CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Cary, North Carolina, August 30th, 2024, CyberNewsWire: INE Security is pleased to announce that it has been recognized as a 2024 SC Award finalist in the Excellence Award category for Best IT Security-Related Training Program.

    Marking its 27th year, the SC Awards recognize the solutions, organizations, and individuals that have demonstrated exceptional achievement in advancing the security of information security.

    This year, the SC Awards received a remarkable number of entries across 34 specialty categories, with many notable companies earning nominations for their leadership and commitment to cybersecurity education.

    β€œWe are honored to be recognized as a finalist in the SC Awards for our commitment to excellence in IT security training,” said Dara Warn, CEO of INE Security.

    β€œThis nomination reflects our dedication to empowering professionals with the knowledge and skills they need to tackle today’s sophisticated cybersecurity challenges. At INE Security, we remain committed to advancing the industry through the best cybersecurity training and certification platform, and innovative, high-quality training solutions that meet the evolving needs of the cybersecurity community.”

    β€œThe finalists for the 2024 SC Awards truly represent the forefront of cybersecurity innovation and leadership,” said Tom Spring, Editorial Director at SC Media.

    β€œThese solutions, organizations, and professionals have demonstrated outstanding capabilities in addressing today’s complex and ever-changing threat landscape. We are proud to recognize their contributions to the cybersecurity community.”

    INE Security has been recognized among the best cybersecurity training platform in 2024 by numerous organizations including:

    The SC Awards were evaluated by a distinguished panel of judges, including cybersecurity professionals, industry leaders, and members of the CyberRisk Alliance community from sectors such as healthcare, financial services, education, and technology.

    Winners of the 2024 SC Awards will be announced on September 17, 2024.

    About INE Security:

    INE Security is the premier provider of online networking and cybersecurity training and certification. Harnessing a powerful hands-on lab platform, cutting-edge technology, a global video distribution network, and world-class instructors, INE Security is the top training choice for Fortune 500 companies worldwide for cybersecurity training in business and for IT professionals looking to advance their careers.

    INE Security’s suite of learning paths offers an incomparable depth of expertise across cybersecurity and is committed to delivering advanced technical training while also lowering the barriers worldwide for those looking to enter and excel in an IT career.

    About CyberRisk Alliance

    CyberRisk Alliance provides business intelligence that helps the cybersecurity ecosystem connect, share knowledge, accelerate careers, and make smarter and faster decisions.

    Through our trusted information brands, network of experts, and more than 250 innovative annual events we provide cybersecurity professionals with actionable insights and act as a powerful extension of cybersecurity marketing teams.

    Our brands include SC Media, the Official Cybersecurity Summits, Security Weekly, InfoSec World, Identiverse, CyberRisk Collaborative, ChannelE2E, MSSP Alert, LaunchTech Communications and TECHEXPO Top Secret.Β Β 

    Users can learn more at www.cyberriskalliance.com.

    Contact

    • Director of Global Strategic Communications and Events
    • Kathryn Brown
    • INE Security
    • kbrown@ine.com

    The post INE Security Named 2024 SC Awards Finalist appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that disguises itself as Palo Alto Networks GlobalProtect virtual private network (VPN) tool. “The malware can execute remote PowerShell commands, download and exfiltrate files, encrypt communications, and bypass sandbox solutions, representing a significant threat to

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at such a high rate, that it can be very difficult to keep up with. Some vulnerabilities will start ringing alarm bells within your security tooling, while others are far more nuanced, but still pose an equally dangerous threat. Today, we want to discuss one of

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant.

    This attack leverages weaponized Excel documents to infiltrate Windows systems, posing significant threats to user data security.

    This article delves into the mechanics of the attack, the techniques employed by the malware, and the implications for users and organizations.

    Understanding Snake Keylogger

    Snake Keylogger, also known as “404 Keylogger” or “KrakenKeylogger,” is notorious malware that was initially distributed on hacker forums as a subscription-based service.

    This .NET-based software is designed to steal sensitive data, including saved credentials from web browsers, clipboard content, and basic device information.

    It can also log keystrokes and capture screenshots, making it a potent tool for cybercriminals.

    What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

    The Phishing Email

    Fortinet’s FortiGuard Labs reported that the attack begins with a phishing email that attempts to deceive recipients into opening an attached Excel file named “swift copy.xls.”

    The email claims that funds have been transferred into the recipient’s account, a common tactic to lure victims into action.

    FortiGuard services mark these emails with a “[virus detected]” warning in the subject line, but unsuspecting users may still fall for the trap.

