Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Singapore and the U. ...

 Security

Singapore and the U.S. signed several Memorandums of Understanding (MOUs) to expand their cybersecurity cooperation in areas such as defense, banking, and research and development, according to ZDNet. These activities include increased information sharing, team building, training and skills development.  Three MOUs   show more ...

were signed on Monday during the US' three-day visit to Asia Vice President Kamala Harris. One was an agreement between Singapore and the U.S. Cyber Security and Infrastructure Security Agency (CISA) aimed at expanding the cybersecurity partnership beyond data sharing and exchange. Both government agencies will explore new areas of cooperation, such as important technological research and development.  The first MOU will allow both partners to strengthen existing partnerships between the countries so that they are able to work clo... (read more)

image for Researchers Warn of  ...

 Security

Researchers identified 4 new ransomware gangs that are targeting businesses and key infrastructure, according to The Hacker News.  Ransomware attacks nowadays did not only increase in frequency and intensity, but went beyond financial gain, posing a threat to the national security of firms, hospitals, schools, and   show more ...

governments worldwide. Palo Alto Networks' Unit 42 threat intelligence team notes "While the ransomware crisis appears poised to get worse before it gets better, the cast of cybercrime groups that cause the most damage is constantly changing". While we did not hear too much of them lately compared to previous years, Unit 42 says this is just the calm before the storm. Let's explore the latest ransomware kits on the market and the groups behind them. AvosLocker AvosLocker is a late-June ransomware company that exploits press announce... (read more)

image for WhatsApp New Modifie ...

 Security

A customized version of the WhatsApp Messaging App for Android has been found to display full-screen advertising, register device users for unwanted premium subscriptions without their agreement and deliver dangerous payloads, says The Hacker News.  Generally speaking, modifications of legitimate Android apps are   show more ...

launched to perform functions that were not originally intended. For instance, you can customize icons, disable video calls, add themes or hide features like Recently Seen with FMWhatsApp. Then again, not all mods are launched with good intentions and this is another case of why you should be wary of too-good-to-be-true free services. The FMWhatsApp version discovered by

image for Mr. White Returns Al ...

 Security

The hacker known as Mr. White found a way to resolve one of the biggest cryptocurrency thefts of all time, according to CNBC. Earlier this week, Poly Network, a decentralized financial network, announced that about $600 million in bitcoin had been stolen from its vaults due to a coding error. The sum was changed   show more ...

immediately to other cryptocurrencies, namely a total of $273 million in Ethereum tokens, $253 million in Binance Smart Chain tokens, and $85 million in USDC. Surprisingly, the thief known as Mr. White Hat, began recovering assets almost shortly after the discovery and distributed t... (read more)

image for Beware! FMWhatsApp m ...

 Threats

We recently discovered that a version of popular WhatsApp mod FMWhatsApp includes an embedded Trojan. The Trojan, called Triada, downloads other malware to users’ devices. Here’s how it happened and why using modified versions of WhatsApp is dangerous. Why use WhatsApp mods? Not all users are happy with   show more ...

the official WhatsApp app. Some may feel a need for self-destructing messages or, conversely, the ability to view messages another user deleted. Others are after dynamic themes, and still others want to hide certain chats from the general list or automatically translate messages. Naturally, they want these features right away, not when WhatsApp’s developers finally get around to implementing them. As a result, some users turn to the modified WhatsApp clients available online, which are fairly numerous and not hard to find. Fans of mods are not deterred even by WhatsApp’s occasional crackdown on such modifications or the threat of account bans. The creators of WhatsApp mods often embed ads in them — understandably — along with the features users are looking for. Problems arise, however, from their use of third-party ad modules through which malicious code can sneak in under developers’ radar. Triada et al. in the FMWhatsApp mod That’s precisely what happened with FMWhatsApp, a popular WhatsApp mod. In version 16.80.0 the developers use third-party ad module that includes a Trojan. Our mobile antivirus solution detects this malware as Trojan.AndroidOS.Triada.ef. We saw a similar situation in the spring of 2021 with the APKPure unofficial app store, whose developers also used an ad module from an unverified source, thereby infecting their creation, and consequently users, with the Triada Trojan (albeit a slightly different version). As in the case of the infected APKPure, the Triada Trojan in the dangerous version of the FMWhatsApp mod performs an intermediary function. First, it collects data about the user’s device, and then, depending on the information, it downloads another Trojan. Triada’s “extras” come in a variety of flavors — the infected version of FMWhatsApp downloads several types of malware to devices: Trojan-Downloader.AndroidOS.Agent.ic, a Trojan that downloads and runs other malicious modules; Trojan-Downloader.AndroidOS.Gapac.e, which downloads and runs other malicious modules and can also display full-screen ads at unexpected moments; Trojan-Downloader.AndroidOS.Helper.a, which downloads and runs the installer module of the xHelper Trojan and runs invisible ads in the background; Trojan.AndroidOS.MobOk.i, a Trojan that signs up for paid subscriptions; Trojan.AndroidOS.Subscriber.l, another Trojan that signs up for paid subscriptions; Trojan.AndroidOS.Whatreg.b, the most complex Trojan in the list, signs in to the WhatsApp account on the victim’s phone, intercepting the login confirmation text. The device can then become a site for various types of illegal activity such as spam distribution or illegal trading. Our Securelist post delves more into the FMWhatsapp mod’s Triada Trojan. How to defend against such attacks Practicing caution and using your device safely is key to keeping malware and other mobile nasties off your phone. Generally speaking, follow these tips to avoid trouble: Avoid installing apps from unofficial sources and use your device’s settings to deny permission to install them. (If you need to install an app not from an official store, temporarily enable that permission and then disable it again); Use only official messaging apps, and download them only from official app stores — they may lack some features, but will not flood your phone with viruses; Check what permissions you’ve granted to installed apps — some might pose a real threat; Install a reliable mobile antivirus app on your phone, and heed its warnings.

