Author: Admin
January 14, 2025Ravi LakshmananVulnerability / Network Security Threat hunters are taking notice of a new campaign targeting Fortinet FortiGate firewalls with management interfaces exposed on the public Internet. “The campaign involved unauthorized administrative logins to firewall management interfaces, creating new accounts, SSL VPN authentication through those accounts, and various other configuration changes,” cyber security firm Arctic Wolf said. said in an analysis published last week. It is believed to be malicious activity started in mid-November 2024. unknown threat actors gained unauthorized access to management interfaces on compromised firewalls to change configurations and obtain credentials using DCSync. The exact initial access…
What do identity risks, data security risks, and third party risks have in common? All of these are greatly exacerbated by the proliferation of SaaS. Each new SaaS account adds a new entity to protect, a new place where sensitive data can end up, and a new source of third-party risk. Find out how you can protect this vast attack surface in 2025. What do identity risks, data security risks, and third party risks have in common? All of these are greatly exacerbated by the proliferation of SaaS. Each new SaaS account adds a new entity to protect, a new…
HuiOne Telegram Illegal Marketplace Surpasses Hydra to Reach $24 Billion in Crypto Transactions
January 14, 2025Ravi LakshmananCryptocurrency / Internet Scam The online marketplace based on Telegram is known as HuiOne Guarantee, and its providers have collectively received at least $24 billion in cryptocurrency, surpassing the now-defunct Hydra to become the largest illegal online marketplace ever to operate. numbers, released Elliptic, a blockchain analytics company, shows that monthly inflows have increased by 51% since July 2024. Huione Guarantee, part of the Huione group of companies, found himself in the center of attention in the middle of last year, when it was exposed as a hub for online fraudsters touting money-laundering services, stolen data and…
January 14, 2025Ravi LakshmananVulnerability / Cyber Security The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a second security flaw affecting BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) products to its list of known vulnerabilities (KEV) catalog with reference to evidence of active exploitation in the wild. The vulnerability in question CVE-2024-12686 (CVSS Score: 6.6), a moderate vulnerability that could allow an attacker with existing administrative privileges to enter commands and operate as a site user. “BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that could be used by…
January 13, 2025Ravi LakshmananVulnerability / Cloud Security A critical security flaw has recently been discovered that affects the Aviatrix controller the cloud network platform is being actively exploited in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it is currently responding to “several incidents” involving weapons CVE-2024-50603 (CVSS Score: 10.0), a maximum severity bug that could lead to unauthenticated remote code execution. In other words, successful exploitation of the flaw could allow an attacker to execute malicious operating system commands due to certain API endpoints not properly sanitizing user input. The vulnerability was fixed in…
January 13, 2025Hacker newsThreat detection / network security In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, and the average ransom demand skyrocketed to $5 million. With approximately 8,000 ESXi hosts exposed to direct Internet access (according to Shodan), the operational and business impact of these attacks is profound. Most of the ransomware currently attacking ESXi servers are variants of the infamous Babuk ransomware, designed to evade detection by security tools. Moreover, availability is becoming more widespread as attackers monetize their entry points by selling Initial Access to other threat actors, including ransomware groups. As organizations face complex…
January 13, 2025Ravi LakshmananMalware / Domain Security At least 4,000 unique web backdoors previously deployed by various threat actors were captured by taking control of abandoned and outdated infrastructure for as little as $20 per domain. Cybersecurity company watchTowr Labs said it completed the operation, registering more than 40 domain names that the backdoors were designed to use for command and control purposes (C2). In partnership with the Shadowserver Foundation, the domains involved in the study were processed. “We hijacked backdoors (that depended on now-abandoned infrastructure and/or expired domains) that existed inside backdoors themselves, and have watched the results flow…
Cyber security researchers are warning about the emergence of a new stealth credit card skimmer company which targets WordPress e-commerce pages by inserting malicious JavaScript code into a database table linked to the content management system (CMS). “This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database records to steal sensitive payment details,” Sucuri researcher Pooja Srivastava said in a new analysis. “The malware is activated specifically on checkout pages, either by hijacking existing payment fields or by entering a fake credit card form.” Website security company owned by GoDaddy says it has discovered malware embedded…
January 11, 2025Ravi LakshmananAI Security / Cyber Security Microsoft has shown that it is pursuing legal action against a “foreign threat group” for operating a hacking-as-a-service infrastructure to deliberately bypass security controls on its generative artificial intelligence (AI) services and create offensive and harmful content. The tech giant’s digital crime unit (DCU) said it observed threat actors “developing sophisticated software that uses exposed customer credentials taken from public websites” and “trying to identify and illegally access accounts with certain generative artificial intelligence services and intentionally alter the capabilities of those services.” Adversaries then used these services, such as Azure OpenAI…
Justice Department indicts three Russians for operating crypto-mixers used to launder cybercrimes
January 11, 2025Ravi LakshmananFinancial Crime / Cryptocurrency The US Department of Justice (DoJ) on Friday indicted three Russian nationals for their alleged involvement in running cryptocurrency mixing services Blender.io and Sinbad.io. Roman Vitalyevich Ostapenko and Alexander Evgenievich Aleynik were arrested on December 1, 2024 in coordination with the Financial Intelligence and Investigation Service of the Netherlands, the National Bureau of Investigation of Finland and the Federal Bureau of Investigation (FBI) of the United States. It is not known where they were detained. The third person, Anton Vyachalavovich Tarasov, is still at large. The defendants are accused of operating cryptocurrency mixers…