#threat-actor

[ follow ]
Privacy professionals
BleepingComputer
1 month ago
Privacy professionals

Acer confirms Philippines employee data leaked on hacking forum

Employee data stolen from Acer Philippines by threat actor 'ph1ns'.
Acer confirms no ransomware involved, but only employee data compromised. [ more ]
ComputerWeekly.com
1 month ago
Privacy professionals

Fancy Bear sniffs out Ubiquiti router users | Computer Weekly

American authorities warn Ubiquiti's EdgeRouter users of Russian Fancy Bear threat actor targeting.
Users advised to perform factory reset, update firmware, change credentials, and implement firewall rules for protection. [ more ]
BleepingComputer
2 months ago
Privacy professionals

HPE investigates new breach after data for sale on hacking forum

HPE is investigating a potential breach after a threat actor claimed to have stolen data and is selling it on a hacking forum.
HPE has not found evidence of a security breach and no ransom has been requested, but they are investigating the claims. [ more ]
TechRepublic
4 months ago
Privacy professionals

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters are being targeted in a new social engineering attack campaign by threat actor TA4557.
The campaign involves sending benign emails and tricking recruiters into visiting fake resume websites and downloading malware. [ more ]
SecurityWeek
11 months ago
Privacy professionals

Millions of Smartphones Distributed Worldwide With Preinstalled 'Guerrilla' Malware

A threat actor has control over millions of smartphones distributed worldwide thanks to a piece of malware that has been preinstalled on the devices, Trend Micro warned.It has been known for several years that smartphones, particularly budget devices, may be shipped with shady firmware that can give companies or other entities access to user data.
SecurityWeek
11 months ago
Privacy professionals

T-Mobile Says Personal Information Stolen in New Data Breach

US wireless carrier T-Mobile is informing some customers that their personal information was compromised in a recent data breach.After being alerted to unauthorized activity on its systems, the company discovered that a malicious actor had access to a "small number" of T-Mobile accounts between late February and March 2023.
morePrivacy professionals
Privacy technologies
Databreaches
3 months ago
Privacy technologies

Fred Hutch failed to reveal threats of potential swatting attacks until this site revealed the threat. Should they have disclosed it themselves?

A threat actor claimed to have threatened Fred Hutch with swatting patients during a cyberattack.
DataBreaches cannot confirm if the swat threat was actually made or not. [ more ]
Databreaches
3 months ago
Privacy technologies

Recent attacks on Fred Hutch and Integris: Is attempting to extort patients directly becoming the "new normal?"

DataBreaches previously reported a breach involving Integris Health in Oklahoma.
morePrivacy technologies
Information security
SecurityWeek
11 months ago
Information security

New Babuk-Based Ransomware Targeting Organizations in US, Korea

An emerging threat actor has been targeting organizations in the US and South Korea with a new ransomware family based on leaked Babuk source code, Cisco's Talos research unit reports.Dubbed RA Group and active since April 2023, the gang has compromised at least three organizations in the US and one in South Korea, spanning across the insurance, manufacturing, pharmaceuticals, and wealth management sectors.
SecurityWeek
11 months ago
Information security

Discord Informs Users of Data Breach Involving Customer Support Provider

VoIP and instant messaging social platform Discord is notifying users that some of their information was compromised in a cybersecurity incident at a third-party services provider.Late last week, the company informed users that a "third-party customer service agent's support ticket queue" was accessed without authorization, resulting in user email addresses, contents of customer service messages, and attachments being compromised.
TechRepublic
11 months ago
Information security

InfoBlox discovers rare Decoy Dog C2 exploit

Domain security firm InfoBlox discovered a command-and-control exploit that, while extremely rare and complex, could be a warning growl from a new, as-yet anonymous state actor.If you do a search for the most recent reports on Domain Name System attacks, you may have a hard time finding one since IDC's 2021 report noting that in 2020, 87% of organizations experienced a DNS attack during 2020.
Ars Technica
1 year ago
Information security

Pro-Russian hackers target elected US officials supporting Ukraine

Threat actors aligned with Russia and Belarus are targeting elected US officials supporting Ukraine, using attacks that attempt to compromise their email accounts, researchers from security firm Proofpoint said.The campaign, which also targets officials of European nations, uses malicious JavaScript that's customized for individual webmail portals belonging to various NATO-aligned organizations, a report Proofpoint published Thursday said.
TechRepublic
1 year ago
Information security

Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office

Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit.Learn how to protect your business from this AitM campaign.New research from Microsoft's Threat Intelligence team exposed the activities of a threat actor named DEV-1101, which started advertising for an open-source phishing kit to deploy an adversary-in-the-middle campaign.
Ars Technica
1 year ago
Information security

