Tag: Threatpost

URL Parsing Bugs Allow DoS, RCE, Spoofing & More

This article has been indexed from Threatpost Dangerous security bugs stemming from widespread inconsistencies among 16 popular third-party URL-parsing libraries could affect a wide swath of web applications. Read the original article: URL Parsing Bugs Allow DoS, RCE, Spoofing &…

EoL Systems Stonewalling Log4j Fixes for Fed Agencies

This article has been indexed from Threatpost End of life, end of support, pandemic-induced shipping delays and remote work, scanning failures: It’s a recipe for a patching nightmare, federal cyberserurity CTO Matt Keller says. Read the original article: EoL Systems…

Cyberattackers Hit Data of 80K Fertility Patients

This article has been indexed from Threatpost Fertility Centers of Illinois’ security measures protected electronic medical records, but the attackers still got at extremely intimate data in admin files. Read the original article: Cyberattackers Hit Data of 80K Fertility Patients

3.7M FlexBooker Records Dumped on Hacker Forum

This article has been indexed from Threatpost Attackers are trading millions of records from a trio of pre-holiday breaches on an online forum. Read the original article: 3.7M FlexBooker Records Dumped on Hacker Forum

QNAP: Get NAS Devices Off the Internet Now

This article has been indexed from Threatpost There are active ransomware and brute-force attacks being launched against internet-exposed, network-attached storage devices, the device maker warned. Read the original article: QNAP: Get NAS Devices Off the Internet Now

Attackers Exploit Flaw in Google Docs’ Comments Feature

This article has been indexed from Threatpost A wave of phishing attacks identified in December targeting mainly Outlook users are difficult for both email scanners and victims to flag, researchers said. Read the original article: Attackers Exploit Flaw in Google…

‘Elephant Beetle’ Lurks for Months in Networks

This article has been indexed from Threatpost The group blends into an environment before loading up trivial, thickly stacked, fraudulent financial transactions too tiny to be noticed but adding up to millions of dollars. Read the original article: ‘Elephant Beetle’…

FTC to Go After Companies that Ignore Log4j

This article has been indexed from Threatpost Companies that fail to protect secure consumer data from Log4J attacks are at risk of facing Equifax-esque legal action and fines, the FTC warned. Read the original article: FTC to Go After Companies…

‘Malsmoke’ Exploits Microsoft’s E-Signature Verification

This article has been indexed from Threatpost The info-stealing campaign using ZLoader malware – previously used to deliver Ryuk and Conti ransomware – already has claimed more than 2,000 victims across 111 countries. Read the original article: ‘Malsmoke’ Exploits Microsoft’s…

Microsoft Sees Rampant Log4j Exploit Attempts, Testing

This article has been indexed from Threatpost Microsoft says it’s only going to get worse: It’s seen state-sponsored and cyber-criminal attackers probing systems for the Log4Shell flaw through the end of December. Read the original article: Microsoft Sees Rampant Log4j…

Purple Fox Rootkit Dropped by Malicious Telegram Installers

This article has been indexed from Threatpost Multiple malicious installers were delivering the same Purple Fox rootkit version using the same attack chain, possibly distributed via email or phishing sites. Read the original article: Purple Fox Rootkit Dropped by Malicious…

5 Cybersecurity Trends to Watch in 2022

This article has been indexed from Threatpost Here’s what cybersecurity watchers want infosec pros to know heading into 2022. Read the original article: 5 Cybersecurity Trends to Watch in 2022

That Toy You Got for Christmas Could Be Spying on You

This article has been indexed from Threatpost Security flaws in the recently released Fisher-Price Chatter Bluetooth telephone can allow nearby attackers to spy on calls or communicate with children using the device. Read the original article: That Toy You Got…

2021 Wants Another Chance (A Lighter-Side Year in Review)

This article has been indexed from Threatpost The year wasn’t ALL bad news. These sometimes cringe-worthy/sometimes laughable cybersecurity and other technology stories offer schadenfreude and WTF opportunities, and some giggles. Read the original article: 2021 Wants Another Chance (A Lighter-Side…

4-Year-Old Microsoft Azure Zero-Day Exposes Web App Source Code

This article has been indexed from Threatpost The security vulnerability could expose passwords and access tokens, along with blueprints for internal infrastructure and finding software vulnerabilities. Read the original article: 4-Year-Old Microsoft Azure Zero-Day Exposes Web App Source Code

Telegram Abused to Steal Crypto-Wallet Credentials

This article has been indexed from Threatpost Attackers use the Telegram handle “Smokes Night” to spread the malicious Echelon infostealer, which steals credentials for cryptocurrency and other user accounts, researchers said. Read the original article: Telegram Abused to Steal Crypto-Wallet…

