"Malicious Email Campaign Steals NTLM Hashes"

"Malicious Email Campaign Steals NTLM Hashes"

TA577, also known in the security industry as Hive0118, has targeted organizations with rogue email attachments that, when opened, steal Microsoft Windows NT LAN Manager (NTLM) authentication information. Researchers warn that the group's recent campaigns involved thousands of email messages sent to hundreds of entities. NTLM is the default authentication mechanism used on Windows networks when a computer attempts to access network resources or services. This article continues to discuss the malicious email campaign that steals NTLM authentication information.

Submitted by Gregory Rigby on

"New Fakext Malware Targets Latin American Banks"

"New Fakext Malware Targets Latin American Banks"

In November 2023, security researchers at IBM Security Trusteer discovered malware called "Fakext," which uses a malicious Edge extension to execute man-in-the-browser and web-injection attacks. Since early November 2023, researchers have seen over 35,000 infected sessions, most of which are in Latin America (LATAM), with a smaller number in Europe and North America. The large number of infected sessions suggests a highly successful and widespread campaign. Fakext injects content onto the screen, including error messages, user forms, and notifications.

Submitted by Gregory Rigby on

"Hackers Target Docker, Hadoop, Redis, Confluence With New Golang Malware"

"Hackers Target Docker, Hadoop, Redis, Confluence With New Golang Malware"

Misconfigured servers running Apache Hadoop YARN, Docker, Confluence, or Redis are the target of new Golang-based malware that automates the discovery and compromise of the hosts. The malicious tools used in the campaign exploit misconfigurations and an old Atlassian Confluence vulnerability to execute code on the system. Cado Security researchers discovered the campaign and examined the attack payloads, bash scripts, and Golang ELF binaries.

Submitted by Gregory Rigby on

"CISA Forced to Take Two Systems Offline Last Month After Ivanti Compromise"

"CISA Forced to Take Two Systems Offline Last Month After Ivanti Compromise"

In February, two systems from the Cybersecurity and Infrastructure Security Agency (CISA) were hacked through issues with Ivanti products. Ivanti provides software to manage IT security and system access. This compromise proved that any company is vulnerable to hacking. Sources reveal that the two systems hit were the Infrastructure Protection (IP) Gateway which contains data about U.S. infrastructure, and the Chemical Security Assessment Tool that contains chemical company security plans. CISA has taken those systems and tools offline.

Submitted by Gregory Rigby on

Dallas Cybersecurity Summit

"The 10th Edition of the Dallas Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."


 


 

Baltimore Cybersecurity Summit

"The Inaugural Baltimore Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."

Sunshine Cyber Conference

"It’s back! Cyber Florida is pleased to announce the return of our popular annual conference, now called the Sunshine Cyber Conference! Save the date for 27-28 March 2024 at the newly renovated Tampa Convention Center! Designed to be educational and affordable, Sunshine Cyber Conference offers valuable content for cybersecurity/IT practitioners, CISOs and CIOs, non-technical managers and c-suite leaders, and educaters, researchers, and students." 

Shift Up Summit

"Cybersecurity is evolving into cyber risk management. It is, therefore, crucial that CISOs, the C-suite, the board, and the markets are able to shift up and communicate with each other in a common language. Companies today face an almost total dependence on technology, economic pressures to cut spending, and new cybersecurity-focused regulations.  The need for executive decision-makers to evolve how they approach the issue of cyber risk has never been more acute.

Zero Trust & Generative AI Conference

"In today's dynamic world, ZERO Trust & Generative AI stands at the forefront of technological innovation, and it is essential to recognize the significance of these transformative technologies. ZERO Trust, with its paradigm shift in security protocols, ensures that trust is never assumed and always verified. On the other hand, Generative AI empowers us to create and innovate in ways previously unimaginable. Together, they represent a powerful force that aligns with the evolving needs of businesses and individuals in an increasingly digital world."

"Massive Ad Fraud Campaign Sends Million of Spam Emails from Thousands of Hijacked Reputable Domains"

"Massive Ad Fraud Campaign Sends Million of Spam Emails from Thousands of Hijacked Reputable Domains"

An ad fraud campaign uses thousands of hijacked legitimate domains and subdomains to send millions of spam emails, generating revenue for the threat actors. The "SubdoMailing" campaign distributes malicious ads to get fraudulent clicks for "Ad network" clients. The campaign, active since September 2022, involves hijacking no longer registered or abandoned domains and subdomains belonging to legitimate brands to send spam from attacker-controlled infrastructure. This article continues to discuss findings regarding the massive ad fraud campaign.

Submitted by Gregory Rigby on
Subscribe to