Ask me anything
osintelligence avatar
1 year ago

OSINTelligence

@osintelligence
Cybersecurity, OSINT, and Threat Intelligence News, Articles, APT Behavior Analysis, Jobs, Training, and more!
249 Posts
Link
osintelligence
osintelligence

From Delivery To Execution: An Evasive Azorult Campaign Smuggled Through Google Sites

https://bit.ly/3TDVHwq - 🔒 Netskope Threat Labs has identified a sophisticated Azorult malware campaign leveraging advanced evasion techniques for data theft. This campaign uses HTML smuggling through Google Sites for payload delivery and employs various methods to evade detection, including reflective code loading and AMSI bypass, targeting sensitive information such as credentials and crypto wallet data. #CyberSecurity #DataTheft

🌐 The Azorult information stealer, first spotted in 2016, has been increasingly targeting the healthcare industry. This malware steals user credentials, browser info, and crypto wallet data, showcasing the growing threat to personal and sensitive data online. #HealthcareCybersecurity #Malware

🛡️ The campaign utilizes HTML smuggling with a unique twist by embedding the payload in a separate JSON file, enhancing its evasiveness. This technique allows the malware to bypass traditional security measures, demonstrating the sophistication of modern cyber threats. #CyberDefense #ThreatIntelligence

🔑 A notable aspect of this campaign is the use of a CAPTCHA as an additional evasion layer, making the malicious payload more difficult for security scanners to detect. This highlights the evolving tactics cybercriminals use to outmaneuver cybersecurity defenses. #CybersecurityAwareness #InfoSec

📁 The execution phase involves a fileless approach, where the Azorult malware operates directly in memory to minimize detection. Such stealthy tactics challenge existing security frameworks, underscoring the need for advanced threat detection and response strategies. #DigitalForensics #EndpointSecurity

💼 The campaign targets a wide array of sensitive data, including 137 crypto wallets, demonstrating the high stakes involved in protecting digital assets against sophisticated cyber threats. The use of legitimate-looking domains further complicates the challenge for users and defenders alike. #CryptoSecurity #DigitalAssetsProtection

🚨 Netskope Threat Labs’ analysis underscores the importance of vigilance and advanced security measures in the face of evolving cyber threats. The use of comprehensive defense strategies is crucial to safeguard sensitive information against sophisticated malware campaigns like Azorult.

photo
Link
osintelligence
osintelligence

TikTok Ban Raises Data Security, Control Questions

https://bit.ly/43izx6b - 📱 The U.S. House of Representatives has approved a bill proposing a TikTok ban due to concerns over data security and control by foreign adversaries, specifically targeting companies like TikTok’s parent, ByteDance. This legislation, moving to the Senate, could significantly impact digital platform operations within the country. #TikTokBan #DataSecurity #Legislation

🔍 The bill, if passed by the Senate, would enforce ByteDance to divest TikTok to a U.S.-based entity within 180 days or face restrictions from U.S. app stores and web hosting services, along with potential fines for non-compliance. This step marks a significant governmental move to regulate social media platforms on grounds of national security. #ByteDance #USPolicy #SocialMediaRegulation

🌍 Beyond the U.S., TikTok’s data privacy and storage practices have raised alarms in the UK and EU, leading to bans and fines for not protecting children’s data. These international concerns highlight the global challenge of managing digital privacy and security in the age of social media. #GlobalPrivacy #EU #UK

💼 TikTok has responded to the scrutiny by investing $1.5 billion in restructuring for a U.S. subsidiary, amidst discussions on the platform’s influence and the potential risks associated with its operation under foreign jurisdiction. Experts warn of the app’s capacity to shape public opinion and misuse data. #TikTokResponse #DigitalInfluence #Restructuring

🛑 Security professionals highlight TikTok as a heightened threat due to its extensive data collection and potential for misuse, urging for better controls and oversight. The ongoing debate emphasizes the need for stringent regulations to safeguard user privacy and data security, particularly against foreign-controlled apps. #Cybersecurity #DataCollection #Regulation

💡 The economic impact of TikTok on small businesses is significant, with reports indicating billions in revenue and contributions to the U.S. GDP and job market. This economic footprint underscores the complex balance between national security interests and the economic benefits derived from global digital platforms. #EconomicImpact #SmallBusiness #GDP

🔏 While the potential TikTok ban raises questions about digital sovereignty and the effectiveness of such measures, it also reflects broader concerns about foreign influence and the challenge of enforcing digital boundaries. The situation underscores the need for comprehensive policies to manage the digital ecosystem while preserving economic interests.

photo
Link
osintelligence
osintelligence

Russian state-backed hackers accessed Microsoft’s core software systems, company says | CNN Business

https://cnn.it/43dpDTp - 🔐 Russian state-backed hackers have penetrated key Microsoft systems, gaining access to the company’s core software systems and potentially its source code, as confirmed by Microsoft. This breach, first disclosed in January, represents a significant security concern, given the value of source code for both corporate innovation and espionage efforts. The hackers’ ability to access internal systems was detailed in a recent filing with the US Securities and Exchange Commission, highlighting the serious nature of the intrusion. #CyberSecurity #MicrosoftHack #RussianHackers

🌐 The breach is part of a larger pattern of espionage by the hacking group, which is supported by the Kremlin and has previously compromised US government email systems through the SolarWinds software. This group’s activities are known for their broad intelligence-gathering efforts, underscoring the strategic importance of such cyber intrusions. US officials have linked these operations to Russia’s foreign intelligence service, although Russia denies involvement. #Espionage #CyberEspionage #SolarWinds

💡 Microsoft’s investigation has so far found no evidence that customer-facing systems were compromised. The company is assessing the breach’s impact and potential for follow-on attacks. This incident is a stark reminder of the ongoing cybersecurity challenges facing global tech companies and the sophistication of state-backed cyber operations.

photo
Link
osintelligence
osintelligence

Top US cybersecurity agency hacked and forced to take some systems offline | CNN Politics

https://cnn.it/43dDpFf - 🔒 The US Cybersecurity and Infrastructure Security Agency (CISA), a key federal entity tasked with enhancing cybersecurity across the nation, was compromised last month, resulting in the temporary shutdown of two crucial computer systems. These systems were integral for the sharing of cyber and physical security tools among federal, state, and local officials, as well as for the security assessment of chemical facilities. The breach underscores the universal risk of cyber vulnerabilities and highlights the importance of robust incident response plans for ensuring resilience. #Cybersecurity #CISAHack #IncidentResponse

🛡️ In response to the attack, a CISA spokesperson emphasized that the incident had no operational impact and that efforts are ongoing to upgrade and modernize their systems. This situation serves as a poignant reminder that no organization is immune to cyber threats, and it is essential to continuously improve and fortify cybersecurity measures. The affected systems were part of older infrastructure already slated for replacement, illustrating the need for timely updates in technology to safeguard against such vulnerabilities. #CyberDefense #SystemUpgrade #CyberResilience

