC released BIND 9 security advisories addressing vulnerabilities that can lead to denial-of-service attacks. https://www.cisa.gov/news-events/alerts/2024/07/24/isc-releases-security-advisories-bind-9


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub

A weekly shortlist of cyber security highlights. The short summaries are AI generated! If something is wrong, please let me know!


News For All

๐ŸŒ Data Broker Files: How data brokers sell our location data and jeopardise national security privacy โ€“ Data brokers sell German location data, jeopardizing privacy and national security, leading to calls for regulation and concerns about data misuse. https://netzpolitik.org/2024/data-broker-files-how-data-brokers-sell-our-location-data-and-jeopardise-national-security/#netzpolitik-pw

๐Ÿชช It's best to just assume youโ€™ve been involved in a data breach somehow privacy โ€“ Multiple data breaches in 2024, including AT&T and Snowflake, imply personal data compromise. Recommendations include strong passwords, multi-factor authentication, fraud alerts. https://blog.talosintelligence.com/threat-source-newsletter-july-18-2024/

๐Ÿ” Data breach exposes millions of mSpy spyware customers data breach โ€“ Data breach at mSpy exposes millions of customers who purchased phone spyware apps over a decade, revealing emails, personal documents, and requests for surveillance without consent by various individuals including U.S. officials. https://techcrunch.com/2024/07/11/mspy-spyware-millions-customers-data-breach/

๐Ÿ“ฑ The FBI says it has โ€˜gained accessโ€™ to the Trump rally shooterโ€™s phone security news โ€“ The FBI has accessed the phone of the suspect who shot at a Trump rally without disclosing how, continuing analysis of electronic devices and urging the public for tips. https://www.theverge.com/2024/7/15/24199239/fbi-encryption-phone-trump-shooter-pennsylvania-gained-access

๐Ÿง”โ€โ™‚๏ธ Kaspersky leaves U.S. market following the ban on the sale of its software in the country security news โ€“ Kaspersky exits the U.S. market after a ban on its software due to national security risks posed by Russia. The company denies links to the Russian government and will shut down its U.S. operations by September. https://securityaffairs.com/165799/breaking-news/kaspersky-is-leaving-the-u-s-market.html

๐Ÿ’ฐ AT&T ransom laundered through mixers, gambling services cybercrime โ€“ AT&T's $370,000 ransom is being laundered through cryptocurrency mixing platforms and gambling services, identified by TRM Labs. Money laundering tactics include using swap services and privacy coins, often employed by cybercriminals to hide the funds' origins. https://therecord.media/att-ransom-laundered-mixers-research

โ›‘๏ธ Rite Aid says 'limited' cyber incident affected data of 2.2 million people data breach โ€“ Rite Aid reports a 'limited' cyber incident after a hacker impersonated an employee accessing purchase-related data. Law enforcement contacted, victims offered identity protection services. https://therecord.media/rite-aid-data-breach-2-million-people

๐Ÿฆ  Private HTS Program Continuously Used in Attacks malware โ€“ A threat actor has been distributing malware through the private home trading system (HTS) program named HPlus, replacing the NSIS installer with an MSI format installer and supporting remote assistance with AnyDesk. The malware includes Quasar RAT aimed at stealing personal data. https://asec.ahnlab.com/en/67969/

๐Ÿช“ HardBit Ransomware โ€“ What You Need to Know malware โ€“ HardBit ransomware, a ransomware-as-a-service (RaaS), resurfaces with a new version, HardBit 4.0, focused on thwarting security researchers with passphrase protection and improved customization that caters to different criminal operator technical levels. https://www.tripwire.com/state-of-security/hardbit-ransomware-what-you-need-know

๐Ÿ’ฆ Leaked Docs Show What Phones Cellebrite Can (and Canโ€™t) Unlock security news โ€“ Cellebrite struggled to unlock a significant portion of modern iPhones as of April 2024, per leaked documents. https://www.404media.co/leaked-docs-show-what-phones-cellebrite-can-and-cant-unlock/

๐Ÿณ๏ธโ€๐ŸŒˆ LGBTQ+ people in Middle East and North Africa subject to intense digital oppression, research finds privacy โ€“ LGBTQ+ individuals face intense digital oppression, with police using dating and social media apps for persecution. Research reveals high levels of violence, forced device searches, and abuse. https://therecord.media/lgbtq-mena-region-digital-harassment

