A newly discovered malware sent to victims via ads displayed in search results is being used to steal passwords, install cryptocurrency miners, and run other Trojan infections, according to ZDNet. The malware that is developed for Windows operating system, goes by the name MosaicLoader and infects victims around the show more ...
world as those behind it try to hack as many devices as possible, according to Bitdefender. Unlike many viruses that are spread through phishing attacks or unpatched software, MosaicLoader is a virus that is promoted to potential victims. A variety of threats can be downloaded to compromised workstations via MosaicLoader, including Glupteba, a malware capable of developing a backdoor system to collect sen... (read more)
French authorities warned that a massive ongoing cyberattack on French organizations is underway targeting home and office routers, says Ars Technica. According to FireEye the cybercriminal group APT31, also known as Panda and Zirconium, has conducted espionage campaigns against key institutions in the past, show more ...
including the military, engineering, aviation, media, insurance, finance, construction, telecommunications, and even governments. National Cyber Security Center (NCSC) states that APT is one of three hacker groups backed by the Chinese government that was involved in a recent massive hac... (read more)
The findings of recent research into the security risks associated with Internet traffic were published by Telia Carrier recently. The statistics are extremely alarming, as they reveal that DDoS attacks surged by 50%, according to Help Net Security. The difference is significant: 1.18 Tb (Terabytes) per second, or show more ...
887 Megabits per second (Mpps) (Mega Packets Per Second). Last year alone, a whopping 57 Petabits of malicious information was cleaned, and the average size of a DDoS attack was 19 Gbps, with an average duration of 10 minutes. Jorg Dekker, Head of Internet Services at Telia Carrier said “The rise of carpet bombing as a popular attack vector and a dramatic increase in peak attack traffic are two important reasons why organizations need to move to automatic threat mitigation techniques”. He added that it is increasingly common for cybercriminals to exploit the massi... (read more)
A cybercriminal gang associated with an advanced persistent threat (APT) has been found in connection with a new campaign that is distributing Android malware through the Syrian e-Government Web Portal, showing that the attacker has expanded his arsenal of tools for penetrating targets, according to The Hacker News. show more ...
It is suspected that StrongPity, also referred to as Promethium by Microsoft, is allegedly active since 2012, typically focusing on targets in Syria and Turkey. In the mid-2020s, the threat actor was linked to a wave of operations that relied on watering-loop attacks and manipulated installers to infect targets with malware and abuse the popularity of genuine programs. The last process is no different, as benign software was repackaged into Trojanized variant... (read more)
Microsoft hasn’t yet released Windows 11, but the new operating system is already available for download and preview. Cybercriminals, of course, are exploiting that, slipping malware to users who think they’re downloading Microsoft’s new operating system. Why download Windows 11 now? Microsoft show more ...