🌐 The breach was reportedly executed through vulnerabilities in virtual private networking software by Ivanti, a Utah-based IT company. CISA had previously warned federal agencies and private sector firms to update their software to mitigate risks posed by these vulnerabilities. This incident has exposed the continuous battle against cyber threats and the imperative of adhering to cybersecurity advisories for protection against potential breaches. #CyberAlert #SoftwareVulnerability #CyberSafety

🕵️‍♂️ While the exact perpetrators of the hack remain unidentified, it is speculated that a Chinese espionage group exploiting Ivanti’s software vulnerabilities could be involved. This reflects the sophisticated and diverse nature of cyber threats facing organizations today. Even the most secure entities are not exempt from the risk of cyber attacks, as evidenced by the hacking of the personal account of the US’ top cybersecurity diplomat last year. The incident reiterates the pervasive challenge of maintaining cybersecurity in an increasingly digital world.

photo
Link
osintelligence
osintelligence

Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day - Avast Threat Labs

https://bit.ly/48AQn1a - 🔒 Avast has uncovered an admin-to-kernel exploit used by the Lazarus Group, exploiting a previously unknown zero-day vulnerability in Windows’ appid.sys driver. Microsoft patched the vulnerability, CVE-2024-21338, showcasing the ongoing cyber warfare between attackers and defenders. The exploit facilitated kernel-level access, allowing for direct manipulation of the system, including disabling security software and evading detection. #CyberSecurity #ZeroDay #MicrosoftPatch

👾 The Lazarus Group utilized this access for an updated version of the FudModule rootkit, increasing its stealth and functionality. This version includes new techniques for evading detection and disrupting security mechanisms, highlighting the group’s sophisticated approach to cyber espionage and malware deployment. #MalwareAnalysis #Rootkit #CyberEspionage

💻 The exploit represents a significant step up from previous methods, allowing Lazarus to operate more quietly by avoiding the need to exploit known vulnerable drivers. This shift underscores the evolving landscape of cyber threats and the importance of advanced security measures. #CyberThreats #InfoSec #TechInnovation

🛡️ The discovery and analysis of the rootkit and its infection chain shed light on the complexities of modern cyber attacks and the importance of vigilance in the cybersecurity community. This ongoing battle emphasizes the need for continuous improvement in defense mechanisms against sophisticated threat actors.

photo
Link
osintelligence
osintelligence

Court orders maker of Pegasus spyware to hand over code to WhatsApp

https://bit.ly/3uWaPfa - 🔒 A U.S. court has mandated Israeli firm NSO Group to provide WhatsApp with the code for its Pegasus spyware, in a significant legal triumph for the messaging app. This order is part of ongoing litigation initiated by WhatsApp in 2019, alleging that NSO’s software targeted 1,400 of its users. The case shines a light on the shadowy world of cyber surveillance and the legal battles tech companies face to protect user privacy. #PrivacyProtection #CyberSecurity #WhatsAppVsNSO

🌐 Judge Phyllis Hamilton’s ruling demands NSO Group to disclose “all relevant spyware” within a specific timeframe surrounding the alleged attacks on WhatsApp users. While the decision marks a win for WhatsApp in its pursuit of transparency and accountability, NSO has been spared from revealing its client list or server architecture for now. This case underscores the complex interplay between national security, privacy rights, and the global trade in spyware tools. #LegalTech #UserSafety #DigitalRights

📱 Pegasus, known for its capability to infiltrate mobile phones undetected, highlights the sophisticated nature of modern spy tools and their implications for personal and national security. The Biden administration’s blacklisting of NSO in 2021 points to growing concerns over the misuse of such technologies. This legal action against NSO Group could set a precedent for how governments and corporations address the challenges posed by powerful surveillance software. #PegasusSpyware #TechEthics #NationalSecurity

🌍 The global impact of spyware like Pegasus, used by various governments to target dissidents and journalists, raises critical questions about the accountability of companies like NSO Group and their clients. While NSO claims its products serve law enforcement purposes, the widespread abuse calls for stricter oversight and regulations to prevent human rights violations. This case adds to the urgent dialogue on balancing technological advancements with ethical responsibilities.

photo
Link
osintelligence
osintelligence

A leaky database spilled 2FA codes for the world's tech giants | TechCrunch

https://tcrn.ch/3wwT8TE - 🔒 A technology company, YX International, known for routing millions of SMS messages globally, recently secured an exposed database that leaked one-time security codes. These codes could have potentially allowed unauthorized access to user accounts on platforms like Facebook, Google, and TikTok. The issue highlighted the vulnerabilities associated with SMS-based two-factor authentication (2FA), urging a shift towards more secure methods like app-based code generators. #CyberSecurity #DataLeak #2FA 🛡️

🌐 The exposed database, discovered by security researcher Anurag Sen, contained sensitive data including one-time passcodes and password reset links for major tech companies. This breach underscores the critical importance of robust database security measures to protect user data from unauthorized access. It serves as a reminder for companies to continually evaluate and enhance their data protection strategies. #DataProtection #TechNews #OnlineSafety

🔧 Following the discovery, the database was promptly taken offline, with YX International sealing the vulnerability. However, the incident raises questions about the duration of the exposure and whether the database was accessed by others. This situation emphasizes the need for comprehensive access logs and transparent communication with affected parties to mitigate potential risks. #InfoSec #TechCommunity #DigitalTrust

📲 While YX International and other involved tech giants have remained relatively quiet on the matter, the incident serves as a critical wake-up call for the industry. It highlights the ongoing challenges in securing online accounts and the importance of adopting more secure forms of authentication to protect against cyber threats.

photo
Link
osintelligence
osintelligence

The Government Really Is Spying On You — And It’s Legal

https://politi.co/48vcuG1 - 🔍 A startling revelation over dinner led journalist Byron Tau on a deep dive into the U.S. government’s legal but secretive acquisition of consumer data for surveillance purposes. This journey uncovers an intricate network of contractors selling vast amounts of personal information, raising concerns even among some officials. Despite the legal standing, the lack of substantial digital privacy reforms underscores a significant privacy dilemma. #DataPrivacy #Surveillance #DigitalEra

📘 In “Means of Control,” Tau elucidates the extent of government surveillance, employing purchased data from cellphones, social media, and more for purposes ranging from law enforcement to national security. This practice, though legal, skirts the traditional avenues of data collection, highlighting a concerning trend of privacy erosion in the digital age. #GovernmentSurveillance #PrivacyConcerns #TechEthics

📱 The misconception that data sold to the government is collected with full consent and remains anonymous is debunked. In reality, privacy policies seldom mention government acquisition, and the so-called anonymization fails to prevent re-identification, posing a real threat to personal privacy. #DataAnonymity #Consent #PrivacyPolicy

👥 Internal government discussions reflect a tension between leveraging available data for public safety and adhering to America’s privacy values. This balance challenges officials to justify the use of commercially available data for national security, revealing a complex interplay between privacy rights and government interests. #NationalSecurity #PublicSafety #PrivacyDebate

