CYBERSECURITY / DEFENSE / INTELLIGENCE

  • The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee has discovered uses Lua bytecode to obfuscate its malicious code. 

    The malware was discovered on a legitimate Microsoft repository (vcpkg) disguised within a zip file named “Cheat.Lab.2.7.2.zip,”  containing an MSI installer that deployed two executables (“compiler.exe” and “lua51.dll”) along with a text file (“readme.txt”) containing the Lua bytecode. 

    Attackers are making malware harder to detect by using Lua bytecode, a less common language that some security tools may struggle to analyze, which hides malicious strings within the bytecode, hindering traditional detection methods.

    GitHub’s popularity as a code-sharing platform is being exploited for malware distribution. The platform’s commercial security measures make it difficult to identify malicious files, and users’ trust in GitHub can lead to them unknowingly downloading malware. 

    The trend of leveraging Lua bytecode and GitHub for distribution suggests we are likely to see more such attacks in the future. 

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    The new Redline version installs via an MSI and creates a scheduled task to run a Lua bytecode compiler; it also copies itself to a hidden folder and sets up a persistence mechanism via a script in C:\Windows\Setup\Scripts. 

    Redline communicates with its C2 server over HTTP and steals victim information, including the IP address, username, and machine ID, while the Lua bytecode is obfuscated and uses a complex decryption loop, making analysis difficult. 

    To further evade detection, Redline leverages Lua’s FFI to call Windows API functions directly, bypassing the standard monitored channels. 

    Static analysis of the CheatLab.2.7.2.msi in ANY.RUN

    ANY.RUN analysis of Cheat.Lab.2.7.2.msi reveals a malicious installation process, which deploys compiler.exe, which loads lua51.dll and utilizes readme.txt (a disguised binary) as input. compiler.exe then retrieves IP addresses from pastebin.com and attempts to connect to them. 

    Easily analyze details of HTTP requests in ANY.RUN’s network tab

    The communication involves sending an HTTP PUT request containing “/loader/screen/” to the server while identifying as “Winter” in the user agent. 

    While the complete execution chain couldn’t be fully observed due to an inactive C2 server, this analysis highlights the malware’s use of steganography (readme.txt) and external resource retrieval (pastebin.com) for potential code updates or C2 server communication. 

    Redline Stealer, a prevalent malware, was identified as the 5th most encountered malware family in

    highlights the wide reach of this threat, as confirmed by McAfee’s data across various continents. 

    This malware steals private data and hides itself as downloads that users want, like cheats or productivity apps. To stay safe, users can use sandboxes to check suspicious files for malicious behaviour using YARA, Suricata, or signature-based detection methods.

    Start Using ANY.RUN Today

    The ANY.RUN sandbox simplifies phishing and malware analysis, providing conclusive results in under 40 seconds. 

    You can check out how ANY.RUN’s features, including the private team space, all Windows VMs, and advanced analysis environment settings, can improve your work.

    Start ANY.RUN sandbox for your team with free registration!

    The post Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious “imageless” containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks. “Over four million of the repositories in Docker Hub are imageless and have no content except for the repository

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A threat actor reportedly sells a database containing 49 million user records from Dell, one of the world’s leading technology companies.

    This significant security breach encompasses a wide range of personal and corporate information, potentially exposing millions of Dell customers to unprecedented risks.

    Comprehensive Breach of Customer Data

    The database in question allegedly includes detailed records of systems purchased from Dell between 2017 and 2024.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    This data said to be up-to-date and extracted directly from Dell’s servers, contains sensitive information that could be highly valuable to cybercriminals.

    The exposed data includes:

    • Full names
    • Addresses, cities, provinces, postal codes, and countries
    • Unique 7-digit service tags of systems
    • System shipment dates corresponding to warranty start dates
    • Warranty plans
    • Serial numbers for monitors
    • Dell customer numbers and order numbers

    Such detailed information poses a risk of identity theft and enables sophisticated phishing attacks and fraud.

    According to the Daily Dark Web, the breach reportedly affects a diverse range of Dell’s clientele.

    Approximately 7 million records are related to personal purchases, while 11 million are associated with consumer segment companies.

    The remainder of the data involves enterprise clients, partners, educational institutions, and other unidentified entities.

    This wide spectrum of affected groups underscores the severity and breadth of the breach.