actually claimed Windows 10 would be the last release of Windows, that the company would just issue updates from there on out. On June 24 this year, however, the company unveiled Windows 11. And even though under the hood it’s basically Windows 10, Windows 11 is still the OS’s biggest update in six years, with an impressive number of new features and interface modifications. Officially, Windows 11 will become available to the general public in 2021, but loads of people are trying it out early by installing a prerelease build. Some enthusiasts want to try the new system for its novelty; others, such as tech reporters, to inform users about the new features. As for software developers, they need the OS to perform compatibility testing with their own products and fix any issues before release day. Although Microsoft has made the process of downloading and installing Windows 11 from its official website fairly straightforward, many still visit other sources to download the software, which often contains unadvertised goodies from cybercriminals (and isn’t necessarily Windows 11 at all). How scammers fool Windows 11 downloaders The most straightforward way cybercriminals deceive users is by slipping in something extra (or else). One example involves an executable file called 86307_windows 11 build 21996.1 x64 + activator.exe. With a file size as large as 1.75GB, it certainly looks plausible. In fact, though, the bulk of that space consists of one DLL file that contains a lot of useless information. Opening the executable starts the installer, which looks like an ordinary Windows installation wizard. Its main purpose is to download and run another, more interesting executable. The second executable is an installer as well, and it even comes with a license agreement (which few people read) calling it a “download manager for 86307_windows 11 build 21996.1 x64 + activator” and noting that it would also install some sponsored software. If you accept the agreement, a variety of malicious programs will be installed on your machine. Kaspersky products have already defeated several hundred infection attempts that used similar Windows 11–related schemes. A large portion of that malware consists of downloaders, whose task is to download and run other programs. Those other programs can be very wide-ranging — from relatively harmless adware, which our solutions classify as not-a-virus, to full-fledged Trojans, password stealers, exploits, and other nasty stuff. Where and how to download Windows 11 safely Download Windows 11 from official sources only, as Microsoft advises. So far, Windows 11 is officially available only to participants in the Windows Insider program — that is, you have to register. You’ll also need a device with Windows 10 already installed. To upgrade your Windows 10 computer to Windows 11, go to Settings, click Update & Security, then select Windows Insider Program and activate Dev Channel to get the update. We don’t recommend running the update on your main computer; prebuilds can be unstable. We also advise you to use a reliable security solution and never disable it, so that cybercriminals cannot gain access to your computer through social engineering or vulnerabilities in the not-ready-for-primetime system.
In developing the new guidelines, NIST worked with the Cybersecurity and Infrastructure Security Agency, Office of Management and Budget, and the National Security Agency.
In recent months Minerva Labs researchers have seen a spike in events associated with Taurus loader. Its spreading method allows it to generate new samples and infect new devices continuously.
The CISA warned against 13 malware samples found on exploited Pulse Secure devices that went largely undetected by antivirus products. These were reportedly targeting U.S. government agencies, critical infrastructure entities, and private sector organizations. The federal agency has released IoCs and TTPs for malware spotted on Pulse Secure devices.
It’s a mixture of conventional and unconventional methods used against a much stronger adversary that aims to achieve political objectives that would not be possible with traditional warfare.
The malware was found using legitimate password recovery tools on Windows systems. It is capable of providing additional access to camera and screen, file lookup, directory list, file upload, and shell command execution.
According to a recent report by Cloudian, the average financial cost of ransomware attacks was $400,000. The average ransom payment was $223,000 while 14% of victims paid a ransom of $500,000 or more.
The deal, the terms of which kept secret, will bolster Sysdig’s capabilities by strengthening cloud and container security with compliance and governance enforcement, Sysdig CEO Suresh Vasudevan said.
The Milanote app has attracted the notice of cybercriminals who are abusing it to carry out credential-stealing campaigns that bypass secure email gateways (SEGs), researchers said.
The round, which was led by Northzone, featured a number of VC and angel investors, including Tiger Global, Reddit cofounder Alexis Ohanian?, and GitHub CTO Jason Warner.
Cofense researchers spotted one attack with an email delivering an HTML application (HTA) file attachment disguised as fake patches for a new vulnerability affecting the Chrome web browser.
A spokesperson for the company told The Hill in an emailed statement that Kaseya had been given an “effective decryptor and we are actively using it to help our customers.”
Microsoft has acquired identity and access management (IAM) startup CloudKnox Security, the tech giant’s fourth cybersecurity acquisition this year, for an undisclosed sum.
Apple this week rolled out security updates for iOS, macOS, iPadOS, watchOS, tvOS, and Safari, to address tens of vulnerabilities, including some that could result in arbitrary code execution.
Trend Micro attributed an Android malware sample to the StrongPity APT group, which was pilfering contact lists and collecting files with specific file extensions from Syrian e-Gov websites. Targeting a government’s application portal to bypass Android security signifies that the threat actor is focused, motivated, and has clear plans for achieving their objectives.
The bipartisan leaders of two Senate committees on Thursday introduced legislation to shore up the cybersecurity of critical infrastructure after months of crippling cyberattacks.