๐Ÿ›œ Mobile internet and social media disrupted in Bangladesh amid student protests security news โ€“ Bangladesh orders a nationwide mobile internet shutdown amid violent student protests against a government job quota system. The disruption is linked to social media usage by protesters. https://therecord.media/bangladesh-mobile-internet-social-media-outages-student-protests

๐Ÿ  How a little-known tool is sweeping the real estate industry by giving instant access to vast amounts of homebuyer data security news โ€“ Forewarn app offers real estate professionals instant access to detailed data about prospective clients for a low fee. Although primarily marketed as a safety tool, it also provides financial and criminal records instantly. However, privacy concerns and potential for misusing the data exist despite its explosive adoption in the real estate industry. https://therecord.media/forewarn-app-real-estate-homebuyer-data

๐Ÿฅ MediSecure data breach impacted 12.9 million individuals data breach โ€“ Australian digital prescription provider MediSecure suffered a ransomware attack exposing personal and health information of 12.9 million individuals. The breach resulted in the theft of 6.5TB of data impacting users between March 2019 and November 2023. https://securityaffairs.com/165932/uncategorized/medisecure-databreach-12-9m-individuals.html

Crowdstrike Corner ๐Ÿšจ Global Microsoft Meltdown Tied to Bad Crowdstrike Update security news โ€“ Crowdstrike update causes global Windows system crashes; airports, hospitals, and businesses affected. Recovery may take time, requiring manual fix per machine. https://krebsonsecurity.com/2024/07/global-microsoft-meltdown-tied-to-bad-crowstrike-update/

๐Ÿฆโ€โฌ› What is CrowdStrike, and what happened? security news โ€“ CrowdStrike caused a global outage after a faulty update to Windows machines, affecting essential services. The issue came from an update that caused Windows systems to crash. Recovery may take days to weeks. https://www.theverge.com/2024/7/19/24201864/crowdstrike-outage-explained-microsoft-windows-bsod

๐Ÿ›น Threat actors attempted to capitalize CrowdStrike incident security news โ€“ Threat actors exploit CrowdStrike IT outage to distribute Remcos RAT malware in a Latin America-targeted campaign under the disguise of an emergency fix via a ZIP file named 'crowdstrike-hotfix.zip.' CrowdStrike provides IOCs for the malicious campaign. https://securityaffairs.com/165953/uncategorized/threat-actors-capitalize-crowdstrike-incident.html


Some More, For the Curious

โžฟ CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks security research โ€“ CVE-2024-38112 used by Void Banshee to exploit IE vulnerability, leading to Atlantida stealer deployment against Windows users. https://www.trendmicro.com/en_us/research/24/g/CVE-2024-38112-void-banshee.html

๐Ÿ–ผ๏ธ Fake AWS Packages Ship Command and Control Malware In JPEG Files security research โ€“ Fake AWS npm packages hide command and control malware in JPEG images, jeopardizing package installations and highlighting the need for increased vigilance in open source ecosystems. https://blog.phylum.io/fake-aws-packages-ship-command-and-control-malware-in-jpeg-files/

0๏ธโƒฃ Zero Day Initiative โ€“ Uncoordinated Vulnerability Disclosure: The Continuing Issues with CVD security news โ€“ Gap in coordinated vulnerability disclosure leads to lack of vendor transparency, disputes on severity ratings, and challenges in bug reporting, highlighting the importance of improved communication and accountability within the cybersecurity industry. https://www.thezdi.com/blog/2024/7/15/uncoordinated-vulnerability-disclosure-the-continuing-issues-with-cvd

๐Ÿฅด Weak Security Defaults Enabled Squarespace Domains Hijacks โ€“ Krebs on Security security news โ€“ Weak security defaults at Squarespace allowed domain hijacking incidents targeting cryptocurrency businesses, with vulnerabilities arising from the migration process from Google Domains, lack of email verification for new accounts, and limited control over account access and activity. https://krebsonsecurity.com/2024/07/researchers-weak-security-defaults-enabled-squarespace-domains-hijacks/

๐Ÿƒ Punch Card Hacking โ€“ Exploring a Mainframe Attack Vector security research โ€“ Article explores using punch card concepts in mainframe hacking for penetration testing, detailing JCL basics, FTP job submission, debugging with spool files, and potential privilege escalation. https://blog.nviso.eu/2024/07/16/punch-card-hacking-exploring-a-mainframe-attack-vector/

