CYBERSECURITY / DEFENSE / INTELLIGENCE

  • AFSOC will expand on groundbreaking experiments this summer, Lt. Gen. Bauernfeind says in interview.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms. “Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files,”

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The latest Nexusguard DDoS Trend Report for 2024 has unveiled a significant escalation in the size of Distributed Denial of Service (DDoS) attacks throughout 2023, with an average increase of 233.33% compared to the previous year.

    Despite a 54.74% drop in the total number of attacks, the dramatic rise in attack size indicates a strategic shift towards more potent and disruptive cyber assaults.

    In 2023, the digital landscape witnessed a transformative wave of DDoS attacks, challenging the conventional understanding of cyber threats.

    Industries ranging from gaming to financial services were targeted in these attacks, underscoring the pervasive risk of DDoS across sectors.

    Notably, the most significant attack recorded peaked at an unprecedented 700 Gbps, marking a 93.42% increase from the year before.

    Hacktivism emerged as a key motivator behind these attacks, with political agendas driving the targeting of government and vital services.

    This politicization of cyber tactics highlights the growing intersection between cybersecurity and national security concerns.

    Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

    The Prevalence of UDP-based Attacks

    Despite the overall decrease in attack frequency, UDP-based attacks remained the most predominant type in 2023, although they saw a 58.29% year-on-year decrease.

    Attack Vector Distribution
    Attack Vector Distribution

    The persistence of UDP-based attacks can be attributed to their simplicity and effectiveness in overwhelming target networks with a flood of packets, making them a favored choice among attackers.

    The Nexusguard report’s findings suggest a strategic shift among cybercriminals towards executing fewer but more devastating attacks.

    This is evidenced by the significant rise in the average size of DDoS attacks, which suggests attackers opt for quality over quantity.

    The focus on larger-scale assaults is likely aimed at maximizing disruption and achieving a more significant impact with each attack.

    The Role of Multi-Vector Attack Combinations

    The analysis also highlighted the role of multi-vector attack combinations, which leverage multiple attack vectors simultaneously, making them harder to defend against.

    The top three multi-vector attack vectors identified were HTTP Flood and HTTPS Flood, DNS Amplification and UDP Fragmentation, and TCP ACK and UDP Attack.

    Multi-Vector Attack Combinations
    Multi-Vector Attack Combinations

    These combinations underscore the evolving sophistication of DDoS attacks and the need for equally advanced defense mechanisms.

    The analysis reveals that Pakistan, Brazil, Libya, and the United States are the top countries targeted by Reflected DDoS attacks in 2023.

    Specifically, Pakistan leads with a significant margin, followed by Brazil, Libya, and the United States.

    Mitigation and Preparedness Strategies

    The report emphasizes the importance of enhanced preparedness against sophisticated DDoS attacks.

    Organizations are urged to invest in real-time threat intelligence, robust infrastructure resilience, and collaborative defense mechanisms.

    Public awareness and education, alongside comprehensive policy and regulatory frameworks, are critical components in combating the evolving threat landscape.

    The Nexusguard DDoS Trend Report for 2024 paints a concerning picture of the current state of cyber threats, with a notable increase in the size of DDoS attacks despite a decrease in their overall frequency.

    The persistence of UDP-based attacks and the emergence of complex multi-vector attack combinations call for a dynamic and adaptive approach to cybersecurity defenses.

    As the digital landscape continues to evolve, so must the strategies employed to protect against these disruptive and potentially devastating attacks.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    The post DDoS Attack Size Increased by 233.33%, UDP-Based are Popular appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, “The Future of Threat Hunting is Powered by Generative AI,” where you’ll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Researchers have identified a new form of cyberattack termed “LLMjacking,” which exploits stolen cloud credentials to hijack cloud-hosted large language models (LLMs).

    This sophisticated attack leads to substantial financial losses and poses significant risks to data security.

    LLMjacking involves attackers gaining unauthorized access to cloud environments through compromised credentials, initially sourced from vulnerabilities in widely used frameworks like Laravel (CVE-2021-3129).

    Once inside, the attackers target LLM services such as Anthropic’s Claude models, manipulating these resources to incur excessive costs and potentially extract sensitive training data.

    If undetected, an LLMjacking attack can lead to daily costs upwards of $46,000, as attackers maximize the usage of LLM services to their financial benefit.

    This burdens the legitimate account holders with hefty bills and can disrupt normal business operations by maxing out LLM quotas.

    LLM training data
    LLM training data

    Beyond financial damage, there is a looming threat of intellectual property theft.

    Attackers could potentially access and exfiltrate proprietary data used in training LLMs, posing a severe risk to business confidentiality and competitive advantage.

