Current Active Threats


GitHub Repos Bombarded By Info-Stealing Commits Masked as Dependabot
Date: 2023-09-27

Hackers are breaching GitHub accounts and inserting malicious code disguised as Dependabot contributions to steal authentication secrets and passwords from developers. The campaign unfolded in July 2023, when researchers discovered unusual commits on hundreds of public and private repositories forged to appear as Dependabot commits.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

New ZenRAT Malware Targeting Windows Users via Fake Password Manager Software
Date: 2023-09-27

Researchers at Proofpoint have uncovered a new malware strain dubbed ZenRAT which is being distributed via bogus installation packages of the Bitwarden password manager. ZenRAT is a modular remote access trojan that comes with various modules designed to steal information from victims’ systems. Although researchers noted that ZenRAT is being hosted on fake websites pretending to be associated with Bitwarden, it’s unclear how end users are being directed to these sites.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

New Zerofont Phishing Tricks Outlook Into Showing Fake AV-Scans
Date: 2023-09-27

Threat actors are employing a novel tactic by incorporating zero-point fonts within emails, creating the illusion that malicious emails have undergone successful security scans in Microsoft Outlook. While the ZeroFont phishing method has been previously observed, its current application marks a significant development. ISC Sans analyst Jan Kopriva, in a recent report, cautions that this technique could greatly enhance the success rate of phishing attacks, underscoring the importance of user awareness regarding its deployment in real-world scenarios.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Google Assigns New Maximum Rated CVE to libwebp Bug Exploited in Attacks
Date: 2023-09-27

Google has assigned a new CVE ID (CVE-2023-5129) to a libwebp security vulnerability exploited as a zero-day in attacks and patched two weeks ago. The company initially disclosed the flaw as a Chrome weakness, tracked as CVE-2023-4863, rather than assigning it to the open-source libwebp library used to encode and decode images in WebP format.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Shadowsyndicate Hackers Linked to Multiple Ransomware Ops, 85 Servers
Date: 2023-09-26

Security researchers have identified ShadowSyndicate as a threat actor using seven ransomware families in attacks over the past year. They suggest it could be an initial access broker and affiliate to ransomware operations. Their findings are based on a distinct SSH fingerprint found on 85 IP servers, discovered using tools like Shodan and Censys. This fingerprint was first seen in July 2022 and still in use in August 2023. Researchers also found eight different Cobalt Strike watermarks on ShadowSyndicate servers.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

BORN Ontario child registry data breach affects 3.4 million people
Date: 2023-09-26

The Better Outcomes Registry & Network (BORN), a healthcare organization funded by the government of Ontario, has announced that it is among the victims of Clop ransomware's MOVEit hacking spree. BORN is a perinatal and child registry that collects, interprets, shares and protects critical data about pregnancy, birth and childhood in the province of Ontario.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Xenomorph Banking Trojan: A New Variant Targeting 35+ U.S. Financial Institutions
Date: 2023-09-26

An updated version of an Android banking trojan called Xenomorph has set its sights on more than 35 financial institutions in the U.S. The campaign, according to Dutch security firm ThreatFabric, leverages phishing web pages that are designed to entice victims into installing malicious Android apps that target a broader list of apps than its predecessors.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Smishing Triad Stretches Its Tentacles into the United Arab Emirates
Date: 2023-09-26

Resecurity research has uncovered that the 'Smishing Triad' cybercrime group, known for conducting phishing attacks via SMS (smishing), has expanded its operations into the United Arab Emirates (UAE).

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Cl0p’s MOVEit Attack Tally Surpasses 2,000 Victim Organizations
Date: 2023-09-26

The number of victim organizations hit by Cl0p via vulnerable MOVEit installations has surpassed 2,000, and the number of affected individuals is now over 60 million. The victim organizations are overwhelmingly based in the US.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals
Date: 2023-09-25

Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based open-source post-exploitation toolkit called Merlin. ‘Since drones or Unmanned Aerial Vehicles (UAVs) have been an integral tool used by the Ukrainian military, malware-laced lure files themed as UAVs service manuals have begun to surface," Securonix researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov said in a report shared with The Hacker News.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware
Date: 2023-09-25

According to a joint investigation conducted by Citizen Lab and Google’s Threat Analysis Group, three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an exploit chain to deliver Predator spyware on the device of a former Egyptian member of parliament Ahmed Eltantawy.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

New Stealthy and Modular Deadglyph Malware Used in Govt Attacks
Date: 2023-09-25

A highly advanced backdoor malware called 'Deadglyph' was recently employed in a cyber espionage operation targeting a Middle Eastern government agency. This sophisticated malware, known as Deadglyph, has been linked to the Stealth Falcon Advanced Persistent Threat (APT) group, also known as Project Raven or FruityArmor.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Is Gelsemium APT Behind a Targeted Attack in Southeast Asian Government?
Date: 2023-09-25

Researchers at Kaspersky Lab have uncovered a new backdoor called "SessionManager" that has been used in attacks targeting Microsoft IIS Servers since March 2021. This backdoor allows threat actors to maintain persistent, update-resistant, and stealthy access to a targeted organization's IT infrastructure. It has been deployed in over 20 organizations, and as of late April 2022, many samples were not yet flagged as malicious by online file scanning services.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Dallas says Royal Ransomware Breached its Network Using Stolen Account
Date: 2023-09-25

