Weekly Cyber Security News Letter – Data Breaches, Vulnerability, Cyber Attack & More
Cyber Security News ?
#1 World's Most Followed Cyber Security News Platform
Our Weekly Cybersecurity Newsletter is your personal radar that will help you to surf through the ever-changing digital threat landscape.
This analysis, however, is not just a news report but aims to provide context, possible impact evaluations, and practical mitigation strategies.
Whether it is securing enterprise infrastructure, building secure applications, or hardening personal digital life: this Weekly Cybersecurity Newsletter gives you an edge in staying one foot ahead.
Vulnerabilities
A group of Microsoft researchers revealed a number of vulnerabilities in OpenVPN, an openly available VPN software that is commonly used.?
These flaws can be used by hackers to remotely deliver malicious code via RCE and raise their privileges (LPE) via various platforms, consequently affecting millions of devices at once.
These vulnerabilities apply to all releases before OpenVPN 2.6.10 and 2.5.10 versions and were discovered in the communication process between openvpn.exe and openvpnserv.exe on Windows operating systems.
Acting on these glitches leads to system compromise, data breach, or unauthorized access to classified information.
The company has released patches for these bugs, and consequently, users are strongly encouraged to upgrade to the current version as soon as possible to avoid such risks.
There is a new security flaw that was just found in Microsoft Office which enables threat actors to forge documents leading to potential access of unauthorized users as well as data breaches.
This security flaw has an impact on different office applications that allow threat actors to produce fraudulent documents.
Recognizing the problem, Microsoft is trying hard to work on a patch for this vulnerability.
Consequently, until it is okay, researchers urged users to be careful with what they open and remain cautious of any suspicious files.
Moreover, it reveals how important security measures are towards safeguarding sensitive details against cybercriminals.
The latest report shows that there is a critical flaw in the open-source pfSense firewall which has been tracked as "CVE-2022-31814." This vulnerability enables threat actors to perform remote code execution (RCE) attacks.
This vulnerability largely affects installations with the pfBlockerNG package. When discovered during a security audit, researchers noted that the initial attempts to exploit it failed due to the Python and PHP mismatches on the target system.
However, by modifying the PHP code and converting the exploit to work under Python 2, successful command execution was obtained.
In summary, this event calls for updated systems and regular security reviews among those who use pfSense to manage the chances of such vulnerabilities happening again or causing harm to their systems due to lack of updates.
The report discusses critical security flaws in solar power systems that could be exploited by cybercriminals.
It stresses the fact that there are new security challenges emerging as digital technologies become part of energy grids, including solar.
Disruptions to energy supplies and financial losses are among the potential outcomes highlighted in the paper as a result of these vulnerabilities.
It also highlights the need for stronger cyber defenses and cooperation between parties, who have an interest in safeguarding solar-based infrastructures.
These results point to the need for better security protocols in renewable energy industries as they are increasingly becoming risk factors.
A critical cross-site scripting (XSS) vulnerability has been identified in Roundcube, an extensively employed webmail client.
This flaw makes it possible for attackers to perform any script of their choice on a user's session thereby possibly resulting in data theft as well as loss of accounts.
To reduce exposure to this risk, users are advised to upgrade to the newest version of Roundcube.
Different versions of the application software are susceptible and patches have been provided by its developers.
This update is important for system administrators to safeguard against any form of insecurity that may be associated with this vulnerability.
Significant vulnerabilities in Microsoft Copilot were disclosed by security researcher Michael Bargury during his presentation at the Black Hat USA conference, which may be exploited by hackers.
The speech showed how attackers can prompt injects to perform cyber-attacks through Copilot such as AI-driven social engineering as well as data theft.
One disturbing way is for hackers to generate backdoors through Copilot plugins that would hide extractions of information and enable them to create believable phishing emails.
Bargury also showcased a simulation tool called "LOLCopilot" that helps ethical hackers.
