CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Niger’s rejection of democratic ties coincides starkly with its embrace of Russian military assistance since the July 2023 military coup.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a malicious package with the same name to a public package repository. This&

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Oracle Virtualbox was identified and reported as having a critical vulnerability associated with Privilege Escalation and Arbitrary File Move/Delete.

    This vulnerability was assigned with CVE-2024-21111, and the severity was 7.8 (High).Β 

    However, Oracle has acted swiftly upon the report and has patched the vulnerability accordingly. Following that, Oracle also released a security advisory to address the vulnerability.

    Recently Oracle Releases Security Update in 2024 – 372 Vulnerabilities Are Fixed

    Now, a publicly available exploit proof-of-concept has been published, providing detailed information on the vulnerability.

    Free Webinar | Mastering WAAP/WAF ROI Analysis | Book Your Spot

    PoC Exploit Released

    This vulnerability existed in Oracle Virtualbox versions prior to 7.0.16, which allows a threat actor to escalate privileges to that of NT AUTHORITY\SYSTEM via Symbolic Link, which will either perform an arbitrary file delete or an arbitrary file move.

    This is because Oracle Virtualbox allows every user to write to the installation folder C:\ProgramData\VirtualBox.

    Moreover, Virtualbox attempts to move log files from the location as NT AUTHORITY\SYSTEM for backup actions with a maximum of 10 logs. 

    In addition to this, Virtualbox also tries to delete the 11th log on the location as NT AUTHORITY\SYSTEM, which gives rise to these two bugs (File Delete and File Move) that can be utilized to attain privilege escalation.

    As per the Proof-of-concept video shared for File Delete, the researcher uses a EXE file under the name “VBoxEoP_del.exe” which attempts to create a new log file (VBoxSDS.log.11) under the C:\ProgramData\Virtualbox directory and again attempts to delete the log file.Β 

    This action combined together with an MSI file (Config.msi) provided the researcher with a new cmd terminal with the permissions of NT AUTHORITY\SYSTEM.

    The scenario is similar to Arbitrary file move also, in which the EXE file attempts to move the files from the C:\ProgramData\Virtualbox directory.

    It is recommended that Virtualbox users upgrade to the latest versions to prevent threat actors from exploiting this vulnerability.

    Looking to Safeguard Your Company from Advanced Cyber Threats? DeployΒ TrustNetΒ to Your Radar ASAP.

    The post PoC Exploit Released For Critical Oracle VirtualBox Vulnerability appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • When cyber attacks strike, it’s rarely a single computer that suffers. Nowadays, cybercriminals set their sights on corporate networks, aiming to infiltrate and compromise multiple systems. But how do these bad actors manage to breach large networks?

    It all starts with a foothold. Whether through brute-force attacks on remote desktop protocols, exploiting vulnerabilities in public-facing applications, or cleverly crafted phishing emails that lure unsuspecting employees, cybercriminals find their way in. Once inside, they start their lateral movementβ€”exploring the network, seeking out valuable assets, and spreading their reach.

    The traces of this lateral movement are crucial clues for cybersecurity teams. They help identify compromised assets, assess the extent of the breach, and shore up vulnerabilities to prevent further damage. By understanding the tactics employed by these threat actors, you can pinpoint where to look for signs of compromise on affected machines, and with the right computer forensics tools, analyzing these areas becomes more efficient.

    Most common lateral movement techniques

    Lateral movement is a critical phase in a cyber attack, where hackers pivot from their initial breach point to other systems within the network. This maneuver allows them to access more resources and escalate their attack, amplifying the potential damage.

    This phase is a prime opportunity for cybersecurity teams. It’s when threat actors’ activities are most exposed, offering a chance to detect the techniques and tools being used. Here are some key areas of interest for cyber incident response investigators:

    • Remote Services:

    To move laterally, nefarious actors often exploit remote services like Remote Desktop Protocol (RDP). These services allow them to transfer files, execute commands, or seize control of other machines within the network.

    • SMB Protocol:

    Attackers may use the Server Message Block (SMB) protocol, which Windows networks use for sharing resources like files and printers, to move laterally and spread malware.

    • System Tools:

    Attackers frequently abuse legitimate tools and processes already on systems to conduct malicious activities, making detection more challenging. Examples include PsExec and PowerShell.

    Delving into RDP connections

    You can find evidence of RDP usage on compromised machines by reviewing entries from the Windows registry and events logs.Β 

    Digital forensics tools are invaluable in this process. They extract and categorize data acquired from computers, making it easier to locate relevant digital artifacts for cyber incident investigations.

    For instance, this is how Belkasoft X displays outgoing RDP connections from the supplied data source:

    Figure 1: Information on outgoing connection extracted from Windows Registry shown in Belkasoft X

    The registry path for RDP connection details is typically found at:

    Software\Microsoft\Terminal Server Client\Servers

    In the highlighted example, the Administrator account was used for logging in to the host with IP address 192.168.1.79 via RDP. But what about incoming RDP connections? Yes, those can be uncovered too!

    To find details on incoming connections, you can analyze the Windows Event Logs, specifically the Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational logs.

    Since we know the Administrator account was involved, we can apply a filter to the security logs to focus on events associated with that account.

    Figure 2. With the filter applied the tool only shows the entries of interest
    Figure 3. Security logs narrowed down to Administrator actions

    If a trojan is suspected, further investigation is necessary. You can delve into record details in the Artifacts window on the Structure tab.