🌐 The concept of “gray data,” or the incidental data collected from our increasing array of connected devices, opens new frontiers for surveillance. From Bluetooth signals to car tire pressure monitors, this data provides a rich source for tracking, further blurring the lines of privacy in the digital age. #ConnectedDevices #SurveillanceTechnology #GrayData

🔒 The implications of widespread surveillance touch on fundamental civil liberties, with potential impacts on issues like abortion access in a post-Roe v. Wade landscape. The omnipresent digital footprint makes it nearly impossible to maintain privacy or anonymity, challenging the very fabric of a free society. #CivilLiberties #AbortionAccess #DigitalFootprint

These revelations call for a critical examination of the balance between technological advancement, government surveillance, and individual privacy rights, urging a reevaluation of the boundaries of legal data acquisition and use.

photo
Link
osintelligence
osintelligence

Hackers threaten to release Trump documents from Georgia case if they don't get a ransom by Thursday

https://bit.ly/3V3vsRj - 🔒 Hackers known as LockBit threaten to release court documents from Fulton County, Georgia, including those related to Donald Trump’s criminal case, unless they receive a ransom by Thursday. The group, which was recently disrupted by law enforcement, claims the documents could impact the upcoming U.S. election. #CyberSecurity #Ransomware #Election2024

🌐 After a brief shutdown following a law enforcement raid, LockBit resurfaced online, renewing their ransom demands and claiming possession of sensitive documents. This move comes despite a significant takedown operation by the FBI and international partners, showcasing the persistent challenge of combating cybercrime. #DigitalThreat #LawEnforcement #CyberCrime

💼 The focus of the hack is on Fulton County’s court system, which has been under scrutiny due to charges filed against Donald Trump and his allies concerning attempts to overturn the 2020 election results. The breach’s timing and LockBit’s overt political statements add layers of complexity to the incident. #LegalSystem #PoliticalInterference #Justice

🌎 LockBit operates a ransomware-as-a-service model, targeting a wide range of victims globally, including major corporations and government entities. This incident underscores the extensive reach and sophisticated operations of modern cybercriminal syndicates. #GlobalSecurity #RansomwareAttack #CyberThreats

🏛️ Fulton County and its officials have stated they will not comply with the ransom demand, focusing instead on restoring services safely. This stance is echoed by law enforcement agencies, which continue to investigate and combat the threat posed by groups like LockBit.

photo
Link
osintelligence
osintelligence

Data watchdog stops staff face recog by outsourcing giant

https://bit.ly/4a7KSIz - 🔒 The UK’s Information Commissioner’s Office (ICO) has mandated Serco to halt the use of biometric technology, including facial recognition and fingerprint scanning, at 38 leisure facilities it operates. This action comes after an investigation revealed that over 2,000 employees’ biometric data were processed unlawfully for attendance and payroll purposes, with no option for staff to opt-out, highlighting a significant power imbalance. #DataProtection #EmployeeRights #BiometricData

🚫 UK Information Commissioner John Edwards criticized Serco Leisure for not adequately assessing the risks associated with biometric technology, emphasizing the irreversibility of biometric data versus traditional passwords. The ICO’s directive includes the destruction of all unlawfully retained biometric data within three months, underlining the importance of privacy over business interests. #PrivacyRights #TechnologyEthics #WorkplaceSurveillance

🛑 Highlighting the issue’s gravity, the enforcement notice affects not only Serco Leisure but also Serco Jersey and seven other community leisure trusts. These entities, known for their extensive involvement in various public service contracts, including pandemic response and criminal tagging, are now under scrutiny for their handling of sensitive employee data. #PublicTrust #CorporateAccountability #BiometricSurveillance

📚 In response to these findings, the ICO has issued new guidance for organizations on the legal and ethical use of biometric data. This aims to ensure that entities like Serco consider the potential risks and biases associated with biometric technology, promoting a more responsible and lawful approach to data management.

photo
Link
osintelligence
osintelligence

“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions…

https://bit.ly/3SSDF86 - 🔍 Guardio Labs unveils “SubdoMailing” — a widespread subdomain hijacking campaign compromising over 8,000 domains, including MSN, VMware, and eBay. Millions of malicious emails circulate daily, exploiting trust and stolen resources. #SubdoMailing #CyberSecurity

📉 Guardio’s email protection systems detect unusual patterns, leading to the discovery of thousands of hijacked subdomains. The operation involves complex DNS manipulations, facilitating the dispatch of spam and phishing emails under reputable brands. #EmailSecurity #DNSManipulation

📧 Examining a deceptive email reveals clever tactics, including image-based content to bypass spam filters. SPF, DKIM, and DMARC authentication are manipulated, allowing scam emails to reach users’ inboxes. #EmailScam #CyberAttack

💻 Analysis uncovers the resurrection of abandoned domains, enabling subdomain hijacking for malicious activities. Actors manipulate SPF records, creating a web of authorized senders to evade detection. #DomainSecurity #SPFManipulation

🛡 Guardio identifies a coordinated campaign by threat actor “ResurrecAds,” exploiting compromised domains for mass email dissemination. The operation spans diverse tactics, including SPF authentication injection and SMTP server hosting. #ThreatActor #CyberCrime

🔎 Tracking indicators of compromise reveals the extensive infrastructure behind “SubdoMailing,” spanning hosts, SMTP servers, and IP addresses. The operation’s scale and sophistication underscore the need for collaborative defense efforts. #CyberDefense #ThreatAnalysis

🔒 Guardio launches a “SubdoMailing” checker tool to empower domain owners in reclaiming control over compromised assets. The tool provides insights into abuse detection and prevention strategies. #CyberAwareness #SecurityTool

📢 Join Guardio in raising awareness about the “SubdoMailing” threat and utilizing the checker tool to fortify domain security. Together, we can mitigate the impact of malicious email campaigns and safeguard digital landscapes.

photo
Link
osintelligence
osintelligence

GitHub leak exposes Chinese offensive cyber operations | Cybernews

https://bit.ly/3wllrV3 - 🔍 A recent leak on GitHub has unveiled documents allegedly showcasing China’s offensive cyber operations, developed by the Chinese infosec company I-Soon. These operations reportedly target social media, telecom companies, and other organizations globally, with suspicion pointing towards orchestration by the Chinese government. #CyberSecurity #GitHubLeak

🌐 The leaked documents, analyzed by Taiwanese threat intelligence researcher Azaka Sekai, offer a deep dive into China’s state-sponsored cyber activities, including spyware features for obtaining users’ Twitter details, real-time monitoring, and more, although no official confirmation of their authenticity has been made. #CyberEspionage #StateSponsored

📱 According to the leak, the spyware targets Android and iOS devices, capable of gathering extensive sensitive data such as GPS locations, contacts, and real-time audio. Devices resembling portable batteries can inject spyware via WiFi, illustrating the sophisticated nature of these cyber tools. #DigitalPrivacy #Spyware

