• Explore
  • Blog
  • Podcast
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • About
  • Services
  • Contact

February 2025 - ExploreSec Cybersecurity Awareness newsletter

February 4, 2025

This is a security awareness focused newsletter that I share internally. Feel free to grab and use for your own internal security awareness program. Created with help from ChatGPT.

How HIPAA Security Rule Updates Could Impact Healthcare Employees 

The U.S. Department of Health and Human Services (HHS) has proposed significant updates to the HIPAA Security Rule, aiming to enhance the protection of electronic protected health information (ePHI). These changes, the first major revision since 2013, will have implications for individuals working in healthcare organizations. 

What You Need to Know: 

  • New Security Measures: Employees will be required to use multifactor authentication (MFA) for accessing systems containing ePHI. This adds an extra layer of security by requiring a second verification step, such as a code sent to your phone or email. 

  • Improved Data Encryption: All ePHI must be encrypted, meaning employees may encounter updated tools or workflows for handling sensitive information securely. 

  • Annual Audits: Organizations will perform regular audits to ensure compliance with the updated rules. Employees may be asked to participate in training or assessments to demonstrate understanding of security policies. 

Why It Matters to You: 

These updates are designed to strengthen defenses against data breaches and ensure the safety of patient information. As healthcare professionals, compliance with these measures not only protects patient data but also safeguards the organization from potential penalties and operational disruptions. 

The proposed rule will be open for public comment starting January 6, 2025. Employees should stay informed about the changes and prepare for any updates to internal policies and procedures. 

Further Reading: Dark Reading 

 

 

Phishing Campaign Delivers ConnectWise RAT via Spoofed Social Security Emails 

A recent phishing campaign has been identified wherein attackers impersonate the U.S. Social Security Administration to distribute the ConnectWise Remote Access Trojan (RAT). 

Key Developments: 

  • Spoofed Emails: Beginning in September 2024, fraudulent emails masquerading as official communications from the Social Security Administration were disseminated, claiming to provide updated benefits statements. These emails contained links designed to deceive recipients into downloading malicious software. 

  • Malware Delivery Mechanism: The embedded links directed users to a ConnectWise RAT installer. Initially, the campaign utilized ConnectWise infrastructure for command and control (C2) operations but later transitioned to dynamic DNS services and domains controlled by the threat actors. 

  • One-Time Use Links: The malicious links employed a one-time-use mechanism, redirecting users to the malware installer upon first access and subsequently to the legitimate Social Security Administration website on further attempts. This tactic complicates detection and analysis efforts. 

  • Timing and Volume: The campaign's activity surged in early to mid-November, peaking around Election Day, suggesting a potential link to the political climate during that period. 

Further Reading: GBHackers 

 

 

Phishing Campaign Targets Gamers with Fake Video Game Testing Offers 

Cybercriminals are employing deceptive emails that promise opportunities to test new video games, aiming to steal personal information and credentials from unsuspecting gamers. 

Key Details: 

  • Deceptive Invitations: Victims receive emails inviting them to participate in exclusive game testing, often for highly anticipated titles. 

  • Malicious Links: These emails contain links to counterfeit websites designed to mimic legitimate gaming platforms, prompting users to enter sensitive information. 

  • Data Theft: Information entered on these fake sites is harvested by attackers for malicious purposes, including identity theft and unauthorized account access. 

Further Reading: KnowBe4 Blog 

 

 

New 'US Cyber Trust Mark' Labels to Identify Secure Smart Devices 

The U.S. government has introduced the 'US Cyber Trust Mark,' a voluntary labeling initiative to help consumers identify smart devices that meet federal cybersecurity standards. 

Key Details: 

  • Purpose: The label aims to guide consumers in selecting internet-connected devices—such as baby monitors, home security cameras, and fitness trackers—that are less susceptible to hacking. 

  • Label Features: Devices meeting the standards will display a distinctive shield logo and include QR codes. Scanning the QR code provides detailed security information about the product. 

  • Availability: Products bearing the 'US Cyber Trust Mark' are expected to be available later this year, as manufacturers begin submitting devices for approval. 

  • Industry Participation: Companies including Amazon, Best Buy, Google, LG Electronics USA, Logitech, and Samsung have expressed support for the initiative. 

Implications for Consumers: 

With the average American household containing numerous internet-connected devices, each potentially serving as an entry point for cybercriminals, this labeling system offers a straightforward method to assess the cybersecurity of products before purchase. 

Further Reading: SecurityWeek 

 

 

PowerSchool Software Cyberattack Potentially Affects 45 Million U.S. Students 

A recent cyberattack targeting PowerSchool, a widely used student information system in K-12 schools across the United States, has led to a significant data breach. This incident may impact over 45 million students and educational staff nationwide. 

Key Details: 

  • Compromised Data: The breach has exposed sensitive information, including grades, attendance records, medical histories, Social Security numbers, student profiles, and communications between parents and educators. 

  • Potential Risks: The stolen data could be exploited for malicious activities such as phishing attempts, identity theft, and unauthorized access to personal and financial information. 

  • Regional Impact: Schools in North Dakota, including West Fargo Public Schools, have notified parents about the breach, indicating that the incident may have far-reaching implications across various educational districts. 

Further Reading: Cybersecurity Insiders 

 

 

Data Breach at Leading U.S. Addiction Treatment Provider 

BayMark Health Services, the largest provider of substance use disorder treatment in North America, has reported a data breach potentially compromising patient personal and health information. 

Key Details: 

  • Incident Timeline: Unauthorized access to BayMark's systems occurred between September 24 and October 14, 2024. The breach was discovered on October 11, leading to immediate actions to secure systems and involve third-party forensic experts. 

  • Compromised Information: While the exact data types accessed have not been publicly detailed, such breaches typically involve personal identifiers and health-related information. 

  • Patient Notification: BayMark is in the process of notifying affected individuals and has stated that it will offer complimentary credit monitoring and identity protection services to those impacted. 