Hackers drain bitcoin ATMs of $1.5 million by exploiting 0-day bug

Hackers drained millions of dollars in digital coins from cryptocurrency ATMs by exploiting a zero-day vulnerability, leaving customers on the hook for losses that can't be reversed, the kiosk manufacturer has revealed.The heist targeted ATMs sold by General Bytes, a company with multiple locations throughout the world.
moreInformation security
ComputerWeekly.com
11 months ago
Privacy professionals

MS macro-blocking has forced cyber criminals to innovate | Computer Weekly

Microsoft's attempt to thwart malicious actors from tricking users into executing malware and ransomware, by blocking Visual Basic for Applications (VBA) and Excel 4.0 (XL4) macros by default in its most popular Office applications, has had a profound affect on the cyber criminal landscape, according to data from Proofpoint.
TechRepublic
1 year ago
Information security

Attack campaign on edge appliance: undetected since 2021 and resists firmware update

A possible Chinese attack campaign on compromised unpatched SonicWall SMA edge devices stayed undetected since 2021 and could persist even through firmware updates.As reported by a new Mandiant research document, a new malware is made of several bash scripts and a single Executable and Linkable Format (ELF) binary file identified as a TinyShell backdoor variant.
Theregister
1 year ago
Privacy professionals

Android discovery nets security researcher $70k bounty

In brief A security researcher whose Google Pixel battery died while sending a text is probably thankful for the interruption - powering it back up led to a discovery that netted him a $70,000 bounty from Google for a lock screen bypass bug.Now patched, the vulnerability would let anyone with a spare SIM card and access to a device to completely bypass the lock screen, giving them unfettered access to the device.
Theregister
1 year ago
Privacy professionals

HelloXD ransomware bulked up with improved encryption

Windows and Linux systems are coming under attack by new variants of the HelloXD ransomware that includes stronger encryption, improved obfuscation and an additional payload that enables threat groups to modify compromised systems, exfiltrate files and execute commands.
SecurityWeek
11 months ago
Information security

WordPress Field Builder Plugin Vulnerability Exploited in Attacks Two Days After Patch

Threat actors were seen adopting public proof-of-concept (PoC) exploit code targeting a cross-site scripting (XSS) vulnerability in the Advanced Custom Fields WordPress plugin only two days after a patch was released, Akamai reports.Tracked as CVE-2023-30777, the high-severity vulnerability could allow attackers to inject malicious scripts and other payloads into vulnerable websites.
SecurityWeek
11 months ago
Information security

CISA: Several Old Linux Vulnerabilities Exploited in Attacks

The US Cybersecurity and Infrastructure Security Agency (CISA) has added several Linux and Linux-related flaws to its known exploited vulnerabilities (KEV) catalog.The agency added seven new vulnerabilities to its KEV catalog on Friday: Ruckus AP remote code execution (CVE-2023-25717), Red Hat Polkit privilege escalation (CVE-2021-3560), Linux kernel privilege escalations (CVE-2014-0196 and CVE-2010-3904), Jenkins UI information disclosure (CVE-2015-5317), Apache Tomcat remote code execution (CVE-2016-8735), and an Oracle Java SE and JRockit issue (CVE-2016-3427).
SecurityWeek
11 months ago
Information security

Chinese APT Uses New 'Stack Rumbling' Technique to Disable Security Software

A subgroup of the Chinese state-sponsored threat actor known as APT41 has been observed using a new denial-of-service (DoS) technique to disable security software, cybersecurity firm Trend Micro reports.Tracked as Earth Longzhi, the APT41 subgroup is known for the targeting of organizations in the Philippines, Taiwan, and Thailand.
SecurityWeek
1 year ago
Privacy professionals

Casino Giant Crown Resorts Investigating Ransomware Group's Data Theft Claims

Australian casino giant Crown Resorts this week confirmed that the Cl0p ransomware group contacted them to claim the theft of data as part of the GoAnywhere attack.The incident occurred in late January, when a zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software was exploited to access files belonging to Fortra customers.
SecurityWeek
1 year ago
Information security

Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies

Fortinet recently warned that a FortiOS zero-day vulnerability has been exploited in attacks aimed at government organizations.Google-owned cybersecurity firm Mandiant reported on Thursday that those attacks were likely conducted by a Chinese state-sponsored threat actor.The vulnerability in question is tracked as CVE-2022-41328 and it has been described as a medium-severity path traversal issue in FortiOS that can lead to command execution.
SecurityWeek
1 year ago
Information security

Microsoft Pins Outlook Zero-Day Attacks on Russian Actor, Offers Detection Script

Microsoft's threat intelligence team is blaming a "Russian-based threat actor" for newly disclosed in-the-wild attacks targeting a critical vulnerability in its flagship Microsoft Outlook software.One day after sounding an alarm for live exploitation of the Outlook security flaw, Microsoft said it traced the exploit to a Russian APT targeting a limited number of organizations in government, transportation, energy, and military sectors in Europe.
SecurityWeek
11 months ago
Information security