🔧 The documents detail various gadgets and software used in these operations, targeting users of Chinese social media platforms like Weibo, Baidu, and WeChat, and even extracting sensitive information from telecom providers in Kazakhstan. #TechSurveillance #SocialMediaSecurity

🌍 Victims identified in the documents include prestigious institutions and organizations such as Sciences Po in Paris, Apollo Hospitals in India, and government entities in China’s neighboring countries, showcasing the broad scope of these cyber operations. #GlobalCyberThreats #DataBreach

💸 The leak also sheds light on the compensation of employees involved in developing the spyware, revealing an average salary of 7,600 RMB (about 1,000 USD) post-tax, highlighting the stark contrast between the employees’ earnings and the gravity of their work.

photo
Link
osintelligence
osintelligence

No, 3 million electric toothbrushes were not used in a DDoS attack

https://bit.ly/3HSjthx - 🔍 A report claiming 3 million electric toothbrushes were used in a DDoS attack has been questioned for its validity. Originally stated by an employee of cybersecurity firm Fortinet and covered by Swiss news site Aargauer Zeitung, the scenario described toothbrushes infected with malware causing significant disruption. However, Fortinet has yet to confirm this incident, leading experts to speculate it was a hypothetical example rather than a factual event. #CyberSecurity #DDoSAttack #TechNews

🌐 The concept of a “toothbrush botnet” highlights the evolving landscape of cyber threats, where any internet-connected device could be a target. Despite the intrigue, the practicality of exploiting electric toothbrushes for such attacks is doubtful, given their Bluetooth connectivity and lack of direct internet access. This underscores the importance of securing all devices against potential cyber threats, even as the narrative of the toothbrush botnet remains unverified. #IoTSecurity #CyberThreats #Technology

🛡️ The incident serves as a reminder of the widespread potential for devices to be hijacked for malicious purposes. With an estimated 17 billion IoT devices expected to be online by the end of 2024, the importance of cybersecurity measures cannot be overstated. Devices ranging from routers to web cameras are at risk, emphasizing the need for up-to-date security practices and strong passwords to prevent inclusion in DDoS botnets. The good news? Your toothbrush is likely safe.

photo
Link
osintelligence
osintelligence

FBI director will deliver stark warning on Chinese hackers in remarks to House panel | CNN Politics

https://cnn.it/480TvTH - 🔒 The FBI Director has issued a stark warning about Chinese hackers potentially targeting U.S. critical infrastructure. This alert highlights the advanced stage of preparations by these hackers to disrupt vital American services, such as water treatment facilities, electrical grids, and oil and natural gas pipelines. The concern extends across the highest levels of the U.S. government, with the National Security Agency and other key officials expressing grave worries about the threats posed to national security. This development underscores the urgent need for robust cybersecurity measures. #CyberSecurity #InfrastructureProtection #NationalSecurity

🌐 In a significant diplomatic engagement, U.S. President Joe Biden and Chinese President Xi Jinping discussed bilateral relations, with Xi assuring non-interference in the upcoming 2024 U.S. elections. This conversation, part of efforts to ease tensions between the two superpowers, represents a pivotal moment in U.S.-China relations. However, the effectiveness of these diplomatic assurances remains to be seen, as highlighted by FBI Director Wray’s cautious stance on China’s promises. #USChinaRelations #Diplomacy #ElectionSecurity

🖥️ The hearing on Chinese cyber threats shed light on the vulnerabilities within the U.S. critical infrastructure’s technological framework. Officials pointed out that basic security flaws have made it easier for Chinese cyber actors to infiltrate essential services. The discussion also touched on the importance of accountability in software development to prevent such vulnerabilities. This approach emphasizes the need for a shift towards prioritizing security in the development and maintenance of critical infrastructure technologies. #CyberThreats #InfrastructureSecurity #Technology

🚨 The Justice Department and the FBI are actively working to counteract the Chinese government’s hacking efforts, which pose a direct threat to U.S. national security. Recent actions include court-ordered interventions to remove malicious code from key infrastructure components targeted by Chinese hackers. These measures are part of a broader strategy to mitigate the risks of such cyber campaigns, especially in scenarios like a potential Chinese invasion of Taiwan. The ongoing challenge underscores the scale and persistence of the threat from Chinese cyber operations. #JusticeDepartment #FBIEfforts

🔎 The challenge of countering Chinese cyber espionage efforts is exacerbated by the sheer scale of China’s cyber capabilities, as indicated by FBI Director Wray’s comparison of the number of Chinese cyber operatives to FBI agents. This numerical disadvantage highlights the complexities of defending against such widespread cyber threats. Continuous vigilance and a concerted effort from U.S. cybersecurity and intelligence agencies are deemed essential to safeguard national interests and protect critical infrastructure from these pervasive cyber threats.

photo
Link
osintelligence
osintelligence

Beware of scammers sending live couriers to liquidate victims’ life savings

https://bit.ly/48Tin0X - 🚨 The FBI has issued a warning about a new scam tactic involving couriers who collect cash or precious metals from victims, primarily targeting the elderly. Scammers, posing as tech support, financial advisors, or government officials, deceive victims into liquidating their assets for protection against alleged hacking threats. #ScamAlert #FBISecurity

💸 From May to December last year, these scams resulted in losses exceeding $55 million, with the elderly being the most affected. The FBI’s Internet Crime Complaint Center (IC3) received 19,000 complaints in the first half of 2023 alone, with losses totaling around $542 million. Nearly half of these victims were over 60, suffering 66% of the total losses. #SeniorSafety #CyberFraud

🔒 The scammers use sophisticated methods to gain the trust of their victims, often setting up a passcode as a false security measure. Once the assets are handed over, the victims lose all contact with the scammers. This technique is an evolution of the ‘phantom hacker scam,’ combining impostor tech support with financial and government impersonation. #ConsumerProtection #OnlineScams

📞 Victims typically receive a call to resolve an imaginary problem, leading them to inadvertently grant remote access to their devices. The scammers then exploit this access to check for profitable accounts and instruct victims to transfer funds, often to overseas accounts. #TechSupportScam #CyberAwareness

🛑 To prevent falling victim to these scams, the IC3 advises never purchasing gold or precious metals at the request of supposed government or business representatives. People should protect their personal information, avoid unsolicited communications, and never allow strangers access to their computers. #ScamPrevention #StaySafeOnline

📢 The FBI encourages anyone who suspects such fraudulent activity to report it to the IC3 immediately, providing detailed transaction information to aid in investigations. #ReportFraud #FBIWarning

Remember, staying informed and cautious is key to protecting yourself and your loved ones from these sophisticated scams.

photo
Link
osintelligence
osintelligence

Exclusive: US disabled Chinese hacking network targeting critical infrastructure, sources say

https://reut.rs/3OmZGKL - 🌐 The U.S. government has recently taken action against a significant Chinese hacking operation named ‘Volt Typhoon,’ which compromised thousands of internet-connected devices. This operation, part of a larger campaign targeting critical Western infrastructure, was met with legal countermeasures from the Justice Department and FBI. #CyberSecurity #USChinaRelations

