YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Iranian #cyberespionage group Charming Kitten is using fake webinars and a new '#BASICSTAR' backdoor to target experts in Middle Eastern policy.

https://thehackernews.com/2024/02/iranian-hackers-target-middle-east.html

#cybersecurity #hacking #malware

simontsui, to random

Check Point highlights the persistent threat of malicious Word/Excel Documents (maldocs):

  • Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802.
  • Widespread Use by Cybercriminals: These vulnerabilities are exploited by well-known malware such as GuLoader, Agent Tesla, Formbook, and others. APT groups also got on the list, with Gamaredon APT being a notable example. They target lucrative sectors like finance, government, and healthcare, indicating a strategic approach by attackers.
  • Challenges in Detection: Despite their age, these MalDocs can evade detection due to their sophisticated construction and the use of various tricks to bypass security measures.

🔗 https://blog.checkpoint.com/security/maldocs-in-word-and-excel-a-persistent-cybersecurity-challenge/

#maldoc #cyberthreatintelligence #CVE #malware #APT #cybercrime #cyberespionage

simontsui, to news

The Record: Chinese state-sponsored hackers broke into an internal computer network used by the Dutch Ministry of Defence last year, according to the Netherlands. Both the country’s military (MIVD) and civilian (AIVD) security services said the ministry had been hacked for espionage purposes after the threat actor exploited a vulnerability in FortiGate devices.
🔗 https://therecord.media/dutch-find-chinese-hackers-networks-fortinet

simontsui, to random

Cloudflare blog on Thanksgiving 2023 security incident:

"Based on our collaboration with colleagues in the industry and government, we believe that this attack was performed by a nation state attacker with the goal of obtaining persistent and widespread access to Cloudflare’s global network."

The attack started in October with the compromise of Okta, but the threat actor only began targeting our systems using those credentials from the Okta compromise in mid-November.
🔗 https://blog.cloudflare.com/thanksgiving-2023-security-incident

simontsui, to Russia

The Record: Hackers working for Russia’s intelligence services (Star Blizzard is attributed to FSB Center 18) are impersonating researchers and academics in an ongoing campaign to gain access to their colleagues’ email accounts, according to messages and files seen by Recorded Future News and independently analyzed by two cybersecurity companies.
🔗 https://therecord.media/russian-campaign-impersonating-western-researchers-academics

#Russia #cyberespionage #news #StarBlizzard #FSB #thinktank

simontsui, to Ukraine

Ukraine's CERT-UA provides IOC and technical instructions for removing DIRTYMOE malware, which has worm-like capabilities and creates a DDoS botnet. The DIRTYMOE/Purple Fox infection of 2000+ affected computers and activity is tracked by the identifier UAC-0027.
🔗https://cert.gov.ua/article/6277422

#Ukraine #CERTUA #UAC0027 #cyberespionage #DIRTYMOE #PurpleFox #malware #IOC #threatintel

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🕵️‍♂️ #Russian state-backed #APT29 hacker group breached HP Enterprise's cloud emails, stealing confidential data from cybersecurity and key departments.

https://thehackernews.com/2024/01/tech-giant-hp-enterprise-hacked-by.html

The breach remained undetected for over 6 months.

#cyberespionage #cybersecurity

simontsui, to vmware

CISA adds CVE-2023-34048 (9.8 critical, disclosed 25 October 2023 by VMware, reported by Mandiant as exploited as a zero-day since 2021) VMware vCenter Server Out-of-Bounds Write Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 https://www.cisa.gov/news-events/alerts/2024/01/22/cisa-adds-one-known-exploited-vulnerability-catalog

#CVE202334048 #VMware #CISA #KEV #eitw #activeexploitation #Mandiant #UNC3886 #cyberespionage #vCenter #zeroday #vulnerability #cybersecurity

simontsui, to microsoft

Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, Mint Sandstorm used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files. In a handful of cases, Microsoft observed new post-intrusion tradecraft including the use of a new, custom backdoor called MediaPl.
🔗 https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/

Freemind, to Cybersecurity
@Freemind@mastodon.online avatar

This backdoor was previously disclosed by CERT-UA in attacks targeting critical infrastructure in Ukraine.

#Cybersecurity #Russia #APT28 #cyberespionage #HackerGroup

https://cybersec84.wordpress.com/2023/12/13/apt28-cyber-espionage-escalates-russian-hackers-target-13-nations/

simontsui, to Russia

The Guardian reports that the UK's nuclear site Sellafield has been hacked into by cyber groups closely linked to Russia and China. They do not identify which groups.
🔗 https://www.theguardian.com/business/2023/dec/04/sellafield-nuclear-site-hacked-groups-russia-china

