Follow @EthHackingNews |
A comprehensive overview of the current state of malware-related incidents has been provided in this article. From sophisticated APTs to phishing attacks, malware has become an integral part of our digital lives. The article highlights several notable incidents involving malware, including a cyberattack on Omni Hotels & Resorts and a data breach at City of Hope.
The article discusses recent cybersecurity vulnerabilities and incidents, highlighting the importance of regular testing and patching of software to prevent exploitation by attackers. Some key points include:* CISA has added several new vulnerabilities to its Known Exploited Vulnerabilities catalog, including Apache OFBiz and Android kernel bugs.* Russian cyber spies have stolen data and emails from UK government systems, exploiting vulnerabilities in software updates.* A critical XSS bug in Roundcube Webmail allows attackers to steal emails and sensitive data.* New Android spyware LianSpy relies on Yandex Cloud to avoid detection and exploit vulnerabilities in software updates.* Hackers breached MDM firm Mobile Guardian and wiped thousands of devices.* A ransomware attack hit French museum network, highlighting the importance of cybersecurity awareness.* CISA has added Microsoft COM for Windows bug to its Known Exploited Vulnerabilities catalog.* Google warns of an actively exploited Android kernel flaw that allows attackers to gain unauthorized access to sensitive information on Android devices.* Researchers warn of a new critical Apache OFBiz flaw that allows attackers to gain unauthorized access to sensitive information on systems that use Apache OFBiz software.These incidents highlight the importance of cybersecurity awareness and incident response planning, as well as regular testing and patching of software to prevent exploitation by attackers. It is also important for organizations to have robust security measures in place to protect themselves from cyber threats.Some takeaways from the article include:* Regularly testing and patching software is crucial to prevent exploitation by attackers.* Cybersecurity awareness is essential for individuals and organizations to protect themselves from cyber threats.* Incident response planning is critical in the event of a cyber attack.* Companies must take steps to protect themselves from cyber threats, including implementing robust security measures and staying up-to-date with the latest software updates.Overall, the article emphasizes the importance of cybersecurity awareness and incident response planning in preventing exploitation by attackers.
The cybersecurity world has been experiencing a meteoric rise in malware-related incidents, with new threats emerging every day. In this context, it is essential to take stock of the current state of affairs and understand the various types of malware that are affecting organizations across the globe. From sophisticated APTs (Advanced Persistent Threats) to the simplest phishing attacks, malware has become an integral part of our digital lives.
In a recent development, Cybersecurity Affairs has released its latest newsletter, which highlights several notable incidents involving malware. The first incident reported involves Omni Hotels & Resorts, where a cyberattack disrupted services at one of the company's hotels. The attack was allegedly carried out using the HTTP/2 Continuation Flood technique, which can be exploited in DoS (Denial of Service) attacks.
Another incident that caught attention is the data breach at City of Hope, a US cancer center, which impacted over 827,000 individuals. The breach occurred due to an unnamed vulnerability in the organization's systems.
Additionally, Ivanti has issued patches for four new issues in its Connect Secure and Policy Secure products. These patches are essential to prevent potential vulnerabilities from being exploited by attackers.
Furthermore, Jackson County, Missouri, has disclosed a ransomware attack that affected one of its computer systems. The attack was carried out using an unnamed malware strain.
Google has also addressed another Chrome zero-day vulnerability that was demonstrated at Pwn2Own 2024. This zero-day exploit allows attackers to gain unauthorized access to user data.
Furthermore, the New Version of JsOutProx is being used to attack financial institutions in APAC and MENA via Gitlab Abuse. This malware strain is designed to compromise the security of these organizations by exploiting vulnerabilities in their systems.
Google has also fixed two actively exploited Pixel vulnerabilities that were demonstrated at Pwn2Own 2024.
In another development, highly sensitive files mysteriously disappeared from EUROPOL headquarters. The cause of this incident is still unknown, and an investigation is ongoing to determine the circumstances surrounding it.
XSS (Cross-Site Scripting) flaw in WordPress WP-Members Plugin can lead to script injection. This vulnerability allows attackers to inject malicious scripts into user accounts, compromising their security.
Binarly released a free online scanner to detect the CVE-2024-3094 Backdoor. This scanner is essential for organizations to identify and remediate vulnerabilities in their systems before they are exploited by attackers.
Google agreed to erase billions of browser records to settle a class action lawsuit. This move highlights the importance of online privacy and security, as companies must take responsibility for protecting user data.
PandaBuy data breach allegedly impacted over 1.3 million customers. The breach occurred due to an unnamed vulnerability in the company's systems, allowing attackers to gain unauthorized access to sensitive information.
