"Cloudflare Tunnels Abused for Malware Delivery"

"Cloudflare Tunnels Abused for Malware Delivery"

According to Proofpoint, threat actors have been using Cloudflare Tunnels to deliver different Remote Access Trojan (RAT) families. Since February 2024, attackers have abused the TryCloudflare feature to create one-time tunnels without an account in order to distribute "AsyncRAT," "GuLoader," and other RATs. This article continues to discuss threat actors' abuse of Cloudflare's TryCloudflare feature to create one-time tunnels for the distribution of RATs.

Submitted by Gregory Rigby on

"Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal"

"Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal"

The SANS Internet Storm Center reported that new Mirai botnet variants are targeting the open source Enterprise Resource Planning (ERP) framework OFBiz. The Apache Foundation supports OFBiz, a Java-based framework for creating ERP applications. OFBiz seems less prevalent than commercial alternatives, but like any other ERP system, organizations use it for sensitive business data, making security crucial. This article continues to discuss the targeting of the ERP framework OFBiz by the Mirai botnet.

Submitted by Gregory Rigby on

"Fake Google Authenticator Ads Lure Users to Download Malware on GitHub"

"Fake Google Authenticator Ads Lure Users to Download Malware on GitHub"

Attackers have been pushing fake ads to lure users into downloading the popular Google Authenticator Multi-Factor Authentication (MFA) app, which actually leads to downloading malware on GitHub. According to Malwarebytes researchers, hosting the malware file on GitHub enables the threat actor to use a trusted cloud resource that is unlikely to get blocked through traditional means. This article continues to discuss attackers luring users to download malware on GitHub through fake Google Authenticator ads.

Submitted by Gregory Rigby on

"StackExchange Abused to Spread Malicious PyPI Packages as Answers"

"StackExchange Abused to Spread Malicious PyPI Packages as Answers"

According to Checkmarx researchers, threat actors uploaded malicious Python packages to the PyPI repository and promoted them on the online question-and-answer platform StackExchange. The packages download scripts that steal sensitive data from messaging apps, cryptocurrency wallets, and more. The information-stealing malware can also exfiltrate files containing specific keywords, take screenshots, and send all of the data to a Telegram channel. This article continues to discuss hackers' distribution of malicious Python packages through StackExchange.

Submitted by Gregory Rigby on

"Gaming Industry Faces 94% Surge in DDoS Attacks"

"Gaming Industry Faces 94% Surge in DDoS Attacks"

According to Akamai, layer 7 Distributed Denial-of-Service (DDoS) attacks on the gaming industry have increased 94 percent over the past year. The gaming industry is an attractive target for cybercriminals due to its high revenues and extensive player base. The increase in subscription services, which are important for accessing several new games, introduces vulnerabilities. In addition, the rise in new accounts and transactions is accompanied by increased credential theft and phishing scams.

Submitted by Gregory Rigby on

"Organizations Fail to Log 44% of Cyber Attacks, Major Exposure Gaps Remain"

"Organizations Fail to Log 44% of Cyber Attacks, Major Exposure Gaps Remain"

According to Picus Security, 40 percent of tested environments enabled attack paths leading to domain admin access. Since domain admin access is the highest level of access within an organization's Information Technology (IT) infrastructure, it is like giving attackers a master key. Based on the analysis of over 136 million cyberattacks simulated by the Picus Security Validation Platform, the company's report shows that, on average, organizations prevent 7 out of 10 attacks.

Submitted by Gregory Rigby on

"Sitting Ducks DNS Attacks Let Hackers Hijack Over 35,000 Domains"

"Sitting Ducks DNS Attacks Let Hackers Hijack Over 35,000 Domains"

Over 35,000 registered domains have been hijacked in "Sitting Ducks" attacks. These attacks enable a domain to be claimed without access to the owner's account at the Domain Name System (DNS) provider or registrar. Cybercriminals exploit configuration flaws at the registrar level and DNS providers' inadequate ownership verification. Infoblox and Eclypsium found that there are over a million exploitable target domains on any given day. Multiple Russian cybercriminal groups have used this attack vector and the hijacked domains in spam campaigns, malware delivery, and more.

Submitted by Gregory Rigby on

"BingoMod Android RAT Wipes Devices After Stealing Money"

"BingoMod Android RAT Wipes Devices After Stealing Money"

According to Cleafy, "BingoMod," a recently discovered Remote Access Trojan (RAT), targets Android users to steal information and money via Account Takeover (ATO). BingoMod enables threat actors to initiate money transfers from infected devices. It evades authentication, verification, and behavioral detection protections through On-Device Fraud (ODF). Once the device is infected, the malware abuses permissions, performs overlay attacks, and more. This article continues to discuss findings regarding the BingoMod Android RAT.

Submitted by Gregory Rigby on

"BEC Attacks Surge 20% Annually Thanks to AI Tooling"

"BEC Attacks Surge 20% Annually Thanks to AI Tooling"

A new Vipre Security Group study brings further attention to the use of Artificial Intelligence (AI) tools increasing Business Email Compromise (BEC) attacks. According to the company's "Email Threat Trends Report: Q2 2024," 226 million spam messages and nearly 17 million malicious URLs were detected in 1.8 billion emails processed by the vendor during Q2. Forty-nine percent of these blocked spam emails were BEC attacks. Vipre observed a 20 percent rise in BEC attacks. This article continues to discuss the increase in BEC attacks due to AI tools.

Submitted by Gregory Rigby on

"Microsoft: Azure DDoS Attack Amplified by Cyber-Defense Error"

"Microsoft: Azure DDoS Attack Amplified by Cyber-Defense Error"

According to Microsoft, an implementation error amplified the impact of a recent Distributed Denial-of-Service (DDoS) attack that disrupted Azure cloud services for nearly eight hours. The attack affected Azure App Services, Azure IoT Central, Application Insights, Log Search Alerts, and other Azure offerings. The disruption also affected the main Azure portal and some Microsoft 365 and Microsoft Purview data-protection services. This article continues to discuss the DDoS attack, inadvertent errors in DDoS mitigation, and the adoption of "smash and grab" tactics in DDoS attacks.

Submitted by Gregory Rigby on
Subscribe to