Tag: Threatpost

Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops

This article has been indexed from Threatpost Researchers have exposed the work of Exotic Lily, a full-time cybercriminal initial-access group that uses phishing to infiltrate organizations’ networks for further malicious activity. Read the original article: Google Blows Lid Off Conti,…

‘CryptoRom’ Crypto-Scam is Back via Side-Loaded Apps

This article has been indexed from Threatpost Scammers are bypassing Apple’s App Store security, stealing thousands of dollars’ worth of cryptocurrency from the unwitting, using the TestFlight and WebClips programs. Read the original article: ‘CryptoRom’ Crypto-Scam is Back via Side-Loaded…

Pandora Ransomware Hits Giant Automotive Supplier Denso

This article has been indexed from Threatpost Denso confirmed that cybercriminals leaked stolen, classified information from the Japan-based car-components manufacturer after an attack on one of its offices in Germany. Read the original article: Pandora Ransomware Hits Giant Automotive Supplier…

Staff Think Conti Group Is a Legit Employer – Podcast

This article has been indexed from Threatpost The ransomware group’s benefits – bonuses, employee of the month, performance reviews & top-notch training – might be better than yours, says BreachQuest’s Marco Figueroa. Read the original article: Staff Think Conti Group…

Cybercrooks’ Political In-Fighting Threatens the West

This article has been indexed from Threatpost They’re choosing sides in the Russia-Ukraine war, beckoning previously shunned ransomware groups and thereby reinvigorating those groups’ once-diminished power. Read the original article: Cybercrooks’ Political In-Fighting Threatens the West

Russia Issues Its Own TLS Certs

This article has been indexed from Threatpost The country’s citizens are being blocked from the internet because foreign certificate authorities can’t accept payments due to Ukraine-related sanctions, so it created its own CA. Read the original article: Russia Issues Its Own…

Raccoon Stealer Crawls Into Telegram

This article has been indexed from Threatpost The credential-stealing trash panda is using the chat app to store and update C2 addresses as crooks find creative new ways to distribute the malware. Read the original article: Raccoon Stealer Crawls Into…

Multi-Ransomwared Victims Have It Coming–Podcast

This article has been indexed from Threatpost Let’s blame the victim. IT decision makers’ confidence about security doesn’t jibe with their concession that repeated incidents are their own fault, says ExtraHop’s Jamie Moles. Read the original article: Multi-Ransomwared Victims Have…

Russia May Use Ransomware Payouts to Avoid Sanctions

This article has been indexed from Threatpost FinCEN warns financial institutions to beware of unusual cryptocurrency payments or illegal transactions Russia may use to evade restrictions imposed due to its invasion of Ukraine. Read the original article: Russia May Use…

Qakbot Botnet Sprouts Fangs, Injects Malware into Email Threads

This article has been indexed from Threatpost The ever-shifting, ever-more-powerful malware is now hijacking email threads to download malicious DLLs that inject password-stealing code into webpages, among other foul things. Read the original article: Qakbot Botnet Sprouts Fangs, Injects Malware…

APT41 Spies Broke Into 6 US State Networks via a Livestock App

This article has been indexed from Threatpost The China-affiliated state-sponsored threat actor used Log4j and zero-day bugs in the USAHerds animal-tracking software to hack into multiple government networks. Read the original article: APT41 Spies Broke Into 6 US State Networks…

Most ServiceNow Instances Misconfigured, Exposed

This article has been indexed from Threatpost Customers aren’t locking down access correctly, leading to ~70 percent of ServiceNow implementations being vulnerable to malicious data extraction. Read the original article: Most ServiceNow Instances Misconfigured, Exposed

Russian APTs Furiously Phish Ukraine – Google

This article has been indexed from Threatpost Also on the rise: DDoS attacks against Ukrainian sites and phishing activity capitalizing on the conflict, with China’s Mustang Panda targeting Europe. Read the original article: Russian APTs Furiously Phish Ukraine – Google

The Uncertain Future of IT Automation

This article has been indexed from Threatpost While IT automation is growing, big challenges remain. Chris Hass, director of information security and research at Automox, discusses how the future looks. Read the original article: The Uncertain Future of IT Automation

NVIDIA’s Stolen Code-Signing Certs Used to Sign Malware

This article has been indexed from Threatpost NVIDIA certificates are being used to sign malware, enabling malicious programs to pose as legitimate and slide past security safeguards on Windows machines. Read the original article: NVIDIA’s Stolen Code-Signing Certs Used to…

Nvidia’s Stolen Code-Signing Certs Used to Sign Malware

This article has been indexed from Threatpost Nvidia certificates are being used to sign malware, enabling malicious programs to pose as legitimate and slide past security safeguards on Windows machines. Read the original article: Nvidia’s Stolen Code-Signing Certs Used to…

