0x58, to Cybersecurity

๐Ÿ“จ Latest issue of my curated #cybersecurity and #infosec list of resources for week #35/2023 is out! It includes the following and much more:

โž ๐Ÿ”“ ๐ŸŒ๐Ÿปโ€โ™‚๏ธGolf gear giant #Callaway data breach exposes info of 1.1 million
โž ๐Ÿ”“๐Ÿ‘• Forever 21 data breach affects half a million people
โž ๐Ÿ”“ ๐Ÿคฆ๐Ÿปโ€โ™‚๏ธ #LogicMonitor customers hit by hackers, because of default passwords
โž ๐Ÿ‡บ๐Ÿ‡ธ โš–๏ธ Lawsuit Accuses University of Minnesota of Not Doing Enough to Prevent #DataBreach
โž ๐ŸŽฌ ๐Ÿ”“ #Paramount discloses data breach following security incident
โž ๐Ÿฅ ๐Ÿ”“ #Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs
โž ๐Ÿ‡บ๐Ÿ‡ธ ๐ŸŒŽ #Microsoft joins a growing chorus of organizations criticizing a #UN cybercrime treaty
โž ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿฆ  U.S. Hacks #QakBot, Quietly Removes Botnet Infections
โž ๐Ÿ‡ท๐Ÿ‡บ ๐Ÿ‡บ๐Ÿ‡ฆ #Russia targets #Ukraine with new Android #backdoor, intel agencies say
โž ๐Ÿ‡ท๐Ÿ‡บ ๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ Unmasking #Trickbot, One of the Worldโ€™s Top Cybercrime Gangs
โž ๐Ÿ‡จ๐Ÿ‡ณ ๐Ÿ‘€ โ€˜Earth Estriesโ€™ #Cyberespionage Group Targets Government, Tech Sectors
โž ๐Ÿ‡จ๐Ÿ‡ณ Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and Telecom
โž ๐Ÿ’ธ ๐Ÿ‡ช๐Ÿ‡บ Pay our ransom instead of a #GDPR fine, #cybercrime gang tells its targets
โž ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ณ #Meta: Pro-Chinese influence operation was the largest in history
โž ๐Ÿ‡ช๐Ÿ‡ธ ๐Ÿ“ธ Spain warns of #LockBit Locker ransomware phishing attacks
โž ๐Ÿ‡ต๐Ÿ‡ฑ ๐Ÿš‚ Two Men Arrested Following #Poland Railway Hacking
โž ๐Ÿ‡ฐ๐Ÿ‡ต ๐Ÿ #Lazarus hackers deploy fake #VMware PyPI packages in #VMConnect attacks
โž ๐Ÿ’ธ #Classiscam fraud-as-a-service expands, now targets banks and 251 brands
โž ๐Ÿ’ฌ ๐ŸŽ  Trojanized #Signal and #Telegram apps on Google Play delivered spyware
โž ๐Ÿฆ  ๐Ÿ“„ MalDoc in PDFs: Hiding malicious Word docs in PDF files
โž ๐Ÿ‡ง๐Ÿ‡ท ๐Ÿ‘€ A Brazilian phone #spyware was hacked and victimsโ€™ devices โ€˜deletedโ€™ from server
โž ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป ๐Ÿ” #GitHub Enterprise Server Gets New Security Capabilities
โž ๐Ÿš— ๐Ÿ’ฐ Over $1 Million Offered at New #Pwn2Own #Automotive Hacking Contest
โž ๐Ÿฉน #Splunk Patches High-Severity Flaws in Enterprise, IT Service Intelligence
โž โ›๏ธ ๐Ÿ”“ Recent #Juniper Flaws Chained in Attacks Following #PoC Exploit Publication

๐Ÿ“š This week's recommended reading is: "Spam Nation: The Inside Story of Organized Cybercrimeโ€•from Global Epidemic to Your Front Door" by @briankrebs

