Category: Cyware News – Latest Cyber News

DDoS Attack Volume Rises, Peak Power Reaches 1.7 Tbps

According to Gcore, the number of DDoS attacks in the first half of 2024 increased by 46% compared to the same period in 2023, reaching a total of 830,000 attacks. The peak attack power also rose to 1.7 terabits per…

Ransomware Group Behind Major Indonesian Attack Wears Many Masks

Researchers have linked Brain Cipher to at least three other groups operating under different names. Despite its global reach, the group’s tactics are not particularly sophisticated. This article has been indexed from Cyware News – Latest Cyber News Read the…

An Analysis of Common Malware Loaders

In 2024, loaders were involved in nearly 40% of critical security incidents, with popular ones being SocGholish, GootLoader, and Raspberry Robin, aiming to deliver malware like ransomware, according to Reliaquest. This article has been indexed from Cyware News – Latest…

Massive Cyberattack Hit Central Bank of Iran

A major cyberattack struck the Central Bank of Iran and other Iranian banks, causing disruptions. The incident, reported by Iranian news outlets and Iran International, resulted in the crippling of the banks’ computer systems. This article has been indexed from…

South Korea Says DPRK Hackers Stole Spy Plane Technical Data

South Korea’s ruling party, the People Power Party (PPP), has reported that hackers from North Korea have stolen important technical data related to the country’s main battle tank, the K2, as well as its spy planes known as “Baekdu” and…

Ongoing Social Engineering Campaign Refreshes Payloads

Rapid7 identified multiple intrusion attempts by threat actors utilizing social engineering tactics on June 20, 2024. The threat actors use email bombs followed by calls to offer fake solutions, with recent incidents involving Microsoft Teams calls. This article has been…

CryptoCore: Unmasking the Sophisticated Cryptocurrency Scam Operations

The CryptoCore group’s scam operation leverages deepfake technology, hijacked YouTube accounts, and professionally designed websites to trick users into sending cryptocurrencies to scammer wallets. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

FBI Says it is Investigating Purported Trump Campaign Hack

The FBI is investigating a suspected hack of the Trump campaign, following accusations of Iranian involvement. The Trump campaign blames foreign sources and cited a Microsoft report linking Iranian hackers to covert efforts to influence the election. This article has…

How CIOs, CTOs, and CISOs View Cyber Risks Differently

C-suite executives face the challenge of balancing technological innovation with cybersecurity resilience. A report by LevelBlue highlighted the complexities of their roles and the need for strategic cybersecurity approaches. This article has been indexed from Cyware News – Latest Cyber…

Microsoft Discloses 10 Zero-Day Bugs in Patch Tuesday Update

Microsoft released its August 2024 Patch Tuesday updates, fixing 89 vulnerabilities, including nine zero-days. Among these, six zero-days were actively exploited, while three others were publicly disclosed. A tenth zero-day still remains unpatched. This article has been indexed from Cyware…

Critical SAP Flaw Allows Remote Attackers to Bypass Authentication

SAP has released a security patch package for August 2024, addressing 17 vulnerabilities, including a critical authentication bypass flaw (CVE-2024-41730) in the SAP BusinessObjects Business Intelligence Platform. This article has been indexed from Cyware News – Latest Cyber News Read…

Manufacturer Orion SA says scammers conned it out of $60M

Orion SA recently disclosed to US regulators that it fell victim to a criminal wire fraud scheme resulting in a $60 million loss. The incident, possibly a BEC scam, involved fraudulent wire transfers to unknown third-party accounts by an employee.…

DeathGrip: Emergence of a new Ransomware-as-a-Service

Promoted through Telegram and other underground forums, DeathGrip RaaS offers aspiring threat actors on the dark web sophisticated ransomware tools, including LockBit 3.0 and Chaos builders. This article has been indexed from Cyware News – Latest Cyber News Read the…

Exploiting pfsense Flaw for Remote Code Execution

During a recent security audit by Laburity researchers, an application with a vulnerability related to pfblockerNG was identified. Attempts using default credentials failed, but an exploit from exploit-db was unsuccessful. This article has been indexed from Cyware News – Latest…

New Banshee MacOS Stealer Attacking Users to Steal Keychain Data

The Banshee Stealer can rob sensitive data, including passwords from macOS Keychain, system information, and data from popular web browsers like Safari, Chrome, and Firefox. It can also access cryptocurrency wallets and plugins. This article has been indexed from Cyware…

