• Explore
  • Blog
  • Podcast
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • About
  • Services
  • Contact

November 2024 Executive Leadership Cybersecurity Newsletter

November 12, 2024

This is a monthly newsletter I put together for our executive team with a lean towards healthcare. Created with help from ChatGPT.

Ransomware Threats Surge Globally in 2023 

Summary: The 2023 Global Ransomware Incident Map highlights a 73% rise in ransomware attacks, targeting sectors like healthcare and finance. Cybercriminals are increasingly using "big game hunting" tactics, exploiting vulnerabilities such as the MOVEit flaw. This trend underscores the urgent need for businesses to bolster cybersecurity defenses and improve incident response strategies. 

Further reading: Institute for Security and Technology. 

 

 

AI Risks in the Workplace 

A recent study by CybSafe revealed that 38% of workers are sharing sensitive information with AI tools, often without their employer's knowledge. This raises significant security concerns, especially since over half of employees have not received training on safe AI use. With the growing reliance on AI, it's crucial for executives to implement clear guidelines and provide training on secure AI practices to mitigate the risk of data breaches and protect intellectual property. 

Further reading: CybSafe - AI Security Risks. 

 

 

North Korean IT Worker Incident Highlights Hiring Risks 

A recent cyberattack on a company underscores the dangers of unknowingly hiring North Korean operatives. The organization accidentally hired a North Korean IT worker who accessed sensitive data and demanded a ransom. This highlights the need for stringent vetting in remote hiring practices, especially as North Korea increasingly infiltrates global companies. 

Recommended Protections: 

  • Implement strict identity verification for remote workers. 

  • Conduct thorough background checks with global databases. 

  • Regularly monitor employee network activity for unusual behavior. 

Further reading: GBHackers - North Korean IT Worker Incident. 

 

 

Healthcare Supply Chain Attacks on the Rise 

A recent Proofpoint report reveals that 68% of healthcare workers have faced a supply chain cyberattack, with 82% of these incidents affecting patient care. 

Key Insights: 

  • 68% of healthcare workers report supply chain cyberattacks. 

  • 82% of incidents resulted in disruptions to patient care. 

  • Attacks cause delays in procedures and increase patient risks. 

  • Ransomware and business email compromise are growing threats. 

Further reading: Security Magazine - Supply Chain Attacks. 

 

 

Change Healthcare Breach – Key Insights and Implications 

In February 2024, Change Healthcare experienced a substantial ransomware attack, compromising the personal, financial, and medical information of approximately 100 million Americans. This incident highlights critical vulnerabilities within the healthcare sector and raises concerns about protecting patient data. 

Key Insights: 

  • Breach Scope: Sensitive data, including Social Security numbers, medical records, and billing information, was exposed, impacting millions of patients. 

  • Financial Impact: UnitedHealth Group, Change Healthcare’s parent company, incurred breach-related costs totaling $2.457 billion, including $1.521 billion in direct response expenses. 

  • Ransom Payment: Change Healthcare paid a $22 million ransom to the BlackCat ransomware group in an attempt to prevent further data exposure. 

Further Reading: Change Healthcare Breach Hits 100M Americans – Krebs on Security 

 

In News Tags Newsletter, Executive Leadership
Comment

November 2024 Threat Intelligence Newsletter

November 11, 2024

This is a monthly newsletter I put together for our internal security team with a lean towards phishing and healthcare. Created with help from ChatGPT.

Fake Job Applications Deliver Dangerous Malware 

Summary: A spear-phishing campaign is targeting HR professionals with fake job applications containing the More_eggs malware. Operated by the Golden Chickens group as part of a Malware-as-a-Service (MaaS) platform, More_eggs is a sophisticated backdoor used by multiple threat actors to infiltrate corporate networks. 

Key Insights (Technical): 

  • Delivery Method: The malware is delivered via malicious Windows Shortcut files (.LNK files) disguised as resumes. When opened, these files execute scripts without raising suspicion. 

  • Execution Technique: The attack leverages living-off-the-land binaries (LOLBins) like wscript.exe to run malicious JavaScript code, bypassing traditional security measures. 

  • Capabilities: 

  • Backdoor Access: Establishes a stealthy backdoor for persistent access. 

  • Payload Deployment: Can download and execute additional malware modules, including ransomware or credential stealers. 

  • Reconnaissance: Gathers system information and can move laterally within the network. 

  • Command and Control (C2): Communicates with C2 servers over HTTP/S protocols, using encrypted channels to evade detection. 

  • Avoidance of Detection: Uses legitimate Windows processes to mask malicious activities, making it harder for security solutions to detect the intrusion. 

For further details, read the full article on The Hacker News. 

 

New Ransomware Strain Targeting Healthcare 

The U.S. Department of Health and Human Services (HHS) issued a warning about a new ransomware strain, Trinity, which is actively targeting the healthcare sector. Trinity uses techniques like encrypting data and demanding ransoms within 24 hours. It has connections to other ransomware families such as Venus and 2023Lock. 

Technical Key Insights: 

  • Exploits Remote Desktop Protocol (RDP) and open ports 

  • Uses privilege escalation to gain higher access 

  • Encrypts critical systems rapidly after infiltration 

Further reading: The Record - Trinity Ransomware Alert. 

 

 

Emerging Cybersecurity Threats Highlighted in HP Wolf Security Report 

The September 2024 HP Wolf Security Threat Insights Report identifies key trends in cyberattacks, including a surge in document-based malware, with 61% of threats delivered via email attachments. Attackers are increasingly using malicious archives and PDFs to bypass detection, leveraging techniques like HTML smuggling and exploiting vulnerabilities in outdated software. Threat actors are also using Generative AI to write sophisticated malware, such as AsyncRAT. 

Key Insights: 

  • 39% of threats delivered in archives 

  • Rise in AI-generated malware 

  • Increased exploitation of known vulnerabilities 

Further reading: HP Wolf Security Threat Insights Report. 

 

 

North Korean IT Worker Incident Highlights Hiring Risks 

A recent cyberattack on a company underscores the dangers of unknowingly hiring North Korean operatives. The organization accidentally hired a North Korean IT worker who accessed sensitive data and demanded a ransom. This highlights the need for stringent vetting in remote hiring practices, especially as North Korea increasingly infiltrates global companies. 

Recommended Protections: 

  • Implement strict identity verification for remote workers. 

  • Conduct thorough background checks with global databases. 

  • Regularly monitor employee network activity for unusual behavior. 

Further reading: GBHackers - North Korean IT Worker Incident. 

 

 

User-Centric Security Design Inspired by Disney 

A recent article from KnowBe4 discusses how organizations can improve security by observing how employees naturally work, similar to Disney’s strategy of observing guests before building paths. The concept of "desire paths" shows that security controls should be designed around actual workflows, reducing friction and improving compliance. By aligning security with user behavior, organizations can mitigate risky workarounds and foster a more secure environment. 

Further reading: KnowBe4 - Security Highways. 

 

 

Healthcare Supply Chain Attacks on the Rise 

A recent Proofpoint report reveals that 68% of healthcare workers have faced a supply chain cyberattack, with 82% of these incidents affecting patient care. 

Key Insights: 

  • 68% of healthcare workers report supply chain cyberattacks. 

  • 82% of incidents resulted in disruptions to patient care. 

  • Attacks cause delays in procedures and increase patient risks. 

  • Ransomware and business email compromise are growing threats. 

Further reading: Security Magazine - Supply Chain Attacks. 

 

 

Microsoft’s Deceptive Honeypot Strategy Targets Phishers 

Microsoft has launched a clever security strategy by creating fake Azure tenants to lure phishing attackers into honeypots. These realistic tenant environments mimic legitimate setups, tricking attackers into interacting with them. This allows Microsoft to gather valuable intelligence on phishing methods and infrastructure, which can be used to strengthen defenses and share with the wider security community. By engaging with these fake environments, phishers waste time while Microsoft gains crucial insights. 

Further reading: BleepingComputer - Microsoft Honeypots. 

 

 

Mobile-First Cyber Attacks on the Rise 

Cyber attackers are increasingly adopting a "mobile-first" strategy, as highlighted by a new report from Zimperium. With 83% of phishing sites now targeting mobile devices and a 13% rise in mobile malware, employees’ personal devices pose a growing risk to organizations. As more employees use their smartphones for work-related tasks, organizations need to bolster mobile security and educate employees on safe practices through security awareness training. 

Further reading: KnowBe4 - Mobile-First Attack Strategy. 

 

 

Cybercriminals Exploiting Steam for Malware Distribution 

A recent investigation highlights how cybercriminals are using Steam profiles to exploit a technique called Dead Drop Resolver (DDR) to hide Command and Control (C2) addresses within user profiles. Attackers have leveraged well-known infostealers like Vidar, Lumma, and MetaStealer to extract sensitive data from infected systems by using platforms like Steam and Telegram to evade detection. 

Technical Key Insights: 

  • Attackers embed C2 addresses in Steam profiles. 

  • Infostealers target credentials and system data. 

  • Use of obfuscated code and stolen certificates. 

Further reading: RT Solar Blog. <---- .ru site 

 

 

Rise in Phishing Attacks with AI and Impersonation Tactics 

A new report from KnowBe4 reveals a 28% rise in phishing attacks during Q2 2024, with 89% of attacks involving brand impersonation. Cybercriminals are increasingly using AI-powered phishing toolkits, making it easier for less-skilled attackers to execute sophisticated campaigns. Commodity phishing attacks, primarily using hyperlinks, have surged, overwhelming organizations' defenses. With impersonation tactics being a dominant trend, organizations must enhance defenses against these evolving threats. 

Key Insights: 

  • 28% increase in phishing attacks in Q2 2024. 

  • 89% of phishing emails involve impersonation. 

  • Commodity phishing attacks up 2,700% compared to normal baselines. 

Further reading: KnowBe4 Report. 

 

 

Phishing-as-a-Service Platform "Sniper Dz" Exposed 

A recent investigation reveals the rise of the phishing-as-a-service (PhaaS) platform "Sniper Dz," which is responsible for over 140,000 phishing websites. The platform offers phishing templates targeting major brands and hides malicious content behind proxy servers to evade detection. Additionally, attackers can exfiltrate credentials to centralized servers controlled by Sniper Dz. This growing platform enables less-skilled attackers to launch sophisticated phishing attacks with ease. 

Further reading: Unit 42 - Sniper Dz PhaaS. 

 

 

Dark Angels Ransomware Group Exposed 

A recent investigation uncovers the stealth tactics of the Dark Angels ransomware group, which targets high-value systems with Babuk and RagnarLocker-based ransomware. Their techniques include double extortion, data exfiltration, and selective ransomware deployment to minimize detection. 

Technical Key Insights: 

  • Uses Babuk ransomware on Windows and RagnarLocker variants on Linux/ESXi servers. 

  • Employs double extortion tactics, stealing data before encryption. 

  • Leverages encrypted communication channels to evade detection. 

Further reading: Zscaler - Dark Angels Ransomware Group. 

 

 

North Korean IT Worker Fraud 

SecureWorks reports that North Korean IT workers are fraudulently obtaining remote jobs to access sensitive systems and generate revenue for the regime. These individuals disguise their identities, use VPNs to hide their location, and exploit company resources once hired. 

Key Insights: 

  • Perform thorough background checks on freelance and remote candidates. 

  • Monitor network access for unusual activity, especially from VPNs. 

  • Educate hiring managers on this growing threat. 

Further Reading: Fraudulent North Korean IT Worker Schemes 

 

 

Health Care and Social Assistance Sector at Risk 

Cyber threats in the Health Care and Social Assistance sector are intensifying, with phishing and social engineering attacks being the most prevalent. Organizations need to prioritize automation and Digital Risk Protection strategies to defend against these sophisticated threats. 

Key Insights: 

  • 51.55% of incidents are phishing attacks using spearphishing links. 

  • 24.76% of attacks exploit public-facing applications. 

  • Automation reduces incident containment time to 1 minute, compared to 2 hours 34 minutes for manual responses. 

Further Reading: ReliaQuest Health Care Threat Landscape 

 

 

AI-Driven Malware and Persistent Ransomware Threats 

Check Point's Global Threat Index for September 2024 highlights the rising use of AI in malware creation, with AsyncRAT becoming one of the top threats. AI-powered scripts are being used to deliver malware like AsyncRAT through techniques such as HTML smuggling, showcasing how threat actors with limited technical skills can now leverage AI to create sophisticated attacks. This evolution underscores the need for organizations to adopt proactive security strategies. 

In addition, RansomHub, a rebranded Ransomware-as-a-Service group, continues to dominate the ransomware scene, accounting for 17% of reported attacks. Other prominent malware families include FakeUpdates, targeting organizations worldwide, and Androxgh0st, which exploits vulnerabilities across platforms. 

Key Insights: 

  • 51.55% of the most prevalent malware was related to phishing campaigns, with AI-driven techniques emerging. 

  • RansomHub remains the top ransomware group with a significant global impact. 

  • Joker leads mobile malware, targeting Android users via SMS theft and premium service fraud. 

Further Reading: Check Point Threat Intelligence Report 

 

 

Trinity Ransomware Hits Healthcare Sector 

The Trinity ransomware group is targeting healthcare organizations with double-extortion tactics, gaining access through phishing emails and software vulnerabilities. This ransomware not only encrypts data but also steals it, pressuring victims to pay or risk exposure of sensitive information. Two healthcare providers have already been attacked, with 330GB of data compromised from a U.S.-based provider. 

Key Insights: 

  • Double extortion tactics increase the urgency for victims to pay. 

  • Initial access often occurs through phishing or vulnerabilities. 

  • Healthcare is a prime target due to critical operations needing quick recovery. 

Further Reading: Trinity Ransomware Targets Healthcare 

 

 

Threat Intelligence Update: Black Basta’s Social Engineering Tactics via Microsoft Teams 

The Black Basta ransomware group has employed a sophisticated social engineering campaign targeting organizations through Microsoft Teams. By signing user emails up for multiple spam sources, Black Basta overwhelms the target with unwanted messages. Threat actors then contact the user, impersonating IT support and offering assistance with the email flood. During this call, the attacker convinces the user to install remote access software like Quick Assist or AnyDesk, providing them unauthorized access to the network. Once inside, the attackers can harvest credentials and potentially deploy ransomware. 

Key Insights: 

  • Attackers use a flood of spam emails to distract and stress targets. 

  • Impersonation of IT support builds credibility and increases the chance of remote access. 

  • This tactic highlights the need for training employees to verify unexpected IT requests and avoid downloading unapproved software. 

Further Reading: ReliaQuest Blog on Black Basta's Techniques 

 

 

Q3 2024 Ransomware Trends 

The ReliaQuest Q3 2024 ransomware report highlights significant shifts in the ransomware landscape, with new groups gaining prominence and using sophisticated tactics to escalate their attacks. RansomHub has overtaken LockBit as the most active group, experiencing an 800% rise in postings from Q1 to Q3. Their growth is attributed to aggressive recruiting and lucrative profit-sharing, which has drawn affiliates from other disrupted groups. This group, along with Play ransomware, continues to exploit vulnerabilities in VPNs and public-facing applications, demonstrating the persistent risk posed by unpatched systems. 

Key Insights: 

  • RansomHub’s Rapid Rise: RansomHub posted 195 times in Q3, an 800% increase from Q1, leveraging a 90/10 profit-sharing model to attract affiliates. 

  • Expansion into ESXi Environments: Play ransomware’s new Linux variant targets VMware ESXi servers, broadening its impact across platforms. 

  • High-Risk Sectors: Professional services, healthcare, and manufacturing sectors are top targets due to potential operational disruptions. 

  • Vulnerability Exploits: Attackers frequently gain access through unpatched VPNs and other internet-facing applications, emphasizing the need for timely patch management. 

Further Reading: ReliaQuest Q3 Ransomware Report 

 

 

Update: Q3 2024 Brand Phishing Trends 

Check Point Research’s Q3 2024 report reveals that Microsoft continues as the most impersonated brand in phishing attacks, accounting for 61% of brand phishing attempts. Apple (12%) and Google (7%) follow, with new additions Alibaba and Adobe rounding out the top 10. These attacks commonly target the technology, social media, and banking sectors, as cybercriminals exploit brand familiarity to deceive users and capture credentials or payment information. Notably, new phishing sites targeting WhatsApp and Alibaba highlight the evolving strategies of threat actors seeking to exploit user trust. 

Key Insights: 

  • Microsoft Dominance: Microsoft phishing attempts made up 61% of brand impersonation attacks, with Apple and Google also highly targeted. 

  • Sector Focus: Technology and social networks were the most impersonated sectors, followed by banking. 

  • Evolving Phishing Tactics: Phishing websites like whatsapp-io.com and alibabashopvip.com show attackers adapting to impersonate new brands. 