Further Reading: BleepingComputer 

 

 

Sophisticated Voice Phishing Scams Exploit Apple and Google Services 

Recent investigations have uncovered that cybercriminals are leveraging legitimate Apple and Google services to execute advanced voice phishing (vishing) attacks, deceiving users into divulging sensitive information. 

Key Details: 

  • Exploiting Legitimate Services: Attackers initiate contact through genuine Apple and Google communication channels, such as Google Assistant and Apple's support lines, making the interactions appear authentic. 

  • Manipulating System Notifications: By abusing these services, scammers can trigger legitimate system-level messages, emails, and automated phone calls, adding credibility to their fraudulent schemes. 

  • Case Example: In one instance, a cryptocurrency investor was deceived into transferring over $4.7 million after receiving what seemed to be legitimate communications from Google and Apple, orchestrated by the attackers. 

Recommendations: 

  • Verify Contacts: Be cautious of unsolicited communications claiming to be from Apple or Google. Always verify the authenticity of such interactions by contacting the company directly through official channels. 

  • Protect Personal Information: Never share sensitive information, such as passwords or financial details, over the phone or through unsolicited messages. 

  • Stay Informed: Familiarize yourself with common phishing tactics and remain vigilant for signs of fraudulent activity. 

Further Reading: Krebs on Security 

 

 

OneBlood Confirms Data Breach Following Ransomware Attack 

OneBlood, a prominent not-for-profit blood donation organization serving over 250 hospitals across the United States, has confirmed that personal information of donors was compromised during a ransomware attack in July 2024. 

Key Details: 

  • Incident Timeline: Unauthorized access to OneBlood's network occurred between July 14 and July 29, 2024. The breach was discovered on July 28, prompting immediate containment measures. 

  • Compromised Information: The attackers accessed and copied files containing personal data, including names and Social Security numbers. OneBlood has begun notifying affected individuals and is offering complimentary credit monitoring services. 

  • Operational Impact: The ransomware attack led to the encryption of virtual machines, forcing OneBlood to revert to manual processes for blood collection, testing, and distribution. This disruption resulted in delays and shortages, prompting urgent calls for donations, particularly of O Positive, O Negative, and Platelet blood types. 

Further Reading: BleepingComputer 

 

 

Phishing Campaigns Exploit YouTube Links and Microsoft 365 Themes 

Cybercriminals are deploying sophisticated phishing attacks targeting Microsoft 365 users by utilizing deceptive URLs that closely resemble legitimate Office 365 domains. These attacks often involve claims of imminent password expiration to create urgency, prompting users to click on malicious links. 

Key Developments: 

  • Deceptive URLs: Attackers craft URLs that appear to be legitimate, incorporating prefixes like "youtube.com" followed by obfuscation characters or using the "@" symbol to redirect users to malicious domains while maintaining a facade of legitimacy. 

  • Social Engineering Tactics: Phishing emails are designed to induce panic by falsely claiming that the recipient's password has expired, urging immediate action. The emails contain malicious buttons labeled to appear as legitimate account maintenance actions. 

  • Obfuscation Techniques: The use of "%20" for HTML space encoding and the "@" symbol in URLs helps attackers conceal the true destination of the links, making it challenging for users to identify the threat. 

Further Reading: GBHackers 

 

 

Phishing Texts Target Apple iMessage Users by Disabling Link Protections 

Cybercriminals are employing a new tactic to deceive Apple iMessage users into disabling built-in phishing protections, thereby exposing them to potential scams. 

Key Details: 

  • Disabled Links for Unknown Senders: Apple's iMessage automatically disables links in messages received from unknown senders to protect users from potential phishing attacks. 

  • Deceptive Tactics: Recent smishing (SMS phishing) attacks have been observed where attackers send messages prompting users to reply with "Y" or another response. This action re-enables the disabled links, making users susceptible to malicious websites. 

  • Common Scenarios: Examples include fake shipping issue notifications or unpaid toll alerts, urging immediate action and instructing users to reply to the message to resolve the fabricated issue. 

Recommendations: 

  • Avoid Responding to Unknown Messages: Do not reply to messages from unknown senders, especially those prompting you to take specific actions. 

  • Verify Sender Authenticity: If a message claims to be from a legitimate organization, contact the entity directly using official channels to confirm the message's legitimacy. 

  • Maintain Built-in Protections: Refrain from actions that disable iMessage's security features, such as replying to suspicious messages or adding unknown contacts without verification. 

Stay Vigilant: Always exercise caution when receiving unsolicited messages, and be aware of tactics that attempt to bypass security measures designed to protect your personal information. 

Further Reading: BleepingComputer 

 

 

Surge in Phishing Scams Exploiting California Wildfires 

As California confronts devastating wildfires, cybercriminals are exploiting the crisis by launching phishing scams targeting affected individuals and those seeking to assist. 

Key Insights: 

  • Emergence of Suspicious Domains: Within a 72-hour period, multiple domains mimicking official services related to the wildfires have been registered. Examples include malibu-fire[.]com and fire-relief[.]com. These domains are likely intended for phishing attacks, fake donation requests, and malicious downloads. 

  • Tactics Employed by Scammers: Attackers are creating domains that resemble legitimate services or agencies, distributing phishing emails urging recipients to click on fraudulent links, and using social engineering techniques to create a sense of urgency, such as fake donation drives or critical safety alerts. 

Recommendations: 

  • Verify Authenticity: Before engaging with any disaster-related communications or websites, confirm their legitimacy through official channels. 

  • Be Cautious with Donations: When donating to relief efforts, use established and reputable organizations. Avoid unsolicited requests for donations, especially those asking for unusual payment methods. 

  • Stay Informed: Keep abreast of common phishing tactics and remain vigilant for signs of fraudulent activity, particularly during disaster situations. 

Further Reading: Veriti Blog 

 

 

U.S. Sanctions Target North Korean IT Worker Network 

The U.S. Treasury Department has imposed sanctions on a network of individuals and front companies associated with North Korea's Ministry of National Defense, aiming to disrupt revenue streams generated through illicit remote IT work schemes. 