The City of Dallas, Texas, said this week that the Royal ransomware attack that forced it to shut down all IT systems in May started with a stolen account. Royal gained access to the City's network using a stolen domain service account in early April and maintained access to the compromised systems between April 7 and May 4. During this period, they successfully collected and exfiltrated 1.169 TB worth of files based on system log data analysis conducted by city officials and external cybersecurity experts.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape
Date: 2023-09-21

Proofpoint has observed an increase in activity from specific malware families targeting Chinese-language speakers. Campaigns include Chinese-language lures and malware typically associated with Chinese cybercrime activity. Newly observed ValleyRAT is emerging as a new malware among Chinese-themed cybercrime activity, while Sainbox RAT and related variants are recently active as well.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Pro-Russia Hacker Group NoName Launched a DDoS Attack on Canadian Airports Causing Severe Disruption
Date: 2023-09-21

Pro-Russia hacker group NoName is suspected of launching a DDoS cyberattack that caused significant disruptions at several Canadian airports. The attack affected check-in kiosks and electronic gates, leading to delays in the processing of arrivals at border checkpoints across the country. The Canada Border Services Agency (CBSA) confirmed the DDoS attack and is investigating the incident, assuring that no personal information has been compromised. No evidence of a data breach has been found at this time.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

P2PInfect Botnet Activity Surges 600x with Stealthier Malware Variants
Date: 2023-09-21

The P2PInfect botnet worm has entered a phase of significantly increased activity, with a notable surge observed from late August through September 2023. Initially documented by Unit 42 in July 2023, P2PInfect is categorized as a peer-to-peer malware that exploits a remote code execution vulnerability to breach Redis instances on internet-exposed Windows and Linux systems.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Cyber Group 'Gold Melody' Selling Compromised Access to Ransomware Attackers
Date: 2023-09-21

A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations for other adversaries to conduct follow-on attacks such as ransomware. SecureWorks Counter Threat Unit (CTU) has dubbed the e-crime group Gold Melody, which is also known by the names Prophet Spider (CrowdStrike) and UNC961 (Mandiant).

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

T-Mobile App Glitch Let Users See Other People's Account Info
Date: 2023-09-21

Today, T-Mobile customers said they could see other peoples' account and billing information after logging into the company's official mobile application. According to user reports on social media, the exposed information included customers' names, phone numbers, addresses, account balances, and credit card details like the expiration dates and the last four digits.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Sophisticated Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT
Date: 2023-09-20

Chinese-speaking individuals have become the focus of numerous email phishing campaigns, with the objective of disseminating various malware types like Sainbox RAT, Purple Fox, and a newly identified trojan named ValleyRAT.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

GitLab Releases Urgent Security Patches for Critical Vulnerability
Date: 2023-09-20

GitLab recently rolled out security updates to address a critical vulnerability impacting its enterprise edition. Tracked as CVE-2023-5009, the flaw could enable an attacker to run pipelines as an arbitrary user via scheduled security scan policies. As such, the actor could use elevated permissions of the impersonated user to further access sensitive information, modify source code, or even run arbitrary code on the targeted system.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace
Date: 2023-09-20

Finnish law enforcement authorities have announced the takedown of PIILOPUOTI, a dark web marketplace that specialized in illegal narcotics trade since May 2022. ‘The site operated as a hidden service in the encrypted TOR network,’ the Finnish Customs (aka Tulli) said in a brief announcement on Tuesday. ‘The site has been used in anonymous criminal activities such as narcotics trade.’

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Fake WinRAR Proof-of-Concept Exploit Drops VenomRAT Malware
Date: 2023-09-20

Threat actors exploited a recently disclosed WinRAR vulnerability (CVE-2023-40477) by repurposing an older proof-of-concept (PoC) code. The Zero Day Initiative initially reported the WinRAR vulnerability to the vendor on June 8, 2023, but publicly disclosed it on August 17, 2023. Within four days of the public disclosure, an actor known as "whalersplonk" uploaded a fake PoC script to their GitHub repository.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Snatch Ransomware Alert
Date: 2023-09-20

Snatch is a ransomware group primarily targeting Windows-based systems. They employ various tactics, including exploiting vulnerabilities, brute force attacks, and data exfiltration to compromise and extort victims. Snatch operates under a ransomware-as-a-service (RaaS) model and has targeted critical infrastructure sectors such as Defense Industrial Base (DIB), Food and Agriculture, and Information Technology.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

ShroudedSnooper Threat Actors Target Telecom Companies in the Middle East
Date: 2023-09-20

Telecommunications companies have increasingly become the focus of state-sponsored actors and advanced adversaries in recent years. In 2022, the telecommunications sector consistently ranked as one of the most targeted verticals in Talos IR (Incident Response) engagements. Telecom companies control critical infrastructure assets, which make them attractive targets for adversaries seeking to create significant disruptions.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Trend Micro Fixes Endpoint Protection Zero-day Used in Attacks
Date: 2023-09-20