Further Reading: Check Point’s Q3 2024 Brand Phishing Report. 

 

 

Global Surge in Cyber Attacks in Q3 2024 

Check Point’s Q3 2024 report highlights a significant 75% increase in global cyber attacks compared to last year, with each organization facing an average of 1,876 weekly attacks. Sectors most impacted include Education/Research (3,828 weekly attacks), Government/Military (2,553), and Healthcare (2,434), reflecting the increased focus on these industries. Africa saw the highest regional attack rate, averaging 3,370 weekly, up 90% from 2023, while North America experienced the most ransomware attacks, making up 57% of incidents worldwide. Manufacturing was the top ransomware target, followed by Healthcare and Retail/Wholesale. 

Key Insights: 

  • Attack Growth by Sector: The Hardware Vendor industry had the largest increase in attacks, surging by 191%. 

  • Regional Hotspots: Africa, Latin America, and Europe saw the steepest rises, with Europe experiencing an 86% year-over-year spike. 

  • Ransomware Targets: The Manufacturing sector accounted for 30% of ransomware incidents, underscoring cybercriminals' focus on high-disruption industries. 

Further Reading: Check Point Q3 2024 Report. 

 

 

North Korean Cybercriminal Infiltrates UK Company 

A UK-based organization recently suffered a breach after inadvertently hiring a North Korean cybercriminal posing as a remote IT worker. Once hired, the attacker used insider access to extract sensitive information and eventually demanded a ransom for its non-disclosure. This case highlights the importance of strict hiring processes for remote roles and enhanced security practices. 

Key Insights: 

  • Vetting Remote Employees: Conduct rigorous background checks to confirm credentials. 

  • Data Security: Monitor access and behavior for early threat detection. 

  • Remote Work Risks: Be mindful of cyber threats exploiting virtual roles. 

Further Reading: KnowBe4 Article; KnowBe4 10 Hiring Updates 

 

 

Partnership Between Scattered Spider and RansomHub 

ReliaQuest reports a new collaboration between the Scattered Spider and RansomHub groups, merging advanced social engineering skills with network-compromising expertise to target enterprises globally. The partnership leverages RansomHub's effective 90/10 profit-sharing model, attracting experienced threat actors from disrupted groups. This collaboration allows attackers to target critical virtual infrastructures, such as ESXi servers, which host key applications, enabling high-impact ransomware attacks that pressure victims to pay swiftly. 

Key Insights: 

  • Targeting of ESXi Servers: These servers, often running multiple virtual machines, are attractive for ransomware attacks as they disrupt operations across organizations. 

  • Social Engineering Tactics: Scattered Spider's expertise in impersonating IT staff aids in gaining unauthorized access to organizational networks. 

  • Rising Threat of RansomHub: RansomHub has rapidly gained dominance, surpassing groups like LockBit, indicating a strategic shift in ransomware collaborations and effectiveness. 

For more details, explore the full article at ReliaQuest. 

 

 

Social Engineering Exploits Valid Accounts 

Recent incidents highlight how threat actors are compromising legitimate accounts through social engineering tactics. By manipulating individuals into divulging sensitive information or performing specific actions, attackers gain unauthorized access to systems and data. This method often involves impersonating trusted entities or creating convincing scenarios to deceive targets. 

Key Insights: 

  • Impersonation Tactics: Attackers frequently pose as IT support or company executives to extract credentials. 

  • Phishing Campaigns: Sophisticated emails and messages are crafted to appear authentic, luring recipients into providing access details. 

  • Insider Threats: Compromised accounts can be used to launch further attacks within an organization, making detection challenging. 

Further Reading: KnowBe4 Article on Social Engineering Exploits. 

 

 

North Korean Group Adopts Play Ransomware 

Unit 42 has identified that the North Korean state-sponsored threat group, Jumpy Pisces (also known as Andariel), has begun collaborating with the Play ransomware group, Fiddling Scorpius. This marks a significant shift in Jumpy Pisces' tactics, moving from traditional cyber espionage to active participation in ransomware operations. The group gained initial access to networks via compromised user accounts, deploying tools like Sliver and their custom malware, DTrack, to facilitate lateral movement and persistence. This collaboration underscores the evolving ransomware landscape, where nation-state actors are increasingly engaging in financially motivated cybercrime. 

Key Insights: 

  • Tactical Shift: Jumpy Pisces is now utilizing existing ransomware infrastructures, indicating a move towards financial cybercrime. 

  • Advanced Tools: The group employs sophisticated tools such as Sliver and DTrack for network infiltration and persistence. 

  • Global Targeting: Their activities are expected to target a wide range of victims worldwide, necessitating heightened vigilance. 

Further Reading: Unit 42 Article on Jumpy Pisces and Play Ransomware. 

 

 

Key Cyber Threat Actors in 2024 

ReliaQuest's recent analysis identifies five prominent cyber threat actors significantly impacting the cybersecurity landscape in 2024: 

  • RansomHub: Emerging as a dominant ransomware group, RansomHub has surpassed previous leaders like LockBit and ALPHV, posing substantial risks to organizations globally. 

  • IntelBroker: As the acting administrator of BreachForums, IntelBroker oversees activities on one of the largest English-language cybercriminal forums, facilitating various malicious operations. 

  • APT41: A Chinese state-affiliated group, APT41 continues to engage in espionage activities, targeting sectors such as healthcare, telecommunications, and finance. 

  • APT29: Known for its sophisticated espionage campaigns, this Russian state-affiliated group remains active in infiltrating governmental and private sector networks. 

  • KillSec: Originally aligned with the "Anonymous" hacktivist collective, KillSec has recently shifted towards financially motivated ransomware activities, increasing its threat profile. 

Further Reading: ReliaQuest Article on Critical Threat Actors. 

 

Halloween’s Digital Threats of 2024 

Halloween brings tales of horror, but in 2024, some of the scariest threats come from the digital realm. Cybercriminals are increasingly using advanced tools to target individuals and organizations with new forms of AI-driven malware, IoT exploits, and social engineering tricks that play on our trust. 

Key Insights: 

  • AI-Powered Attacks: These cyber “ghosts” can adapt to evade detection, making attacks like spear-phishing and deepfakes more convincing. 

  • IoT Vulnerabilities: Over 20,000 vulnerable IoT devices, including cameras and routers, have become entry points for attackers, posing risks to privacy and security. 

  • Social Media Exploitation: Personal data scraped from social platforms is being weaponized for phishing and blackmail, creating "digital dossiers" for targeted attacks. 

  • Fake Calls and Malware: Scammers posing as bank representatives are using fake calls to steal sensitive information, a trick that’s led to an increase in identity theft and financial loss. 

  • Dating Apps and Location Data: Privacy risks on dating apps, including inadvertent location sharing, are turning digital encounters into real-life safety concerns. 

Further Reading: Check Point’s guide on Halloween Cyber Threats. 

 

In News Tags Newsletter, threat intelligence, phishing
Comment

November 2024 Cybersecurity Awareness Newsletter

November 8, 2024

This is a newsletter I share internally as part of our internal security awareness program. Feel free to take and use in your organization. Created with help from ChatGPT

Fake Job Applications Deliver Dangerous Malware 

Summary: A spear-phishing campaign has been targeting HR professionals with malicious job applications. Attackers use fake resumes containing More_eggs malware, a backdoor designed to steal credentials. This malware, part of a Malware-as-a-Service (MaaS) platform operated by the Golden Chickens group, can be used by multiple threat actors. The attack chain involves malicious Windows shortcut (LNK) files that initiate the infection upon execution, allowing attackers to perform reconnaissance and drop additional payloads. 

Key Insight: Be cautious when handling job applications, especially those involving downloadable files from unknown sources. 

For further details, read the full article on The Hacker News. 

 

 

Data Privacy Risks in Connected Cars 

Modern connected vehicles collect vast amounts of data, including driving habits, location, and even biometric information like voice commands. A recent analysis by CHOICE reveals that many popular car brands share this data with third-party companies, raising privacy concerns. Brands like Kia, Hyundai, and Tesla collect and share voice and video data, while others gather driving behaviors. This highlights the importance of understanding your car’s data collection practices and opting out where possible. 

Further reading: CHOICE - Connected Cars Tracking Your Data. 

 

 

North Korean Hackers Targeting Job Seekers 

A new campaign by North Korean hackers is targeting job seekers, particularly in the tech industry, according to a recent report. Hackers impersonate recruiters on platforms like LinkedIn, luring individuals into downloading malware disguised as video conferencing tools. The malware is designed to steal cryptocurrency and sensitive corporate data, posing risks to both individuals and organizations. Job seekers should remain cautious when interacting with unsolicited offers and recruiters. 

Further reading: KnowBe4 - North Korean Hackers. 

 

 

Election Season and Cybersecurity Concerns 

As the 2024 election season progresses, a recent Malwarebytes survey reveals that 74% of respondents consider it a risky time for personal information. Fears of scams, privacy breaches, and cyber interference are high, with 52% of people expressing concern about falling prey to scams through political ads. Many are taking precautions, such as using two-factor authentication and password managers, to secure their data. 

Key Insights: 

  • 74% view election season as risky for personal data. 

  • 52% fear scams via political ads. 

  • Increased adoption of security practices like two-factor authentication. 

Further reading: Malwarebytes - Election Season Raises Fears. 

 

 

North Korean IT Worker Incident Highlights Hiring Risks 

A recent cyberattack on a company underscores the dangers of unknowingly hiring North Korean operatives. The organization accidentally hired a North Korean IT worker who accessed sensitive data and demanded a ransom. This highlights the need for stringent vetting in remote hiring practices, especially as North Korea increasingly infiltrates global companies. 

Recommended Protections: 

  • Implement strict identity verification for remote workers. 

  • Conduct thorough background checks with global databases. 

  • Regularly monitor employee network activity for unusual behavior. 

Further reading: GBHackers - North Korean IT Worker Incident. 

 

 

Mobile-First Cyber Attacks on the Rise 

Cyber attackers are increasingly adopting a "mobile-first" strategy, as highlighted by a new report from Zimperium. With 83% of phishing sites now targeting mobile devices and a 13% rise in mobile malware, employees’ personal devices pose a growing risk to organizations. As more employees use their smartphones for work-related tasks, organizations need to bolster mobile security and educate employees on safe practices through security awareness training. 

Further reading: KnowBe4 - Mobile-First Attack Strategy. 

 

 

 

Microsoft Spoofing Threats on the Rise 

A recent report from Harmony Email & Collaboration highlights over 5,000 fake Microsoft emails targeting organizations within a single month. These emails, often impersonating legitimate administrators, use sophisticated obfuscation techniques, making it difficult for users to detect. The risks include account takeovers, ransomware, and data theft.  

Further reading: Check Point Blog. 

 

 

New VPN Credential Attack Uses Sophisticated Social Engineering 

A recent attack uncovered by security researchers targets organizations using VPNs through a combination of social engineering, fake login sites, and phone calls. Attackers impersonate a helpdesk, direct users to a spoofed VPN login page, and steal credentials. They also prompt users for multi-factor authentication (MFA) codes to gain access to corporate networks. This attack highlights the importance of user vigilance and strong security training. 

Attack Chain: 

  • Impersonation of helpdesk. 

  • Directs victim to fake VPN login page. 

  • Steals credentials and MFA codes. 

Further reading: KnowBe4 - New VPN Credential Attack. 

 

 

Operation Kaerb Takedown 

Operation Kaerb successfully dismantled iServer, a Phishing-as-a-Service platform responsible for facilitating mobile credential theft targeting nearly half a million victims. iServer enabled low-skilled criminals to unlock stolen phones by phishing for user credentials. This takedown is a reminder of the evolving tactics cybercriminals use and underscores the importance of staying vigilant against mobile-focused phishing attacks. 

Further Reading: Operation Kaerb on KnowBe4 

 

 

Sextortion Scams on the Rise 

Our team has recently been targeted by sextortion scams, where attackers use publicly available information to create threatening messages designed to elicit fear and urgency. These scams often appear more credible by including personal details. If you receive such a message, avoid engagement or payment—report it to our security team immediately by using the suspicious email button in Outlook. 

Further Reading: KnowBe4 Article on Sextortion Scams. 

 

 

Update: Q3 2024 Brand Phishing Trends 

Check Point Research’s Q3 2024 report reveals that Microsoft continues as the most impersonated brand in phishing attacks, accounting for 61% of brand phishing attempts. Apple (12%) and Google (7%) follow, with new additions Alibaba and Adobe rounding out the top 10. These attacks commonly target the technology, social media, and banking sectors, as cybercriminals exploit brand familiarity to deceive users and capture credentials or payment information. Notably, new phishing sites targeting WhatsApp and Alibaba highlight the evolving strategies of threat actors seeking to exploit user trust. 

Key Insights: 

  • Microsoft Dominance: Microsoft phishing attempts made up 61% of brand impersonation attacks, with Apple and Google also highly targeted. 

  • Sector Focus: Technology and social networks were the most impersonated sectors, followed by banking. 

  • Evolving Phishing Tactics: Phishing websites like whatsapp-io.com and alibabashopvip.com show attackers adapting to impersonate new brands. 

Further Reading: Check Point’s Q3 2024 Brand Phishing Report. 

 

 

North Korean Cybercriminal Infiltrates UK Company 

A UK-based organization recently suffered a breach after inadvertently hiring a North Korean cybercriminal posing as a remote IT worker. Once hired, the attacker used insider access to extract sensitive information and eventually demanded a ransom for its non-disclosure. This case highlights the importance of strict hiring processes for remote roles and enhanced security practices. 

Key Insights: 

  • Vetting Remote Employees: Conduct rigorous background checks to confirm credentials. 

  • Data Security: Monitor access and behavior for early threat detection. 

  • Remote Work Risks: Be mindful of cyber threats exploiting virtual roles. 

Further Reading: KnowBe4 Article; KnowBe4 10 Hiring Updates 

 

 

North Korean Threat Actors Pose as Recruiters to Target Job Seekers 

Palo Alto Networks' Unit 42 recently uncovered a campaign in which North Korean threat actors pose as recruiters to lure tech job seekers into downloading malware disguised as legitimate communication tools. Known as the "Contagious Interview" campaign, this operation involves malware variants like BeaverTail and InvisibleFerret, which are capable of stealing credentials, exfiltrating sensitive files, and targeting cryptocurrency wallets. Victims are approached on professional platforms like LinkedIn, and then directed to install fake interview applications that serve as a conduit for malware. 

Key Insights: 

  • Sophisticated Impersonation Tactics: Attackers convincingly impersonate recruiters and use realistic job offers to build trust with targets. 

  • Multifunctional Malware: The malware used can harvest browser passwords, access cryptocurrency wallets, and install backdoors, enhancing its threat potential. 

  • Organizational Risk: Beyond individual targets, successful infections on company devices can lead to broader data breaches within organizations. 

As remote work and digital hiring continue to rise, it’s critical to validate the legitimacy of recruiters and avoid downloading unverified software for job interviews. 

Further Reading: Unit 42 Report on North Korean Recruitment Tactics 

 

 

Pig Butchering Scams Target Job Seekers 

Proofpoint has identified a new twist in cryptocurrency fraud, known as "Pig Butchering," targeting job seekers. Scammers posing as recruiters lure victims into fake job roles, eventually guiding them to invest in fraudulent cryptocurrency platforms. Victims see initial "profits" to build trust, but ultimately lose their entire investment. These scams often begin on social media, moving to platforms like WhatsApp or Telegram for further manipulation. 

Further Reading: Proofpoint Article. 

 

 

Foreign Disinformation on U.S. Hurricanes 

Recent intelligence shows that operatives from Russia, China, and Cuba have spread false information about U.S. hurricanes to deepen political divides. AI-generated images and misleading posts claimed federal relief was denied or funds were diverted to foreign conflicts, aiming to erode trust in U.S. disaster response. Be cautious of divisive narratives or unverified disaster images on social media, as they may be part of coordinated disinformation efforts. 

Further Reading: NBC News Article. 

 

 

Social Engineering Exploits Valid Accounts 

Recent incidents highlight how threat actors are compromising legitimate accounts through social engineering tactics. By manipulating individuals into divulging sensitive information or performing specific actions, attackers gain unauthorized access to systems and data. This method often involves impersonating trusted entities or creating convincing scenarios to deceive targets. 

Key Insights: 

  • Impersonation Tactics: Attackers frequently pose as IT support or company executives to extract credentials. 

  • Phishing Campaigns: Sophisticated emails and messages are crafted to appear authentic, luring recipients into providing access details. 

  • Insider Threats: Compromised accounts can be used to launch further attacks within an organization, making detection challenging. 

Further Reading: KnowBe4 Article on Social Engineering Exploits. 