CISA, FBI: Ransomware Gang Exploited PaperCut Flaw Against Education Facilities

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have raised the alarm on a recent PaperCut vulnerability being exploited in ransomware attacks targeting the education sector.Described as an improper access control issue in the PaperCut MF/NG print management system and tracked as CVE-2023-27350 (CVSS score of 9.8), the flaw allows remote, unauthenticated attackers to bypass authentication and execute arbitrary code on vulnerable devices, with System privileges.
SecurityWeek
1 year ago
Information security

Microsoft: Cl0p Ransomware Exploited PaperCut Vulnerabilities Since April 13

A Cl0p ransomware operator affiliated with the FIN11 and TA505 threat actors has been exploiting recently patched PaperCut vulnerabilities since April 13, Microsoft says.Impacting the PaperCut MF/NG print management system and tracked as CVE-2023-27350 (CVSS score of 9.8), the issue can be exploited to bypass authentication and achieve remote code execution (RCE) with System privileges.
TechRepublic
1 year ago
Information security

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope.Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat.The cybersecurity company CrowdStrike has observed the first-ever Dero cryptojacking campaign.The attack targets Kubernetes clusters that were accessible on the internet and allowed anonymous access to the Kubernetes API.
SecurityWeek
1 year ago
Information security

Fortinet Patches Critical Code Execution Vulnerabilities in FortiNAC, FortiWeb

Fortinet released 40 security advisories last week to inform customers about the availability of patches for dozens of vulnerabilities, including critical flaws affecting the FortiNAC and FortiWeb products.Two of the advisories have a 'critical' severity rating and 15 of them have been classified as having 'high' severity.
ComputerWeekly.com
1 year ago
Privacy professionals

Dropbox code compromised in phishing attack

Cloud storage service Dropbox has been sharing details of how it was successfully targeted by a phishing campaign in which a threat actor impersonated the code integration and delivery platform CircleCI to access one of its GitHub accounts and compromise code and data.The information accessed included API keys used by Dropbox's developers, and data including the names and email addresses of a very limited number of employees, customers, sales leads and vendors, described as in the thousands.
Ars Technica
1 year ago
Information security

Ongoing phishing campaign can hack you even when you're protected with MFA

On Tuesday, Microsoft detailed an ongoing large-scale phishing campaign that can hijack user accounts when they're protected with multi-factor authentication measures designed to prevent such takeovers.
SecurityWeek
11 months ago
Privacy professionals

Meta Swiftly Neutralizes New 'NodeStealer' Malware

Facebook parent company Meta says it disrupted a novel malware family within weeks after it emerged earlier this year.Dubbed NodeStealer, the threat was designed to steal cookies and usernames and passwords from browsers such as Chrome, Edge, Brave, and Opera, to compromise online accounts.A custom JavaScript malware first observed in January 2023, NodeStealer is likely of Vietnamese origin, being distributed disguised as PDF and XLSX files.
SecurityWeek
11 months ago
Information security

New 'Lobshot' hVNC Malware Used by Russian Cybercriminals

Russian cybercrime group TA505 has been observed using new hVNC (Hidden Virtual Network Computing) malware in recent attacks, threat intelligence company Elastic reports.Called Lobshot, the malware allows attackers to bypass fraud detection engines and provides them with stealthy, direct access to the infected machines.
Theregister
1 year ago
Privacy professionals

Here's how Chinese spies exploited a critical Fortinet bug

Suspected Chinese spies have exploited a critical Fortinet bug, and used custom networking malware to steal credentials and maintain network access, according to Mandiant security researchers.Fortinet fixed the path transversal vulnerability in FortiOS, tracked as CVE-2022-41328, earlier this month.
SecurityWeek
1 year ago
Information security

Fortinet Finds Zero-Day Exploit in Government Attacks After Devices Detect Integrity Breach

Fortinet warns that a recently addressed FortiOS vulnerability has been exploited by a sophisticated threat actor in highly targeted attacks against governmental and government-related entities.Patched last week, the bug is tracked as CVE-2022-41328 and is described as a medium-severity path traversal issue leading to command execution.
SecurityWeek
1 year ago
Information security

Cybercrime Gang Uses Screenlogger to Identify High-Value Targets in US, Germany

A recently identified financially motivated threat actor is targeting companies in the United States and Germany with custom malware, including a screenlogger it uses for reconnaissance, Proofpoint reports.Tracked as TA866, the adversary appears to have started the infection campaign in October 2022, with the activity continuing into January 2023.
Ars Technica
1 year ago
Privacy professionals