Critical Apache HTTPD Server Bugs Could Lead to RCE, DoS

This article has been indexed from Threatpost Don’t freak: It’s got nothing to do with Log4Shell, except it may be just as far-reaching as Log4j, given HTTPD’s tendency to tiptoe into software projects. Read the original article: Critical Apache HTTPD…

FBI: Another Zoho ManageEngine Zero-Day Under Active Attack

This article has been indexed from Threatpost APT attackers are using a security vulnerability in ManageEngine Desktop Central to take over servers, deliver malware and establish network persistence. Read the original article: FBI: Another Zoho ManageEngine Zero-Day Under Active Attack

Conti Ransomware Gang Has Full Log4Shell Attack Chain

This article has been indexed from Threatpost Conti has become the first professional-grade, sophisticated ransomware group to weaponize Log4j2, now with a full attack chain. Read the original article: Conti Ransomware Gang Has Full Log4Shell Attack Chain

Facebook Bans Spy-for-Hire Firms for Targeting 50K People

This article has been indexed from Threatpost Meta, Facebook’s parent company, said that the seven banned actors run fake accounts on its platforms to deceive users and plant malware on targets’ phones. Read the original article: Facebook Bans Spy-for-Hire Firms…

Brand-New Log4Shell Attack Vector Threatens Local Hosts

This article has been indexed from Threatpost The discovery, which affects services running as localhost that aren’t exposed to any network or the internet, vastly widens the scope of attack possibilities. Read the original article: Brand-New Log4Shell Attack Vector Threatens…

Convergence Ahoy: Get Ready for Cloud-Based Ransomware

This article has been indexed from Threatpost Oliver Tavakoli, CTO at Vectra AI, takes us inside the coming nexus of ransomware, supply-chain attacks and cloud deployments. Read the original article: Convergence Ahoy: Get Ready for Cloud-Based Ransomware

Conti Gang Suspected of Ransomware Attack on McMenamins

This article has been indexed from Threatpost The incident occurred last weekend at the popular chain of restaurants, hotels and breweries, which is still facing disruptions. Read the original article: Conti Gang Suspected of Ransomware Attack on McMenamins

‘PseudoManuscrypt’ Mass Spyware Campaign Targets 35K Systems

This article has been indexed from Threatpost It’s similar to Lazarus’s Manuscrypt malware, but the new spyware is splattering itself onto government organizations and ICS in a non-Lazarus-like, untargeted wave of attacks. Read the original article: ‘PseudoManuscrypt’ Mass Spyware Campaign…

‘DarkWatchman’ RAT Shows Evolution in Fileless Malware

This article has been indexed from Threatpost The new tool manipulates Windows Registry in unique ways to evade security detections and is likely being used by ransomware groups for initial network access. Read the original article: ‘DarkWatchman’ RAT Shows Evolution…

Malicious Exchange Server Module Hoovers Up Outlook Credentials

This article has been indexed from Threatpost “Owowa” stealthily lurks on IIS servers, waiting to harvest successful logins when an Outlook Web Access (OWA) authentication request is made. Read the original article: Malicious Exchange Server Module Hoovers Up Outlook Credentials

SAP Kicks Log4Shell Vulnerability Out of 20 Apps

This article has been indexed from Threatpost SAP’s still feverishly working to patch another 12 apps vulnerable to the Log4Shell flaw, while its Patch Tuesday release includes 21 other fixes, some rated at 9.9 criticality. Read the original article: SAP…

Apache’s Fix for Log4Shell Can Lead to DoS Attacks

This article has been indexed from Threatpost Not only is the jaw-dropping flaw in the Apache Log4j logging library ubiquitous; Apache’s blanket of a quickly baked patch for Log4Shell also has holes. Read the original article: Apache’s Fix for Log4Shell…

400 Banks’ Customers Targeted with Anubis Trojan

This article has been indexed from Threatpost The new campaign masqueraded as an Orange Telecom account management app to deliver the latest iteration of Anubis banking malware. Read the original article: 400 Banks’ Customers Targeted with Anubis Trojan

What the Log4Shell Bug Means for SMBs: Experts Weigh In

This article has been indexed from Threatpost An exclusive roundtable of security researchers discuss the specific implications of CVE-2021-44228 for smaller businesses, including what’s vulnerable, what an attack looks like and to how to remediate. Read the original article: What…

How to Buy Precious Patching Time as Log4j Exploits Fly

This article has been indexed from Threatpost Podcast: Cybereason shares details about its vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show being disclosed. Read the original article: How to Buy Precious…