Trend Micro fixed a remote code execution zero-day vulnerability in the Trend Micro's Apex One endpoint protection solution that was actively exploited in attacks. Apex One is an endpoint security solution catering to businesses of all sizes, and the 'Worry-Free Business Security' suite is designed for small to medium-sized companies.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Earth Lusca Expands Arsenal with SprySocks Linux Malware
Date: 2023-09-20

China-linked threat group Earth Lusca has deployed a new Linux malware called SprySOCKS in a recent cyber espionage campaign. Researchers at Trend Micro discovered this malware while tracking Earth Lusca's activities. SprySOCKS, based on an open-source Windows backdoor called Trochilus, was adapted for Linux. Earth Lusca continues to develop it, as evidenced by different versions detected.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

ISA Releases Additional Malware Analysis Report on Barracuda Backdoors
Date: 2023-09-20

CISA has published an additional malware analysis report associated with malicious Barracuda activity.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

ShroudedSnooper's HTTPSnoop Backdoor Targets Middle East Telecom Companies
Date: 2023-09-19

In the Middle East, telecommunication service providers are facing a new cyber threat known as ShroudedSnooper. This intrusion set employs a stealthy backdoor called HTTPSnoop, as reported by Cisco Talos. HTTPSnoop is a backdoor that uses innovative techniques to interface with Windows HTTP kernel drivers and devices.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Bumblebee Malware Returns in New Attacks Abusing WebDAV Folders
Date: 2023-09-19

The malware loader 'Bumblebee' has broken its two-month vacation with a new campaign that employs new distribution techniques that abuse 4shared WebDAV services. WebDAV (Web Distributed Authoring and Versioning) is an extension of the HTTP protocol that enables clients to perform remote authoring operations such as creating, accessing, updating, and deleting web server content.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data
Date: 2023-09-19

Microsoft on Monday said it took steps to correct a glaring security gaffe that led to the exposure of 38 terabytes of private data. The leak was discovered on the company's AI GitHub repository and is said to have been inadvertently made public when publishing a bucket of open-source training data, Wiz said. It also included a disk backup of two former employees' workstations containing secrets, keys, passwords, and over 30,000 internal Teams messages.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

New AMBERSQUID Cryptojacking Operation Targets Uncommon AWS Services
Date: 2023-09-18

A new cloud-native cryptojacking operation, known as AMBERSQUID, is targeting less common AWS services like AWS Amplify, AWS Fargate, and Amazon SageMaker for illicit cryptocurrency mining. Sysdig, a security firm, identified this campaign while analyzing 1.7 million Docker Hub images and attributed it to Indonesian attackers due to their use of the Indonesian language in scripts and usernames.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

FBI Hacker USDOD Leaks Highly Sensitive TransUnion Data
Date: 2023-09-18

“Researchers at vx-underground have uncovered a major data breach involving the hacker known as "USDoD," who leaked highly sensitive data from TransUnion, a leading consumer credit reporting agency. The breach exposed personal information of 58,505 individuals globally, including names, passport details, financial data, and more, dating back to March 2022.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Canadian Government Targeted With DDoS Attacks by Pro-Russia Group
Date: 2023-09-18

The pro-Russian cybercrime group named NoName057(16) has been observed launching distributed denial-of-service (DDoS) attacks against Canadian organizations, a fresh government alert warns. Since March 2022, the threat actor – also known as NoName05716, 05716nnm or Nnm05716 – has been launching disruptive attacks in support of Russia’s invasion of Ukraine.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

BlackCat Ransomware Hits Azure Storage with Sphynx Encryptor
Date: 2023-09-18

The BlackCat (ALPHV) ransomware gang now uses stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt targets' Azure cloud storage. While investigating a recent breach, Sophos X-Ops incident responders discovered that the attackers used a new Sphynx variant with added support for using custom credentials. After gaining access to the Sophos Central account using a stolen One-Time Password (OTP), they disabled Tamper Protection and modified the security policies

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Iranian Hackers Breach Defense Orgs in Password Spray Attacks
Date: 2023-09-15

Since February 2023, Microsoft has reported that an Iranian-backed threat group known as APT33 (or Peach Sandstorm, HOLMIUM, Refined Kitten) has been conducting password spray attacks against thousands of organizations in the U.S. and globally. These attacks involve attempting to access multiple accounts using a single or commonly used password, increasing the chances of success without triggering account lockouts.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

ORBCOMM Ransomware Attack Causes Trucking Fleet Management Outage
Date: 2023-09-15

Trucking and fleet management solutions provider ORBCOMM has confirmed that a ransomware attack is behind recent service outages preventing trucking companies from managing their fleets. ORBCOMM is a solutions provider for freight companies to manage fleets and track transported assets. The company also provides Electronic Logging Devices (ELD) that truckers use to log their hours to adhere to federal safety regulations.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers
Date: 2023-09-15

An ongoing campaign is targeting Facebook Business accounts with bogus messages to harvest victims' credentials using a variant of the Python-based NodeStealer and potentially take over their accounts for follow-on malicious activities. ‘The attacks are reaching victims mainly in Southern Europe and North America across different segments, led by the manufacturing services and technology sectors.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Pirated Software Likely Cause of Airbus Breach
Date: 2023-09-15

A major data breach at Airbus revealed earlier this week stemmed from a RedLine info-stealer likely hidden in a pirated copy of Microsoft software, according to researchers. The European aerospace giant said it has launched an investigation into the incident.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Enterprises Persist with Outdated Authentication Strategies
Date: 2023-09-15

Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations are struggling to deliver secure and user-friendly authentication. The research uncovered that despite the emergence of modern strategies, most companies still rely on traditional approaches.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Scattered Spider Behind MGM Cyberattack, Targets Casinos
Date: 2023-09-14

The "Scattered Spider" threat group is believed to be responsible for the cyberattack on MGM Resorts that occurred on September 10. This attack has left systems offline in over 30 hotels and casinos owned by the conglomerate worldwide, and the disruption continues even days later. As reported by Reuters, the Scattered Spider ransomware group, as identified by sources familiar with the situation, is believed to consist of young individuals based in the US and UK.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Russian Journalist's iPhone Compromised by NSO Group's Zero-Click Spyware
Date: 2023-09-14

The iPhone belonging to Galina Timchenko, a prominent Russian journalist and critic of the government, was compromised with NSO Group's Pegasus spyware, a new collaborative investigation from Access Now and the Citizen Lab has revealed. The infiltration is said to have happened on or around February 10, 2023. Timchenko is the executive editor and owner of Meduza, an independent news publication based in Latvia.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability
Date: 2023-09-14

Adobe recently addressed a critical flaw in Acrobat and Reader that could enable actors to execute malicious code on targeted systems. Tracked as CVE-2023-26369, the vulnerability has been rated 7.8 out of 10 on the CVSS scale, indicating a high level of severity. According to the vendor, CVE-2023-26369 relates to an out-of-bounds write issue and can be exploited to execute arbitrary code via specially crafted PDF documents.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Suspected Ransomware Attack Hits Auckland Transport's Hop Cards
Date: 2023-09-14

Auckland Transport's Hop card system has been hit by a suspected ransomware attack, leading to disruptions in card top-up services and limited functionality at customer service centers. The attack is under investigation, and there is no indication that personal or financial data has been compromised. Commuters can still use their cards to tag on and off, but online top-ups and services on the AT website are unavailable.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Kubernetes Flaws Could Lead to Remote Code Execution on Windows Endpoints
Date: 2023-09-14

Akamai researchers recently discovered a high-severity vulnerability in Kubernetes tracked as CVE-2023-3676 (CVSS 8.8). This identification of this issue led to the discovery of two more vulnerabilities tracked as CVE-2023-3893, and CVE-2023-3955 (CVSS 8.8). All three vulnerabilities were caused by insecure function call and the lack of user input sanitization.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

MetaStealer Malware is Targeting Enterprise macOS Users
Date: 2023-09-13

A new strain of macOS malware is targeting enterprise users, as indicated by file names and content. Some versions of this malware, called MetaStealer, masquerade as Adobe files, while others use deceptive methods like password-protected ZIP files sent by fake clients. Once opened, these files reveal an app disguised as a PDF.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Ransomware Access Broker Steals Accounts via Microsoft Teams Phishing
Date: 2023-09-13

Microsoft has reported a change in tactics by an initial access broker, previously associated with ransomware groups. This actor, identified as Storm-0324, has shifted its focus to Microsoft Teams phishing attacks as a means to infiltrate corporate networks. Storm-0324 is a financially motivated threat group with a history of deploying ransomware such as Sage and GandCrab in previous campaigns.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family
Date: 2023-09-13

A new ransomware family called 3AM has emerged in the wild after it was detected in a single incident in which an unidentified affiliate deployed the strain following an unsuccessful attempt to deliver LockBit (attributed to Bitwise Spider or Syrphid) in the target network. 3AM gets its name from the fact that it's referenced in the ransom note. It also appends encrypted files with the extension .threeamtime.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Microsoft September 2023 Patch Tuesday Fixes 2 Zero-Days, 59 Flaws
Date: 2023-09-13

As part of the September Patch Tuesday, Microsoft addressed 59 flaws, including two zero-days that were exploited in attacks in the wild. In total, Microsoft released fixes for 3 Security Feature Bypass Vulnerabilities, 24 Remote Code Execution Vulnerabilities, 9 Information Disclosure Vulnerabilities, 3 Denial of Service Vulnerabilities, 5 Spoofing Vulnerabilities, and 5 Edge - Chromium Vulnerabilities.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Mozilla Patches Firefox, Thunderbird Against Zero-day Exploited in Attacks
Date: 2023-09-13

Mozilla released emergency security updates today to fix a critical zero-day vulnerability exploited in the wild, impacting its Firefox web browser and Thunderbird email client. Tracked as CVE-2023-4863, the security flaw is caused by a heap buffer overflow in the WebP code library (libwebp), whose impact spans from crashes to arbitrary code execution.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Facebook Messenger Phishing Wave Targets 100K Business Accounts Per Week
Date: 2023-09-13

Hackers use a massive network of fake and compromised Facebook accounts to send out millions of Messenger phishing messages to target Facebook business accounts with password-stealing malware. The attackers trick the targets into downloading a RAR/ZIP archive containing a downloader for an evasive Python-based stealer that grabs cookies and passwords stored in the victim's browser.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Google Fixes Another Chrome Zero-Day Bug Exploited in Attacks
Date: 2023-09-13