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end โฌ‡๏ธ

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-352023

0x58, to Cybersecurity

๐Ÿ“จ Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

โž ๐Ÿ”“ ๐Ÿ‡ฏ๐Ÿ‡ต confirms breach after Medusa threatens to leak data
โž ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ˜‚ Ransomware gang files complaint over victimโ€™s undisclosed
โž ๐Ÿ”“ ๐Ÿชถ Attackers claim Plume Design, Inc data breach
โž ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ’ฐ paid ransom after hack that disrupted markets, say
โž ๐Ÿ”“ Says No Evidence of Breach After Ransomware Gang Claims Hack via Third Party
โž ๐Ÿ”“ โœˆ๏ธ Hackers swipe Booking.com, damage from attack is global
โž ๐Ÿ‡ท๐Ÿ‡บ ๐Ÿ‡บ๐Ÿ‡ฆ Russian Group Deploys USB in Targeted Attacks
โž ๐Ÿ‡ฎ๐Ÿ‡ฑ ๐Ÿ‡บ๐Ÿ‡ธ Israeli Man Who Made $5M From Hacking Scheme Sentenced to Prison in US
โž ๐Ÿ‡ซ๐Ÿ‡ฎ โš–๏ธ Alleged Extortioner of Psychotherapy Patients Faces Trial
โž ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ’ธ ransomware exploits in attacks, 10K servers exposed
โž ๐Ÿ‡บ๐Ÿ‡ธ โš–๏ธ botnet with 23,000 proxies for malicious traffic dismantled
โž ๐Ÿ‘ถ๐Ÿป ๐Ÿงจ Teens with โ€œdigital bazookasโ€ are winning the ransomware war, researcher laments
โž ๐Ÿ’ธ feature abused to steal $60 million from 99K victims
โž ๐Ÿ‡ฉ๐Ÿ‡ฐ ๐Ÿ‡ท๐Ÿ‡บ Hit With Largest on Record
โž ๐Ÿ‡จ๐Ÿ‡ณ ๐Ÿ‡ฐ๐Ÿ‡ญ Chinese Hackers Launch Covert Attacks on 24 Cambodian Organizations
โž ๐Ÿ‡ฒ๐Ÿ‡พ Major Phishing-as-a-Service Syndicate '' Dismantled by Malaysian Authorities
โž ๐Ÿ‡ช๐Ÿ‡บ ๐Ÿฅณ EU Parliament committee rejects mass scanning of private and encrypted communications
โž ๐Ÿฉน Patch Tuesday: 90 Vulnerabilities Addressed by Siemens and Schneider Electric
โž ๐Ÿฆ  ๐Ÿ 27 Malicious Packages with Thousands of Downloads Found Targeting IT Experts
๐Ÿ‡ป๐Ÿ‡ณ ๐Ÿ‡ฎ๐Ÿ‡ณ Vietnamese Hackers Using New -Powered to Target Indian Marketers
โž ๐Ÿ” Adds Support to New Titan Security Key
โž ๐Ÿ› Zero-Day Flaw in Email Software Exploited by Four Hacker Groups
โž ๐Ÿฉน Patches Critical Vulnerability in Business One Product
โž ๐Ÿ› New CPU flaw impacts Intel desktop and server systems
โž ๐Ÿ› New AMD attack lets hackers gain root in Linux VMs

๐Ÿ“š This week's recommended reading is: "Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World" by @marcusjcarey and Jennifer Jin

Subscribe to the newsletter to have it piping hot in your inbox every week-end โฌ‡๏ธ

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-462023

ChristinaLekati, to infosec

Germany's domestic intelligence apparatus (BfV), South Korea's National Intelligence Service (NIS) and the U.S. National Security Agency (NSA) warn about cyber attacks mounted by a threat actor tracked as Kimsuky, using #socialengineering and #malware to target think tanks, academia, and news media sectors.

"Kimsuky has been observed leveraging open source information ( #OSINT ) to identify potential targets of interest and subsequently craft their online personas to appear more legitimate by creating email addresses that resemble email addresses of real individuals they seek to impersonate.

The adoption of spoofed identities is a tactic embraced by other state-sponsored groups and is seen as a ploy to gain trust and build rapport with the victims. The adversary is also known to compromise the email accounts of the impersonated individuals to concoct convincing email messages.

#Kimsuky actors tailor their themes to their target's interests and will update their content to reflect current events discussed among the community of North Korea watchers.

Besides using multiple personas to communicate with a target, the electronic missives come with bearing with password-protected malicious documents, either attached directly or hosted on Google Drive or Microsoft OneDrive."

To read the full article (from @thehackernews):

https://thehackernews.com/2023/06/north-koreas-kimsuky-group-mimics-key.html?m=1

#cyber #opensourceintelligence #intelligence #nationalsecurity #cybersecurity #cybersecurityawareness #cybersecuritytraining #infosec #threatintelligence #threatintel #phishing #phishingattacks #cyberespionage #espionage

simontsui, to random

Check Point highlights the persistent threat of malicious Word/Excel Documents (maldocs):

  • Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802.
  • Widespread Use by Cybercriminals: These vulnerabilities are exploited by well-known malware such as GuLoader, Agent Tesla, Formbook, and others. APT groups also got on the list, with Gamaredon APT being a notable example. They target lucrative sectors like finance, government, and healthcare, indicating a strategic approach by attackers.
  • Challenges in Detection: Despite their age, these MalDocs can evade detection due to their sophisticated construction and the use of various tricks to bypass security measures.

