Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

For the 297th edition of the Transatlantic Cable Podcast, Ahmed and I discuss a lot of stories that center around the hottest topic on the social web – AI. Our first story takes a look at how a company is now offering Deep Fakes for under $200… we opine about what could go wrong. From there, we jump over to recent   show more ...

news of Geoffrey Hinton quitting Google. The move from Hinton is on the heels of him questioning the uninhibited growth and development of AI – without looking as to what could go wrong. While this adds fuel to the fire, we stop our cynicism of AI and look at some research from our colleagues at Kaspersky. In this research, our team takes a look at whether or not ChatGPT can successfully determine phishing links. To close out the podcast, we discuss a FYI for folks in term of some zero days actively being used on major tech companies and why you need to patch now. If you liked what you heard please do consider subscribing, below are the stories we discussed in case you would like to dive deeper. Tencent Cloud announces Deepfakes-as-a-Service for $145 After Quitting Google, Godfather of AI Is Now Warning of Its Dangers What does ChatGPT know about phishing? Apple issues Rapid Security Response update for iOS 16.4.1, macOS 13.3.1 Apple, Google, and Microsoft Just Fixed Zero-Day Security Flaws

image for Microsoft buried Int ...

 Business

Not so long ago, the IT-security media space was once again full of cheery reports that Microsoft was finally burying Internet Explorer (IE). Lets recap the long story of how the once most-popular browser in the world was gradually disconnected from its life-support systems, and investigate whether its finally time to   show more ...

rejoice (spoiler: it isnt). Internet Explorer: life and death chronicles We remind those who didnt witness (or have forgotten) the 2000s that, back then, Internet Explorer ruled the web, with a browser market share of more than 90%. Its hard to believe it now, but Explorer was even more dominant than the current champion, Google Chrome, is now. However, since the introduction of Chrome in 2008, Explorers popularity has been steadily falling away. We can consider 2012 as the end of the Explorer era, when Chrome finally overtook it. That said, Microsofts first official acknowledgment of this fact came only in 2015. Back then, along with unveiling Windows 10, the company announced it was closing down Internet Explorers development and introducing Edge as the default browser for Windows, signifying the first phase of IEs decommissioning. The original version of Edge was powered by Microsofts own EdgeHTML engine, a modification of the MSHTML (also known as Trident), on which Internet Explorer was based. Of course, Edge featured an IE compatibility mode. However, Explorer, in its eleventh and final version, was still integrated into the operating system. So began the dual-browser period, when both Edge and Explorer were preinstalled in Windows, which (another spoiler) continues to this day. Three years later, in December 2018, came phase two: Microsoft abandoned further attempts to develop its own engine and unveiled an all-new version of Edge, this time based on Chromium. This browser, too, had an IE compatibility mode. And Explorer was still left in the system. In 2021, Microsoft released its new Windows 11. It was now no longer possible to boot up and use Explorer as a standalone browser — theoretically at least. However, Edge still retained its IE compatibility mode. And Explorer itself was still present in the system, so, after a spot of tinkering, it was still possible to run it. A couple of years after that, just recently in February 2023, news broke that Microsoft had finally finished off Explorer in its latest update. A coup de grace, ending this cruel agony. But, upon closer inspection, it turns out that the old dog is still breathing! Disable doesnt mean delete The first thing to realize about the Windows update is that it doesnt expunge Explorer from the operating system; it disables it. In practice, this means that Explorer can no longer be launched as a standalone browser (this time for sure). However, Edge, formally the only browser in Windows, still has an IE-compatible mode. This means that Explorer is still alive — if not quite kicking: its there just to ensure the operation of this mode. Now if you try to open Explorer, Edge will run instead. And in it, if you really want to, you can select IE compatibility mode. Consequently, Explorer will continue to inhabit Windows until Microsoft finally decides to bury IE compatibility mode. The patch to disable IE doesnt work on all systems Even the disabling of Explorer wasnt absolute. Theres a whole raft of operating systems excluded from getting the update that turns IE off. Microsoft has kindly published a list of these exclusions: Windows 8.1 Windows 7 Extended Security Updates (ESU) Windows Server Semi-Annual Channel (SAC), all versions Windows 10 IoT Long-Term Servicing Channel (LTSC), all versions Windows Server LTSC, all versions Windows 10 client LTSC, all versions Windows 10 China Government Edition In other words, users of these operating systems havent received even above mentioned changes. They will still be able to run Internet Explorer as a standalone browser. Whats the problem anyway? The problem is that along with the hopelessly obsolete browser all its vulnerabilities (plus yet-undiscovered ones) will remain in the system. The only real difference between before and after IE disabling is that it might become a bit harder to exploit this vulnerable browser in certain types of attacks. As a vivid illustration of what can go wrong, we can recall the vulnerability CVE-2021-40444. It was discovered in the MSHTML engine of Internet Explorer in 2021. Whats more, at the time of discovery, the vulnerability was already being exploited in attacks on Microsoft Office users. The attackers complemented Office documents with a malicious ActiveX element, which allowed remote code execution after the user opened the trojanized file. Why doesnt Microsoft just bury Explorer for good? The issue is that this browser was for too long the only viable option for many companies, during which time it managed to spread deep roots in their infrastructure. Some of those companies are still unable to part with the legacy of this dark past. So, for the sake of compatibility (a sacred cow for Microsoft), the half-dead browser has been dragged from OS to OS for over a decade now. How to stay protected By the looks of it, well likely be waiting at least a few more years before Internet Explorer is finally put out of its misery completely. Therefore, unless you want to wait for MS to finally kill off IE once and for all, (which we strongly advise against), its better to administer the last rites yourself: If your company is still using technologies tied to Internet Explorer, try to phase them out and switch to modern ones. Seriously, this should have been done 10 years ago. Then, when you no longer need IE compatibility, its wise to disable the browser on all operating systems you use. For the above-listed operating systems, this will have to be done manually — the Microsoft website has a comprehensible list of instructions on how to do this. For all other systems, make sure the relevant Microsoft patch is installed. According to Microsoft advice, you should continue to install security updates that apply to Internet Explorer even after you disable it, as applicable, because some components of the browser remain on the system. And, of course, use reliable protection on all devices in your company.

