Category: GBHackers – Latest Cyber Security News | Hacker News

Container Security in a GitOps Environment

GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure, such as infrastructure as code (IaC), application code, and configuration files. Organizations using Kubernetes for container orchestration often use GitOps. …

ToddyCat APT Hackers Exploiting Vulnerable Microsoft Exchange Servers

ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently upgraded its arsenal of tools and methods, signifying an evolution in its modus operandi. Recent findings from the cybersecurity researchers…

Stayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor

Threat actors target telecoms and government ministries because they house valuable data and infrastructure.  Telecoms hold sensitive communication records and can disrupt essential services, while government ministries contain classified information, making them attractive targets for the following illicit purposes:- Cybersecurity…

Junos OS Flaw Allows Attackers to Flood System and Expose Sensitive Data

Three new vulnerabilities have been discovered in Junos OS: password disclosure, MAC address validation bypass, and Time-of-check Time-of-use (TOCTOU) Race Condition. The severity of these vulnerabilities ranges between 5.3 (Medium) to 6.1 (Medium). Juniper Networks has released patches and security…

Multiple Citrix NetScaler Flaw Leads to DoS Attack and Data Exposure

Critical vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have exposed sensitive information and a denial of service attack. A malicious cyber actor can exploit one of these vulnerabilities to gain control of an affected machine. Citrix has published security upgrades to…

Air Europa Breached: Customers’ Credit Card Details Exposed

On Tuesday, Air Europa, a Spanish airline, experienced a security breach where cybercriminals gained unauthorized access to the credit card information of the airline’s customers. Following the attack, the airline took the necessary steps to email the impacted customers and…

Lazarus APT Laundered Over $900 Million Worth of Cryptocurrency

Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately was the Cross-chain crime. In a cross-chain crime, threat actors swap their Cryptocurrency between different blockchains and tokens that help…

Qakbot Threat Actors Deliver Knight Ransomware & Remcos Via LNK Files

Qakbot’s infrastructure and cryptocurrency assets were seized by government authorities in an operation in August 2023 with the assistance of international allies, raising concerns about the affiliates of Qakbot. Talos researchers moderately believe Qakbot threat actors remain active, launching a…

Top 10 Cybersecurity Misconfigurations for Red and Blue Team Assessments

In a recent joint effort to bolster national cybersecurity, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have unveiled their findings on the “Top Ten Cyber Security Misconfigurations.”  This comprehensive report, released on October 5,…

Top 7 REST API Security Strategies to Secure Your Endpoints

In today’s REST API-driven landscape, most APIs are REST-based and widely utilized by web applications. These APIs are like versatile tools for sending and receiving information online. However, their widespread use exposes them to various security threats and challenges. What…

Microsoft Office XSS Flaw Let Attackers Execute Arbitrary Code

A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite.  This security flaw, classified as a Cross-Site Scripting (XSS) vulnerability, allows attackers to execute arbitrary JavaScript code within a Word document.…

Wireshark 4.0.10 Released: What’s New!

Wireshark, formerly known as Ethereal, is a widely used, free, and open-source network protocol analyzer that allows users to capture and inspect data packets on a computer network. This network analyzer tool is primarily used for the following purposes:- The…

ShellTorch Flaw Exposes Thousands of AI Servers to RCE Attacks

ShellTorch Serve is an open-source model-serving library developed by PyTorch that simplifies the deployment of machine learning models for inference in production environments.  It provides a scalable and efficient way to serve PyTorch models, making integrating them into applications and…

Exploitation of Critical WS_FTP Server Flaw Spotted in the Wild

As previously reported, Progress-owned WS_FTP was discovered with multiple vulnerabilities associated with cross-site scripting (XSS), SQL injection, cross-site request forgery, unauthenticated user enumeration, and a few others. Progress has warned their users about the WS_FTP vulnerabilities and released a security…

Hackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare

Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers to unforeseen risks.  A recent disclosure from Certitude highlights a vulnerability that could allow attackers to bypass certain protection mechanisms…

Lazarus Tricking Employees with Trojanized Coding Challenges

Lazarus group has been recently discovered to have targeted an Aerospace company in Spain, which involved deploying several tools, including an undocumented backdoor named “LightlessCan.” Reports indicate that the threat actor gained access to the organization’s network last year using…

LightSpy APT Attacking WeChat Users to Steal Payment Data

LightSpy malware, responsible for a watering hole attack conducted against iOS users in Hong Kong, has been discovered to be embedded with Android implant Core and its 14 related plugins from 20 active servers for attacking mobile users. LightSpy is…

MadPot: AWS Honeypot to Disrupt Threat Actors

In the realm of cybersecurity, the battle against threat actors never stops. With its vast cloud infrastructure, Amazon Web Services (AWS) is at the forefront of this ongoing struggle.  AWS employs a global network of sensors and advanced disruption tools…

Hackers Bypass Cloudflare Firewall, and DDoS Protections using Cloudflare

Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers to unforeseen risks.  A recent disclosure from Certitude highlights a vulnerability that could allow attackers to bypass certain protection mechanisms…