Key Insights: 

  • Entities Sanctioned: The Office of Foreign Assets Control (OFAC) has designated North Korean front companies Korea Osong Shipping Co. (Osong) and Chonsurim Trading Corporation (Chonsurim), along with their presidents, Jong In Chol and Son Kyong Sik. Additionally, Chinese firm Liaoning China Trade has been sanctioned for supplying electronics equipment to North Korea's Department 53, a weapons-trading entity that also operates IT and software development front companies. 

  • Revenue Generation Tactics: North Korea employs thousands of IT workers who conceal their identities to secure employment with companies abroad. The earnings from these positions are funneled back to the regime, supporting its illegal weapons programs and contributing to destabilizing activities, including support for Russia's war in Ukraine. 

  • Legal Implications: As a result of these sanctions, U.S. individuals and organizations are prohibited from engaging in transactions with the designated entities and individuals. Furthermore, any assets linked to them within U.S. jurisdiction are subject to freezing. 

Further Reading: BleepingComputer 

 

 

Cybercriminals Exploit Fake Google Ads to Hijack Advertiser Accounts 

Cybercriminals are conducting a sophisticated malvertising campaign targeting Google Ads users by deploying fraudulent advertisements that impersonate legitimate Google Ads services. This tactic aims to steal advertiser account credentials, leading to unauthorized access and potential misuse of advertising budgets. 

Key Insights: 

  • Impersonation of Google Ads: Attackers create deceptive ads that appear to be official Google Ads promotions. When clicked, these ads redirect users to counterfeit login pages designed to harvest Google account credentials. 

  • Use of Google Sites for Phishing: The fraudulent ads often lead to phishing pages hosted on Google Sites, lending an air of legitimacy and making detection more challenging. These pages are crafted to closely mimic authentic Google login interfaces. 

  • Credential Theft and Account Compromise: Once users enter their credentials on these fake pages, attackers gain unauthorized access to their Google Ads accounts. This access can be exploited to run malicious ad campaigns, deplete advertising budgets, or sell the compromised accounts on blackhat forums. 

Recommendations: 

  • Verify Ad URLs: Before clicking on any Google Ads-related advertisements, hover over the link to inspect the URL. Ensure it directs to an official Google domain. 

  • Enable Multi-Factor Authentication (MFA): Implement MFA on your Google accounts to add an extra layer of security, making unauthorized access more difficult even if credentials are compromised. 

Further Reading: Malwarebytes 

 

 

Ransomware Gangs Exploit Microsoft Teams by Impersonating IT Support 

Cybersecurity researchers have identified ransomware groups, including Black Basta, using Microsoft Teams to impersonate IT support and gain unauthorized access to corporate networks. 

Key Insights: 

  • Email Bombardment: Attackers flood employee inboxes with non-malicious emails to create confusion and urgency. 

  • Fake IT Support: Posing as help desk personnel, attackers use Teams to contact employees and build trust. 

  • Remote Access: Victims are tricked into installing remote tools, enabling ransomware deployment and network access. 

Further Reading: BleepingComputer 

 

Introducing 'Identity Check' 

Google has recently unveiled a new security feature for Android devices called "Identity Check," designed to bolster protection against unauthorized access, especially in the event of device theft. This feature mandates biometric authentication—such as fingerprint or facial recognition—to access sensitive settings when the device is outside of trusted locations like home or work. 

Key Highlights: 

  • Biometric Verification: Critical actions, including changing the device's PIN, disabling theft protection, turning off 'Find My Device,' performing a factory reset, and modifying biometric data, now require biometric authentication when the device is in untrusted locations. 

  • Trusted Locations: Users can designate specific areas, such as home or workplace, as trusted locations. Outside these zones, the enhanced security measures are activated to prevent unauthorized access. 

  • Device Compatibility: Initially, 'Identity Check' is available on Google Pixel devices running Android 15 and Samsung Galaxy devices with One UI 7. Plans are underway to extend this feature to other manufacturers' devices later this year. 

Further Reading: BleepingComputer 

 

 

Banshee Stealer Targets macOS Users 

A sophisticated malware known as "Banshee Stealer" is actively targeting macOS users, posing significant risks to personal and financial data. 

Key Details: 

  • Stealthy Operation: Banshee operates undetected, blending seamlessly with normal system processes while stealing browser credentials, cryptocurrency wallets, user passwords, and sensitive file data. 

  • Distribution Methods: The malware is distributed through phishing websites and malicious GitHub repositories, posing as popular software tools such as Chrome, Telegram, and TradingView. 

Protective Measures: 

  • Verify Software Sources: Only download software from official and reputable sources. Be cautious of unsolicited links or prompts to install applications. 

  • Update Security Systems: Ensure your macOS and security software are up-to-date to detect and prevent the latest threats. 

  • Monitor for Suspicious Activity: Regularly check for unusual system behavior or unauthorized access to accounts. 

Further Reading: Check Point Research 

 

 

Texas Investigates Automakers Over Consumer Data Practices 

Texas has broadened its investigation into how automakers collect, use, and share consumer data from modern connected vehicles. The focus is on whether manufacturers are obtaining proper consent, how data is shared with third parties, and whether it is being sold without transparency. This follows growing concerns over privacy risks associated with the data generated by advanced vehicle technologies. 

Key Insights: 

  • Automakers Under Scrutiny: Texas is investigating Ford, Hyundai, Toyota, and Fiat Chrysler over data collection, sharing, and sales practices. 

  • Data Concerns: The focus includes how consumer data is collected, shared with third parties, and whether consumer consent is obtained. 

  • Legal Background: This expands on previous investigations and lawsuits, including action against General Motors for alleged unauthorized data sales. 

Further Reading: Malwarebytes News 

 

 

Phishing Campaign Exploits Legitimate Services to Send Fraudulent PayPal Requests 

A recent phishing campaign has been identified that abuses legitimate services to send fraudulent PayPal payment requests, aiming to deceive recipients into compromising their accounts. 

Key Insights: 

  • Methodology: Attackers register free Microsoft 365 test domains and create distribution lists containing target email addresses. They then use these lists to send payment requests via PayPal's web portal. 