 

 

Major Data Breach at Change Healthcare Affects 100 Million Americans 

In February 2024, Change Healthcare, a leading U.S. healthcare technology company, experienced a significant ransomware attack that compromised the personal, financial, and medical information of approximately 100 million individuals. The breach disrupted healthcare services nationwide, highlighting vulnerabilities in the sector's cybersecurity defenses. 

Key Insights: 

  • Scope of Breach: The attack exposed sensitive data, including medical records, billing information, and personal identifiers such as Social Security numbers and driver's license details. 

  • Financial Impact: UnitedHealth Group, Change Healthcare's parent company, reported direct breach response costs of $1.521 billion and total cyberattack impacts of $2.457 billion. 

  • Ransom Payment: The company paid a $22 million ransom to the BlackCat ransomware group in an attempt to secure the stolen data. 

Further Reading: Change Healthcare Breach Hits 100M Americans – Krebs on Security 

 

 

Student Loan Phishing Scams Targeting Millions 

Cybercriminals are exploiting confusion around student loan forgiveness with a surge in phishing emails targeting millions of Americans. These emails use advanced techniques to look legitimate and bypass email filters, making them harder to detect. 

What You Can Do to Stay Safe: 

  • Watch for Red Flags: Be cautious with emails related to student loans, especially those asking for immediate action or personal information. Verify any claims by contacting your loan service provider directly. 

  • Check the Source: Always look closely at the sender’s email address. Official communication will come from verified addresses, not random or suspicious-looking senders. 

  • Enable Multi-Factor Authentication (MFA): Use MFA on your financial accounts for extra security, making it harder for attackers to gain access if they obtain your credentials. 

  • Be Prepared: Know how to report a suspicious email in your email system, and don’t hesitate to delete anything that seems off. 

Further Reading: Check Point Blog. 

In News Tags Newsletter, Security Awareness
Comment

Created by ChatGPT

Security Awareness Newsletter - October 2024

October 18, 2024

This is a newsletter I share internally as part of our internal security awareness program. Feel free to take and use in your organization. Created with help from ChatGPT

Spamouflage: State-Linked Influence Operations Target U.S. Elections 

Summary: A Chinese state-linked influence operation, Spamouflage, is ramping up efforts to sway U.S. political discourse ahead of the 2024 election. By posing as U.S. voters and using AI-generated content, they spread divisive narratives on social media about sensitive issues like gun control and racial inequality. These tactics highlight the importance of vigilance against foreign influence campaigns and fake online personas. 

Key Insight: Verify online sources and stay aware of potential influence operations. 

Further Reading: Graphika Report 

 

 

Lazarus Hackers Target Job Seekers with Malware-Laden Job Offers 

Summary: The Lazarus Group is actively targeting job seekers, particularly those in blockchain-related fields, by disguising malware within fake job offers. The group utilizes platforms like LinkedIn, Upwork, and Telegram to distribute malicious software, including the "BeaverTail" malware, which steals credentials and cryptocurrency wallet data. Job seekers should be cautious of unsolicited job offers and avoid downloading unfamiliar files. 

Key Insight: Always verify job offers and avoid downloading files from unknown sources. 

Further Reading: GBHackers Article 

 

 

Foreign Influence Operations Target U.S. 2024 Election 

Summary: U.S. intelligence officials warn of increased influence operations from Russia, China, and Iran aimed at U.S. voters ahead of the 2024 election. These operations, while not yet disrupting voting infrastructure, spread disinformation through media, PR firms, and American influencers. A recent U.S. indictment highlights Russia's attempts to covertly funnel pro-Russian narratives into right-wing media, signaling the need for heightened vigilance as the election approaches. 

Key Insight: Stay alert to disinformation and foreign influence in political content. 

Further Reading: CyberScoop Article 

 

 

Lowe's Employees Targeted by Google Ads Phishing Campaign 

Summary: Lowe's employees were recently targeted by a phishing attack using fraudulent Google ads mimicking the MyLowesLife portal. Attackers designed fake login pages to steal employee credentials. This highlights the dangers of using search engines to access work-related sites. Employees should be reminded to avoid clicking on sponsored links and instead bookmark legitimate sites to protect against phishing attacks. 

Tip: Always access work portals through bookmarks or trusted URLs, not through search engines. 

Further Reading: Malwarebytes Blog 

 

 

Email Breaches at Welcome Health & United Way of Connecticut 

Summary: Welcome Health and United Way of Connecticut reported email account breaches compromising sensitive data. At Welcome Health, patient information and contractor Social Security numbers were exposed, while a phishing attack on United Way's employee email compromised data of up to 8,039 patients. Both organizations have responded with enhanced security measures and offered credit monitoring to affected individuals. 

Further Reading: HIPAA Journal 

 

 

False Claims of Hacked Voter Data Intended to Undermine U.S. Elections 

Summary: The FBI and CISA have issued a joint public service announcement warning about false claims of hacked voter information. Foreign actors may spread disinformation to erode public confidence in U.S. elections, especially by exaggerating claims of compromised voter data. The agencies urge citizens to critically evaluate such claims and remind that much voter information is public. 

Key Insight: Stay vigilant against disinformation campaigns designed to sow distrust in election processes. 

Further Reading: CISA Announcement 

 

 

Beware of Parking Payment Scams Involving Fake QR Codes 

Summary: Drivers in the UK are being targeted by scammers who place fake QR codes on parking machines. These codes lead to fraudulent websites designed to steal payment information. The RAC warns drivers to avoid using unfamiliar QR codes and instead rely on cash, card, or official apps for parking payments. This "quishing" scam has been reported across multiple UK regions, with an increasing number of incidents. 

Key Insight: Be cautious when scanning QR codes, especially in public places like parking machines. 

Further Reading: RAC News  

 

 

Florida Healthcare Data Leak Exposes Thousands of Doctors and Hospitals 

Summary: A data breach at MNA Healthcare exposed sensitive information of over 14,000 healthcare workers and 10,000 hospitals, including encrypted Social Security Numbers, addresses, and job details. The breach, caused by a misconfigured database, increases risks of identity theft and fraud. Healthcare professionals and institutions are advised to enhance cybersecurity measures, monitor financial accounts, and consider identity theft protection. 

Further Reading: Cybersecurity News 

 

 

New Sextortion Scam Uses Photos of Victims' Homes 

Summary: A recent wave of sextortion scams has taken a more personalized approach, including photos of victims' homes in threatening emails. Scammers claim to have recorded compromising footage through malware and demand Bitcoin payments to avoid releasing the videos. The photos are often pulled from online mapping services to increase intimidation. To stay safe, avoid responding to such emails, keep webcams covered when not in use, and report incidents to law enforcement. 

Further Reading: Krebs on Security 

 

 

Google Password Manager Now Syncs Passkeys Across Devices 

Summary: Google Password Manager now automatically syncs passkeys across Windows, macOS, Linux, Android, and ChromeOS devices. Passkeys, which use biometrics like fingerprints and facial recognition, offer a more secure alternative to passwords. With this update, passkeys are encrypted and accessible on all devices, enhancing security and convenience for users. Google has also introduced a new PIN feature to ensure end-to-end encryption for synchronized data. 

Further Reading: BleepingComputer Article 

 

 

FTC Report Exposes Surveillance by Social Media and Streaming Giants 

Summary: The FTC has released a report revealing that major social media and video streaming platforms engage in extensive data collection and surveillance of users, including children and teens. The report highlights inadequate privacy protections and raises concerns about the use of data for targeted advertising. The FTC recommends stronger privacy laws, data minimization, and enhanced safeguards for younger users. 

Key Insight: Ensure your social media use is mindful of privacy risks, and review settings to limit data sharing. 

Further Reading: FTC Report 

 

 

Operation Overload: A Disinformation Threat Targeting U.S. Elections 

Summary: Operation Overload, a Russia-linked disinformation campaign, is ramping up efforts targeting U.S. voters ahead of the 2024 presidential election. The operation uses AI-generated fake content, such as fabricated TikTok videos and doctored news articles, to spread false narratives. Recent emails aimed at smearing Vice President Kamala Harris highlight the evolving tactics. It's critical for newsrooms and voters to remain vigilant and fact-check claims. 

Key Insight: Be cautious of AI-generated content that mimics legitimate sources to manipulate public opinion. 

Further Reading: CheckFirst Report 

 

 

Phishing Attack Uses Two-Step Approach to Evade Detection 

Summary: A new phishing attack leverages a two-step process, using legitimate platforms like Microsoft Office Forms as an intermediary to evade detection. After clicking the phishing email link, users are directed to a legitimate form before being redirected to a fake login page designed to steal credentials. This sophisticated approach helps attackers bypass security filters by exploiting trusted platforms. 

Key Insight: Be cautious of phishing links that utilize legitimate services as intermediaries before redirecting to malicious sites. 

Further Reading: KnowBe4 Blog 

 

 

Investment Scam Losses Surge Six-Fold Since 2021 

Summary: The Better Business Bureau reports a six-fold increase in losses from investment scams since 2021. Scammers frequently exploit dating platforms and hacked social media accounts to lure victims into fraudulent cryptocurrency schemes. Victims are often promised high returns on investments, only to lose significant amounts of money. Common red flags include promises of guaranteed returns, little-known cryptocurrencies, and requests to share wallet details. 

Key Insight: Be cautious of unsolicited investment offers and avoid sharing cryptocurrency wallet details with unverified individuals. 

Further Reading: KnowBe4 Blog 

 

 

HR-Related Phishing Tactics on the Rise 

Summary: Threat actors are using HR-related phishing emails, posing as internal messages like "Updated Employee Handbook," to trick employees into clicking malicious links. These attacks often lead victims to fake login pages that steal their credentials. The emails appear legitimate, making it crucial for employees to be extra cautious with HR communications and verify any unusual requests directly with their HR department. 

Key Insight: Always verify HR-related emails before clicking links or providing sensitive information. 

Further Reading: Cofense Blog 

 

 

Foreign Influence Operations Using AI to Target U.S. Elections 

Summary: According to a recent ODNI election security update, foreign actors—primarily Russia and Iran—are increasingly using AI-generated content to influence U.S. voters. These actors are deploying manipulated media across various formats, including text, images, audio, and video, to spread disinformation and fuel divisive political narratives. As Election Day approaches, U.S. citizens should be vigilant about AI-generated content and misinformation campaigns. 

Key Insight: Verify sources and be cautious of sensationalized or divisive media, especially content that seems AI-generated. 

Further Reading: ODNI Election Security Update 

 

 

Expert Tips to Identify Phishing Links 

Summary: Phishing attacks are becoming more sophisticated, but there are key ways to spot phishing links. Security experts advise checking for suspicious URLs with complex characters, paying attention to redirect chains, and inspecting page titles or missing favicons. Attackers also abuse CAPTCHA and Cloudflare checks to mask phishing attempts. Tools like ANY.RUN’s Safebrowsing can help safely analyze suspicious links before engaging with them. 

Key Insight: Always inspect URLs carefully and use tools to analyze suspicious links in a safe environment. 

Further Reading: The Hacker News 

 

 

The Dangerous Intersection Between Cybercrime and Harm Groups 

Summary: A recent investigation reveals that some cybercriminals involved in ransomware attacks are also tied to violent online communities. These groups, often targeting young people, manipulate victims into self-harm or harming others. They use platforms like Telegram and Discord to coordinate harassment and extortion, demonstrating the increasing overlap between cybercrime and real-world violence. 

Key Insights: 

  • Cybercriminals are also involved in harm groups. 

  • Young people are often victims of online manipulation. 

  • Cybercrime is increasingly crossing into physical violence. 

Read more: Krebs on Security. 

 

 

Cyber Predators Exploit Healthcare Vulnerabilities with Ransomware and Data Theft 

Summary: Cybercriminals are increasingly targeting healthcare organizations, exploiting weaknesses to steal patient data and extort hospitals via ransomware attacks. These criminals collaborate through darknet marketplaces, offering ransomware-as-a-service, and trading access to compromised healthcare systems. With attacks up 32% globally in 2024, healthcare remains a prime target due to its valuable data and often outdated security infrastructure. 

Key Insights: 

  • Healthcare sees an average of 2,018 attacks weekly, with APAC and Latin America hit hardest. 

  • Ransomware-as-a-service empowers less experienced criminals. 

  • Hospitals face high risks due to the critical nature of their operations. 

Read more: Checkpoint Research. 

 

 

Beware of Funeral Streaming Scams on Facebook 

Summary: Scammers are exploiting Facebook by creating fake funeral streaming groups, tricking grieving families into providing credit card information to view a supposed service. These fraudulent groups use the deceased's images to appear legitimate and direct users to malicious websites requesting payment. This scheme preys on vulnerable people, often at their most emotional moments. 

Key Insights: 

  • Fake funeral streaming pages ask for credit card details. 

  • Scammers use social media to create convincing, emotional traps. 

  • Stay vigilant and verify event details before engaging. 

Read more: Krebs on Security. 

 

 

Phishing Campaign Exploits Google Apps Script for Sophisticated Attacks 

Summary: A new phishing campaign manipulates Google Apps Script macros to target users across multiple languages. The phishing emails falsely claim to provide “account details” and include links to malicious pages mimicking legitimate Google services. Victims are tricked into disclosing sensitive information, leading to data theft and operational disruption. 

Key Insights: 

  • Attack uses Google’s infrastructure to appear legitimate. 

  • Affected users may disclose sensitive data via a deceptive Google Apps Script URL. 

  • Advanced email filtering, real-time URL scanning, and phishing awareness training are crucial defenses. 

For more details, visit Checkpoint Research. 

 

 

New Windows PowerShell Phishing Campaign Highlights Serious Risks 

Summary: A recently discovered phishing campaign uses GitHub-themed emails to trick recipients into launching PowerShell commands, enabling the download of password-stealing malware. The attack uses social engineering techniques, disguising itself as a CAPTCHA verification process. By exploiting PowerShell’s automation capabilities, attackers gain unauthorized access to credentials stored on victims' systems. 

Key Insights: 

  • Attack targets GitHub users but could be adapted for broader use. 

  • Exploits PowerShell to execute malicious commands. 

  • Vigilance and disabling unnecessary PowerShell access are crucial defenses. 

For more, visit Krebs on Security. 

 

 

Phishing Attacks Exploit Content Creation and Collaboration Platforms 

Summary: A recent phishing campaign abuses popular content creation and collaboration tools to trick users into clicking malicious links. Cybercriminals use legitimate-looking posts and documents with embedded phishing URLs, leading to credential theft through fake login pages. These attacks have been seen in both business and educational environments. 

Key Insights: 

  • Phishing emails from trusted platforms contain hidden threats. 

  • Common platforms include design tools and document-sharing services. 

  • Users should be cautious of unexpected links and suspicious login requests. 

For more information, visit KnowBe4. 

 

 

Scammers Exploit Virtual Shopping Lists to Target Walmart Customers 

Summary: Cybercriminals are using Walmart’s virtual shopping list feature to scam customers by embedding fake customer support numbers. Clicking these links, often promoted via malicious ads, leads users to scammers who impersonate law enforcement or bank employees. Victims are coerced into transferring funds, often under false threats of legal consequences. 

Key Insights: 

  • Scammers misuse legitimate platforms like Walmart's shopping lists. 

  • Ads can redirect to fake support numbers. 

  • Stay vigilant of scare tactics and unsolicited requests for money. 

For more details, visit KnowBe4. 

 

 

Cyber Threats Looming for the 2024 U.S. Election 

Summary: As the 2024 U.S. election approaches, cyber threats from nation-state actors, hacktivists, and cybercriminals are expected to rise. These include disinformation campaigns, phishing attacks, and attacks on electoral infrastructure. Businesses should brace for phishing campaigns and SEO poisoning targeting politically charged topics. 

Key Insights: 

  • Nation-state groups may conduct hack-and-leak operations and influence campaigns. 

  • Expect a surge in phishing attacks and scams using election-related themes. 

  • Businesses should implement advanced cybersecurity measures to mitigate risks. 

For more details, visit ReliaQuest. 

 

 

Timeshare Scam Linked to Mexican Drug Cartel Targets U.S. Owners 

Summary: The FBI has issued a warning about a telemarketing scam targeting timeshare owners, linked to the Jalisco New Generation drug cartel. Scammers posing as buyers lure victims into paying advance fees for fraudulent timeshare sales. The funds are used to finance other cartel activities. Victims are often reluctant to report the scam due to fear or embarrassment. 

Key Insights: 

  • Scammers pose as buyers offering above-market prices. 

  • Victims lose thousands in fraudulent fees. 

  • Report scams to authorities to prevent further harm. 

For more details, visit Krebs on Security. 

In News Tags Newsletter, Security Awareness
Comment

Created by ChatGPT

Phishing Threat Intelligence Newsletter for October 2024

October 18, 2024

This is a monthly newsletter I put together for our internal security team with a lean towards phishing and healthcare. Created with help from ChatGPT.