    The phishing email attempts to deceive the recipient into opening the attached Excel file
    The phishing email attempts to deceive the recipient into opening the attached Excel file

    The Malicious Excel Document

    Upon opening the Excel file, malicious code is executed in the background. The document contains a specially crafted embedded link object that exploits the CVE-2017-0199 vulnerability to download additional malicious files.

    This process is covert, with the Excel program secretly requesting a URL that leads to further malware downloads.

    Malicious Excel Document
    Malicious Excel Document

    The attack chain continues by downloading an HTML Application (HTA) file, executed by the Windows application host (mshta.exe).

    This file contains obfuscated JavaScript code that, once decoded, reveals VBScript and PowerShell scripts.

    These scripts are responsible for downloading and executing the Snake Keylogger’s loader module, a critical attack component.

    The Loader Module

    The downloaded executable file, the Loader module, is developed using the Microsoft .NET Framework.

    It employs multiple-layer protection techniques, including transformation and encryption, to evade detection by cybersecurity products.

    The Loader module extracts and decrypts several components from its resource section, essential for deploying the core Snake Keylogger module.

    Loader Module Analysis
    Loader Module Analysis

    Deploy Module and Persistence

    The Deploy module, extracted from the Loader, ensures Snake Keylogger’s persistence on the victim’s system.

    It renames the Loader module file, sets it as hidden and read-only, and creates a scheduled task in the system Task Scheduler to launch at startup.

    This module also performs process hollowing, a technique that allows the malware to hide its operations by injecting malicious code into a new process.

    Scheduled Task for Snake Keylogger
    Scheduled Task for Snake Keylogger

    The Snake Keylogger attack highlights the evolving tactics of cybercriminals and the importance of robust cybersecurity measures.

    Users and organizations must remain vigilant, employing updated antivirus software and exercising caution with email attachments.

    Awareness and education are crucial in preventing sophisticated attacks from compromising sensitive data.

    Snake Keylogger Summary
    Snake Keylogger Summary

    The .NET-based Snake Keylogger attack via weaponized Excel documents represents a significant threat to Windows users.

    By understanding the attack’s mechanics and employing proactive security measures, individuals and organizations can better protect themselves against this and similar cyber threats.

    IOCs

    URLs

    hxxp://urlty[.]co/byPCO
    hxxp[:]//192.3.176[.]138/xampp/zoom/107.hta
    hxxp[:]//192.3.176[.]138/107/sahost.exe

    Relevant Sample SHA-256

    [swift copy.xls]
    8406A1D7A33B3549DD44F551E5A68392F85B5EF9CF8F9F3DB68BD7E02D1EABA7

    [107.hta]
    6F6A660CE89F6EA5BBE532921DDC4AA17BCD3F2524AA2461D4BE265C9E7328B9

    [The Loader module/sahost.exe / WeENKtk.exe / utGw.exe]
    484E5A871AD69D6B214A31A3B7F8CFCED71BA7A07E62205A90515F350CC0F723

    [Snake Keylogger core module / lfwhUWZlmFnGhDYPudAJ.exe]
    207DD751868995754F8C1223C08F28633B47629F78FAAF70A3B931459EE60714

    Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

    The post .NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware.

    This sophisticated threat is part of a growing trend where attackers use legitimate services to distribute malicious tools, posing significant risks to users worldwide.

    What is Lumma Stealer?

    Lumma Stealer is a highly advanced malware designed to siphon sensitive information from unsuspecting victims.

    It targets stored browser passwords, cookies, cryptocurrency data, and information from email clients.

    Known for its cutting-edge credential theft techniques, Lumma Stealer is often among the first to exploit new vulnerabilities, such as session cookie recovery for Google accounts.

    Distributed through a Malware-as-a-Service (MaaS) model, Lumma Stealer is accessible to cybercriminals via subscription, making it a prevalent threat on platforms like Telegram and underground forums.

    What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

    A Growing and Fast-Spreading Threat

    According to the GenDigital reports, The creators of Lumma Stealer have devised an efficient distribution strategy, utilizing comments on public GitHub repositories.

    These comments typically contain links to encrypted archives hosted on mediafire[.]com, accompanied by a passwordβ€”often the generic β€œchangeme.”

    Once users download and unpack these archives, their data becomes vulnerable to theft. While GitHub is actively working to remove these malicious comments, the volume of posts makes it challenging to keep up.

    Attackers continuously add new comments, often outpacing removal efforts. Nonetheless, GitHub’s response has shown progress, with a noticeable increase in comment deletions.