    The threat actor has highlighted that the database includes records from multiple countries, with the top five most affected being the United States, China, India, Australia, and Canada.

    This global spread amplifies the implications of the breach, affecting a vast array of Dell’s international customer base.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    Data Security and Privacy Concerns

    This incident raises significant concerns about data security and privacy practices at Dell.

    Customers affected by this breach are at a heightened risk of cybercrime.

    It also prompts questions about how much detailed customer information could have been accessed and extracted without detection.

    In response to this breach, Dell must immediately secure its systems to prevent further unauthorized access.

    Customers should be notified and provided with guidance on protecting themselves from fraud and identity theft.

    This may include monitoring their accounts for unusual activity, changing passwords, and possibly enrolling in credit monitoring services.

    As the situation develops, the tech community and regulatory bodies will undoubtedly closely watch Dell’s response to this severe breach. T

    The outcome of this incident could also lead to stronger data protection laws and regulations to prevent such breaches in the future.

    Combat Sophisticated Email Threats With AI-Powered Email Security Tool -> Try Free Demo 

    The post Threat Actor Claims Selling of Dell Database with 49M User Records appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence (AI)-related threats. “These guidelines are informed by the whole-of-government effort to assess AI risks across all sixteen critical infrastructure sectors, and address threats both to and from, and involving AI systems,” the Department of Homeland Security (DHS)&

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A safe and trusted Google Play experience is our top priority.

    We leverage our SAFE (see below) principles to provide the framework to create that experience for both users and developers. Here’s what these principles mean in practice:

    • (S)afeguard our Users. Help them discover quality apps that they can trust.
    • (A)dvocate for Developer Protection. Build platform safeguards to enable developers to focus on growth.
    • (F)oster Responsible Innovation. Thoughtfully unlock value for all without compromising on user safety.
    • (E)volve Platform Defenses. Stay ahead of emerging threats by evolving our policies, tools and technology.

    With those principles in mind, we’ve made recent improvements and introduced new measures to keep Google Play’s users safe, even as the threat landscape evolves.

    In 2023, we prevented 2.28 million policy-violating apps from being published on Google Play in part thanks to our investment in new and improved security features, policy updates, and advanced machine learning and app review processes.

    We have also strengthened our developer onboarding and review processes, requiring more identity information when developers first establish their Play accounts.

    Together with investments in our review tooling and processes, we identified bad actors and fraud rings more effectively and banned 333K bad accounts from Play for violations like confirmed malware and repeated severe policy violations.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    Additionally, almost 200K app submissions were rejected or remediated to ensure proper use of sensitive permissions such as background location or SMS access.

    To help safeguard user privacy at scale, we partnered with SDK providers to limit sensitive data access and sharing, enhancing the privacy posture for over 31 SDKs impacting 790K+ apps.

    We also significantly expanded the Google Play SDK Index, which now covers the SDKs used in almost 6 million apps across the Android ecosystem.

    This valuable resource helps developers make better SDK choices, boosts app quality, and minimizes integration risks.

    Protecting The Android Ecosystem

    Building on our success with the App Defense Alliance (ADA), we partnered with Microsoft and Meta as steering committee members in the newly restructured ADA under the Joint Development Foundation, part of the Linux Foundation family.

    The Alliance will support industry-wide adoption of app security best practices and guidelines, as well as countermeasures against emerging security risks.

    Additionally, we announced new Play Store transparency labeling to highlight VPN apps that have completed an independent security review through App Defense Alliance’s Mobile App Security Assessment (MASA).

    When a user searches for VPN apps, they will now see a banner at the top of Google Play that educates them about the “Independent security review” badge in the Data safety section.

    This helps users see at-a-glance that a developer has prioritized security and privacy best practices and is committed to user safety.

    To better protect our customers who install apps outside of the Play Store, we made Google Play Protect’s security capabilities even more powerful with real-time scanning at the code-level to combat novel malicious apps.

    Our security protections and machine learning algorithms learn from each app submitted to Google for review, and we look at thousands of signals and compare app behavior.

    This new capability has already detected over 5 million new malicious off-Play apps, which helps protect Android users worldwide.

    More Stringent Developer Requirements And Guidelines

    Last year, we updated Play policies around Generative AI apps, disruptive notifications, and expanded privacy protections.

