1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole

November 22, 2024 at 04:31PM Attackers exploited two recently patched vulnerabilities in Palo Alto Networks firewalls, compromising around 2,000 devices initially but down to 800 later. They deployed backdoors, malware, and cryptocurrency miners. The vulnerabilities enabled remote code execution, and the vendor continues to reference only a “limited number” of affected systems. ### Meeting Takeaways: … Read more

Hackers breach US firm over Wi-Fi from Russia in ‘Nearest Neighbor Attack’

November 22, 2024 at 02:34PM Russian state hackers APT28 breached a U.S. company by executing a “nearest neighbor attack” via its enterprise WiFi, compromising nearby organizations first. Discovered on February 4, 2022, the incident involved credential theft and sophisticated lateral movement within the target network. Enhanced WiFi security is necessary to mitigate such risks. ### … Read more

Chinese APT Gelsemium Deploys ‘Wolfsbane’ Linux Variant

November 21, 2024 at 03:32PM Recent modifications to Chinese backdoors, particularly Gelsemium’s new tools Wolfsbane and Firewood, target Linux systems, marking a significant shift in malware development. As organizations increasingly adopt Linux, experts highlight a surge in Linux-based cyber threats, with 54% of endpoint attacks affecting Linux in 2023. ### Meeting Takeaways 1. **Emergence of … Read more

Scattered Spider Cybercrime Members Face Prison Time

November 21, 2024 at 01:56PM The Department of Justice has charged five members of the hacking group “Scattered Spider” with various crimes related to cyberattacks on companies like MGM Resorts and Caesar’s Palace. Allegations include phishing and stealing sensitive data, cryptocurrencies, and identity information. They face significant prison sentences if convicted. ### Meeting Takeaways: 1. … Read more

CISA says BianLian ransomware now focuses only on data theft

November 21, 2024 at 01:39PM The BianLian ransomware group has transitioned to primarily data theft extortion techniques, as noted in a U.S. and Australian advisory. Since January 2024, they focus exclusively on this method, employing new tactics like exploiting Windows vulnerabilities and using RDP for access. Recent attacks include breaches of notable organizations. ### Meeting … Read more

‘Alarming’ bugs lay low in Ubuntu Server utility for 10 years

November 21, 2024 at 10:08AM Qualys researchers revealed five critical vulnerabilities in Ubuntu Server’s needrestart utility that allow unprivileged attackers to gain root access. Though they developed exploit code, they won’t release it due to its alarming nature. Admins are urged to update to version 3.8 or later to mitigate risks. **Meeting Takeaways:** 1. **Vulnerabilities … Read more

Cyber Story Time: The Boy Who Cried “Secure!”

November 21, 2024 at 07:15AM Automated Security Validation (ASV) tools provide continuous real-time assessments of cybersecurity defenses. Unlike vulnerability scanners, ASVs validate fixes against threats, preventing false negatives. This article underscores the importance of ASVs in identifying security gaps through real-time testing, illustrated by the fable of “The Boy Who Cried Wolf.” ### Meeting Takeaways: … Read more

Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online

November 21, 2024 at 06:11AM New research reveals over 145,000 internet-exposed Industrial Control Systems (ICS) in 175 countries, with the U.S. having the highest exposure. Key protocols used are outdated, increasing vulnerability. Cyber attacks targeting ICS are rare but rising, necessitating enhanced security measures. The analysis underscores the importance of monitoring and securing critical infrastructure. … Read more

‘Water Barghest’ Sells Hijacked IoT Devices for Proxy Botnet Misuse

November 20, 2024 at 09:39AM The cybercriminal group “Water Barghest” exploits vulnerabilities in IoT devices to create proxy botnets, already compromising over 20,000 devices. Using automated scripts and proprietary malware, they sell these devices on a residential proxy marketplace. This poses significant security challenges, prompting the need for enhanced IoT protection measures. **Meeting Takeaways:** 1. … Read more

Amazon and Audible flooded with ‘forex trading’ and warez listings

November 20, 2024 at 08:49AM Amazon, Amazon Music, and Audible have experienced an influx of fake listings promoting dubious forex trading sites, pirated software, and spammy links. These listings, including zero-second audio episodes, exploit the platforms for SEO manipulation. The issue highlights a broader problem of spam in digital content distribution. ### Meeting Takeaways: 1. … Read more