OWASP discloses a data breach. This breach highlights the importance of security testing and vulnerability assessment, as organizations must regularly test their systems to identify potential weaknesses.
New Vultur malware version includes enhanced remote control and evasion capabilities. This malware strain is designed to compromise the security of organizations by exploiting vulnerabilities in their systems.
Pentagon established the Office of the Assistant Secretary of Defense for Cyber Policy. This office is responsible for developing policies and strategies related to cybersecurity, ensuring that the US military remains protected from cyber threats.
Info stealer attacks target macOS users. These attacks are designed to compromise the security of user devices by exploiting vulnerabilities in the operating system.
Security Affairs newsletter Round 465 by Pierluigi Paganini – INTERNATIONAL EDITION has been released, highlighting several notable incidents involving malware. The first incident reported involves DinodasRAT Linux variant targets users worldwide.
AT&T confirmed that a data breach impacted 73 million customers. The breach occurred due to an unnamed vulnerability in the company's systems, allowing attackers to gain unauthorized access to sensitive information.
Expert found a backdoor in XZ tools used by many Linux distributions. This discovery highlights the importance of regularly testing and patching software to prevent vulnerabilities from being exploited.
German BSI warns of 17,000 unpatched Microsoft Exchange servers. These servers are vulnerable to exploitation by attackers, highlighting the importance of keeping software up-to-date.
Cisco warns of password-spraying attacks targeting Secure Firewall devices. These attacks are designed to compromise the security of firewall systems by exploiting vulnerabilities in the authentication process.
American fast-fashion firm Hot Topic hit by credential stuffing attacks. These attacks are designed to compromise user credentials by exploiting vulnerabilities in online shopping platforms.
Cisco addressed high-severity flaws in IOS and IOS XE software. This move highlights the importance of regularly testing and patching software to prevent vulnerabilities from being exploited.
Google: China dominates government exploitation of zero-day vulnerabilities in 2023. This report highlights the importance of cybersecurity awareness, as governments must take steps to protect themselves from cyber threats.
Google addressed 2 Chrome zero-days demonstrated at Pwn2Own 2024. These zero-day exploits allow attackers to gain unauthorized access to user data.
CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog. This move highlights the importance of regularly testing and patching software to prevent vulnerabilities from being exploited.
The DDR Advantage: Real-Time Data Defense is a new initiative aimed at providing real-time threat detection and response services for organizations. This service can help protect against advanced threats by detecting potential security breaches in real-time.
Finnish police linked APT31 to the 2021 parliament attack. This incident highlights the importance of cybersecurity awareness, as government systems must be protected from cyber threats.
TheMoon bot infected 40,000 devices in January and February. This malware strain is designed to compromise the security of user devices by exploiting vulnerabilities in software updates.
UK, New Zealand against China-linked cyber operations. These countries have joined forces to combat China-linked cyber operations that are threatening their national security.
US Treasury Dep announced sanctions against members of China-linked APT31. These sanctions aim to disrupt the activities of China-linked APT31, which is responsible for several high-profile cyber attacks in recent years.
CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog. This move highlights the importance of regularly testing and patching software to prevent vulnerabilities from being exploited.
Iran-Linked APT TA450 embeds malicious links in PDF attachments. These malicious links are designed to compromise user devices by exploiting vulnerabilities in email clients.
StrelaStealer targeted over 100 organizations across the EU and US. This malware strain is designed to compromise the security of user devices by exploiting vulnerabilities in software updates.
GoFetch side-channel attack against Apple systems allows secret keys extraction. This vulnerability allows attackers to gain unauthorized access to sensitive information on Apple devices.
Security Affairs newsletter Round 464 by Pierluigi Paganini – INTERNATIONAL EDITION has been released, highlighting several notable incidents involving malware. The first incident reported involves Cybercriminals Accelerate Online Scams During Ramadan and Eid Fitr.
Russia-linked APT29 targeted German political parties with WINELOADER backdoor. This attack highlights the importance of cybersecurity awareness, as government systems must be protected from cyber threats.
Mozilla fixed Firefox zero-days exploited at Pwn2Own Vancouver 2024. These zero-day exploits allow attackers to gain unauthorized access to user data.
Large-scale Sign1 malware campaign already infected 39,000+ WordPress sites. This malware strain is designed to compromise the security of websites by exploiting vulnerabilities in content management systems.
German police seized the darknet marketplace Nemesis Market. This seizure highlights the importance of law enforcement efforts in combating cybercrime and protecting online users.
Unsaflok flaws allow to open millions of doors using Dormakaba Saflok electronic locks. These flaws highlight the importance of regularly testing and patching software to prevent vulnerabilities from being exploited.
