❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayThe Hacker News

Rhysida Ransomware Cracked, Free Decryption Tool Released

By: Newsroom
12 February 2024 at 13:12
Cybersecurity researchers have uncovered an "implementation vulnerability" that has made it possible to reconstruct encryption keys and decrypt data locked by Rhysida ransomware. The findings were published last week by a group of researchers from Kookmin University and the Korea Internet and Security Agency (KISA). "Through a comprehensive analysis of Rhysida Ransomware, we identified an

Alert: CISA Warns of Active 'Roundcube' Email Attacks - Patch Now

By: Newsroom
13 February 2024 at 04:51
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on MondayΒ addedΒ a medium-severity security flaw impacting Roundcube email software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The issue, tracked asΒ CVE-2023-43770Β (CVSS score: 6.1), relates to a cross-site scripting (XSS) flaw that stems from the handling of

Ivanti Vulnerability Exploited to Install 'DSLog' Backdoor on 670+ IT Infrastructures

By: Newsroom
13 February 2024 at 07:03
Threat actors are leveraging a recently disclosed security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy a backdoor codenamedΒ DSLogΒ on susceptible devices. That's according toΒ findingsΒ from Orange Cyberdefense, which said it observed the exploitation of CVE-2024-21893 within hours of the public release of the proof-the-concept (PoC) code.

PikaBot Resurfaces with Streamlined Code and Deceptive Tactics

By: Newsroom
13 February 2024 at 14:07
The threat actors behind the PikaBot malware have made significant changes to the malware in what has been described as a case of "devolution." "Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced obfuscation techniques and changing the network communications," Zscaler ThreatLabz researcher Nikolaos

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit

By: Newsroom
13 February 2024 at 14:37
TheΒ GluptebaΒ botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware. "This bootkit can intervene and control the [operating system] boot process, enabling Glupteba to hide itself and create a stealthy persistence that can be extremely difficult to

Microsoft Rolls Out Patches for 73 Flaws, Including 2 Windows Zero-Days

By: Newsroom
14 February 2024 at 05:01
Microsoft has released patches to addressΒ 73 security flawsΒ spanning its software lineup as part of its Patch Tuesday updates for February 2024, including two zero-days that have come under active exploitation. Of the 73 vulnerabilities, 5 are rated Critical, 65 are rated Important, and three and rated Moderate in severity. This is in addition toΒ 24 flawsΒ that have been fixed

DarkMe Malware Targets Traders Using Microsoft SmartScreen Zero-Day Vulnerability

By: Newsroom
14 February 2024 at 07:33
A newly disclosed security flaw in the Microsoft Defender SmartScreen has been exploited as a zero-day by an advanced persistent threat actor calledΒ Water HydraΒ (aka DarkCasino) targeting financial market traders. Trend Micro, which began tracking the campaign in late December 2023, said it entails the exploitation of CVE-2024-21412, a security bypass vulnerability related to Internet

Bumblebee Malware Returns with New Tricks, Targeting U.S. Businesses

By: Newsroom
14 February 2024 at 11:18
The infamous malware loader and initial access broker known asΒ BumblebeeΒ has resurfaced after a four-month absence as part of a new phishing campaign observed in February 2024. Enterprise security firm Proofpoint said the activity targets organizations in the U.S. with voicemail-themed lures containing links to OneDrive URLs. "The URLs led to a Word file with names such as "

Ubuntu 'command-not-found' Tool Could Trick Users into Installing Rogue Packages

By: Newsroom
14 February 2024 at 13:26
Cybersecurity researchers have found that it's possible for threat actors to exploit a well-known utility called command-not-found to recommend their own rogue packages and compromise systems running Ubuntu operating system. "While 'command-not-found' serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by attackers through the

Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyber Attacks

By: Newsroom
14 February 2024 at 14:39
Nation-state actors associated with Russia, North Korea, Iran, and China are experimenting with artificial intelligence (AI) and large language models (LLMs) to complement their ongoing cyber attack operations. The findings come from a report published by Microsoft in collaboration with OpenAI, both of whichΒ saidΒ they disrupted efforts made by five state-affiliated actors that used its