Yesterday, Google released security updates to fix a critical zero-vulnerability in its Chrome web browser. Tracked as CVE-2023-4863, the flaw relates to a heap-based buffer overflow in the WebP image format. Successful exploitation of this issue could result in browser crashes or arbitrary code execution.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Cuba Ransomware Group Unleashes Undetectable Malware
Date: 2023-09-13

Security researchers at Kaspersky have exposed the activities of the infamous ransomware group Cuba. In a recent advisory, Kaspersky revealed that this cyber-criminal gang has been targeting organizations across different industries worldwide. In December 2022, Kaspersky detected a suspicious incident on a client's system, which led to the discovery of three mysterious files triggering the komar65 library, also known as BUGHATCH.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Apple Backports BLASTPASS Zero-Day Fix to Older iPhones
Date: 2023-09-12

Apple released security updates for older iPhones to fix a zero-day vulnerability tracked as CVE-2023-41064 that was actively exploited to infect iOS devices with NSO's Pegasus spyware. CVE-2023-31064 is a remote code execution flaw that is exploited by sending maliciously crafted images via iMessage.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

'Redfly' Hackers Infiltrated Power Supplier's Network for 6 Months
Date: 2023-09-12

An espionage threat group tracked as 'Redfly' hacked a national electricity grid organization in Asia and quietly maintained access to the breached network for six months. These new findings come from Symantec, who found evidence of ShadowPad malware activity in the organization's network between February 28 and August 3, 2023, along with keyloggers and specialized file launchers.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Microsoft Teams Phishing Attack Pushes Darkgate Malware
Date: 2023-09-11

A recent phishing scheme has exploited Microsoft Teams messages as a means to distribute harmful attachments that deploy the DarkGate Loader malware. This campaign commenced in late August 2023, as phishing messages originating from two compromised external Office 365 accounts were observed, targeting various organizations. These accounts were employed to deceive Microsoft Teams users into downloading and launching a ZIP file titled "Alterations to the holiday calendar."

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

'Evil Telegram' Android apps on Google Play infected 60K with spyware
Date: 2023-09-11

Several malicious Telegram clones for Android on Google Play were installed over 60,000 times, infecting people with spyware that steals user messages, contacts lists, and other data. The apps appear to be tailored for Chinese-speaking users and the Uighur ethnic minority, suggesting possible ties to the well-documented state monitoring and repression mechanisms. The apps were discovered by Kaspersky, who reported them to Google.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Ragnar Locker Claims Attack on Israel's Mayanei Hayeshua Hospital
Date: 2023-09-11

The Ragnar Locker ransomware gang has claimed responsibility for an attack on Israel's Mayanei Hayeshua hospital, threatening to leak 1 TB of data allegedly stolen during the cyberattack. The cyberattack on Mayanei Hayeshua occurred in early August, disrupting the hospital's record-keeping system and preventing new patients from receiving care.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Ransomware Attack Wipes Out Four Months of Sri Lankan Government Data
Date: 2023-09-11

Sri Lanka's government cloud system, Lanka Government Cloud (LGC), has fallen victim to a massive ransomware attack that began on August 26, 2023. The attack resulted in the encryption of LGC services and backup systems, affecting approximately 5,000 email addresses using the "gov[dot]lk" domain, including those of the Cabinet Office.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

UK and US Sanction 11 Members of the Russia-Based TrickBot Gang
Date: 2023-09-11

The United States, in coordination with the United Kingdom, sanctioned eleven more individuals who are members of the Russia-based Trickbot cybercrime group. The sanctions were provided by the U.S. Department of the Treasury’s Office of Foreign Assets Control. The sanctioned TrickBot members worked as administrators, managers, developers, and coders, who have materially supported the operations of the group. The group has been tied to Russian intelligence services and has targeted the U.S. government, companies and hospitals.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Mac Users Beware: Malvertising Campaign Spreads Atomic Stealer macOS Malware
Date: 2023-09-08

A new malvertising campaign has been observed distributing an updated version of a macOS stealer malware called Atomic Stealer (or AMOS), indicating that it's being actively maintained by its author. An off-the-shelf Golang malware available for $1,000 per month, Atomic Stealer first came to light in April 2023. Shortly after that, new variants with an expanded set of information-gathering features were detected in the wild, targeting gamers and cryptocurrency users.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Apple Discloses 2 New Zero-Days Exploited to Attack iPhones, Macs
Date: 2023-09-08

Yesterday, Apple issued emergency security updates to address two zero-day flaws that were exploited in attacks targeting iPhone and Mac users. The vulnerabilities are being tracked as CVE-2023-41064 (discovered by Citizen Lab security researchers) and CVE-2023-41061 (discovered by Apple) and were found in the Image I/O and Wallet frameworks. CVE-2023-41064 relates to a validation issue in Wallet which can be exploite

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Attackers Leverage Windows Advanced Installer to Drop Cryptocurrency Malware
Date: 2023-09-08

Attackers operating from IP addresses in France, Luxembourg, and Germany have been utilizing the legitimate Windows tool, Advanced Installer, to create software packages that deliver cryptocurrency mining malware onto computers in various sectors. The malware payloads, as reported by Cisco Talos researchers on September 7, include the M3_Mini_RAT client stub. This remote access trojan enables the attackers to establish backdoors, download, and execute additional threats, including PhoenixMiner for Ethereum cryptocurrency mining and IOIMiner, a multi-coin mining threat.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Mirai Variant Infects Low-Cost Android TV Boxes for DDoS attacks
Date: 2023-09-08