Pwn2Own Vancouver 2024: participants earned $1,132,500 for 29 unique 0-days. This event highlights the importance of cybersecurity awareness, as companies must take steps to protect themselves from cyber threats.
Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. This vulnerability allows attackers to gain unauthorized access to sensitive information on FortiClient EMS devices.
Pwn2Own Vancouver 2024 Day 1 – team Synacktiv hacked a Tesla. This incident highlights the importance of cybersecurity awareness, as companies must take steps to protect themselves from cyber threats.
New Loop DoS attack may target 300,000 vulnerable hosts. This attack is designed to compromise the security of websites by exploiting vulnerabilities in web servers.
Critical flaw in Atlassian Bamboo Data Center and Server must be fixed immediately. This vulnerability allows attackers to gain unauthorized access to sensitive information on Bamboo Data Center and Server systems.
Threat actors actively exploit JetBrains TeamCity flaws to deliver malware. These vulnerabilities allow attackers to compromise the security of user devices by exploiting software updates.
BunnyLoader 3.0 surfaces in the threat landscape. This malware strain is designed to compromise the security of user devices by exploiting vulnerabilities in software updates.
Pokemon Company resets some users' passwords. This incident highlights the importance of cybersecurity awareness, as companies must take steps to protect themselves from cyber threats.
Ukraine cyber police arrested crooks selling 100 million compromised accounts. These compromised accounts were sold on the dark web, highlighting the importance of cybersecurity awareness and law enforcement efforts in combating online crime.
New AcidPour wiper targets Linux x86 devices. This malware strain is designed to compromise the security of user devices by exploiting vulnerabilities in software updates.
Russian national sentenced to 40 months for selling stolen data on the dark web. This incident highlights the importance of cybersecurity awareness, as individuals must take steps to protect themselves from cyber threats.
Banshee Stealer, a new macOS malware with a monthly subscription price of $3,000, is being used to compromise the security of user devices. This malware strain is designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
Millions of Pixel devices can be hacked due to a pre-installed vulnerable app. This vulnerability allows attackers to gain unauthorized access to sensitive information on Pixel devices.
Microsoft urges customers to fix zero-click Windows RCE in the TCP/IP stack. This vulnerability allows attackers to gain unauthorized access to sensitive information on Windows systems.
A group linked to RansomHub operation employs EDR-killing tool EDRKillShifter. These tools are designed to compromise the security of user devices by exploiting vulnerabilities in endpoint security software.
Google disrupted hacking campaigns carried out by Iran-linked APT42. This move highlights the importance of cybersecurity awareness, as companies must take steps to protect themselves from cyber threats.
Black Basta ransomware gang linked to a SystemBC malware campaign. These malware strains are designed to compromise the security of user devices by exploiting vulnerabilities in software updates and selling stolen data on the dark web.
A massive cyber attack hit Central Bank of Iran and other Iranian banks. This attack highlights the importance of cybersecurity awareness, as government systems must be protected from cyber threats.
China-linked APT Earth Baku targets Europe, the Middle East, and Africa. These attackers are designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
SolarWinds addressed a critical RCE in all Web Help Desk versions. This vulnerability allows attackers to gain unauthorized access to sensitive information on SolarWinds systems.
Kootenai Health data breach impacted 464,000 patients. The breach occurred due to an unnamed vulnerability in the organization's systems, allowing attackers to gain unauthorized access to sensitive patient information.
Microsoft Patch Tuesday security updates for August 2024 addressed six actively exploited bugs. These vulnerabilities highlight the importance of regularly testing and patching software to prevent cybersecurity threats from being exploited.
A PoC exploit code is available for critical Ivanti vTM bug. This vulnerability allows attackers to gain unauthorized access to sensitive information on Ivanti systems.
Elon Musk claims that a DDoS attack caused problems with the livestream interview with Donald Trump. This incident highlights the importance of cybersecurity awareness, as companies must take steps to protect themselves from cyber threats.
CERT-UA warns of a phishing campaign targeting government entities. These attackers are designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
US DoJ dismantled remote IT worker fraud schemes run by North Korea. This incident highlights the importance of cybersecurity awareness, as individuals must take steps to protect themselves from cyber threats.
A FreeBSD flaw could allow remote code execution, patch it now! This vulnerability allows attackers to gain unauthorized access to sensitive information on FreeBSD systems.
EastWind campaign targets Russian organizations with sophisticated backdoors. These attackers are designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE. These vulnerabilities highlight the importance of regularly testing and patching software to prevent cybersecurity threats from being exploited.