The results expose the default security settings in Microsoft Copilot as being insufficient and demonstrate why robust security protocols should be implemented alongside comprehensive employee training to minimize these threats.
There is a critical vulnerability in MongoDB, which is tracked as CVE-2024-7553, that allows threat actors to take full control of Windows based systems.
Several versions of MongoDB particularly including Server, C Driver, and PHP Driver are affected due to this flaw which is caused by improper validation of files from untrusted directories.
Since the CVSS score for this vulnerability is 7.3, it can create significant risks such as local privilege escalation and arbitrary code execution with minimal user interaction.
Consequently, users are highly recommended to install the latest fixes to prevent any possible security breaches and other forms of attacks from happening.
This implies that immediate action has to be taken by institutions that are using vulnerable versions of MongoDB so that their security integrity can be maintained.
A report presented recently at Black Hat USA 2024 has revealed some serious structural security flaws on the Apache HTTP Server which could be used by attackers to gain remote root access.
This research has identified three main kinds of Confusion Attacks, "filename confusion, DocumentRoot confusion, and handler confusion." These attacks are caused by different modules having mistakes in how they understand the same shared data structures.
The research found nine new vulnerabilities, including such issues as denial of service and access control bypasses.
These findings highlight the importance of updating server versions and reviewing configurations for organizations to effectively mitigate potential security risks.
Windows Server versions from 2000 up to the year 2025 preview are affected by a highly critical 0-click RCE vulnerability which is known as CVE-2024-38077 and called "MadLicense."
This flaw exists in the Windows Remote Desktop Licensing Service, allowing the hackers to run any code inadvertently, consequently being able to take over computers on a large scale.
Another proof-of-concept (PoC) exploit has been provided by researchers that shows how this security flaw can be exploited using modern security measures so companies must apply Microsoft's security updates immediately.
However, in this case of the PoC demonstration, it was found that there is still some significant risk in getting through the protection against this kind of vulnerability as many as above 170 thousand internet-connected RDP licensing services were opened.
It is recommended that security experts implement extra precautionary measures to address the risks associated with this vulnerability.
Cisco has disclosed a critical vulnerability in its software, that may enable an unauthorized person to gain unauthorized access to some crucial information.
The security flaw has been tracked as "CVE-2023-20163," and the bug affects a range of Cisco products and is caused by incorrect password handling.
This flaw can be exploited by an attacker who sends a special request and consequently may allow them to obtain passwords that are kept in plain text.
The company developers have developed system updates so that customers can install them and patch this security flaw as fast as possible to prevent any kind of hack.
Before anything else, every company that uses Cisco products must first check their exposure status on the product list provided before they prioritize the deployment of these available solutions to safeguard their systems against possible attacks.
Small Business IP Phones of Cisco are affected by numerous vulnerabilities that would enable a perpetrator to perform DDoS attacks or execute no less than an arbitrary code.
In the web-based management interface, the highest severity rating for these vulnerabilities is 9.8 out of 10 and they exist due to the non-verification of user-supplied data.
When successfully exploited, attackers can execute arbitrary codes with root privileges and get the device reloaded leading for it to being in a DoS state.
Cisco has provided software updates that remediate these identified vulnerabilities, consequently, users are advised to install patches as soon as possible.
Cyber Attacks
There are significant flaws in internet-connected industrial control systems (ICS), which make critical infrastructure of the US and UK vulnerable to cyber attacks.
Some interesting cases have been reported, including Iranian hackers who went after Aliquippa Municipal Water Authority and Russian hackers who attacked Texas water facilities, consequently exposing the fragility of these systems.
Thousands of ICS devices do not have enough security measures as proved by a study carried out by Censys focusing on automation protocols and human-machine interfaces (HMIs) that can be remotely accessed with their default passwords.
The research report points out that there is an urgent need for enhancing cybersecurity as there are many utilities are exposed to cyber actors either sponsored by states or other malicious ones since several devices remain unprotected or hard to monitor.
A report has been provided on the changing cybercriminal underworld. It has shown how the level of organization and sophistication of cybercriminals has increased.