    We are also raising the bar for new personal developer accounts by requiring new testing before developers can make their apps available on Google Play.

    By testing their apps, getting feedback, and ensuring everything is ready before they launch, developers can bring more high-quality content to Play users.

    We’ve introduced expanded developer verification requirements to increase trust and transparency, including D-U-N-S numbers for organizations and a new “About the developer” section.

    To give users more control over their data, apps that enable account creation now need to provide an option to initiate account and data deletion from within the app and online.

    This web requirement is essential so that a user can request account and data deletion without reinstalling an app.

    We have also incorporated this feature into the Data safety section of the Play Store to simplify the user experience.

    With each iteration of the Android operating system (including its robust set of APIs), myriad enhancements are introduced, aiming to elevate the user experience, bolster security protocols, and optimize the overall performance of the Android platform.

    To further safeguard our customers, approximately 1.5 million applications that do not target the most recent APIs are no longer available in the Play Store to new users who have updated their devices to the latest Android version.

    Looking Ahead

    Protecting users and developers on Google Play is paramount and ever-evolving. In 2024, we’ll launch new security initiatives, including removing apps from Play that are not transparent about their privacy practices.

    We also recently filed a lawsuit in federal court against two fraudsters who made multiple misrepresentations to upload fraudulent investment and crypto exchange apps on Play to scam users.

    This lawsuit is a critical step in holding these bad actors accountable and sending a clear message that we will aggressively pursue those who seek to take advantage of our users.

    We’re constantly working on new ways to protect your experience on Google Play and across the entire Android ecosystem, and we look forward to sharing more.

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

    The post Google Blocks 2.28M Malicious Apps Entering The Play Store appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be a macOS variant targeting Intel or Apple Silicon with Rosetta 2-enabled devices. 

    This caused media confusion, as Apple’s recent spyware alert likely referred to Pegasus spyware, and there is no evidence of an iOS version in this discovery.

    The researchers also identified an Android version (WyrmSpy) but focused on the macOS variant in this paper, providing detection rules for further investigation.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    LightSpy Malware Attack

    Analysis reveals that the LightSpy sample targets MacOS exclusively because the binaries are compiled for the x86_64 architecture, which is incompatible with iPhones’ ARM architecture. The “file” command can be used to confirm this on both platforms. 

    File types of macOS and iOS Macho binaries

    Interestingly, the implant structure remains consistent across both versions and employs a dropper to load subsequent dynamic libraries (dylibs) containing the core malicious functionalities.  

    LightSpy for macOS shows signs of being a more mature product compared to the iOS version.

    macOS LightSpy utilizes a plugin manifest to store C2 information, offering more flexibility and reducing detection. 

    iOS LightSpy Downloading Plugins

    While both versions contain developer artifacts, macOS LightSpy suggests a more organized development process.

    Two possible developer machines (“mac” and “air”) have been identified, which suggests that the developers behind LightSpy are continuing to refine their malware. 

    The LightSpy macOS malware starts with a dropper that checks for a running instance using a PID file and then retrieves its configuration from the binary itself, including server locations and encryption keys. 

    Screenshot of decryption function decompilation

    Before downloading plugins, the dropper fetches a manifest file containing details and encrypted hashes.

    After downloading the core implant, it verifies its integrity against a server-side record. 

    The downloaded plugins and the core are XOR-encrypted with a rolling key for decryption. By reversing this encryption method, analysts can examine the functionality of the downloaded plugins. 

    Stage 2 of the implant process manages plugin loading and utilization, as in this stage, the implant queries the device for details using the DeviceInformation class and gathers standard device information. 

    Diff of DeviceInformation function, iOS on left and macOS on right

    According to Huntrees, the macOS version of this class excludes phone-specific data like IMEI and IMSI numbers, while tasks like getScreenSizeInches behave differently, and while the iOS version returns device-specific dimensions, the macOS version returns a generic value. 

    macOS version of getScreenSizeInches

    Despite these variations, communication with the C2 server continues over WebSockets using the open-source SocketRocket library, maintaining functionalities like heartbeats, command exchange, and status updates. 

    The analyzed iOS implant downloads 10 additional plugins, each with a unique ID, to perform various malicious tasks, which include AudioRecorder for capturing audio, Browser for potentially interacting with web browsers, and CameraShot for taking pictures. 

