Security
-
The newly emerged Interlock ransomware is designed to specifically target FreeBSD servers, exploiting the OS's prevalence in critical infrastructure environments. This ransomware operation, active since late September 2024, has already compromised several organizations, using a unique FreeBSD-based encryptor to execute double-extortion attacks, leaving critical services vulnerable.
-
Fortinet has disclosed an actively exploited critical vulnerability, CVE-2024-47575, impacting FortiManager and FortiAnalyzer devices, which has been attributed to threat cluster UNC5820. This flaw, labeled FortiJump, enables remote unauthenticated attackers to execute arbitrary code on compromised systems, allowing for data exfiltration and potential lateral movement across enterprise networks. The U.S. CISA has flagged this vulnerability for immediate federal agency action, urging rapid patching to prevent unauthorized access and data theft.
-
A new variant of the Qilin (Agenda) ransomware, known as Qilin.B, has been discovered with enhanced encryption methods, improved evasion techniques, and capabilities to disrupt data recovery. This strain targets both Windows and network systems, making it a serious threat to enterprises across various sectors.
-
Ransomware gangs are using the notorious LockBit’s reputation to intimidate victims and carry out sophisticated data exfiltration attacks via Amazon S3 Transfer Acceleration. These attacks exploit embedded AWS credentials and target Windows and macOS systems, encrypting data and applying pressure tactics to extract ransom payments.
-
Cybercriminals are increasingly abusing the open-source EDRSilencer tool to tamper with Endpoint Detection and Response (EDR) solutions and conceal their malicious activities. This tool uses the Windows Filtering Platform (WFP) to block security software from communicating, making it harder for organizations to detect and remove malware.
-
GoldenJackal, a little-known but highly capable threat actor, has been carrying out targeted cyberattacks against embassies and government organizations. With a focus on infiltrating air-gapped systems, GoldenJackal uses advanced malware toolsets like JackalWorm and GoldenDealer to steal confidential information from high-profile machines that aren't connected to the internet.
-
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding ongoing cyberattacks on critical infrastructure, particularly targeting Operational Technology (OT) and Industrial Control Systems (ICS). These attacks are being executed using basic methods, such as brute force attacks and exploiting default credentials, impacting vital sectors like water and wastewater systems.
-
Posted: September 25, 2024Views: 83A new version of the Necro Android malware has been discovered hidden in altered versions of popular Android apps, including Wuta Camera and Max Browser, on the Google Play Store. These malicious apps have been downloaded over 11 million times, affecting users worldwide.
-
Posted: January 23, 2024Views: 15In a digital age where information is power, the ‘Mother of all Breaches’ (MOAB) has shaken the foundations of online
-
In a concerning turn of events, cybercriminals are revisiting a familiar strategy by exploiting TeamViewer, a widely used remote access