    Broadening the Attack Surface

    Hosted LLM Models

    All major cloud providers offer LLM services, including Azure Machine Learning, GCP’s Vertex AI, and AWS Bedrock.

    These platforms let developers quickly access popular LLM-based AI models.

    The screenshot below shows that the user interface is simple, allowing developers to build apps rapidly.

    These models are disabled by default. To run them, the cloud vendor must be contacted.

    Some models automatically approve, but third-party models require a brief form.

    After a request, the cloud vendor usually grants access immediately.

    The request requirement is generally a speed barrier for attackers, not a security measure.

    LLM Reverse Proxy

    A reverse proxy like this could help attackers make money if they collected proper passwords and wanted to sell access to the LLM models.

    The Sysdig investigation revealed that the attack tools were configured to probe credentials across multiple AI platforms, indicating a systematic attempt to exploit any accessible LLM service.

    This broad approach suggests that the attackers are not just seeking financial gain but also possibly aiming to harvest a wide range of data from various sources.

    InvokeModel

    Below is a malicious CloudTrail event from the InvokeModel call. A valid request was received with β€œmax_tokens_to_sample” set to -1.

    Although this faulty error creates the β€œValidationException” error, it alerts the attacker that the credentials have access to the LLMs and are enabled.

    They would have gotten β€œAccessDenied” otherwise.

    {
    
        "eventVersion": "1.09",
    
        "userIdentity": {
    
            "type": "IAMUser",
    
            "principalId": "[REDACTED]",
    
            "arn": "[REDACTED]",
    
            "accountId": "[REDACTED]",
    
            "accessKeyId": "[REDACTED]",
    
            "userName": "[REDACTED]"
    
        },
    
        "eventTime": "[REDACTED]",
    
        "eventSource": "bedrock.amazonaws.com",
    
        "eventName": "InvokeModel",
    
        "awsRegion": "us-east-1",
    
        "sourceIPAddress": "83.7.139.184",
    
        "userAgent": "Boto3/1.29.7 md/Botocore#1.32.7 ua/2.0 os/windows#10 md/arch#amd64 lang/python#3.12.1 md/pyimpl#CPython cfg/retry-mode#legacy Botocore/1.32.7",
    
        "errorCode": "ValidationException",
    
        "errorMessage": "max_tokens_to_sample: range: 1..1,000,000",
    
        "requestParameters": {
    
            "modelId": "anthropic.claude-v2"
    
        },
    
        "responseElements": null,
    
        "requestID": "d4dced7e-25c8-4e8e-a893-38c61e888d91",
    
        "eventID": "419e15ca-2097-4190-a233-678415ed9a4f",
    
        "readOnly": true,
    
        "eventType": "AwsApiCall",
    
        "managementEvent": true,
    
        "recipientAccountId": "[REDACTED]",
    
        "eventCategory": "Management",
    
        "tlsDetails": {
    
            "tlsVersion": "TLSv1.3",
    
            "cipherSuite": "TLS_AES_128_GCM_SHA256",
    
            "clientProvidedHostHeader": "bedrock-runtime.us-east-1.amazonaws.com"
    
        }
    
    }

    GetModelInvocationLoggingConfiguration

    Interestingly, the attackers were interested in the service configuration.

    Calling β€œGetModelInvocationLoggingConfiguration” delivers S3 and Cloudwatch logging configuration if enabled.

    Our solution utilizes S3 and Cloudwatch to collect as much attack data as feasible.

    {
    
        "logging config": {
    
            "cloudWatchConfig": {
    
                "logGroupName": "[REDACTED]",
    
                "roleArn": "[REDACTED]",
    
                "largeDataDeliveryS3Config": {
    
                    "bucketName": "[REDACTED]",
    
                    "keyPrefix": "[REDACTED]"
    
                }
    
            },
    
            "s3Config": {
    
                "bucketName": "[REDACTED]",
    
                "keyPrefix": ""
    
            },
    
            "textDataDeliveryEnabled": true,
    
            "imageDataDeliveryEnabled": true,
    
            "embeddingDataDeliveryEnabled": true
    
        }
    
    }

    The victim pays more in LLMjacking attacks.

    It should be no surprise that LLMs are expensive and can pile up rapidly.

    A worst-case situation where an attacker utilizes Anthropic Claude 2.x and reaches the quota restriction in many locations might cost the victim over $46,000 per day.