  • Deceptive Tactics: Recipients receive a legitimate-looking PayPal payment request. Clicking the link directs them to a PayPal login page displaying the payment request. If the recipient logs in, their PayPal account becomes linked to the scammer's account, potentially granting the attacker unauthorized access. 

Further Reading: KnowBe4 Security Awareness Training Blog 

 

 

Malicious WordPress Plugin Assists in Phishing Attacks 

A newly identified malicious WordPress plugin is being exploited by attackers to conduct phishing campaigns. This plugin allows cybercriminals to send phishing emails from compromised WordPress sites, emphasizing the need for vigilance in securing web platforms and carefully managing plugins. 

Key Insights: 

  • The malicious plugin facilitates phishing attacks by using compromised websites to send emails to targets. 

  • Regular audits of WordPress sites and plugin installations are essential for mitigating such threats. 

  • Ensuring plugins are sourced from trusted providers can help reduce the risk of exploitation. 

Further Reading: Malicious WordPress Plugin Assists in Phishing Attacks 

 

 

Insurance Company Accused of Using Secret Software to Illegally Collect and Sell Location Data 

A prominent insurance company is under scrutiny for using secret software to collect and sell location data on millions of Americans without their knowledge or consent. This case raises serious concerns about privacy violations and the unethical use of personal data for profit. It serves as a reminder of the importance of transparency and consent in handling personal information, particularly when it comes to sensitive data like location tracking. 

Key Insights: 

  • The insurance company allegedly used secret software to gather location data from individuals without their consent. 

  • The collected data was sold, violating privacy laws and raising ethical concerns about data exploitation. 

  • Organizations must prioritize transparency and user consent when collecting and using personal data to avoid legal and reputational risks. 

Further Reading: Malwarebytes 

 

 

Google Chrome AI Extensions Deliver Info-Stealing Malware in Broad Attack 

A new wave of cyberattacks is targeting Google Chrome users through AI-powered extensions that deliver information-stealing malware. These malicious extensions are designed to steal sensitive data, including login credentials and financial information, from unsuspecting victims. The attack highlights the growing threat posed by browser extensions and the need for users to exercise caution when installing third-party software. 

Key Insights: 

  • AI-powered Chrome extensions are being used to deliver info-stealing malware, potentially compromising users' personal and financial information. 

  • The use of AI in these extensions makes them more difficult to detect and mitigate. 

  • Users should carefully vet any browser extensions they install and prioritize security practices such as using trusted sources and multi-factor authentication. 

Further Reading: Malwarebytes 

 

  

Phishing Campaign Targets Mobile Banking Users with Sophisticated Techniques 

A new phishing campaign is targeting mobile banking users with increasingly sophisticated techniques. The attackers are using fake mobile apps and messages that appear to come from trusted financial institutions, convincing victims to provide sensitive information such as account credentials and personal identification details. This attack highlights the growing threat to mobile banking and the importance of user vigilance in identifying fraudulent communications. 

Key Insights: 

  • The phishing campaign uses fake mobile apps and messages that mimic legitimate banking services to deceive users. 

  • Attackers are focusing on mobile platforms, where users may be less cautious about security risks. 

  • Financial institutions and mobile users should remain vigilant, employing multi-factor authentication and other security measures to protect sensitive information. 

Further Reading: Infosecurity Magazine 

 

 

Phishing Attack Protection for Teams Chat 

Phishing attacks targeting communication platforms like Microsoft Teams are becoming more prevalent. These attacks often involve malicious links, fake login prompts, or social engineering tactics aimed at stealing sensitive information. Microsoft is introducing a feature that flags external messages, helping users identify and avoid potentially harmful communications. Organizations should also reinforce security measures and provide ongoing training to users to strengthen defenses against these threats. 

Key Insights: 

  • Phishing attacks are increasingly targeting platforms such as Microsoft Teams, using malicious links and social engineering techniques. 

  • Microsoft is rolling out a feature that flags external messages, which helps users spot potential phishing attempts. 

  • Ongoing user education and security best practices remain essential to defending against evolving phishing tactics. 

Further Reading: GBHackers 

 

 

These Are the 10 Worst PIN Codes 

A new report highlights the 10 worst PIN codes that are most commonly used, making accounts highly vulnerable to unauthorized access. Cybersecurity experts have long warned against using simple, predictable PINs, but many users still rely on easily guessable codes. This report serves as a reminder to always choose strong, unique PINs to safeguard sensitive accounts. 

Key Insights: 

  • Many users still rely on simple, predictable PIN codes, which increases the risk of unauthorized access. 

  • The 10 worst PIN codes are some of the most common and easiest to guess, highlighting the importance of stronger security practices. 

  • Users should choose complex, unique PIN codes for their accounts to protect personal and financial information from attackers. 

Further Reading: Malwarebytes 

 

 

Chinese Innovations Spawn Wave of Toll Phishing via SMS 

A new wave of phishing attacks is emerging, primarily driven by Chinese technological innovations. Cybercriminals are using SMS-based toll phishing to trick users into paying for services or accessing malicious websites. This surge in attacks highlights the growing sophistication of phishing tactics and the need for stronger protections against mobile-based threats. 

Key Insights: 

  • Toll phishing attacks via SMS are on the rise, with cybercriminals using Chinese innovations to make the attacks more convincing and widespread. 

  • Victims are tricked into paying for non-existent services or clicking on malicious links. 

  • Organizations and individuals should implement mobile security practices and be cautious when receiving unsolicited SMS messages. 

Further Reading: Krebs on Security 

 

 

Your Location or Browsing Habits Could Lead to Price Increases When Buying Online 

A recent study reveals that online retailers may use your location and browsing habits to adjust prices, leading to potential price increases for certain customers. This practice, known as dynamic pricing, raises privacy concerns and the need for transparency in how personal data is used for commercial purposes. Consumers are advised to be aware of these tactics and consider using privacy tools to protect their online behavior. 

Key Insights: 

  • Retailers may adjust prices based on location and browsing behavior, potentially leading to higher costs for some users. 