It also highlights that this trend is towards structured groups which are more like real businesses, with marketing strategies as well as customer support.
The report further examines how ransomware is being used extensively to extort people in addition to the increasing use of dark web marketplaces for trading stolen data and hacking services.
Also, it seeks to illustrate how emerging technologies such as Artificial Intelligence affect practices in Cybercrime.
In conclusion, the study encouraged improved security protocols to fight against these highly developed threats.
A large language model (LLM) developed by the University of Montreal and Flare Systems researchers has achieved an impressive 98% accuracy for extracting critical cyber threat intelligence from dark web forums.
The study, led by Vanessa Clairoux-Trépanier and Isa-May Beauchamp, aimed to show that LLMs are able to summarize and code important threat variables well enough.
The results indicate that the replacement of the first-level threat analysts with LLMs could improve the efficiency of cybersecurity processes.
This report shows how AI can be used in real-time for proactive defense against cyber threats, though it may have some limitations.
For future work, the authors propose further refinement of the model as well as exploration of advanced AI applications in cybersecurity.
Microsoft SQL (MSSQL) servers that are public facing through port 1433 are being targeted by STAC6451, a hacker group that has been used to infiltrate organizations in India.
They gain entry into the systems by using weak passwords till they locate one that works and then run arbitrary commands via the xp_cmdshell stored procedure.
These attacks enable STAC6451 to stage malicious payloads like privilege escalation tools, Cobalt Strike Beacons, and Mimic ransomware binaries using Bulk Copy Program (BCP).
The Python Impacket library is used by attackers to create backdoor accounts for lateral movement and persistence.
领英推荐
Some of the recommendations that can help mitigate this risk include avoiding exposing MSSQL servers to the internet, disabling xp_cmdshell stored procedures, application control settings configured to prevent the installation of potentially unwanted programs, as well as regular updating and patching of systems.
There is a new worm recently detected by the researchers dubbed CMoon has been found to be targeting users through hacked websites, particularly in Russia.
Initially noticed in July 2024, this malware can steal sensitive information, download more malware, and do DDoS attacks.
To achieve this purpose, CMoon disguises its hazardous executable files as genuine papers that are then accessed from corrupted locations.
After it has been installed on a computer system, it has the capability to watch over USB drives, perform data theft, and execute commands from a distant server.
Moreover, the worm targets a variety of applications such as web browsers, crypto wallets, and messaging services which raises the need for better cyber security measures against these types of advanced threats.
Recently, a distributed denial-of-service (DDoS) attack record was surpassed by Akamai Technologies, it stopped about 419 terabytes of malicious traffic from reaching a financial services firm in Israel.
During the attack, which lasted for almost a day, there were peaks of 798 gigabits per second with multiple methods used against over 278 IP addresses including UDP flood and DNS reflection.
This incident draws attention to an alarming escalation of DDoS threats in the EMEA region that might be state-sponsored given its magnitude and sophistication.
Akamai stresses the need for strong, cloud-based DDoS protection especially for high-risk sectors since their in-house solutions are unlikely to withstand such massive attacks.
Exploitation of legal cloud services like OneDrive and Google Drive is on the rise, for this reason, threat actors involved in such activities prefer them due to their low visibility.
It has recently been reported that a South Asian media house featured an unconventional GoGra backdoor that further made use of Microsoft Graph API for command and control.
Similarly, Firefly Syndicate has been using Google Drive to leak out highly classified military information.
Other malicious tools such as Trojan.Grager and MoonTag have also been associated with attacks on organizations in Asia which show how nation-state actors are secretly employing cloud infrastructure.
Moreover, cyber security experts recommend monitoring network traffic and deploying application whitelisting to defend against these threats.
A critical vulnerability in Kibana, which was tracked as "CVE-2024-37287," allows attackers to carry out remote code execution, posing a significant security threat.
