Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 278 of the Transatlantic Cable kicks off with news that the previous Twitter hack, back in 2021, is actually much larger than initially suspected. Not great news for the already troubled social media site. From there, the team discuss recent news that nightclub owners in Miami are struggling with slumping   show more ...

sales after the recent crypto crash. It appears many crypto advocates moved there to spend their hard-earned coins, but are now having to tighten their belts. Staying in the cryptocurrency world, the next story looks at yet another crash with BlockFi moving into receivership. Is this the crypto bubble bursting? Time will tell, it seems. To wrap up, a story for all the Apple fans out there, with news that Apple appears to be tracking its users, even if those users have asked them not to. Concerning? Possibly – especially considering that they made privacy a key focal point of their recent advertising campaigns. If you liked what you heard, please do consider subscribing. Hackers Release Millions of Twitter IDs and User Info for Free Miami nightclub owners are struggling with slumping sales after losing top-spending crypto clientele Crypto firm BlockFi files for bankruptcy after FTX collapse Apple Is Tracking You Even When Its Own Privacy Settings Say Its Not

image for CryWiper disguised a ...

 Business

Our experts have discovered an attack of a new Trojan, which they dubbed CryWiper. On the first glance, this malware acts as a ransomware: it modifies files, adds a .CRY extension to them, and saves a README.txt file with a ransom note, which contains the bitcoin wallet address, the contact e-mail address of the   show more ...

malware creators, and the infection ID. However, in fact, this malware is a wiper — a file modified by CryWiper cannot be restored to its original state ever. So if you see a ransom note, and your files have a new .CRY extension, do not hurry to pay a ransom: it is pointless. In the past, we have seen some malware strains that became wipers by accident — due to mistakes of their creators who poorly implemented encryption algorithms. However, this time it is not the case: our experts are confident that the main goal of the attackers is not financial gain, but destroying data. The files are not really encrypted; instead, the Trojan overwrites them with pseudo-randomly generated data. What CryWiper is hunting for The Trojan corrupts any data that is not vital for the functioning of the operating system. It doesnt affect files with extensions .exe, .dll, .lnk, .sys, .msi, and ignores several system folders in the C:Windows directory. The malware focuses on databases, archives, and user documents. So far, our experts have seen only pinpoint attacks on targets in the Russian Federation. However, as usual, no one can guarantee that the same code cannot be used against other targets. How the CryWiper Trojan works In addition to directly overwriting the contents of files with garbage, CryWiper also does the following: creates a task that restarts the wiper every 5 minutes using the Task Scheduler; sends the name of the infected computer to the C&C server and waits for a command to start an attack; halts processes related to MySQL and MS SQL database servers, MS Exchange mail server and MS Active Directory web services (otherwise access to some files would be blocked and it would be impossible to corrupt them); deletes shadow copies of files so that they cannot be restored (but for some reason only on the C: drive); disables connection to the affected system via RDP remote access protocol. The purpose of the latter is not entirely clear. Perhaps this way malware authors tried to complicate the work of incident response team, that will clearly prefer to have a remote access to the affected machine — but instead they will have to get physical access to it. You can find technical details of the attack along with indicators of compromise in a post on Securelist (in Russian only). How to stay safe To protect your companys computers from both ransomware and wipers, our experts recommend the following measures: carefully control remote access connections to your infrastructure: prohibit connections from public networks, allow RDP access only through VPN tunnel, use unique strong passwords and two-factor authentication; update critical software in a timely manner, paying special attention to the operating system, security solutions, VPN clients, and remote access tools; raise security awareness of your employees, for example, using specialized online tools; employ advanced security solutions to protect both work devices and the perimeter of the corporate network.

 Identity Theft, Fraud, Scams

CashRewindo threat actor is back with effective, creative, and cloaked landing pages to target victims in Europe and North and South America with fake investment schemes. The group uses old domains that were registered years ago and have no involvement in any malicious activity, to build trust and bypass security   show more ...

scanners. Besides that, the group leverages another innovative tactic of flipping between scam ads and ordinary posts.

 Malware and Vulnerabilities

A vulnerability in IBM Cloud databases for PostgreSQL could have allowed attackers to launch a supply chain attack on cloud customers by breaching internal IBM Cloud services and disrupting the hosted system's internal image-building process.

 Companies to Watch

The investment, led by Advent International, brings HYPR’s total funds raised to $97 million and includes participation from existing investors including .406 Ventures, RRE Ventures, Top Tier Capital, and Comcast Ventures.