  • Dynamic pricing practices raise concerns about privacy and the ethical use of personal data. 

  • Consumers can protect themselves by using privacy tools and being mindful of how their data is shared with online retailers. 

Further Reading: Malwarebytes 

 

 

New Syncjacking Attack Hijacks Devices Using Chrome Extensions 

A new form of attack called "Syncjacking" is targeting users by exploiting Chrome extensions to hijack their devices. This attack allows cybercriminals to gain access to users' synchronized data across multiple devices, including passwords, browsing history, and other sensitive information. This highlights the need for users to be cautious when installing browser extensions and to regularly review their sync settings. 

Key Insights: 

  • Syncjacking attacks exploit vulnerabilities in Chrome extensions to hijack synced data across multiple devices. 

  • The attack compromises sensitive information, such as passwords and browsing history, by gaining access to synchronized accounts. 

  • Users should be cautious when installing extensions and ensure they review their sync settings regularly to prevent unauthorized access. 

Further Reading: BleepingComputer 

 

 

States Get Failing Grades for Privacy Laws, but Tide May Be Turning 

A new report from the Electronic Privacy Information Center (EPIC) and U.S. PIRG Education Fund reveals that nearly half of U.S. states with consumer privacy laws received failing grades for protecting citizens' data. Of the 19 states with laws, eight received an F, and none earned an A. While many of these laws are seen as weak and influenced by major tech companies, some states like Maryland are starting to adopt stronger privacy protections, offering hope for a more secure future. 

Key Insights: 

  • Many states with consumer privacy laws received failing grades due to weak protections for personal data. 

  • Big Tech companies have influenced state privacy laws, leading to minimal consumer protection. 

  • Maryland’s recent privacy law is one of the strongest in the U.S., limiting data collection and banning targeted ads to minors. 

  • States like Vermont, Massachusetts, and Maine are moving toward stronger privacy laws this year. 

Further Reading: EPIC 

 

In News Tags newsletter
Comment

Image created with ChatGPT

Phishing Threat Intelligence From August 2024

September 9, 2024

These are news articles from August 2024. Feel free to take and share with your internal cybersecurity team. A mention of explores.com would be great!

Dismantling Smart App Control 

Elastic Security Labs recently uncovered multiple vulnerabilities in Windows Smart App Control (SAC) and SmartScreen. These weaknesses allow attackers to bypass security measures using techniques such as signed malware, reputation hijacking, and LNK stomping. These methods enable initial access without triggering security warnings, posing significant risks. Security teams should focus on detecting these evasive tactics and not rely solely on OS-native features. 

Key Insights: 

  • Signed Malware: Attackers use valid certificates to bypass SAC. 

  • Reputation Hijacking: Leveraging trusted apps to execute malicious code. 

  • LNK Stomping: Crafting LNK files to evade MotW checks. 

For more details, visit the Elastic Security Labs article. 

 

 

Securing Domain Names from Takeover 

Recent research highlights vulnerabilities in domain name management that leave over a million domains susceptible to hijacking. This issue arises from weak authentication practices at several web hosting providers and domain registrars. Cybercriminals exploit these weaknesses to take control of domains, using them for phishing, spam, and malware distribution. To mitigate risks, it is crucial to ensure proper DNS configuration and use DNS providers with strong verification processes. 

Key Insights: 

  • Vulnerability: Over a million domains at risk. 

  • Exploitation: Hijacked domains used for malicious activities. 

  • Recommendation: Strengthen DNS configuration and provider verification. 

For more details, visit the Krebs on Security article. 

 

 

Exploitation of Google Drawings and WhatsApp 

A newly identified phishing campaign exploits Google Drawings and WhatsApp's URL shortener to create convincing redirects to malicious sites. This method allows attackers to bypass security filters and deceive users into thinking they are visiting legitimate sites like Amazon. These tactics highlight the increasing sophistication of phishing threats, emphasizing the need for heightened vigilance and advanced security measures. 

Key Insights: 

  • Exploited Tools: Google Drawings and WhatsApp's URL shortener. 

  • Attack Strategy: Redirects users to malicious sites mimicking trusted brands. 

  • Recommendation: Implement advanced phishing detection and maintain user vigilance. 

For more details, visit the Menlo Security article. 

 

 

Concerns Over Cloudflare’s Anti-Abuse Posture 

Spamhaus has raised concerns about Cloudflare's anti-abuse policies, highlighting that cybercriminals are exploiting Cloudflare’s services to mask malicious activities. Despite numerous abuse reports, Cloudflare's current approach often shields the true location of harmful content, complicating efforts to combat cybercrime. This situation underscores the need for stronger abuse management practices to prevent cybercriminals from leveraging trusted services to conduct illegal activities. 

Key Insights: 

  • Exploitation: Cybercriminals are using Cloudflare to hide malicious activities. 

  • Response: Current anti-abuse measures are inadequate in addressing the issue. 

  • Recommendation: Enhanced abuse management and accountability are needed. 

For more details, visit the Spamhaus article. 

 

 

Royal Ransomware Rebrands as BlackSuit 

The ransomware group formerly known as Royal has rebranded as BlackSuit, increasing their ransom demands to over $500 million. This shift indicates a more aggressive approach, with the group targeting larger organizations across various sectors. BlackSuit continues to use sophisticated tactics, including double extortion, where they threaten to release stolen data if their demands are not met. Organizations should strengthen their defenses and ensure incident response plans are up-to-date. 

Key Insights: 

  • Rebranding: Royal ransomware is now BlackSuit. 

  • Increased Ransom: Demands exceed $500 million. 

  • Tactics: Double extortion remains a primary threat. 

  • Recommendation: Strengthen defenses and update incident response plans. 

For more details, visit the KnowBe4 article. 

 

 

New Phishing Scam Using Cross-Site Scripting 

A recent phishing scam uncovered by KnowBe4 employs cross-site scripting (XSS) attacks to harvest personal details from unsuspecting victims. Attackers use this method to inject malicious scripts into legitimate websites, tricking users into entering sensitive information like login credentials. This technique bypasses traditional security measures, making it a particularly dangerous threat. Users should be cautious when clicking on links in emails and ensure that websites they interact with are secure. 

