"macOS Vulnerability Could Expose User Data, Microsoft Warns"

"macOS Vulnerability Could Expose User Data, Microsoft Warns"

Microsoft has recently uncovered a macOS vulnerability that can enable attackers to gain access to users' protected data and warned active exploitation may be taking place.  Microsoft dubbed the flaw "HM Surf," which allows attackers to bypass the operating system's Transparency, Consent, and Control (TCC) technology to access sensitive user data, including browsed pages and the device's camera, microphone, and location.  The vulnerability is identified as CVE-2024-44133, with a medium severity rating.

Submitted by Adam Ekwall on

"Microsoft Named Most Imitated Brand in Phishing Attacks"

"Microsoft Named Most Imitated Brand in Phishing Attacks"

According to security researchers at ChecPoint, Microsoft appeared as the most impersonated brand in phishing attacks during the third quarter of 2024, with 61% of brand phishing attempts leveraging Microsoft branding.  Apple came in second most impersonated brand, with 12% of phishing attempts using the firm's branding. Google, which came fourth in Q2, reached third place at 7% in Q3.

Submitted by Adam Ekwall on

"Brazilian Police Arrest Notorious Hacker USDoD"

"Brazilian Police Arrest Notorious Hacker USDoD"

Brazil's Federal Police recently announced the arrest of a hacker whose description matches that of the notorious leaker known as USDoD.  USDoD, aka EquationCorp, has leaked significant amounts of information stolen from major organizations.  His targets include the FBI's InfraGard portal, Airbus, TransUnion, National Public Data (NPD), and CrowdStrike. In August, CrowdStrike and others independently determined that USDoD is a 33-year-old man identified as Luan B.G. and Luan G from the Brazilian state of Minas Gerais.

Submitted by Adam Ekwall on

"Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters"

"Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters"

Cisco recently announced patches for eight vulnerabilities in the firmware of ATA 190 series analog telephone adapters, including two high-severity flaws leading to configuration changes and cross-site request forgery (CSRF) attacks.  The first high-severity flaw, CVE-2024-20458, impacts the web-based management interface of the firmware and exists because specific HTTP endpoints lack authentication, allowing remote, unauthenticated attackers to browse to a specific URL and view or delete configurations or modify the firmware.

Submitted by Adam Ekwall on

"Two-thirds of Attributable Malware Linked to Nation States"

"Two-thirds of Attributable Malware Linked to Nation States"

According to Netskope Threat Labs, most of the attributable malware used in attacks on their customers over the past year is linked to state-backed groups.  The SASE provider based its findings on 12 months of data collected from customer environments, claiming the largest share of malware attacks came from North Korean groups, followed by China and Russia.  The Netskope findings would seem to validate warnings from the security services that state-backed cyber threats are spiraling out of control.

Submitted by Adam Ekwall on

"Iranian Cyber Actors Access Critical Infrastructure Networks"

"Iranian Cyber Actors Access Critical Infrastructure Networks"

The National Security Agency (NSA), together with the Federal Bureau of Investigation (FBI), the US Cybersecurity and Infrastructure Security Agency (CISA), and others, has released a Cybersecurity Advisory (CSA) titled "Iranian Cyber Actors' Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations." The new CSA warns network defenders about malicious activity that can allow persistent access to sensitive systems.

Submitted by Gregory Rigby on

"Anonymous Sudan DDoS Service Disrupted, Members Charged by US"

"Anonymous Sudan DDoS Service Disrupted, Members Charged by US"

The US Department of Justice (DoJ) has announced charges against two Sudanese nationals for their participation in Distributed Denial-of-Service (DDoS) attacks conducted by the hacker group named "Anonymous Sudan." Anonymous Sudan has targeted critical infrastructure, government organizations, and more with highly disruptive DDoS attacks. The cybercriminals also offered DDoS attack services to take down websites and online services. This article continues to discuss the DoJ's announcement of charges against Anonymous Sudan members and the disruption of their DDoS attack services.

Submitted by Gregory Rigby on

"North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware"

"North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware"

The North Korean threat actor "ScarCruft" exploited a Windows security flaw to infect devices with the "RokRAT" malware. The flaw is a memory corruption bug in the Scripting Engine that enables Remote Code Execution (RCE) when using the Edge browser in Internet Explorer Mode. To exploit it, an attacker must convince a user to click on a specially crafted URL to execute the malicious code. This article continues to discuss findings regarding ScarCruft's delivery of RokRAT malware.

Submitted by Gregory Rigby on

"RansomHub Overtakes LockBit as Most Prolific Ransomware Group"

"RansomHub Overtakes LockBit as Most Prolific Ransomware Group"

According to security researchers at Symantec, RansomHub is now the number one ransomware operation in terms of claimed successful attacks.  Overall, threat actors claimed 1255 attacks in the third quarter, down slightly from 1325 in Q2.    The researchers noted that RansomHub only became active in February this year but claimed top spot in Q3 with 191 victims posted to leak sites, up 155% on Q2's haul.

Submitted by Adam Ekwall on

"TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns"

"TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns"

New variants of the Android banking trojan "TrickMo" have features for stealing a device's unlock pattern or PIN. According to Aazim Yaswant, a security researcher at Zimperium, these previously undocumented features allow the threat actor to operate on the device even when it is locked. TrickMo, first discovered in the wild in 2019, can grant remote control over infected devices, steal SMS-based One-Time Passwords (OTPs), and display overlay screens to capture credentials. This article continues to discuss findings regarding new TrickMo variants.

Submitted by Gregory Rigby on
Subscribe to