🔒 'Volt Typhoon’ has raised alarms among intelligence officials for its potential to disrupt key sectors, including naval ports, ISPs, and utilities. The scope of the hacking campaign expanded in late 2023, leading to U.S. government collaborations with the private technology sector to track and counteract the activities. #DigitalThreat #InfrastructureSecurity

🌎 The broader implications of these breaches could enable China to disrupt facilities in the Indo-Pacific region, impacting U.S. military operations. This comes amidst heightened tensions over Taiwan, with China increasing its military presence in response to perceived U.S.-Taiwan collusion. #GeoPolitics #TaiwanUSRelations

🚫 When Western nations flagged 'Volt Typhoon’ in May 2023, China dismissed the allegations as disinformation. The Chinese embassy in Washington has yet to respond to the latest developments. #InternationalRelations #CyberEspionage

📡 The 'Volt Typhoon’ hackers leveraged a botnet—a network of compromised devices like routers and security cameras—to mask further attacks. This technique obscures the attackers’ footprint, making it challenging for cyber defenders to trace the origin of these intrusions.

photo
Link
osintelligence
osintelligence

Is This a Phishing Email? 8 Warning Signs to Look Out For

https://bit.ly/3S6mQ94 - 🚨 Phishing emails are a major concern in today’s digital world. To identify them, watch out for alarming subject lines containing words like “Urgent” or “Action Required.” These are often used to create a sense of urgency, prompting impulsive reactions. However, be aware that legitimate businesses might also use similar language in genuine emergencies. #PhishingEmails #CyberSecurityAwareness

🔍 Another key indicator is the email’s domain name. Phishing attempts often use public domain addresses or subtly misspelled versions of legitimate domains. Unusual top-level domains or additional subdomains can also be red flags. Always verify suspicious domains by contacting the company directly or comparing them with previous correspondence. #EmailSafety #DigitalLiteracy

👥 Greetings in phishing emails can be either too generic or overly personalized. While legitimate companies often use your first name, phishing emails might use general terms like “Dear Customer” or include too much personal information to establish false trust. A balanced approach in greetings is a sign of genuine communication. #OnlineSecurity #PhishingTactics

✏️ Grammar and spelling mistakes are common in phishing emails, as they are often hastily written and by non-native speakers. In contrast, legitimate companies ensure their communication is error-free. #EmailScams #GrammarCheck

🔗 Be cautious of emails containing suspicious links or attachments. These could lead to malicious websites or download malware onto your device. Legitimate companies rarely ask for sensitive information via email. #LinkSafety #MalwarePrevention

🚫 Phishing emails may also create a false sense of urgency, pressuring you to act quickly without verification. They might threaten account closure or charges if immediate action is not taken. #UrgencyScam #ScamAwareness

🎁 Unrealistic offers, like unexpected sweepstakes winnings or inheritances from unknown relatives, are classic phishing tactics. These emails may ask for personal information or payment to access these fictitious rewards. #FraudAlert #TooGoodToBeTrue

💡 When encountering a potential phishing email, it’s crucial not to click on any links or provide information. Educating yourself about different types of phishing scams can help you stay vigilant and discern genuine emails from fraudulent ones.

photo
Link
osintelligence
osintelligence

Bill taking aim at ‘deepfakes’ introduced at Ohio statehouse

https://bit.ly/47IJ9HQ - 🏛️ In Ohio, a new bill targeting “deepfakes” has been introduced by state lawmakers. House Bill 367 seeks to combat the growing use of AI-generated media that impersonates individuals without their consent. This legislation defines “deepfakes” as any visual or audio media manipulated to falsely appear authentic, raising concerns over potential fraud and misuse. #DeepfakeLegislation #AIRegulation #OhioStateLaw

👥 The bill, supported by State Representative Adam Mathews, responds to the increasing number of online videos using AI to mimic anyone from celebrities to public officials. These deepfakes have been criticized for their potential to damage reputations and spread misinformation. The bill aims to offer legal recourse against the creation and distribution of such deceptive content. #DigitalEthics #Misinformation #OnlineSafety

📜 Under HB 367, the use of another person’s name, image, or likeness in deepfakes for fraud or unauthorized endorsements would be prohibited. Violators could face fines up to $15,000. This move aligns with existing laws against misusing personal information and seeks to maintain digital dignity and authenticity.

photo
Link
osintelligence
osintelligence

“Inhospitality” malspam campaign targets hotel industry

https://bit.ly/3Rq0Dme - 🌐 The hospitality industry faces a new cyber threat: the “Inhospitality” malspam campaign, using social engineering to deploy password-stealing malware. Attackers lure hotel staff with emails about service complaints or information requests, leading to malicious payload links. #CyberThreat #HotelIndustrySecurity

🔍 Sophos X-Ops identified this trend, similar to tactics used during the US tax season. Attackers engage with hotel staff through emotionally charged scenarios, from lost items to accessibility needs, only sending malware links after initial contact. #SophosResearch #SocialEngineering

💼 Emails vary from violent attack allegations to queries about disability accommodations. Once staff respond, attackers reply with links claiming to contain relevant “documentation,” which are actually malware in password-protected files. #CyberAttackTactics #HotelSafety

📧 Common traits in these emails include urgent requests and emotionally manipulative narratives. Examples range from lost cameras with sentimental value to issues in booking for disabled family members, all designed to elicit quick responses from hotel staff. #MalspamCampaign #EmailScams

🔐 The malware, often a variant of Redline or Vidar Stealer, is difficult to detect. It’s hidden in large, password-protected files and often carries valid or counterfeit signatures to bypass security scans. #MalwareAnalysis #CyberDefense

💻 Upon execution, the malware connects to a Telegram URL for command-and-control, stealing information like browser-saved passwords and desktop screenshots. It doesn’t establish persistence, running once to extract data before quitting. #CybersecurityThreat #DataProtection

🛡️ Sophos has identified over 50 unique malware samples and reported them to cloud providers. With low detection rates on Virustotal, Sophos has published indicators of compromise and ensures detection in their products.

photo
Link
osintelligence
osintelligence

Disgruntled Cloud Engineer Sentenced To Two Years In Prison For Intentionally Damaging His Former Employer’s Computer Network After He Was Fired

https://bit.ly/48eRweW - 🏛️ Miklos Daniel Brody, a former cloud engineer at a San Francisco-based bank, has been sentenced to two years in prison for damaging the bank’s computer network and making false statements to a government agency. This sentencing by Senior U.S. District Judge William H. Orrick follows Brody’s guilty plea to charges under the Computer Fraud and Abuse Act and for lying to a government agency. #CyberCrime #LegalSentencing #ComputerFraud

💻 After being fired from the bank on March 11, 2020, for violating company policy, Brody used his company-issued laptop, which he failed to return, to access the bank’s computer network without authorization. His activities caused substantial damage, including deleting code repositories, running malicious scripts, and emailing himself proprietary bank code valued at over $5,000. The total cost of the damage to the bank’s systems was determined to be at least $220,621.22. #NetworkIntrusion #CyberSecurityBreach #FinancialInstitutions