‘Seedworm’ Attackers Target Telcos in Asia, Middle East

This article has been indexed from Threatpost The focused attacks aimed at cyberespionage and lateral movement appear to hint at further ambitions by the group, including supply-chain threats. Read the original article: ‘Seedworm’ Attackers Target Telcos in Asia, Middle East

Kronos Ransomware Outage Drives Widespread Payroll Chaos

This article has been indexed from Threatpost Kronos, the workforce-management provider, said a weeks-long outage of its cloud services is in the offing, just in time to hamstring end-of-year HR activities like bonuses ands vacation tracking. Read the original article:…

Log4Shell Is Spawning Even Nastier Mutations

This article has been indexed from Threatpost The cybersecurity Hiroshima of the year – the Apache Log4j logging library exploit – has spun off 60 bigger mutations in less than a day, researchers said. Read the original article: Log4Shell Is…

Next-Gen Maldocs & How to Solve the Human Vulnerability

This article has been indexed from Threatpost Malicious email attachments with macros are one of the most common ways hackers get in through the door. Huntress security researcher John Hammond discusses how threat hunters can fight back. Read the original…

Zero Day in Ubiquitous Apache Log4j Tool Under Active Attack

This article has been indexed from Threatpost The Log4Shell vulnerability critically threatens anybody using the popular open-source Apache Struts framework and could lead to a “Mini internet meltdown soonish.” Read the original article: Zero Day in Ubiquitous Apache Log4j Tool…

How MikroTik Routers Became a Cybercriminal Target

This article has been indexed from Threatpost The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said. Read the original article: How MikroTik Routers…

Not with a Bang but a Whisper: The Shift to Stealthy C2

This article has been indexed from Threatpost DoH! Nate Warfield, CTO of Prevailion, discusses new stealth tactics threat actors are using for C2, including Malleable C2 from Cobalt Strike’s arsenal. Read the original article: Not with a Bang but a…

AWS Among 12 Cloud Services Affected by Flaws in Eltima SDK

This article has been indexed from Threatpost Researchers have found a number of high-security vulnerabilities in third-party driver software – bugs that originated in a library created by network virtualization firm Eltima – that leave about a dozen cloud services…

Windows 10 Drive-By RCE Triggered by Default URI Handler

This article has been indexed from Threatpost There’s an argument injection weakness in the Windows 10/11 default handler, researchers said: an issue that Microsoft has only partially fixed. Read the original article: Windows 10 Drive-By RCE Triggered by Default URI…

SolarWinds Attackers Spotted Using New Tactics, Malware

This article has been indexed from Threatpost One year after the disruptive supply-chain attacks, researchers have observed two new clusters of activity from the Russia-based actors that signal a significant threat may be brewing. Read the original article: SolarWinds Attackers…

Crypto-Exchange BitMart to Pay Users for $200M Theft

This article has been indexed from Threatpost BitMart confirmed it had been drained of ~$150 million in cryptocurrency assets, but a blockchain security firm said it’s closer to $200 million. Read the original article: Crypto-Exchange BitMart to Pay Users for…

Are You Guilty of These 8 Network-Security Bad Practices?

This article has been indexed from Threatpost Tony Lauro, director of Security Technology & Strategy at Akamai, discusses VPNs, RDP, flat networks, BYOD and other network-security bugbears. Read the original article: Are You Guilty of These 8 Network-Security Bad Practices?

Cuba Ransomware Gang Hauls in $44M in Payouts

This article has been indexed from Threatpost The gang is using a variety of tools and malware to carry out attacks in volume on critical sectors, the FBI warned. Read the original article: Cuba Ransomware Gang Hauls in $44M in…

Pegasus Spyware Infects U.S. State Department iPhones

This article has been indexed from Threatpost It’s unknown who’s behind the cyberattacks against at least nine employees’ iPhones, who are all involved in Ugandan diplomacy. Read the original article: Pegasus Spyware Infects U.S. State Department iPhones

Omicron Phishing Scam Already Spotted in UK

This article has been indexed from Threatpost Omicron COVID-19 variant anxiety inspires new phishing scam offering fake NHS tests to steal data. Read the original article: Omicron Phishing Scam Already Spotted in UK

Threat Group Takes Aim Again at Cloud Platform Provider Zoho

This article has been indexed from Threatpost Attackers that previously targeted the cloud platform provider have shifted their focus to additional products in the company’s portfolio. Read the original article: Threat Group Takes Aim Again at Cloud Platform Provider Zoho