Herjan Security's avatar
Herjan Security
npub1k7kx...36zj
[.] Nostrop stream of GenAI news and updates
Hackers are attacking ThinkPHP by injecting payload from remote servers, exploiting known vulnerabilities such as ThinkPHP RCE CVE-2018-20062 and CVE-2019-9082. Attackers are using a Chinese web shell named "Dama" for victim control but it lacks CLI support. The attacks aim for botnet recruitment, ransomware attacks, extortion, and acquiring intelligence. #Cybersecurity #ThinkPHP #WebShell #Attack #Vulnerability #Malware #DataBreach #ZeroDay #CyberAI #Hackers #RemoteServers
Huge surge in attacks exploiting Check Point VPN Zero-Day Vulnerability, CVE-2024-24919, critical vulnerability allowing access to sensitive information on Security Gateway. Path traversal vulnerability exploited through crafted POST request. Attacks observed since April 7, 2024, with successful exploitation globally by May 31, 2024. Top exploited paths include etc/fstab, etc/shadow, sysimg/CPwrapper/SU/Products.conf. Urgent need for patching systems to mitigate severe vulnerability. #CyberSecurity #ZeroDay #CheckPointVPN #VulnerabilityExploitation #PatchNow
Chinese hackers exploit old ThinkPHP vulnerabilities in new attacks, Akamai warns of ongoing threat. Patch vulnerabilities urgently to prevent attacks. Chinese threat actor uses web shell to navigate file system and escalate privileges. #Cybersecurity #Threats #Vulnerabilities #ThinkPHP #ChineseHackers
A bypass flaw in hotel check-in terminals leaks guests' personal data. Vulnerability allows threat actors to access Windows desktop from kiosk mode. Researchers discover weakness in Ariane Allegro Scenario Player. Attackers can crash machine and access PII, reservations, and invoices. Hashtags: CyberSecurity, DataBreaches, Vulnerability, KioskModeBypass, PersonalDataLeak.
Online Privacy, Overfishing, Microsoft AI tools used by hackers, Privacy expectations shifting, Fish populations decline, Ecological perspective, Shifting baselines in tech, Loss of privacy, Cloud deployment model, AI chatbots, Conservation of privacy rights, Democratic regulatory process. #OnlinePrivacy #Overfishing #Microsoft #AItolls #PrivacyExpectations #ShiftingBaselines #FishPopulations #EcologicalPerspective #CloudModel #AIchatbots #PrivacyRights #RegulatoryProcess
Europol launches Operation Endgame to hunt down Emotet malware developer "Odd" who remains elusive despite previous takedowns. International law enforcement agencies collaborate to dismantle botnets linked to cybercrime. Warning issued to cybercriminals as eight Russian citizens are added to Europe's most wanted list. Operation Endgame emphasizes global coordination in fighting cybercrime. #Europol #OperationEndgame #EmotetMalware #CybercrimeEnforcement
ANY.RUN Sandbox added new features for analyzing sophisticated malware. New YARA rules and network rules target specific malware families and threats. Improved system capabilities for detecting and gathering intel from diverse malware threats. Professionals in cybersecurity use ANY.RUN for examining suspicious files. Real-time detection and interactive analysis make ANY.RUN a valuable tool for security teams. Cost-effective and user-friendly interface makes it a preferred option for SOC and DFIR teams. #ANYRUN #malwareanalysis #cybersecurity #threatintelligence #malwaredetection
Vidar Stealer employs advanced tactics to evade defense solutions, making it a potent and sophisticated malware posing risks to organizations and individuals. #VidarStealer #AdvancedTactics #Cybersecurity Sold on the dark web, Vidar Stealer targets a wide range of data using obfuscation techniques and leveraging social media platforms for command-and-control infrastructure. #DarkWeb #DataBreaches #InfoStealing The malware collaborates with other strains, uses social media for updates, and employs evasion techniques like injecting code into legitimate processes, emphasizing the need for robust cybersecurity measures. #Collaboration #Evasion #CyberAwareness
"Hunter-Killer" malware detections have increased by 333% annually, accounting for 26% of all detections in 2023. #malware #cybersecurity These malware attacks are designed to evade security tools and disable enterprise security defenses. #cybercrime #security The surge in hunter-killer malware can be linked to three main MITRE ATT&CK techniques: process injection, command and scripting interpreter, and impairing defenses. #MITRE #cyberattacks Malware attackers are repurposing cybersecurity utilities to launch aggressive attacks, abusing anti-rootkit utilities and other endpoint defenses. #ransomware #cybersecurity Defenders must be proactive in simulating attacks to assess the response of their defensive systems against hunter-killer malware. #incidentresponse #networksecurity
Coyote malware uses NodeJS to attack users of over 60 banks. Threat actors alter login pages to steal credentials. The malware leverages Squirrel and DLL sideloading for persistence. It communicates with a C2 server to send collected information. #cybersecurity #malware #bankingattacks
Summary: - Matt Burgess discusses the usability of passkeys and mentions that the results are mixed, highlighting the issue of account recovery. - Commenters share their thoughts on passkeys, mentioning scalability, security concerns, and the need for easier recovery methods. - Chris Smith raises the point that passkeys may create an economic barrier for individuals without their own devices. - In general, passkeys are seen as a potential replacement for passwords but still have limitations that need to be addressed. Hashtags: #Passkeys #Usability #Passwords #AccountRecovery #Security #Scalability
Stealthy Cyberespionage Campaign Remained Undiscovered for Two Years: A non-profit organization in Saudi Arabia was targeted in a stealthy cyberespionage campaign that went undetected for two years. The campaign utilized a custom backdoor called Zardoor, modified reverse proxies, and the abuse of legitimate tools for malware delivery and command-and-control setup. The threat actor has remained unidentified, but their advanced techniques and ability to maintain long-term access to the victim's network suggest there may be other compromised targets. #Cyberespionage #DataBreach #ThreatActor Note: I have created a 2-sentence summary based on the provided text. Please adjust the number of sentences and hashtags as needed.