#Sellafield #Russia #China #nuclear #cyberespionage #cybersecuritynews

simontsui, to random

BlackBerry reported on a new commercial cyberespionage group called AeroBlade specifically targeting the U.S. Aerospace industry. With network infrastructure and weaponization that became operational in September 2022 and an offensive phase that began July 2023, this threat actor has improved their toolset for successful data exfiltration. IOC provided.
🔗 https://blogs.blackberry.com/en/2023/11/aeroblade-on-the-hunt-targeting-us-aerospace-industry

#cyberespionage #AeroBlade #threatintel #IOC

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

➝ 🔓 🇯🇵 confirms breach after Medusa threatens to leak data
➝ 🇺🇸 😂 Ransomware gang files complaint over victim’s undisclosed
➝ 🔓 🪶 Attackers claim Plume Design, Inc data breach
➝ 🇺🇸 💰 paid ransom after hack that disrupted markets, say
➝ 🔓 Says No Evidence of Breach After Ransomware Gang Claims Hack via Third Party
➝ 🔓 ✈️ Hackers swipe Booking.com, damage from attack is global
➝ 🇷🇺 🇺🇦 Russian Group Deploys USB in Targeted Attacks
➝ 🇮🇱 🇺🇸 Israeli Man Who Made $5M From Hacking Scheme Sentenced to Prison in US
➝ 🇫🇮 ⚖️ Alleged Extortioner of Psychotherapy Patients Faces Trial
➝ 🇺🇸 💸 ransomware exploits in attacks, 10K servers exposed
➝ 🇺🇸 ⚖️ botnet with 23,000 proxies for malicious traffic dismantled
➝ 👶🏻 🧨 Teens with “digital bazookas” are winning the ransomware war, researcher laments
➝ 💸 feature abused to steal $60 million from 99K victims
➝ 🇩🇰 🇷🇺 Hit With Largest on Record
➝ 🇨🇳 🇰🇭 Chinese Hackers Launch Covert Attacks on 24 Cambodian Organizations
➝ 🇲🇾 Major Phishing-as-a-Service Syndicate '' Dismantled by Malaysian Authorities
➝ 🇪🇺 🥳 EU Parliament committee rejects mass scanning of private and encrypted communications
➝ 🩹 Patch Tuesday: 90 Vulnerabilities Addressed by Siemens and Schneider Electric
➝ 🦠 🐍 27 Malicious Packages with Thousands of Downloads Found Targeting IT Experts
🇻🇳 🇮🇳 Vietnamese Hackers Using New -Powered to Target Indian Marketers
➝ 🔐 Adds Support to New Titan Security Key
➝ 🐛 Zero-Day Flaw in Email Software Exploited by Four Hacker Groups
➝ 🩹 Patches Critical Vulnerability in Business One Product
➝ 🐛 New CPU flaw impacts Intel desktop and server systems
➝ 🐛 New AMD attack lets hackers gain root in Linux VMs

📚 This week's recommended reading is: "Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World" by @marcusjcarey and Jennifer Jin

Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-462023

simontsui, to Futurology

Censys assesses that Russian company Raccoon Security is a brand of NTC Vulkan, an IT company contracted by Russian intelligence to create offensive cyber tools. NTC Vulkan documents were leaked, and they detail project requirements contracted with the Russian Ministry of Defense, including in at least one instance for GRU Unit 74455, also known as Sandworm Team, according to Mandiant. Censys assesses with high confidence that the NTC Vulkan hosts, certificates, and domains identified in this report belong to the same NTC Vulkan, and that Raccoon Security, and its related domains, host, and certificates belong to the Moscow-based cybersecurity development brand of the same name.
Links: https://censys.com/discovery-of-ntc-vulkan-infrastructure/ and see semi-related Mandiant article.

#NTCVulkan #RaccoonSecurity #leak #intelligence #cyberthreatintelligence #cyberespionage #threatintel #Russia #UkraineRussiaWar #Sandworm

simontsui, to Russia

Denmark's CERT (SektorCERT) reported that 22 companies that operate parts of Danish energy infrastructure were compromised in a May 2023 coordinated attack, linked to SANDWORM actors. Sandworm is a state-sponsored APT publicly attributed to Russian General Staff Main Intelligence Directorate’s Russian (GRU’s) Main Centre for Special Technologies (GTsST) by the U.S. government. The attackers leveraged a Zyxel vulnerability CVE-2023-28771 (9.8 critical) to gain control of the firewall. SektorCERT's incident response report includes a detailed analysis and timeline of the attack, recommendations and IOC.
Link: https://media.licdn.com/dms/document/media/D4D1FAQG-Qsry8BH9dg/feedshare-document-pdf-analyzed/0/1699785104486?e=1700697600&v=beta&t=icNMQ-rDYgeSojoaax-1KpC7YrCF7MVtkrDClSFiKIY

#cyberespionage #GRU #SANDWORM #Russia #Denmark #criticalinfrastructure #APT #threatintel #IOC #CVE202328771 #Zyxel

simontsui, to asd

The Australian Cyber Security Centre (ACSC) Australian Signals Directorate (ASD) released the ASD Cyber Threat Report 2022-2023. Their executive summary notes that Australian networks were regularly targeted by both opportunistic and more deliberate malicious cyber activity.