    There are also plugins with obfuscated names (noted with “aaa”) that likely correspond to functionalities like basic system information gathering, software information gathering, location data retrieval, and potentially targeting specific iOS apps like WeChat, QQ, and Telegram.

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

    The post LightSpy Malware Actively Targeting MacOS Devices appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new RAT malware has been discovered to be targeting Android devices. This malware is capable of executing additional commands compared to other RAT malware.

    This malware can also perform phishing attacks by disguising itself as legitimate applications like Snapchat, Instagram, WhatsApp, Twitter, and Google to harvest credentials from the victim.

    Sonicwall’s further investigation found that it consists of multiple HTML files in its assets folder, which are duplicate login pages of several legitimate applications.

    These files will harvest the credentials from users and send them back to the C2 server.

    Fraudulent HTML files from the Malware’s asset files (Source: SonicWall)

    Android Malware Mimic As Social Media

    The infection chain of this malware starts after the malicious application is installed on the victim’s Android devices.

    However, when installing the application, it requests Accessibility service and Device admin permission to gain control over the installed device and execute further malicious actions.

    The distribution of this malware is still unclear, but researchers speculate that it will be done using traditional social engineering techniques.

    After installation, the malware communicates with the C2 server to receive instructions and commands for specific tasks.

    The list of commands that are executed by the malware is as follows:

    The C2 URL is also found to be embedded in the resource file.

    Once the malware receives commands from the C2 server, the malware proceeds to harvest credentials from browsers and other Android applications by displaying a fraudulent login page using the HTML files (phishing).

    Fraudulent Login pages displayed by the malware (Source: SonicWall)

    When victims enter their credentials in these phishing pages, they are collected and shared with the showTt function.

    In addition, the malware collects the list of phone numbers stored on the victim device and attempts to change the device’s wallpaper when a condition is met. 

    If the ‘str’ parameter matches the decrypted value to 0, 1, or 2, the condition for changing the wallpaper is related to a specific resource.

    The malware also retrieves information about the installed applications from the victim’s device. 

    After further analysis of the malware code, the malware also uses the CameraManager to turn on/off the flashlight on the victim’s device.

    Furthermore, the malware sends a message to a particular number based on the inputs received from the C2 server.

    Code that sends a message to a specific number (Source: SonicWall)

    Indicators Of Compromise

    • 0cc5cf33350853cdd219d56902e5b97eb699c975a40d24e0e211a1015948a13d
    • 37074eb92d3cfe4e2c51f1b96a6adf33ed6093e4caa34aa2fa1b9affe288a509
    • 3df7c8074b6b1ab35db387b5cb9ea9c6fc2f23667d1a191787aabfbf2fb23173
    • 6eb33f00d5e626bfd54889558c6d031c6cac8f180d3b0e39fbfa2c501b65f564
    • 9b366eeeffd6c9b726299bc3cf96b2e673572971555719be9b9e4dcaad895162
    • a28e99cb8e79d4c2d19ccfda338d43f74bd1daa214f5add54c298b2bcfaac9c3
    • d09f2df6dc6f27a9df6e0e0995b91a5189622b1e53992474b2791bbd679f6987
    • d8413287ac20dabcf38bc2b5ecd65a37584d8066a364eede77c715ec63b7e0f1
    • ecf941c1cc85ee576f0d4ef761135d3e924dec67bc3f0051a43015924c53bfbb
    • f10072b712d1eed0f7e2290b47d39212918f3e1fd4deef00bf42ea3fe9809c41

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

    The post New Android Malware Mimic As Social Media Apps Steals Sensitive Data appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A serious concern has arisen for iPhone users in the European Union as a newly discovered flaw in Apple’s Safari browser has the potential to expose them to tracking and malicious activities.

    The vulnerability lies in the fact that third-party marketplace apps can exploit this flaw, posing a significant risk to users’ privacy and security.

    As a result, users are advised to exercise caution while browsing the internet and downloading apps until a fix is rolled out.

    This vulnerability stems from a specific implementation designed to comply with the European Digital Market Act (DMA), which mandates that users should be able to download and install apps from developers’ websites, not just the Apple App Store.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    The Flaw Explained

    The vulnerability involves a new URI scheme introduced in iOS 17.4, named marketplace-kit, which allows the installation of third-party marketplace apps directly from websites via Safari.