Key Insights: 

  • Attack Method: Cross-site scripting (XSS) used to steal personal details. 

  • Target: Login credentials and sensitive information. 

  • Recommendation: Verify website security before entering personal information. 

For more details, visit the KnowBe4 article. 

 

 

Surge in File-Sharing Phishing Attacks 

KnowBe4 reports a staggering 350% increase in file-sharing phishing attacks over the past year. These attacks often disguise themselves as notifications from popular file-sharing services, tricking users into revealing sensitive information or downloading malware. The rapid rise in these attacks highlights the need for enhanced email security and ongoing employee training. 

Key Insights: 

  • 350% Increase: Significant rise in file-sharing phishing attacks. 

  • Attack Method: Disguised as legitimate file-sharing notifications. 

  • Recommendation: Strengthen email security and employee awareness. 

For more details, visit the KnowBe4 article. 

 

 

Rising Use of URL Shorteners in Phishing Attacks 

Recent intelligence highlights a growing trend where cybercriminals use URL shorteners to obscure malicious links in phishing campaigns. This tactic effectively conceals the true destination of links, making it difficult for users and traditional security tools to detect threats. These shortened URLs often appear in seemingly legitimate emails or text messages, leading to fraudulent websites designed to steal credentials or deploy malware.  

For more details, visit the KnowBe4 article. 

 

 

Surge in Microsoft Brand Impersonation Attacks 

A recent report shows a 50% increase in phishing attacks impersonating Microsoft in just one quarter. These attacks target users by mimicking Microsoft’s branding to steal credentials or deploy malware. Given Microsoft’s widespread use in organizations, employees should be extra cautious when receiving emails claiming to be from Microsoft, especially those requesting login details or prompting downloads. Always verify the sender's address and report suspicious emails to IT. 

For more details, visit the KnowBe4 article. 

 

 

Dark Angels Ransomware Group Rakes in Record Ransoms 

The Dark Angels ransomware group has secured a record $75 million ransom payment from a fortune 50 company recently. Unlike other groups, Dark Angels avoid public leaks and minimize operational disruptions for their victims, making it easier to coerce payments quietly.  

For more details, visit the Krebs on Security article. 

 

 

Inc Ransom Attack Analysis 

Overview: In April 2024, the "Inc Ransom" group targeted a ReliaQuest customer, employing a double-extortion strategy without encrypting files. They exploited an unpatched Fortinet vulnerability to gain access, installed remote management tools like AnyDesk, and used techniques like pass-the-hash for lateral movement. Data was exfiltrated using unconventional tools such as Restic. 

Key Insights: 

  • Mitigations: Prioritize patch management, enforce network segmentation, and deploy host-based controls to prevent unauthorized software execution. 

  • Emerging Trends: Use of legitimate tools by attackers to blend in with normal activity. 

Actionable Steps: Strengthen defenses by regularly updating and auditing systems, ensuring proper segmentation, and limiting privileges to essential accounts. 

For a detailed analysis, visit the full report here. 

 

 

URL Rewriting Exploited by Threat Actors 

Overview: Threat actors are increasingly abusing URL rewriting, a security feature intended to protect against phishing, to mask malicious links. By compromising legitimate email accounts and using URL rewriting, attackers can disguise phishing URLs as safe, often leveraging the security vendor's domain to gain trust. 

Key Insights: 

  • Mitigations: Enhance vigilance when clicking on links, even those appearing to be from trusted sources. 

  • Emerging Trends: Attackers are exploiting the gap between initial scans and later weaponization of URLs. 

For a detailed analysis, visit the full report here. 

 

 

Exfiltration Tools on the Rise 

A recent analysis by ReliaQuest highlights the growing use of advanced exfiltration tools by cybercriminals to steal sensitive data. Tools like Rclone, WinSCP, and FileZilla are increasingly being leveraged to exfiltrate data from compromised networks. These tools are difficult to detect as they mimic legitimate traffic, making traditional defenses less effective.  

For more details, visit the ReliaQuest article. 

 

 

North Korean IT-Worker Scheme Exposed in Tennessee 

A Nashville resident, Matthew Isaac Knoot, was arrested for facilitating a scheme that funneled hundreds of thousands of dollars to North Korea’s illicit weapons program. Knoot allegedly helped North Korean IT workers secure remote jobs with U.S. and British companies by using stolen identities. The funds, earned through six-figure salaries, were laundered and funneled back to North Korea. This case underscores the growing threat of North Korean cyber operations targeting remote work environments. 

For more details, visit the full article. 

 

 

Top Malware in July 2024: Remcos and RansomHub 

The July 2024 Threat Index highlights a surge in activity by the RansomHub ransomware group and a new Remcos malware campaign. RansomHub continues to dominate as the most prevalent ransomware, accounting for 11% of attacks, while LockBit3 and Akira follow closely behind. A critical security lapse led to the distribution of Remcos via a malicious ZIP file disguised as a CrowdStrike update. Additionally, FakeUpdates remains a persistent threat, utilizing fake browser updates to deploy RATs like AsyncRAT. 

Key Insights: 

  • RansomHub: Leading ransomware, targeting Windows, macOS, Linux, and VMware ESXi. 

  • Remcos Campaign: Exploits a security software update issue, spreading via phishing attacks. 

  • FakeUpdates: Tops the malware list, leveraging compromised websites to deliver Remote Access Trojans. 

For a deeper dive, visit Checkpoint’s Threat Index. 

 

 

Focus on Malware Loaders: Evolving Threats in 2024 

In 2024, nearly 40% of malware incidents involved advanced loaders like SocGholish, GootLoader, and Raspberry Robin. These loaders are pivotal in deploying ransomware and Remote Access Trojans (RATs). SocGholish has notably enhanced its tactics with Python scripts, making it harder to detect, while GootLoader and Raspberry Robin use sophisticated evasion techniques, posing significant threats to critical sectors. 