APT34 Employs Weaponized Word Documents to Deploy New Malware Strain

APT34 is a secretive cyberespionage group specializing in Middle East targets, known for gathering sensitive intelligence via spear phishing and advanced infiltration methods. The sophistication and comprehensive resources of the APT34 group pose a major regional and global cybersecurity threat. …

Budworm APT Attacking Telecoms Org With New Custom Tools

APT (Advanced Persistent Threat) actors are evolving at a rapid pace, continually enhancing their toolsets and tactics.  They adapt quickly to security measures, leveraging advanced techniques, such as zero-day exploits, to remain undetected. Their ability to innovate and collaborate in…

Cisco IOS Software Zero-day Exploited in Attacks

Cisco has issued fixes to address a vulnerability in the GET VPN feature of IOS and IOS XE software that has been exploited in attacks. A remote attacker who has administrative access to a group member or a key server…

Progress Software Warns of Critical Vulnerability in WS_FTP Server

Multiple vulnerabilities have been discovered in Progress’s WS_FTP, which include .NET deserialization, directory traversal, reflected cross-site scripting (XSS), SQL injection, stored cross-site scripting, cross-site request forgery, and unauthenticated user enumeration vulnerability. These vulnerabilities’ severities range from 5.3 (Medium) to 10.0…

Hackers Inject Malicious Ads into GPT-4 Powered Bing Chat

In February 2023, Microsoft unveiled its revolutionary AI-assisted search engine, Bing Chat, driven by OpenAI’s cutting-edge GPT-4 technology.  This announcement marked a notable event in the world of online search, sparking both curiosity and speculation about the potential shift in…

ZYXEL Buffer Overflow vulnerability Let Attacker Launch DoS Attack

ZYXEL has been discovered with a Buffer Overflow vulnerability on their ZYXEL-PMG2005-T20B device, which can result in a denial-of-service condition. This condition exists due to improper sanitization of user-supplied input on their HTTP request. Zyxel is a Taiwanese multinational company…

Actively Exploited Chrome Zero-day Patched: Update Now!

Google has recently deployed updates to mitigate a newly discovered zero-day vulnerability in their Chrome browser, which is currently being actively exploited. Google has acknowledged its awareness of an exploit currently available for CVE-2023-5217, which has been observed to be…

Lu0Bot Node.js Malware Takes Complete Control Over Victim’s Computer

Through strategies like polymorphic code, which continuously alters its appearance to prevent detection, as well as employing encryption and obfuscation to disguise its actions, malware is getting more complex and sneaky. Additionally, to infiltrate systems and avoid detection by traditional…

New AtlasCross APT Using Weaponized Word Documents to Deploy Malware

Cybersecurity analysts at NSFOCUS Security Labs recently uncovered an unknown phishing-based attack process during threat-hunting.  Apart from this, during their further investigation, they identified two new Trojans and rare attack methods. NSFOCUS Security Labs suspects a skilled APT attacker is…

Google Chrome use-after-free Vulnerability Leads to Remote Attack

Google Chrome has been recently discovered to be a Use-after-free vulnerability that threat actors can exploit to attack users. This vulnerability exists in the Google Chrome VideoEncoder, which can be triggered using a malicious web page. However, Google Chrome version…

EvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat actor was mentioned as conducting custom Android malware campaigns in September 2019. In April 2020, EvilBamboo was discovered to be…

Threat Actors Actively Using Remote Management Tools to Deploy Ransomware

The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive ransomware distribution.  The original payload consisted of an executable file disguised as a legitimate document.  According to Huntress, this campaign…

BIND DNS System Flaws Let Attackers Launch DoS Attacks

In a recent disclosure, BIND 9, a widely-used DNS (Domain Name System) server software, has been found vulnerable to two critical security flaws, labeled CVE-2023-4236 and CVE-2023-3341.  These vulnerabilities, if exploited, could have serious consequences, making it imperative for users…

OilRig: Never-seen C#/.NET Backdoor to Attack Wide Range of Industries

OilRig (APT34) is an Iranian cyberespionage group active since 2014, targeting Middle Eastern governments and various industries like:- OilRig launched DNSpionage in 2018-2019 against Lebanon and the UAE, followed by the 2019-2020 HardPass campaign using LinkedIn for energy and government…

Most Important Network Penetration Testing Checklist

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering Open ports, troubleshooting live systems, and services, and grabbing system banners. The pen-testing helps the administrator to close unused ports, additional services, Hide or customize banners, troubleshoot services, and…

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools & Apps

A new financially motivated threat group named “LUCR-3” has been discovered targeting organizations to steal intellectual property for extortion. This threat actor surpasses Scatter Spider, Oktapus, UNC3944, and Storm-0875. LUCR-3 is targeting Fortune 2000 companies in various sectors, which include…

Is QakBot Malware Officially Dead?