Massive Meris Botnet Embeds Ransomware Notes from REvil

This article has been indexed from Threatpost Notes threatening to tank targeted companies’ stock price were embedded into the DDoS ransomware attacks as a string_of_text directed to CEOs and webops_geeks in the URL. Read the original article: Massive Meris Botnet…

Free HermeticRansom Ransomware Decryptor Released

This article has been indexed from Threatpost Cruddy cryptography means victims whose files have been encrypted by the Ukraine-tormenting ransomware can break the chains without paying extortionists. Read the original article: Free HermeticRansom Ransomware Decryptor Released

Russia Leaks Data From a Thousand Cuts–Podcast

This article has been indexed from Threatpost It’s not just Ukraine: There’s a flood of intel on Russian military, nukes and crooks, says dark-web intel expert Vinny Troia, even with the Conti ransomware gang shuttering its leaking Jabber chat server.…

Securing Data With a Frenzied Remote Workforce–Podcast

This article has been indexed from Threatpost Stock the liquor cabinet and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say “Zero Trust.” Read the original article: Securing Data With a Frenzied Remote Workforce–Podcast

TeaBot Trojan Haunts Google Play Store, Again

This article has been indexed from Threatpost Malicious Google Play apps have circumvented censorship by hiding trojans in software updates. Read the original article: TeaBot Trojan Haunts Google Play Store, Again

Conti Ransomware Decryptor, TrickBot Source Code Leaked

This article has been indexed from Threatpost The decryptor spilled by ContiLeaks won’t work with recent victims. Conti couldn’t care less: It’s still operating just fine. Still, the dump is a bouquet’s worth of intel. Read the original article: Conti…

RCE Bugs in Hugely Popular VoIP Apps: Patch Now!

This article has been indexed from Threatpost The flaws are in the ubiquitous open-source PJSIP multimedia communication library, used by the Asterisk PBX toolkit that’s found in a massive number of VoIP implementations. Read the original article: RCE Bugs in…

Ukraine-Russia Cyber Warzone Splits Cyber Underground

This article has been indexed from Threatpost A pro-Ukraine Conti member spilled 13 months of the ransomware group’s chats, while cyber actors are rushing to align with both sides. Read the original article: Ukraine-Russia Cyber Warzone Splits Cyber Underground

Microsoft Exchange Bugs Exploited by ‘Cuba’ Ransomware Gang

This article has been indexed from Threatpost The ransomware gang known as Cuba is increasingly shifting to exploiting Exchange bugs – including crooks’ favorites, ProxyShell and ProxyLogon – as initial infection vectors. Read the original article: Microsoft Exchange Bugs Exploited…

6 Cyber-Defense Steps to Take Now to Protect Your Company

This article has been indexed from Threatpost Ransomware is getting worse, but Daniel Spicer, chief security officer at Ivanti, offers a checklist for choosing defense solutions to meet the challenge. Read the original article: 6 Cyber-Defense Steps to Take Now to…

White House Denies Mulling Massive Cyberattacks Against Russia

This article has been indexed from Threatpost The options reportedly included tampering with trains, electric service and internet connectivity, hampering Russia’s military operations in Ukraine. Read the original article: White House Denies Mulling Massive Cyberattacks Against Russia

The Harsh Truths of Cybersecurity in 2022, Part II

This article has been indexed from Threatpost Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout. Read the original article: The Harsh Truths of Cybersecurity in 2022, Part II

Web Filtering and Compliances for Wi-Fi Providers

This article has been indexed from Threatpost Demand for public Wi-Fi is on the rise. Usually free of charge, but there is a risk of expensive losses. Learn ways to protect yourself from cyber-threats. Read the original article: Web Filtering…

The Art of Non-boring Cybersec Training–Podcast

This article has been indexed from Threatpost With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress…

Samsung Shattered Encryption on 100M Phones

This article has been indexed from Threatpost One cryptography expert said that ‘serious flaws’ in the way Samsung phones encrypt sensitive material, as revealed by academics, are ’embarrassingly bad.’ Read the original article: Samsung Shattered Encryption on 100M Phones

Sextortion Rears Its Ugly Head Again

This article has been indexed from Threatpost Attackers are sending email blasts with malware links in embedded PDFs as a way to evade email filters, lying about having fictional "video evidence." Read the original article: Sextortion Rears Its Ugly Head…

Creaky Old WannaCry, GandCrab Top the Ransomware Scene

This article has been indexed from Threatpost Nothing like zombie campaigns: WannaCry’s old as dirt, and GandCrab threw in the towel years ago. They’re on auto-pilot at this point, researchers say. Read the original article: Creaky Old WannaCry, GandCrab Top…