Misconfigurations and IAM Weaknesses Top Cloud Security Concerns

While traditional cloud security issues associated with Cloud Service Providers (CSPs) are decreasing in significance, misconfigurations, IAM weaknesses, and API risks remain critical in cloud computing. This article has been indexed from Cyware News – Latest Cyber News Read the…

Scout Suite: Open-Source Cloud Security Auditing Tool

Scout Suite is an open-source cloud security auditing tool that assesses security in multi-cloud environments. By using cloud vendors’ APIs, it gathers configuration data to identify risks efficiently. This article has been indexed from Cyware News – Latest Cyber News…

Unmasking the Overlap Between Golddigger and Gigabud Android Malware

Initially discovered in January 2023 impersonating government entities, Gigabud and Golddigger malware campaigns have overlapped, suggesting the same threat actors behind both. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Unmasking the…

UN Cybercrime Treaty Passes in Unanimous Vote

The United Nations has unanimously passed its first cybercrime treaty, initially proposed by Russia. This treaty establishes a global legal framework for addressing cybercrime and data access. This article has been indexed from Cyware News – Latest Cyber News Read…

Critical 1Password Flaws May Allow Hackers to Snatch Users’ Passwords

The first vulnerability, CVE-2024-42219, allows bypassing inter-process communication protections and impersonation of trusted 1Password integrations. The second, CVE-2024-42218, lets attackers bypass security mechanisms using outdated app versions. This article has been indexed from Cyware News – Latest Cyber News Read…

SaaS Apps Present an Abbreviated Kill Chain for Attackers

Researchers at AppOmni revealed that adversaries no longer need to complete all seven stages of a traditional kill chain to achieve their goals. This shift requires organizations to rethink their cybersecurity strategies. This article has been indexed from Cyware News…

SSHamble: Open-Source Security Testing of SSH Services

RunZero recently released SSHamble, an open-source tool for testing the security of SSH services. This tool helps security teams detect dangerous misconfigurations and software bugs in SSH implementations. This article has been indexed from Cyware News – Latest Cyber News…

Analysis of Data Exfiltration Tools Used by Threat Actors

A comprehensive analysis of data theft incidents investigated by ReliaQuest from September 2023 to July 2024 revealed that Rclone, WinSCP, and cURL are among the most prevalent exfiltration tools used by threat actors. This article has been indexed from Cyware…

Botnet 7777: Are You Betting on a Compromised Router?

Recent findings indicate that the 7777 botnet (aka Quad7) has likely expanded, adding new bots with open port 63256, primarily including Asus routers. As of August 5, 2024, the total number of active bots stood at 12,783. This article has…

New Malware Strains Pop Up in Threat Landscape

Quorum Cyber Incident Response team recently identified a new malware called SharpRhino utilized by the threat actor group Hunters International during a ransomware incident. The malware, written in C#, was distributed through a typosquatting domain posing as Angry IP Scanner.…

Fake WinRar Websites Distributing Malware Payloads Hosted on GitHub

A fraudulent site resembling the official WinRar distribution platform is spreading malware. The fake website, win-rar[.]co, utilizes typosquatting to trick users who mistype the URL. This article has been indexed from Cyware News – Latest Cyber News Read the original…

New Widespread Extension Trojan Malware Campaign

The malware attack flow involves luring users with fake websites imitating popular downloads, then executing PowerShell scripts to download and install malicious extensions that steal private data and control browser settings. This article has been indexed from Cyware News –…

Cisco Warns of Critical RCE Zero-Days in End of Life IP Phones

Cisco has issued a warning about critical remote code execution zero-days affecting the web-based management interface of the Small Business SPA 300 and SPA 500 series IP phones, which are no longer supported. This article has been indexed from Cyware…

CISA Warns of Hackers Abusing Cisco Smart Install Feature

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has advised organizations to disable the legacy Cisco Smart Install (SMI) feature due to recent attacks exploiting it. This article has been indexed from Cyware News – Latest Cyber News Read the…

How to Weaponize Microsoft Copilot for Cyberattackers

Copilot is an AI-based chatbot used by enterprises to streamline tasks, but it can also be manipulated by attackers to steal data and conduct phishing scams without leaving a trace. This article has been indexed from Cyware News – Latest…

New Ransomware Groups Emerge Despite Crackdowns

According to a report by Rapid7, a total of 21 new or rebranded groups have emerged since January 2024, alongside existing groups like LockBit, which has survived law enforcement crackdowns. This article has been indexed from Cyware News – Latest…

