Author: Admin

October 2, 2024Ravi LakshmananVulnerability / Network Security Just over a dozen new security vulnerabilities have been discovered in residential and corporate routers manufactured by DrayTek that could be used to hijack vulnerable devices. “These vulnerabilities could allow attackers to take control of a router by injecting malicious code, allowing them to remain on the device and use it as a gateway to corporate networks,” according to a Forescout Vedere Labs technical report shared with The Hacker News. Of the 14 security flaws, two are rated critical, nine are rated high, and three are rated moderate. The most critical of the…

Read More

October 2, 2024Ravi LakshmananVulnerability / data breach Cyber ​​security researchers have opened that 5% of all Adobe Commerce and Magento stores were compromised by attackers using a security vulnerability called CosmicSting. Tracked as CVE-2024-34102 (CVSS score: 9.8), art a critical flaw refers to an improperly bounded XML External Object (XXE) reference vulnerability that could lead to remote code execution. A flaw credited to a researcher named “space wasp,” was patched by Adobe in June 2024. Dutch security firm Sansec, which has described CosmicSting called it “the worst bug to hit Magento and Adobe Commerce stores in the last two years.”…

Read More

Dynamic malware analysis is a key part of any threat investigation. This involves running a sample malware in an isolated malware sandbox environment to monitor its behavior and gather actionable metrics. Effective analysis must be quick, thorough, and accurate. These five tools will help you achieve this with ease. 1. Interactivity Being able to interact with the malware and the system in real-time is a huge advantage when it comes to dynamic analysis. That way, you can not only watch it execute, but also see how it reacts to your inputs and triggers certain behaviors. It also saves time by…

Read More

October 2, 2024Ravi LakshmananCyber ​​threats / malware Three different organizations in the US were targeted in August 2024 by a North Korean state threat actor named Andariel in a suspected financially motivated attack. “While the attackers were unable to deploy ransomware on the networks of any of the affected organizations, it is likely that the attacks were financially motivated,” Symantec, which is part of Broadcom, said in a statement. the report shared with The Hacker News. Andariel is a threat actor believed to be a sub-cluster of the infamous Lazarus group. It is also tracked as APT45, DarkSeoul, Nickel Hyatt,…

Read More

October 2, 2024Hacker newsSupply Chain Attack / Cryptocurrency A new set of malicious packages was discovered in the Python Package Index (PyPI) repository, which masqueraded as cryptocurrency wallet recovery and management services with the sole purpose of exfiltrating sensitive data and facilitating the theft of valuable digital assets. “The attack targeted users of Atomic, Trust Wallet, Metamask, Ronin, TronLink, Exodus and other prominent wallets in the crypto ecosystem,” said Checkmarx researcher Yehuda Gelb. said in Tuesday’s analysis. “Positioning themselves as utilities for extracting mnemonic phrases and decrypting wallet data, these packages appeared to offer valuable functionality for cryptocurrency users involved…

Read More

October 2, 2024Hacker newsEmail Security / Vulnerability Cybersecurity researchers are warning of active exploit attempts targeting a newly discovered security flaw in Synacor’s Zimbra Collaboration. Enterprise security firm Proofpoint said it began monitoring activity on September 28, 2024. The attacks aimed to use CVE-2024-45519a serious security flaw in the postjournal service that could allow unauthenticated attackers to execute arbitrary commands on compromised Zimbra installations. “Gmail spoofed emails were sent to fake addresses in CC fields in an attempt by Zimbra servers to parse and execute them as commands” – Proofpoint said in a series of messages on X. “Addresses contained…

Read More

The threat actors behind the Rhadamanthys data stealer have added new advanced features to the malware, including the use of artificial intelligence (AI) for optical character recognition (OCR) in so-called “open phrase pattern recognition.” “This allows Rhadamanthys to extract cryptocurrency wallet seed phrases from images, making it a very strong threat to those dealing with cryptocurrencies.” – Recorded Future’s Insikt Group said in the analysis of version 0.7.0 of the malware. “The malware can recognize images of initial phrases on the client side and send them back to the control server (C2) for further use.” First found in the wild…

Read More

October 1, 2024Hacker newsGenerative artificial intelligence / Data protection Since its inception, Generative AI has revolutionized enterprise productivity. GenAI tools enable faster and more efficient software development, financial analysis, business planning and customer engagement. However, such agility in business is associated with significant risks, in particular with the possibility of leakage of confidential data. As organizations try to balance productivity gains with security concerns, many are forced to choose between the unrestricted use of GenAI and its complete ban. A new LayerX e-guide titled 5 effective measures to prevent data leakage through generative artificial intelligence tools designed to help organizations…

Read More

In the past year, more than 140,000 phishing sites linked to a phishing-as-a-service (PhaaS) platform called Sniper Dz have been discovered, indicating that it is being used by a large number of cybercriminals to steal credentials. “For would-be phishers, Sniper Dz offers an online admin panel with a directory of phishing pages,” Palo Alto Networks Unit 42 researchers Shehroz Faruqi, Howard Tong, and Alex Starov said in the technical report. “Phishers can either host these phishing pages on infrastructure owned by Sniper Dz or download Sniper Dz phishing templates to host on their own servers.” Perhaps even more profitable is…

Read More

Cybersecurity researchers have discovered a new hacking campaign targeting the Docker Engine API to co-opt instances to join a malicious Docker Swarm controlled by a threat actor. This allowed attackers to “exploit Docker Swarm’s orchestration features for command and control (C2) purposes,” Datadog researchers Matt Muir and Andy Gearon said in the analysis. Levers of attack Docker for initial access to deploy a cryptocurrency miner on the cracked containers, and to obtain and execute additional payloads responsible for doing lateral push to linked hosts running Docker, Kubernetes, or SSH. In particular, this involves identifying unauthenticated and exposed Docker API endpoints…

Read More