InfoSec Articles (06/18/24 – 07/02/24)

Welcome to our biweekly cybersecurity roundup. In these weblog posts, we function curated articles and insights from specialists, offering you with worthwhile info on the newest cybersecurity threats, applied sciences, and finest practices to maintain your self and your group secure. Whether or not you’re a cybersecurity skilled or a involved particular person, our biweekly weblog put up is designed to maintain you knowledgeable and empowered.

For extra articles, try our #onpatrol4malware weblog.

Microsoft Alerts Extra Customers in Replace to Midnight Blizzard Hack

Supply: GBHackers

Microsoft has issued a brand new alert to its customers, updating them on the continued menace posed by Midnight Blizzard, a Russian state-sponsored hacking group also called NOBELIUM. Learn extra.

Distant entry large TeamViewer says Russian spies hacked its company community

Supply: TechCrunch

In an announcement Friday, the corporate attributed the compromise to government-backed hackers working for Russian intelligence, often called APT29 (and Midnight Blizzard). Learn extra.

New InnoSetup Malware Created Upon Every Obtain Try

Supply: ASEC

Not like previous malware which carried out malicious behaviors instantly upon being executed, this malware shows an installer UI and malicious behaviors are executed upon clicking buttons in the course of the set up course of. Learn extra.

Polyfill Provide Chain Assault Hits Over 100k Web sites

Supply: SECURITY WEEK

On Tuesday, safety researchers at Sansec and C/facet confirmed that the cdn.polyfill.io area is injecting malicious code into greater than 100,000 web sites which are utilizing it. Learn extra.

Medusa Reborn: A New Compact Variant Found

Supply: Cleafy

Analysing the evolution of Medusa samples over the previous few months, it’s clear that TAs goal to reinforce the effectivity of the accessible options whereas concurrently strengthening the botnet by refactoring the permissions required in the course of the set up section. Learn extra.

UAC-0184 Abuses Python in DLL Sideloading for XWORM Distribution

Supply: CYBLE

CRIL just lately noticed a malware marketing campaign concentrating on Ukraine utilizing the Distant Entry Trojan (RAT) often called XWorm. Upon investigation, it was discovered that this marketing campaign is related to the Menace Actor (TA) group UAC-0184. Learn extra.

New safety loophole permits spying on web customers visiting web sites and watching movies

Supply: Tech Xplore

No malicious code is required to take advantage of this vulnerability, often called “SnailLoad,” and the info site visitors doesn’t have to be intercepted. All sorts of finish gadgets and web connections are affected. Learn extra.

Cyber assault compromised Indonesia information centre, ransom sought

Supply: Reuters

A cyber attacker compromised Indonesia’s nationwide information centre, disrupting immigration checks at airports, and requested for an $8 million ransom, the nation’s communications minister instructed Reuters on Monday. Learn extra.

CDK International outage attributable to BlackSuit ransomware assault

Supply: BLEEPING COMPUTER

The negotiations come after the BlackSuit ransomware assault pressured CDK to close down its IT techniques and information facilities to stop the assault’s unfold, together with its automotive dealership platform. The corporate tried restoring providers on Wednesday however suffered a second cybersecurity incident, inflicting it to close down all IT techniques once more. Learn extra.

Fickle Stealer Distributed by way of A number of Assault Chain

Supply: FORTINET

In Might 2024, FortiGuard Labs noticed a Rust-based stealer. Along with its intricate code, the stealer is distributed utilizing quite a lot of methods and has a versatile manner of selecting its goal. Due to this ambiguity, we determined to name it Fickle Stealer. Learn extra.

Leave a Reply

Your email address will not be published. Required fields are marked *