A variant of the Mirai malware botnet has been observed infecting affordable Android TV set-top boxes that are widely used for media streaming by millions of users. Dr. Web's antivirus team reports that this trojan represents a fresh iteration of the 'Pandora' backdoor, initially seen in 2015. The primary focus of this campaign is on economical Android TV boxes such as the Tanix TX6 TV Box, MX10 Pro 6K, and H96 MAX X3.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Cisco Issues Urgent Fix for Authentication Bypass Bug Affecting BroadWorks Platform
Date: 2023-09-08

Cisco has addressed multiple security vulnerabilities, including a critical bug (CVE-2023-20238), which could be exploited by remote attackers to gain control of affected systems or cause a denial-of-service (DoS) condition. The most severe vulnerability allows an attacker to bypass authentication, potentially leading to unauthorized access and misuse of the system.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Iranian Hackers Breach US Aviation Organization via Zoho, Fortinet Bugs
Date: 2023-09-08

State-backed hacking groups have breached a U.S. aeronautical organization using exploits targeting critical Zoho and Fortinet vulnerabilities, a joint advisory published by CISA, the FBI, and the United States Cyber Command (USCYBERCOM) revealed on Thursday.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

September Android updates Fix Zero-Day Exploited in Attacks
Date: 2023-09-08

As part of the September 2023 Android security updates, Google addressed 33 vulnerabilities, including a high-severity zero-day that is actively being exploited in the wild. Tracked as CVE-2023-35674, the zero-day flaw impacts the Android Framework and could allow threat actors to escalate privileges on vulnerable devices without requiring user interaction or additional execution privileges

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

US and UK Sanction 11 TrickBot and Conti Cybercrime Gang Members
Date: 2023-09-08

The USA and the United Kingdom have sanctioned eleven Russian nationals associated with the TrickBot and Conti ransomware cybercrime operations. The TrickBot malware operation launched in 2015 and focused on stealing banking credentials. However, over time, it developed into a modular malware that provided initial access to corporate networks for other cybercrime operations, such as Ryuk and, later, Conti ransomware operations.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

China, North Korea Pursue New Targets While Honing Cyber Capabilities
Date: 2023-09-07

China has developed a new capability using artificial intelligence to automatically generate images for influence operations in the United States and other democracies. These images aim to mimic U.S. voters across the political spectrum and create controversy along racial, economic, and ideological lines. Microsoft's Threat Analysis Center (MTAC) has observed China-affiliated actors using AI-generated visual media in campaigns that focus on politically divisive topics and denigrate U.S. political figures and symbols.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Chinese Cyberspies Obtained Microsoft Signing Key From Windows Crash Dump Due to a Mistake
Date: 2023-09-07

In July, Microsoft announced it had mitigated an attack conducted by a China-linked threat actor, tracked as Storm-0558, which targeted customer emails. Storm-0558 threat actors focus on government agencies in Western Europe and were observed conducting cyberespionage, data theft, and credential access attacks.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

New Python Variant of Chaes Malware Targets Banking and Logistics Industries
Date: 2023-09-07

Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes. ‘It has undergone major overhauls: from being rewritten entirely in Python, which resulted in lower detection rates by traditional defense systems, to a comprehensive redesign and an enhanced communication protocol,’ Morphisec said in a new detailed technical write-up shared with The Hacker News.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

New BLISTER Malware Update Fueling Stealthy Network Infiltration Summary:
Date: 2023-09-07

An updated version of a malware loader known as BLISTER is being used as part of SocGholish infection chains to distribute an open-source command-and-control (C2) framework called Mythic. ‘New BLISTER update includes keying feature that allows for precise targeting of victim networks and lowers exposure within VM/sandbox environments,’ Elastic Security Labs researchers Salim Bitam and Daniel Stepanic said in a technical report published late last month.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

W3ll Phishing Kit Hijacks Thousands of Microsoft 365 Accounts, Bypasses MFA
Date: 2023-09-06

An entity identified as W3LL created a phishing toolkit capable of evading multi-factor authentication and employed various tools to compromise over 8,000 corporate Microsoft 365 accounts. Over the course of ten months, security experts detected the utilization of W3LL's resources and infrastructure in the establishment of approximately 850 phishing campaigns, targeting login credentials for more than 56,000 Microsoft 365 accounts.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Smishing Triad Targeted USPS and US Citizens for Data Theft
Date: 2023-09-06

The "Smishing Triad" cybercriminal group, believed to be Chinese-speaking, has been targeting individuals worldwide through a package tracking text scam sent via iMessage. Impersonating various postal services and government agencies, including the Royal Mail, New Zealand Postal Service, Correos, Postnord, Poste Italiane, and the Italian Revenue Service, the group aims to collect personal and payment information for identity theft and credit card fraud.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

APT28 Cyberattack: Msedge as a Bootloader, TOR, and Mockbin[.]org/Website[.]hook Services as a Control Center
Date: 2023-09-06

