"22 Energy Firms Hacked in Largest Coordinated Attack on Denmark’s Critical Infrastructure"

"22 Energy Firms Hacked in Largest Coordinated Attack on Denmark’s Critical Infrastructure"

Non-profit cybersecurity center for critical sectors SektorCERT recently revealed that hackers compromised 22 energy organizations in a coordinated attack against Denmark’s critical infrastructure.  SektorCERT noted that as part of the attack in May 2023, the hackers compromised the victim organizations within a few days, making this the largest attack against Danish critical infrastructure to date.  SektorCERT stated that Denmark is constantly under attack,  but it is unusual that one sees so many concurrent, successful attacks against the critical infrastructure.

Submitted by Adam Ekwall on

"DHS Cybersecurity and Infrastructure Security Agency Releases Roadmap for Artificial Intelligence"

"DHS Cybersecurity and Infrastructure Security Agency Releases Roadmap for Artificial Intelligence"

The US Cybersecurity and Infrastructure Security Agency (CISA) has released its first Roadmap for Artificial Intelligence (AI), adding to the Department of Homeland Security (DHS) and broader whole-of-government initiative to ensure the secure development and implementation of AI capabilities. CISA's Roadmap for AI outlines different lines of effort, which include responsibly using AI to support the agency's mission, assessing AI systems, protecting critical infrastructure from malicious AI use, and more.

Submitted by Gregory Rigby on

"Molerats Group Wields Custom Cybertool to Steal Secrets in the Middle East"

"Molerats Group Wields Custom Cybertool to Steal Secrets in the Middle East"

TA402, also known as Molerats and Frankenstein, a pro-Palestinian cyber espionage group focused on compromising government targets in the Middle East, is using a sophisticated initial access downloader. According to Proofpoint researchers, TA402, which has been active for over a decade, is now using a new tool called IronWind. The group used it in three campaigns targeting systems within government agencies throughout the Middle East and Northern Africa.

Submitted by Gregory Rigby on

"Juniper Networking Devices Under Attack"

"Juniper Networking Devices Under Attack"

The US Cybersecurity and Infrastructure Security Agency (CISA) requires US federal agencies to patch five vulnerabilities exploited by attackers to compromise Juniper networking devices. Most of these vulnerabilities are not particularly dangerous on their own, but they can and have been chained together by attackers to enable Remote Code Execution (RCE) on Internet-facing devices. Juniper Networks patched four flaws impacting the J-Web Graphical User Interface (GUI) of Junos OS-powered devices in late August 2023, and advised customers to update their SRX firewalls and EX switches.

Submitted by Gregory Rigby on

"Meet the Unique New 'Hacking' Group: AlphaLock"

"Meet the Unique New 'Hacking' Group: AlphaLock"

Researchers have discovered a new hacking group named "AlphaLock," which presents itself as a "pentesting training organization" that provides training to hackers and then monetizes their services through a dedicated affiliate program. AlphaLock seems relatively sophisticated and active on Telegram, Matrix, and the dark web forum XSS. Their business model is composed of the Bazooka Code Pentest Training and the ALPentest Hacking Marketplace. This article continues to discuss the business model and launch of the AlphaLock group.

Submitted by Gregory Rigby on

"OracleIV DDoS Botnet Targets Public Docker Engine APIs to Hijack Containers"

"OracleIV DDoS Botnet Targets Public Docker Engine APIs to Hijack Containers"

Threat actors are targeting publicly accessible Docker Engine Application Programming Interface (API) instances as part of a campaign to co-opt the machines into the OracleIV Distributed Denial-of-Service (DDoS) botnet. According to Cado researchers, the attackers are exploiting this misconfiguration to deliver a malicious Docker container built from an image named 'oracleiv_latest,' containing Python malware compiled as an ELF executable.

Submitted by Gregory Rigby on

"Royal Ransomware Possibly Rebranding After Targeting 350 Organizations Worldwide"

"Royal Ransomware Possibly Rebranding After Targeting 350 Organizations Worldwide"

Since its inception, the Royal ransomware gang has targeted at least 350 organizations worldwide, with ransom demands exceeding $275 million.  According to the US cybersecurity agency CISA and the FBI, the cybercriminals may be preparing to rebrand their operation.  The group has been active since at least September 2022.  In March 2023, CISA and the FBI issued an alert on the Royal ransomware operation, urging organizations to implement security best practices to protect their environments against Royal and other ransomware attacks.

Submitted by Adam Ekwall on

"In a First, Cryptographic Keys Protecting SSH Connections Stolen in New Attack"

"In a First, Cryptographic Keys Protecting SSH Connections Stolen in New Attack"

Researchers have demonstrated for the first time that a large portion of the cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to complete compromise when natural computational errors happen during the establishing of the connection. They used their findings to calculate the private portion of about 200 unique SSH keys they observed in public Internet scans carried out over the past seven years. The researchers believe that keys used in IPsec connections may face the same fate. This article continues to discuss the new attack.

Submitted by Gregory Rigby on

"Gone Phishing: Hackers Leverage Automation to Launch MFA Attacks and SEO Poisoning"

"Gone Phishing: Hackers Leverage Automation to Launch MFA Attacks and SEO Poisoning"

With new automation tools, cybercriminals can now exploit users in many new ways, but at least two stand out as particularly concerning this year: Multi-Factor Authentication (MFA) attacks and Search Engine Optimization (SEO) poisoning. MFA has long been a critical component of business security, and most companies now require it to make it more difficult for adversaries to gain access to and take over accounts. However, cybercriminals are integrating new methods to bypass MFA into their phishing attacks by intercepting or sidestepping generated codes.

Submitted by Gregory Rigby on

"AI Can Help Agencies Enhance Their Cyber Defense, Study Finds"

"AI Can Help Agencies Enhance Their Cyber Defense, Study Finds"

According to a recent survey of federal agencies' defensive cyber operations, Artificial Intelligence (AI) tools can help the government better identify and defend against various cyber threats. The report recently released by General Dynamics Information Technology (GDIT) found that many federal officials were overwhelmed with data as well as concerned about human oversight and staffing challenges' impact on existing cyber risks, which AI could address.

Submitted by Gregory Rigby on
Subscribe to