Phishing via Google Ads Targets Lowe’s Employees 

Summary: Interesting technicque to watch. A recent malvertising campaign targeted Lowe’s employees by impersonating the company’s employee portal through fraudulent Google ads. Threat actors used phishing pages that closely resembled the legitimate MyLowesLife site to steal login credentials. These attacks underline the need for caution when clicking on sponsored links, especially for accessing internal portals.  

Key Insight: Avoid using search engines to access internal portals—bookmark them instead to reduce exposure to phishing. 

Further Reading: Malwarebytes Blog 

 

 

Emerging Phishing Threats: Typosquatting and Brand Impersonation Trends 

Summary: Zscaler's research uncovers a growing trend in phishing attacks involving typosquatting and brand impersonation. Attackers are increasingly mimicking popular brands using lookalike domains to trick users into divulging sensitive information. 

Key Insights: 

  • Over 10,000 malicious domains detected between February and July 2024. 

  • Google, Microsoft, and Amazon are the top impersonated brands. 

  • Attackers use free TLS certificates to evade detection. 

  • Sectors like Internet Services and Online Shopping are prime targets. 

For more details, visit Zscaler's blog. 

 

 

Suspected Espionage Campaign Delivers “Voldemort” Malware 

Summary: Proofpoint researchers identified a sophisticated espionage campaign distributing custom malware named "Voldemort." This campaign used advanced techniques like abusing Google Sheets for command and control (C2) and targeting organizations globally by impersonating tax authorities. The malware, likely tied to an APT actor, has intelligence-gathering capabilities and is suspected of espionage rather than financial gain. 

Key Insights: 

  • Targeted over 70 organizations across multiple sectors. 

  • Abuses Windows file protocols and advanced C2 mechanisms. 

For more details, visit Proofpoint's blog. 

 

 

Scattered Spider Targets Insurance and Financial Sectors Using Cloud Ransomware 

Summary: The Scattered Spider group has intensified its ransomware attacks on the insurance and financial industries, leveraging cloud vulnerabilities and phishing campaigns to compromise high-privileged accounts. The group uses social engineering tactics, including SIM swapping, smishing, and cloud credential theft, to gain unauthorized access. Their advanced techniques, combined with partnerships like BlackCat, have made them a formidable threat to cloud-based infrastructures. 

Further Reading: EclecticIQ Blog 

 

 

Top Cyber Attacker Techniques: May-July 2024 Insights 

Summary: ReliaQuest’s report from May to July 2024 highlights the growing threat of phishing, accounting for 37% of incidents. The “SocGholish” malware, delivered via fake browser updates, remains widespread. Additionally, exposed credentials make up 88.75% of alerts, posing significant risks. Key sectors targeted by ransomware include manufacturing and tech. To defend against these threats, organizations should enhance multi-factor authentication, monitor user behavior, and deploy rapid response measures. 

Key Insights: 

  • Phishing remains a top threat. 

  • Credential exposure is a major risk. 

  • Ransomware is heavily targeting manufacturing and tech sectors. 

Further Reading: ReliaQuest Blog 

 

 

Unveiling RECORDSTEALER: A Persistent Infostealer Targeting Sensitive Data 

Summary: RECORDSTEALER (Raccoon Stealer V2) is a malware targeting sensitive information like passwords, payment data, and cryptocurrency wallets. It infects systems through malvertising and fake downloads, focusing on web browsers for data exfiltration. RECORDSTEALER’s infrastructure has been disrupted, but related malware such as VIDAR and STEALC are still active. 

Key Insights: 

  • Uses browser exploits for credential harvesting. 

  • Communicates with command-and-control servers using encrypted channels. 

  • Evades detection via obfuscation and process injection. 

Further Reading: Google Cloud Blog 

 

 

Splinter: A New Post-Exploitation Red Team Tool 

Summary: Splinter, a post-exploitation tool developed in Rust, allows for remote command execution, file uploads, and process injection. It uses encrypted HTTPS for command-and-control (C2) communication, making it harder to detect. Initially built for red team operations, the tool's misuse poses significant risks to compromised systems. 

Technical Key Insights: 

  • Splinter supports process injection into system processes. 

  • Uses encrypted C2 channels for communication. 

  • Built with Rust for enhanced performance and cross-platform compatibility. 

Further Reading: Unit 42 Article 

 

 

Supershell Malware Targeting Linux SSH Servers 

Summary: Supershell, a Go-based backdoor, is being deployed on Linux SSH servers through brute-force attacks. Once installed, it provides attackers with remote access via a reverse shell, enabling them to hijack systems and deploy additional payloads like cryptocurrency miners. 

Key Insights: 

  • Uses reverse shell for remote control. 

  • Exploits weak SSH credentials via brute-force attacks. 

  • Can execute additional malicious payloads, such as XMRig miners. 

  • Written in Go, enhancing cross-platform capabilities. 

Further Reading: AhnLab ASEC Report 

 

 

Cybercriminals Exploit Legitimate Software with CAMO Techniques 

Summary: ReliaQuest's latest findings reveal the growing use of legitimate IT tools by cybercriminals in "Commercial Applications, Malicious Operations" (CAMO). These tools, such as PDQ Deploy and SoftPerfect, are used for spreading ransomware, exfiltrating data, and evading detection by blending into normal network operations. This trend complicates incident detection and response. 

Key Insights: 

  • CAMO tools can bypass detection by leveraging legitimate system capabilities. 

  • Attackers use trusted tools to move laterally and exfiltrate data. 

  • Network segmentation, monitoring, and whitelisting can mitigate these threats. 

Further Reading: ReliaQuest Blog 

 

 

Phishing Attack Uses Two-Step Approach to Evade Detection 

Summary: A new phishing attack leverages a two-step process, using legitimate platforms like Microsoft Office Forms as an intermediary to evade detection. After clicking the phishing email link, users are directed to a legitimate form before being redirected to a fake login page designed to steal credentials. This sophisticated approach helps attackers bypass security filters by exploiting trusted platforms. 

Key Insight: Be cautious of phishing links that utilize legitimate services as intermediaries before redirecting to malicious sites. 

Further Reading: KnowBe4 Blog 

 

Surge in Malicious Links Marks 133% Increase in Q1 2024 

Summary: Phishing attacks using malicious links surged by 133% in the first quarter of 2024, as attackers shift away from traditional attachments to evade detection. Links allow attackers to obfuscate malicious content and use redirects, CAPTCHA, and legitimate services to conceal their payloads. This growing trend emphasizes the need for organizations to enhance email security and continuously train employees to spot suspicious links. 

Further Reading: KnowBe4 Blog 

 

 

HR-Related Phishing Tactics Grow More Sophisticated 

Summary: Threat actors are increasingly using HR-related phishing emails, disguised as official company communications, to trick employees into providing credentials. These phishing attacks often use urgent subjects like “Revised Employee Handbook,” leading victims to a fake Microsoft login page. Attackers use the stolen credentials for further exploitation. The campaign evades email security platforms by leveraging legitimate-looking content and psychological manipulation. 

Further Reading: Cofense Blog 

 

 

Inc Ransom Attack: Advanced Extortion Techniques Emerge 

Summary: The Inc Ransom group uses advanced techniques like data exfiltration without encryption, exploiting firewall vulnerabilities and hiding within legitimate network traffic using tools like Impacket and PowerShell. By deploying Rclone for data transfer, they evade detection while pressuring victims through extortion. The report includes details on a recent attack against a healthcare organization. 

Technical Key Insights: 

  • Use of Rclone for stealth data exfiltration. 

  • Abuse of firewall vulnerabilities for initial access. 

  • Impacket and PowerShell used to blend into legitimate traffic. 

  • Data theft replaces encryption in the extortion strategy. 

Further Reading: ReliaQuest Blog 

 

 

RansomHub Reigns, Meow Ransomware Surges in August 2024 

Summary: RansomHub leads ransomware threats, targeting Windows, macOS, Linux, and VMware ESXi systems using sophisticated encryption techniques. Meanwhile, Meow ransomware shifts focus from encryption to selling stolen data on leak marketplaces, employing the ChaCha20 encryption algorithm. Both groups aggressively target exposed RDP configurations and vulnerable systems. 

Technical Analysis: 

  • RansomHub uses robust encryption across multi-platform environments, complicating recovery. 

  • Meow exploits ChaCha20 for file encryption and omits .exe files, leveraging leak sites for extortion. 

  • Both utilize exposed RDP ports for initial access. 

Further Reading: Checkpoint Blog 

 

 

Phishing-as-a-Service Platform Sniper Dz Gains Traction with Unique Tactics 

Summary: The Sniper Dz Phishing-as-a-Service (PhaaS) platform has facilitated the creation of over 140,000 phishing websites. It offers pre-made phishing templates targeting major brands, leveraging public proxy servers and SaaS platforms to evade detection. Sniper Dz uses unique obfuscation techniques, enabling phishing campaigns to bypass traditional security measures while collecting stolen credentials. 

Key Insights: 

  • Sniper Dz uses proxy servers to hide phishing activities, making detection more difficult. 

  • Phishers can easily launch campaigns targeting popular services without needing technical expertise. 

  • Integrating proxy detection mechanisms and monitoring SaaS usage can help identify such attacks. 

Further Reading: Unit42 Article 

 

 

DragonForce Ransomware: Advanced Tactics and Affiliate Program 

Summary: DragonForce, using both LockBit and ContiV3 forks, targets critical sectors through its RaaS affiliate program. The ransomware employs sophisticated tactics like BYOVD to disable EDR/XDR systems, coupled with SystemBC for persistence and lateral movement. Affiliates can customize attacks using the builder to encrypt files, terminate security processes, and evade detection through advanced anti-analysis features. Mimikatz and Cobalt Strike are used for credential harvesting and system reconnaissance. 

Key Technical Insights: 

  • BYOVD: Drivers like TrueSight.sys and RentDrv.sys disable security. 

  • RSA-1024 & Salsa20 encryption for ransomware payloads. 

  • Use of PowerShell and Cobalt Strike for malware execution and persistence. 

Further Reading: Group-IB Blog 

 

 

RDP Brute-Force Attacks 

Summary: Remote Desktop Protocol (RDP) brute-force attacks remain a high-risk method for attackers to gain unauthorized access to networks. Cybercriminals exploit weak/default credentials and exposed RDP ports using automated tools, making it a preferred method for both nation-state and cybercriminal groups. Attackers can use compromised access for data theft, deploying ransomware, or selling credentials on dark web forums. 

Technical Highlights: 

  • Attackers use tools like Hydra and Medusa for brute-forcing RDP. 

  • RDP exploits involve enumeration via port scans and credential stuffing. 

  • Initial access brokers often sell RDP access for further attacks. 

Defense Recommendations: 

  • Use strong, unique passwords and multi-factor authentication. 

  • Limit RDP exposure to the internet, utilizing VPN and firewalls. 

  • Implement rate-limiting and robust monitoring to detect unusual RDP activity. 

For more details, you can visit ReliaQuest's article on RDP Brute-Force Attacks. 

 

 

New Phishing Tactic Exploits HTTP Headers for Stealthy Redirects 

Summary: Attackers are using a new technique involving HTTP response headers to automatically redirect users to phishing pages. The tactic leverages compromised websites, making the phishing links appear legitimate. This technique is particularly challenging to detect and has been observed in phishing campaigns targeting various industries. 

Key Insights: 

  • HTTP headers are manipulated for silent phishing page redirects. 

  • Attackers pre-populate victim data (like email addresses) to enhance credibility. 

  • Detection is difficult, requiring heightened user vigilance and advanced security monitoring. 

For more details, visit KnowBe4. 

 

 

Cyber Predators Exploit Healthcare Vulnerabilities with Ransomware and Data Theft 

Summary: Cybercriminals are increasingly targeting healthcare organizations, exploiting weaknesses to steal patient data and extort hospitals via ransomware attacks. These criminals collaborate through darknet marketplaces, offering ransomware-as-a-service, and trading access to compromised healthcare systems. With attacks up 32% globally in 2024, healthcare remains a prime target due to its valuable data and often outdated security infrastructure. 

Key Insights: 

  • Healthcare sees an average of 2,018 attacks weekly, with APAC and Latin America hit hardest. 

  • Ransomware-as-a-service empowers less experienced criminals. 

  • Hospitals face high risks due to the critical nature of their operations. 

Read more: Checkpoint Research. 

 

 

Phishing Campaign Exploits Google Apps Script for Sophisticated Attacks 

Summary: A new phishing campaign manipulates Google Apps Script macros to target users across multiple languages. The phishing emails falsely claim to provide “account details” and include links to malicious pages mimicking legitimate Google services. Victims are tricked into disclosing sensitive information, leading to data theft and operational disruption. 

Key Insights: 

  • Attack uses Google’s infrastructure to appear legitimate. 

  • Affected users may disclose sensitive data via a deceptive Google Apps Script URL. 

  • Advanced email filtering, real-time URL scanning, and phishing awareness training are crucial defenses. 

For more details, visit Checkpoint Research. 

 

 

New Windows PowerShell Phishing Campaign Highlights Serious Risks 

Summary: A recently discovered phishing campaign uses GitHub-themed emails to trick recipients into launching PowerShell commands, enabling the download of password-stealing malware. The attack uses social engineering techniques, disguising itself as a CAPTCHA verification process. By exploiting PowerShell’s automation capabilities, attackers gain unauthorized access to credentials stored on victims' systems. 

Key Insights: 

  • Attack targets GitHub users but could be adapted for broader use. 

  • Exploits PowerShell to execute malicious commands. 

  • Vigilance and disabling unnecessary PowerShell access are crucial defenses. 

For more, visit Krebs on Security. 

 

 

Phishing Attacks Exploit Content Creation and Collaboration Platforms 

Summary: A recent phishing campaign abuses popular content creation and collaboration tools to trick users into clicking malicious links. Cybercriminals use legitimate-looking posts and documents with embedded phishing URLs, leading to credential theft through fake login pages. These attacks have been seen in both business and educational environments. 

Key Insights: 

  • Phishing emails from trusted platforms contain hidden threats. 

  • Common platforms include design tools and document-sharing services. 

  • Users should be cautious of unexpected links and suspicious login requests. 

For more information, visit KnowBe4. 

 

 

Cyber Threats Looming for the 2024 U.S. Election 

Summary: As the 2024 U.S. election approaches, cyber threats from nation-state actors, hacktivists, and cybercriminals are expected to rise. These include disinformation campaigns, phishing attacks, and attacks on electoral infrastructure. Businesses should brace for phishing campaigns and SEO poisoning targeting politically charged topics. 

Key Insights: 

  • Nation-state groups may conduct hack-and-leak operations and influence campaigns. 

  • Expect a surge in phishing attacks and scams using election-related themes. 

  • Businesses should implement advanced cybersecurity measures to mitigate risks. 

For more details, visit ReliaQuest. 

In News Tags Newsletter, phishing, threat intelligence
Comment

Image created by ChatGPT.

Security Awareness Newsletter From August 2024

September 10, 2024

These are news stories I’ve shared internally at my company. Feel free to take and use as part of your security awareness program.

Russia-linked Operations Target Paris 2024 Olympics 

In the lead-up to the 2024 Summer Olympics in Paris, Russian-linked actors launched a disinformation campaign to discredit France’s hosting capabilities and spread fear of terrorist attacks. These operations employed tactics like AI-generated videos, fake news reports, and social media hashtags to undermine confidence and create chaos. France's support for Ukraine has made it a target for these hybrid destabilization efforts. Stay vigilant against misinformation and verify sources before sharing content online. 

Key Insights: 

  • Russian-linked actors are targeting the Paris 2024 Olympics. 

  • Disinformation tactics include AI-generated content and fake news. 

  • The campaign aims to undermine confidence and spread fear. 

  • Verify information from trusted sources to avoid spreading misinformation. 

For more details, visit the DFRLab article. 

 

 

Ransomware Attacks on Blood Suppliers 

In a concerning trend, blood suppliers have faced three ransomware attacks in the past three months. The latest victim, OneBlood, experienced a significant disruption, impacting over 350 hospitals and causing a critical shortage of blood supplies. This follows similar attacks on Synnovis and Octapharma, highlighting the growing threat to healthcare infrastructure. The American Hospital Association urges health systems to review their contingency plans to mitigate such risks. 

Key Insights: 

  • OneBlood hit by ransomware, causing severe blood supply disruptions. 

  • Recent attacks also targeted Synnovis and Octapharma. 

  • Increased targeting of healthcare infrastructure by ransomware groups. 

  • Review and update contingency plans to ensure operational resilience. 

For more details, visit the Healthcare IT News article. 

