Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How DoubleFinger mal ...

 Threats

Cryptocurrencies are under attack from all sorts of criminal schemes — from mundane Bitcoin mining scams to grandiose cryptocurrency heists worth hundreds of millions of dollars. For cryptocurrency owners, dangers lurk at literally every turn. Just recently we talked about fake cryptowallets — which look and work   show more ...

just like real ones but eventually steal all your money. Now our experts have discovered a brand new threat: a sophisticated attack using the DoubleFinger loader, which brings along its friends in the shape of the cryptostealer GreetingGhoul and the remote-access Trojan Remcos. But first things first.. How DoubleFinger installs GreetingGhoul Our experts noted the high technical level of the attack and its multistage nature, by which it resembles an advanced persistent threat (APT) attack. A DoubleFinger infection starts with an email containing a malicious PIF file. Once the recipient opens the attachment, a chain of events begins, as follows: Stage 1. DoubleFinger executes a shellcode that downloads a file in PNG format from the image-sharing platform Imgur.com. But its not really an image at all: the file contains multiple DoubleFinger components in encrypted form, which are used in subsequent stages of the attack. These include a loader for use in the second stage of the attack, a legitimate java.exe file, and another PNG file to be deployed later, at the fourth stage. Stage 2. The DoubleFinger second-stage loader is run using the above-mentioned legitimate java.exe file, after which it executes another shellcode that downloads, decrypts and launches the third stage of DoubleFinger. Stage 3. At this stage, DoubleFinger performs a series of actions to bypass security software installed on the computer. Next, the loader decrypts and launches the fourth stage, which is contained in the PNG file mentioned in the first stage. Incidentally, this PNG file contains not only the malicious code but also the image that lent the malware its name: The two fingers from which DoubleFinger got its name. (Note: some languages define a thumb as a finger, unlike in English) Stage 4. At this step, DoubleFinger launches the fifth stage using a technique called Process Doppelgänging, whereby it replaces the legitimate process with a modified one that contains the fifth-stage payload. Stage 5. After all the above manipulations, DoubleFinger gets down to doing what it was designed for: loading and decrypting yet another PNG file — this one containing the final payload. This is the GreetingGhoul cryptostealer, which installs itself in the system and is scheduled in Task Scheduler to run daily at a certain time. How GreetingGhoul steals cryptowallets Once the DoubleFinger loader has done its job, GreetingGhoul comes directly into play. This malware contains two complementary components: one that detects cryptowallet applications in the system and steals data of interest to the attackers (private keys and seed phrases); one that overlays the interface of cryptocurrency applications and intercepts user input. Example of GreetingGhoul overlaying the interface of cryptowallet applications As a result, the cybercriminals behind DoubleFinger are able to take control of the victims cryptowallets and withdraw funds from them. Our experts found several DoubleFinger modifications, some of which — the icing on the cake — install the quite common (in cybercriminal circles) remote access Trojan Remcos in the infected system. Its intended purpose is right there in the name — REMote COntrol & Surveillance. In other words, Remcos allows cybercriminals to observe all user actions and seize full control of the infected system. How to protect your cryptowallets Cryptocurrencies continue to be a magnet for cybercriminals, so all cryptoinvestors need to think hard about security. Speaking of which, we recommend reading our recent post Protecting crypto investments: four key steps to safety. Meanwhile, heres a summary of its key points: Expect scams. The cryptocurrency world is full of scammers of every stripe, so constantly scan the horizon for booby traps, and always check and double-check everything meticulously. Dont put all your eggs in one basket. Use a combination of hot wallets (for current transactions) and cold wallets (for long-term investments). Learn how cybercriminals can attack cold crypto wallets. Purchase from official sources: only buy hardware wallets from official and trusted sources, such as the manufacturers website or authorized resellers; this is to avoid buying a fake crypto wallet. Check for signs of tampering: before using a new hardware wallet, inspect it for any signs of tampering, such as scratches, glue, or mismatched components. Verify the firmware: always verify that the firmware on the hardware wallet is legitimate and up-to-date. This can be done by checking the manufacturers website for the latest version. Never fill your recovery seed for a hardware wallet on a computer. A hardware wallet vendor will never you ask for that. Protect passwords, keys and seed phrases. Use strong and unique passwords, store them securely, and, of course, never give your private keys or seed phrases to anyone under any circumstances. Protect yourself. Be sure to install reliable protection on all devices you use for managing cryptowallets.

image for Doing Less With Less ...

 Feed

Always reach for defense in depth with proposed security changes. Measure and test results, focus on items of greatest impact, and get C-suite members involved to drive better outcomes.

