CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Spending will have to rise to deliver needed capability, a NATO policy leader said.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nation-state adversary, which had made a habit of incorporating rafts of Windows zero-day exploits into its arsenal in recent months.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A new pilot program crowdsources ideas from analysts to scope out U.S. vulnerabilities.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Among other violations, employees traveled abroad with unauthorized technical data about U.S. aircraft and other weapons.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Security elites gathering in Prague say it’s time for Europe to step up military support for Ukraine…and Europe.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from governments in Europe, Asia, and the U.S., with the goal of targeting over 70 organizations worldwide by means of a bespoke tool called Voldemort that’s equipped to

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Iranian cyber actors have been identified as the perpetrators behind ransomware attacks targeting U.S. organizations across multiple sectors.

    This revelation comes from a joint Cybersecurity Advisory issued by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3).

    Background of the Threat Group

    The Iranian threat group, known by various names such as Pioneer Kitten, Fox Kitten, and more recently “xplfinder,” has been active since 2017.

    These cyber actors have a history of conducting computer network intrusions aimed at U.S. organizations, including schools, municipal governments, financial institutions, and healthcare facilities.

    The FBI’s analysis suggests that the group’s activities are consistent with state-sponsored cyber operations, with a significant portion of their efforts focused on enabling ransomware attacks.

    The Iranian cyber actors have exploited vulnerabilities in public-facing applications and networking devices to gain initial access to victim networks.

    They have been observed using advanced techniques such as deploying webshells, capturing login credentials, and creating backdoors to maintain persistent access.

    Once inside, these actors collaborate with ransomware affiliates, including groups like NoEscape, Ransomhouse, and ALPHV (BlackCat), to execute ransomware operations.

    What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

    The collaboration involves providing ransomware affiliates access to compromised networks, assisting in locking victim networks, and strategizing on extortion tactics.

    In return, the Iranian actors receive a share of the ransom payments. This partnership highlights a sophisticated and coordinated approach to cybercrime, leveraging technical expertise and strategic alliances.

    Impact on U.S. Organizations

    These ransomware attacks have been significant, affecting various sectors, including education, finance, healthcare, and local government entities.

    The advisory warns that the group’s activities are not limited to the U.S., as they have also targeted organizations in countries like Israel, Azerbaijan, and the United Arab Emirates.

    Victims of these attacks often face severe operational disruptions, financial losses, and potential exposure of sensitive data.

    The advisory emphasizes the importance of immediate reporting and collaboration with authorities to mitigate the impact of these attacks and prevent further exploitation.

    Mitigation Strategies and Recommendations

    In response to this threat, the FBI and CISA have recommended that organizations bolster their cybersecurity defenses.

    Key measures include:

    • Patch Management: Organizations are urged to apply patches and mitigations for known vulnerabilities, such as CVE-2024-3400 and CVE-2022-1388, which Iranian actors have exploited.
    • Network Monitoring: Regularly review network logs for indicators of compromise, such as unusual traffic patterns or unauthorized access attempts.
    • Credential Security: Strengthen authentication mechanisms, including multi-factor authentication, to protect against credential theft and misuse.
    • Incident Reporting: Promptly report any suspicious or malicious activity to the FBI or CISA to facilitate a coordinated response and investigation.

    The advisory underscores the critical need for organizations to remain vigilant and proactive in their cybersecurity efforts.

    By implementing these recommended practices, organizations can better defend against the evolving tactics of state-sponsored cyber actors.

    Iranian Cyber ThreatIn conclusion, the ongoing threat posed by Iranian cyber actors highlights the importance of robust cybersecurity measures and international cooperation in combating cybercrime.

    Organizations must remain agile and prepared to respond to emerging threats as these actors continue to adapt and evolve their tactics.

    Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

    The post Iranian Threat Group Attack US Organization via Ransomware appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Researchers from Proofpoint have uncovered a sophisticated cyberattack campaign leveraging Google Sheets as a command and control (C2) platform.

    Dubbed “Voldemort” by the researchers, this campaign targets Windows users globally, employing a novel attack chain that combines both common and rare techniques to deliver custom malware.

    This article delves into the intricacies of the campaign, its implications, and the broader cybersecurity challenges it presents.

    Unveiling the Voldemort Campaign

    Proofpoint researchers identified an attack campaign that stands out due to its unique use of Google Sheets for C2 operations.