The proof of concept pollution is given a CVSSv3 severity score of 9.9 and affects Kibana across different environments such as self-managed installations or those available on Elastic Cloud.
Precisely, the versions impacted are 8.x < 8.14.2 and 7.x < 7.17.23 consequently users are advised to upgrade to the latest versions to mitigate the threat.
This vulnerability issue underscores the need for timely software updates and strong security measures in order to prevent system compromise.
Threats
CVE-2024-37287 is a critical security flaw in Kibana, which allows hackers to run any code they want, causing severe risk in terms of security.
With CVSSv3 severity score of 9.9, this pollution prototype vulnerability affects different kibana environments including self-managed installations and those on the elastic cloud.
It particularly affects versions 8.x prior to 8.14.2 and versions 7.x prior to 7.17.23. For this reason, users are urged to upgrade to the latest versions as it will help mitigate the risks involved.
This issue brings out the importance of timely software updates and strong security practices to prevent system exploitation narratives.
Symantec researchers have found a new type of ransomware that incurs double-extortion and is consequently targeted at Linux machines.
This new danger encrypts data, exfiltrates sensitive information, and demands ransom money for restoration and protection of the same.
The ransom note is in English as well as Spanish, while critical processes are halted and a warning message is superimposed on /etc/motd file by this malicious software.
In case they are not contacted through the 'Session' messaging app, these people will release millions of gigabytes of the firm's data including staff communication emails, passwords, or consumer databases.
According to Symantec, the best practices for safeguarding against this ransomware involve deploying comprehensive security solutions, backing up files regularly, training employees on phishing campaigns, and finally isolating networks.
An innovative approach to analyzing Android malware using smali gadget injection is discussed in the report.
Researchers can manipulate and study harmful applications more efficiently with this technique.
Injection of particular Smali code in Malware enables analysts to see how it interacts with the Android Operation System and detect vulnerabilities.
This method improves knowledge about malware behavior, and facilitates designing better strategies of detection and remediation.
In general, it represents a substantial leap in mobile platform cyber security.
An ASUS botnet attack was recently noticed, and it works by exploiting a back door in port 63256.
Through this flaw, the botnet attacks may be able to get into unauthorized routers and then use them to compromise user data or engage in other malicious acts.
The security researchers have identified it as "Moobot" with warnings that it is now actively scanning for ASUS routers that are vulnerable on the internet.
ASUS router users are advised to update their firmware and secure port 63256 properly to minimize the risk from this attack.
This occurrence emphasizes the need for consistent updating of router firmware and strong security measures against evolving threats in IoT environments.
A new variation of the AMOS Mac stealer is spreading across Google Ads. The variant is linked to a fake Loom website on Google Ads which might be from the Crazy Evil APT.
The malware pretends to be popular applications like Ledger Live but in reality, it steals user data like browser details and cryptocurrency wallets.
The high level of sophistication in this threat allows it to evade Apple's App Store security, which causes serious threats to users. To steal digital assets from gamers, threat actors are using fake job offers that appeal to them.
This distribution network has ties with a Russian ISP company called Gesnet[.]ru, elevating the concerns over its support of these malicious activities.
Internet users should use caution when downloading software and closely watch out for signs of suspicious behavior within online gaming communities as well as other websites to minimize the risks associated with this type of malware.
There is a new report that draws attention to a fake WinRAR ransomware variant being circulated on GitHub and putting users in great danger.
This malware is disguised as the real edition of the WinRAR so that it can be downloaded by people who think it's genuine. Once installed, it encrypts files and demands ransoms for their release.
Users are advised by security experts not to download apps without confirming where they come from first. This happening underscores the ongoing complexities of cyber security particularly in relation to supply chain attacks on software.
The report gives further confidence to the importance of using trusted platforms and keeping security software updated so as to lessen such risks.
Data Breach
ADT Inc. recently made an announcement that it had encountered a data breach where someone had been able to gain access into their customer order information databases.
In response, the company closed down the loophole and hired external security experts to conduct investigations.
