CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Researchers have uncovered a vulnerability in Microsoft’s Windows Hello for Business (WHfB) that allows attackers to bypass its robust authentication mechanism.

    This flaw, which downgrades the authentication process to a less secure method, has raised concerns about the security of enterprise environments relying on WHfB for phishing-resistant authentication.

    What is Windows Hello for Business?

    According to the Medium blog report, Windows Hello for Business is a sophisticated authentication mechanism that enhances security using a cryptographic key pair stored on the user’s device.

    It leverages the Trusted Platform Module (TPM) to store the private key securely while the public key is sent to the authentication server. The process involves two main phases:

    1. Registration: Users register for WHfB, creating a cryptographic key pair. The private key is stored in the TPM, and the public key is sent to the server.
    2. Authentication: When users authenticate, they use their Windows Hello PIN or fingerprint, which triggers the encryption of a nonce (unique challenge) issued by Microsoft. This encrypted nonce, along with the origin field, is sent back to the server for validation.
    Windows Hello for Business prompt
    Windows Hello for Business prompt

    The Flaw: Bypassing WHfB Authentication

    The vulnerability in WHfB allows attackers to intercept and alter the authentication requests, coercing users into using a less secure, phishable authentication method.

    Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

    This can be achieved by manipulating the POST request values, specifically the isFidoSupported parameter and the User-Agent header.

    Regular sign-in using WHfB
    Regular sign-in using WHfB

    Exploitation Process

    1. Intercepting Requests: Attackers use tools like Burp Suite to intercept the outgoing authentication request.
    2. Modifying Parameters: They change the isFidoSupported parameter to false or alter the User-Agent header to an unsupported value.
    3. Downgrading Authentication: This manipulation downgrades the authentication method from WHfB to a standard, less secure method, which can be easily phished using frameworks like EvilGinx.

    A proof of concept (PoC) video demonstrates how this attack can be executed.

    The authentication method is downgraded by intercepting the POST request to /common/GetCredentialType and changing the isFidoSupported parameter, allowing attackers to bypass WHfB.

    Automated Exploitation with EvilGinx

    Researchers have modified the EvilGinx framework to automate this attack. EvilGinx is a tool used for phishing attacks, and the customizations include:

    • Modifying the core/http_proxy.go file: This allows manipulation of POST requests with JSON bodies.
    • Creating a Phishlet: A phishlet is a customizable template for creating phishing pages.
    • The phishlet for this attack alters the POST request to /common/GetCredentialType to set isFidoSupported to false and hides the β€œSign-in options” button.

    Snippet from BurpSuite’s intercept proxy (/common/GetCredentialType) showing the value β€œisFidoSupported”

    / set the value of the specified key in the JSON body
    func SetJSONVariable(body []byte, key string, value interface{}) ([]byte, error) {
        var data map[string]interface{}
        if err := json.Unmarshal(body, &data); err != nil {
            return nil, err
        }
        data[key] = value
        newBody, err := json.Marshal(data)
        if err != nil {
            return nil, err
        }
        return newBody, nil
    }

    lp() function

    Firstly, find the document element by class (table), which belongs to the box containing the various sign-in methods β€” such as Fido/WHfB authentication:

    Identifying the class name `table`
    Identifying the class name `table`

    Recommendations for Mitigation

    Microsoft recommends creating conditional access policies using authentication strength to mitigate this attack vector.

    This involves:

    1. Implementing Strong Authentication for Cloud Apps: Enforce phishing-resistant authentication methods across all cloud applications.
    2. Creating Custom Authentication Strengths: Define custom authentication strengths that include phishing-resistant methods like Temporary Access Pass (TAP).
    3. Secondary Policy for Registering Phishing-Resistant Methods: Implement a secondary Conditional Access (CA) policy for users registering new methods via compliant devices.

    The discovery of this vulnerability in Windows Hello for Business highlights the need for continuous vigilance and robust security practices.

    By implementing strong authentication policies and staying informed about potential threats, organizations can better protect their sensitive data and maintain the integrity of their authentication processes.

    Windows Hello for BusinessCaption: Windows Hello for Business aims to provide a secure and phishing-resistant authentication mechanism.

    Organizations must adopt advanced security measures as cyber threats evolve and stay ahead of potential vulnerabilities.

    The flaw in Windows Hello for Business serves as a reminder of the importance of layered security and proactive risk management. 

    This comprehensive news article provides an in-depth look at the vulnerability in Microsoft’s Windows Hello for Business, detailing the exploitation process, proof of concept, and recommendations for mitigation.

    By understanding the mechanics of this flaw and implementing the suggested security measures, organizations can enhance their defense against sophisticated phishing attacks.

    Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

    The post Microsoft’s Windows Hello for Business Flaw Let Attackers Bypass Authentication appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams. “These included a smaller coordinated network of around 2,500 accounts that we were able to link to a group of around 20 individuals,” the company said. “They targeted primarily adult men in the U.S. and used fake accounts to mask

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least protected threat surfaces of the modern enterprise. Traditional security tools provide little protection against browser-based threats, leaving organizations exposed. Modern cybersecurity requires a new approach based on the protection of the browser itself, which offers both

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity experts have uncovered a sophisticated variant of the LummaC2 malware that leverages the popular Steam gaming platform as a Command-and-Control (C2) server.

    This new tactic marks a significant evolution in the malware’s distribution and operational mechanisms, posing a heightened threat to users and organizations worldwide.

    The Rise of LummaC2

    LummaC2 is an information-stealing malware that has been actively distributed by masquerading as illegal programs such as cracks, keygens, and game hacks.

    These malicious files are disseminated through various channels, including distribution sites, YouTube, LinkedIn, and even search engine advertisements, using a technique known as SEO poisoning.

    Recently, the malware has also been disguised as legitimate applications like Notion, Slack, and Capcut, further broadening its reach.

    According to the ASEC ahnlab reports, Initially, LummaC2 was distributed as a single executable (EXE) file or through DLL-SideLoading, where a malicious DLL is compressed together with a legitimate EXE file.

    This method allowed the malware to execute its payload while remaining under the radar of many security systems.

    Distribution in single EXE form (left), distribution in DLL form (right)
    Distribution in single EXE form (left), distribution in DLL form (right)

    Exploiting Steam for C2 Domains

    In its latest variant, LummaC2 has adopted a novel approach by exploiting the Steam gaming platform to obtain C2 domain information. Previously, all C2 information was embedded within the malware sample itself.

    Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

    However, attackers can dynamically change the C2 domain by leveraging a legitimate platform like Steam, enhancing the malware’s resilience and reducing the likelihood of detection.

    This technique is not entirely new; it mirrors the strategy used by the Vidar malware, which has a history of exploiting various legitimate platforms such as TikTok, Mastodon, and Telegram to obtain C2 information.

    LummaC2 exploit Steam page (left), Vidar exploit Steam page (right)
    LummaC2 exploit Steam page (left), Vidar exploit Steam page (right)

    Decryption and Execution

    Upon execution, LummaC2 decrypts its internal encrypted strings to obtain C2 domain information. The encryption uses Base64 and a proprietary algorithm, with each sample containing approximately 8 to 10 C2 domains.

    C2 domain decryption code
    C2 domain decryption code

    The malware initiates a Steam connection routine if all embedded C2 domains are inaccessible. Unlike the C2 domain, the Steam URL is stored in executable code, and the decryption algorithm differs.

    The Steam URL points to a Steam account profile page believed to be created by the attacker. The malware obtains a string by parsing the β€œactual_persona_name” tag on this page, which is then decrypted using the Caesar cipher to reveal the C2 domain.

    Steam account page source
    Steam account page source

    Dynamic C2 Domain Management

    Using a legitimate domain like Steam, with its vast user base, helps reduce suspicion and allows the attacker to change the C2 domain if needed easily.

    This flexibility increases the attack’s success rate and makes it more challenging for security systems to block the malware.

    Once the C2 domain is decrypted, LummaC2 connects to the C2 server and downloads an encrypted settings JSON file. This file is then decrypted, and the malware performs various malicious actions based on the settings.

    The stolen information is sent back to the C2 server and includes:

    • Wallet program information
    • Browser storage information
    • Password storage program information
    • TXT files in the user directory
    • Messenger program information
    • FTP program information
    • VPN program information
    • Remote program information
    • Memo program information
    • Mail program information
    • Browser extension plugin (virtual currency wallet) information
    Part of LummaC2 settings JSON
    Part of LummaC2 settings JSON

    The exploitation of the Steam gaming platform by LummaC2 malware represents a significant escalation in cyber threats.

    By leveraging a legitimate and widely used platform, attackers can dynamically manage C2 domains, making the malware more resilient and harder to detect.

    This development underscores the need for heightened vigilance and advanced security measures to protect against evolving cyber threats.

    Recommendations

    To mitigate the risk posed by LummaC2 and similar malware, users and organizations should:

    1. Avoid Downloading Illegal Software: Refrain from downloading cracks, keygens, and game hacks from untrusted sources.
    2. Use Reputable Security Software: Employ advanced antivirus and anti-malware solutions that can detect and block such threats.
    3. Regularly Update Software: Ensure all software, including security programs, is up-to-date to protect against known vulnerabilities.
    4. Educate Users: Raise awareness about the dangers of downloading and executing unknown files, and promote safe online practices.
    5. Monitor Network Traffic: Implement network monitoring tools to detect unusual traffic patterns that may indicate a malware infection.

