"Evasion Tactics Used By Cybercriminals To Fly Under The Radar"

"Evasion Tactics Used By Cybercriminals To Fly Under The Radar"

Etay Maor, Chief Security Strategist and founding member of Cyber Threats Research Lab (CTRL) at Cato Networks, highlights some of the top tactics used by cybercriminals to evade traditional security measures. One example of an evasion tactic is the use of crypting-as-a-service providers on the dark web that offer cryptic and code obfuscation services. They involve reconfiguring known malware with a different signature set. As traditional anti-virus filters are signature-based, they cannot detect the tampered malware because it has a new signature.

Submitted by Gregory Rigby on

"Business Email Compromise Costs $55bn Over a Decade"

"Business Email Compromise Costs $55bn Over a Decade"

Since cybercrime has made threat actors tens of billions of dollars over the past decade, the Federal Bureau of Investigation (FBI) has warned organizations to be on the lookout for Business Email Compromise (BEC) attempts. The FBI's Internet Crime Complaint Center (IC3) reported in a recent notice that over 305,000 BEC incidents cost US and global organizations nearly $55.5 billion between October 2013 and December 2023. This article continues to discuss the rising costs of BEC attacks and advice on how to mitigate BEC risk.

Submitted by Gregory Rigby on

"TfL Confirms Customer Data Breach, 17-Year-Old Suspect Arrested"

"TfL Confirms Customer Data Breach, 17-Year-Old Suspect Arrested"

Transport for London (TfL) has recently confirmed that some customer data has been breached following a cyberattack on its systems.  The information accessed by the attackers includes names, email addresses, home addresses, and Oyster refund data, encompassing bank account numbers and sort codes for around 5000 customers.  The National Crime Agency (NCA) revealed it had arrested a 17-year-old male in Walsall, West Midlands, on suspicion of Computer Misuse Act offenses in relation to the TfL cyberattack.

 

Submitted by Adam Ekwall on

"Schools Face Million-Dollar Bills as Ransomware Rises"

"Schools Face Million-Dollar Bills as Ransomware Rises"

According to security researchers at Sophos, schools, colleges, and universities face growing costs from ransomware attacks.  In a new study the researchers found that 44% of schools across 14 nations surveyed faced a ransom demand of $5m or more.  In higher education, 32% faced demands of between $1m and $5m, and 35% over $5m.  The researchers found that schools paid the highest median ransoms at $6.6m.  The researchers noted that the number of ransomware attacks against the education sector actually fell in 2024 compared with 2023.

Submitted by Adam Ekwall on

"Cisco Patches High-Severity Vulnerabilities in Network Operating System"

"Cisco Patches High-Severity Vulnerabilities in Network Operating System"

Cisco recently announced patches for eight vulnerabilities in the IOS XR network operating system, including fixes for six high-severity bugs.  The most severe of the flaws is CVE-2024-20398 (CVSS score of 8.8), an insufficient validation of user arguments that IOS XR passes to specific CLI commands.  Cisco noted that an attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt.  A successful exploit could allow the attacker to elevate privileges to root.

Submitted by Adam Ekwall on

"CosmicBeetle Ransomware Gang May Have Joined RansomHub"

"CosmicBeetle Ransomware Gang May Have Joined RansomHub"

According to ESET, the "CosmicBeetle" ransomware group, also known as "NONAME" or "Spacecolon," may now be affiliated with "RansomHub." ESET's recent report details the activities and tactics that CosmicBeetle has carried out since its discovery in 2023, though the group is suspected to have been active since at least 2020. In June 2024, ESET investigated an attack involving RansomHub's ransomware and Endpoint Detection and Response (EDR) killer, and discovered similarities to CosmicBeetle's previous activities.

Submitted by Gregory Rigby on

"DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe"

"DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe"

A "simplified Chinese-speaking actor" is linked to a new Search Engine Optimization (SEO) rank manipulation campaign targeting countries in Asia and Europe. Cisco Talos calls the black hat SEO cluster "DragonRank," which has victims in Thailand, India, Korea, Belgium, the Netherlands, and China. According to security researcher Joey Chen, DragonRank exploits targets' web application services to deploy a web shell, which is then used to collect system information and launch malware.

Submitted by Gregory Rigby on

"Cybersecurity Workforce Gap Rises by 19% Amid Budget Pressures"

"Cybersecurity Workforce Gap Rises by 19% Amid Budget Pressures"

According to the "2024 ISC2 Cybersecurity Workforce Study," the global cybersecurity workforce gap has grown by 19 percent in the past year, with an additional 4.8 million professionals needed to adequately secure organizations. The top cause of cybersecurity staffing shortages in 2024, according to ISC2 survey respondents, was a lack of budget, replacing a shortage of talent as the leading reason for these shortages in 2023. This article continues to discuss key findings from the 2024 ISC2 Cybersecurity Workforce Study.

Submitted by Gregory Rigby on

"'Ancient' MSFT Word Bug Anchors Taiwanese Drone-Maker Attacks"

"'Ancient' MSFT Word Bug Anchors Taiwanese Drone-Maker Attacks"

Attackers have weaponized an "ancient" version of Microsoft Word in an attack dubbed "WordDrone." The wave of WordDrone attacks targeted Taiwanese drone manufacturers. The malware delivered in these attacks supports the performance of cyber espionage and disruption of military and satellite-related industrial supply chains. Researchers with the Acronis Threat Research Unit discovered the attack, which involves using a Dynamic Link Library (DLL) side-loading technique common in Microsoft Word installation.

Submitted by Gregory Rigby on

"Operational Technology Leaves Itself Open to Cyberattack"

"Operational Technology Leaves Itself Open to Cyberattack"

Team82 security researchers at Claroty highlight that the uncontrolled use of Remote Access Tools (RATs) threatens Operational Technology (OT). According to the researchers, 55 percent of organizations have four or more RATs, and 33 percent use six or more. The team analyzed data from over 50,000 remote access-enabled devices. They found that businesses used non-enterprise-grade tools on OT network devices. These tools lack basic security features such as Multi-Factor Authentication (MFA) and privilege access management.

Submitted by Gregory Rigby on
Subscribe to