๐Ÿ”— https://blog.checkpoint.com/security/maldocs-in-word-and-excel-a-persistent-cybersecurity-challenge/

#maldoc #cyberthreatintelligence #CVE #malware #APT #cybercrime #cyberespionage

simontsui, to asd

The Australian Cyber Security Centre (ACSC) Australian Signals Directorate (ASD) released the ASD Cyber Threat Report 2022-2023. Their executive summary notes that Australian networks were regularly targeted by both opportunistic and more deliberate malicious cyber activity.

  • State actors focused on critical infrastructure, data theft, and disruption of business. Notably "The AUKUS partnership, with its focus on nuclear submarines and other advanced military capabilities, is likely a target for state actors looking to steal intellectual property for their own military programs." They call out China and Russia specifically.
  • Australian critical infrastructure was targeted via increasingly interconnected systems.
  • Cybercriminals continued to adapt tactics to extract maximum payment from victims.
  • Data breaches impacted many Australians.
  • 1 in 5 critical vulnerabilities was exploited within 48 hours.

Link: https://www.cyber.gov.au/about-us/reports-and-statistics/asd-cyber-threat-report-july-2022-june-2023

Nonilex, to China
@Nonilex@masto.ai avatar

A trove of leaked docs from a state-linked grp shows that Beijingโ€™s & grps are attempting large-scale, systematic intrusions against foreign , & โ€” w/ of one company claiming to be able to target users of , & .


https://www.washingtonpost.com/world/2024/02/21/china-hacking-leak-documents-isoon/

Nonilex,
@Nonilex@masto.ai avatar

The cache โ€” containing >570 files, images & chat logs โ€” offers an unprecedented look inside the ops of one of the firms that #Chinaโ€™s govt agencies hire for on-demand, mass #data-collecting ops.
The files โ€” posted to GitHubโ€ฆ& deemed credible by #cybersecurity expertsโ€ฆโ€” detail contracts to extract foreign data over 8 yrs & describe targets w/in โ‰ฅ20 foreign govts & territories, including India, Hong Kong, Thailand, South Korea, the United Kingdom, Taiwan & Malaysiaโ€ฆ.

#cyberespionage #security

simontsui, to random

**Symantec:**new APT Grayling targets Taiwanese organizations in manufacturing, IT, and biomedical... as well as Pacific Island government org, Vietnam and U.S. orgs. Activity from February to May 2023. They exploit public facing applications, use DLL side-loading, and load custom malware and multiple publicly available tools. IOC provided.
Link: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/grayling-taiwan-cyber-attacks

Tags: #APT #cyberespionage #IOC #Grayling

0x58, to Cybersecurity

๐Ÿ“จ Latest issue of my curated #cybersecurity and #infosec list of resources for week #38/2023 is out! It includes the following and much more:

โž ๐Ÿ”“ โŒ TransUnion Denies #Breach After Hacker Publishes Allegedly Stolen Data
โž ๐Ÿ”“ โš–๏ธ Hackers breached International Criminal Courtโ€™s systems last week
โž ๐Ÿ”“ ๐Ÿค– #Microsoft #AI researchers accidentally exposed terabytes of internal sensitive data
โž ๐Ÿฆ  ๐Ÿ’ธ #BlackCat #ransomware hits #Azure Storage with #Sphynx encryptor
โž ๐Ÿ‡ฎ๐Ÿ‡ท ๐Ÿ‡ฎ๐Ÿ‡ฑ Iranian Nation-State Actor OilRig Targets Israeli Organizations
โž ๐Ÿ‡ฎ๐Ÿ‡ณ #India's biggest tech centers named as #cybercrime hotspots
โž ๐Ÿ‡ซ๐Ÿ‡ฎ ๐Ÿ’Š Finnish Authorities Dismantle Notorious #PIILOPUOTI Dark Web Drug Marketplace
โž ๐Ÿ‡จ๐Ÿ‡ฆ ๐Ÿ‡ท๐Ÿ‡บ Canadian Government Targeted With #DDoS Attacks by Pro-#Russia Group
โž ๐Ÿ‡จ๐Ÿ‡ณ ๐Ÿ‡บ๐Ÿ‡ธ #China Accuses U.S. of Decade-Long #Cyberespionage Campaign Against #Huawei Servers
โž ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ณ China's Malicious Cyber Activity Informing War Preparations, #Pentagon Says
โž ๐Ÿ‡จ๐Ÿ‡ณ ๐Ÿฆ  New #SprySOCKS Linux #malware used in cyber espionage attacks
โž ๐Ÿ‡ฌ๐Ÿ‡ง ๐Ÿ” UK Minister Warns #Meta Over End-to-End Encryption
โž ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡ท๐Ÿ‡บ One of the #FBIโ€™s most wanted hackers is trolling the U.S. government
โž ๐Ÿฆ  ๐Ÿฅธ Fake #WinRAR proof-of-concept exploit drops #VenomRAT malware
โž ๐Ÿฆ  ๐Ÿ“ˆ #P2PInfect botnet activity surges 600x with stealthier malware variants
โž ๐Ÿฆ  ๐Ÿ“ก Hackers backdoor #telecom providers with new HTTPSnoop malware
โž ๐Ÿฆ  ๐Ÿ #Bumblebee malware returns in new attacks abusing #WebDAV folders
โž ๐Ÿ” #GitHub launches #passkey support into general availability
โž โ˜‘๏ธ ๐Ÿง Free Download Manager releases script to check for #Linux malware
โž ๐Ÿ’ฌ ๐Ÿ” #Signal adds quantum-resistant encryption to its #E2EE messaging protocol
โž ๐Ÿ ๐Ÿ” #iOS 17 includes these new security and #privacy features
โž ๐Ÿฉน High-Severity Flaws Uncovered in #Atlassian Products and ISC BIND Server
โž ๐Ÿฉน ๐Ÿ˜ก Incomplete disclosures by #Apple and #Google create โ€œhuge blindspotโ€ for 0-day hunters
โž ๐Ÿ ๐Ÿฉน Apple emergency updates fix 3 new zero-days exploited in attacks
โž ๐Ÿฉน #TrendMicro fixes #endpoint protection zero-day used in attacks
โž ๐Ÿฉน #Fortinet Patches High-Severity #Vulnerabilities in FortiOS, FortiProxy, FortiWeb Products
โž ๐Ÿ”“ Nearly 12,000 #Juniper #Firewalls Found Vulnerable to Recently Disclosed RCE Vulnerability

๐Ÿ“š This week's recommended reading is: "Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It" by Marc Goodman

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end โฌ‡๏ธ

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-382023

simontsui, to random

Yet another JetBrains TeamCity On-Prem vulnerability: CVE-2024-23917 (9.8 critical)

If abused, the flaw may enable an unauthenticated attacker with HTTP(S) access to a TeamCity server to bypass authentication checks and gain administrative control of that TeamCity server.

๐Ÿ”— https://blog.jetbrains.com/teamcity/2024/02/critical-security-issue-affecting-teamcity-on-premises-cve-2024-23917/

simontsui,

Why you should care about CVE-2024-23917:
Russian Foreign Intelligence Service (SVR) exploited a similar JetBrains TeamCity authentication bypass vulnerability CVE-2023-42793 (9.8 critical) worldwide, as reported in a CISA cybersecurity advisory dated 13 December 2023, less than 2 months ago.

simontsui, to random

Hot off the press! CISA adds CVE-2023-43770 (6.1 medium) Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
๐Ÿ”— (to be replaced later) https://www.cisa.gov/known-exploited-vulnerabilities-catalog

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #eitw #Roundcube #XSS #activeexploitation #CVE_2023_43770

simontsui,

Why you should care about CVE-2023-43770:
ESET Research previously reported on 25 October 2023 that the Winter Vivern APT was exploiting a similar RoundCube cross-site scripting vulnerability CVE-2023-5631 as a zero-day against European overnmental entities and a think tank.

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #eitw #Roundcube #XSS #activeexploitation #CVE_2023_43770 #WinterVivern #APT #cyberespionage

simontsui, to vmware

CISA adds CVE-2023-34048 (9.8 critical, disclosed 25 October 2023 by VMware, reported by Mandiant as exploited as a zero-day since 2021) VMware vCenter Server Out-of-Bounds Write Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
๐Ÿ”— https://www.cisa.gov/news-events/alerts/2024/01/22/cisa-adds-one-known-exploited-vulnerability-catalog

#CVE202334048 #VMware #CISA #KEV #eitw #activeexploitation #Mandiant #UNC3886 #cyberespionage #vCenter #zeroday #vulnerability #cybersecurity

simontsui, to microsoft

Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, Mint Sandstorm used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files. In a handful of cases, Microsoft observed new post-intrusion tradecraft including the use of a new, custom backdoor called MediaPl.
๐Ÿ”— https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/

Freemind, to Cybersecurity
@Freemind@mastodon.online avatar

This backdoor was previously disclosed by CERT-UA in attacks targeting critical infrastructure in Ukraine.