image for $10M Is Yours If You ...

 A Little Sunshine

The U.S. government this week put a $10 million bounty on a Russian man who for the past 18 years operated Try2Check, one of the cybercrime underground’s most trusted services for checking the validity of stolen credit card data. U.S. authorities say 43-year-old Denis Kulkov‘s card-checking service made   show more ...

him at least $18 million, which he used to buy a Ferrari, Land Rover, and other luxury items. Denis Kulkov, a.k.a. “Nordex,” in his Ferrari. Image: USDOJ. Launched in 2005, Try2Check soon was processing more than a million card-checking transactions per month — charging 20 cents per transaction. Cybercriminals turned to services like this after purchasing stolen credit card data from an underground shop, with an eye toward minimizing the number of cards that are inactive by the time they are put to criminal use. Try2Check was so reliable that it eventually became the official card-checking service for some of the underground’s most bustling crime bazaars, including Vault Market, Unicc, and Joker’s Stash. Customers of these carding shops who chose to use the shop’s built-in (but a-la-carte) card checking service from Try2Check could expect automatic refunds on any cards that were found to be inactive or canceled at the time of purchase. Many established stolen card shops will allow customers to request refunds on dead cards based on official reports from trusted third-party checking services. But in general, the bigger shops have steered customers toward using their own white-labeled version of the Try2Check service — primarily to help minimize disputes over canceled cards. On Wednesday, May 3, Try2Check’s websites were replaced with a domain seizure notice from the U.S. Secret Service and U.S. Department of Justice, as prosecutors in the Eastern District of New York unsealed an indictment and search warrant naming Denis Gennadievich Kulkov of Samara, Russia as the proprietor. Try2Check’s login pages have been replaced with a seizure notice from U.S. law enforcement. At the same time, the U.S. Department of State issued a $10 million reward for information leading to the arrest or conviction of Kulkov. In November 2021, the State Department began offering up to to $10 million for the name or location of any key leaders of REvil, a major Russian ransomware gang. As noted in the Secret Service’s criminal complaint (PDF), the Try2Check service was first advertised on the closely-guarded Russian cybercrime forum Mazafaka, by someone using the handle “KreenJo.” That handle used the same ICQ instant messenger account number (555724) as a Mazafaka denizen named “Nordex.” In February 2005, Nordex posted to Mazafaka that he was in the market for hacked bank accounts, and offered 50 percent of the take. He asked interested partners to contact him at the ICQ number 228427661 or at the email address polkas@bk.ru. As the government noted in its search warrant, Nordex exchanged messages with forum users at the time identifying himself as a then-24-year-old “Denis” from Samara, RU. In 2017, U.S. law enforcement seized the cryptocurrency exchange BTC-e, and the Secret Service said those records show that a Denis Kulkov from Samara supplied the username “Nordexin,” email address nordexin@ya.ru, and an address in Samara. Investigators had already found Instagram accounts where Kulkov posted pictures of his Ferrari and his family. Authorities were able to identify that Kulkov had an iCloud account tied to the address nordexin@icloud.com, and upon subpoenaing that found passport photos of Kulkov, and well as more photos of his family and pricey cars. Like many other top cybercriminals based in Russia or in countries with favorable relations to the Kremlin, the proprietor of Try2Check was not particularly difficult to link to a real-life identity. In Kulkov’s case, it no doubt was critical to U.S. investigators that they had access to a wealth of personal information tied to a cryptocurrency exchange Kulkov had used. However, the link between Kulkov and Try2Check can be made — ironically — based on records that have been plundered by hackers and published online over the years — including Russian email services, Russian government records, and hacked cybercrime forums. NORDEX Kulkov posing with his passport, in a photo authorities obtained by subpoenaing his iCloud account. According to cybersecurity firm Constella Intelligence, the address polkas@bk.ru was used to register an account