 

 

Surge in Data Breach Victims in 2024 

In the first half of 2024, over 1 billion individuals were affected by data breaches, a staggering increase compared to 2023. The majority of breaches targeted financial services, healthcare, and manufacturing sectors. Alarmingly, there is a significant rise in attacks with unspecified vectors, highlighting a need for improved transparency and information sharing to bolster defense strategies. Phishing remains the primary attack method, underscoring the importance of robust security awareness training. 

Key Insights: 

  • Over 1 billion victims in the first half of 2024. 

  • Top targets: financial services, healthcare, manufacturing. 

  • Increase in unspecified attack vectors. 

  • Phishing remains the leading attack method. 

For more details, visit the KnowBe4 article. 

 

 

Foreign Influence Actors Adapting to U.S. Presidential Race 

U.S. intelligence agencies have identified that foreign influence actors are adapting their strategies in response to changes in the 2024 U.S. presidential race. These actors are leveraging social media, misinformation campaigns, and other digital tactics to sway public opinion and disrupt the electoral process. Key sources of influence include Russia, China, and Iran, each employing sophisticated techniques to achieve their objectives. 

Key Insights: 

  • Foreign actors are evolving their methods to interfere in the U.S. elections. 

  • Tactics include social media manipulation and misinformation. 

  • Vigilance and media literacy are crucial to counter these threats. 

For more details, visit the Reuters article. 

 

 

$40 Million Recovered from International Email Scam 

Interpol's Global Rapid Intervention of Payments (I-GRIP) mechanism helped recover over $40 million from an international email scam targeting a Singapore-based commodity firm. The scam involved a fraudulent email from a fake supplier requesting payment to a new bank account. Swift action by Singapore and Timor Leste authorities led to the interception of funds and the arrest of seven suspects. 

Key Insights: 

  • Swift action: Crucial in intercepting fraudulent funds. 

  • Global cooperation: Essential for combating international scams. 

  • Awareness: Verify email requests for fund transfers. 

For more details, visit the Interpol article. 

 

 

Cyberattack on France's Grand Palais During Olympics 

France's Grand Palais suffered a ransomware cyberattack during the 2024 Olympic Games. The attack led to operational disruptions, particularly affecting museum bookstores and boutiques. Swift action was taken to prevent the spread of the attack, and temporary autonomous solutions were implemented to keep stores operational. Authorities, including ANSSI and CNIL, were informed, and preliminary investigations found no data exfiltration. This incident highlights the importance of robust cybersecurity measures, especially during major events. 

Key Insights: 

  • Ransomware Attack: Disrupted operations at Grand Palais. 

  • Immediate Response: Systems shut down to prevent spread. 

  • No Data Exfiltration: Preliminary findings are positive. 

For more details, visit the Bleeping Computer article. 

 

 

Rising Costs of Data Breaches in Healthcare 

A recent report by IBM and the Ponemon Institute revealed that the healthcare industry faces the highest average data breach costs at $10.93 million, significantly above the global average of $4.45 million. These breaches, often involving stolen credentials, can take up to 292 days to resolve. Healthcare organizations are urged to implement AI and automation in cybersecurity to reduce breach lifecycle and costs. Incident response planning and stringent data protection measures are essential to mitigate these risks. 

For more details, visit the Security Intelligence article. 

 

 

Enhanced Protection in Chrome 

Google has revamped the Chrome downloads experience to boost security and user awareness. The redesigned interface now offers detailed warnings, classifying files as either suspicious or dangerous, using AI-powered assessments. Enhanced Protection mode users benefit from automatic deep scans for suspicious files, providing extra layers of safety against new malware. Additionally, Chrome now tackles encrypted malicious files by prompting users to enter passwords for deep scans, enhancing protection even further. These updates aim to reduce user bypassing of warnings and improve overall safety when downloading files. 

For more details, visit the Google Security Blog. 

 

 

New Phishing Campaign Exploits Google Drawings and WhatsApp 

Menlo Security has uncovered a sophisticated phishing campaign that abuses Google Drawings and WhatsApp's URL shortener to deceive users. The attack redirects victims from what appears to be legitimate links to malicious sites mimicking trusted brands like Amazon. These tactics make it difficult for users and traditional security tools to detect the threat. Stay cautious of unexpected emails with links or attachments, even if they appear to be from familiar sources. 

Key Insights: 

  • Exploited Platforms: Google Drawings and WhatsApp's URL shortener. 

  • Phishing Tactics: Redirection to malicious sites mimicking trusted brands. 

  • Recommendation: Be cautious of unexpected emails with links, even from known sources. 

For more details, visit the Menlo Security article. 

 

 

Real Social Engineering Attack on KnowBe4 Employee Foiled 

KnowBe4 recently thwarted a social engineering attack targeting one of its employees. The attacker, posing as a customer support representative, attempted to gain unauthorized access to internal systems by exploiting trust and urgency. The employee recognized the signs of a phishing attempt and reported the incident immediately. This event underscores the importance of ongoing security awareness training and vigilance against social engineering tactics. 

Key Insights: 

  • Social Engineering: Attackers may pose as trusted sources to gain access. 

  • Vigilance: Recognizing and reporting suspicious activity is crucial. 

  • Training: Regular security awareness training is essential to prevent such attacks. 

For more details, visit the KnowBe4 article. 

 

 

Beware of Misinformation on TikTok: Protect Yourself from Political Lies 

In today's digital age, social media platforms like TikTok are not just sources of entertainment—they have become powerful tools for spreading information, both true and false. A recent study revealed that a staggering 33% of young Americans have been exposed to political lies on TikTok. This statistic highlights a growing concern: the rapid spread of misinformation, particularly among younger generations. 

Why This Matters: Misinformation, especially on social media, can influence opinions, sway elections, and even create social unrest. For cybercriminals, misinformation is a weapon. They can use false information to manipulate public perception, incite division, or even scam users by blending lies with phishing attacks. 

How to Protect Yourself: 

  1. Verify Before You Trust: Always cross-check information from multiple credible sources before believing or sharing it. Look for news from established, reputable outlets. 

  1. Be Skeptical of Viral Content: Just because something is popular doesn't mean it's true. Viral videos and posts may be designed to elicit strong emotional responses, making it easier to spread falsehoods. 

  1. Watch for Red Flags: Pay attention to signs of misinformation, such as sensational headlines, lack of credible sources, and emotionally charged language. 

  1. Educate Yourself and Others: Stay informed about the tactics used by those who spread misinformation. Share your knowledge with friends and family to help them avoid being misled. 

Conclusion: As we continue to navigate the complex world of social media, staying vigilant against misinformation is crucial. By adopting a skeptical mindset and verifying the content we encounter online, we can protect ourselves and our communities from the harmful effects of political lies and other forms of disinformation. 

 

 

Exposed Passwords Highlight Risk 

A recent breach at National Public Data (NPD) underscores the critical need for strong security practices. NPD inadvertently published administrator passwords to their backend database, exposing sensitive information. This incident, coupled with a previous massive data leak, highlights the importance of securing credentials and regularly updating passwords. Users of similar services should take immediate steps to protect their personal information, including freezing their credit files and monitoring their accounts for suspicious activity. 

Key Takeaway: Ensure your passwords are strong, unique, and updated regularly to avoid similar risks. 

Read more 

 

 

Unmasking Styx Stealer 

Checkpoint Research uncovered the Styx Stealer malware, designed to steal browser data, cryptocurrency, and instant messenger sessions. The developer's operational security mistakes, including leaking data during debugging, led to a treasure trove of intelligence. This discovery linked Styx Stealer to the Agent Tesla malware campaign, revealing details about the cybercriminals involved, including their identities and operations. 

Key Insights: 

  • Malware Functionality: Steals browser data, cryptocurrency, and instant messenger sessions. 

  • OpSec Failures: Leaks led to significant intelligence gathering. 

  • Linkage: Connected to the Agent Tesla campaign and other cybercriminals. 

For more details, visit the Checkpoint article. 

 

 

AI Vishing Threats on the Rise 

Recent research by KnowBe4 has demonstrated that unsuspecting call recipients are highly vulnerable to AI-driven vishing (voice phishing) attacks. These attacks leverage AI to create highly convincing voice manipulations, often impersonating trusted individuals or authority figures. The study highlights the importance of being skeptical of unsolicited calls, even if the caller sounds familiar. Employees should verify the authenticity of any unexpected requests over the phone before taking action. 

Key Insights: 

  • AI Vishing: Increasingly sophisticated and convincing. 

  • Verification: Always verify unexpected phone requests. 

  • Awareness: Stay vigilant against unsolicited calls. 

For more details, visit the KnowBe4 article. 

 

 

Employment Scams Targeting Job Seekers 

KnowBe4 reports a surge in employment scams targeting job seekers. Scammers pose as legitimate employers, often using fake job postings or direct outreach to collect personal information and money from victims. These scams exploit the urgency and desperation of job seekers, making them particularly effective. To protect yourself, always verify job offers through official channels, be cautious of unsolicited communications, and avoid sharing sensitive information without thorough verification. 

Key Insights: 

  • Scam Tactics: Fake job postings and direct outreach. 

  • Target: Personal information and money from job seekers. 

  • Recommendation: Verify job offers through official channels. 

For more details, visit the KnowBe4 article. 

 

 

Protect Yourself from File-Sharing Phishing Attacks 

Over the past year, file-sharing phishing attacks have surged by 350%, targeting employees through fake notifications from services like Google Drive or Dropbox. These attacks aim to steal sensitive information or infect your device with malware. To protect yourself, always verify the legitimacy of file-sharing requests, avoid clicking on suspicious links, and report any unusual emails to IT immediately. Staying vigilant is key to keeping our organization secure. 

For more details, visit the KnowBe4 article. 

 

 

Beware of Travel-Themed Spam Scams 

Bitdefender’s AntiSpam Lab warns that half of all travel-themed spam messages circulating worldwide are scams. Attackers are specifically targeting users of popular travel sites like Booking.com and Airbnb. These scams often involve fake booking confirmations and travel deals designed to steal personal information or deliver malware. With the travel season in full swing, it's essential to verify the authenticity of any travel-related emails and avoid clicking on suspicious links. 

Key Insights: 

  • 50% of travel-themed spam messages are scams. 

  • Targeted Platforms: Booking.com and Airbnb users. 

  • Recommendation: Verify emails and book through trusted sources. 

For more details, visit the Bitdefender article. 

 

 

Beware of Phishing Attacks Using URL Shorteners 

Phishing attacks are increasingly leveraging URL shorteners to obfuscate malicious links, making it harder for users to recognize potential threats. These shortened URLs often appear in emails or text messages, leading victims to fraudulent websites that steal personal information or deploy malware. To protect yourself, always hover over links to reveal their true destination, and avoid clicking on shortened URLs from unknown sources. 

For more details, visit the KnowBe4 article. 

 

 

Surge in Microsoft Brand Impersonation Attacks 

A recent report shows a 50% increase in phishing attacks impersonating Microsoft in just one quarter. These attacks target users by mimicking Microsoft’s branding to steal credentials or deploy malware. Given Microsoft’s widespread use in organizations, employees should be extra cautious when receiving emails claiming to be from Microsoft, especially those requesting login details or prompting downloads. Always verify the sender's address and report suspicious emails to IT. 

For more details, visit the KnowBe4 article. 

 

North Korean IT-Worker Scheme Exposed in Tennessee 

A Nashville resident, Matthew Isaac Knoot, was arrested for facilitating a scheme that funneled hundreds of thousands of dollars to North Korea’s illicit weapons program. Knoot allegedly helped North Korean IT workers secure remote jobs with U.S. and British companies by using stolen identities. The funds, earned through six-figure salaries, were laundered and funneled back to North Korea. This case underscores the growing threat of North Korean cyber operations targeting remote work environments. 

For more details, visit the full article. 

 

Cyber Threats Targeting US Elections 2024 

As the US elections approach on November 5, 2024, cybercriminals are intensifying their efforts to exploit the event. From phishing campaigns using candidate names to fake websites and domains designed to mislead voters, these threats are aimed at manipulating voter sentiment and stealing personal information. 

Key Insights: 

  • Candidate Names: Used in domains to create believable phishing sites. 

  • Election Manipulation: Emotional appeals to influence voter behavior. 

  • Financial Fraud: Fake donation sites and meme coins targeting voters. 

For more information, visit BforeAI. 

 

 

Beware of QR Code Phishing: Microsoft Sway Abused 

A new phishing campaign is leveraging QR codes in emails to trick users into visiting malicious websites hosted on Microsoft Sway. This attack is particularly dangerous because it bypasses traditional email security filters and targets users on mobile devices, where security controls are often weaker. 

Key Insights: 

  • Targets: Tech, manufacturing, and finance sectors. 

  • Method: QR codes embedded in phishing emails. 

  • Action: Be cautious when scanning QR codes, especially from unsolicited emails. 

Stay vigilant and educate your teams about this evolving threat. For more details, visit BleepingComputer. 

 

 

Malvertising Campaign Impersonates Google Products 

A recent malvertising campaign has been detected, impersonating various Google products to lure users into tech support scams. These malicious ads, exploiting Google’s Looker Studio, redirect victims to fake Microsoft or Apple warning pages, urging them to call a fraudulent support number. This campaign serves as a reminder to be cautious of online ads, even those that appear to represent trusted brands. 

Key Insights: 

  • Target: Users of Google products. 

  • Tactics: Fake tech support scams via malvertising. 

  • Impact: Potential malware installation and data theft. 

For more details, visit KnowBe4. 

 

 

When Get-Out-The-Vote Efforts Resemble Phishing Scams 

As election season approaches, many citizens receive text messages urging them to get out and vote. While these messages often come from well-intentioned organizations, a recent campaign highlighted by KrebsOnSecurity shows how such efforts can closely resemble phishing scams. 

In this case, a fake political consulting firm sent out mass texts linking to websites that requested personal information under the guise of verifying voter registration. The messages were a scam trying to get people to give up sensitive personal information. 

Here’s how you can protect yourself: 

  1. Verify the Source: Always check the sender’s identity and verify the website independently. Visit official government websites directly rather than clicking on links in unsolicited messages. 

  1. Look for Red Flags: Be wary of messages that create a sense of urgency, request personal information, or direct you to unfamiliar websites.  

  1. Report Suspicious Messages: If you suspect a message is a phishing attempt, report it to the relevant authorities or your organization's IT department. 

While voter registration is crucial, ensuring the integrity of the process and protecting personal information is equally important. Stay informed and vigilant to avoid falling victim to phishing scams during election season. 

For more details, visit KrebsOnSecurity. 

 

 

GenAI and the Surge of AI-Driven Fraudulent Websites 

Cybercriminals are increasingly leveraging large language models (LLMs) to scale the creation of fraudulent websites, including phishing sites and fake online stores. Netcraft reports a significant rise in AI-generated content for scams, with a 3.95x increase in such websites from March to August 2024. These AI tools enhance the credibility of scams by improving text quality, making malicious content more convincing and harder to detect. Organizations must enhance their defenses to mitigate the risks posed by this emerging threat. 

Key Insights: 

  • LLMs are used to generate convincing text for scams. 

  • AI-driven scams have seen a sharp increase in recent months. 

  • Monitoring and takedown strategies are essential to combat this trend. 

Further Reading: Netcraft Blog 

 

 

Scammers Exploit Fake Funeral Livestreams for Financial Gain 

Cybercriminals are using fake funeral livestreams on social media to exploit grieving families. These scams, often promoted through compromised accounts, lead victims to payment pages that charge excessive fees. This trend underscores the need for vigilance online, even during sensitive moments like a loved one's passing. Users should be cautious when encountering unexpected payment requests for livestreams and report suspicious activity. 

Further Reading: KnowBe4 Blog 

 Originally posted on exploresec.com.

 

 

 

In News Tags Newsletter, Security Awareness
Comment

Image created with ChatGPT

Phishing Threat Intelligence From August 2024

September 9, 2024

These are news articles from August 2024. Feel free to take and share with your internal cybersecurity team. A mention of explores.com would be great!

Dismantling Smart App Control 

Elastic Security Labs recently uncovered multiple vulnerabilities in Windows Smart App Control (SAC) and SmartScreen. These weaknesses allow attackers to bypass security measures using techniques such as signed malware, reputation hijacking, and LNK stomping. These methods enable initial access without triggering security warnings, posing significant risks. Security teams should focus on detecting these evasive tactics and not rely solely on OS-native features. 

Key Insights: 

  • Signed Malware: Attackers use valid certificates to bypass SAC. 

  • Reputation Hijacking: Leveraging trusted apps to execute malicious code. 

  • LNK Stomping: Crafting LNK files to evade MotW checks. 

For more details, visit the Elastic Security Labs article. 

 

 

Securing Domain Names from Takeover 

Recent research highlights vulnerabilities in domain name management that leave over a million domains susceptible to hijacking. This issue arises from weak authentication practices at several web hosting providers and domain registrars. Cybercriminals exploit these weaknesses to take control of domains, using them for phishing, spam, and malware distribution. To mitigate risks, it is crucial to ensure proper DNS configuration and use DNS providers with strong verification processes. 

