Author: Admin
August 30, 2024Hacker newsICS Security / OT Security The comprehensive guide, authored by Dean Parsons, highlights the growing need for specialized ICS security measures in the face of growing cyber threats. With a staggering 50% increase in ransomware attacks targeting industrial control systems (ICS) in 2023, the SANS Institute is taking decisive action by announcing the release of its important new strategic guidance, “ICS is a business: why securing ICS/OT environments is business critical in 2024.” Authored by Dean Parsons, ICS Defense Force CEO and SANS Certified Instructor, this guide offers a comprehensive analysis of the rapidly evolving threat landscape…
August 30, 2024Ravi LakshmananCryptocurrency / Malware Threat actors linked to North Korea have been seen publishing a number of malicious packages to the npm registry, indicating a “coordinated and relentless” effort to target malware developers and steal cryptocurrency assets. The latest wave, observed between August 12 and 27, 2024, included packages named temp-etherscan-api, ethersscan-api, telegram-con, helmet-validate, and qq-console. “The behavior of this company leads us to believe that qq-console is related to a North Korean company known as Contagious Interview,” wrote software security firm Phylum. said. Contagious interview refers to an campaign continues which seeks to compromise software developers with…
August 29, 2024Ravi LakshmananBrowser Security / Vulnerability Cybersecurity researchers have identified several exploit campaigns in the wild that have used patched flaws in Apple’s Safari and Google Chrome browsers to infect mobile users with information-stealing malware. “These companies presented exploits for n days for which patches were available, but they were still effective against unpatched devices,” Google Threat Analysis Group (TAG) researcher Clement Lessin said in a report shared with The Hacker News. The activity observed between November 2023 and July 2024 is notable for the fact that the exploits were carried out using a hacker attack on the Mongolian…
August 29, 2024Ravi LakshmananCyber espionage / malware A non-profit organization that supports human rights in Vietnam was the target of a multi-year campaign designed to spread various malware on compromised hosts. Cybersecurity firm Huntress attributed the activity to a threat cluster known as APT32, a Vietnam-based hacking group also known as APT-C-00, Canvas Cyclone (formerly Bismuth), Cobalt Kitty and OceanLotus. The invasion is believed to have lasted at least four years. “This intrusion has a number of overlaps with known methods used by the APT32/OceanLotus threat actor and a known target demographic that matches the goals of APT32/OceanLotus,” security researchers…
August 29, 2024Ravi LakshmananIoT Security / Vulnerability A multi-year high-severity flaw affecting AVTECH IP cameras has been weaponized by attackers as a zero-day tool to tie them into botnets. CVE-2024-7029 (CVSS Score: 8.7), the vulnerability in question is “a remote code execution (RCE) command injection vulnerability discovered in the brightness feature of AVTECH CCTV cameras.” , Akamai researchers Kyle Lefton, Larry Cashdollar and Aline Eliovich said. Details of the security flaw were first published earlier this month by the US Cybersecurity and Infrastructure Security Agency (CISA), highlighting its low attack complexity and remote exploitability. “Successful exploitation of this vulnerability could…
US cybersecurity and intelligence agencies have accused an Iranian hacking group of hacking multiple organizations across the country and coordinating with affiliates to deliver ransomware. The activity was linked to a threat actor called Pioneer Kitten, which is also known as Fox Kitten, Lemon Sandstorm (formerly Rubidium), Parisite, and UNC757, which is described as being linked to the Iranian government and using an Iranian information technology (IT) company, Danesh Novin Sahand , probably as a cover. “Their malicious cyber operations are aimed at deploying ransomware attacks to gain and develop network access,” said the Cybersecurity and Infrastructure Security Agency (CISA),…
August 29, 2024Ravi LakshmananInternet Crime / Privacy French prosecutors on Wednesday formally charged CEO Paul Dourav with facilitating a series of criminal activities on the popular messaging platform and opened a formal investigation. after his arrest saturday Russian-born Durov, who is also a French citizen, was charged with complicity in the distribution of child sexual abuse material (CSAM), as well as facilitating organized crime, illegal operations, drug trafficking and fraud. There was also a fool is charged with “refusal to hand over, at the request of the competent authorities, information or documents necessary to conduct and carry out interceptions authorized…
August 28, 2024Ravi LakshmananVulnerability / Data Security Fortra has resolved a critical security flaw affecting the FileCatalyst workflow that could be exploited by a remote attacker to gain administrative access. The vulnerability, tracked as CVE-2024-6633, has a CVSS score of 9.8 and results from the use of a static password to connect to an HSQL database. “The default credentials to install the HSQL database (HSQLDB) for FileCatalyst Workflow are published to the vendor knowledge base article”Fortra said in the consulting room. “Misuse of these credentials may compromise the confidentiality, integrity, or availability of the software.” “HSQLDB is included for ease…
August 28, 2024Ravi LakshmananCyber Attack / Vulnerability Cyber espionage linked to South Korea has been linked to exploiting a zero-day critical remote code execution flaw in Kingsoft WPS Office to deploy a special backdoor called SpyGlace. The activity was attributed to the threat actor duplicated APT-C-60according to cybersecurity firms ESET and DBAPPSecurity. There were attacks found to infect Chinese and East Asian users with malware. The security flaw in question CVE-2024-7262 (CVSS Score: 9.3) which results from a lack of proper validation of user-supplied file paths. This vulnerability essentially allows an adversary to load an arbitrary Windows library and achieve…
It has been observed that the threat actors behind the BlackByte ransomware group are likely exploiting a recently patched security flaw affecting VMware ESXi hypervisors, as well as using various vulnerable drivers to remove protections. “The BlackByte ransomware group continues to use the tactics, techniques, and procedures (TTP) that have been at the core of its trade since its inception, constantly repeating the use of vulnerable drivers to bypass protections and deploying a self-propagating ransomware encryptor,” the statement said. Cisco Talos Technical Bulletin the report shared with The Hacker News. Operation of CVE-2024-37085the authentication bypass vulnerability in VMware ESXi, which…