Ransomware Drill Targets Healthcare in Operation 911

A ransomware drill focused on healthcare called Operation 911 was conducted at Black Hat USA 2024 by Las Vegas law enforcement, the FBI, and Semperis. During the drill, a simulated ransomware attack targeted a fictitious hospital. This article has been…

RustScan: Open-Source Port Scanner

RustScan is a fast and versatile open-source port scanner with Adaptive Learning for optimal performance. It can scan all 65,000 ports in 3 seconds and supports a scripting engine for customization. This article has been indexed from Cyware News –…

Cloud Storage From Microsoft, Google Used in Malware Attacks

Symantec’s Threat Hunter Team has observed various espionage operations utilizing cloud services, like the backdoors GoGra and Grager targeting organizations in South Asia, South East Asia, Taiwan, Hong Kong, and Vietnam. This article has been indexed from Cyware News –…

Researcher Discovers Downgrade Attack Abusing Windows Update Process

A security researcher at SafeBreach demonstrated at the Black Hat 2024 conference that two zero-day vulnerabilities can be exploited in downgrade attacks to revert fully updated Windows systems back to older versions, reintroducing vulnerabilities. This article has been indexed from…

SEC Ends Probe Into MOVEit Attacks Impacting 95 Million People

The SEC has closed its investigation into Progress Software’s handling of a zero-day flaw in MOVEit Transfer. Progress Software announced in a recent SEC filing that no enforcement action will be recommended by the Division of Enforcement. This article has…

Microsoft 365 Anti-Phishing Feature can be Bypassed with CSS

A flaw in Microsoft 365’s anti-phishing feature allows attackers to hide the ‘First Contact Safety Tip’ warning in Outlook emails using CSS, increasing the risk of users falling for malicious emails. This article has been indexed from Cyware News –…

Report: Email Attacks Skyrocket 293%

According to Acronis, ransomware remains a top threat for SMBs, especially in critical sectors like government and healthcare, where 10 new ransomware groups conducted 84 cyberattacks globally in Q1 2024. This article has been indexed from Cyware News – Latest…

Ransomware Swells Despite Collective Push to Curb Attacks

Rapid7 researchers noted over 2,570 attacks in the first half of 2024, equating to around 14 attacks daily. The number of ransomware groups posting on data leak sites surged 67% compared to the previous year. This article has been indexed…

Cyber Training Organization Pledges $15 Million in Education Programs

EC-Council, a cyber certification organization, has pledged $15 million in scholarships to support over 50,000 students in cybersecurity programs. The goal is to help students earn industry credentials and enhance their cybersecurity skills. This article has been indexed from Cyware…

The Role of AI in Cybersecurity Operations

AI can analyze data quickly, detect patterns of malicious behavior, and automate routine tasks like alert triaging and log analysis. However, human oversight is still necessary to ensure the accuracy and relevance of AI-generated insights. This article has been indexed…

Attackers Use Multiple Techniques to Bypass Reputation-Based Security

Attackers have developed multiple techniques to bypass reputation-based security controls like Windows Smart App Control, allowing them initial access to environments without triggering alerts. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

Sneaky SnakeKeylogger Slithers Into Windows Email Inboxes

SnakeKeylogger, also known as KrakenKeylogger, is a malicious software targeting Windows users. It logs keystrokes, steals credentials, and takes screenshots, allowing cybercriminals to capture sensitive information. This article has been indexed from Cyware News – Latest Cyber News Read the…

North Korean Hackers Exploit VPN Update Flaw to Install Malware

North Korean hackers exploited a VPN software update flaw to install malware and breach networks, as warned by South Korea’s National Cyber Security Center. The threat groups involved in these activities are Kimsuky (APT43) and Andariel (APT45). This article has…

Ransomware Gang Targets IT Workers With New SharpRhino Malware

The Hunters International ransomware group is using a new C# remote access trojan named SharpRhino to target IT workers and breach corporate networks. It is distributed through a typosquatting site posing as Angry IP Scanner’s website. This article has been…

Google Fixes Android Kernel Zero-Day Exploited in Targeted Attacks

Google has patched a zero-day vulnerability in the Android kernel that was being exploited in targeted attacks. The vulnerability, tracked as CVE-2024-36971, allows for arbitrary code execution without user interaction on unpatched devices. This article has been indexed from Cyware…