FreshRSS

πŸ”’
☐ β˜† βœ‡ Threatpost | The first stop for security news

Tentacles of β€˜0ktapus’ Threat Group Victimize 130 Firms

By Nate Nelson β€” August 29th 2022 at 14:56
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
☐ β˜† βœ‡ Threatpost | The first stop for security news

iPhone Users Urged to Update to Patch 2 Zero-Days

By Elizabeth Montalbano β€” August 19th 2022 at 15:25
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
☐ β˜† βœ‡ Threatpost | The first stop for security news

APT Lazarus Targets Engineers with macOS Malware

By Elizabeth Montalbano β€” August 17th 2022 at 15:07
The North Korean APT is using a fake job posting for Coinbase in a cyberespionage campaign targeting users of both Apple and Intel-based systems.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Black Hat and DEF CON Roundup

By Threatpost β€” August 15th 2022 at 13:56
β€˜Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings.
☐ β˜† βœ‡ Threatpost | The first stop for security news

New Hacker Forum Takes Pro-Ukraine Stance

By Elizabeth Montalbano β€” August 11th 2022 at 15:14
A uniquely politically motivated site called DUMPS focuses solely on threat activity directed against Russia and Belarus
☐ β˜† βœ‡ Threatpost | The first stop for security news

Cisco Confirms Network Breach Via Hacked Employee Google Account

By Threatpost β€” August 11th 2022 at 12:51
Networking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Virtual Currency Platform β€˜Tornado Cash’ Accused of Aiding APTs

By Elizabeth Montalbano β€” August 9th 2022 at 17:58
U.S. Treasury blocked the business of the virtual currency mixer for laundering more than $7 billion for hackers, including $455 million to help fund North Korea’s missile program.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Phishers Swim Around 2FA in Coinbase Account Heists

By Elizabeth Montalbano β€” August 8th 2022 at 15:26
Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Open Redirect Flaw Snags Amex, Snapchat User Data

By Elizabeth Montalbano β€” August 5th 2022 at 13:17
Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among others, to trick victims.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

By Elizabeth Montalbano β€” July 28th 2022 at 17:24
Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwart a popular way to deliver malicious phishing payloads.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Messaging Apps Tapped as Platform for Cybercriminal Activity

By Elizabeth Montalbano β€” July 27th 2022 at 16:57
Built-in Telegram and Discord services are fertile ground for storing stolen data, hosting malware and using bots for nefarious purposes.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands

By Nate Nelson β€” July 26th 2022 at 13:05
Instances of phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Hackers for Hire: Adversaries Employ β€˜Cyber Mercenaries’

By Elizabeth Montalbano β€” July 21st 2022 at 12:59
Also known as the Atlantis Cyber-Army, the emerging organization has an enigmatic leader and a core set of admins that offer a range of services, including exclusive data leaks, DDoS and RDP.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

By Elizabeth Montalbano β€” July 20th 2022 at 12:14
300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuDrive, Harbortouch and InTouchPOS services.
☐ β˜† βœ‡ Threatpost | The first stop for security news

FBI Warns Fake Crypto Apps are Bilking Investors of Millions

By Elizabeth Montalbano β€” July 19th 2022 at 15:20
Threat actors offer victims what appear to be investment services from legitimate companies to lure them into downloading malicious apps aimed at defrauding them.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Journalists Emerge as Favored Attack Target for APTs

By Elizabeth Montalbano β€” July 14th 2022 at 15:08
Since 2021, various state-aligned threat groups have turned up their targeting of journalists to siphon data and credentials and also track them.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Large-Scale Phishing Campaign Bypasses MFA

By Elizabeth Montalbano β€” July 13th 2022 at 11:45
Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.
☐ β˜† βœ‡ Threatpost | The first stop for security news

β€˜Callback’ Phishing Campaign Impersonates Security Firms

By Elizabeth Montalbano β€” July 12th 2022 at 11:43
Victims instructed to make a phone call that will direct them to a link for downloading malware.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Popular NFT Marketplace Phished for $540M

By Nate Nelson β€” July 11th 2022 at 20:06
In March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Hack Allows Drone Takeover Via β€˜ExpressLRS’ Protocol

By Nate Nelson β€” July 7th 2022 at 11:31
A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver.
☐ β˜† βœ‡ Threatpost | The first stop for security news

β€˜Killnet’ Adversary Pummels Lithuania with DDoS Attacks Over Blockade

By Elizabeth Montalbano β€” June 28th 2022 at 12:17
Cyber collective Killnet claims it won’t let up until the Baltic country opens trade routes to and from the Russian exclave of Kaliningrad.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

By Elizabeth Montalbano β€” June 23rd 2022 at 12:21
The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack

By Sagar Tiwari β€” June 21st 2022 at 12:34
A reported a "potentially dangerous piece of functionality" allows an attacker to launch an attack on cloud infrastructure and ransom files stored in SharePoint and OneDrive.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Voicemail Scam Steals Microsoft Credentials

By Elizabeth Montalbano β€” June 21st 2022 at 11:20
Attackers are targeting a number of key vertical markets in the U.S. with the active campaign, which impersonates the organization and Microsoft to lift Office365 and Outlook log-in details.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Facebook Messenger Scam Duped Millions

By Nate Nelson β€” June 16th 2022 at 10:59
One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.
☐ β˜† βœ‡ Threatpost | The first stop for security news

DragonForce Gang Unleash Hacks Against Govt. of India

By Nate Nelson β€” June 15th 2022 at 13:59
In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Travel-related Cybercrime Takes Off as Industry Rebounds

By Sagar Tiwari β€” June 15th 2022 at 13:37
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Bluetooth Signals Can Be Used to Track Smartphones, Say Researchers

By Sagar Tiwari β€” June 13th 2022 at 12:36
Researchers demonstrated a possible way to track individuals via Bluetooth signals.
❌