The government computer emergency response team of Ukraine, CERT-UA, recorded a targeted cyber attack against a critical energy infrastructure facility in Ukraine. To implement the malicious plan, an e-mail message with a fake sender address and a link to an archive, for example, "photo.zip", was distributed. Visiting the link will download a ZIP archive containing three JPG images (decoys) and a BAT file "weblinks.cmd" to the victim's computer.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

MITRE and CISA Release OT Attack Emulation Tool
Date: 2023-09-06

A new open source tool designed to emulate cyber-attacks against operational technology (OT) has been released by MITRE and the US Cybersecurity and Infrastructure Security Agency (CISA). The MITRE Calder for OT is now publicly available as an extension to the open-source Caldera platform on GitHub.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Exploit released for critical VMware SSH auth bypass vulnerability
Date: 2023-09-05

Summoning Team’s Sina Kheirkhah recently published a proof-of-concept exploit code for a critical SSH authentication bypass vulnerability in VMware’s Aria Operations for Networks analysis tool. Tracked as CVE-2023-34039, the vulnerability can be exploited by remote attackers to bypass SSH authentication on unpatched appliances and access the tool’s command line interface.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

German financial agency site disrupted by DDoS attack since Friday
Date: 2023-09-05

The German Federal Financial Supervisory Authority (BaFin) announced today that an ongoing distributed denial-of-service (DDoS) attack has been impacting its website since Friday. BaFin is Germany’s financial regulatory authority, part of the Federal Ministry of Finance, responsible for supervising 2,700 banks, 800 financial, and 700 insurance service providers.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Hackers Exploit MinIO Storage System to Breach Corporate Networks
Date: 2023-09-05

Two recent vulnerabilities in MinIO have been exploited by threat actors to breach object storage systems. This access allows the actors to view private information, execute arbitrary code, and potentially take over servers. MinIO is a open-source storage service that is compatible with various cloud containers including Amazon S3.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Okta: Hackers Target IT Help Desks to Gain Super Admin, Disable MFA
Date: 2023-09-05

Researchers at Okta issued a warning regarding social engineering attacks directed at IT service desk agents serving U.S.-based clients. The aim of these attacks was to deceive these agents into resetting multi-factor authentication (MFA) for users with elevated privileges. The attackers' ultimate objective was to gain control of Okta Super Administrator accounts, which have extensive privileges. This access would enable them to exploit identity federation functionalities, permitting impersonation of users within the compromised organization.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

North Korean Hackers Behind Malicious VMConnect PyPI Campaign
Date: 2023-09-01

North Korean state-sponsored hackers are behind the VMConnect campaign that uploaded to the PyPI (Python Package Index) repository malicious packages, one of them mimicking the VMware vSphere connector module vConnector. The packages were uploaded at the beginning of August, with one named VMConnect targeting IT professionals seeking virtualization tools.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

WordPress Migration Add-on Flaw Could Lead to Data Breaches
Date: 2023-08-31

Researchers found a vulnerability in the widely-used plugin, All-in-One WP Migration, employed for migrating WordPress sites, and having an active user base of 5 million. This vulnerability involves unauthorized manipulation of access tokens, potentially granting attackers access to sensitive site data. All-in-One WP Migration is a user-friendly tool tailored for WordPress site migration.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users
Date: 2023-08-31

Researchers at ESET recently disclosed details of a new campaign where threat actors are using the Google Play Store and Samsung Galaxy Store to advertise malicious Android apps for Signal and Telegram, with the end goal of infecting unsuspecting users with BadBazaar spyware.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Paramount Discloses Data Breach Following Security Incident
Date: 2023-08-31

American entertainment giant Paramount Global disclosed a data breach after its systems got hacked and attackers gained access to personally identifiable information (PII). Paramount said in breach notification letters signed by Nickelodeon Animation Studio EVP Brian Keane sent to affected individuals that the attackers had access to its systems between May and June 2023.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Cisco VPNs with No MFA Enabled Hit by Ransomware Groups
Date: 2023-08-31

Since March 2023 (and possibly even earlier), affiliates of the Akira and LockBit ransomware operators have been breaching organizations via Cisco ASA SSL VPN appliances, “In some cases, adversaries have conducted credential stuffing attacks that leveraged weak or default passwords; in others, the activity we’ve observed appears to be the result of targeted brute-force attacks on ASA appliances where multi-factor authentication (MFA) was either not enabled or was not enforced for all users (i.e., via MFA bypass groups),” Rapid7 researchers said on Tuesday.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Russian APT Intensifies Cyber Espionage Activities Amid Ukrainian Counter-Offensive
Date: 2023-08-31

According to a new report from the National Security and Defense Council of Ukraine, the Russian Gamaredon group has intensified their cyber espionage activities ahead of and during Ukraine’s current counter-offensive operations.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

How the FBI Nuked Qakbot Malware from Infected Windows PCs
Date: 2023-08-30

Yesterday afternoon, the FBI announced the disruption of the Qakbot botnet. Through an international law enforcement operation, authorities were able to not only seize infrastructure used by operators, but were able to uninstall the malware from infected devices.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote Attacks
Date: 2023-08-30

VMware recently rolled out security updates to fix two vulnerabilities impacting Aria Operations for Networks, which could enable actors to bypass authentication and execute code remotely.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates
Date: 2023-08-30