    Malicious Guthub Comments
    Malicious Guthub Comments

    One notable aspect of this campaign is the poor quality of English used in the comments. While this can serve as a red flag, future attacks may become more polished as cybercriminals leverage generative AI tools to craft convincing messages.

    This evolution could make it increasingly difficult for users to distinguish between legitimate and malicious content.

    Unfortunately, GitHub is not the only platform being exploited. Similar campaigns have been observed on YouTube, where Lumma Stealer and other information stealers are distributed.

    Attackers often use different passwords and hosting platforms, like Dropbox, to spread their malware.

    These campaigns masquerade as “Fake Tutorials,” luring users with promises of free software, only to infect their devices.

    Vigilance is key when interacting with comments or links on platforms like GitHub and YouTube.

    Trust your instincts and avoid clicking on dubious links if something seems suspicious. By sharing intelligence on threats like Lumma Stealer, we empower individuals and organizations to safeguard their digital environments proactively.

    Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

    The post Attackers Spread Lumma Stealer Malware GitHub Comments appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct malicious campaigns.

    These tools, originally designed to enhance marketing efforts, have been repurposed by threat actors to evade detection and amplify their attacks.

    This article delves into the methods these cybercriminals use, the tools they exploit, and the strategies for defending against such threats.

    The Weaponization of Digital Advertising Tools

    Digital advertising tools like link shorteners, IP geolocation utilities, and CAPTCHA technologies are integral to modern marketing strategies.

    They help marketers track user engagement, target specific demographics, and ensure genuine human interaction with online content. However, hackers have co-opted these same tools to serve nefarious purposes.

    bit.ly subscription page
    bit.ly subscription page

    Link shorteners, like bit.ly, have become ubiquitous on the internet. While they simplify URLs and track click-through rates, they also provide a cloak for malicious activities.

    Hackers use these services to obscure the URLs of phishing sites and malware distribution points.

    For example, the threat group UNC1189 utilized link shorteners in 2022 to redirect victims to phishing documents hosted on cloud storage.

    bit.ly destination URL configuration
    bit.ly destination URL configuration

    IP geolocation tools, commonly used by advertisers to analyze the geographical impact of their campaigns, have been exploited by attackers to track the spread of malware and conditionally execute malicious actions based on a user’s location.

    What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

    This tactic allows hackers to avoid detection and selectively target victims, as seen in campaigns involving the Kraken Ransomware, as per a report by Google Cloud.

    CAPTCHA: A Shield Turned Weapon

    CAPTCHA technologies, designed to differentiate between humans and bots, have been manipulated by cybercriminals to protect their malicious infrastructure.

    By implementing CAPTCHA challenges, attackers can prevent automated security tools from accessing their phishing sites, while allowing human victims to proceed.

    CAPTCHA victim flow
    CAPTCHA victim flow

    Malvertising: A New Frontier in Cybercrime

    Malvertising, or malicious advertising, is another tactic employed by hackers. Threat actors can attract unsuspecting users to malicious sites by mimicking legitimate ad campaigns.

    Competitive intelligence tools, which provide insights into successful ad strategies, are leveraged by attackers to refine their campaigns and bypass ad network filters.

    Steps for setting up a malvertising campaign
    Steps for setting up a malvertising campaign

    Hackers’ exploitation of digital advertising tools represents a significant threat to online security.

    As these tools become more sophisticated, so too do cybercriminals’ tactics. Organizations and individuals must stay informed and vigilant, employing robust security measures to protect against these evolving threats.

    By understanding attackers’ methods and implementing effective defenses, we can mitigate the risks posed by these malicious campaigns.

    Indicators of Compromise

    FilenameMD5Description
    Advanced_IP_Scanner_v.3.5.2.1.zip5310d6b73d19592860e81e4e3a5459ebMalicious archive file
    URLIP AddressDescription
    hxxps://ktgotit[.]com172.67.216[.]166 (Cloudflare Netblock)Malvertising landing page
    hxxps://aadvanced-ip-scanner[.]com82.221.136[.]1Cloaked lure page
    hxxps://britanniaeat[.]com/wp-includes
    /Advanced_IP_Scanner_v.3.5.2.1.zip
    3.11.24[.]22 (Amazon Netblock)Malware download URL

    Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

    The post Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia.

    Google’s Threat Analysis Group (TAG) observed these attacks, which have been linked to the Russian government-backed actor APT29.

    The hackers have repeatedly used the same exploits, initially developed by commercial surveillance vendors, to breach security defenses.

    This article delves into the details of these cyber campaigns, the vulnerabilities exploited, and the implications for global cybersecurity.