 Threat Actors

Iranian APT Lyceum has been disguising as HR managers and employees of well-known firms to compromise the networks of IT and communication firms in Israel, since 2018. The threat actor carried out several waves of attacks using several tools, malware, and malicious documents. Security professionals are urged to keep a strict watch on the development of the Lyceum group.

 Malware and Vulnerabilities

Researchers at Mnemonics Labs have found a vulnerability (CVE-2021-34749) in the server name indication, or SNI, of the TLS Client Hello extension used to perform TLS inspection.

 Malware and Vulnerabilities

New ransomware group LockFile has been discovered using the PetitPotam NTLM relay attack method to take over a Windows domain completely. The adoption of the recently discovered PetitPotam attack into their campaign indicates that hackers are actively working to enhance the malware. Furthermore, researchers noted that the ransom note by the group appears similar to that of the LockBit ransomware group.

 Security Products & Services

Kubescape is an open-source tool that helps organizations test if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA.

 Identity Theft, Fraud, Scams

Cybercriminals are increasingly deploying CAPTCHA-protected malicious URLs to bypass security walls while adding counterfeit login for lottery and survey pages. Targeted victims are baited into revealing their information, such as addresses, date of births, banking information, and annual income. Such phishing pages   show more ...

can be detected with the association of CAPTCHA identifiers that can be used as IOCs to detect such attacks.

 Breaches and Incidents

Silent video footage capturing the dire conditions of life inside Tehran's Evin Prison were shared with the media on Sunday by hacktivist group Tapandegan (Palpitations).

 Trends, Reports, Analysis

Australia's data protection regulator says organizations hit by ransomware may be underreporting data breaches because they haven't thoroughly figured out if data was taken.

 Threat Actors

According to the latest telemetry by Trend Micro, researchers revealed that they had detected multiple LockBit 2.0 attack attempts in Chile, Italy, Taiwan, and the U.K.

 Malware and Vulnerabilities

Recent studies on the FluBot banking malware confirmed that there has been a spike in the number of malicious distribution pages affecting a number of Australian, Polish, and German banks.

 Feed

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

 Feed

Ubuntu Security Notice 5050-1 - It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. Michael Brown discovered that the Xen netback driver in the Linux kernel did not properly handle   show more ...

malformed packets from a network PV frontend, leading to a use-after-free vulnerability. An attacker in a guest VM could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.

 Feed

More than 38 million records from 47 different entities that rely on Microsoft's Power Apps portals platform were inadvertently left exposed online, bringing into sharp focus a "new vector of data exposure." "The types of data varied between portals, including personal information used for COVID-19 contact tracing, COVID-19 vaccination appointments, social security numbers for job applicants,

 Feed

A modified version of the WhatsApp messaging app for Android has been trojanized to serve malicious payloads, display full-screen ads, and sign up device owners for unwanted premium subscriptions without their knowledge. "The Trojan Triada snuck into one of these modified versions of the messenger called FMWhatsApp 16.80.0 together with the advertising software development kit (SDK),"

 Feed

A previously undisclosed "zero-click" exploit in Apple's iMessage was abused by Israeli surveillance vendor NSO Group to circumvent iOS security protections and target nine Bahraini activists. "The hacked activists included three members of Waad (a secular Bahraini political society), three members of the Bahrain Center for Human Rights, two exiled Bahraini dissidents, and one member of Al Wefaq

 Feed

Cybersecurity researchers on Tuesday took the wraps off four up-and-coming ransomware groups that could pose a serious threat to enterprises and critical infrastructure, as the ripple effect of a recent spurt in ransomware incidents show that attackers are growing more sophisticated and more profitable in extracting payouts from victims. "While the ransomware crisis appears poised to get worse

2021-08
Aggregator history
Tuesday, August 24
SUN
MON
TUE
WED
THU
FRI
SAT
AugustSeptemberOctober