A new malspam campaign has been observed deploying an off-the-shelf malware called DarkGate. ‘The current spike in DarkGate malware activity is plausible given the fact that the developer of the malware has recently started to rent out the malware to a limited number of affiliates,’ Telekom Security said in a report published last week.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

How to Prevent ChatGPT From Stealing Your Content & Traffic
Date: 2023-08-30

ChatGPT and similar large language models (LLMs) have added further complexity to the ever-growing online threat landscape. Cybercriminals no longer need advanced coding skills to execute fraud and other damaging attacks against online businesses and customers, thanks to bots-as-a-service, residential proxies, CAPTCHA farms, and other easily accessible tools.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Easy-to-Exploit Skype Vulnerability Reveals Users’ IP Address
Date: 2023-08-29

A vulnerability in Skype mobile apps can be exploited by attackers to discover a user’s IP address – a piece of information that may endanger individuals whose physical security depends on their general location remaining secret. The security vulnerability has been discovered by a security researcher named Yossi, who privately reported it to Microsoft and demonstrated its effective exploitation to journalist Joseph Cox.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Spain Warns of LockBit Locker Ransomware Phishing Attacks
Date: 2023-08-29

The Spanish National Police has issued an alert about an active ransomware campaign known as 'LockBit Locker,' which is currently targeting architecture firms in the country using phishing emails. According to the translated police statement, a series of emails have been identified as being sent to architecture companies.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Four in Five Cyber-Attacks Powered by Just Three Malware Loaders
Date: 2023-08-29

Researchers from ReliaQuest found that cybercriminals relied primarily on seven different malware loaders to carry out attacks in the first half of 2023. QakBot, SocGholish, and Raspberry Robin were the most commonly used loaders, accounting for roughly 80% of all intrusions. GootLoader, ChromeLoader, Guloader, and Ursnif were also commonly seen.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Attacks on Citrix NetScaler systems linked to ransomware actor
Date: 2023-08-29

According to Sophos, an unknown threat actor believed to be linked to the FIN8 hacking group, has been exploiting a critical remote code execution flaw (CVE-2023-3519) to compromise unpatched Citrix NetScaler systems in domain-wide attacks.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

MalDoc in PDFs: Hiding Malicious Word Docs in PDF Files
Date: 2023-08-29

Japan's computer emergency response team (JPCERT) is sharing a new 'MalDoc in PDF' attack detected in July 2023 that bypasses detection by embedding malicious Word files into PDFs. The file sampled by JPCERT is a polyglot recognized by most scanning engines and tools as a PDF, yet office applications can open it as a regular Word document (.doc). Polyglots are files that contain two distinct file formats that can be interpreted and executed as more than one file type, depending on the application reading/opening them.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Microsoft: Stealthy Flax Typhoon Hackers Use Lolbins to Evade Detection
Date: 2023-08-29

Microsoft has detected a new hacking collective referred to as Flax Typhoon. This group focuses on government bodies, educational institutions, vital manufacturing units, and IT organizations, presumably with the aim of espionage. The attackers avoid heavy usage of malware for infiltrating and controlling victim networks. Instead, they opt for utilizing existing components within the operating system, often referred to as living-off-the-land binaries (LOLBins), along with legitimate software.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced Capabilities
Date: 2023-08-29

An updated version of a botnet malware called KmsdBot is now targeting Internet of Things (IoT) devices, simultaneously branching out its capabilities and the attack surface. ‘The binary now includes support for Telnet scanning and support for more CPU architectures,’ Akamai security researcher Larry W. Cashdollar said in an analysis published this month. The latest iteration, observed since July 16, 2023, comes months after it emerged that the botnet is being offered as a DDoS-for-hire service to other threat actors.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Rhysida Claims Ransomware Attack On Prospect Medical, Threatens to Sell Data
Date: 2023-08-29

The Rhysida ransomware group recently claimed responsibility for a cyberattack targeting Prospect Medical Holdings, a US healthcare company operating 16 hospitals in California, Connecticut, Pennsylvania, and Rhode Island and a network of 166 outpatient clinics and centers. The attack allegedly took place on August 3rd, with employees finding ransom notes on their systems stating that their network was hacked and devices had been encrypted. Due to the attack, the hospitals were forced to shut down their IT networks to mitigate the impact, causing employees to use paper charts.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Massive MOVEit Campaign Already Impacted at least 1,000 Organizations and 60 Million Individuals
Date: 2023-08-29

Emsisoft released a report this week detailing the massive ransomware campaign carried out by the Cl0p ransomware group, which targeted the MOVEit Transfer file transfer platform. According to Emsisoft, “the attacks impacted approximately 1,000 Organizations and 60,144,069 individuals.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps

Poland’s Authorities Investigate a Hacking Attack on Country’s Railways
Date: 2023-08-29

Poland's Internal Security Agency (ABW) and national police are investigating a hacking attack on the country's state railway network. The attack disrupted railway traffic overnight and triggered an emergency status that stopped trains near the city of Szczecin. The attack is suspected to be part of broader destabilization efforts by Russia, possibly in conjunction with Belarus.

Contact Us For Full Threat Report, Analyst Comments & Mitigation Steps