    The Watering Hole Attacks

    The cyberattacks were executed through a method known as “watering hole attacks,” where legitimate websites are compromised to deliver malicious payloads to unsuspecting visitors.

    In this case, the Mongolian government websites cabinet.gov[.]mn and mfa.gov[.]mn were targeted.

    The attackers embedded hidden iframes that redirected visitors to attacker-controlled websites, delivering exploits to iOS and Android users.

    During this period, the attackers used an iOS WebKit exploit, CVE-2023-41993, to target devices running iOS versions older than 16.6.1.

    The exploit was delivered via compromised government websites, affecting users who had not updated their devices.

    The payload included a cookie stealer framework, previously observed in a 2021 campaign by APT29, which exfiltrated authentication cookies from prominent websites like LinkedIn and Gmail.

    Attack chain used in the November 2023-February 2024 campaigns targeting iOS
    Attack chain used in the November 2023-February 2024 campaigns targeting iOS

    What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

    July 2024: Chrome Exploits

    In July 2024, the attackers shifted focus to Android users by exploiting vulnerabilities in Google Chrome.

    The Chrome exploit chain targeted CVE-2024-5274 and CVE-2024-4671, allowing attackers to deploy an information-stealing payload.

    This campaign required an additional sandbox escape vulnerability to bypass Chrome’s site isolation protections, demonstrating the attackers’ technical sophistication.

    The exploits used in the November 2023 watering hole attack (left image) and by Intellexa in September 2023 (right image) share the same trigger code.
    The exploits used in the November 2023 watering hole attack (left image) and by Intellexa in September 2023 (right image) share the same trigger code.
    Attack chain used during the July 2024 campaign targeting Google Chrome.
    Attack chain used during the July 2024 campaign targeting Google Chrome.

    Exploit Reuse and Attribution

    Repeated use of the same exploits highlights a concerning trend in cyber warfare. The vulnerabilities exploited in these campaigns were initially discovered and used as zero-days by commercial surveillance vendors like Intellexa and NSO Group.

    The attackers adapted these exploits for their purposes, raising questions about how these sophisticated tools ended up in the hands of APT actors.

    Google’s TAG has assessed with moderate confidence that these campaigns are linked to APT29, a group known for its advanced cyber capabilities and ties to the Russian government.

    The similarities between the exploits used by APT29 and those developed by commercial vendors suggest a potential leak or sale of these tools.

    The persistence and sophistication of these attacks underscore the ongoing threat posed by state-sponsored cyber actors.

    Watering hole attacks remain potent for delivering sophisticated exploits, particularly against users who have not applied the latest security patches.

    The campaigns also highlight the risks associated with the proliferation of commercial surveillance tools, which malicious actors can repurpose.

    Recommendations for Users and Organizations

    To mitigate the risk of such attacks, users and organizations are urged to:

    1. Keep Software Updated: Regularly update operating systems and applications to the latest versions to protect against known vulnerabilities.
    2. Enable Security Features: Use built-in security features like Apple’s Lockdown Mode and Google’s Site Isolation to enhance protection against exploits.
    3. Monitor Network Traffic: Implement network monitoring solutions to detect and respond to suspicious activities promptly.
    4. Educate Employees: Conduct regular training sessions to raise awareness about phishing and other common attack vectors.

    Repeatedly using the same exploits in these campaigns highlights the need for vigilance and proactive security measures.

    While the exact means by which APT29 acquired these exploits remain unclear, the incidents are a stark reminder of the evolving cyber threat landscape.

    Google’s TAG continues to work on detecting, analyzing, and preventing such exploits, sharing its findings to enhance security across the ecosystem.

    As cyber threats become increasingly sophisticated, collaboration and information sharing among cybersecurity professionals and organizations are more crucial than ever.

    Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

    The post Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Government Websites appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry, indicating “coordinated and relentless” efforts to target developers with malware and steal cryptocurrency assets. The latest wave, which was observed between August 12 and 27, 2024, involved packages named temp-etherscan-api, ethersscan-api, telegram-con, helmet-validate, and

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of rising cyber threats. With a staggering 50% increase in ransomware attacks targeting industrial control systems (ICS) in 2023, the SANS Institute is taking decisive action by announcing the release of its essential new strategy guide, “ICS Is the Business: Why Securing

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Chinese-speaking users are the target of a “highly organized and sophisticated attack” campaign that is likely leveraging phishing emails to infect Windows systems with Cobalt Strike payloads. “The attackers managed to move laterally, establish persistence and remain undetected within the systems for more than two weeks,” Securonix researchers Den Iuzvyk and Tim Peck said in a new report. The

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