Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for SnatchCrypto, a cryp ...

 Business

Our experts have been studying a malicious campaign targeting companies that work with cryptocurrencies, smart contracts, decentralized finance, and blockchain technology. The attackers are interested in fintech in general, and the campaign, named SnatchCrypto, is related to the BlueNoroff APT group, a known entity   show more ...

already traced to the 2016 attack on Bangladeshs central bank. SnatchCrypto objectives The cybercriminals behind this campaign have two goals: collecting information and stealing cryptocurrency. They are interested primarily in collecting data on user accounts, IP addresses, and session information, and they steal configuration files from programs that work directly with cryptocurrency and may contain credentials and other information about accounts. The attackers carefully study potential victims, sometimes monitoring their activity for months. One of their methods involves manipulations with popular browser extensions for managing cryptowallets. For example, they can change an extensions source in the browser settings so it will be installed from local storage (i.e., a modified version) instead of from the official Web store. They also can use the modified Metamask extension for Chrome to replace the transaction logic, enabling them to steal funds even from those who use hardware devices to sign cryptocurrency transfers. BlueNoroffs methods of invasion The attackers carefully study their victims and apply the information they gain to deploy social-engineering attacks. Typically, they craft e-mails meant to look as though theyre from existing venture companies, but with an attached, macro-enabled document. When opened, this document eventually downloads a backdoor. For detailed technical information about the attack and attackers methods, see Securelists report, The BlueNoroff cryptocurrency hunt is still on. How to protect your company from SnatchCrypto attacks One clear sign of SnatchCrypto activity is a modified Metamask extension. To use it, attackers have to put the browser into developer mode and install the Metamask extension from a local directory. You can easily check for that: If the browser mode has been switched without your permission, and the extension is loaded from a local directory, then your device is probably compromised. In addition, we recommend employing the following standard protective measures: Periodically raise employees cybersecurity awareness; Update critical applications (including OS and office suites) promptly; Outfit every computer that has Internet access with a reliable security solution; Use an EDR solution (if appropriate to your infrastructure) that enables you to detect complex threats and help with timely responses.

 Trends, Reports, Analysis

Fraudsters are masquerading as genuine customers and setting up fake accounts when they make their first purchase, paying one installment, then closing the account once they have received their goods.

 Malware and Vulnerabilities

According to its pre-release announcement, the company has lined up 483 new patches for the first Critical Patch Update (CPU) of 2022, which is scheduled for Tuesday, January 18.

 Malware and Vulnerabilities

Fortinet discovered a new RedLine info-stealer campaign impersonating the COVID-19 Omicron stat counter app as a lure to steal data. The victims of the attack campaign are reportedly distributed across 12 countries. Security teams are advised to deploy a reliable anti-malware solution, encrypt important data, and use a network firewall, to say the least, to stay protected.

 Malware and Vulnerabilities

A relatively inactive TellYouThePass ransomware has re-emerged as a Golang-compiled malware, making it easier for threat actors to target a wide range of operating systems, including macOS and Linux. Hackers demand 0.05 Bitcoin, presently converting to around $2,150, for the decryption tool. TellYouThePass is financially motivated ransomware that was first seen in 2019.

 Malware and Vulnerabilities

Researchers at F5 Networks observed a new smishing campaign by the FluBot malware operators, camouflaged as Flash Player, to target Android users. The FluBot version 5.2 comes with important improvements including the implementation of a new command to change the domain generation algorithms seed remotely. Security analysts are urged to keep a close watch on this threat.

 Feed

Red Hat Security Advisory 2022-0158-02 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. Issues addressed include a code execution vulnerability.

 Feed

Ubuntu Security Notice 5233-1 - It was discovered that ClamAV incorrectly handled memory when the CL_SCAN_GENERAL_COLLECT_METADATA scan option was enabled. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service.

 Feed

Red Hat Security Advisory 2022-0151-03 - Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.5.1 on RHEL 7 serves as a replacement for Red   show more ...

Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass and information leakage vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0152-03 - Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.5.1 on RHEL 8 serves as a replacement for Red   show more ...

Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass and information leakage vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0155-03 - Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.5.1 serves as a replacement for Red Hat   show more ...

Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass and information leakage vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0146-03 - These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base. There are no changes to the EAP XP2 code base. Issues addressed include an information leakage vulnerability.

 Feed

An elusive threat actor called Earth Lusca has been observed striking organizations across the world as part of what appears to be simultaneously an espionage campaign and an attempt to reap monetary profits. "The list of its victims includes high-value targets such as government and educational institutions, religious movements, pro-democracy and human rights organizations in Hong Kong,

 Feed

Enterprise software maker Zoho on Monday issued patches for a critical security vulnerability in Desktop Central and Desktop Central MSP that a remote adversary could exploit to perform unauthorized actions in affected servers. Tracked as CVE-2021-44757, the shortcoming concerns an instance of authentication bypass that "may allow an attacker to read unauthorized data or write an arbitrary zip

 Feed

Cybersecurity researchers have disclosed details of a now-patched bug in Box's multi-factor authentication (MFA) mechanism that could be abused to completely sidestep SMS-based login verification. "Using this technique, an attacker could use stolen credentials to compromise an organization's Box account and exfiltrate sensitive data without access to the victim's phone," Varonis researchers said

 Feed

VPNLab.net, a VPN provider that was used by malicious actors to deploy ransomware and facilitate other cybercrimes, was taken offline following a coordinated law enforcement operation. Europol said it took action against the misuse of the VPN service by grounding 15 of its servers on January 17 and rendering it inoperable as part of a disruptive action that took place across Germany, the

 Feed

Providing public Wi-Fi is a great service to offer your customers as it becomes more and more standard in today's society. I like the fact that I do not have to worry about accessing the Internet while I am away, or spending a lot of money on an international connection, or just staying offline while I am away. With public Wi-Fi, modern life has become a constant connection to the Internet,

2022-01
Aggregator history
Tuesday, January 18
SAT
SUN
MON
TUE
WED
THU
FRI
JanuaryFebruaryMarch