  • State actors focused on critical infrastructure, data theft, and disruption of business. Notably "The AUKUS partnership, with its focus on nuclear submarines and other advanced military capabilities, is likely a target for state actors looking to steal intellectual property for their own military programs." They call out China and Russia specifically.
  • Australian critical infrastructure was targeted via increasingly interconnected systems.
  • Cybercriminals continued to adapt tactics to extract maximum payment from victims.
  • Data breaches impacted many Australians.
  • 1 in 5 critical vulnerabilities was exploited within 48 hours.

Link: https://www.cyber.gov.au/about-us/reports-and-statistics/asd-cyber-threat-report-july-2022-june-2023

simontsui, to China

Recorded Future: Chinese state-sponsored cyber operations have evolved into a more mature and coordinated threat, focusing on exploiting both known and zero-day vulnerabilities in public-facing security and network appliances. Their cyber operations focus on targets that align with China's military, political, economic, and domestic security priorities. No IOCs.
Link: https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power

simontsui, to microsoft

Microsoft announces "Secure Future Initiative" (SFI) to combat cybercriminals and nation-state attackers in a changing threat landscape. They intend to apply an AI-based cyber defense.
Link: https://blogs.microsoft.com/on-the-issues/2023/11/02/secure-future-initiative-sfi-cybersecurity-cyberattacks/

#Microsoft #SecureFutureInitiative #SFI #cybercrime #cyberespionage #APT #pressrelease

simontsui, to Russia

Unit 42 reported on the Kazuar .NET backdoor used by Turla (attributed to Russia's Federal Security Service (FSB)) as a second stage payload. Unit 42 provides a technical analysis of Kazuar, including metadata, configuration, infrastructure and C2 communication. Also noteworthy are its anti-analysis features, system profiling capabilities, and specific targeting of cloud apps. IOC provided.
Link: https://unit42.paloaltonetworks.com/pensive-ursa-uses-upgraded-kazuar-backdoor/

simontsui, (edited ) to random

CISA adds CVE-2023-5631 (Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability, CVSS 5.4 medium severity, disclosed by ESET as an exploited zero-day by APT Winter Vivern) to the Known Exploited Vulnerabilities Catalog.

#CISA #KEV #eitw #KnownExploitedVulnerabilitiesCatalog #CVE20235631 #Roundcube #WinterVivern #APT #cyberespionage #vulnerability #zeroday

simontsui, to China

Security Week: Mandiant’s Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon. This Chinese state-sponsored APT targeted critical infrastructure in Guam and in the U.S.
Link: https://www.securityweek.com/mandiant-intelligence-chief-raises-alarm-over-chinas-volt-typhoon-hackers-in-us-critical-infrastructure/

#China #PRC #APT #cybersecuritynews #VoltTyphoon #cyberespionage #Guam #criticalinfrastructure

simontsui, to apple

Kaspersky elaborates on Operation Triangulation in which domestic subscribers, diplomatic missions, and embassies were targeted with Apple iOS zero-days (Russia’s FSB accused the USA for Operation Triangulation). The threat actors introduced two validators in the infection chain in order to ensure that the exploits and the implant do not get delivered to security researchers. Additionally, microphone recording could be tuned in such a way that it stopped when the screen was being used. They used private undocumented APIs in the course of the attack, indicating a great understanding of iOS internals. They additionally implemented in some modules support for iOS versions prior to 8.0, suggesting access for years.
Link: https://securelist.com/triangulation-validators-modules/110847/

simontsui, to Discord

Trellix: Threat actors, including APTs, are abusing the Discord application for payload delivery, information stealing and data exfiltration. Trellix identified several malware families leveraging Discord's capabilities to conduct their operations, uncovering when they started abusing them. IOC provided.
Link: https://www.trellix.com/en-us/about/newsroom/stories/research/discord-i-want-to-play-a-game.html

Tags:

simontsui, to random

Cluster25: low-medium confidence that Russian state-sponsored APT28 Fancy Bear attributed to CVE-2023-38831 exploitation as part of a phishing campaign designed to harvest credentials from compromised systems. CVE2-2023-38831 is a 7.8 high severity vulnerability in WinRAR that was exploited as a Zero-Day by cybercriminals, and disclosed by Group-IB on 23 August 2023.
Link: https://blog.cluster25.duskrise.com/2023/10/12/cve-2023-38831-russian-attack

Tags:

simontsui, to random

**Symantec:**new APT Grayling targets Taiwanese organizations in manufacturing, IT, and biomedical... as well as Pacific Island government org, Vietnam and U.S. orgs. Activity from February to May 2023. They exploit public facing applications, use DLL side-loading, and load custom malware and multiple publicly available tools. IOC provided.
Link: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/grayling-taiwan-cyber-attacks

Tags: #APT #cyberespionage #IOC #Grayling

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines