Author: Admin
December 18, 2024Ravi LakshmananCyber espionage / malware Russia-linked threat actor APT29 has been seen repurposing legitimate red teaming attack methodology as part of cyberattacks using malicious Remote Desktop Protocol (RDP) configuration files. Activities targeting governments and armed forces, think tanks, academic researchers, and Ukrainian organizations entail adopting the “rogue RDP” method that was previously documented Black Hills Information Security in 2022, Trend Micro report says. “A victim of this technique would give partial control of their machine to an attacker, potentially leading to data leakage and the installation of malware,” researchers Feike Hackebord and Steven Hilt said. The cyber security…
In my nearly eight years at ActiveState, I’ve seen many iterations of our product. However, one thing has remained true over the years: our commitment to the open source community and companies that use open source in their code. ActiveState has been helping enterprises manage open source for more than a decade. In the early days, open source was in its infancy. We focused mainly on the developer case, helping to get open source on platforms like Windows. Over time, our focus has shifted from helping open source companies to supporting businesses running open source when the community wasn’t building…
December 18, 2024Ravi LakshmananCyber Fraud / Social Engineering INTERPOL is calling for a linguistic shift that aims to end the term “butchering of pigs,” instead advocating the use of “romance baiting” to refer to online scams in which victims are tricked into investing in fake cryptocurrency schemes under the guise of a romantic relationship. “The term ‘pig killer’ dehumanizes and shames the victims of such scams, discouraging people from seeking help and providing information to the authorities,” the agency notes. said in the statement. The word originates from the Chinese phrase “杀猪盘” (“shā zhū pán”), which literally translates to “slaughtering…
December 18, 2024Ravi LakshmananCyber Attack / Vulnerability Threat actors are attempting to exploit a recently disclosed security flaw affecting Apache Struts that could open the way for remote code execution. Issue tracked as CVE-2024-53677has a CVSS score of 9.5 out of 10.0, indicating critical severity. This vulnerability is similar to another critical bug that the developers of the project fixed in December 2023. (CVE-2023-50164CVSS score: 9.8) that too came under active exploitation shortly after public disclosure. “An attacker could manipulate file download parameters to allow path traversal, and under some circumstances this could lead to the download of a malicious…
December 18, 2024Ravi LakshmananData Breach / Privacy Meta Platforms, the parent company of Facebook, Instagram, WhatsApp and Threads, was fined 251 million euros (about $263 million) for a data breach in 2018 that affected millions of users in the block. the latest financial hit the company has been found guilty of violating strict privacy laws. The Irish Data Protection Commission (DPC) said the data breach affected around 29 million Facebook accounts worldwide, of which around 3 million are located in the European Union and the European Economic Area (EEA). It should be noted that initial estimates by the tech giant…
December 17, 2024Ravi LakshmananMalware / credential theft A new social engineering company has used Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate. “An attacker used social engineering via a Microsoft Teams challenge to impersonate a user’s client and gain remote access to their system,” Trend Micro researchers Catherine Laveria, Jovit Samaniego and Gabriel Nicoletta said. “The attacker failed to install the Microsoft Remote Support application, but successfully instructed the victim to download AnyDesk, a tool commonly used for remote access.” How recently documented By cybersecurity firm Rapid7, the attack involved bombarding a target’s…
December 17, 2024Ravi LakshmananCyber attack / malware A new phishing campaign has been spotted using tax-themed lures to deliver hidden backdoor payloads in attacks against Pakistan. Cybersecurity company Securonix, which tracks activity under the name FLUX#CONSOLEsaid it most likely starts with a phishing link to an email or attachment, although it said it could not obtain the original email used to launch the attack. “One of the most notable aspects of the campaign is how threat actors use Microsoft Common Console Document (MSC) files to deploy a bootloader and dual-purpose bootloader to deliver further malicious payloads,” security researchers Dan Yuzwick…
Addressing cyber threats before they have a chance to strike or cause serious damage is by far the best security approach any company can take. Achieving this requires a lot of research and active threat hunting. The problem here is that it’s easy to get stuck in endless arrays of data and not get relevant information. To avoid this, use these five battle-tested techniques that are sure to improve your company’s threat awareness and overall security. Search for threats targeting organizations in your region The most basic, but very effective, way to learn about the current threat to your company…
December 17, 2024Hacker newsWebinar / Risk management Even the best companies can still be hacked with the most advanced tools. This is an unpleasant reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses. But violations still happen. So what’s going wrong? The truth is that attackers are constantly finding new ways to slip through loopholes that often go unnoticed – even in well-prepared organizations. Good news? These cracks can be found and repaired if you know where to look. Join John Paul Cunningham, CISO at Silverfort for a must-attend event webinar that reveals why breaches…
December 17, 2024Ravi LakshmananCyber espionage / malware An alleged South Asian cyber espionage group known as Bitter in November 2024, a Turkish defense sector organization was targeted to deliver two C++ malware families tracked as WmRAT and MiyaRAT. “The attack chain used alternate data streams in the RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to release further payloads,” Proofpoint researchers Nick Atfield, Constantin Klinger, Pim Truerbach, and David Galazin said in a report shared with The Hacker News. The security company is tracking the threat under the name TA397. The…