with the username “Nordex” at bankir[.]com, a now defunct news website that was almost standard reading for Russian speakers interested in news about various Russian financial markets. Nordex appears to have been a finance nerd. In his early days on the forums, Nordex posted several long threads on his views about the Russian stock market and mutual fund investments. That Bankir account was registered from the Internet address 193.27.237.66 in Samara, Russia, and included Nordex’s date of birth as April 8, 1980, as well as their ICQ number (228427661). Cyber intelligence firm Intel 471 found that Internet address also was used to register the account “Nordex” on the Russian hacking forum Exploit back in 2006. Constella tracked another Bankir[.]com account created from that same Internet address under the username “Polkas.” This account had the same date of birth as Nordex, but a different email address: nordia@yandex.ru. This and other “nordia@” emails shared a password: “anna59.” NORDIA Nordia@yandex.ru shares several passwords with nordia@list.ru, which Constella says was used to create an account at a religious website for an Anna Kulikova from Samara. At the Russian home furnishing store Westwing.ru, Ms. Kulikova listed her full name as Anna Vnrhoturkina Kulikova, and her address as 29 Kommunistrecheskya St., Apt. 110. A search on that address in Constella brings up a record for an Anna Denis Vnrhoturkina Kulkov, and the phone number 879608229389. Russian vehicle registration records have also been hacked and leaked online over the years. Those records show that Anna’s Apt 110 address is tied to a Denis Gennadyvich Kulkov, born April 8, 1980. The vehicle Kolkov registered in 2015 at that address was a 2010 Ferrari Italia, with the license plate number K022YB190. The phone number associated with this record — 79608229389 — is exactly like Anna’s, only minus the (mis?)leading “8”. That number also is tied to a now-defunct Facebook account, and to the email addresses nordexin@ya.ru and nordexin@icloud.com. Kulkov’s Ferrari has been photographed numerous times over the years by Russian car aficionados, including this one with the driver’s face redacted by the photographer: The Ferrari owned by Denis Kulkov, spotted in Moscow in 2016. Image: Migalki.net. As the title of this story suggests, the hard part for Western law enforcement isn’t identifying the Russian cybercriminals who are major players in the scene. Rather, it’s finding creative ways to capture high-value suspects if and when they do leave the protection that Russia generally extends to domestic cybercriminals within its borders who do not also harm Russian companies or consumers, or interfere with state interests. But Russia’s war against Ukraine has caused major fault lines to appear in the cybercrime underground: Cybercriminal syndicates that previously straddled Russia and Ukraine with ease were forced to reevaluate many comrades who were suddenly working for The Other Side. Many cybercriminals who operated with impunity from Russia and Ukraine prior to the war chose to flee those countries following the invasion, presenting international law enforcement agencies with rare opportunities to catch most-wanted cybercrooks. One of those was Mark Sokolovsky, a 26-year-old Ukrainian man who operated the popular “Raccoon” malware-as-a-service offering; Sokolovsky was apprehended in March 2022 after fleeing Ukraine’s mandatory military service orders. Also nabbed on the lam last year was Vyacheslav “Tank” Penchukov, a senior Ukrainian member of a transnational cybercrime group that stole tens of millions of dollars over nearly a decade from countless hacked businesses. Penchukov was arrested after leaving Ukraine to meet up with his wife in Switzerland.

 Trends, Reports, Analysis

A new report by Cofense revealed that the volume of malicious campaigns utilizing Telegram bots in Q1 2023 exceeded that of Q4 2022 by 397% and surpassed the entire volume of 2022 by 310%. Additionally, YouTube was listed in the top 10 domains being used by threat actors to launch redirect phishing attacks.

 Threat Actors

A group of advanced persistent hackers, who go by the alias Dragon Breath, has adopted a new strategy of utilizing multiple sophisticated versions of the conventional DLL sideloading method to avoid detection. Its attack strategy involves using an initial vector that exploits a legitimate application, often Telegram, to sideload a second-stage payload, which may also be benign.