Critical Exchange Server Flaw (CVE-2024-21410) Under Active Exploitation

By: Newsroom
15 February 2024 at 05:19
Microsoft on Wednesday acknowledged that a newly disclosed critical security flaw in Exchange Server has been actively exploited in the wild, a day after it released fixes for the vulnerability as part of itsΒ Patch Tuesday updates. Tracked asΒ CVE-2024-21410Β (CVSS score: 9.8), the issue has been described as a case of privilege escalation impacting the Exchange Server. "An attacker

Chinese Hackers Using Deepfakes in Advanced Mobile Banking Malware Attacks

By: Newsroom
15 February 2024 at 09:31
A Chinese-speaking threat actor codenamedΒ GoldFactoryΒ has been attributed to the development of highly sophisticated banking trojans, including a previously undocumented iOS malware called GoldPickaxe that's capable of harvesting identity documents, facial recognition data, and intercepting SMS. "The GoldPickaxe family is available for both iOS and Android platforms,"

Ivanti Pulse Secure Found Using 11-Year-Old Linux Version and Outdated Libraries

By: Newsroom
15 February 2024 at 14:20
A reverse engineering of the firmware running on Ivanti Pulse Secure appliances has revealed numerous weaknesses, once again underscoring the challenge of securing software supply chains. Eclypsiusm, which acquired firmware version 9.1.18.2-24467.1 as part of the process, said the base operating system used by the Utah-based software company for the device is CentOS 6.4. "Pulse Secure runs an

Russian Turla Hackers Target Polish NGOs with New TinyTurla-NG Backdoor

By: Newsroom
15 February 2024 at 15:08
The Russia-linked threat actor known as Turla has been observed using a new backdoor calledΒ TinyTurla-NGΒ as part of a three-month-long campaign targeting Polish non-governmental organizations in December 2023. "TinyTurla-NG, just like TinyTurla, is a small 'last chance' backdoor that is left behind to be used when all other unauthorized access/backdoor mechanisms have failed or been

U.S. Government Disrupts Russia-Linked Botnet Engaged in Cyber Espionage

By: Newsroom
16 February 2024 at 06:49
The U.S. government on Thursday said it disrupted a botnet comprising hundreds of small office and home office (SOHO) routers in the country that was put to use by the Russia-linked APT28 actor to conceal its malicious activities. "These crimes included vast spear-phishing and similar credential harvesting campaigns against targets of intelligence interest to the Russian government, such as U.S.

U.S. State Government Network Breached via Former Employee's Account

By: Newsroom
16 February 2024 at 07:40
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed state government organization's network environment was compromised via an administrator account belonging to a former employee. "This allowed the threat actor to successfully authenticate to an internal virtual private network (VPN) access point," the agencyΒ saidΒ in a joint advisory published

Malicious 'SNS Sender' Script Abuses AWS for Bulk Smishing Attacks

By: Newsroom
16 February 2024 at 10:49
A malicious Python script known asΒ SNS SenderΒ is being advertised as a way for threat actors to send bulk smishing messages by abusing Amazon Web Services (AWS) Simple Notification Service (SNS). The SMS phishing messages are designed to propagate malicious links that are designed to capture victims' personally identifiable information (PII) and payment card details, SentinelOneΒ 

RustDoor macOS Backdoor Targets Cryptocurrency Firms with Fake Job Offers

By: Newsroom
16 February 2024 at 13:27
Multiple companies operating in the cryptocurrency sector are the target of an ongoing malware campaign that involves a newly discovered Apple macOS backdoor codenamed RustDoor. RustDoor wasΒ first documentedΒ by Bitdefender last week, describing it as a Rust-based malware capable of harvesting and uploading files, as well as gathering information about the infected machines. It's

CISA Warning: Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability

By: Newsroom
16 February 2024 at 15:42
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on ThursdayΒ addedΒ a now-patched security flaw impacting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software to its Known Exploited Vulnerabilities (KEV) catalog, following reports that it's being likely exploited in Akira ransomware attacks. The vulnerability in question isΒ 

Google Open Sources Magika: AI-Powered File Identification Tool

By: Newsroom
17 February 2024 at 07:26
Google has announced that it's open-sourcingΒ Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types. "Magika outperforms conventional file identification methods providing an overall 30% accuracy boost and up to 95% higher precision on traditionally hard to identify, but potentially problematic content

FBI's Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty

By: Newsroom
18 February 2024 at 07:12
A Ukrainian national has pleaded guilty in the U.S. to his role in two different malware schemes, Zeus and IcedID, between May 2009 and February 2021. Vyacheslav Igorevich Penchukov (aka Vyacheslav Igoravich Andreev, father, and tank), 37, wasΒ arrestedΒ by Swiss authorities in October 2022 and extradited to the U.S. last year. He was added to the FBI's most-wanted list in 2012. The U.S.

