Volt Typhoon rebuilds malware botnet following FBI disruption

November 12, 2024 at 10:55AM Volt Typhoon, a Chinese state-sponsored hacking group, is rebuilding its KV-Botnet after earlier disruptions. Targeting outdated Cisco and Netgear routers, they have compromised roughly 30% of exposed devices. Researchers recommend replacing old routers and enhancing security measures to mitigate this persistent threat. ### Meeting Notes Takeaways: 1. **Volt Typhoon Resurgence**: … Read more

North Korean hackers create Flutter apps to bypass macOS security

November 12, 2024 at 10:46AM North Korean threat actors are targeting macOS systems with trojanized cryptocurrency-themed apps built using Flutter, which bypassed Apple’s security checks. Discovered by Jamf Threat Labs, these signed and notarized apps connected to DPRK servers and executed scripts. Apple revoked their signatures, but the full extent of the operation is unclear. … Read more

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

November 12, 2024 at 05:57AM A targeted campaign leveraging SEO poisoning delivers GootLoader malware to users searching for Bengal cat legality in Australia. Victims encounter compromised sites, leading to malware installations via ZIP archives. Recent tactics have shifted towards fake PDF converters instead of legal terms, broadening the potential target audience. ### Meeting Takeaways: Nov … Read more

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

November 12, 2024 at 02:06AM Cybersecurity researchers have identified a new ransomware, Ymir, linked to an attack in Colombia after compromised systems by RustyStealer malware. Ymir’s unique features enhance stealth, utilizing advanced memory functions. Despite the rise in ransomware groups, there was a 10% drop in attacks month-over-month, prompting discussions on countermeasures, including insurance policy … Read more

Alleged Snowflake attacker gets busted by Canadians – politely, we assume

November 10, 2024 at 10:30PM Alexander “Connor” Moucka, linked to the Snowflake breach affecting 165 customers, was arrested in Canada due to a U.S. extradition request. His co-conspirator, John Binns, is jailed in Turkey. Critical vulnerabilities in various software and cyber threats targeting crypto businesses are also highlighted, emphasizing ongoing security challenges. Here are the … Read more

Malicious PyPI package with 37,000 downloads steals AWS keys

November 9, 2024 at 03:12PM A malicious Python package, ‘fabrice,’ has been available on PyPI since 2021, stealing AWS credentials from developers. Downloaded over 37,000 times through typosquatting the legitimate ‘fabric,’ it executes OS-specific scripts for credential theft, exfiltrating them to a VPN server. Users are advised to verify packages and implement IAM for protection. … Read more

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

November 8, 2024 at 07:51AM High-profile entities in India are being targeted by the Pakistan-based Transparent Tribe and the new China-linked IcePeony cyber espionage groups. Transparent Tribe uses ElizaRAT and ApoloStealer malware, while IcePeony employs SQL Injection and web shells to steal credentials. Both groups demonstrate sophisticated attack methodologies and tools. ### Meeting Takeaways – … Read more

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

November 8, 2024 at 02:27AM Researchers have identified a new malware campaign, CRON#TRAP, that infects Windows systems via a malicious shortcut file. It sets up a Linux virtual instance with a backdoor for remote access, complicating detection. Another campaign targets electronics companies using GuLoader malware via spear-phishing emails. Proactive security measures are essential. ### Meeting … Read more

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

November 7, 2024 at 07:42AM A North Korean threat actor, BlueNoroff, has targeted cryptocurrency businesses using multi-stage malware that infects macOS devices via phishing emails and disguised applications. The campaign, named Hidden Risk, employs social engineering tactics, exploiting Apple developer accounts for notarization and illustrates the evolving strategies of North Korean cyber operations. **Meeting Takeaways: … Read more

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

November 7, 2024 at 06:21AM The China-aligned hacking group MirrorFace has targeted a European Union diplomatic organization using a phishing lure related to the upcoming 2025 World Expo in Japan. This marks their first attack in the EU, continuing a trend of targeting Japan and expanding into Taiwan and India since 2023. ### Meeting Takeaways … Read more