🚔 Following his termination, Brody engaged in deceptive actions. He falsely reported to the San Francisco Police Department that his company-issued laptop was stolen and repeated these false statements to U.S. Secret Service agents after his arrest in March 2021. He later admitted in his guilty plea that he knew his statement about the laptop being stolen was false. #Deception #LegalCase #CyberEthics

💸 In addition to his prison sentence, Judge Orrick ordered Brody to pay restitution totaling $529,266.37 and to serve three years of supervised release after his prison term. This case, prosecuted by Assistant U.S. Attorneys Lauren M. Harding and George O. Hageman, with assistance from Paralegal Specialist Mark DiCenzo, is the result of an investigation by the U.S. Secret Service.

photo
Link
osintelligence
osintelligence

Encrypted npm Packages Found Targeting Major Financial Institution

https://bit.ly/3tkCG80 - 🔒 Encrypted npm packages were found targeting a major financial institution, raising concerns about the intent behind these publications. Phylum’s analysis revealed sophisticated malware-like behavior, with the packages containing an encrypted blob targeted at a specific organization’s domain. The situation highlights the complexities in determining the true nature of such cybersecurity threats. #Cybersecurity #MalwareDetection #FinancialInstitutionTargeted

🔎 In early November 2023, Phylum began tracking suspicious npm package publications. These packages executed encrypted payloads using local machine information, suggesting a highly targeted attack. The decrypted payload revealed an embedded binary designed to exfiltrate user credentials to an internal Microsoft Teams webhook of the targeted financial institution. This indicated either an inside job, a red team simulation, or external threat actors with substantial network access. #TargetedCyberAttack #DataExfiltration #CyberThreatAnalysis

🕵️ The attack mechanism was sophisticated, starting with a postinstall hook in the package.json. The code was designed to collect system-related information and use it for AES encryption. The attacker’s focus on specific strings and environment variables suggested a detailed knowledge of the target’s internal systems. #CyberAttackTactics #EncryptionMethods #SystemVulnerability

👥 After decrypting the payload, Phylum contacted the targeted organization. They discovered that the packages were part of an advanced adversary simulation exercise by the company’s red team. While the intent was benign, this incident underscores the importance of vigilance against software supply chain attacks. #RedTeamSimulation #SupplyChainSecurity #CyberDefense

📊 The attack methodology revealed that developers are high-value targets and software libraries are rarely vetted for malicious modifications. This incident shows the effectiveness of software supply chain attacks, even against well-prepared organizations. It emphasizes the need for comprehensive security measures to protect against such sophisticated threats. #DeveloperSecurity #SoftwareSupplyChain #CyberSecurityAwareness

💡 Phylum’s analysis of this case highlights the challenges in open source security. Their automatic analysis of packages in open source registries underscores the importance of identifying risks in using these packages. The incident serves as a reminder that today’s red team exercise could be tomorrow’s genuine threat, urging organizations to be adequately prepared.

photo
Link
osintelligence
osintelligence

SANS Holiday Hack Challenge & KringleCon 2023 | SANS Institute

https://bit.ly/3Nrnj4v - 🎮 The 2023 SANS Holiday Hack Challenge, a free, fun, and educational cybersecurity event, is now open for participants of all skill levels. This year’s theme, “A Holiday Odyssey,” involves using AI tools like OpenAI’s ChatGPT, Google’s Bard, or Microsoft’s Bing AI to solve various challenges, enhancing cybersecurity learning experiences. #CybersecurityChallenge #SANSHolidayHack #AIinCybersecurity

🏝️ Set in a festive island archipelago, the challenge tasks players with helping Santa and his elves apply the AI tool ChatNPT for their gift-giving extravaganza. Participants are encouraged to use their own AI accounts to assist in solving puzzles and learning key cybersecurity concepts. #HolidayHack #AIAssistedLearning #CyberSecurityEducation

🤝 The challenge offers a communal experience on Discord, where players can share tips and insights. It’s an opportunity to engage with a global community while tackling exciting activities involving AI, cloud security, web application security, and more. #CommunityLearning #DiscordEngagement #CyberSecurityCommunity

🎁 Prizes include a refurbished Nintendo Game Boy, Holiday Hack T-shirts, a NetWars Continuous subscription, and a SANS Online Training course. Participants can submit reports via a Google form or email, with winners selected based on technicality, creativity, and overall quality. #CybersecurityPrizes #HolidayHackRewards #TechContests

🛍️ Exclusive Holiday Hack merchandise is available, allowing participants to bring the festive cybersecurity challenge to life. The merchandise range includes themed gear to add style to the cybersecurity learning experience. #HolidayHackMerch #CybersecurityStyle #TechGear

🎶 Enhance the challenge experience with music albums created by talented musicians, available on various platforms including Apple Music, Amazon Music, and YouTube Music. These festive tunes provide a joyful backdrop to the learning journey. #HolidayMusic #FestiveLearning #CyberSecurityFun

Remember, submissions for the challenge are open until January 5, 2024. SANS encourages participants to refrain from publicizing answers until after the deadline to maintain the challenge’s integrity. Happy Holidays from Counter Hack and Friends!

photo
Link
osintelligence
osintelligence

Hacktivists Interrupt UAE TV Streams With a Message About Gaza

https://bit.ly/48kHs4f - 📺 In the United Arab Emirates, hackers broadcasted a message about the war in Gaza on live TV streams, interrupting regular programming on European channels via the HK1 RBOX set-top box. The unexpected interruption showcased harrowing visuals and messages about the conflict, affecting viewers across the UAE. #UAEHacking #TVBroadcastInterruption #GazaMessage

🔍 Ken Munro, a partner at Pen Test Partners, commented on the incident, suggesting that a poorly secured streaming service provider could be easily compromised. He emphasized the feasibility of pushing compromised content through such services. #Cybersecurity #StreamingServiceVulnerability #DigitalSafety

👀 Residents in the UAE reported the abrupt disruption of programs, replaced by graphic content and messages from the hackers in all caps. The interruption included an AI anchor discussing the atrocities in Gaza, alongside disturbing visuals, causing concern among viewers, especially those with children. #TVHacking #ViewerExperience #DigitalIntrusion

🕵️‍♂️ The method of this hack differs from historical TV interruptions, which often targeted specific stations. In this case, multiple channels were affected, leading to speculation about the involvement of the HK1 RBOX IPTV service. This service potentially involves unlicensed streaming of shows, raising questions about its security vulnerabilities. #TelevisionHackingHistory #IPTVSecurity #ConsumerTechConcerns

🔐 Munro suggests that, while the HK1 RBOX could be a factor, it’s unlikely to be the sole source of the problem. He explains that OS and security updates for such devices are infrequent, potentially leaving them vulnerable. However, he reassures that pivoting from a compromised streaming service to a consumer’s home network would be challenging, citing improved security measures in recent consumer routers.