    The malware, internally named “Voldemort,” is a custom backdoor written in C, capable of gathering information and deploying additional payloads.

    The attack chain involves a series of sophisticated techniques, including the abuse of Google Sheets, which is relatively uncommon in the threat landscape.

    What Does MITRE ATT&CK Expose About Your Enterprise Security? -Β Watch Free Webinar!

    The campaign began on August 5, 2024, and involved over 20,000 malicious messages targeting more than 70 organizations worldwide.

    The threat actors impersonated tax authorities from various countries, including the U.S., UK, France, Germany, Italy, India, and Japan.

    These emails, written in the language of the impersonated authority, were sent from compromised domains, adding a layer of authenticity to the phishing attempts.

    Emails impersonating HRMC and DGFIP
    Emails impersonating HRMC and DGFIP

    Attack Chain Mechanics

    The emails contained links that redirected victims to a landing page hosted on InfinityFree. Upon clicking a “View Document” button, the page checked the user’s browser for a Windows environment.

    If detected, the victim was redirected to a TryCloudflare-tunneled URI, prompting the opening of Windows Explorer.

    This stealthy redirection technique allowed the malware to masquerade as a local PDF file, increasing the likelihood of user interaction.

    InfinityFree hosted a landing page
    InfinityFree hosted a landing page

    Technical Analysis of the Malware

    The Voldemort campaign exploits the Windows search protocol (search-ms) to display remote files as if they were local.

    This technique, used to deploy remote access trojans (RATs), is becoming increasingly popular among cybercriminals. The campaign also utilizes saved search file formats (.search-ms) to further obscure the malicious activity.

    HTML Redirect Logic embedded on a landing page
    HTML Redirect Logic embedded on a landing page

    Execution and Payload Delivery

    If the victim executes the malicious LNK file, it triggers a PowerShell command to run Python.exe from a WebDAV share, executing a Python script without downloading files to the host.

    This script collects system information and sends it to the threat actor’s infrastructure. The malware then downloads a decoy PDF and a password-protected ZIP file, extracting and executing a legitimate executable vulnerable to DLL hijacking.

    Shortcut masquerading as a PDF
    Shortcut masquerading as a PDF

    The Role of Google Sheets in C2 Operations

    Leveraging Google Infrastructure

    Rather than using dedicated or compromised infrastructure, the Voldemort malware utilizes Google Sheets for C2, data exfiltration, and command execution.

    By authenticating with Google Sheets using a client token, the malware can read and write data, effectively using the platform as a communication channel with the threat actors.

    The malware supports a range of commands, including file operations and system commands, all executed via Google Sheets.

    The actors can issue commands to the bot, which reports back with status messages, including the malware’s name, “Voldemort.”

    Decrypted status messages
    Decrypted status messages

    Implications and Challenges

    APT Activity with Cybercrime Characteristics

    Proofpoint assesses with moderate confidence that the Voldemort campaign is likely orchestrated by an advanced persistent threat (APT) actor focused on intelligence gathering.

    Despite its espionage-like capabilities, the campaign’s volume and targeting align more closely with cybercriminal activities, presenting a unique blend of threats.

    PCAP of pingb.in traffic
    PCAP of pingb.in traffic

    The abuse of cloud services like Google Sheets for malicious purposes highlights a growing trend in the cyber threat landscape.

    Such tactics allow threat actors to leverage legitimate infrastructure, making detection and mitigation more challenging for cybersecurity professionals.

    Manual browsing of WebDAV share
    Manual browsing of WebDAV share

    The Voldemort campaign represents a significant evolution in cyberattack strategies, combining sophisticated techniques with innovative cloud-based services for malicious purposes.

    As threat actors continue to adapt and exploit new technologies, cybersecurity professionals must remain vigilant and proactive in developing defenses against such complex threats.

    Using Google Sheets as a C2 platform underscores the need for enhanced security measures and awareness of the potential misuse of legitimate cyberattack services.

    Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

    The post Voldemort Threat Actors Abusing Google Sheets to Attack Windows UsersΒ  appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns. Recorded Future’s Insikt Group has linked the infrastructure to a threat it tracks as GreenCharlie, an Iran-nexus cyber threat group that overlaps with APT42, Charming Kitten, Damselfly, Mint Sandstorm (formerly

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