Key Insights: 

  • Vulnerability: Over a million domains at risk. 

  • Exploitation: Hijacked domains used for malicious activities. 

  • Recommendation: Strengthen DNS configuration and provider verification. 

For more details, visit the Krebs on Security article. 

 

 

Exploitation of Google Drawings and WhatsApp 

A newly identified phishing campaign exploits Google Drawings and WhatsApp's URL shortener to create convincing redirects to malicious sites. This method allows attackers to bypass security filters and deceive users into thinking they are visiting legitimate sites like Amazon. These tactics highlight the increasing sophistication of phishing threats, emphasizing the need for heightened vigilance and advanced security measures. 

Key Insights: 

  • Exploited Tools: Google Drawings and WhatsApp's URL shortener. 

  • Attack Strategy: Redirects users to malicious sites mimicking trusted brands. 

  • Recommendation: Implement advanced phishing detection and maintain user vigilance. 

For more details, visit the Menlo Security article. 

 

 

Concerns Over Cloudflare’s Anti-Abuse Posture 

Spamhaus has raised concerns about Cloudflare's anti-abuse policies, highlighting that cybercriminals are exploiting Cloudflare’s services to mask malicious activities. Despite numerous abuse reports, Cloudflare's current approach often shields the true location of harmful content, complicating efforts to combat cybercrime. This situation underscores the need for stronger abuse management practices to prevent cybercriminals from leveraging trusted services to conduct illegal activities. 

Key Insights: 

  • Exploitation: Cybercriminals are using Cloudflare to hide malicious activities. 

  • Response: Current anti-abuse measures are inadequate in addressing the issue. 

  • Recommendation: Enhanced abuse management and accountability are needed. 

For more details, visit the Spamhaus article. 

 

 

Royal Ransomware Rebrands as BlackSuit 

The ransomware group formerly known as Royal has rebranded as BlackSuit, increasing their ransom demands to over $500 million. This shift indicates a more aggressive approach, with the group targeting larger organizations across various sectors. BlackSuit continues to use sophisticated tactics, including double extortion, where they threaten to release stolen data if their demands are not met. Organizations should strengthen their defenses and ensure incident response plans are up-to-date. 

Key Insights: 

  • Rebranding: Royal ransomware is now BlackSuit. 

  • Increased Ransom: Demands exceed $500 million. 

  • Tactics: Double extortion remains a primary threat. 

  • Recommendation: Strengthen defenses and update incident response plans. 

For more details, visit the KnowBe4 article. 

 

 

New Phishing Scam Using Cross-Site Scripting 

A recent phishing scam uncovered by KnowBe4 employs cross-site scripting (XSS) attacks to harvest personal details from unsuspecting victims. Attackers use this method to inject malicious scripts into legitimate websites, tricking users into entering sensitive information like login credentials. This technique bypasses traditional security measures, making it a particularly dangerous threat. Users should be cautious when clicking on links in emails and ensure that websites they interact with are secure. 

Key Insights: 

  • Attack Method: Cross-site scripting (XSS) used to steal personal details. 

  • Target: Login credentials and sensitive information. 

  • Recommendation: Verify website security before entering personal information. 

For more details, visit the KnowBe4 article. 

 

 

Surge in File-Sharing Phishing Attacks 

KnowBe4 reports a staggering 350% increase in file-sharing phishing attacks over the past year. These attacks often disguise themselves as notifications from popular file-sharing services, tricking users into revealing sensitive information or downloading malware. The rapid rise in these attacks highlights the need for enhanced email security and ongoing employee training. 

Key Insights: 

  • 350% Increase: Significant rise in file-sharing phishing attacks. 

  • Attack Method: Disguised as legitimate file-sharing notifications. 

  • Recommendation: Strengthen email security and employee awareness. 

For more details, visit the KnowBe4 article. 

 

 

Rising Use of URL Shorteners in Phishing Attacks 

Recent intelligence highlights a growing trend where cybercriminals use URL shorteners to obscure malicious links in phishing campaigns. This tactic effectively conceals the true destination of links, making it difficult for users and traditional security tools to detect threats. These shortened URLs often appear in seemingly legitimate emails or text messages, leading to fraudulent websites designed to steal credentials or deploy malware.  

For more details, visit the KnowBe4 article. 

 

 

Surge in Microsoft Brand Impersonation Attacks 

A recent report shows a 50% increase in phishing attacks impersonating Microsoft in just one quarter. These attacks target users by mimicking Microsoft’s branding to steal credentials or deploy malware. Given Microsoft’s widespread use in organizations, employees should be extra cautious when receiving emails claiming to be from Microsoft, especially those requesting login details or prompting downloads. Always verify the sender's address and report suspicious emails to IT. 

For more details, visit the KnowBe4 article. 

 

 

Dark Angels Ransomware Group Rakes in Record Ransoms 

The Dark Angels ransomware group has secured a record $75 million ransom payment from a fortune 50 company recently. Unlike other groups, Dark Angels avoid public leaks and minimize operational disruptions for their victims, making it easier to coerce payments quietly.  

For more details, visit the Krebs on Security article. 

 

 

Inc Ransom Attack Analysis 

Overview: In April 2024, the "Inc Ransom" group targeted a ReliaQuest customer, employing a double-extortion strategy without encrypting files. They exploited an unpatched Fortinet vulnerability to gain access, installed remote management tools like AnyDesk, and used techniques like pass-the-hash for lateral movement. Data was exfiltrated using unconventional tools such as Restic. 

Key Insights: 

  • Mitigations: Prioritize patch management, enforce network segmentation, and deploy host-based controls to prevent unauthorized software execution. 

  • Emerging Trends: Use of legitimate tools by attackers to blend in with normal activity. 

Actionable Steps: Strengthen defenses by regularly updating and auditing systems, ensuring proper segmentation, and limiting privileges to essential accounts. 

For a detailed analysis, visit the full report here. 

 

 

URL Rewriting Exploited by Threat Actors 

Overview: Threat actors are increasingly abusing URL rewriting, a security feature intended to protect against phishing, to mask malicious links. By compromising legitimate email accounts and using URL rewriting, attackers can disguise phishing URLs as safe, often leveraging the security vendor's domain to gain trust. 

Key Insights: 

  • Mitigations: Enhance vigilance when clicking on links, even those appearing to be from trusted sources. 

  • Emerging Trends: Attackers are exploiting the gap between initial scans and later weaponization of URLs. 

For a detailed analysis, visit the full report here. 

 

 

Exfiltration Tools on the Rise 

A recent analysis by ReliaQuest highlights the growing use of advanced exfiltration tools by cybercriminals to steal sensitive data. Tools like Rclone, WinSCP, and FileZilla are increasingly being leveraged to exfiltrate data from compromised networks. These tools are difficult to detect as they mimic legitimate traffic, making traditional defenses less effective.  

For more details, visit the ReliaQuest article. 

 

 

North Korean IT-Worker Scheme Exposed in Tennessee 

A Nashville resident, Matthew Isaac Knoot, was arrested for facilitating a scheme that funneled hundreds of thousands of dollars to North Korea’s illicit weapons program. Knoot allegedly helped North Korean IT workers secure remote jobs with U.S. and British companies by using stolen identities. The funds, earned through six-figure salaries, were laundered and funneled back to North Korea. This case underscores the growing threat of North Korean cyber operations targeting remote work environments. 

For more details, visit the full article. 

 

 

Top Malware in July 2024: Remcos and RansomHub 

The July 2024 Threat Index highlights a surge in activity by the RansomHub ransomware group and a new Remcos malware campaign. RansomHub continues to dominate as the most prevalent ransomware, accounting for 11% of attacks, while LockBit3 and Akira follow closely behind. A critical security lapse led to the distribution of Remcos via a malicious ZIP file disguised as a CrowdStrike update. Additionally, FakeUpdates remains a persistent threat, utilizing fake browser updates to deploy RATs like AsyncRAT. 

Key Insights: 

  • RansomHub: Leading ransomware, targeting Windows, macOS, Linux, and VMware ESXi. 

  • Remcos Campaign: Exploits a security software update issue, spreading via phishing attacks. 

  • FakeUpdates: Tops the malware list, leveraging compromised websites to deliver Remote Access Trojans. 

For a deeper dive, visit Checkpoint’s Threat Index. 

 

 

Focus on Malware Loaders: Evolving Threats in 2024 

In 2024, nearly 40% of malware incidents involved advanced loaders like SocGholish, GootLoader, and Raspberry Robin. These loaders are pivotal in deploying ransomware and Remote Access Trojans (RATs). SocGholish has notably enhanced its tactics with Python scripts, making it harder to detect, while GootLoader and Raspberry Robin use sophisticated evasion techniques, posing significant threats to critical sectors. 

Key Insights: 

  • SocGholish: Now using Python for persistence. 

  • GootLoader: Continues to exploit legitimate platforms. 

  • Raspberry Robin: Notable for its complex evasion tactics. 

For more detailed insights, visit the full article here. 

Emerging Malware Variants to Watch in 2024 

In recent months, several malware variants have gained prominence in the cyber threat landscape. Notable among them are LummaC2, Rust-based stealers, SocGholish, AsyncRAT, and Oyster, each posing significant risks to organizations across all sectors. 

Key Insights: 

  • LummaC2: A powerful infostealer with increasing reach. 

  • Rust-based Stealers: Notable for their advanced evasion techniques. 

  • SocGholish: Continues to be a persistent threat through fake browser updates. 

  • AsyncRAT: Versatile and widely used for remote access. 

  • Oyster: A backdoor linked to Wizard Spider, signaling targeted attacks. 

For more details, visit ReliaQuest. 

 

 

Exploring the Abuse of Impacket: A Growing Threat 

Impacket, a versatile Python-based toolkit, has become a favored tool among threat actors for lateral movement, privilege escalation, and remote code execution in Windows environments. Threat actors commonly exploit Impacket scripts like psexec.py, smbexec.py, and wmiexec.py to perform these actions stealthily. The toolkit’s ability to mimic legitimate network activity complicates detection, making it a significant challenge for organizations to defend against. 

Key Insights: 

  • psexec.py: Used for executing remote commands with elevated privileges. 

  • smbexec.py: Facilitates lateral movement without additional software installation. 

  • wmiexec.py: Enables stealthy command execution through WMI. 

For more information, visit ReliaQuest. 

Copybara Android Malware: A Rising Threat 

The latest variant of Copybara, an Android malware family, has evolved to use the MQTT protocol for command-and-control (C2) communication, enhancing its stealth. This malware exploits Android’s Accessibility Service for keylogging, screen capturing, and phishing attacks, particularly targeting cryptocurrency exchanges and financial institutions. Copybara’s ability to impersonate legitimate apps makes it especially dangerous. 

Key Insights: 

  • MQTT Protocol: Used for stealthy C2 communication. 

  • Accessibility Service Exploitation: Enables comprehensive device control. 

  • Targeted Attacks: Focus on financial institutions and cryptocurrency exchanges. 

For more details, visit Zscaler. 

 

 

Massive QR Code Phishing Campaign Abuses Microsoft Sway 

A significant phishing campaign has been detected, exploiting Microsoft Sway to host malicious landing pages targeting Microsoft 365 users. The campaign, identified by Netskope Threat Labs, saw a 2,000-fold increase in activity, primarily targeting sectors in Asia and North America. Attackers use QR codes embedded in phishing emails, redirecting victims to malicious sites. This method exploits the weaker security controls of mobile devices and evades email scanners, making it particularly effective and dangerous. 

Key Insights: 

  • Targeted Sectors: Technology, manufacturing, and finance. 

  • Attack Method: QR codes bypass traditional security by embedding in images. 

  • Risk Increase: Heightened threat to mobile device users. 

For more details, visit BleepingComputer. 

Malvertising Campaign Impersonates Google Products 

A recent malvertising campaign has been detected, impersonating various Google products to lure users into tech support scams. These malicious ads, exploiting Google’s Looker Studio, redirect victims to fake Microsoft or Apple warning pages, urging them to call a fraudulent support number. This campaign serves as a reminder to be cautious of online ads, even those that appear to represent trusted brands. 

Key Insights: 

  • Target: Users of Google products. 

  • Tactics: Fake tech support scams via malvertising. 

  • Impact: Potential malware installation and data theft. 

For more details, visit KnowBe4. 

 

 

Deceptive AI: A New Wave of Cyber Threats 

As AI technology advances, cybercriminals are increasingly using AI-generated content (AIGC) to deceive users on social media. This includes creating fake profiles, deepfake videos, and AI-crafted messages that are nearly indistinguishable from real content. A recent survey revealed that a significant portion of users struggle to identify these threats, which can lead to fraud, identity theft, and misinformation. It's crucial to be aware of these risks and stay vigilant online. 

For more details, visit KnowBe4. 

 

 

North Korean IT Workers Target U.S. Tech Companies 

North Korean IT workers are increasingly applying for remote jobs at U.S. tech firms using false identities. They employ AI-generated profile images and fake job histories, aiming to funnel earnings back to the North Korean regime, posing security risks and potential sanctions violations. Key insights include the importance of rigorous background checks and enhanced candidate verification processes to counter this threat. Collaboration with security experts and intelligence sharing is critical. 

For more insights, visit Cinder. 

 

 

Risks in Publicly Exposed GenAI Development Services 

A recent analysis highlights significant security risks in publicly exposed GenAI development services, particularly vector databases and low-code LLM tools. These platforms often handle sensitive data but can be misconfigured, leading to potential data leakage, data poisoning, and exploitation of vulnerabilities. To mitigate these risks, organizations should enforce strict access controls, monitor activity, and ensure all software is updated. 

For a deeper dive, visit Legit Security. 

 

 

How Attackers Exploit Digital Analytics Tools 

Cybercriminals are increasingly weaponizing digital analytics tools like link shorteners, IP geolocation services, and CAPTCHA challenges. These tools, often used for legitimate purposes, are repurposed to obscure malicious activity, evade detection, and tailor attacks to specific targets. Organizations should implement automated analysis and monitor suspicious patterns in these tools to mitigate risks. 

Key Insights: 

  • Threat actors use link shorteners to mask phishing URLs. 

  • IP geolocation data helps attackers target specific regions. 

  • CAPTCHA services are abused to bypass automated security scans. 

Further Reading: Google Cloud Blog 

 

 

GenAI and the Surge of AI-Driven Fraudulent Websites 

 Cybercriminals are increasingly leveraging large language models (LLMs) to scale the creation of fraudulent websites, including phishing sites and fake online stores. Netcraft reports a significant rise in AI-generated content for scams, with a 3.95x increase in such websites from March to August 2024. These AI tools enhance the credibility of scams by improving text quality, making malicious content more convincing and harder to detect. Organizations must enhance their defenses to mitigate the risks posed by this emerging threat. 

Key Insights: 

  • LLMs are used to generate convincing text for scams. 

  • AI-driven scams have seen a sharp increase in recent months. 

  • Monitoring and takedown strategies are essential to combat this trend. 

Further Reading: Netcraft Blog 

 

 

So-Phish-ticated Attacks: A New Wave of Social Engineering 

A sophisticated threat actor is conducting targeted social engineering attacks against over 130 U.S. organizations. These attacks, which include phishing via SMS and direct phone calls, are designed to harvest credentials and one-time passcodes. The use of native English speakers and tactics that bypass traditional security tools makes these attacks particularly challenging to detect.  

Key Insights: 

  • Attacks bypass traditional detection. 

  • Focus on credential harvesting. 

  • Targeting multiple industry verticals. 

Further Reading: GuidePoint Security Blog 

 Originally posted on exploresec.com

In News Tags newsletter, phishing, threat intelligence
Comment

Protecting Your Vote: Understanding Cyber Threats Ahead of the 2024 US Elections

August 29, 2024

I created this blog post for distribution internally as part of our Security Awareness program. Feel free to grab and share internally at your own company.

As the November 5, 2024, US elections approach, cybercriminals are exploiting the event to carry out sophisticated phishing campaigns, financial fraud, and misinformation according to a report from BforeAI. These malicious actors often use the names of prominent candidates, like "Harris," "Trump," and "Biden," in fake domains to mislead the public. Websites mimicking legitimate voting resources aim to steal personal and financial information. Additionally, fraudulent ecommerce stores and cryptocurrency themed around the elections pose significant financial risks to unsuspecting voters.

 

The Threat Landscape

Phishing and Fake Domains: Cybercriminals are creating fake domains and websites using candidate names and election-related terms like “vote” and “election” to increase their credibility. These sites are used to deceive voters into providing sensitive information, making donations to fraudulent campaigns, or spreading misinformation about voting dates and locations. For example, domains like "vote-no-sunnybailey[.]com" are designed to manipulate public opinion and suppress voter turnout through the dissemination of fake news and propaganda.

