CyberSecurity SEE

How one access broker gets its initial access – it’s through novel phishing. Be alert for deepfakes, US authorities say. The Pentagon’s new cyber strategy. And a reminder: yesterday was Patch Tuesday.

How one access broker gets its initial access – it’s through novel phishing. Be alert for deepfakes, US authorities say. The Pentagon’s new cyber strategy. And a reminder: yesterday was Patch Tuesday.

An access broker’s phishing campaign has facilitated a recent surge in ransomware attacks, according to a report by Microsoft Security. The malware distributor, known as Storm-0324, has been responsible for enabling ransomware actors to gain unauthorized access to victims’ systems. The ransomware attacks have been particularly alarming due to the use of 3AM, a new ransomware family that acts as a fallback when initial attempts using the LockBit ransomware fail.

In a related development, Orca Security has discovered cross-site-scripting (XSS) vulnerabilities in Apache services, particularly in Azure HDInsight. These vulnerabilities have allowed malicious actors to inject and execute arbitrary code in targeted web applications, potentially leading to further security breaches and data leaks. Organizations using Apache services are advised to patch their systems promptly to address these vulnerabilities and minimize the risk of exploitation.

Meanwhile, US agencies are warning organizations to remain vigilant against the growing threat of deepfakes. The US Department of Defense recently published its 2023 Cyber Strategy, which includes a detailed analysis of the risks associated with deepfake technology. Deepfakes have the potential to deceive individuals by presenting falsified digital content, such as videos or audio recordings, that appear convincingly real. This poses a significant challenge for organizations, as deepfakes can be used to manipulate public opinion, spread disinformation, and even deceive individuals for financial gain or malicious purposes. The Department of Defense emphasizes the importance of enhancing deepfake detection capabilities and developing effective countermeasures to mitigate the impact of this emerging technology.

In a recent episode of the Afternoon Cyber Tea podcast, Ann Johnson discussed the rising prevalence of social engineering attacks with Jenny Radcliffe, an expert in the field. They highlighted the increasing sophistication of social engineering techniques, including the use of psychological manipulation and the exploitation of human vulnerabilities. Johnson emphasized the importance of promoting cybersecurity awareness among individuals, as well as implementing robust security measures and training programs within organizations to mitigate the risk of social engineering attacks.

On the technical front, Deepen Desai from Zscaler provided a detailed analysis of Bandit Stealer, a prevalent malware strain that targets users’ sensitive information. Bandit Stealer infects devices through malicious email attachments or by exploiting vulnerabilities in software. Once installed, it steals sensitive data such as login credentials, financial information, and cryptocurrency wallets. Desai’s analysis highlights the complex mechanisms employed by Bandit Stealer, including the use of anti-analysis techniques and command-and-control (C2) infrastructure to evade detection and maintain persistence on infected devices. Users and organizations are advised to adopt comprehensive security measures, including regular software updates and strong anti-malware solutions, to protect against this threat.

Additionally, it is important to note that yesterday was Patch Tuesday, an event when software vendors release security updates addressing known vulnerabilities in their products. This month’s Patch Tuesday included several critical updates from Microsoft, Adobe, Apple, and SAP. Among the updates, Microsoft addressed two zero-day vulnerabilities that had been actively exploited by attackers. These vulnerabilities, designated as CVE-2023-26369 and CVE-2023-36761, could allow remote code execution or privilege escalation if left unpatched. Adobe also released security updates for multiple products, including Acrobat and Reader, to address a critical zero-day vulnerability that had been exploited in attacks. Apple released security updates for iOS and macOS, while SAP issued its monthly security patch for September 2023. Users and organizations are strongly advised to install these updates promptly to mitigate the risk of exploitation.

In conclusion, the cybersecurity landscape continues to evolve, with threat actors employing increasingly sophisticated tactics to exploit vulnerabilities and compromise systems. The recent developments discussed here underline the importance of remaining vigilant, implementing robust security measures, promptly patching software, and promoting cybersecurity awareness across individuals and organizations.

Source link

Exit mobile version