Cyber Scene - Cyber Threats and Counterthreats

Cyber Scene - Cyber Threats and Counterthreats

By krahal

The world seems to twirl faster. We have recently enjoyed a rare solar eclipse and a visit by auroras. Mother Nature has also sent tornados—all within a few weeks. So too does cyber in the tech world, and perhaps even faster. The challenge is embracing and expanding the good and controlling the bad.

Submitted by Gregory Rigby on

"Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha"

"Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha"

A new campaign targets Brazilian banks with "AllaSenha," a custom variant of the Windows-based "AllaKore" Remote Access Trojan (RAT). The malware uses Azure cloud as Command-and-Control (C2) infrastructure, according to the cybersecurity company HarfangLab. The attack begins with a malicious Windows shortcut (LNK) file posing as a PDF document hosted on a WebDAV server. This article continues to discuss findings regarding the new AllaKore RAT variant.

Submitted by Gregory Rigby on

"XSS Vulnerabilities Found in WordPress Plugin Slider Revolution"

"XSS Vulnerabilities Found in WordPress Plugin Slider Revolution"

Security researchers at Patstack conducted a security audit recently of the Slider Revolution plugin and uncovered two significant vulnerabilities that could compromise the security of WordPress websites. Slider Revolution is a widely used premium plugin with over 9 million active users.  It was found to have an unauthenticated stored XSS vulnerability.  This flaw could allow unauthorized users to steal sensitive information and escalate privileges on WordPress sites with a single HTTP request.

Submitted by Adam Ekwall on

"Okta Warns of Credential Stuffing Attacks Targeting Its CORS Feature"

"Okta Warns of Credential Stuffing Attacks Targeting Its CORS Feature"

Okta, a leading Identity and Access Management (IAM) company, warns that since April, credential stuffing attacks have targeted a Customer Identity Cloud (CIC) feature. Credential stuffing attacks involve threat actors creating large lists of usernames and passwords stolen in data breaches or by malware to break into online accounts. Okta found credential stuffing attacks targeting endpoints utilizing CIC's Cross-Origin Resource Sharing (CORS) feature. This article continues to discuss the credential stuffing attacks targeting Okta's CORS feature.

Submitted by Gregory Rigby on

"Sonatype Exposes Malicious PyPI Package 'Pytoileur'"

"Sonatype Exposes Malicious PyPI Package 'Pytoileur'"

Sonatype has disclosed the malicious PyPI package "Pytoileur," which is designed to download and install trojanized Windows binaries that are capable of surveillance, commandeering persistence, and stealing cryptocurrency. This package is part of the "Cool package" campaign, an initiative to infiltrate the coding community. The recently published PyPI package "Pytoileur" was detected by an automated malware detection system operated by Sonatype. It had been downloaded 264 times since its release before Sonatype notified PyPI administrators to remove it.

Submitted by Gregory Rigby on

"34% of Organizations Lack Cloud Cybersecurity Skills"

"34% of Organizations Lack Cloud Cybersecurity Skills"

According to Cado Security, current incident response is too time-consuming and manual, leaving organizations vulnerable to cyber threats. Enterprises rapidly deploy cloud and container-based technologies and adopt a multi-cloud strategy, complicating incident response. Incident response is crucial to organizations, but the report found widespread shortcomings that leave them vulnerable to delays in incident resolution and regulatory noncompliance. Before containing and investigating, 90 percent of organizations suffer damage.

Submitted by Gregory Rigby on

"First American December Data Breach Impacts 44,000 People"

"First American December Data Breach Impacts 44,000 People"

​First American Financial Corporation, the second-largest title insurance company in the United States, recently revealed that a December cyberattack led to a breach impacting 44,000 individuals.  On December 21, 2023, the company provided very few details regarding the nature of the incident and was forced to take some of its systems offline to contain the impact of the cyberattack.  Five months later, the title insurance provider disclosed in a filing with the U.S.

Submitted by Adam Ekwall on

"US Sanctions Three Chinese Men for Operating 911 S5 Botnet"

"US Sanctions Three Chinese Men for Operating 911 S5 Botnet"

The Treasury Department recently announced sanctions against three Chinese nationals accused of creating and operating a botnet named 911 S5. The Treasury's Office of Foreign Assets Control (OFAC) has designated Yunhe Wang, Jingping Liu, and Yanni Zheng, as well as Spicy Code Company Limited, Tulip Biz Pattaya Group Company Limited, and Lily Suites Company Limited, which are Thailand-based companies that are allegedly owned or controlled by Wang. According to the Department of Justice (DoJ), Wang was the primary administrator of 911 S5, while Liu was responsible for laundering cri

Submitted by Adam Ekwall on
Subscribe to