Cyber News - 05/02/2024
Your Cyber News of the day ! "Be Cyber Smart, Be Cyber Secure."
Your Cyber News of the day ! "Be Cyber Smart, Be Cyber Secure."
Description:
The iPhones belonging to nearly three dozen journalists, activists, human rights lawyers, and civil society members in Jordan have been targeted with NSO Group's Pegasus spyware, according to joint findings from Access Now and the Citizen Lab.
Date: Mon, 05 Feb 2024
Source: https://thehackernews.com/2024/02/pegasus-spyware-targeted-iphones-of.html
Description:
The threat actors behind the Mispadu banking Trojan have become the latest to exploit a now-patched Windows SmartScreen security bypass flaw to compromise users in Mexico. The attacks entail a new variant of the malware that was first observed in 2019, Palo Alto Networks Unit 42 said in a report published last week.
Date: Mon, 05 Feb 2024
Source: https://thehackernews.com/2024/02/new-mispadu-banking-trojan-exploiting.html
Description:
The decentralized social network Mastodon has disclosed a critical security flaw that enables malicious actors to impersonate and take over any account. "Due to insufficient origin validation in all Mastodon, attackers can impersonate and take over any remote account," the maintainers said in a terse advisory.
The vulnerability, tracked as CVE-2024-23832, has a severity rating of 9.4 out of a maximum of 10. Security researcher arcanicanis has been credited with discovering and reporting it.
It has been described as an "origin validation error" (CWE-346), which can typically allow an attacker to "access any functionality that is inadvertently accessible to the source."
Date: Sat, 03 Feb 2024
Source: https://thehackernews.com/2024/02/mastodon-vulnerability-allows-hackers.html
Description:
Remote desktop software maker AnyDesk disclosed on Friday that it suffered a cyber attack that led to a compromise of its production systems.
The German company said the incident, which it discovered following a security audit, is not a ransomware attack and that it has notified relevant authorities.
"We have revoked all security-related certificates and systems have been remediated or replaced where necessary," the company said in a statement. "We will be revoking the previous code signing certificate for our binaries shortly and have already started replacing it with a new one."
Date: Sat, 03 Feb 2024
Source: https://thehackernews.com/2024/02/anydesk-hacked-popular-remote-desktop.html
Description:
Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash relay attacks through various methods from April 2022 to November 2023, targeting high-value targets worldwide.
The attacks, attributed to an "aggressive" hacking crew called APT28, have set their eyes on organizations dealing with foreign affairs, energy, defense, and transportation, as well as those involved with labor, social welfare, finance, parenthood, and local city councils.
Date: Fri, 02 Feb 2024
Source: https://thehackernews.com/2024/02/russian-apt28-hackers-targeting-high.html
Description:
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned that more than 2,000 computers in the country have been infected by a strain of malware called DirtyMoe. The agency attributed the campaign to a threat actor it calls UAC-0027.
DirtyMoe, active since at least 2016, is capable of carrying out cryptojacking and distributed denial-of-service (DDoS) attacks. In March 2022, cybersecurity firm Avast revealed the malware's ability to propagate in a worm-like fashion by taking advantage of known security flaws.
Date: Fri, 02 Feb 2024
Source: https://thehackernews.com/2024/02/dirtymoe-malware-infects-2000-ukrainian.html
Description: With prompt injection, AI puts new spin on an old security problem
Date: Fri, 02 Feb 2024
Description:
Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a botnet-building operation.
Date: Fri, 02 Feb 2024
Description:
South Africa's railway agency lost some 30.6 million rand (US$1.6 million) after the transport network fell victim to a phishing scam.
Just over half of the stolen funds have been recovered.
Date: Fri, 02 Feb 2024
Source: https://www.darkreading.com/endpoint-security/south-african-railways-reports-1m-phishing
Description:
The Indian state-sponsored cyberattackers lurked in Google's official app store, distributing a new RAT and spying on Pakistanis.
Date: Fri, 02 Feb 2024
Source: https://www.darkreading.com/endpoint-security/google-play-spread-patchwork-apt-espionage-apps
Description:
The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying.
Date: Fri, 02 Feb 2024
Description:
Milesight Routers UR5X, UR32L, UR32, UR35, UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption
Date: Mon, 05 Feb 2024
Source: https://www.exploit-db.com/exploits/51784
Description: Wordpress 'simple urls' Plugin < 115 - XSS
Date: Mon, 05 Feb 2024
Source: https://www.exploit-db.com/exploits/51783
Description: TASKHUB-2.8.8 - XSS-Reflected
Date: Mon, 05 Feb 2024
Source: https://www.exploit-db.com/exploits/51782
Description: WhatsUp Gold 2022 (22.1.0 Build 39) - XSS
Date: Mon, 05 Feb 2024
Source: https://www.exploit-db.com/exploits/51781
Description: MISP 2.4.171 - Stored XSS
Date: Mon, 05 Feb 2024
Source: https://www.exploit-db.com/exploits/51780
Description: Clinic's Patient Management System 1.0 - Unauthenticated RCE
Date: Mon, 05 Feb 2024
Source: https://www.exploit-db.com/exploits/51779
Description: Curfew e-Pass Management System 1.0 - FromDate SQL Injection
Date: Mon, 05 Feb 2024
Source: https://www.exploit-db.com/exploits/51778
Description:
Microsoft is bringing the Linux 'sudo' feature to Windows Server 2025, offering a new way for admins to elevate privileges for console applications.
Superuser do, or sudo, is a Linux console program that allows low-privileged users to execute a command with elevated privileges, usually as root.
Date: Sun, 04 Feb 2024
Description:
Four vulnerabilities collectively called "Leaky Vessels" allow hackers to escape containers and access data on the underlying host operating system.
The flaws were discovered by Snyk security researcher Rory McNamara in November 2023, who reported them to impacted parties for fixing.
Date: Sun, 04 Feb 2024
Description:
Clorox has confirmed that a September 2023 cyberattack has so far cost the company $49 million in expenses related to the response to the incident.
Clorox is an American manufacturer of consumer and professional cleaning products with 8,700 employees and almost $7.5 billion in revenue for 2023.
Date: Sat, 03 Feb 2024
Description:
Google has started testing the phasing out of third-party cookies on Chrome, affecting about 1% of its users or approximately 30 million people. Learn how to check if you are part of the initial test.
Third-party cookies, which track users' browsing habits across different websites for targeted advertising, are slowly being replaced by Google's Privacy Sandbox APIs. This new method aims to allow personalized ads based on users' interests without compromising their privacy.
Date: Sat, 03 Feb 2024
Description:
Attacks on hospitals continued this week, with ransomware operations disrupting patient care as they force organization to respond to cyberattacks.
While many, like LockBit, claim to have policies in place to avoid encryping hospitals, we continue to see affiliates targeting healthcare with complete disregard to the disruption they are causing patients in trying to receive care.
Date: Fri, 02 Feb 2024
Description:
An international law enforcement operation code-named 'Synergia' has taken down over 1,300 command and control servers used in ransomware, phishing, and malware campaigns.
Command and control servers (C2) are devices operated by threat actors to control malware used in their attacks and to collect information sent from infected devices.
Date: Fri, 02 Feb 2024