 

Financial Fraud: Many malicious websites are set up to collect personal and financial information from voters. Fraudulent donation sites mimic legitimate campaign fundraising efforts but are designed to steal credit card details and personally identifiable information (PII). This data is then sold on and used for future fraud and social engineering attacks. Furthermore, the emergence of meme coins themed around the elections is another avenue for financial exploitation, with these digital currencies often promoted on social media as quick investment opportunities, only to disappear after collecting funds from unsuspecting victims.

 

Misinformation Campaigns: Cybercriminals are also leveraging free web hosting platforms to quickly create and abandon malicious websites. These sites often contain misinformation about voting procedures, dates, and locations, aimed at confusing voters and reducing turnout. Additionally, unauthorized live streaming websites and other online platforms are being used to spread propaganda and manipulate voter behavior, further complicating the election process.

 

How to Protect Your Vote

To safeguard your vote and personal information during this election season, it’s essential to stay informed:

 

  • Use Official Sources: Always verify voting information through official government websites like usa.gov and vote.gov. These sites use the “.gov” domain, which is restricted to government entities and ensures the legitimacy of the information.

  • Avoid Clicking on Suspicious Links: Be wary of unsolicited emails, texts, or social media messages that link to unknown sites, especially those asking for donations or personal information. Always navigate to the official campaign or government website directly.

 

Conclusion

The 2024 US elections are a prime target for cybercriminals seeking to exploit voter emotions and manipulate election outcomes. By understanding the tactics used in these malicious campaigns, voters can better protect their identities and their votes. Staying informed and cautious is the best defense against these evolving threats.

In News Tags Election, Disinformation, Voting, Threat Intelligence, Phishing
Comment

Created with help from ChatGPT

Navigating the Misinformation Minefield: How TikTok is Shaping Political Perceptions 

August 16, 2024

This is a blog post I put together for distribution internally. Feel free to take and use as part of your own security awareness program. Created with help from ChatGPT

In the ever-evolving landscape of social media, TikTok has emerged as a dominant force, especially among younger generations. While the platform offers endless streams of creative content, it also harbors a growing concern: the spread of misinformation. Recent research has revealed that 33% of young Americans have encountered political lies on TikTok, highlighting the platform's significant role in shaping political perceptions. 

As misinformation continues to proliferate across social media, it’s crucial to understand how it spreads, its potential impact, and the steps we can take to protect ourselves. 

The Power of TikTok and the Rise of Misinformation 

TikTok’s algorithm is designed to keep users engaged by serving up content tailored to their interests. However, this algorithmic precision also makes it easier for misinformation to find its way into users’ feeds. Content that sparks strong emotional reactions—whether outrage, fear, or excitement—tends to spread rapidly, often without scrutiny. 

Political misinformation can have far-reaching consequences. False narratives can skew public perception, influence voting behavior, and deepen societal divides. For young Americans, many of whom turn to social media as their primary news source, the risks are especially pronounced. 

The Cybersecurity Implications of Misinformation 

While misinformation may seem like a mere nuisance, it poses serious cybersecurity risks. Cybercriminals can exploit false information to launch sophisticated social engineering attacks. For example, a fake news story might be used as bait in a phishing campaign, luring users to click on malicious links or download harmful software. Once trust is established through seemingly legitimate content, attackers can easily manipulate their targets. 

Moreover, misinformation can be used to incite panic or distrust, leading to actions that compromise security. For instance, during elections, misinformation about voting procedures can confuse voters, leading to disenfranchisement or chaos at polling stations. In such scenarios, the lines between misinformation and cyber threats blur, creating a fertile ground for malicious activities. 

Recognizing and Combating Misinformation 

Understanding how to identify and counter misinformation is crucial in today’s digital age. Here are some strategies to help you stay informed and secure: 

  • Critical Evaluation of Sources: 

    • Not all information online is created equal. Always consider the source of the information. Is it from a reputable news outlet or a verified account? Be wary of anonymous sources or accounts with little to no background information. 

    • Check the publication date to ensure the information is current. Outdated information, when recirculated, can cause unnecessary confusion. 

  • Cross-Referencing Information: 

    • Before accepting information as true, verify it through multiple credible sources. Misinformation often crumbles under scrutiny when checked against reliable reports or official statements. 

    • Use fact-checking websites like Snopes or FactCheck.org to confirm the validity of sensational claims. 

  • Recognizing Emotional Manipulation: 

    • Misinformation often relies on eliciting strong emotional responses to bypass rational thinking. Be cautious of content that triggers immediate emotional reactions such as anger, fear, or joy. 

    • Pause and reflect before sharing emotionally charged content. Consider why it evokes such a strong response and whether the information could be misleading. 

  • Awareness of Manipulative Tactics: 

    • Social media is rife with clickbait headlines designed to draw users in. These headlines may oversimplify, exaggerate, or completely fabricate information. Always read beyond the headline before forming an opinion. 

    • Be mindful of deepfakes and manipulated media. Advances in technology have made it easier to create realistic but entirely fake images and videos that can be used to spread falsehoods. 

  • Educating Yourself and Others: 

    • Stay informed about the latest tactics used to spread misinformation. Knowledge is your first line of defense. Participate in digital literacy programs and encourage others to do the same. 

    • Engage in discussions with friends and family about the importance of verifying information before sharing it. Misinformation spreads quickly when people don’t take the time to fact-check. 

The Broader Impact of Misinformation 

The dangers of misinformation extend beyond individual harm. On a larger scale, widespread misinformation can erode trust in institutions, polarize societies, and even threaten democratic processes. In an environment where misinformation thrives, it becomes increasingly difficult to have informed, rational discussions on critical issues. 

Moreover, the spread of misinformation can contribute to the normalization of falsehoods. As false narratives become more prevalent, they can start to shape reality, influencing public opinion and policy in ways that are harmful or unjust. 

Conclusion: Staying Vigilant in a Digital World 

In an age where information is at our fingertips, the responsibility to discern truth from falsehood rests on each of us. TikTok and other social media platforms offer immense value, but they also present risks that must be navigated carefully. By adopting a skeptical mindset, verifying the content we encounter, and educating ourselves and others, we can protect ourselves from the dangers of misinformation. 

As we continue to interact with digital content, let’s commit to being informed and responsible consumers of information. In doing so, we not only safeguard our own security but also contribute to a more truthful and resilient digital community. 

 

In News, Advice Tags Politics, Disinformation, Social Media
Comment

Created by ChatGPT

Security Awareness Newsletter July 2024

August 5, 2024

This is Security Awareness focused newsletter I put together for distribution internally at my company. Feel free to take and use for your own program.

Medusa Ransomware Analysis 

In June 2024, ReliaQuest detected the Medusa ransomware, which encrypted multiple hosts in a customer environment. Medusa, active since 2022, exploits unpatched vulnerabilities and hijacks legitimate accounts. The attack lifecycle includes initial access via a compromised VPN account, credential access through NTDS dumps, and lateral movement using RDP. Medusa employs living-off-the-land techniques, PowerShell for credential dumping, and service installations for persistence. Enhanced VPN configurations, endpoint visibility, and automated responses are critical to mitigating such ransomware threats. 

Key Takeaways: 

  • Medusa exploits unpatched vulnerabilities and legitimate accounts. 

  • Uses living-off-the-land techniques for stealth. 

  • Mitigation includes enhanced VPN security, endpoint visibility, and automated responses. 

For detailed insights, read the full report here. 

 

 

Teen Sextortion on the Rise 

Overview: Sextortion targeting teenagers is on the rise, exploiting their trust and vulnerabilities on social media. Criminals pose as peers or love interests to coerce explicit images, which they then use for blackmail. 

Key Points: 

  • Tactics: Attackers use fake profiles to build rapport and exchange fake explicit content. 

  • Impact: Victims face severe emotional and psychological harm, sometimes leading to tragic consequences. 

  • Preventive Measures: Educate teens on online safety, ensure open communication, and use strong privacy settings. 

Action Steps: 

  • Educate yourself and your teens about sextortion. 

  • Foster open discussions on online interactions. 

  • Report incidents promptly. 

  • Support victims without blame. 

For more details, visit KnowBe4 Blog. 

 

North Korean Fake IT Worker Infiltration Attempt 

In a recent incident, KnowBe4's SOC detected suspicious activities from a newly hired software engineer, later revealed to be a North Korean fake IT worker using AI to generate a fake identity. Despite rigorous hiring processes, including background checks and multiple video interviews, the individual bypassed security measures and attempted to load malware upon receiving their workstation. 

Key Takeaways: 

  • Enhanced Vetting: Improve background checks and resume scanning for inconsistencies. 

  • Background check appears inadequate. Names used were not consistent. 

  • References potentially not properly vetted. Do not rely on email references only. 

  • What to look for: Inconsistencies in information. 

  • Discrepancies in address and date of birth across different sources 

  • Conflicting personal information (marital status, "family emergencies" explaining unavailability) 

This case underscores the importance of robust hiring and security processes to prevent similar infiltration attempts. 

For a detailed account, visit the full article on KnowBe4's blog. 

 

Phish-Friendly Domain Registry ".top" Put on Notice 

The ".top" domain registry, managed by Jiangsu Bangning Science & Technology Co. Ltd., has been warned by ICANN for its failure to address phishing abuse. Findings revealed that over 4% of new ".top" domains from May 2023 to April 2024 were used for phishing. ICANN's notice demands immediate improvements, or the registry risks losing its license. This highlights the critical need for vigilant monitoring and prompt action against domain abuse to protect users from phishing threats. 

For more information, read the full article on Krebs on Security. 

 

CrowdStrike Phishing Attacks Appear in Record Time 

Recent IT outages have led to a surge in phishing sites exploiting the chaos. Within hours, domains like crowdstriketoken[.]com and crowdstrikefix[.]com emerged, targeting those affected by the outages. Cybercriminals quickly capitalized on the situation, registering 28 domains by early morning. The US Cybersecurity and Infrastructure Security Agency (CISA) urges caution, advising users to avoid suspicious links and verify communications through official channels. Stay vigilant and only rely on trusted sources for updates. 

Key Takeaways: 

  • Phishing sites can appear rapidly during crises. 

  • Always verify the authenticity of communication channels. 

  • Use official websites and trusted sources for updates. 

  • Be extra cautious of suspicious domains and links. 

For more details, visit KnowBe4's blog. 

 

Is Your Bank Really Calling? Protect Yourself from Financial Impersonation Fraud 

Summary: With the rise of sophisticated scams, distinguishing between legitimate bank communications and fraudulent attempts is increasingly challenging. Cybercriminals use stolen personal details to make their scams appear genuine, often creating a sense of urgency to exploit victims. 

Key Takeaways: 

  • Red Flags: Requests for passwords or OTPs, suspicious links, pressure tactics, unsolicited calls. 

  • Protection Tips: Verify calls by contacting your bank directly, trust your instincts, and avoid sharing sensitive information over the phone. 

Recommendations: Stay vigilant and regularly update your security awareness to safeguard against financial fraud. 

For more information, read the full article on KnowBe4 Blog. 

 

 

Building Security into the Redesigned Chrome Downloads Experience 

Google has revamped Chrome’s download interface, adding detailed warnings to protect users from malicious files. The new UI uses AI-powered verdicts from Google Safe Browsing to categorize files as "suspicious" or "dangerous," helping users make informed decisions.  

Key Takeaways: 

  • Detailed download warnings improve user decision-making. 

  • Enhanced Protection mode automatically scans suspicious files. 

  • Stay vigilant and utilize Chrome’s built-in security features. 

For more details, visit Google's Security Blog. 

 

 

Olympics-Themed Scams: Stay Vigilant! 

With the Paris 2024 Olympics approaching, cybercriminals are ramping up their efforts to exploit the excitement. Recent reports show an 80-90% increase in cybercrime targeting French organizations, with scam tactics including typosquatting domains (e.g., oympics[.]com) and Olympic-themed lottery scams impersonating brands like Coca-Cola and Microsoft. These scams target users worldwide, emphasizing the need for heightened vigilance. Always scrutinize unexpected emails and offers, especially those that seem too good to be true. 

Key Takeaways: 

  • Increased Cybercrime: Expect more cyber threats as the Olympics near. 

  • Typosquatting: Watch out for fake domains mimicking official Olympic sites. 

  • Lottery Scams: Be wary of unsolicited emails claiming lottery winnings. 

  • Global Target: These scams can affect anyone, not just those in France. 

Stay safe and informed to protect yourself and your organization from these threats. 

For more details, visit KnowBe4's Blog. 

 

 

Beware of Generative AI Tool Scams 

Scammers are exploiting the growing interest in generative AI tools like ChatGPT. Researchers have observed a surge in suspicious domain registrations, especially around significant AI-related announcements. These domains often include keywords like "gpt" and "prompt engineering," and many are used for phishing and other malicious activities. 

Key Takeaways: 

  • Suspicious Domains: Be cautious of new domains related to AI tools. 

  • Phishing Risks: Verify the legitimacy of AI-related tutorials and tools. 

  • Keyword Alerts: Watch out for terms like "gpt" in suspicious contexts. 

Stay alert and informed to protect yourself from these evolving threats. 

For more details, visit KnowBe4's Blog. 

 

 

QR Code Phishing: An Ongoing Threat 

QR code phishing, or "quishing," continues to rise as a significant cyber threat. Cybercriminals exploit QR codes to bypass email security filters and target users directly, often embedding malicious codes in PDFs or images. This method can deceive even vigilant users, leading to compromised personal and financial information. 

Key Takeaways: 

  • Bypassing Filters: QR codes can slip through traditional email security. 

  • Human Targeting: Scams aim at users’ mobile devices for data theft. 

  • Red Flags: Be cautious of QR codes lacking context or asking for excessive permissions. 

Stay informed and cautious to protect against these sophisticated phishing attacks. 

For more details, visit KnowBe4's Blog. 

 

 

New Phishing Tactic: Chat Support Scams 

Cybercriminals are now using fake chat support to add credibility to phishing scams. By mimicking legitimate support chats on spoofed payment pages for platforms like Etsy and Upwork, scammers deceive users into providing sensitive information. These chat features, staffed by scammers posing as support agents, guide victims through the phishing process, making the scams more convincing and harder to detect. 

Key Takeaways: 

  • Enhanced Deception: Scammers use fake chat support to build trust. 

  • Phishing Risks: Verify the legitimacy of support chats on payment pages. 

  • Increased Vigilance: Be cautious of unexpected support interactions. 

Stay informed and vigilant to protect against these sophisticated attacks. 

For more details, visit KnowBe4's Blog. 

 

 

OneDrive Pastejacking: A New Threat to Watch 

A recent discovery highlights a new threat called "pastejacking" targeting OneDrive users. This technique exploits the copy-paste functionality to inject malicious commands into users' clipboards, potentially leading to unauthorized data access or malware installation. Attackers embed harmful code into seemingly innocuous text or files, posing a significant risk to personal and organizational security. 

Key Takeaways: 

  • Clipboard Manipulation: Be wary of copying text from unknown sources. 

  • Vigilant Practices: Double-check clipboard content before pasting. 

  • Update Security Measures: Ensure software is up-to-date to mitigate risks. 

Stay informed and cautious to protect against these evolving threats. 

For more details, visit Trellix's Blog. 

 

 

Fake Leaks of Crypto Wallet Seed Phrases: A Growing Threat 

Scammers are leveraging fake leaks of passwords and seed phrases to target cryptocurrency users. These sophisticated scams involve presenting victims with seemingly real data leaks, enticing them to use malicious crypto management apps. Once installed, these apps steal sensitive information, leading to significant financial losses. 

Key Insights: 

  • Fake Data Leaks: Scammers create realistic-looking leaks to deceive users. 

  • Malicious Apps: Avoid downloading crypto apps from unverified sources. 

  • Increased Vigilance: Always verify the legitimacy of seed phrases and passwords. 

For more details, visit Kaspersky's Blog. 

 

 

Aveanna Healthcare Data Breach: Email Accounts Compromised 

Aveanna Healthcare has experienced a data breach affecting 11 email accounts. The breach, discovered on May 9, 2023, potentially exposed the personal and protected health information (PHI) of patients, including names, Social Security numbers, and medical details. Aveanna has since secured the compromised accounts and is offering affected individuals complimentary credit monitoring and identity protection services. 

Key Takeaways: 

  • Data Exposed: Personal and PHI compromised. 

  • Immediate Actions: Secure email accounts and monitor credit. 

  • Preventive Measures: Implement robust email security protocols. 

For more details, visit HIPAA Journal. 