Malware infecting widely used security appliance survives firmware updates

Threat actors with a connection to the Chinese government are infecting a widely used security appliance from SonicWall with malware that remains active even after the device receives firmware updates, researchers said.SonicWall's Secure Mobile Access 100 is a secure remote access appliance that helps organizations securely deploy remote workforces.
Ars Technica
11 months ago
Privacy professionals

T-Mobile discloses 2nd data breach of 2023, this one leaking account PINs and more

T-Mobile on Monday said it experienced a hack that exposed account PINs and other customer data in the company's second network intrusion this year and the ninth since 2018.The intrusion, which started on February 24 and lasted until March 30, affected 836 customers, according to a notification on the website of Maine Attorney General Aaron Frey.
Ars Technica
1 year ago
Privacy professionals

Trojanized Windows and Mac apps rain down on 3CX users in massive supply chain attack

Hackers working on behalf of the North Korean government have pulled off a massive supply chain attack on Windows and macOS users of 3CX, a widely used voice and video calling desktop client, researchers from multiple security firms said.The attack compromised the software build system used to create and distribute both Windows and macOS versions of the app, which provides both VoIP and PBX services to " 600,000+ customers," including American Express, Mercedes-Benz, and Price Waterhouse Cooper.
ComputerWeekly.com
1 year ago
Privacy professionals

OSC&R supply chain security framework goes live on Github | Computer Weekly

The backers of the Open Software Supply Chain Attack Reference (OSC&R) framework for supply chain security has gone live on Github, enabling anybody to contribute to the model.The MITRE ATT&CK-like framework was launched in February with the stated goal of helping security teams improve their understanding of software supply chain threats, evaluate them and get to grips with them.
TechRepublic
1 year ago
Information security

Royal ransomware spreads to Linux and VMware ESXi

A new Linux version of Royal ransomware is targeting VMware ESXi virtual machines.Learn more about this security threat and how to protect from it.Royal ransomware is malware that first appeared around September 2022.The people behind this ransomware are probably a subgroup of the infamous Conti threat actor.
Ars Technica
1 year ago
Privacy professionals

First LastPass, now Slack and CircleCI. The hacks go on (and will likely worsen)

In the past 24 hours, the world has learned of serious breaches hitting chat service Slack and software testing and delivery company CircleCI, though giving the companies' opaque wording-"security issue" and "security incident," respectively-you'd be forgiven for thinking these events were minor.
Ars Technica
1 year ago
Information security

Patches for 6 zero-days under active exploit are now available from Microsoft

It's the second Tuesday of the month, and that means it's Update Tuesday, the monthly release of security patches available for nearly all software Microsoft supports.This time around, the software maker has fixed six zero-days under active exploit in the wild, along with a wide range of other vulnerabilities that pose a threat to end users.
Ars Technica
1 year ago
Privacy professionals

Lawsuits say Meta evaded Apple privacy settings to spy on millions of users

After Apple updated its privacy rules in 2021 to easily allow iOS users to opt out of all tracking by third-party apps, so many people opted out that the Electronic Frontier Foundation reported that Meta lost $10 billion in revenue over the next year.
SecurityWeek
1 year ago
Privacy professionals

GoAnywhere Zero-Day Attack Hits Major Orgs

More organizations are emerging to confirm impact from the newly disclosed in-the-wild zero-day exploits hitting Fortra's GoAnywhere managed file transfer (MFT) software.Tracked as CVE-2023-0669, the vulnerability was publicly disclosed in early February alongside zero-day exploitation and a patch was released a week later.
SecurityWeek
1 year ago
Information security

Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant

Google-owned Mandiant has conducted an analysis of the zero-day vulnerabilities disclosed in 2022 and found that over a dozen of them were used in attacks believed to have been carried out by cyberespionage groups.The cybersecurity community cannot reach an agreement on the definition of zero-day vulnerability.
SecurityWeek
1 year ago
Information security

Ferrari Says Ransomware Attack Exposed Customer Data

Italian sports car maker Ferrari said on Monday that a threat actor had demanded a ransom related to customer contact details that may have been exposed in a ransomware attack."Upon receipt of the ransom demand, we immediately started an investigation in collaboration with a leading global third-party cybersecurity firm," the iconic car maker said.
SecurityWeek
1 year ago
Privacy professionals

Russia-Linked APT 'Winter Vivern' Targeting Governments in Europe, Asia

A Russia-linked advanced persistent threat (APT) actor tracked as Winter Vivern has been observed targeting government entities in several European and Asian countries.Initially detailed in early 2021, the group is known to support the interests of Belarus and Russia's governments, and was previously observed targeting government organizations in India, Lithuania, Slovakia, and Vatican.
Ars Technica
1 year ago
Privacy professionals