 Breaches and Incidents

More than 2.2 million patients across almost 120 pediatric physician practices and practice groups in the U.S. may have had their data compromised by a breach at pediatric health IT vendor Connexin Software in August, according to HealthITSecurity.

 Incident Response, Learnings

The conspiracy is said to have resulted in at least $30m of stolen benefits designed to help the unemployed during the pandemic. The case highlights the persistent threat of fraud facing government organizations and the risks of malicious insiders.

 Breaches and Incidents

North Korea-linked APT37, aka ScarCruft, was found leveraging a previously undocumented backdoor, named Dolphin, against South Korean entities. The latest discovery links back to a watering-hole attack in 2021 on a South Korean online newspaper reporting on activity and events related to North Korea. So far, four   show more ...

Dolphin backdoor variants have been detected, 1.9 through 3.0 (86/64-bit). Dolphin frequently adds, removes, or improves commands in each variant.

 Companies to Watch

The $26 million Series B brings the total raised by Pangea to $51 million and underscores a push by venture capital investors to bet on companies that help developers embed security services and APIs into their cloud applications.

 Trends, Reports, Analysis

In the first half of this year, researchers saw a rising trend of wiper malware being deployed in parallel with the Russia-Ukraine war. However, those wipers haven’t stayed in one place – they’re emerging globally.

 Breaches and Incidents

The official Vatican website was taken offline on Wednesday following an apparent hacking attack, the Holy See said. "Technical investigations are ongoing due to abnormal attempts to access the site," Vatican spokesman Matteo Bruni said.

 Feed

Red Hat Security Advisory 2022-8750-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.

 Feed

Ubuntu Security Notice 5758-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was   show more ...

discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5757-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was   show more ...

discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5757-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was   show more ...

discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5756-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was   show more ...

discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.

 Feed

Ubuntu Security Notice 5755-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did   show more ...

not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5743-2 - USN-5743-1 fixed a vulnerability in LibTIFF. This update provides the corresponding updates for Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked   show more ...

into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.

 Feed

Ubuntu Security Notice 5754-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in   show more ...

the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.

 Feed

Platform certificates used by Android smartphone vendors like Samsung, LG, and MediaTek have been found to be abused to sign malicious apps. The findings were first discovered and reported by Google reverse engineer Łukasz Siewierski on Thursday. "A platform certificate is the application signing certificate used to sign the 'android' application on the system image," a report filed through the

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week released an Industrial Control Systems (ICS) advisory warning of multiple vulnerabilities in Mitsubishi Electric GX Works3 engineering software. "Successful exploitation of these vulnerabilities could allow unauthorized users to gain access to the MELSEC iQ-R/F/L series CPU modules and the MELSEC iQ-R series OPC UA server

 Feed

Old technology solutions – every organization has a few of them tucked away somewhere.  It could be an old and unsupported storage system or a tape library holding the still-functional backups from over 10 years ago.  This is a common scenario with software too. For example, consider an accounting software suite that was extremely expensive when it was purchased. If the vendor eventually went

 Feed

IBM has fixed a high-severity security vulnerability affecting its Cloud Databases (ICD) for PostgreSQL product that could be potentially exploited to tamper with internal repositories and run unauthorized code. The privilege escalation flaw (CVSS score: 8.8), dubbed "Hell's Keychain" by cloud security firm Wiz, has been described as a "first-of-its-kind supply-chain attack vector impacting a

 Feed

A previously undocumented Go-based malware is targeting Redis servers with the goal of taking control of the infected systems and likely building a botnet network. The attacks involve taking advantage of a critical security vulnerability in the open source, in-memory, key-value store that was disclosed earlier this year to deploy Redigo, according to cloud security firm Aqua.

 Feed

The new Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) requires CISA to create rules regarding cyber incident reporting by critical infrastructure organizations. The RFI and hearings precede a Notice of Proposed Rulemaking (NPRM) that CISA must publish sooner than 24 months from the enactment of CIRCIA, which the President signed into law in March. The sessions and

 Feed

Multiple unpatched vulnerabilities have been discovered in three Android apps that allow a smartphone to be used as a remote keyboard and mouse. The apps in question are Lazy Mouse, PC Keyboard, and Telepad, which have been cumulatively downloaded over two million times from the Google Play Store. Telepad is no longer available through the app marketplace but can be downloaded from its website.

2022-12
Aggregator history
Friday, December 02
THU
FRI
SAT
SUN
MON
TUE
WED
DecemberJanuaryFebruary