Key Insights: 

  • SocGholish: Now using Python for persistence. 

  • GootLoader: Continues to exploit legitimate platforms. 

  • Raspberry Robin: Notable for its complex evasion tactics. 

For more detailed insights, visit the full article here. 

Emerging Malware Variants to Watch in 2024 

In recent months, several malware variants have gained prominence in the cyber threat landscape. Notable among them are LummaC2, Rust-based stealers, SocGholish, AsyncRAT, and Oyster, each posing significant risks to organizations across all sectors. 

Key Insights: 

  • LummaC2: A powerful infostealer with increasing reach. 

  • Rust-based Stealers: Notable for their advanced evasion techniques. 

  • SocGholish: Continues to be a persistent threat through fake browser updates. 

  • AsyncRAT: Versatile and widely used for remote access. 

  • Oyster: A backdoor linked to Wizard Spider, signaling targeted attacks. 

For more details, visit ReliaQuest. 

 

 

Exploring the Abuse of Impacket: A Growing Threat 

Impacket, a versatile Python-based toolkit, has become a favored tool among threat actors for lateral movement, privilege escalation, and remote code execution in Windows environments. Threat actors commonly exploit Impacket scripts like psexec.py, smbexec.py, and wmiexec.py to perform these actions stealthily. The toolkit’s ability to mimic legitimate network activity complicates detection, making it a significant challenge for organizations to defend against. 

Key Insights: 

  • psexec.py: Used for executing remote commands with elevated privileges. 

  • smbexec.py: Facilitates lateral movement without additional software installation. 

  • wmiexec.py: Enables stealthy command execution through WMI. 

For more information, visit ReliaQuest. 

Copybara Android Malware: A Rising Threat 

The latest variant of Copybara, an Android malware family, has evolved to use the MQTT protocol for command-and-control (C2) communication, enhancing its stealth. This malware exploits Android’s Accessibility Service for keylogging, screen capturing, and phishing attacks, particularly targeting cryptocurrency exchanges and financial institutions. Copybara’s ability to impersonate legitimate apps makes it especially dangerous. 

Key Insights: 

  • MQTT Protocol: Used for stealthy C2 communication. 

  • Accessibility Service Exploitation: Enables comprehensive device control. 

  • Targeted Attacks: Focus on financial institutions and cryptocurrency exchanges. 

For more details, visit Zscaler. 

 

 

Massive QR Code Phishing Campaign Abuses Microsoft Sway 

A significant phishing campaign has been detected, exploiting Microsoft Sway to host malicious landing pages targeting Microsoft 365 users. The campaign, identified by Netskope Threat Labs, saw a 2,000-fold increase in activity, primarily targeting sectors in Asia and North America. Attackers use QR codes embedded in phishing emails, redirecting victims to malicious sites. This method exploits the weaker security controls of mobile devices and evades email scanners, making it particularly effective and dangerous. 

Key Insights: 

  • Targeted Sectors: Technology, manufacturing, and finance. 

  • Attack Method: QR codes bypass traditional security by embedding in images. 

  • Risk Increase: Heightened threat to mobile device users. 

For more details, visit BleepingComputer. 

Malvertising Campaign Impersonates Google Products 

A recent malvertising campaign has been detected, impersonating various Google products to lure users into tech support scams. These malicious ads, exploiting Google’s Looker Studio, redirect victims to fake Microsoft or Apple warning pages, urging them to call a fraudulent support number. This campaign serves as a reminder to be cautious of online ads, even those that appear to represent trusted brands. 

Key Insights: 

  • Target: Users of Google products. 

  • Tactics: Fake tech support scams via malvertising. 

  • Impact: Potential malware installation and data theft. 

For more details, visit KnowBe4. 

 

 

Deceptive AI: A New Wave of Cyber Threats 

As AI technology advances, cybercriminals are increasingly using AI-generated content (AIGC) to deceive users on social media. This includes creating fake profiles, deepfake videos, and AI-crafted messages that are nearly indistinguishable from real content. A recent survey revealed that a significant portion of users struggle to identify these threats, which can lead to fraud, identity theft, and misinformation. It's crucial to be aware of these risks and stay vigilant online. 

For more details, visit KnowBe4. 

 

 

North Korean IT Workers Target U.S. Tech Companies 

North Korean IT workers are increasingly applying for remote jobs at U.S. tech firms using false identities. They employ AI-generated profile images and fake job histories, aiming to funnel earnings back to the North Korean regime, posing security risks and potential sanctions violations. Key insights include the importance of rigorous background checks and enhanced candidate verification processes to counter this threat. Collaboration with security experts and intelligence sharing is critical. 

For more insights, visit Cinder. 

 

 

Risks in Publicly Exposed GenAI Development Services 

A recent analysis highlights significant security risks in publicly exposed GenAI development services, particularly vector databases and low-code LLM tools. These platforms often handle sensitive data but can be misconfigured, leading to potential data leakage, data poisoning, and exploitation of vulnerabilities. To mitigate these risks, organizations should enforce strict access controls, monitor activity, and ensure all software is updated. 

For a deeper dive, visit Legit Security. 

 

 

How Attackers Exploit Digital Analytics Tools 

Cybercriminals are increasingly weaponizing digital analytics tools like link shorteners, IP geolocation services, and CAPTCHA challenges. These tools, often used for legitimate purposes, are repurposed to obscure malicious activity, evade detection, and tailor attacks to specific targets. Organizations should implement automated analysis and monitor suspicious patterns in these tools to mitigate risks. 

Key Insights: 

  • Threat actors use link shorteners to mask phishing URLs. 

  • IP geolocation data helps attackers target specific regions. 

  • CAPTCHA services are abused to bypass automated security scans. 

Further Reading: Google Cloud Blog 

 

 

GenAI and the Surge of AI-Driven Fraudulent Websites 

 Cybercriminals are increasingly leveraging large language models (LLMs) to scale the creation of fraudulent websites, including phishing sites and fake online stores. Netcraft reports a significant rise in AI-generated content for scams, with a 3.95x increase in such websites from March to August 2024. These AI tools enhance the credibility of scams by improving text quality, making malicious content more convincing and harder to detect. Organizations must enhance their defenses to mitigate the risks posed by this emerging threat. 