Only a few malware families can claim to have persisted for nearly twenty years, and QakBot (also referred to as QBot) stands among them as one of the most enduring. Since its first appearance in 2008, it has been deployed…

T-Mobile App Glitch Exposes Other User’s Sensitive Data

The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy. Users have reported accessing sensitive information belonging to other customers when logging into their own accounts.  This alarming situation has…

China Accuses the US of Hacking Huawei Servers Since 2009

Huawei is known for its telecommunications equipment and consumer electronics, including smartphones, and the USA banned Huawei primarily due to national security concerns. As the Chinese government may utilize Huawei’s technology for spying, the U.S. government claimed that the business…

Bumblebee Malware Abuses WebDAV Protocol to Attack Organizations

In recent cybersecurity news, the notorious Bumblebee loader has made a resurgence in a new campaign, posing a significant threat to organizations’ digital security.  This loader, often used as a stepping stone for ransomware attacks, had taken a pause but…

Nagios Monitoring Tool Vulnerabilities Let Attackers SQL Queries

Nagios XI is a prominent and frequently used commercial monitoring system for IT infrastructure and network monitoring.  Vulnerability Research Engineer Astrid Tedenbrant found four distinct vulnerabilities in Nagios XI (version 5.11.1 and below) while conducting routine research. By making use…

Hackers Attacking Telecoms Servers With HTTPSnoop Malware

In 2022, state-sponsored actors and advanced adversaries consistently targeted telecoms globally, making it a top sector in Talos IR cases. Telecom firms with critical infrastructure assets are prime targets due to their role in national networks and as potential gateways…

Fortinet FortiOS Flaw Let Attacker Execute Malicious JavaScript Code

Recent reports indicate that Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use for malicious purposes. These vulnerabilities have been given the CVE IDs CVE-2023-29183 and CVE-2023-34984. The severity…

AMBERSQUID: Novel Cryptojacking Attack Leverages AWS Services

Cryptojacking is a malicious cyberattack in which an attacker stealthily utilizes a victim’s computer or device to mine cryptocurrencies such as Bitcoin or Monero without the victim’s knowledge or agreement. This usually entails infecting the victim’s PC with malware that…

Pro-Russian Actors Initiated A DDoS Attack Against Canadian Organizations

The Canadian government, banking, and transportation industries have recently been the targets of many distributed denial of service (DDoS) attacks. This criminal activity is linked to state-sponsored cyber threat actors from Russia. Since March 2022, NoName057(16), a pro-Russian hacktivist operator…

Windows11 Themes vulnerability Let Attackers Execute Arbitrary Code

An Arbitrary code execution vulnerability has been found in Windows 11. This vulnerability is a result of several factors, such as a Time-of-Check Time-of-Use (TOCTOU) race condition, malicious DLL, cab files, and the absence of Mark-of-the-Web validation. This particular vulnerability…

Trellix DLP Vulnerability Allows Attackers To Delete Unprivileged Files

Trellix Windows DLP endpoint for Windows has a privilege escalation vulnerability that allows unauthorized deletion of any file or folder. Trellix DLP Endpoint protects against all potential leak channels, including portable storage devices, the cloud, email, instant messaging, web, printing,…

Cisco IOS Verification Flaw Let Attackers Execute Arbitrary Code

Cisco has been discovered with an arbitrary code execution flaw on their Cisco IOS XR Software image verification checks, which allows an authenticated, local attacker to execute arbitrary code on their underlying operating system. Cisco Internetwork Operating System (IOS) is…

SolarWinds Platform Vulnerability Let Attackers Execute Arbitrary Commands

SolarWinds Platform has published its release notes 2023.3.1, which provides multiple bug fixes and security updates. With this release, the platform has fixed two vulnerabilities, CVE-2023-23840 and CVE-2023-23845, related to arbitrary command execution.  SolarWinds Platform is an infrastructure monitoring and…

ReconAIzer: OpenAI-based Extension for Burp Suite

Burp Suite, the renowned Bug Bounty Hunting and Web Application Penetration Testing tool, has been improvised with many extensions over the years. Many of Burp’s Extensions have been used by Bug Bounty Hunters and Security Researchers for various purposes. It…

Chinese Redfly Hacked National Power Grid & Maintained Access for 6 Months

Cybersecurity researchers at Symantec’s Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach an Asian national grid for 6 months. Artificial intelligence-driven cyber threats grow as technology advances, significantly influencing and boosting threat…

Mozilla Zero-Day Vulnerability Exploited in the Wild – Patch Now!

In a race against time to safeguard user security, major browser vendors, including Google and Mozilla, have scrambled to release urgent updates in response to a critical vulnerability discovered in the WebP Codec.  This newly unearthed vulnerability, bearing the identifier…

Chrome Zero-Day Vulnerability Exploited in the Wild

Chrome’s Stable and Extended stable channels have been upgraded to 116.0.5845.187 for Mac and Linux and 116.0.5845.187/.188 for Windows as part of a security update. One “Critical” security upgrade is included in this release. In the coming days and weeks,…