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor

By: Newsroom
19 February 2024 at 04:39
The Iranian-origin threat actor known as Charming Kitten has been linked to a new set of attacks aimed at Middle East policy experts with a new backdoor calledΒ BASICSTARΒ by creating a fake webinar portal. Charming Kitten, also called APT35, CharmingCypress, Mint Sandstorm, TA453, and Yellow Garuda, has a history of orchestrating a wide range of social engineering campaigns that cast a

Russian-Linked Hackers Target 80+ Organizations via Roundcube Flaws

By: Newsroom
19 February 2024 at 05:05
Threat actors operating with interests aligned to Belarus and Russia have been linked to a new cyber espionage campaign that likely exploited cross-site scripting (XSS) vulnerabilities in Roundcube webmail servers to target over 80 organizations. These entities are primarily located in Georgia, Poland, and Ukraine, according to Recorded Future, which attributed the intrusion set to a threat

Anatsa Android Trojan Bypasses Google Play Security, Expands Reach to New Countries

By: Newsroom
19 February 2024 at 10:29
The Android banking trojan known asΒ AnatsaΒ has expanded its focus to include Slovakia, Slovenia, and Czechia as part of a new campaign observed in November 2023. "Some of the droppers in the campaign successfully exploited the accessibility service, despite Google Play's enhanced detection and protection mechanisms," ThreatFabricΒ saidΒ in a report shared with The Hacker News.

Meta Warns of 8 Spyware Firms Targeting iOS, Android, and Windows Devices

By: Newsroom
19 February 2024 at 13:14
Meta Platforms said it took a series of steps to curtail malicious activity from eight different firms based in Italy, Spain, and the United Arab Emirates (U.A.E.) operating in the surveillance-for-hire industry. The findings are part of itsΒ Adversarial Threat ReportΒ for the fourth quarter of 2023. The spyware targeted iOS, Android, and Windows devices. "Their various malware included

LockBit Ransomware's Darknet Domains Seized in Global Law Enforcement Raid

By: Newsroom
20 February 2024 at 05:25
Update: The U.K. National Crime Agency (NCA) has confirmed the takedown of LockBit infrastructure. Read here for more details.An international law enforcement operation has led to the seizure of multiple darknet domains operated byΒ LockBit, one of the most prolific ransomware groups, marking the latest in a long list of digital takedowns. While the full extent of the effort, codenamedΒ 

Iran and Hezbollah Hackers Launch Attacks to Influence Israel-Hamas Narrative

By: Newsroom
20 February 2024 at 06:01
Hackers backed by Iran and Hezbollah staged cyber attacks designed to undercut public support for the Israel-Hamas war after October 2023. This includes destructive attacks against key Israeli organizations, hack-and-leak operations targeting entities in Israel and the U.S., phishing campaigns designed to steal intelligence, and information operations to turn public opinion against Israel. Iran

WordPress Bricks Theme Under Active Attack: Critical Flaw Impacts 25,000+ Sites

By: Newsroom
20 February 2024 at 09:08
A critical security flaw in the Bricks theme for WordPress is being actively exploited by threat actors to run arbitrary PHP code on susceptible installations. The flaw, tracked as CVE-2024-25600 (CVSS score: 9.8), enables unauthenticated attackers to achieve remote code execution. It impacts all versions of the Bricks up to and including 1.9.6. It has been addressed by the theme developers in&

Critical Flaws Found in ConnectWise ScreenConnect Software - Patch Now

By: Newsroom
20 February 2024 at 10:38
ConnectWise has released software updates to address two security flaws in its ScreenConnect remote desktop and access software, including a critical bug that could enable remote code execution on affected systems. The vulnerabilities are listed below - CVE-2024-1708 (CVSS score: 8.4) - Improper limitation of a pathname to a restricted directory aka "path traversal" CVE-2024-1709 (CVSS score:

❌
❌