Author: Admin
November 27, 2024Ravi LakshmananIoT Security / Network Security A threat actor called Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that exploits vulnerabilities and misconfigurations in Internet of Things (IoT) devices to co-opt them into a disruptive botnet. “This operation serves as an end-to-end package for scanning, exploiting vulnerabilities, deploying malware, and configuring shop kits, demonstrating a self-contained approach to cyber attacks,” Assaf Morag, director of threat intelligence at Cloud Security. Aqua company said. There is evidence that the operation is the work of a lone wolf actor, a screenwriter of Russian origin. The attacks mainly targeted…
A China-linked threat actor known as Earth Estries has been spotted using a previously undocumented backdoor called GHOSTSPIDER as part of attacks on Southeast Asian telecommunications companies. Trend Micro which described hacker group Aggressive Advanced Persistent Threat (APT), said the intrusions also involved the use of another cross-platform backdoor called MASOL RAT (aka Backdr-NQ) on Linux systems belonging to Southeast Asian government networks. In total, Earth Estries is estimated to have successfully compromised more than 20 organizations spanning the telecommunications, technology, consulting, chemical and transportation industries, government agencies, and the non-profit organization (NGO) sector. Victims have been identified in more…
Critical flaws in WordPress anti-spam plugin expose more than 200,000 sites to remote attacks
November 26, 2024Ravi LakshmananWebsite Vulnerability / Security Two critical security flaws affecting spam protection, the anti-spam plugin, and the WordPress firewall could allow unauthenticated attackers to install and enable malicious plugins on sensitive sites and potentially achieve remote code execution. Vulnerabilities tracked as CVE-2024-10542 and CVE-2024-10781have a CVSS score of 9.8 out of a maximum of 10.0. These were addressed in versions 6.44 and 6.45 released this month. Installed on over 200,000 WordPress sites, CleanTalk Spam Protection, Anti-Spam and FireWall Plugin is advertised as an “all-in-one anti-spam plugin” that blocks spam comments, signups, surveys, and more. According to Wordfence, both…
November 26, 2024Hacker newsPentest / Vulnerability Assessment When CVEs go viral, separating critical vulnerabilities from the noise is critical to protecting your organization. That’s why we built Intruder, the leader in attack surface management Intel – a free vulnerability intelligence platform designed to help you act quickly and prioritize real threats. What is Intel? Intel was created to fill the gap in resources available to track new vulnerabilities. When one of Intruder’s core tools shut down last year, the team set out to create a solution that would not only meet their needs, but also benefit the broader information sector.…
November 26, 2024Ravi LakshmananVulnerability / Cybercrime Russian threat actor known as RomCom was linked to the exploitation of two zero-day security flaws, one in Mozilla Firefox and the other in Microsoft Windows, in attacks aimed at delivering a backdoor of the same name to victim systems. “In a successful attack, when the victim views a web page containing the exploit, the adversary can run arbitrary code – without the need for user interaction (zero click) – which in this case resulted in the RomCom backdoor being installed on the victim’s computer,” it said ESET messages the report shared with The…
November 26, 2024Ravi LakshmananVulnerability / Network Security The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added A critical security flaw affecting Array Networks AG and vxAG Secure Access Gateways is now fixed for known vulnerabilities (KEV) catalog after reports of active exploitation in the wild. Vulnerability, tracked as CVE-2023-28461 (CVSS Score: 9.8) deals with a case of no authentication that can be used to execute arbitrary code remotely. The fixes for the security flaw (version 9.4.0.484) were released by the networking equipment vendor in March 2023. “The Array AG/vxAG remote code execution vulnerability is a web security vulnerability…
The PyPI Python library “aiocpa” discovered the exfiltration of crypto keys via a Telegram bot
November 25, 2024Ravi LakshmananSoftware Supply Chain / Malware The administrators of the Python Package Index (PyPI) repository have quarantined the package “aiocpa” following a new update that included malicious code to steal private keys via Telegram. The package in question described both synchronous and asynchronous Crypto Pay API the client. The pack, originally released in September 2024, has already been downloaded 12,100 times to date. Placing a Python library in quarantine prevents it from being further installed by clients and cannot be modified by its maintainers. Cyber security company Phylum, which general details of the attack on the software supply…
Google’s new Restore Credentials tool makes it easier to sign in to the app after an Android migration
November 25, 2024Ravi LakshmananMobile Security / Privacy Google has introduced a new feature called Recover credentials to help users safely regain access to their third-party app accounts after switching to a new Android device. Part of Android Credential Manager APIthis feature aims to reduce the hassle of re-entering login credentials for each app when switching phones. “With Restore Credentials, apps can seamlessly connect users to their accounts on a new device after they restore their apps and data from their previous device,” Neelansh Sahai of Google said. The tech giant said the process happens automatically in the background when a…
November 25, 2024Ravi LakshmananCloud Security / Supply Chain Attack Cybersecurity researchers have uncovered two new attack techniques against infrastructure-as-code (IaC) and policy-as-code (PaC) tools such as Terraform and HashiCorp’s Open Policy Agent (OPA) that use special domain-oriented languages (DSLs) to hack cloud platforms and extracted data. “Because they’re hard languages with limited capabilities, they should be more secure than standard programming languages, and they really are,” Tenable Senior Security Researcher Shelly Raban said in a technical report published last week. “However, safer does not mean bulletproof.” OPA is a popular open-source policy engine that allows organizations to enforce policies on…
Immerse yourself in the evolution of phishing and malware evasion techniques and understand how attackers are using increasingly sophisticated techniques to bypass security measures. The evolution of phishing attacks “I really like the saying ‘it’s out of bounds’ no hacker ever said. Whether it’s tricks, techniques or technology, hackers will do anything to avoid detection and ensure their attack is successful.” says Etai Maor, chief security strategist at Cato Networks and member Cato CTRL. Phishing attacks have changed a lot over the years. 15-20 years ago, simple phishing sites were enough to capture the valuable of the time – credit…