Key Insights: 

  • LLMs are used to generate convincing text for scams. 

  • AI-driven scams have seen a sharp increase in recent months. 

  • Monitoring and takedown strategies are essential to combat this trend. 

Further Reading: Netcraft Blog 

 

 

So-Phish-ticated Attacks: A New Wave of Social Engineering 

A sophisticated threat actor is conducting targeted social engineering attacks against over 130 U.S. organizations. These attacks, which include phishing via SMS and direct phone calls, are designed to harvest credentials and one-time passcodes. The use of native English speakers and tactics that bypass traditional security tools makes these attacks particularly challenging to detect.  

Key Insights: 

  • Attacks bypass traditional detection. 

  • Focus on credential harvesting. 

  • Targeting multiple industry verticals. 

Further Reading: GuidePoint Security Blog 

 Originally posted on exploresec.com

In News Tags newsletter, phishing, threat intelligence
Comment

Exploring the newsletter below - Image created with the help of ChatGPT

Security Awareness Newsletter March 2024

April 1, 2024

This is a security newsletter I’ve put together as part of our security awareness program. This leans more towards healthcare and news items that are more general in nature. I’ll have a more technical focused newsletter later this week that’s targeted at security teams. Feel free to take this newsletter and use it internally as part of your security awareness program.

The Great Zoom-Skype-Google Masquerade: Beware of digital doppelgängers. Fake Zoom, Skype, and Google Meet sites are the latest traps set by cyber tricksters.  These spoofed meetings can trick users into downloading harmful software that compromises their computer. Ensure you’re clicking on the real deal to keep those malware masqueraders at bay. Beware of QR codes that will try to steal credentials as part of this type of attack. 

Beware of fake websites mimicking popular brands!: Typosquatting attacks are surging, and cybercriminals are exploiting user mistakes to steal login credentials and spread malware. Typosquatting is where an attacker registers a similar domain to one a person is familiar with. This increases the chance a malicious link will be clicked. 

Small Businesses Hit Hard by Cybercrime: Some social engineering techniques highlighted in the article include: malicious ads; attackers starting a conversation before trying to get the person to take an action; and the move to PDF attachments. These types of attacks help launch ransomware against small businesses. 

Beware of AI-Driven Voice Cloning in Vishing Scams: The Better Business Bureau (BBB) has issued a warning about the rise of voice phishing (vishing) scams utilizing AI-driven voice cloning technology. Scammers can now mimic voices convincingly with just a small audio sample, leading to fraudulent requests for money transfers or sensitive information. Tips to Stay Safe: 

  • Pause Before Acting: Resist the urge to act immediately on unexpected requests, even if they seem to come from a familiar voice. 

  • Verify Directly: Contact the supposed caller using a known, saved number—not the one provided in the suspicious call. 

  • Question the Caller: Ask specific questions that an impostor would struggle to answer correctly. 

  • Secure Your Accounts: Implement multi-factor authentication and verify any changes in information or payment requests. 

Update on Change Healthcare Cyberattack Recovery: Change Healthcare is on track to bring its systems back online by mid-March following a cyberattack that has caused widespread disruption since February 21. The cyberattack has significantly affected healthcare operations nationwide, with providers facing difficulties in payment processing, insurance verification, and clinical data exchange. This highlights why security awareness is so important. Identifying and reporting security threats to the organization is the responsibility of everyone. 

Beware of Tax Season Scams Targeting SMBs and Self-Employed Individuals: As tax season unfolds, a new scam has surfaced targeting small business owners and self-employed individuals. Scammers are using emails to lure victims to a fraudulent site, claiming to offer IRS EIN/Federal tax ID number applications. However, this service is free through the IRS, and the scam site is designed to steal personal information, including social security numbers, creating a significant risk for identity theft and fraud. A Microsoft report identifies green card holders, small business owners, new taxpayers under 25, and older taxpayers over 60 as prime targets for these scams. Check Point has some example phishes in their tax scam article. 

Apple Users Beware: "MFA Bombing" Phishing Attacks on the Rise: Leveraging Apple's password reset system attackers can bombard users with password reset prompts. If a person clicks "allow" on one of the prompts, the attackers can gain access to the user's account. The attackers may also call the person pretending to be Apple support. Some ways to protect yourself from this attack include not clicking on any of the prompts and contacting Apple directly if you receive a suspicious call. 

In News Tags newsletter, Security Awareness, social engineering, Typosquatting, AI, Healthcare, tax fraud, Multi-Factor Authentication
Comment

Latest PoDCASTS

Featured
Jul 15, 2025
[RERELEASE] What are BEC attacks?
Jul 15, 2025
Jul 15, 2025
Jul 8, 2025
[RERELEASE] How to crack passwords
Jul 8, 2025
Jul 8, 2025
Jul 2, 2025
[RERELEASE] How to find vulnerabilites
Jul 2, 2025
Jul 2, 2025
Jun 24, 2025
[RERELEASE] What is data driven security?
Jun 24, 2025
Jun 24, 2025
Jun 17, 2025
[RERELEASE] What is a CISSP?
Jun 17, 2025
Jun 17, 2025
Jun 10, 2025
[RERELEASE] From ShowMeCon 2017: Dave Chronister, Johnny Xmas, April Wright, and Ben Brown talk about Security
Jun 10, 2025
Jun 10, 2025
Jun 4, 2025
How to Perform Incident Response and Forensics on Drones with Wayne Burke
Jun 4, 2025
Jun 4, 2025
Jun 3, 2025
That Shouldn't Have Worked: A Red Teamer's Confessions with Corey Overstreet
Jun 3, 2025
Jun 3, 2025
May 28, 2025
when machines take over the world with Jeff Man
May 28, 2025
May 28, 2025
May 20, 2025
How to Disconnect From Cybersecurity
May 20, 2025
May 20, 2025

Powered by Squarespace