Security firm Rubrik is latest to be felled by GoAnywhere vulnerability

Rubrik, the Silicon Valley data security company, said that it experienced a network intrusion made possible by a zero-day vulnerability in a product it used called GoAnywhere.In an advisory posted on Tuesday, Rubrik CISO Michael Mestrovich said an investigation into the breach found that the intruders gained access to mainly internal sales information, including company names and contact information, and a limited number of purchase orders from Rubrik distributors.
ComputerWeekly.com
1 year ago
Privacy professionals

Chinese Silkloader cyber attack tool falls into Russian hands | Computer Weekly

Threat researchers at WithSecure have revealed intelligence on how cyber criminal gangs are sharing tools along the historic Silk Roads of Eurasia, after finding a tool known to have been developed by Chinese cyber criminals being taken up enthusiastically among Russian-speaking ransomware operators.
SecurityWeek
1 year ago
Information security

GoAnywhere MFT Zero-Day Exploitation Linked to Ransomware Attacks

The recent exploitation of a zero-day vulnerability in the GoAnywhere managed file transfer (MFT) software has been linked by a cybersecurity firm to a known cybercrime group that has likely attempted to exploit the flaw in a ransomware attack.On February 1, Fortra alerted GoAnywhere MFT users about a zero-day remote code injection exploit.
SecurityWeek
1 year ago
Privacy professionals

Cybersecurity Firm Group-IB Repeatedly Targeted by Chinese APT

Cybersecurity company Group-IB claims it was repeatedly targeted in the past years by a threat actor believed to be linked to the Chinese government.In a blog post published on Monday, Group-IB said it was targeted by the advanced persistent threat (APT) group known as Tonto Team, Karma Panda, CactusPete, Bronze Huntley, Earth Akhlut and HeartBeat.
SecurityWeek
1 year ago
Information security

ICS Vulnerabilities Chained for Deep Lateral Movement and Physical Damage

Researchers at cybersecurity firm Forescout have shown how various vulnerabilities discovered in recent years in industrial control systems (ICS) can be chained for deep lateral movement in operational technology (OT) networks, and even to cause significant physical damage.Two vulnerabilities found last year in Schneider Electric's Modicon programmable logic controllers (PLCs) are at the center of this research.
Theregister
1 year ago
Privacy professionals

ESXiArgs ransomware fights back to defeat US recovery script

That didn't take long.A week after the US Cybersecurity and Infrastructure Security Agency (CISA) and FBI released a recovery script to help victims of the widespread ESXiArgs ransomware attacks recover infected systems, an updated variant of the malware aimed at vulnerable VMware ESXi virtual machines can't be remediated with the government agencies' code, according to Malwarebytes.
SecurityWeek
1 year ago
Information security

Mirai Variant V3G4 Targets 13 Vulnerabilities to Infect IoT Devices

During the second half of 2022, a variant of the Mirai malware called V3G4 was seen targeting 13 vulnerabilities to ensnare Internet of Things (IoT) devices into a botnet, Palo Alto Networks reports.Following the successful exploitation of the targeted security flaws, the malware takes full control of the vulnerable devices and then abuses them to conduct various types of malicious activities, including distributed denial-of-service (DDoS) attacks.
SecurityWeek
1 year ago
Information security

Atlassian Investigating Security Breach After Hackers Leak Data

A threat actor named SiegedSec, whose members have claimed to be hacktivists, announced on its Telegram channel and hacking forums that it "hacked the software company Atlassian".They made 35 Mb of files public.This includes two image files apparently storing floor plans of Atlassian buildings in San Francisco and Sydney, and one file allegedly containing the information of 13,000 Atlassian employees, including names, email addresses, and phone numbers.
Ars Technica
1 year ago
Privacy professionals

North Korean hackers target security researchers with a new backdoor

Threat actors connected to the North Korean government have been targeting security researchers in a hacking campaign that uses new techniques and malware in hopes of gaining a foothold inside the companies the targets work for, researchers said.Researchers from security firm Mandiant said on Thursday that they first spotted the campaign last June while tracking a phishing campaign targeting a US-based customer in the technology industry.
Ars Technica
1 year ago
Privacy professionals

GoDaddy says a multi-year breach hijacked customer websites and accounts

GoDaddy said on Friday that its network suffered a multi-year security compromise that allowed unknown attackers to steal company source code, customer and employee login credentials, and install malware that redirected customer websites to malicious sites.GoDaddy is one of the world's largest domain registrars, with nearly 21 million customers and revenue in 2022 of almost $4 billion.
SecurityWeek
1 year ago
Privacy professionals

Coinbase Hack Linked to Group Behind Last Year's Twilio, Cloudflare Attacks

Coinbase, one of the world's largest cryptocurrency exchanges, was recently targeted in a sophisticated cyberattack that appears to have been conducted by the same threat group that targeted Twilio, Cloudflare and many others last year.Coinbase revealed on Friday that its employees were targeted in an SMS phishing campaign on Sunday, February 5.
SecurityWeek
1 year ago
Information security