Cybercriminals hacked into a website used for buying and selling firearms, making off with a 111,000-entry database containing partial information from a CRM product used by gun shops across the UK.
Research from Copenhagen Business School finds designers of cookie banners can affect privacy choices by manipulating choice architecture and with simple changes can increase absolute consent by 17%.
To raise awareness of the risks and improve the protection of critical infrastructure, CISA and the FBI have released a Joint Cybersecurity Advisory as well as updates to five alerts and advisories.
According to the study by Chinese researchers, malware can be embedded directly into the artificial neurons that make up machine learning models in a way that keeps them from being detected.
The Series B funding round included investments from Banque des Territoires and Eiffel Investment Group, as well as existing investors Normandie Participations and CNP Assurances.
A recent study by technology website Comparitech revealed one in 16 home Wi-Fi routers is still using the manufacturer’s default admin password and leaving the door open to cybercriminals.
Cybereason announced the acquisition of empow, a security analytics company based in Tel Aviv. The acquisition of empow will enable the integration of empow prediction technology into Cybereason XDR.
Saudi Aramco acknowledged that leaked data from the company being used in a cyber-extortion attempt involving a USD 50 million ransom demand likely came from one of its contractors.
Cybercriminals try to take advantage of the Tokyo Olympics and researchers and security agencies are already warning of the possible cyberattacks on the event. It appears to be challenging for Tokyo to stay protected from expected attacks. Defenses need to be amped up to the tee.
Twitter has revealed in its latest transparency report that only 2.3% of all active accounts have enabled at least one method of two-factor authentication (2FA) between July and December 2020.
Analysts with cybersecurity company Intezer have found that cybercriminals are now going after a new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances.
Malware delivered over the cloud increased by 68% in Q2, according to data from Netskope. The report noted that cloud storage apps account for more than 66% of cloud malware delivery.
While the world is busy fighting the coronavirus pandemic (COVID-19), cyber attackers are misusing this global crisis for their phishing scams, ransomware attacks, and other purposes.
Australian Privacy Commissioner has ordered Uber to comply with Australian Privacy Principles after finding it interfered with the privacy of 1.2 million people when it suffered a data breach in 2016.
5G will bring about connected networks, devices, and apps where each activity can become a potential attack vector due to its attributes of edge computing, dynamic bandwidth sharing, among others.
The German Pharmacists' Association (DAV) said hackers had managed to produce two vaccination certificates by accessing the portal and making up pharmacy owner identities.
U.S. water treatment facilities are increasingly vulnerable to cyberthreats to their IT networks as well as their OT systems, according to experts who testified at a Senate committee hearing this week.
The UK National Lottery Community Fund has reported a data breach exposing the sensitive personal data, including bank account information, of grant holders and applicants.
Financial cybercrime gang FIN7 has resurged after the jailing of some members, launching a campaign that uses as a lure a legal complaint involving the liquor company that owns Jack Daniels whiskey.
In a new release from Gartner, researchers have estimated that cyberattackers will have weaponised operational technology (OT) environments to successfully harm or kill humans by the year 2025.
A Vade report revealed that there has been a major jump in phishing attacks since the start of the year with a 281 percent spike in May and another 284 percent increase in June.
In a study of 146 web applications, Timo Longin, security researcher at SEC Consult, found misconfigurations that malicious actors could exploit to redirect password reset emails to their own servers.
Of those Australians who encountered a scam in 2021, 9% lost money as a result, a three percentage point increase on 2018, and slightly higher than the global average of 7%.
The LemonDuck malware is targeting both Windows and Linux systems via phishing emails, exploits, USB devices, and brute force attacks, as well as critical on-premise Exchange Server vulnerabilities.
Issues involving APIs didn’t hold businesses back just in terms of their plans to roll out new apps. They also cost valuable time and resources if an attack does happen eventually.
According to GitHub, there are four main areas of improvement for supply chain security for Go modules, including its Advisory Database, dependency graph, Dependabot, and automatic pull requests.
The U.S. House of Representatives this week passed several cybersecurity bills, including ones related to critical infrastructure, ICS, and grants for state and local governments.
MITRE releases a list of its top 25 most dangerous software weaknesses, detailing the most common vulnerabilities which can give cybercriminals access to machines to steal data or cause crashes.
Depending on the timing, it is possible for Asterisk to crash when using a TLS connection if the underlying socket parent/listener gets destroyed during the handshake.
When Asterisk receives a re-INVITE without SDP after having sent a BYE request a crash will occur. This occurs due to the Asterisk channel no longer being present while code assumes it is.
Ubuntu Security Notice 5021-1 - Harry Sintonen and Tomas Hoger discovered that curl incorrectly handled TELNET connections when the -t option was used on the command line. Uninitialized data possibly containing sensitive information could be sent to the remote server, contrary to expectations. Harry Sintonen show more ...
discovered that curl incorrectly reused connections in the connection pool. This could result in curl reusing the wrong connections. Various other issues were also addressed.
Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
The call for papers for hardwear.io 2021 in the Netherlands is now open. It will take place October 28th through the 29th, 2021 at NH Hotel Den Haag, The Netherlands.
Apple Security Advisory 2021-07-21-6 - tvOS 14.7 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
Apple Security Advisory 2021-07-21-5 - watchOS 7.6 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
Apple Security Advisory 2021-07-21-4 - Security Update 2021-005 Mojave addresses code execution, double free, information leakage, integer overflow, out of bounds read, and out of bounds write vulnerabilities.
Apple Security Advisory 2021-07-21-3 - Security Update 2021-004 Catalina addresses buffer overflow, code execution, double free, information leakage, integer overflow, out of bounds read, and out of bounds write vulnerabilities.
Apple Security Advisory 2021-07-21-2 - macOS Big Sur 11.5 addresses buffer overflow, bypass, code execution, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
Apple Security Advisory 2021-07-21-1 - iOS 14.7 and iPadOS 14.7 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
Gentoo Linux Security Advisory 202107-52 - Multiple vulnerabilities have been found in Apache Velocity, the worst of which could result in the arbitrary execution of code. Versions less than 2.3 are affected.
Gentoo Linux Security Advisory 202107-51 - Multiple vulnerabilities have been found in IcedTeaWeb, the worst of which could result in the arbitrary execution of code. Versions less than 1.8.4-r1 are affected.
Nearly three weeks after Florida-based software vendor Kaseya was hit by a widespread supply-chain ransomware attack, the company on Thursday said it obtained a universal decryptor to unlock systems and help customers recover their data. <!--adsense--> "On July 21, Kaseya obtained a decryptor for victims of the REvil ransomware attack, and we're working to remediate customers impacted by the
A malware known for targeting macOS operating system has been updated once again to add more features to its toolset that allows it to amass and exfiltrate sensitive data stored in a variety of apps, including apps such as Google Chrome and Telegram, as part of further "refinements in its tactics." XCSSET was uncovered in August 2020, when it was found targeting Mac developers using an unusual
After more than 20 years in the making, now it's official: APIs are everywhere. In a 2021 survey, 73% of enterprises reported that they already publish more than 50 APIs, and this number is constantly growing. APIs have crucial roles to play in virtually every industry today, and their importance is increasing steadily, as they move to the forefront of business strategies. This comes as no
Law enforcement authorities in the Netherlands have arrested two alleged individuals belonging to a Dutch cybercriminal collective who were involved in developing, selling, and renting sophisticated phishing frameworks to other threat actors in what's known as a "Fraud-as-a-Service" operation. The apprehended suspects, a 24-year-old software engineer and a 15-year-old boy, are said to have been
IT service firm Kaseya says that it has "obtained" a universal decryptor for customers hit by the REvil ransomware gang earlier this month. REvil had earlier offered to sell the decryptor for $70 million...
