CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that has come under active exploitation in the wild by malicious actors. The company described the vulnerability, tracked as CVE-2024-3400 (CVSS score: 10.0), as “intricate” and a combination of two bugs in versions PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 of the software. “In

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that has come under targeted exploitation in the wild. “CrushFTP v11 versions below 11.1 have a vulnerability where users can escape their VFS and download system files,” CrushFTP said in an advisory released Friday.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Last September’s tests are informing the Air Force’s effort to build autonomous drones.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • By graduation, the students will know how to build their own drones and teach foreign partners on tactics.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called BlackTech as part of a recent cyber attack wave. The intrusions pave the way for an updated version of modular backdoor dubbed Waterbear as well as its enhanced successor referred to as Deuterbear. “Waterbear is known for its complexity, as it

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Attackers are increasingly making use of β€œnetworkless” attack techniques targeting cloud apps and identities. Here’s how attackers can (and are) compromising organizations – without ever needing to touch the endpoint or conventional networked systems and services.  Before getting into the details of the attack techniques being used, let’s discuss why

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching the networks of more than 250 victims as of January 1, 2024. “Since March 2023, Akira ransomware has impacted a wide range of businesses and critical infrastructure entities in North America, Europe, and Australia,” cybersecurity agencies from the Netherlands and the U.S.,

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The Akira ransomware variant has severely impacted more than 250 organizations worldwide, amassing approximately USD 42 million in ransom payments.

    This information comes from a detailed joint Cybersecurity Advisory issued by the FBI and the Cybersecurity and Infrastructure Security Agency (CISA).

    Evolution of Akira Ransomware

    Initially detected in early versions written in C++, the Akira ransomware encrypted victims’ files, appending them with a .akira extension.

    However, a significant shift occurred in August 2023 when the ransomware operators began deploying a new variant named Megazord.

    This updated version, crafted in Rust, marks encrypted files with a .powerranges extension, indicating a strategic evolution in the malware’s development to evade detection and potentially enhance its encryption capabilities.

    Free Webinar | Mastering WAAP/WAF ROI Analysis | Book Your Spot

    The advisory highlights the extensive reach of the Akira ransomware, noting its profound impact on over 250 organizations.

    The financial repercussions are staggering, with the cybercriminals behind these attacks having extracted roughly $42 million USD in ransoms.

    The scale and sophistication of the operations suggest a highly organized criminal network with significant resources.

    Akira threat actors use tools like FileZilla, WinSCP, WinRAR, and RClone to extract data from a system.

    Threat actors use easily accessible tools such as AnyDesk, MobaXterm, RustDesk, Ngrok, and Cloudflare Tunnel to establish command and control channels.

    This allows them to exfiltrate data through different protocols like FTP, SFTP, and cloud storage services like Mega. They then connect to exfiltration servers to transfer the data.

    Tools Abused

    Tool NamePurposeDescription of Use
    PowerShellScriptingUsed to automate tasks and manage configurations, often for initial access and movement.
    MimikatzCredential HarvestingEmployed to steal credentials, which are crucial for lateral movement within a network.
    Cobalt StrikeCommand and ControlA legitimate security tool repurposed to control compromised systems remotely.
    PsExecRemote ExecutionUtilized to execute processes on other systems, aiding in the spread of ransomware.
    RcloneData ExfiltrationCommand-line program to manage files on cloud storage, used to exfiltrate data.
    Advanced IP ScannerNetwork ScanningScans network devices, providing information that can be used to further infiltrate networks.

    These tools represent a combination of legitimate software repurposed for malicious intent and specific hacking tools designed for cyber espionage and system manipulation.

    The use of such tools in the Akira ransomware attacks highlights the sophistication and the level of access achieved by the attackers.

    FBI and CISA Response

    In response to the rising threat, the FBI and CISA have intensified their efforts to combat the spread of Akira ransomware. They urge affected organizations to report incidents to local FBI field offices or directly to CISA’s 24/7 Operations Center.

    The advisory also provides detailed indicators of compromise, including malicious file hashes, which network defenders are encouraged to use to identify and mitigate potential ransomware attacks.

    Looking to Safeguard Your Company from Advanced Cyber Threats? DeployΒ TrustNetΒ to Your Radar ASAP.

    The post Akira Ransomware Attacks Over 250 Organizations and Collects $42 Million appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4T. Russian cybersecurity company Kaspersky said it discovered the activity in February 2024, with evidence suggesting that it may have been active since at least a year prior. The campaign has been codenamed 

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