FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayThe first stop for security news | Threatpost

Tentacles of β€˜0ktapus’ Threat Group Victimize 130 Firms

By Nate Nelson
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

iPhone Users Urged to Update to Patch 2 Zero-Days

By Elizabeth Montalbano
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.

APT Lazarus Targets Engineers with macOS Malware

By Elizabeth Montalbano
The North Korean APT is using a fake job posting for Coinbase in a cyberespionage campaign targeting users of both Apple and Intel-based systems.

Black Hat and DEF CON Roundup

By Threatpost
β€˜Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings.

New Hacker Forum Takes Pro-Ukraine Stance

By Elizabeth Montalbano
A uniquely politically motivated site called DUMPS focuses solely on threat activity directed against Russia and Belarus

Cisco Confirms Network Breach Via Hacked Employee Google Account

By Threatpost
Networking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account.

Virtual Currency Platform β€˜Tornado Cash’ Accused of Aiding APTs

By Elizabeth Montalbano
U.S. Treasury blocked the business of the virtual currency mixer for laundering more than $7 billion for hackers, including $455 million to help fund North Korea’s missile program.

Phishers Swim Around 2FA in Coinbase Account Heists

By Elizabeth Montalbano
Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds.

Open Redirect Flaw Snags Amex, Snapchat User Data

By Elizabeth Montalbano
Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among others, to trick victims.

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

By Elizabeth Montalbano
Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwart a popular way to deliver malicious phishing payloads.

Messaging Apps Tapped as Platform for Cybercriminal Activity

By Elizabeth Montalbano
Built-in Telegram and Discord services are fertile ground for storing stolen data, hosting malware and using bots for nefarious purposes.

Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands

By Nate Nelson
Instances of phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior.

Hackers for Hire: Adversaries Employ β€˜Cyber Mercenaries’

By Elizabeth Montalbano
Also known as the Atlantis Cyber-Army, the emerging organization has an enigmatic leader and a core set of admins that offer a range of services, including exclusive data leaks, DDoS and RDP.

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

By Elizabeth Montalbano
300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuDrive, Harbortouch and InTouchPOS services.

FBI Warns Fake Crypto Apps are Bilking Investors of Millions

By Elizabeth Montalbano
Threat actors offer victims what appear to be investment services from legitimate companies to lure them into downloading malicious apps aimed at defrauding them.

Journalists Emerge as Favored Attack Target for APTs

By Elizabeth Montalbano
Since 2021, various state-aligned threat groups have turned up their targeting of journalists to siphon data and credentials and also track them.

Large-Scale Phishing Campaign Bypasses MFA

By Elizabeth Montalbano
Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.

β€˜Callback’ Phishing Campaign Impersonates Security Firms

By Elizabeth Montalbano
Victims instructed to make a phone call that will direct them to a link for downloading malware.

Popular NFT Marketplace Phished for $540M

By Nate Nelson
In March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.

Hack Allows Drone Takeover Via β€˜ExpressLRS’ Protocol

By Nate Nelson
A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver.

β€˜Killnet’ Adversary Pummels Lithuania with DDoS Attacks Over Blockade

By Elizabeth Montalbano
Cyber collective Killnet claims it won’t let up until the Baltic country opens trade routes to and from the Russian exclave of Kaliningrad.

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

By Elizabeth Montalbano
The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers.

Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack

By Sagar Tiwari
A reported a "potentially dangerous piece of functionality" allows an attacker to launch an attack on cloud infrastructure and ransom files stored in SharePoint and OneDrive.

Voicemail Scam Steals Microsoft Credentials

By Elizabeth Montalbano
Attackers are targeting a number of key vertical markets in the U.S. with the active campaign, which impersonates the organization and Microsoft to lift Office365 and Outlook log-in details.

Facebook Messenger Scam Duped Millions

By Nate Nelson
One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.

DragonForce Gang Unleash Hacks Against Govt. of India

By Nate Nelson
In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.

Travel-related Cybercrime Takes Off as Industry Rebounds

By Sagar Tiwari
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.

Bluetooth Signals Can Be Used to Track Smartphones, Say Researchers

By Sagar Tiwari
Researchers demonstrated a possible way to track individuals via Bluetooth signals.

Follina Exploited by State-Sponsored Hackers

By Nate Nelson
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.

Evil Corp Pivots LockBit to Dodge U.S. Sanctions

By Elizabeth Montalbano
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.

Scammers Target NFT Discord Channel

By Sagar Tiwari
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.

Microsoft Releases Workaround for β€˜One-Click’ 0Day Under Active Attack

By Elizabeth Montalbano
Threat actors already are exploiting vulnerability, dubbed β€˜Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.

Cybergang Claims REvil is Back, Executes DDoS Attacks

By Elizabeth Montalbano
Actors claiming to be the defunct ransomware group are targeting one of Akami’s customers with a Layer 7 attack, demanding an extortion payment in Bitcoin.

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

By Elizabeth Montalbano
Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.

Sysrv-K Botnet Targets Windows, Linux

By Sagar Tiwari
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins.

Malware Builder Leverages Discord Webhooks

By Nate Nelson
Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks.

Novel Phishing Trick Uses Weird Links to Bypass Spam Filters

By Nate Nelson
A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains.

Hackers Actively Exploit F5 BIG-IP Bug

By Threatpost
The bug has a severe rating of 9.8, public exploits are released.

FBI: Rise in Business Email-based Attacks is a $43B Headache

By Sagar Tiwari
A huge spike in fraudulent activities related to attacks leveraging business email accounts is a billion-dollar-problem.

USB-based Wormable Malware Targets Windows Installer

By Elizabeth Montalbano
Activity dubbed β€˜Raspberry Robin’ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands.

VHD Ransomware Linked to North Korea’s Lazarus Group

By Elizabeth Montalbano
Source code and Bitcoin transactions point to the malware, which emerged in March 2020, being the work of APT38, researchers at Trellix said.

China-linked APT Caught Pilfering Treasure Trove of IP

By Nate Nelson
A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data.

Attackers Use Event Logs to Hide Fileless Malware

By Nate Nelson
A sophisticated campaign utilizes a novel anti-detection method.
❌