Author: Admin

November 27, 2024Ravi LakshmananLinux / Malware Cybersecurity researchers have shed light on what has been described as the first Unified Extensible Firmware Interface (UEFI). butkit intended for Linux systems. Duplicated Butkitty by its creators, who go by the name BlackCat, the butkit is rated as a proof of concept (PoC) and there is no evidence that it has been used in actual attacks. Also tracked as IranuKitit was loaded to the VirusTotal platform on November 5, 2024. “The main purpose of the bootkit is to disable the kernel signature verification feature and preload two as-yet-unknown ELF binaries through the Linux…

Read More

November 27, 2024Ravi LakshmananMalware / cyber espionage A threat actor known as APT-C-60 was linked to a cyberattack targeting an unnamed organization in Japan that used a job application-themed lure to deliver the SpyGlace backdoor. This follows JPCERT/CC findings, which say the intrusion used legitimate services such as Google Drive, Bitbucket and StatCounter. The attack was carried out around August 2024. “In this attack, an email purporting to be from a potential employee was sent to a recruiting contact, infecting the contact with malware,” the agency reported. said. APT-C-60 is an alias appointed a cyberespionage group known to target East…

Read More

November 27, 2024Ravi LakshmananCyber ​​Crime / Financial Fraud The Interpol-led operation resulted in the arrest of 1,006 suspects in 19 African countries and the destruction of 134,089 malicious infrastructures and networks as part of a coordinated effort to end cybercrime on the continent. Duplicated Serengetilaw enforcement exercises were held from September 2 to October 31, 2024. and were targeted at criminals behind ransomware, business email breaching (BEC), digital extortion and online fraud. Algeria, Angola, Benin, Cameroon, Ivory Coast, Democratic Republic of Congo, Gabon, Ghana, Kenya, Mauritius, Mozambique, Nigeria, Rwanda, Senegal, South Africa, Tanzania, Tunisia, Zambia, and Zimbabwe participated in the…

Read More

November 27, 2024Ravi LakshmananIoT Security / Network Security A threat actor called Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that exploits vulnerabilities and misconfigurations in Internet of Things (IoT) devices to co-opt them into a disruptive botnet. “This operation serves as an end-to-end package for scanning, exploiting vulnerabilities, deploying malware, and configuring shop kits, demonstrating a self-contained approach to cyber attacks,” Assaf Morag, director of threat intelligence at Cloud Security. Aqua company said. There is evidence that the operation is the work of a lone wolf actor, a screenwriter of Russian origin. The attacks mainly targeted…

Read More

A China-linked threat actor known as Earth Estries has been spotted using a previously undocumented backdoor called GHOSTSPIDER as part of attacks on Southeast Asian telecommunications companies. Trend Micro which described hacker group Aggressive Advanced Persistent Threat (APT), said the intrusions also involved the use of another cross-platform backdoor called MASOL RAT (aka Backdr-NQ) on Linux systems belonging to Southeast Asian government networks. In total, Earth Estries is estimated to have successfully compromised more than 20 organizations spanning the telecommunications, technology, consulting, chemical and transportation industries, government agencies, and the non-profit organization (NGO) sector. Victims have been identified in more…

Read More

November 26, 2024Ravi LakshmananWebsite Vulnerability / Security Two critical security flaws affecting spam protection, the anti-spam plugin, and the WordPress firewall could allow unauthenticated attackers to install and enable malicious plugins on sensitive sites and potentially achieve remote code execution. Vulnerabilities tracked as CVE-2024-10542 and CVE-2024-10781have a CVSS score of 9.8 out of a maximum of 10.0. These were addressed in versions 6.44 and 6.45 released this month. Installed on over 200,000 WordPress sites, CleanTalk Spam Protection, Anti-Spam and FireWall Plugin is advertised as an “all-in-one anti-spam plugin” that blocks spam comments, signups, surveys, and more. According to Wordfence, both…

Read More

November 26, 2024Hacker newsPentest / Vulnerability Assessment When CVEs go viral, separating critical vulnerabilities from the noise is critical to protecting your organization. That’s why we built Intruder, the leader in attack surface management Intel – a free vulnerability intelligence platform designed to help you act quickly and prioritize real threats. What is Intel? Intel was created to fill the gap in resources available to track new vulnerabilities. When one of Intruder’s core tools shut down last year, the team set out to create a solution that would not only meet their needs, but also benefit the broader information sector.…

Read More

November 26, 2024Ravi LakshmananVulnerability / Cybercrime Russian threat actor known as RomCom was linked to the exploitation of two zero-day security flaws, one in Mozilla Firefox and the other in Microsoft Windows, in attacks aimed at delivering a backdoor of the same name to victim systems. “In a successful attack, when the victim views a web page containing the exploit, the adversary can run arbitrary code – without the need for user interaction (zero click) – which in this case resulted in the RomCom backdoor being installed on the victim’s computer,” it said ESET messages the report shared with The…

Read More

November 26, 2024Ravi LakshmananVulnerability / Network Security The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added A critical security flaw affecting Array Networks AG and vxAG Secure Access Gateways is now fixed for known vulnerabilities (KEV) catalog after reports of active exploitation in the wild. Vulnerability, tracked as CVE-2023-28461 (CVSS Score: 9.8) deals with a case of no authentication that can be used to execute arbitrary code remotely. The fixes for the security flaw (version 9.4.0.484) were released by the networking equipment vendor in March 2023. “The Array AG/vxAG remote code execution vulnerability is a web security vulnerability…

Read More

November 25, 2024Ravi LakshmananSoftware Supply Chain / Malware The administrators of the Python Package Index (PyPI) repository have quarantined the package “aiocpa” following a new update that included malicious code to steal private keys via Telegram. The package in question described both synchronous and asynchronous Crypto Pay API the client. The pack, originally released in September 2024, has already been downloaded 12,100 times to date. Placing a Python library in quarantine prevents it from being further installed by clients and cannot be modified by its maintainers. Cyber ​​security company Phylum, which general details of the attack on the software supply…

Read More