    When a user clicks a button on a website that triggers this URI scheme, it initiates a process handled by Apple’s MarketplaceKit.

    This process communicates with the marketplace’s backend servers to manage the app installation.

    However, the critical issue arises because the MarketplaceKit process sends a unique client_id identifier to the marketplace’s backend.

    The report states that this identifier facilitates the installation process but can also be misused to track the user across different sites.

    One issue that worsens the problem is that the identifier is transmitted discreetly, without the user’s explicit knowledge, and the installation process does not inform the user if it fails due to network problems or other errors.

    This flaw is particularly alarming because it can be exploited by any website, not just the intended marketplace sites.

    Malicious actors could potentially set up websites that mimic legitimate marketplaces and trick users into clicking buttons that activate the marketplace-kit URI scheme.

    This would expose users to potential privacy breaches and a range of security risks, including the installation of malicious software.

    Apple’s Stance and Security Measures

    Apple has stated that the introduction of the marketplace-kit URI scheme is a security measure intended to comply with the DMA while still protecting users by requiring a physical click to initiate the installation process.

    However, the current implementation has been criticized for not adequately safeguarding against the misuse of the client_id and for not providing sufficient feedback to users about the status of the installation process.

    This vulnerability is currently limited to EU users as the marketplace-kit URI scheme is not supported on iPhones outside the EU.

    Users are advised to be cautious about downloading apps from sources other than the official Apple App Store, especially from websites that are not well-known or verified marketplace operators.

    In response to these findings, digital security experts are urging Apple to revisit the implementation of the marketplace-kit URI scheme to enhance user privacy and security.

    As this situation develops, EU iPhone users are reminded to stay vigilant and to consider the security implications of installing apps through new and potentially unverified channels.

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

    The post Safari Vulnerability Exposes EU iOS Users to Malicious Marketplaces appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Kaiser Permanente, one of the largest healthcare providers in the United States, was the victim of a cyber attack that compromised the personal information of approximately 13.4 million users.

    This incident, which involved unauthorized access to the systems of City of Hope—a key service provider to Kaiser Permanente—has raised serious concerns about the privacy and security of patient information.

    Incident Overview

    On October 13, 2023, City of Hope detected suspicious activities within its systems, later confirmed to be a cyber attack.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    The breach occurred between September 19, 2023, and October 12, 2023, when an unauthorized third party accessed and copied certain files.

    These files contained sensitive personal information of millions of individuals, including names, contact details, social security numbers, medical records, and more.

    Upon discovering the breach, the City of Hope swiftly mitigated any further risk to its systems and their data.

    The healthcare provider engaged a leading cybersecurity firm to assist in securing their network and to conduct a thorough investigation into the nature and scope of the incident.

    This proactive approach helped understand the extent of the breach and formulate a strategic response to protect affected individuals.

    City of Hope has implemented enhanced security measures to fortify its digital infrastructure in response to the breach.

    These include deploying advanced cybersecurity technologies and strengthening security protocols to prevent future incidents.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    The organization is committed to maintaining the highest patient care and data protection standards.

    Recognizing the potential risks to the affected individuals, City of Hope offers two years of free identity monitoring services to help protect them from identity theft and fraud.

    This service is designed to alert users to any unusual activity involving their personal information, providing an additional layer of security.

    City of Hope also advises all affected individuals to remain vigilant by regularly monitoring their account statements and credit reports.

    Immediately reporting suspicious activity to financial institutions is crucial in preventing potential fraud and identity theft.

    Impact on Kaiser Permanente Users

    The breach has understandably caused concern among Kaiser Permanente’s users, prompting discussions about the need for enhanced data security measures across the healthcare industry.

    Kaiser Permanente is closely collaborating with the City of Hope to address the aftermath of the breach and ensure robust protective measures are in place to safeguard patient information.

    As the investigation continues, Kaiser Permanente and City of Hope are committed to transparency. They inform the affected individuals about the developments and the steps to secure their data.

    This incident is a stark reminder of the ever-present risks in the digital age and the continuous need for vigilance in protecting personal information.

    Combat Sophisticated Email Threats With AI-Powered Email Security Tool -> Try Free Demo 

    The post Kaiser Permanente Cyber Attack Exposes 13.4 Million Users Data appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