 Trends, Reports, Analysis

By utilizing what the researchers term “AI package hallucinations,” threat actors can create and distribute malicious code packages that developers may inadvertently download and integrate into their legitimate applications and code repositories.

 Trends, Reports, Analysis

In their haste to make money, some new players are picking over the discarded remnants of previous ransomware groups, cobbling together ransomware rather than going through the trouble of coding bespoke crypto-locking software.

 Incident Response, Learnings

According to The Athletic, three class action lawsuits related to the breach were combined into one case. The plaintiffs filed settlement papers in California federal court, the site reported, which they described as an “unopposed motion.”

 Trends, Reports, Analysis

Security executives are overwhelmingly craving more AI solutions in 2023 to help them battle the growing cybersecurity threat landscape, according to a report by Netrix Global.

 Feed

Oracle Weblogic versions 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0 prior to the Jan 2023 security update are vulnerable to an unauthenticated remote code execution vulnerability due to a post deserialization vulnerability. This Metasploit module exploits this vulnerability to trigger the JNDI connection to a LDAP server   show more ...

you control. The LDAP server will then respond with a remote reference response that points to a HTTP server that you control, where the malicious Java class file will be hosted. Oracle Weblogic will then make an HTTP request to retrieve the malicious Java class file, at which point our HTTP server will serve up the malicious class file and Oracle Weblogic will instantiate an instance of that class, granting us remote code execution as the oracle user.

 Feed

This Metasploit module is a Terramaster chained exploit that performs session crafting to achieve escalated privileges that allows an attacker to access vulnerable code execution flaws. TOS versions 4.2.15 and below are affected.

 Feed

This Metasploit module exploits an unauthenticated remote code execution vulnerability in TerraMaster TOS versions 4.2.06 and below via shell metacharacters in the Event parameter at vulnerable endpoint include/makecvs.php during CSV creation. Any unauthenticated user can therefore execute commands on the system under   show more ...

the same privileges as the web application, which typically runs under root at the TerraMaster Operating System.

 Feed

Debian Linux Security Advisory 5423-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

 Feed

Ubuntu Security Notice 6153-1 - It was discovered that Jupyter Core executed untrusted files in the current working directory. An attacker could possibly use this issue to execute arbitrary code.

 Feed

Apple is introducing major updates to Safari Private Browsing, offering users better protections against third-party trackers as they browse the web. "Advanced tracking and fingerprinting protections go even further to help prevent websites from using the latest techniques to track or identify a user's device," the iPhone maker said. "Private Browsing now locks when not in use, allowing a user

 Feed

Security vulnerabilities discovered in Honda's e-commerce platform could have been exploited to gain unrestricted access to sensitive dealer information. "Broken/missing access controls made it possible to access all data on the platform, even when logged in as a test account," security researcher Eaton Zveare said in a report published last week. The platform is designed for the sale of power

 Feed

A previously undetected cryptocurrency scam has leveraged a constellation of over 1,000 fraudulent websites to ensnare users into a bogus rewards scheme since at least January 2021. "This massive campaign has likely resulted in thousands of people being scammed worldwide," Trend Micro researchers said in a report published last week, linking it to a Russian-speaking threat actor named "Impulse

 Feed

Fortinet has released patches to address a critical security flaw in its FortiGate firewalls that could be abused by a threat actor to achieve remote code execution. The vulnerability, tracked as CVE-2023-27997, is "reachable pre-authentication, on every SSL VPN appliance," Lexfo Security researcher Charles Fol, who discovered and reported the flaw, said in a tweet over the weekend. Details

 Feed

Security researchers have warned about an "easily exploitable" flaw in the Microsoft Visual Studio installer that could be abused by a malicious actor to impersonate a legitimate publisher and distribute malicious extensions. "A threat actor could impersonate a popular publisher and issue a malicious extension to compromise a targeted system," Varonis researcher Dolev Taler said. "Malicious

 Feed

The term "attack surface management" (ASM) went from unknown to ubiquitous in the cybersecurity space over the past few years. Gartner and Forrester have both highlighted the importance of ASM recently, multiple solution providers have emerged in the space, and investment and acquisition activity have seen an uptick. Many concepts come and go in cybersecurity, but attack surface management

 Feed

A fully undetectable (FUD) malware obfuscation engine named BatCloak is being used to deploy various malware strains since September 2022, while persistently evading antivirus detection. The samples grant "threat actors the ability to load numerous malware families and exploits with ease through highly obfuscated batch files," Trend Micro researchers said. About 79.6% of the total 784 artifacts

2023-06
THU
FRI
SAT
SUN
MON
TUE
WED
JuneJulyAugust