photo
Link
osintelligence
osintelligence

Disrupting the gateway services to cybercrime - Microsoft On the Issues

https://bit.ly/46ZaTYc - 🌐 Microsoft, in collaboration with Arkose Labs, targets the primary seller of fraudulent Microsoft accounts, Storm-1152, sending a clear message against cybercrime. These accounts are used for phishing, identity theft, and DDoS attacks. Microsoft’s efforts aim to protect customers and deter criminal activities by disrupting the cybercrime-as-a-service ecosystem. #Cybersecurity #MicrosoftSecurity #OnlineFraudPrevention

🔐 Storm-1152 is responsible for creating around 750 million fake Microsoft accounts, generating millions in illicit revenue. Their websites and social media pages offer tools to bypass identity verification, facilitating cybercriminal activities. Microsoft’s action not only protects their own customers but also those of other technology platforms. #CyberCrime #DigitalSecurity #IdentityTheft

🕵️ Microsoft’s Threat Intelligence has linked multiple ransomware and data theft groups to Storm-1152 accounts. These include Octo Tempest and other ransomware threat actors like Storm-0252 and Storm-0455, highlighting the widespread impact of Storm-1152’s activities. #Ransomware #DataProtection #CyberThreatIntelligence

⚖️ Microsoft’s recent legal action resulted in the seizure of U.S.-based infrastructure and the takedown of websites used by Storm-1152. This disrupts not only fraudulent Microsoft account operations but also services affecting other technology platforms. #LegalAction #CyberLaw #TechJustice

🛡️ Microsoft and Arkose Labs have implemented a next-generation CAPTCHA defense solution to ensure users opening Microsoft accounts are human. This initiative is part of Microsoft’s commitment to providing a safe digital experience. #CAPTCHA #UserVerification #DigitalSafety

🧑‍💻 The individuals behind Storm-1152, identified as Duong Dinh Tu, Linh Van Nguyễn, and Tai Van Nguyen from Vietnam, are now known. Microsoft’s comprehensive investigation included detection, telemetry, and undercover purchases. #CyberInvestigation #ThreatIdentification #CyberSecurityAwareness

🚔 Microsoft’s submission of a criminal referral to U.S. law enforcement reflects their ongoing commitment to combating cybercrime. This action is part of a broader strategy targeting the tools used by cybercriminals, emphasizing the importance of industry collaboration in fighting cybercrime.

photo
Link
osintelligence
osintelligence

Mallox Resurrected | Ransomware Attacks Exploiting MS-SQL Continue to Burden Enterprises

https://bit.ly/3Rmzron - 🔒 Mallox, a persistent ransomware threat first identified in 2021, continues to exploit enterprises, particularly through vulnerabilities in MS-SQL. Operating under a Ransomware-as-a-Service (RaaS) model, Mallox targets unpatched systems and uses brute force attacks to gain access. This activity underscores the ongoing risk posed by ransomware to business data security. #MalloxCyberThreat #RansomwareAlert

🌐 Mallox gains initial access through exploitation of MS-SQL and ODBC interfaces, targeting specific vulnerabilities. The group focuses on vulnerabilities like CVE-2019-1068 in Microsoft SQL Server and CVE-2020-0618 in Microsoft SQL Server Reporting Services, alongside brute force attacks. This strategy highlights the importance of regular system updates and strong security configurations. #CyberSecurity #VulnerabilityManagement

💻 Post-compromise, Mallox actors utilize PowerShell commands to download and execute ransomware payloads. They employ scripts to terminate processes that could hinder encryption routines, reflecting a sophisticated approach to system compromise. Understanding these tactics is crucial for defenders to effectively protect their networks. #MalwareAnalysis #NetworkDefense

🔐 Recent Mallox payloads, labeled “Mallox.Resurrection,” display consistent core functionalities, indicating a successful, unaltered formula. These payloads exempt certain file types and processes from encryption and modify system recovery settings, making it difficult for administrators to restore affected systems. #RansomwareTactics #DigitalProtection

📝 Mallox threats often conclude with encrypted files receiving the .mallox extension and a ransom note demanding payment for decryption. Failure to comply results in threats of public data exposure on Mallox’s data leak site. This tactic emphasizes the critical need for robust backup strategies and incident response planning. #DataSecurity #CyberRiskManagement

In conclusion, Mallox’s ongoing ransomware activities, exploiting MS-SQL vulnerabilities and employing sophisticated encryption techniques, serve as a reminder for enterprises to prioritize cybersecurity and stay vigilant against evolving threats.

photo
Link
osintelligence
osintelligence

Press and pressure: Ransomware gangs and the media

https://bit.ly/41iMRq9 - 🚨 Ransomware gangs are increasingly engaging with the media, shifting from historically avoiding attention to actively seeking it. Sophos X-Ops has noted this change, where threat actors are using media interaction for tactical and strategic advantages, including applying pressure on victims and shaping public narratives. #RansomwareTrends #MediaEngagement

📰 Ransomware groups have become more media-savvy, inviting journalists for interviews, providing FAQs, and even recruiting writers. They use media coverage to bolster their credibility, inflate notoriety, and exert additional pressure on their victims. This new approach includes giving in-depth interviews and disputing journalists’ coverage to control the narrative. #CyberCriminalPR #ThreatActorTactics

📈 Ransomware groups are professionalizing their approach to press and reputation management. This includes publishing press releases, producing slick graphics, and attempting to recruit English speakers and writers on criminal forums. Sophos X-Ops emphasizes the importance of understanding this trend to combat the evolving ransomware threat landscape. #RansomwarePR #CyberSecurityAwareness

🔒 Despite their media engagement, ransomware groups maintain an uneasy relationship with the press. While some groups actively seek media attention, others criticize and insult journalists for perceived inaccuracies. This dual approach reflects the complex dynamics between ransomware gangs and the media. #MediaRelations #CyberThreats

🤔 As ransomware groups evolve, they might further professionalize their media engagement strategies. This could potentially lead to the development of dedicated PR teams within ransomware operations, indicating a significant shift in how these threat actors operate and interact with the public. #CyberThreatEvolution #DigitalPR

In summary, ransomware gangs are increasingly manipulating media relations to their advantage, marking a significant shift in their operational tactics. This evolution calls for a nuanced understanding of their strategies and the need for robust cybersecurity defenses.

photo
Link
osintelligence
osintelligence

Major Cyber Attack Paralyzes Kyivstar - Ukraine's Largest Telecom Operator

https://bit.ly/3TnYn1i - 🚨 A powerful cyberattack has significantly disrupted Ukraine’s major internet operator, Kyivstar, affecting both fixed-line and mobile services. The attack, confirmed by NetBlocks, has led to a major connectivity collapse, impacting numerous subscribers across the country. This incident highlights the vulnerability of critical digital infrastructure to cyber threats. #UkraineCyberAttack #KyivstarDisruption