๐Ÿ‘ป โ€˜GhostEmperorโ€™ returns: Mysterious Chinese hacking group spotted for first time in two years cybercrime โ€“ After a two-year hiatus, the sophisticated Chinese hacking group GhostEmperor, known for supply-chain attacks in Southeast Asia, has reappeared, deploying a rootkit to evade detection and carrying out attacks on business partners as seen in a recent incident investigated by cybersecurity company Sygnia. https://therecord.media/ghostemperor-spotted-first-time-in-two-years

๐Ÿง‘โ€๐Ÿ’ผ Vulnerability in Cisco Smart Software Manager lets attackers change any user password vulnerability โ€“ Cisco Smart Software Manager On-Prem vulnerability (CVE-2024-20419) allows unauthorized users to change any user's password, posing a severe security risk with a maximum CVSS score of 10. https://arstechnica.com/security/2024/07/vulnerability-in-cisco-smart-software-manager-lets-attackers-change-any-user-password/

โš–๏ธ Judge dismisses much of SEC suit against SolarWinds over cybersecurity disclosures security news โ€“ U.S. Judge dismissed most SEC claims against SolarWinds related to cybersecurity disclosures regarding the Sunburst attack. The ruling is seen as a victory for industry officials and a setback for SEC in holding executives accountable. https://cyberscoop.com/judge-dismisses-much-of-sec-suit-against-solarwinds-over-cybersecurity-disclosures/

๐Ÿค’ APT41 Has Arisen From the DUST security research โ€“ APT41, in collaboration with Google's TAG, launched a campaign targeting various sectors across multiple countries, using techniques like web shells, backdoors, SQL export, and OneDrive exfiltration. https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust/

๐Ÿง‘โ€๐Ÿญ CISA publishes resilience-planning playbook for critical infrastructure cyber defense โ€“ CISA releases playbook for infrastructure resilience planning, aiming to enhance security and minimize impact of cyberattacks on critical infrastructure. https://statescoop.com/cisa-cybersecurity-resilience-planning-playbook-critical-infrastructure/

๐Ÿ”’ Cisco fixed a critical flaw in Security Email Gateway that could allow attackers to add root users vulnerability โ€“ Cisco fixed a critical vulnerability in Secure Email Gateway allowing attackers to add root users and crash SEG appliances. https://securityaffairs.com/165905/uncategorized/cisco-fixed-a-critical-flaw-in-security-email-gateway-that-could-allow-attackers-to-add-root-users.html

๐Ÿ–ฒ๏ธ Attacking Connection Tracking Frameworks as used by Virtual Private Networks security research โ€“ Study demonstrates successful attacks on VPN connection tracking frameworks, highlighting vulnerabilities and proposing mitigations for enhanced security and privacy. https://petsymposium.org/popets/2024/popets-2024-0070.pdf


CISA Corner KEV โ€“ Adobe, Solarwinds, vmware, OSGeo https://www.cisa.gov/news-events/alerts/2024/07/15/cisa-adds-one-known-exploited-vulnerability-catalog https://www.cisa.gov/news-events/alerts/2024/07/17/cisa-adds-three-known-exploited-vulnerabilities-catalog security updates โ€“ Cisco, Ivanti, Oracle https://www.cisa.gov/news-events/alerts/2024/07/18/cisco-releases-security-updates-multiple-products https://www.cisa.gov/news-events/alerts/2024/07/18/ivanti-releases-security-updates-endpoint-manager https://www.cisa.gov/news-events/alerts/2024/07/18/oracle-releases-critical-patch-update-advisory-july-2024 industrial โ€“ rockwell, Subnet, Philips, Mitsubishi https://www.cisa.gov/news-events/ics-advisories/icsa-24-198-01 https://www.cisa.gov/news-events/ics-advisories/icsa-24-200-02 https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01 https://www.cisa.gov/news-events/ics-advisories/icsa-24-200-01


While my intention is to pick news that everyone should know about, it still is what I think is significant, cool, fun... Most of the articles are in English, but some current warnings might be in German.


(by @wrzlbrmpft@infosec.exchange) Obviously, the opinions inside these articles are not my own. No guarantee for correct- or completeness in any way.

theme: https://write.as/themes/fosstodon-hub