Weekly Cybersecurity Digest: Top 5 News Stories in the Digital Sphere

Weekly Cybersecurity Digest: Top 5 News Stories in the Digital Sphere

1. Apple Drops Spyware Case Against NSO Group

Apple has voluntarily dismissed its lawsuit against spyware vendor NSO Group to avoid exposing critical threat intelligence information. The case, filed in 2021, aimed to hold NSO accountable for targeting users with its Pegasus spyware . Apple cited several factors for the dismissal, including the risk of exposing sensitive security data, the evolving landscape of the spyware industry, and actions taken by governments and industry players that have weakened NSO Group.

Key Points:

  • Risk of exposing threat intelligence led to case dismissal.
  • Changing spyware industry dynamics influenced the decision.
  • Apple continues to believe in the merits of the original claims.

Read More

2. Cybercriminals Exploit HTTP Headers for Credential Theft

Cybersecurity researchers have uncovered large-scale phishing campaigns exploiting HTTP headers to deliver fake email login pages, harvesting user credentials. These attacks, active from May to July 2024, target corporations, government agencies, and schools, using automatic page refreshes without user interaction. The business and economy sectors were hit hardest, accounting for 36% of attacks. The phishing attempts involve links that redirect users to actor-controlled login pages, with pre-filled email addresses, making the scams seem legitimate.

Key Points:

  • Phishing campaigns exploit HTTP headers for credential theft.
  • Target sectors: Business, finance, government, health, and IT.
  • Use of legitimate domains and URL-shortening services.

Read More

3. Progress WhatsUp Gold Exploited After PoC Release for Critical Flaw

Cyber attackers began exploiting a critical vulnerability in Progress WhatsUp Gold just five hours after a proof-of-concept (PoC) was released for CVE-2024-6670 (CVSS score: 9.8). This vulnerability allows attackers to retrieve users' encrypted passwords. Despite patches being available since mid-August 2024, some organizations failed to apply them quickly. Threat actors leveraged the Active Monitor PowerShell Script to install remote access tools, raising concerns about potential ransomware activity.

Key Points:

  • CVE-2024-6670 and CVE-2024-6671 vulnerabilities.
  • Exploitation within five hours of PoC release.
  • Remote access tools installed via PowerShell script.

Read More

4. New Linux Malware Campaign Exploits Oracle Weblogic for Crypto Mining

Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct cryptocurrency mining using Oracle Weblogic servers . The malware, dubbed Hadooken, installs the Tsunami botnet and a cryptocurrency miner after exploiting known vulnerabilities and weak credentials. The attack spreads laterally by stealing SSH credentials and persists by creating cron jobs. Hadooken also uses Base64 encoding and disguises itself under innocuous process names like "bash" and "java" to evade detection.

Key Points:

  • Hadooken malware exploits Oracle Weblogic servers.
  • Installs Tsunami botnet and a crypto miner.
  • Uses SSH data to spread across networks.

Read More

5. New Android Malware 'Ajina.Banker' Steals Financial Data via Telegram

A new Android malware strain called Ajina.Banker is targeting banking customers in Central Asia to steal financial data and bypass two-factor authentication (2FA) via Telegram. Active since November 2023, the malware spreads through fake apps promoted in Telegram channels. Once installed, it steals SIM card info, banking details, and SMS messages, while also serving phishing pages to gather credentials. The campaign is automated, using localized strategies to increase infection rates, and is currently under active development with affiliate support.

Key Points:

  • Targets include Central Asian countries.
  • Propagated through Telegram channels.
  • Collects banking and SIM data, intercepts SMS for 2FA.

Read More


Stay ahead of the curve!?? Follow us on LinkedIn and Subscribe to our newsletter ?? for the latest cyber security updates, insightful articles, and exclusive content to help you navigate the ever-changing threat landscape. Don't forget to check out our Website ?? to make your cyberspace safe and secure ??, and join our growing community on Instagram ?? for bite-sized cyber security tips and trends. ?? ??

要查看或添加评论,请登录

社区洞察

其他会员也浏览了