🌐 The impact of the cyberattack on Kyivstar has been widespread, reaching all regions of Ukraine. Consequences extend beyond telecommunications, with reported disruptions in the air raid alert network and the banking sector. Efforts to restore connectivity are ongoing, emphasizing the challenge of responding to such large-scale cyber incidents. #TelecomsOutage #DigitalInfrastructure

🛠️ Despite attempts at restoration, Kyivstar’s network experienced further outages. The company’s efforts to bring services back online have been met with challenges, leaving millions of subscribers without access. This situation underscores the complexity and severity of the cyberattack on Ukraine’s telecommunications infrastructure. #NetworkRestoration #CyberResilience

🔒 Kyivstar has assured that no customer data was compromised during the cyberattack. As the extended outage continues, the company is working diligently to restore service. This incident serves as a reminder of the importance of robust cybersecurity measures in protecting user data and maintaining service continuity. #DataSecurity #ServiceRecovery

In summary, the cyberattack on Ukraine’s Kyivstar represents a significant disruption to the country’s digital communication infrastructure, affecting various sectors and highlighting the critical need for enhanced cybersecurity defenses.

photo
Link
osintelligence
osintelligence

Silent but deadly: The rise of zero-click attacks

https://bit.ly/3REwoJG - 🔐 Zero-click attacks, requiring no user interaction, are increasingly becoming a significant cybersecurity threat. These attacks exploit vulnerabilities in messaging, SMS, and email applications, allowing threat actors to install malware such as spyware or stalkerware. This stealthy nature makes it challenging to track and stop malicious activities. #ZeroClickAttacks #CybersecurityThreats

📱 In 2019, WhatsApp was vulnerable to a zero-click attack through a missed call, demonstrating the ease with which these attacks can compromise devices. Companies are now prioritizing defense against such attacks. For instance, Samsung’s Message Guard and Apple’s BlastDoor are designed to sandbox and scrutinize incoming data, reducing the risks of zero-click attacks. #WhatsAppVulnerability #MobileSecurity

🛡️ Despite advancements in anti-zero-click solutions, users must remain vigilant. Vulnerabilities can still be exploited, especially in devices with outdated software. Regular updates, using phones from brands known for security updates, and sticking to official app stores are crucial practices for protection. #DeviceSafety #CyberHygiene

📊 Basic cybersecurity tips remain essential to prevent zero-click attacks. Keeping devices and apps updated, using mobile antivirus solutions, and practicing good cybersecurity hygiene are key strategies. Regular backups can also aid in data recovery if a reset is needed. #CybersecurityTips #MobileProtection

In summary, zero-click attacks present a growing challenge in mobile security, requiring both advanced technological solutions and diligent cybersecurity practices from users.

photo
Link
osintelligence
osintelligence

Threat actors misuse OAuth applications to automate financially driven attacks | Microsoft Security Blog

https://bit.ly/3RmzLDN - 🔒 Microsoft Threat Intelligence reports that threat actors are increasingly misusing OAuth applications in financially driven attacks. OAuth, a standard for authentication and authorization, is being exploited to gain access to data and maintain persistent access to applications, even after losing initial account access. This misuse of OAuth poses significant risks in terms of data privacy and security. #MicrosoftThreatIntelligence #Cybersecurity

🐍 Attackers use phishing or password spraying to compromise user accounts, especially those lacking strong authentication. They then create or modify OAuth applications with high privileges for various malicious activities, including deploying VMs for cryptocurrency mining, executing business email compromise (BEC), and launching spamming activities using the organization’s resources. #PhishingAttacks #PasswordSecurity

💰 One specific threat actor, known as Storm-1283, deployed VMs for cryptomining using compromised accounts. They incurred significant costs for the targeted organizations, ranging from $10,000 to $1.5 million. Microsoft’s proactive measures, including the blocking of malicious OAuth applications and notification to affected organizations, have been crucial in mitigating these attacks. #CryptoMining #DigitalSecurity

📧 Another observed attack involved BEC and phishing via compromised user accounts and creation of OAuth applications. Attackers used these applications to maintain persistence and launch phishing emails, sending over 927,000 messages. Microsoft responded by taking down all related malicious OAuth applications. #BEC #EmailPhishing

🌐 For spamming, attackers like Storm-1286 used compromised accounts to create new OAuth applications for large-scale spam attacks. These attacks highlight the importance of multifactor authentication (MFA) as a key defense strategy. Microsoft’s detection capabilities in their various Defender products played a crucial role in identifying and mitigating these threats. #SpamAttacks #MFADefense

⚠️ Microsoft recommends several mitigation steps to combat these threats. These include enabling MFA, implementing conditional access policies, ensuring continuous access evaluation, enabling Microsoft Defender automatic attack disruption, auditing apps and consented permissions, and securing Azure cloud resources. These steps are essential for organizations to protect against OAuth application misuse. #CybersecurityBestPractices #MicrosoftDefender

🕵️‍♂️ Hunting guidance for Microsoft 365 Defender users includes monitoring OAuth application interactions, identifying password spray attempts, and investigating suspicious application creation and email events. These proactive measures help organizations detect and respond to potential threats in their networks.

photo
Link
osintelligence
osintelligence

Process Injection Using Windows Thread Pools | Safebreach

https://bit.ly/3tgesM8 - 🎉 SafeBreach Labs Researchers have unveiled groundbreaking process injection techniques using Windows thread pools, outwitting leading endpoint detection and response (EDR) systems. These new methods, named “Pool Party” variants, bypass current EDR solutions by injecting malicious code into legitimate processes, posing a significant challenge for traditional cybersecurity measures. #CyberSecurity #ProcessInjection

🛡️ Understanding the limitation of existing process injection techniques, researchers explored Windows thread pools as a novel vector. They developed eight unique techniques that work across all processes without limitations, enhancing their flexibility and effectiveness. These methods prove undetectable against five leading EDR solutions, highlighting a critical gap in current cyber defense strategies. #InnovationInCyberSecurity #ThreadPools

🔍 The research delved deep into the architecture of Windows thread pools, identifying potential areas for process injections. It focused on worker factories, task queues, I/O completion queues, and timer queues. The techniques involved manipulating these components to execute malicious code, revealing a sophisticated approach to cyber attacks. #TechResearch #AdvancedCyberAttacks

💻 Notably, the Pool Party variants were tested against five major EDR solutions, including Palo Alto Cortex and Microsoft Defender. All variants successfully evaded detection, demonstrating a 100% success rate. This finding underscores the need for continuous evolution and improvement in cybersecurity tools and practices. #EDRBypass #CyberThreats

🌐 The implications of this research are significant for the cybersecurity community. While EDR systems have evolved, they currently lack the capability to generically detect new process injection techniques. This research emphasizes the need for a more generic detection approach and deeper inspection of trusted processes to combat sophisticated cyber threats. #CyberDefense #InnovationInSecurity

🔗 SafeBreach has responsibly disclosed their findings and shared the research with the security community. By openly discussing these techniques at Black Hat Europe and providing a detailed GitHub repository, they aim to raise awareness and aid in the development of proactive defense strategies against such advanced attacks.