Fortinet FortiNAC Vulnerability Exploited in Wild Days After Release of Patch

In-the-wild exploitation of a Fortinet FortiNAC vulnerability tracked as CVE-2022-39952 was seen just days after a patch was announced, and on the same day a proof-of-concept (PoC) exploit was made public.Fortinet published 40 security advisories on February 16, including one describing a critical vulnerability in the company's FortiNAC network access control (NAC) solution.
SecurityWeek
1 year ago
Information security

'PureCrypter' Downloader Used to Deliver Malware to Governments

A threat actor is using the PureCrypter downloader to deliver different types of malware to government entities in the Asia-Pacific and North America regions, Menlo Labs warns.As part of the observed attacks, Discord is used for distribution purposes, while the domain of a compromised non-profit organization serves as a command-and-control (C&C) server, hosting a secondary payload.
Ars Technica
1 year ago
Privacy professionals

Conservative News Corp. empire says hackers were inside its network for 2 years

News Corp., the parent company of The Wall Street Journal and several other news outlets, said that hackers were inside its network for nearly two years and made off with private documents and emails.News Corp. first disclosed the breach in February 2022, in a filing with the Securities and Exchange Commission and an article in The Wall Street Journal.
SecurityWeek
1 year ago
Privacy professionals

LastPass Says DevOps Engineer Home Computer Hacked

Password management software firm LastPass says one of its DevOps engineers had a personal home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud storage resources.LastPass on Monday fessed up a "second attack" where an unnamed threat actor combined data stolen from an August breach with information available from a third-party data breach, and a vulnerability in a third-party media software package to launch a coordinated attack.
ComputerWeekly.com
1 year ago
Privacy professionals

LastPass attack saw employee's home computer hacked | Computer Weekly

The threat actor behind a series of compromises of credential management specialist LastPass attacked a DevOps engineer's home computer to gain access to the organisation's decryption keys, it has emerged.The first attack took place in August 2022, and saw LastPass praised for its swift response to the incident, which saw the attacker access some source code and proprietary technical information.
SecurityWeek
1 year ago
Information security

New 'Exfiltrator-22' Post-Exploitation Framework Linked to Former LockBit Affiliates

A recently identified post-exploitation framework offered as a service appears to be operated by former affiliates of the LockBit ransomware, cybersecurity company Cyfirma reports.Dubbed Exfiltrator-22 or EX-22, the tool was created using the leaked source code of other post-exploitation frameworks, and uses the same command-and-control (C&C) infrastructure as LockBit 3.0.
The Verge
1 year ago
Privacy professionals

LastPass data was stolen by hacking an employee's home computer

LastPass says that a threat actor was able to steal corporate and customer data by hacking an employee's personal computer and installing keylogger malware, which let them gain access to the company's cloud storage.The update provides more information about how the series of hacks happened last year that resulted in the popular password manager's source code and customer vault data being stolen by an unauthorized third party.
SecurityWeek
1 year ago
Information security

Critical Vulnerabilities Allow Hackers to Take Full Control of Wago PLCs

German industrial automation solutions provider Wago has released patches for several of its programmable logic controllers (PLCs) to address four vulnerabilities, including ones that can be exploited to take full control of the targeted device.The vulnerabilities were discovered by Ryan Pickren from the Georgia Institute of Technology's Cyber-Physical Security Lab.
SecurityWeek
1 year ago
Information security

Zendesk Hacked After Employees Fall for Phishing Attack

Customer service solutions provider Zendesk has suffered a data breach that resulted from employee account credentials getting phished by hackers.Cryptocurrency trading and portfolio management company Coinigy revealed last week that it had been informed by Zendesk about a cybersecurity incident.According to the email received by Coinigy, Zendesk learned on October 25, 2022, that several employees were targeted in a "sophisticated SMS phishing campaign".
SecurityWeek
1 year ago
Privacy professionals

GoTo Says Hackers Stole Encrypted Backups, MFA Settings

IT management software firm GoTo on Tuesday said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach that also affected its LastPass affiliate.GoTo chief executive Paddy Srinivasan confirmed the security breach was far worse than originally reported and included the theft of account usernames, salted and hashed passwords, a portion of Multi-Factor Authentication (MFA) settings, as well as some product settings and licensing information.
Security
1 year ago
Privacy professionals

Customer data, encryption key stolen in GoTo breach | TechTarget

Threat actors exfiltrated encrypted customer account data and an encryption key for a number of GoTo services in a breach first disclosed last November.Remote work technology provider GoTo, formerly LogMeIn, published an update Monday to a blog post dedicated to a breach that occurred last year.At the time the breach was disclosed on Nov. 30, GoTo CEO Paddy Srinivasan wrote that the company was investigating a security incident and had "detected unusual activity within [GoTo's] development environment and third-party cloud storage service."
SecurityWeek
1 year ago
Information security