Foreign nation-state actors hacked Donald Trump’s campaign. This incident highlights the importance of cybersecurity awareness, as companies must take steps to protect themselves from cyber threats.
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 6 has been released, highlighting several notable incidents involving malware. The first incident reported involves ADT disclosed a data breach that impacted more than 30,000 customers.
Is the INC ransomware gang behind the attack on McLaren hospitals? This incident highlights the importance of cybersecurity awareness, as healthcare organizations must take steps to protect themselves from cyber threats.
Crooks took control of a cow milking robot causing the death of a cow. This incident highlights the importance of cybersecurity awareness, as individuals and organizations must take steps to protect themselves from cyber threats.
Sonos smart speakers flaw allowed to eavesdrop on users. This vulnerability allows attackers to gain unauthorized access to sensitive information on Sonos systems.
Five zero-days impacts EoL Cisco Small Business IP Phones. These vulnerabilities highlight the importance of regularly testing and patching software to prevent cybersecurity threats from being exploited.
CISA adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog. This move highlights the importance of regularly testing and patching software to prevent vulnerabilities from being exploited.
Russian cyber spies stole data and emails from UK government systems. These attackers are designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
0.0.0.0 Day flaw allows malicious websites to bypass security in major browsers. This vulnerability allows attackers to gain unauthorized access to sensitive information on user devices.
FBI and CISA update a joint advisory on the BlackSuit Ransomware group. This advisory highlights the importance of cybersecurity awareness, as individuals must take steps to protect themselves from cyber threats.
Rhysida Ransomware group claims to have breached Bayhealth Hospital in Delaware. This incident highlights the importance of cybersecurity awareness, as healthcare organizations must take steps to protect themselves from cyber threats.
Critical XSS bug in Roundcube Webmail allows attackers to steal emails and sensitive data. These vulnerabilities highlight the importance of regularly testing and patching software to prevent cybersecurity threats from being exploited.
New Android spyware LianSpy relies on Yandex Cloud to avoid detection. This malware strain is designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
Hackers breached MDM firm Mobile Guardian and wiped thousands of devices. These attackers are designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
A ransomware attack hit French museum network. This incident highlights the importance of cybersecurity awareness, as organizations must take steps to protect themselves from cyber threats.
CISA adds Microsoft COM for Windows bug to its Known Exploited Vulnerabilities catalog. This move highlights the importance of regularly testing and patching software to prevent vulnerabilities from being exploited.
Google warns of an actively exploited Android kernel flaw. This vulnerability allows attackers to gain unauthorized access to sensitive information on Android devices.
Should Organizations Pay Ransom Demands? This article raises questions about the ethics of paying ransom demands in the event of a cyber attack, highlighting the importance of cybersecurity awareness and incident response planning.
North Korea-linked hackers target construction and machinery sectors with watering hole and supply chain attacks. These attackers are designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
Researchers warn of a new critical Apache OFBiz flaw. This vulnerability allows attackers to gain unauthorized access to sensitive information on systems that use Apache OFBiz software.
Keytronic incurred approximately $17 million of expenses following ransomware attack. This incident highlights the importance of cybersecurity awareness, as individuals and organizations must take steps to protect themselves from cyber threats.
A flaw in Rockwell Automation ControlLogix 1756 could expose critical control systems to unauthorized access. These vulnerabilities highlight the importance of regularly testing and patching software to prevent cybersecurity threats from being exploited.
China-linked APT41 breached Taiwanese research institute . This attack highlights the importance of cybersecurity awareness, as organizations must take steps to protect themselves from cyber threats.
Chinese StormBamboo APT compromised ISP to deliver malware. These attackers are designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
Hackers attempt to sell the personal data of 3 billion people resulting from an April data breach. This incident highlights the importance of cybersecurity awareness, as individuals must take steps to protect themselves from cyber threats.
Security Affairs Malware Newsletter – Round 5 has been released, highlighting several notable incidents involving malware. The first incident reported involves Security Affairs newsletter Round 483 by Pierluigi Paganini – INTERNATIONAL EDITION.
US sued TikTok and ByteDance for violating children’s privacy laws. This lawsuit highlights the importance of cybersecurity awareness, as companies must take steps to protect themselves from cyber threats.
Russia-linked APT used a car for sale as a phishing lure to target diplomats with HeadLace malware. These attackers are designed to exploit vulnerabilities in software updates and sell stolen data on the dark web.
Investors sued CrowdStrike over false claims about its Falcon platform. This lawsuit highlights the importance of cybersecurity awareness, as companies must take steps to protect themselves from cyber threats.
Related Information:
Follow @EthHackingNews |