 Malware and Vulnerabilities

In the multi-stage attack chain for IcedID, phishing emails, fake Zoom installers, malicious .one files, and malvertising campaigns are all plausible infection methods that can ultimately direct victims toward websites hosting malicious payloads.

 Companies to Watch

The company intends to use the funds to support its strategic objectives, including acquiring Proxios, which expands its physical presence in the mid-Atlantic states, while broadening its client base in the healthcare, legal, and non-profit sectors.

 Threat Actors

ScarCruft, a North Korean threat group, has been attempting to deliver the RokRAT malware since July 2022 using oversized LNK files. The malware is capable of targeting macOS (CloudMensis) and Android (RambleOn). The malware variants are equipped to carry out a range of activities such as credential theft, data exfiltration, command and shellcode execution, file and directory management, and more.

 Threat Actors

After more than six months of no activity, Chinese state-sponsored threat group Earth Longzhi is back with new tricks up its sleeves in a new series of attacks. The attackers aim at IIS and Microsoft Exchange servers exposed to the internet to get access to the networks to install the Behinder web shell. Protection against such threats demands a proactive defense strategy.

 Feed

Ubuntu Security Notice 6058-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges.

 Feed

Debian Linux Security Advisory 5398-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

 Feed

There is an integer overflow in Shannon Baseband leading to a heap buffer overflow when reassembling IPv4 fragments. According to the debug strings, this corresponding functionality is implemented in SmdtIp4Rx::ProcessFragments function and its callees.

 Feed

Ubuntu Security Notice 6057-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the OverlayFS implementation in the Linux   show more ...

kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges.

 Feed

Red Hat Security Advisory 2023-2137-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

 Feed

Red Hat Security Advisory 2023-2136-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

 Feed

Debian Linux Security Advisory 5396-2 - The webkit2gtk update released as 5396-1 introduced a compatibility problem that caused Evolution to display e-mail incorrectly. Evolution has been updated to solve this issue.

 Feed

Ubuntu Security Notice 6056-1 - It was discovered that a race condition existed in the Xen transport layer implementation for the 9P file system protocol in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or expose sensitive information.

 Feed

Red Hat Security Advisory 2023-2126-01 - Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network.

 Feed

Red Hat Security Advisory 2023-2124-01 - Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network.

 Feed

Red Hat Security Advisory 2023-2121-01 - Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network.

 Feed

Red Hat Security Advisory 2023-2122-01 - Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network.

 Feed

Red Hat Security Advisory 2023-2120-01 - Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network.

 Feed

Cisco has warned of a critical security flaw in SPA112 2-Port Phone Adapters that it said could be exploited by a remote attacker to execute arbitrary code on affected devices. The issue, tracked as CVE-2023-20126, is rated 9.8 out of a maximum of 10 on the CVSS scoring system. The company credited Catalpa of DBappSecurity for reporting the shortcoming. The product in question makes it possible

 Feed

A new Android subscription malware named Fleckpe has been unearthed on the Google Play Store, amassing more than 620,000 downloads in total since 2022. Kaspersky, which identified 11 apps on the official app storefront, said the malware masqueraded as legitimate photo editing apps, camera, and smartphone wallpaper packs. The apps have since been taken down. The operation primarily targeted users

 Feed

Italian corporate banking clients are the target of an ongoing financial fraud campaign that has been leveraging a new web-inject toolkit called drIBAN since at least 2019. "The main goal of drIBAN fraud operations is to infect Windows workstations inside corporate environments trying to alter legitimate banking transfers performed by the victims by changing the beneficiary and transferring

 Feed

The North Korean state-sponsored threat actor known as Kimsuky has been discovered using a new reconnaissance tool called ReconShark as part of an ongoing global campaign. "[ReconShark] is actively delivered to specifically targeted individuals through spear-phishing emails, OneDrive links leading to document downloads, and the execution of malicious macros," SentinelOne researchers Tom Hegel

 Feed

Third-party apps such as Google Analytics, Meta Pixel, HotJar, and JQuery have become critical tools for businesses to optimize their website performance and services for a global audience. However, as their importance has grown, so has the threat of cyber incidents involving unmanaged third-party apps and open-source tools. Online businesses increasingly struggle to maintain complete visibility

 Feed

PHP software package repository Packagist revealed that an "attacker" gained access to four inactive accounts on the platform to hijack over a dozen packages with over 500 million installs to date. "The attacker forked each of the packages and replaced the package description in composer.json with their   show more ...

own message but did not otherwise make any malicious changes," Packagist's Nils Adermann said

 Feed

Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented strain of Android malware called FluHorse that abuses the Flutter software development framework. "The malware features several malicious Android applications that mimic legitimate applications, most of which have more than 1,000,000 installs," Check Point said in

2023-05
MON
TUE
WED
THU
FRI
SAT
SUN
MayJuneJuly