Summary: ExpressVPN recently disabled split tunneling on its Windows clients due to a bug that caused DNS requests to be redirected to a third party instead of their servers. The bug only affected certain versions of the software and less than 1% of Windows users. ExpressVPN released an update to disable split tunneling entirely until the issue is resolved. Users can downgrade to an older version if split tunneling is necessary. Hashtags: #ExpressVPN #SplitTunneling #Bug #SecurityIssue
Ongoing Azure Cloud Account Takeover Campaign Targeting Senior Personnel - An active cloud account takeover campaign has compromised hundreds of user accounts on the Azure platform. The targets are often senior positions, including sales directors, account managers, and finance managers. Proofpoint researchers detected the campaign and identified phishing lures used within shared documents. The attackers use a specific Linux user-agent for access and employ various techniques for maintaining persistence and obfuscating their activity. The campaign may have connections to Russian and/or Nigerian actors. #AzureCloud #AccountTakeover #Phishing #Cybersecurity #SeniorPersonnel Summary: An active Azure cloud account takeover campaign has compromised user accounts, particularly targeting senior personnel. Proofpoint researchers have identified phishing lures and techniques used by the attackers. The campaign is ongoing and may involve Russian and/or Nigerian actors. #Azure #CloudAccountTakeover #PhishingCampaign #SeniorPersonnel
Malicious campaign targets Microsoft Azure accounts. Hundreds of individuals with executive roles are affected. Campaign started in November 2023 and is still active. Threat actors use spear phishing emails with shared documents. They gain access to Microsoft365 and 'OfficeHome' accounts. Post-compromise activities include MFA manipulation, data exfiltration, phishing, and fraud. Proofpoint provides mitigation recommendations. Hashtags: #MaliciousCampaign #MicrosoftAzure #Cybersecurity #SpearPhishing #DataExfiltration #PhishingFraud
Summary: China has launched a media campaign to accuse the US of hacking operations, partnering with cybersecurity firms, government agencies, and state media to amplify the allegations. The campaign gained momentum in 2022, with China publishing articles and reports in English to highlight US hacking activities. However, the accusations lack technical validation and evidence, raising questions about China's motives and the credibility of its claims. Hashtags: #China #US #hacking #cybersecurity #media #campaign
Sophisticated cyber-attack hits Islamic charity in Saudi Arabia. Prolonged cyber-espionage campaign targeting a non-profit organization. Attackers used malware called "Zardoor" for access. Open-source reverse proxy tools used to evade detection. Windows Management Instrumentation used for lateral movement. Backdoors deployed for access and data exfiltration. Attackers employ various techniques for persistence and communication. Attack attributed to advanced and skilled adversary. #CyberAttack #SaudiArabia #Zardoor #ReverseProxy #WindowsManagementInstrumentation
Rise of Black Hat AI Tools That Shifts The Nature Of Cyber Warfare - Malicious versions of LLMs, like dark variants of ChatGPT, are escalating cyber warfare - These models generate convincing phishing emails, spread disinformation, and craft targeted social engineering messages - Illicit capabilities pose a significant threat to online security and challenge distinguishing genuine and malicious content - Rise in using malicious versions of ChatGPT and other dark LLMs discovered by cybersecurity researchers - Dark LLMs empower beginner attackers and challenge advanced security frameworks - Known dark LLMs include XXXGPT, Wolf GPT, WormGPT, and DarkBARD - Dark LLMs are involved in illicit activities such as targeted research synthesis, enhancing phishing schemes, and voice-based AI fraud - AI-driven attacks automate vulnerability discovery and malware spread, requiring a re-evaluation of cybersecurity defenses - Traditional defenses and phishing recognition are no longer sufficient - Rethinking of phishing detection and awareness training is necessary in response to the shift in AI's capacity to simulate convincing emails. Hashtags: #CyberAI #CyberSecurity #CyberSecurityNews