    Figure 4. Information on an incoming connection extracted from Windows Event Logs shown in Belkasoft X

    Analyzing SMB/Windows Admin Share

    RDP might be popular, but it is hardly the only technique adversaries employ for lateral movement. SMB/Windows Admin Share is another technique that is widely used. Threat actors use the SMB/Windows Admin Share technique during the reconnaissance phases of their attacks to learn more about potential targets in the network, especially if they already possess privileged credentials. The technique also comes in handy when attackers have to transfer their tools or malware from an initially compromised host to other hosts.

    The easiest way to uncover behavior pointing to SMB/Windows Admin Share exploitation is to search for c$, d$, or admin$ keywords. Digital forensics tools allow you to run searches against all records in the case. Here is an example of a c$ usage record found by Belkasoft X under the Recent inputs in the start menu prompt category.

    Figure 5. Evidence of a network share usage extracted by Belkasoft X

    If you know that the administrator account was compromised, you can also go into its registry file, examine the RunMRU key (which maintains the list of entries executed through Start > Run command), and check for entries with c$, d$, or admin$ keywords.

    Investigating PsExec and PowerShell usage

    When cyber attackers move laterally through networks, they often rely on executing scripts or malware on remote hosts, frequently using tools like PsExec and PowerShell.

    PsExec, a free Microsoft tool, allows users to run programs on remote computers. While it is a handy tool for system administrators to manage networked systems, it is also attractive to threat actors for its ability to execute commands, scripts, or binaries on remote systems.

    The popular adversary frameworks like Cobalt Strike use techniques similar to PsExec too. Actually, PsExec and corresponding Cobalt Strike modules use a mixture of two techniques: admin shares and new service creation.

    When a new service is created in a system, Windows generates logs for event ID 7045. Event ID 7045 corresponds to event ID 4697 in security events, and by examining it, you can find execution details. Belkasoft X has a section dedicated to entries with this ID. See System log, 7045 below.

    Figure 7. Evidence pointing to Cobalt Strike’s PsExec execution shown in Belkasoft X

    Another Cobalt Strike module similar to PsExec involves PowerShell, which is also quite popular among all sorts of threat actors. This module is known as psh_psexec. It got captured in the PowerShell Event logs and other logs in event ID 7045 from the system log:

    Figure 8. A service created by Cobalt Strike’s psh_psexec command

    These services are detected easily because recognizable names and arguments are used to start them. 

    Conclusion

    Most cyberattacks are characterized by activities involving lateral movement. In this phase, threat actors typically explore networks to find the most vulnerable elements. The techniques we reviewed in this paper see a lot of use, and the chances of you encountering themβ€”in an incident response engagementβ€”are pretty high.

    When you know where to look (sensitive locations and files from the registry and event logs) and use the right tools, uncovering lateral movement becomes more straightforward.

    The post Tracing the Steps of Cyber Intruders: The Path of Lateral Movement appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • To combat the misuse of commercial spyware, the United States Department of State has announced visa restrictions on 13 individuals linked to developing and selling these invasive technologies.

    This decision underscores a broader initiative by the U.S. government to address the proliferation of spyware that threatens personal privacy, national security, and human rights.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    Crackdown on Spyware Misuse

    Matthew Miller, the Department Spokesperson, revealed the new measures in a press statement dated April 22, 2024.

    These individuals and their immediate family members have been identified as critical players in the spyware industry, benefiting from or facilitating the misuse of technology that has targeted a wide range of individuals, including journalists, academics, human rights defenders, and U.S. government personnel.

    The misuse of commercial spyware has been a growing concern globally, with numerous reports highlighting how such tools have been used to infringe on personal freedoms and conduct espionage.

    The visa restrictions have been imposed under Section 212(a)(3)(C) of the Immigration and Nationality Act, following a policy approved by Secretary of State Antony Blinken in February 2024.

    This legal framework provides the U.S. with the authority to deny entry to individuals whose activities potentially threaten the country’s foreign policy interests.

    Broader U.S. Government Initiatives

    The announcement is part of a comprehensive U.S. strategy to curb the dangers posed by commercial spyware.

    This strategy includes visa restrictions, stringent export controls, sanctions, and the promotion of accountability measures.

    The U.S. government has also limited its use of commercial spyware, which poses risks to national security and human rights.

    The U.S. move to impose visa restrictions sends a strong message internationally about the seriousness with which it views the misuse of spyware.

    It also sets a precedent for other nations to implement similar measures to protect individuals from digital threats and uphold human rights standards.

    As the global landscape of technology and surveillance continues to evolve, the U.S. Department of State’s actions represent a critical step toward establishing a safer and more accountable digital environment.

    The focus now turns to how other countries will respond to this initiative and whether an international consensus can be reached to effectively regulate the use of commercial spyware.

    Free Webinar: Mastering Web Application and API Protection/WAF ROI Analysis -  Book Your Spot

    The post U.S. to Impose Visa Restrictions on 13 Individuals Involved in Commercial Spyware Operations appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and third-party dependencies to breach even the most formidable defenses. But what if you could turn the tables and proactively hunt these threats before they wreak havoc? We invite you to join us for an

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and third-party dependencies to breach even the most formidable defenses. But what if you could turn the tables and proactively hunt these threats before they wreak havoc? We invite you to join us for an

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breaches, there’s a larger, more pressing question: What is the true financial impact of a cyberattack? According to research by Cybersecurity Ventures, the global cost of cybercrime is projected to reach

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to end-to-end encryption (E2EE). They called on the industry and governments to take urgent action to ensure public safety across social media platforms. “Privacy measures currently being rolled out, such as end-to-end encryption, will stop tech companies

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