Chinese Hackers Adopting Open Source 'SparkRAT' Tool

A Chinese threat actor tracked as DragonSpark has been using the SparkRAT open source remote administration tool (RAT) in recent attacks targeting East Asian organizations, cybersecurity firm SentinelOne reports.Relatively new, SparkRAT is a multi-platform RAT written in Golang that can run on Windows, Linux, and macOS systems, and which can update itself with new versions available through its command and control (C&C) server.
Ars Technica
1 year ago
Information security

More malicious packages posted to online repository. This time it's PyPI

Researchers have uncovered yet another supply chain attack targeting an open source code repository, showing that the technique, which has gained wide use in the past few years, isn't going away any time soon.This time, the repository was PyPI, short for the Python Package Index, which is the official software repository for the Python programming language.
ComputerWeekly.com
1 year ago
DevOps

Cyber gang abused free trials to exploit public cloud CPU resources | Computer Weekly

A South Africa-based threat actor known as Automated Libra has been observed adopting increasingly sophisticated techniques to conduct a widespread freejacking campaign against various public cloud services.Freejacking is the act of using free or time-limited access to public cloud resources - such as introductory trial offers - to perform illicit cryptomining.
TechRadar
1 year ago
Online marketing

A global ad fraud campaign based on Google Ads has made millions

(Image credit: Gustavo Frazao / Shutterstock)
Scammers have used the traffic from an adult website to generate clicks on Google Ad banners, netting them huge returns, experts have revealed.Researchers from Malwarebytes, which first spotted the campaign, revealed how someone created an ad campaign on one of the major adult ad networks and used the "popunder" ad format.
TechRepublic
1 year ago
Information security

Cisco Talos report: Threat actors use known Excel vulnerability

Microsoft Office files, particularly Excel and Word files, have been targeted by some cybercriminals for a long time.Through different techniques, attackers have used embedded Visual Basic for Applications macros to infect computers with different kinds of malware for cybercrime and cyberespionage.In most cases, users still needed to click their agreement when executing code inside those applications, but some social engineering tricks have enticed unsuspecting victims to click and allow the execution of the malicious macros themselves.
Ars Technica
1 year ago
Privacy professionals

LastPass users: Your info and vault data is now in hackers' hands

LastPass, one of the leading password managers, said that hackers obtained a wealth of personal information belonging to its customers as well as encrypted and cryptographically hashed passwords and other data stored in customer vaults.The revelation, posted on Thursday, represents a dramatic update to a breach LastPass disclosed in August.
Theregister
1 year ago
Artificial intelligence

OpenAI predicts biz can break a billion in revs by 2024

In Brief The squishy brains behind OpenAI's artificial ones are predicting developments like the ChatGPT system will see money flooding in - with a forecast of earning around $1 billion by 2024.According to an investors' briefing document seen by Reuters the machine-learning biz expects to break $200 million in revenues next year and bust through the billion mark 12 months later.
ComputerWeekly.com
1 year ago
Privacy professionals

Lego fixes dangerous API vuln in BrickLink service | TechTarget

The Lego Group has moved swiftly to fix a pair of application programming interface (API) security vulnerabilities that existed in its BrickLink digital resale platform, after they were identified by Salt Labs, the research arm of API specialist Salt Security.With over a million members, BrickLink is the world's largest forum for buying and selling second-hand Lego sets.
Theregister
1 year ago
Information security

Healthcare world warned to be on guard for Royal ransomware

Newish ransomware gang Royal has been spotted targeting the healthcare sector, the US Department of Health and Human Services (HHS) has said.The crew emerged this year, and follows the standard double extortionware playbook: it steals data from infected networks, encrypts those files, and then demands a fee to recover the data and to also not publicly leak the documents.
Uggghhhh. We need you, password managers. If you go down, we are lost.
www.theguardian.com
1 year ago
Privacy professionals

Password app LastPass hit by cybersecurity breach but says data remains safe

Password manager LastPass has told customers that some of their information has been accessed in a cybersecurity breach, but says passwords remain safe.
...
In August, LastPass determined that some of its source code and technical information was taken from unauthorised access to a third-party storage service the company had been using.
...
At the time LastPass said the attacker had taken portions of source code and some proprietary LastPass technical information, but believed the risk to the app was limited.
www.theguardian.com
1 year ago
Privacy professionals

Password app LastPass hit by cybersecurity breach but says data remains safe

Password manager LastPass has told customers that some of their information has been accessed in a cybersecurity breach, but says passwords remain safe.LastPass is one of several password managers in the market that aims to reduce the reuse of passwords online, by storing themin a single app.It also makes it easier for users to generate strong passwords as required.
TechRepublic
1 year ago
Information security