#Cybersecurity #Russia #APT28 #cyberespionage #HackerGroup

https://cybersec84.wordpress.com/2023/12/13/apt28-cyber-espionage-escalates-russian-hackers-target-13-nations/

simontsui, to Russia

Denmark's CERT (SektorCERT) reported that 22 companies that operate parts of Danish energy infrastructure were compromised in a May 2023 coordinated attack, linked to SANDWORM actors. Sandworm is a state-sponsored APT publicly attributed to Russian General Staff Main Intelligence Directorateโ€™s Russian (GRUโ€™s) Main Centre for Special Technologies (GTsST) by the U.S. government. The attackers leveraged a Zyxel vulnerability CVE-2023-28771 (9.8 critical) to gain control of the firewall. SektorCERT's incident response report includes a detailed analysis and timeline of the attack, recommendations and IOC.
Link: https://media.licdn.com/dms/document/media/D4D1FAQG-Qsry8BH9dg/feedshare-document-pdf-analyzed/0/1699785104486?e=1700697600&v=beta&t=icNMQ-rDYgeSojoaax-1KpC7YrCF7MVtkrDClSFiKIY

#cyberespionage #GRU #SANDWORM #Russia #Denmark #criticalinfrastructure #APT #threatintel #IOC #CVE202328771 #Zyxel

simontsui, to news

The Record: Chinese state-sponsored hackers broke into an internal computer network used by the Dutch Ministry of Defence last year, according to the Netherlands. Both the countryโ€™s military (MIVD) and civilian (AIVD) security services said the ministry had been hacked for espionage purposes after the threat actor exploited a vulnerability in FortiGate devices.
๐Ÿ”— https://therecord.media/dutch-find-chinese-hackers-networks-fortinet

simontsui,

(TLP:CLEAR) NCSC-NL report:

  • The Ministry of Defence (MOD) of the Netherlands was impacted in 2023 by an intrusion into one of its networks. The effects were limited because of prior network segmentation.
  • Incident response uncovered previously unpublished malware, a remote access trojan (RAT) designed specifically for Fortigate appliances. It is used as second-stage malware, and does not exploit a new vulnerability. Intelligence services MIVD & AIVD refer to the malware as COATHANGER based on a string present in the code.
  • The COATHANGER malware is stealthy and persistent. It hides itself by hooking system calls thatcould reveal its presence. It survives reboots and firmware upgrades.
  • MIVD & AIVD assess with high confidence that the malicious activity was conducted by a state-sponsored actor from the Peopleโ€™s Republic of China. This is part of a wider trend of Chinese political espionage against the Netherlands and its allies.
  • MIVD & AIVD assess that use of COATHANGER may be relatively targeted. The Chinese threat actor(s)scan for vulnerable edge devices at scale and gain access opportunistically, and likely introduce COATHANGER as a communication channel for select victims.
  • Organizations that use FortiGate devices can check if they are affected using the detection methods described in section 4 of this report. Refer to section 5 for advice for incident response.
  • Action that organizations can take to prevent future malicious activity: for all internet-facing (edge)devices, install security patches from the vendor assoon as they become available. More preventive steps are described in section 5 of this report.

๐Ÿ”— https://www.ncsc.nl/documenten/publicaties/2024/februari/6/mivd-aivd-advisory-coathanger-tlp-clear

simontsui, to random

BlackBerry reported on a new commercial cyberespionage group called AeroBlade specifically targeting the U.S. Aerospace industry. With network infrastructure and weaponization that became operational in September 2022 and an offensive phase that began July 2023, this threat actor has improved their toolset for successful data exfiltration. IOC provided.
๐Ÿ”— https://blogs.blackberry.com/en/2023/11/aeroblade-on-the-hunt-targeting-us-aerospace-industry

#cyberespionage #AeroBlade #threatintel #IOC

YourAnonRiots, to Cybersecurity Japanese

Iranian #cyberespionage group Charming Kitten is using fake webinars and a new '#BASICSTAR' backdoor to target experts in Middle Eastern policy.