    Prevention and Mitigation Strategies

    Given the sophistication and potential impact of LLMjacking, organizations are advised to adopt a multi-layered security strategy:

    • Vulnerability Management: Regular updates and patches are crucial to defend against the exploitation of known vulnerabilities.
    • Credential Management: Organizations must ensure that credentials are securely managed and not exposed to potential theft.
    • Cloud Security Tools:Β Utilizing Cloud Security Posture Management (CSPM) and Cloud Infrastructure Entitlement Management (CIEM) can help minimize permissions and reduce the attack surface.
    • Monitoring and Logging:Β Vigilantly monitoring cloud logs and enabling detailed logging of LLM usage can help detect suspicious activities early.

    The emergence of LLMjacking highlights a growing trend of cyberattacks targeting advanced technological frameworks.

    As organizations increasingly rely on AI and cloud services, the imperative to fortify cybersecurity measures has never been more urgent.

    By understanding the tactics employed by attackers and implementing robust security protocols, businesses can safeguard their digital assets against these evolving threats.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    The post New LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM Servers appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as a case of use-after-free in the Visuals component. It was reported by an anonymous researcher on May 7, 2024. Use-after-free bugs, which arise when a program

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpoint

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials from compromised devices. “This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices,” the SonicWall Capture Labs threat research team said in a recent report. The

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • In a recent cybersecurity breakthrough, researchers have unveiled significant updates to the HijackLoader malware, a sophisticated modular loader notorious for delivering a variety of malicious payloads.

    The malware has been updated to deploy threats such as Amadey, Lumma Stealer, Racoon Stealer v2, and Remcos RAT, showcasing an alarming versatility in its operations.

    HijackLoader has evolved to incorporate a novel technique involving using a PNG image to decrypt and initiate the loading of subsequent stages.

    PNG payload

    This method is part of a broader strategy that includes dynamic API resolution, meticulous blocklist process checking, and evasion of user mode hooks, highlighting the malware’s increasing sophistication in avoiding detection.

    The updates also introduce new modules designed to enhance the malware’s functionality. These include capabilities for creating processes, bypassing User Account Control (UAC), adding exclusions to Windows Defender, and writing files, thereby expanding the malware’s ability to compromise and control infected systems.

    Detailed analysis of HijackLoader’s operational stages reveals intricate technical mechanisms.

    The first and second stages of the malware involve complex loading processes, module utilization, and injection methods, underscoring the advanced nature of this threat.

    Furthermore, the research provides insights into the prevalence of various malware families distributed by HijackLoader, offering a glimpse into the ecosystem of threats facilitated by this loader.

    The distribution statistics indicate a diverse range of payloads, emphasizing the loader’s role in the broader cybercrime landscape.

    To aid in the fight against this evolving threat, the cybersecurity community has been provided with Indicators of Compromise (IOCs) and a list of MITRE ATT&CK techniques associated with HijackLoader.

    These resources are crucial for detecting and mitigating the impact of this malware, as it continues to pose a significant challenge to cybersecurity defences worldwide.

    The continuous evolution of HijackLoader underscores the dynamic nature of cyber threats and the need for ongoing vigilance and innovation in cybersecurity measures.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach -Β Download Free Guide

    The post HijackLoader Malware Attack Windows Via Weaponized PNG Image appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The North Korean hacking group known as Kimsuky has been reported to employ sophisticated methods involving social media platforms and system management tools to conduct espionage activities.

    This revelation highlights the evolving tactics of cyber adversaries and the increasing complexity of protecting digital assets.

    Utilizing Facebook for Initial Infiltration

    According to a recent report from Genians, Kimsuky, a notorious cyber-espionage group, has recently been observed using Facebook to target individuals involved in North Korean human rights and security affairs.

    Facebook to target individuals involved in North Korean human rights and security affairs.
    Facebook to target individuals involved in North Korean human rights and security affairs.

    The attackers create fake Facebook profiles that mimic honest South Korean public officials, engaging with potential targets through friend requests and personal messages.Β 

    Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

    This method of social engineering is designed to build trust and lure the targets into a trap.

    The deceptive strategy involves using these Facebook accounts to initiate conversations and eventually share malicious links or documents.

    malicious links or documents
    malicious links or documents

    The group’s meticulous approach ensures that the interactions appear legitimate, leveraging the social platform’s widespread use and users’ inherent trust in their connections.

    Microsoft Management Console as a Weapon

    Further complicating the threat landscape, Kimsuky has adopted Microsoft Management Console (MMC) files, specifically crafted to execute malicious commands on the victim’s system.Β 

    These files, typically with the .msc extension, are disguised as innocuous documents but are designed to trigger unauthorized actions when opened.

    Trigger unauthorized actions when opened
    Trigger unauthorized actions when opened

    The MMC files are configured to appear as regular Word documents, with icons and metadata that mimic legitimate files.