Cranefly uses new communication technique in attack campaigns

A new publication from Symantec, a Broadcom software company, reveals details about a new method used by the Cranefly threat actor to communicate with its malware in ongoing attack campaigns.Geppei malware receives orders from IIS log files
A previously unreported dropper named Trojan.Geppei by Symantec has been observed on several victims of the attack campaigns.
ComputerWeekly.com
1 year ago
Privacy professionals

Office 365 email encryption flaw could pose risk to user privacy

Security researchers at WithSecure, the company formerly known as F-Secure, have published details of a potentially dangerous vulnerability in Microsoft Office 365 Message Encryption (OME) that could expose the contents of users' emails to a threat actor if left unmitigated.
TechRepublic
1 year ago
Information security

New Alchimist attack framework hits Windows, Linux and Mac

A standalone Command and Control (C2) server called "Alchimist" was recently discovered by Cisco Talos.
ComputerWeekly.com
1 year ago
Information security

Cloud compromise a doddle for threat actors as victims attest

It takes an average of just three steps for a threat actor to infiltrate a target cloud environment and get to its "crown jewel" assets, and as a result, vast numbers of organisations are now experiencing cloud security incidents, with at least 80% reporting a "severe" incident in the past 12 months.
Ars Technica
1 year ago
Privacy professionals

Breach of software maker used to backdoor as many as 200,000 servers

Once inside, they must have reviewed the code and made a decision about where to deploy their attack.
...
FishPig recommends users immediately upgrade all FishPig modules or reinstall them from source to ensure none of the infected code remains.
Theregister
1 year ago
Privacy professionals

China-linked APT40 targets wind turbines, Aust. government

Researchers at security company Proofpoint and PricewaterhouseCoopers (PWC) said on Tuesday they had identified a cyber espionage campaign that delivers the ScanBox exploitation framework through a malicious fake Australian news site.
Ars Technica
1 year ago
Privacy professionals

The number of companies caught up in the Twilio hack keeps growing

The fallout from this month's breach of security provider Twilio keeps coming.
ComputerWeekly.com
1 year ago
Privacy professionals

Criminal 0ktapus spoofed IAM firm in massive phishing attack

A large-scale phishing campaign, dubbed 0ktapus, that reeled in unsuspecting users at Cloudflare and Twilio, among others, and led to a small downstream attack against secure messaging service Signal, has been revealed to have compromised nearly 10,000 user accounts at more than 130 organisations worldwide by exploiting the brand of identity and access management (IAM) specialist Okta.
the Guardian
1 year ago
Privacy professionals

Meta injecting code into websites visited by its users to track them, research says

Meta, the owner of Facebook and Instagram, has been rewriting websites its users visit, letting the company follow them across the web after they click links in its apps, according to new research from an ex-Google engineer.
Ars Technica
1 year ago
Information security

Phishers who breached Twilio and fooled Cloudflare could easily get you, too

At least two security-sensitive companies-Twilio and Cloudflare-were targeted in a phishing attack by an advanced threat actor who had possession of home phone numbers of not just employees but employees' family members as well.
Ars Technica
1 year ago
Privacy professionals

Hackers are targeting industrial systems with malware

From the what-could-possibly-go-wrong files comes this: An industrial control engineer recently made a workstation part of a botnet after inadvertently installing malware advertising itself as a means for recovering lost passwords.
TechRepublic
1 year ago
Information security

ALPHV's ransomware makes it easy to search data from targets who do not pay

The ransomware has expanded its arsenal of extortion techniques, adding a search engine for cybercriminals.
Ars Technica
1 year ago
Information security

A wide range of routers are under attack by new, unusually sophisticated malware

An unusually advanced hacking group has spent almost two years infecting a wide range of routers in North America and Europe with malware that takes full control of connected devices running Windows, macOS, and Linux, researchers reported on Tuesday.
Theregister
1 year ago
Privacy professionals

If you don't store valuable data, ransomware is impotent

Column Sixteen years ago, British mathematician Clive Humby came up with the aphorism "data is the new oil".
TechRepublic
1 year ago
Information security

Proofpoint dispels commonly held threat actor assumptions in new report

The company found that Google-related URLs were the most frequently abused last year.
Theregister
1 year ago
Information security

Voicemail phishing emails steal Microsoft credentials

Someone is trying to steal people's Microsoft 365 and Outlook credentials by sending them phishing emails disguised as voicemail notifications.
TechRepublic
1 year ago
Information security

Thousands of unprotected Elasticsearch databases are being ransomed

The internet-facing instances are currently being accessed by attackers who remove the vulnerable databases and leave a ransom note instead.
TechRepublic
1 year ago
Information security

Karakurt Team hits North America and Europe with data theft and extortion

Karakurt Team attacks are hitting indiscriminate targets in North America and Europe with data theft, requesting a ransom to delete stolen data.
[ Load more ]