Gaming, Banking Trojans Dominate Mobile Malware Scene

This article has been indexed from Threatpost The overall number of attacks on mobile users is down, but they’re getting slicker, both in terms of malware functionality and vectors, researchers say. Read the original article: Gaming, Banking Trojans Dominate Mobile…

New Critical RCE Bug Found in Adobe Commerce, Magento

This article has been indexed from Threatpost Adobe updated its recent out-of-band security advisory to add another critical bug, while researchers put out a PoC for the one it emergency-fixed last weekend. Read the original article: New Critical RCE Bug…

Ukrainian DDoS Attacks Should Put US on Notice–Researchers

This article has been indexed from Threatpost On Tuesday, institutions central to Ukraine’s military and economy were hit with denial-of-service (DoS) attacks. Impact was limited, but the ramifications are not. Read the original article: Ukrainian DDoS Attacks Should Put US…

Microsoft Teams Targeted With Takeover Trojans

This article has been indexed from Threatpost Threat actors are infiltrating the increasingly popular collaboration app to attach malicious files to chat threads that drop system-hijacking malware. Read the original article: Microsoft Teams Targeted With Takeover Trojans

Emotet Now Spreading Through Malicious Excel Files

This article has been indexed from Threatpost An ongoing malicious email campaign that includes macro-laden files and multiple layers of obfuscation has been active since late December. Read the original article: Emotet Now Spreading Through Malicious Excel Files

Chrome Zero-Day Under Active Attack: Patch ASAP

This article has been indexed from Threatpost The year’s 1st Chrome zero-day can lead to all sorts of misery, ranging from data corruption to the execution of arbitrary code on vulnerable systems. Read the original article: Chrome Zero-Day Under Active…

TA2541: APT Has Been Shooting RATs at Aviation for Years

This article has been indexed from Threatpost Since 2017, the attacker has flung simple off-the-shelf malware in malicious email campaigns aimed at aviation, aerospace, transportation and defense. Read the original article: TA2541: APT Has Been Shooting RATs at Aviation for…

‘Cities: Skylines’ Modder Banned Over Hidden Malware

This article has been indexed from Threatpost 35K+ players were exposed to an auto-updater that planted a trojan that choked performance for fellow modders and Colossal Order employees. Read the original article: ‘Cities: Skylines’ Modder Banned Over Hidden Malware

Adobe: Zero-Day Magento 2 RCE Bug Under Active Attack

This article has been indexed from Threatpost The vendor issued an emergency fix on Sunday, and eCommerce websites should update ASAP to avoid Magecart card-skimming attacks and other problems. Read the original article: Adobe: Zero-Day Magento 2 RCE Bug Under…

Cybercrooks Frame Targets by Planting Fabricated Digital Evidence

This article has been indexed from Threatpost The ‘ModifiedElephant’ threat actors are technically unimpressive, but they’ve evaded detection for a decade, hacking human rights advocates’ systems with dusty old keyloggers and off-the-shelf RATs. Read the original article: Cybercrooks Frame Targets…

Apple Patches Actively Exploited WebKit Zero Day

This article has been indexed from Threatpost A memory issue affects myriad iPhone, iPad and MacOS devices and allows attackers to execute arbitrary code after processing malicious web content. Read the original article: Apple Patches Actively Exploited WebKit Zero Day

Sharp SIM-Swapping Spike Causes $68M in Losses

This article has been indexed from Threatpost The attacks, which lead to 2FA defeat and account takeover, have accelerated by several hundred percent in one year, leading to thousands of drained bank accounts. Read the original article: Sharp SIM-Swapping Spike…

SAP Patches Severe ‘ICMAD’ Bugs

This article has been indexed from Threatpost SAP’s Patch Tuesday brought fixes for a trio of flaws in the ubiquitous ICM component in internet-exposed apps. One of them, with a risk score of 10, could allow attackers to hijack identities,…

PHP Everywhere Bugs Put 30K+ WordPress Sites at Risk of RCE

This article has been indexed from Threatpost The plug-in’s default settings spawned flaws that could allow for full site takeover but have since been fixed in an update that users should immediately install, Wordfence researchers said. Read the original article:…

Ex-Gumshoe Nabs Cybercrooks with FBI Tactics

This article has been indexed from Threatpost Crane Hassold, former FBI analyst turned director of threat intel at Abnormal Security, shares stories from his covert work with cyberattackers. Read the original article: Ex-Gumshoe Nabs Cybercrooks with FBI Tactics

China Suspected of News Corp Cyberespionage Attack

This article has been indexed from Threatpost Attackers infiltrated the media giant’s network using BEC, while Microsoft moved to stop such attacks by blocking VBA macros in 5 Windows apps. Included: more ways to help stop BEC. Read the original…