The unauthorized party who risked hacking some of the customers' information managed to get a hold of some limited data such as email address, and phone numbers according to ADT, but no sensitive financial information was tampered with.
The affected customers were informed, however, this breach only touched on a small fraction of ADT's subscriber base.
ADT continues to prioritize transparency by cultivating stronger cybersecurity while examining potential legal effects and reputational damage connected with this breach.
In a major data breach, National Public Data, a background check service, lost the personal information of nearly 3 billion people.
This hack is marked as the biggest cyber heist ever conducted on a single company and has led to over 3 billion accounts being compromised.
Through this class action lawsuit, the world's most popular website for watching movies online was identified as one of the sites that had been used by hackers to carry out these cyberattacks on these individuals.
Besides names and addresses, social security numbers (SSNs), and family details, the names of children were stolen in an escalation of cyber espionage between the superpowers.
This latest attack has demonstrated how ill-prepared the United States is against cyber attacks especially originating from state-run actors like Russia and China.
One can expect more breaches similar to these in the future unless firms become more proactive in implementing better IT security measures.
Other News
The report discusses the exploitation of the Cisco Smart Install feature by attackers. On successful exploitation threat actors can access sensitive system configuration files through this legacy protocol.
There is another aspect of the same IT security issue that was flagged by CISA where weak password practices on Cisco devices make it easier for password guessing attacks.
CISA recommended that users should disable the smart install feature and implement stronger password mechanisms like NIST-approved type 8 password protection to improve network protection.
Cisco has announced its integration of Talos threat intelligence into various Splunk security products, which enhances the threat detection and response capabilities for users following the company's acquisition of Splunk.
Splunk Attack Analyzer is what this integration currently covers with plans to integrate it into both Splunk Enterprise Security and Splunk SOAR in future.
With more than 400 members, Cisco Talos analyzed the abundant information on security matters that many companies may not understand but can help them identify new risks and quickly take action.
Additionally, Cisco has introduced Talos Incident Response services for Splunk customers that include proactive assessments as well as emergency support 24/7 during incidents.
This is part of Cisco's strategic focus aimed at enhancing its security offerings and digital stability against evolving cyber threats.
Tor browser 13.5.2 is out, a release that incorporates essential security updates based mainly on the latest Firefox security patches.
Version 13.5.2 of Tor Browser is rebased on Firefox 115.14.0esr including important backported security fixes from Firefox 129 to protect against vulnerabilities.
Windows, macOS, and Linux are supported in this update thereby improving overall browser security and performance, meanwhile, the Android version benefits from an updated GeckoView engine.
It has improved GPG key management and deployment scripts to ensure smooth updates.
The Tor Project keeps asking for user feedback as well as ensuring that a secure browsing experience is a priority among others such as privacy concerns. The latest version can be downloaded from the Tor Browser download page by users.
President at Alpha & Omega Smart Technology, Inc
3 个月good!
Automotive Secure Systems Software Architect
3 个月Thank you for sharing the detailed report. Much useful and creates awareness about cyber security.
--CyberSecurity Analyst --
3 个月Thank you for sharing this.
Cybersecurity Analyst
3 个月Thanks for sharing
SOC Analyst | Intern @ CodeAlpha | Threat Detection & Response
3 个月Thank you for sharing this comprehensive overview of the current cyber threat landscape. It's evident that the threat actors are becoming increasingly sophisticated, targeting critical infrastructure, individuals, and businesses alike. Key Takeaways and Potential Discussion Points Based on the article, here are some key points that deserve further discussion: The growing sophistication of cyberattacks: The use of AI in threat intelligence gathering and the evolution of ransomware tactics highlight the need for advanced defense mechanisms. Critical infrastructure vulnerabilities: The targeting of ICS systems underscores the importance of securing these essential components of our society. The role of cloud services: While offering convenience, cloud platforms are becoming targets for data breaches and attacks. The human factor: Social engineering and phishing attacks remain prevalent, emphasizing the need for continuous user education.