    Once the victim interacts with these files, the embedded malicious code executes, potentially allowing the attackers to gain control over the system or exfiltrate sensitive information.

    Upon successful deployment of the MMC-based malware, Kimsuky establishes a command and control (C2) channel to manage the compromised systems remotely.

    This setup is part of a broader infrastructure that includes multiple stages of malware deployment and data extraction.

    The C2 servers are often masked to evade detection and orchestrate data collection from the infected machines.

    This data can include keystrokes, system information, and other sensitive details that are valuable for espionage purposes.

    Implications and Countermeasures

    Social media platforms like Facebook for initial contact and the subsequent deployment of system management tools for executing attacks represent a significant escalation in cyber threat tactics.

    These methods indicate a shift towards more stealthy and socially engineered attacks that can bypass conventional security measures.

    Cybersecurity experts recommend enhanced vigilance regarding social media interactions to counteract these threats, especially with unknown contacts.

    Additionally, organizations should implement advanced threat detection systems that can identify and neutralize sophisticated malware, such as the MMC files used by Kimsuky.

    MMC files used by Kimsuky
    MMC files used by Kimsuky

    The recent activities of the Kimsuky group underscore the continuous evolution of cyber threat actors and the need for robust cybersecurity defenses.

    As these threats grow in sophistication, the global community must remain proactive in developing and deploying advanced security technologies and practices to protect sensitive information and critical infrastructure from the clutches of malicious actors.

    Indicator of Compromise

    ● MD5
    56fa059cf7dc562ce0346b943e8f58bb
    b5080c0d123ce430f1e28c370a0fa18b
    e86a24d9f3a42bbb8edc0ca1f8b3715c
    a12757387f178a0ec092fb5360e4f473
    75ec9f68a5b62705c115db5119a78134

    ● MD5 (Related)
    1dd007b44034bb3ce127b553873171e5
    49bac05068a79314e00c28b163889263
    7ca1a603a7440f1031c666afbe44afc8
    aa8bd550de4f4dee6ab0bfca82848d44

    ● C2
    5.9.123[.]217 [DE]
    brandwizer.co[.]in/green_pad/wp-content/plugins/custom-post-type-maker/essay/share
    brandwizer.co[.]in/green_pad/wp-content/plugins/custom-post-type-maker/essay/d.php?na=battmp
    brandwizer.co[.]in/green_pad/wp-content/plugins/custom-post-type-maker/essay/r.php
    brandwizer.co[.]in/green_pad/wp-content/plugins/custom-post-type-maker/kohei/r.php
    brandwizer.co[.]in/green_pad/wp-content/plugins/custom-post-type-maker/essay/ttt.hta
    brandwizer.co[.]in/green_pad/wp-content/plugins/custom-post-type-marker/ayaka/ttt.hta
    makeoversalon.net[.]in/wp-content/plugins/wp-custom-taxonomy-image/iiri/share.docx

    ● C2 (Related)
    52.177.14[.]24 [US]
    69.163.180[.]70 [US]
    162.0.209[.]27 [US]
    162.0.209[.]91 [US]
    199.59.243[.]225 [US]
    joongang[.]site/pprb/sec/d.php?na=battmp
    yonsei[.]lol
    rfa[.]ink/bio/d.php?na=battmp
    rfa[.]ink/bio/d.php?na=vbtmp
    mitmail[.]tech/gorgon/ca.php?na=vbs.gif
    mitmail[.]tech/gorgon/ca.php?na=video.gif
    beastmodser[.]club/sil/0304/VOA_Korea.docx
    beastmodser[.]club/sil/0304/d.php?na=version.gif
    worldinfocontact[.]club/111/d.php
    worldinfocontact[.]club/111/kfrie/cow.php
    ielsems[.]com/romeo/d.php?na=vbtmp
    ielsems[.]com/panda/d.php?na=battmp
    dusieme[.]com/panda/TBS TV_Qs.docx
    dusieme[.]com/panda/d.php?na=vbtmp
    dusieme[.]com/hwp/d.php?na=sched.gif
    dusieme[.]com/js/cic0117/ca.php?na=dot_emsi.gif
    rapportdown[.]lol/rapport/com/ca.php?na=video.gif
    rapportdown[.]lol/rapport/com/ca.php?na=reg.gif
    nuclearpolicy101[.]org/wp-admin/includes/0421/d.php?na=vbtmp
    nuclearpolicy101[.]org/wp-admin/includes/0603/d.php?na=battmp
    nuclearpolicy101[.]org/wp-admin/includes/lee/leeplug/cow.php

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    The post North Korean Hackers Abusing Facebook & MS Management Console appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