Dutch police have arrested suspected members of a notorious cybercrime gang known as "Fraud Family," following a spate of sophisticated phishing attacks that have targeted users in the Netherlands and Belgium. Read more in my article on the Hot for Security blog.
At Carbonite + Webroot, we’re always preaching about the importance of layering security solutions. Because here’s the truth: data’s always at risk. Whether from cybercriminals, everyday mishaps or mother nature, businesses can put up all the defenses they want but disaster only has to successfully strike once. show more ...
The global pandemic means more work is being conducted in the cloud, so this is no time to be lax with the security of cloud backups. Unless protection is redundant, organizations risk of losing mission-critical data – for minutes, days or permanently depending on the disaster – and putting their survival at risk. That’s why layered protection in the cloud is so critical to cyber resilience. Without it, any one failure can be catastrophic. So, how’s it done? Let’s start with endpoints For organizations managing hundreds or thousands of endpoints, backing each up to the cloud is important for keeping employees productive in the case of hardware failure, device theft, damage or malicious insiders. It’s easy to see how a laptop can be damaged, so it’s obvious for most that files stored locally should be backed up to the cloud. But it’s also important to recognize that work done in the cloud should also be backed up. For example, one of the world’s most popular productivity tools for office workers, Microsoft 365, increasingly carries out its core functions in the cloud. But it has some serious gaps in terms of backup capabilities. The average endpoint user may not know or care which important work files are stored, so long as they’re there when needed. This makes it important that Microsoft 365 data is backed up to the cloud – regardless of whether the user is aware if updates are being made locally or if the location is using its cloud capabilities. Finally, but in the other direction, cloud-based cybersecurity offers another form of data security from the cloud. This method avoids the risk of endpoints relying on out-of-date file definitions of known-bad files, instead relying on near real-time threat telemetry from the cloud. This allows for the near real-time protection of all endpoints using the solution once a threat is identified. But must also include servers It’s less obvious to many of us that servers are at risk of becoming ground zero for data loss as well. Hardware sometimes fails, power cords can be tripped over, or worse…natural disasters can strike data centers, wiping out servers through fires, floods or other types of damage. What good are endpoints without the servers that feed them information? Cloud computing technology offers a handful of flexible opportunities for backing up data housed on servers. On-premise servers – used to store data locally based a business’s preference, regulatory needs or other reasons – can and should still be backed up to the cloud in case of a localized outage. Usually this entails concentrating data within a single point of storage (a “vault”) that’s then bulk uploaded. This duplicated data can then be accessed in the event a physical location loses power or a fiber optic cable is severed by construction work, for example. Off-premise server banks also can and should be protected by cloud backups. Many of these servers may store their data in public clouds, which are normally but not always highly reliable. Public cloud outages do happen. When they do, it pays to have another cloud backup solution to failover to so the business can continue to run. Whether or not this data is stored in the cloud permanently or migrated there when needed, redundancy is established when on and off-premise server banks are backed up to the cloud. Rounding out the redundancy is a disaster recovery as a service (DRaaS) solution. This form of high-availability replication anticipates a worst-case scenario for server data loss. With DRaaS, byte-level replication of changes on an organization’s systems are sent to the cloud. In the event of a disaster, you Note that DRaaS is not to be confused with being a replacement for backup. These are two different solutions that can work perfectly well alongside each other. Backup should apply to every server in an environment and offers long term retention with flexible restore options. DRaaS typically would be layered on top of backup, for the most mission critical servers, resulting in options to either restore from backup, or failover directly and rapidly to another cloud depending on the event that has rendered the production server or data inaccessible. Maintain uptime, all the time Threats to business data are all around us. Rates of ransomware are rising and remote workforces have ballooned since the outbreak of COVID-19. This is no time to trust in a single cloud as an organizational backup strategy. No single point of failure should keep users from accessing business-critical data. Luckily, there are many options for designed layered backup across clouds. The post Redundancy for resilience: The importance of layered protection in the cloud appeared first on Webroot Blog.