    By adopting these measures, users and organizations can better defend against LummaC2’s sophisticated tactics and other evolving cyber threats.

    Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

    The post LummaC2 Malware Using Steam Gaming Platform as C2 Server appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform’s Cloud Functions service that an attacker could exploit to access other services and sensitive data in an unauthorized manner. Tenable has given the vulnerability the name ConfusedFunction. “An attacker could escalate their privileges to the Default Cloud Build Service Account and

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Several prominent Russian bank clients experienced issues with their mobile apps and websites. According to Downdetector, complaints began to surge around 09:30 Moscow time.

    The affected banks included Gazprombank, Alfa-Bank, VTB, and Rosbank. By midday, Post Bank clients also reported problems. Users could not make payments or access their accounts, leading to widespread frustration.

    Banks Acknowledge DDoS Attacks

    VTB’s press service confirmed that some clients faced local restrictions due to a “high load on the infrastructure of Internet providers.” They emphasized that the banking sector was subjected to a DDoS attack orchestrated from abroad.

    According to the Forbes reports, Alfa Bank’s press service reassured clients that the issues were temporary due to technical work, asserting that “everything will be up and running soon.” Gazprombank also acknowledged short-term difficulties with certain transactions.

    Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

    Politically Motivated Cyber Attacks

    The incidents on July 24 followed similar disruptions on July 23, affecting Raiffeisenbank, Rosbank, GPB, and Rosselkhozbank. Daniil Shcherbakov, Deputy CEO of Servicepipe, noted the similarity between the attacks on both days.

    He explained that hackers scanned the infrastructure of the victims, identified vulnerable spots, and targeted them.

    Shcherbakov highlighted that one credit institution attacked over 400 IP addresses simultaneously. He speculated that the attackers might target all major players in the financial market.

    As banks reported a return to regular operation later in the day, the incidents underscore the increasing threat of politically motivated cyber attacks on critical financial infrastructure.

    The situation remains fluid, and further developments are anticipated as authorities and financial institutions bolster their defenses against such threats.

    Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

    The post Ukraine Hackers Hit Major Russian banks with DDoS attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Several prominent Russian bank clients experienced issues with their mobile apps and websites. According to Downdetector, complaints began to surge around 09:30 Moscow time.

    The affected banks included Gazprombank, Alfa-Bank, VTB, and Rosbank. By midday, Post Bank clients also reported problems. Users could not make payments or access their accounts, leading to widespread frustration.

    Banks Acknowledge DDoS Attacks

    VTB’s press service confirmed that some clients faced local restrictions due to a “high load on the infrastructure of Internet providers.” They emphasized that the banking sector was subjected to a DDoS attack orchestrated from abroad.

    According to the Forbes reports, Alfa Bank’s press service reassured clients that the issues were temporary due to technical work, asserting that “everything will be up and running soon.” Gazprombank also acknowledged short-term difficulties with certain transactions.

    Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

    Politically Motivated Cyber Attacks

    The incidents on July 24 followed similar disruptions on July 23, affecting Raiffeisenbank, Rosbank, GPB, and Rosselkhozbank. Daniil Shcherbakov, Deputy CEO of Servicepipe, noted the similarity between the attacks on both days.

    He explained that hackers scanned the infrastructure of the victims, identified vulnerable spots, and targeted them.

    Shcherbakov highlighted that one credit institution attacked over 400 IP addresses simultaneously. He speculated that the attackers might target all major players in the financial market.

    As banks reported a return to regular operation later in the day, the incidents underscore the increasing threat of politically motivated cyber attacks on critical financial infrastructure.

    The situation remains fluid, and further developments are anticipated as authorities and financial institutions bolster their defenses against such threats.

    Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

    The post Ukraine Hackers Hit Major Russian banks with DDoS attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Docker is warning of a critical flaw impacting certain versions of Docker Engine that could allow an attacker to sidestep authorization plugins (AuthZ) under specific circumstances. Tracked as CVE-2024-41110, the bypass and privilege escalation vulnerability carries a CVSS score of 10.0, indicating maximum severity. “An attacker could exploit a bypass using an API request with Content-Length set

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could be exploited to trigger a denial-of-service (DoS) condition. “A cyber threat actor could exploit one of these vulnerabilities to cause a denial-of-service condition,” the U.S. Cybersecurity and

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Google said it’s adding new security warnings when downloading potentially suspicious and malicious files via its Chrome web browser. “We have replaced our previous warning messages with more detailed ones that convey more nuance about the nature of the danger and can help users make more informed decisions,” Jasika Bawa, Lily Chen, and Daniel Rubery from the Chrome Security team said. To that

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