https://thehackernews.com/2024/02/iranian-hackers-target-middle-east.html

#cybersecurity #hacking #malware

simontsui, to Ukraine

Ukraine's CERT-UA provides IOC and technical instructions for removing DIRTYMOE malware, which has worm-like capabilities and creates a DDoS botnet. The DIRTYMOE/Purple Fox infection of 2000+ affected computers and activity is tracked by the identifier UAC-0027.
๐Ÿ”—https://cert.gov.ua/article/6277422

#Ukraine #CERTUA #UAC0027 #cyberespionage #DIRTYMOE #PurpleFox #malware #IOC #threatintel

simontsui, to Russia

The Record: Hackers working for Russiaโ€™s intelligence services (Star Blizzard is attributed to FSB Center 18) are impersonating researchers and academics in an ongoing campaign to gain access to their colleaguesโ€™ email accounts, according to messages and files seen by Recorded Future News and independently analyzed by two cybersecurity companies.
๐Ÿ”— https://therecord.media/russian-campaign-impersonating-western-researchers-academics

#Russia #cyberespionage #news #StarBlizzard #FSB #thinktank

simontsui, to random

Cloudflare blog on Thanksgiving 2023 security incident:

"Based on our collaboration with colleagues in the industry and government, we believe that this attack was performed by a nation state attacker with the goal of obtaining persistent and widespread access to Cloudflareโ€™s global network."

The attack started in October with the compromise of Okta, but the threat actor only began targeting our systems using those credentials from the Okta compromise in mid-November.
๐Ÿ”— https://blog.cloudflare.com/thanksgiving-2023-security-incident

riskybusiness, to random

This week's feature guest is CISA's assistant director for cybersecurity Eric Goldstein. He'll talk about CISA ordering USG agencies to disconnect their Ivanti equipment, the Volt Typhoon campaign and a Politico report into CISA's Joint Cyber Defense Collaborative. Up later today

simontsui,

HOT OFF THE PRESS: CISA: PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
๐Ÿ”— https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a

#China #cyberespionage #CISA #PRC #IOC #threatintel

simontsui, to Futurology

Censys assesses that Russian company Raccoon Security is a brand of NTC Vulkan, an IT company contracted by Russian intelligence to create offensive cyber tools. NTC Vulkan documents were leaked, and they detail project requirements contracted with the Russian Ministry of Defense, including in at least one instance for GRU Unit 74455, also known as Sandworm Team, according to Mandiant. Censys assesses with high confidence that the NTC Vulkan hosts, certificates, and domains identified in this report belong to the same NTC Vulkan, and that Raccoon Security, and its related domains, host, and certificates belong to the Moscow-based cybersecurity development brand of the same name.
Links: https://censys.com/discovery-of-ntc-vulkan-infrastructure/ and see semi-related Mandiant article.

#NTCVulkan #RaccoonSecurity #leak #intelligence #cyberthreatintelligence #cyberespionage #threatintel #Russia #UkraineRussiaWar #Sandworm

YourAnonRiots, to Cybersecurity Japanese

๐Ÿ•ต๏ธโ€โ™‚๏ธ #Russian state-backed #APT29 hacker group breached HP Enterprise's cloud emails, stealing confidential data from cybersecurity and key departments.

https://thehackernews.com/2024/01/tech-giant-hp-enterprise-hacked-by.html

The breach remained undetected for over 6 months.

#cyberespionage #cybersecurity

simontsui, to Russia

The Guardian reports that the UK's nuclear site Sellafield has been hacked into by cyber groups closely linked to Russia and China. They do not identify which groups.
๐Ÿ”— https://www.theguardian.com/business/2023/dec/04/sellafield-nuclear-site-hacked-groups-russia-china

#Sellafield #Russia #China #nuclear #cyberespionage #cybersecuritynews

  • All
  • Subscribed
  • Moderated
  • Favorites
  • โ€ข
  • megavids
  • mdbf
  • DreamBathrooms
  • everett
  • magazineikmin
  • Durango
  • InstantRegret
  • rosin
  • Youngstown
  • love
  • slotface
  • GTA5RPClips
  • kavyap
  • ethstaker
  • Leos
  • ngwrru68w68
  • thenastyranch
  • tacticalgear
  • cubers
  • modclub
  • osvaldo12
  • cisconetworking
  • tester
  • khanakhh
  • normalnudes
  • provamag3
  • anitta
  • JUstTest
  • All magazines