 

In News Tags Newsletter, Security Awareness
Comment

Phishing Threat Intelligence Newsletter July 2024

August 2, 2024

This is a monthly threat intelligence newsletter with a lean towards phishing and healthcare I put together for the team at my company. Feel free to grab and share with your own internal team.

Threat Intelligence Newsletter: Resurgence of Russia's Fin7 

Overview: The notorious cybercrime group Fin7, previously thought to be dismantled, has re-emerged with increased activity. This resurgence is primarily facilitated by Stark Industries Solutions, a hosting provider linked to Russian cyberattacks. 

Key Developments: 

  • Infrastructure: Fin7 now operates over 4,000 hosts, using tactics like typosquatting, booby-trapped ads, and phishing domains. 

  • Targets: They mimic brands like American Express, Google, Microsoft 365, and more. 

  • Techniques: Using domains that appear benign initially, Fin7 builds credibility before launching phishing attacks. 

Implications: Organizations must heighten vigilance against phishing, regularly update security protocols, and monitor for suspicious domain activities. 

For more details, visit Krebs on Security. 

 

 

New Internet Explorer Zero-Day Spoofing Attack (CVE-2024-38112) 

Overview: Check Point Research (CPR) has identified a new zero-day spoofing vulnerability in Internet Explorer, designated CVE-2024-38112. This vulnerability allows attackers to deceive users by displaying a fake website address in the browser's address bar, facilitating phishing and other malicious activities. 

Key Details: 

  • Attack Vector: The attack leverages Internet Explorer's handling of URLs to present a legitimate-looking address while directing users to malicious sites. 

  • Impact: Users can be tricked into divulging sensitive information or downloading malicious content, believing they are on a trusted website. 

Recommendations: 

  • Mitigation: It is crucial to avoid using Internet Explorer and switch to more secure, up-to-date browsers. 

  • Patching: Ensure all systems are updated with the latest security patches and consider deploying additional security measures such as web filtering and threat intelligence services. 

For further information, visit the Check Point Blog. 

 

 

Ransomware Attack Disrupts U.K. Health Service Laboratory 

Overview: A ransomware attack on Synnovis, a laboratory partner for several major London hospitals, has significantly disrupted health services. The Qilin ransomware group, utilizing a Ransomware-as-a-Service model, is behind the attack and also targets U.S. based organizations. After failing to receive a ransom payment, Qilin released over 400GB of private healthcare data online. 

Key Points: 

  • Impact: Major disruption to hospital services. 

  • Perpetrators: Qilin (also known as Agenda). 

  • Initial Access: Through phishing and spear phishing emails. 

Recommendations: 

  • Strengthen phishing defenses. 

  • Conduct regular security awareness training. 

For more information, visit the KnowBe4 Blog. 

 

 

Microsoft Links Scattered Spider Hackers to Qilin Ransomware Attacks 

Microsoft has identified the Scattered Spider cybercrime group, also known as Octo Tempest, as responsible for recent Qilin ransomware attacks. This financially motivated group has been active since 2022, targeting over 130 high-profile organizations using tactics such as phishing, MFA bombing, and SIM swapping. The Qilin ransomware group, known for targeting VMware ESXi virtual machines, employs double-extortion attacks by threatening to release stolen data. 

Key Takeaways: 

  • Increased Sophistication: Scattered Spider's diverse tactics highlight their adaptability. 

  • Targeting Critical Infrastructure: Focus on high-profile organizations and virtual environments. 

  • Mitigation Strategies: Enhanced security measures such as robust MFA policies and employee training on phishing can help defend against such attacks. 

For more details, read the full article from Bleeping Computer. 

 

Social Media Job Scams: Don't Be the Target! 

Hunting for your dream job online? Unfortunately, social media can be a breeding ground for scammers who target unsuspecting job seekers. But fear not! Here are some key takeaways to help you avoid falling victim to their schemes: 

  • Be wary of unsolicited offers, especially those that come through social media. Legitimate recruiters typically only contact you if you've applied for a position or if they have a referral from someone you know. If you receive a message out of the blue about a fantastic opportunity, proceed with caution. 

  • Watch out for unprofessional communication. Typos, grammatical errors, and requests for money upfront are all major red flags. Legitimate companies will communicate professionally and will never ask you to pay for a job interview or training. 

  • Suspicious of remote jobs with high salaries? You should be! Scammers often lure people in with the promise of a high-paying work-from-home position. If something sounds too good to be true, it probably is. But that doesn't mean there aren't real remote work opportunities out there. Do your research to ensure the company is legitimate before getting your hopes up. 

  • Don't be afraid to investigate! Before you apply for any job, take some time to research the company. Look for online reviews, check their website for legitimacy, and see if they have a social media presence with a good following. A little detective work can go a long way in weeding out imposters. 

  • Keep your personal information private. This includes your Social Security number, bank account number, and credit card number. Never share this information with someone you don't know and trust, especially through social media or email. 

  • Be cautious about clicking on links or attachments. Phishing emails and messages are a common tactic used by scammers. If you receive a message from an unknown sender about a job opportunity, don't click on any links or attachments. Instead, go directly to the company's website to see if the job is listed there. 

By following these tips, you can protect yourself from social media job scams and increase your chances of finding a legitimate and rewarding job opportunity. Remember, if it seems too good to be true, it probably is. So, be cautious, be smart, and happy hunting! For more details check out the KnowBe4 blog. 

 

 

Phishing Alert: Microsoft Top Target, Social Media on the Rise 

According to a recent Check Point Research report, Microsoft was the most imitated brand for phishing attacks in Q2 2024, accounting for over half of all attempts. This highlights the ongoing threat of brand phishing, where cybercriminals impersonate well-known companies to trick users into revealing personal information or clicking on malicious links. 

The report also reveals new entries to the top 10 most impersonated brands, including Adidas, WhatsApp, and Instagram. This trend indicates a shift in cybercriminals' tactics, as they target social media and technology companies that hold valuable user data. 

Top 10 Most Impersonated Brands in Q2 2024 

  1. Microsoft (57%) 

  2. Apple (10%) 

  3. LinkedIn (7%) 

  4. Google (6%) 

  5. Facebook (1.8%) 

  6. Amazon (1.6%) 

  7. DHL (0.9%) 

  8. Adidas (0.8%) 

  9. WhatsApp (0.8%) 

  10. Instagram (0.7%) 

 

Check out Check Point’s blog for more details. 

 

 

New Backdoor Used by APT41: MoonWalk 

A recent blog post by Zscaler details a new backdoor tool called MoonWalk المستخدمة من قبل مجموعة APT41 (used by the APT41 group). MoonWalk is a tool used by the APT41 threat group for espionage. The article discusses MoonWalk’s technical aspects, including its use of Google Drive for communication and Windows Fibers for evasion. MoonWalk also uses a modular design, allowing attackers to customize it for different situations. 

Here are some key takeaways from a threat intelligence perspective: 

  • New APT41 Backdoor: APT41 is a well-known threat group known for its targeted attacks. The development of MoonWalk shows that the group is constantly evolving its tactics and techniques. 

  • Google Drive for Communication: The use of Google Drive for communication is a novel technique that makes it more difficult for defenders to detect malicious activity. 

  • Windows Fibers for Evasion: The use of Windows Fibers for evasion helps MoonWalk to avoid detection by security software. 

  • Modular Design: The modular design of MoonWalk allows attackers to easily customize it for different targets and campaigns. 

Organizations should be aware of the MoonWalk backdoor and take steps to protect themselves, such as: 

  • Implementing advanced endpoint detection and response (EDR) solutions 

  • Educating employees about phishing attacks and social engineering techniques 

  • Regularly patching systems and applications 

By following these steps, organizations can help to mitigate the risk of being targeted by APT41 and other threat groups. 

You can read more about MoonWalk here. 

 

Phish-Friendly Domain Registry ".top" Put on Notice 

The ".top" domain registry, managed by Jiangsu Bangning Science & Technology Co. Ltd., has been warned by ICANN for its failure to address phishing abuse. Findings revealed that over 4% of new ".top" domains from May 2023 to April 2024 were used for phishing. ICANN's notice demands immediate improvements, or the registry risks losing its license. This highlights the critical need for vigilant monitoring and prompt action against domain abuse to protect users from phishing threats. 

For more information, read the full article on Krebs on Security. 

 

Over 3,000 GitHub Accounts Exploited in Malware Distribution Scheme 

Summary: A new threat, dubbed 'Stargazers Ghost Network,' involves over 3,000 GitHub accounts used to distribute information-stealing malware via fake repositories. Discovered by Check Point Research, this Distribution-as-a-Service (DaaS) leverages GitHub’s reputation to spread infostealers like RedLine and Lumma Stealer. Despite GitHub's efforts, over 200 malicious repositories remain active. 

Key Takeaway: 

  • Attack Mechanism: Utilizes compromised WordPress sites and GitHub repositories. 

  • Targets: Cryptocurrency, gaming, and social media enthusiasts. 

  • Operation: Accounts serve phishing templates, images, and malware, maintaining resilience even after takedowns. 

  • Recommendations: Exercise caution with file downloads from GitHub and use VMs or VirusTotal to scan archives. 

For more information, read the full article on BleepingComputer. 

 

 

North Korean Operative Infiltrates KnowBe4 Using Stolen Identity 

Summary: KnowBe4 recently revealed that a North Korean hacker, posing as a U.S. citizen, successfully got hired as an IT worker. Despite multiple rounds of interviews and background checks, the individual was detected attempting to install malware on their new workstation. No sensitive data was accessed due to robust security measures. 

Key Takeaways: 

  • Entry: Hacker used a stolen identity to pass interviews and background checks. 

  • Detection: Suspicious activity was identified, and the laptop was quarantined swiftly. 

  • Impact: No customer data was accessed; the malware was blocked by security tools. 

  • Response: KnowBe4 has enhanced its hiring processes to prevent similar incidents. 

Recommendations: Regularly review and update hiring and onboarding procedures to mitigate risks from sophisticated threat actors. 

For more information, read the full article on KnowBe4 Blog. 

 

Exploiting CrowdStrike Outage: Phishing, Fake Scripts, and Social Engineering 

Summary: Following a recent CrowdStrike update that caused widespread blue screen of death (BSOD) errors, cybercriminals are capitalizing on the confusion. Fake PowerShell scripts, phishing domains, and social engineering attacks are proliferating, posing significant risks. 

Key Takeaways: 

  • Fake Scripts: Malicious scripts on platforms like GitHub install dangerous software. 

  • Phishing: Surge in domains offering fake fixes. 

  • Social Engineering: Impersonation of IT personnel and cybersecurity firms to trick users. 

Recommendations: Verify the authenticity of scripts and domains, and educate users on phishing and social engineering tactics. 

For more information, read the full article on ReliaQuest Blog. 

 

Huntress Foils a Medical Software Update Hack 

Huntress recently uncovered a sophisticated phishing campaign targeting medical software updates. Cybercriminals created a fake version of a legitimate medical image viewer, embedding malicious code that established a secret connection back to the attackers. This attack highlights the critical need for vigilance even when dealing with trusted sources. Huntress's Security Operations Center (SOC) detected the anomaly and quickly isolated the threat, preventing potential data breaches. 

Key Takeaways: 

  • Verify the authenticity of software updates. 

  • Be cautious of unexpected file sizes or unusual behaviors. 

  • Regularly update software from official websites. 

For more details, visit Huntress's blog. 

 

TuDoor: Exploiting DNS Logic Vulnerabilities 

A new DNS attack method, named TuDoor, has been identified, highlighting critical vulnerabilities in DNS response pre-processing. Attackers can use malformed DNS response packets to execute cache poisoning, denial-of-service, and resource exhaustion attacks. TuDoor impacts 24 mainstream DNS software and many public DNS services, potentially affecting millions of users. 

Key Takeaways: 

  1. Be aware of the TuDoor attack method. 

  1. Ensure DNS software is up-to-date with patches. 

  1. Monitor for unusual DNS traffic patterns. 

For more details, visit TuDoor's website. 

 

 

Generative AI Tools: New Target for Scammers 

Recent intelligence highlights a surge in cyber threats exploiting interest in generative AI tools, particularly ChatGPT. Scammers are registering suspicious domains containing keywords like "gpt" and "prompt engineering," aiming to deceive users with phishing schemes and malware distribution. This trend coincides with major AI-related announcements, increasing the risk to individuals and organizations exploring these technologies. 

Key Insights: 

  • Domain Surveillance: Monitor new domain registrations for AI-related keywords. 

  • Phishing Alerts: Educate users on verifying AI tool sources. 

  • Evolving Tactics: Stay updated on scam trends exploiting emerging technologies. 

For more details, visit KnowBe4's Blog. 

 

 

OneDrive Pastejacking: A New Phishing Tactic 

A new phishing threat, "pastejacking," targets OneDrive users by exploiting the copy-paste functionality. Attackers inject malicious commands into users' clipboards through seemingly benign text or files. This method can lead to unauthorized data access or malware installation when unsuspecting users paste the copied content. 

Key Insights: 

  • Clipboard Exploitation: Phishing schemes use clipboard manipulation to inject harmful code. 

  • User Vigilance: Verify clipboard content before pasting from unknown sources. 

  • Security Measures: Put controls in place to limit user PowerShell usage and monitor for any abnormal PowerShell activity.  

For more details, visit Trellix's Blog. 

 

 

In News Tags Newsletter, Phishing, Threat Intelligence
Comment

Created by ChatGPT

Security Awareness Newsletter June 2024

July 18, 2024

Getting this out a little late. This is a newsletter that I put together for our internal security awareness program. Feel free to grab and use within your own security awareness program. Created with help from ChatGPT.

Rising Threat of Business Email Compromise (BEC) Scams 

The FBI’s Internet Crime Complaint Center (IC3) has warned about the growing threat of Business Email Compromise (BEC) scams targeting businesses and individuals to steal money through fraudulent emails. 

Key Points: 

  • What is BEC? Cybercriminals hack or spoof business emails to trick victims into transferring funds or revealing sensitive information. 

  • Scam Tactics: 

  • Phishing: Fake emails to access business accounts. 

  • Spoofing: Deceptive email addresses mimicking legitimate ones. 

  • Impersonation: Pretending to be executives or trusted partners. 

  • Recent Trends: Increased targeting of real estate, legal, and financial services with sophisticated AI-generated emails and deepfake audio. 

  • Impact: BEC scams have caused billions in financial losses annually. 

  • Prevention Tips: 

  • Verify any fund transfer requests through separate communication channels. 

  • Educate employees on phishing and suspicious activities. 

  • Use multi-factor authentication (MFA). 

  • Monitor accounts for unusual activities. 

  • Report suspected scams to the IC3 at www.ic3.gov. 

Stay vigilant and protect your organization from BEC scams. For more details, visit the full PSA on the IC3 website: FBI IC3 PSA. 

 

 

Arrests Made in Smishing Text Scam 

The City of London Police has announced the arrest of two individuals connected to a sophisticated smishing campaign using a homemade mobile antenna. This operation involved sending thousands of fraudulent text messages to the public, aiming to steal personal and financial information. 

Key Details: 

  • Smishing Explained: Smishing (SMS phishing) involves sending text messages that appear to be from reputable sources, urging recipients to provide personal information, click on malicious links, or download harmful software. 

  • How the Scam Worked: The arrested individuals used a homemade mobile antenna to send out mass smishing texts, tricking victims into sharing sensitive data. 

  • Impact: Thousands of people received these fraudulent messages, potentially leading to significant personal and financial losses. 

Protect Yourself: 

  • Be Skeptical of Unexpected Texts: Do not click on links or provide personal information in response to unsolicited text messages. 

  • Verify Sources: If you receive a suspicious message claiming to be from a legitimate organization, contact the organization directly using official contact information. 

  • Report Suspicious Messages: Forward suspicious texts to your mobile carrier’s spam reporting service or report them to relevant authorities. 

Stay Informed and Safe: For more details on this case and tips to protect yourself from smishing attacks, visit the City of London Police website: City of London Police Smishing Arrests. 

Stay vigilant and keep your personal information secure! 

 

Phishing Tactics Targeting Two-Factor Authentication (2FA) 

Recent reports from Kaspersky highlight an emerging phishing technique targeting Two-Factor Authentication (2FA) mechanisms, increasing the risk of account compromise even for those using this added layer of security. 

Key Findings: 

  • Phishing Techniques: Cybercriminals are evolving their tactics to bypass 2FA, employing sophisticated methods such as phishing bots and transparent phishing pages to deceive users. 

  • OTP Bots: Attackers use bots to automate the process of extracting One-Time Passwords (OTPs) from victims. These bots can mimic legitimate institutions and request OTPs under false pretenses, subsequently allowing attackers to access secured accounts. 

How It Works: 

  1. Phishing Bots: These bots send automated calls or messages posing as legitimate services, tricking users into revealing their OTPs. 

  1. Transparent Phishing: Attackers create fake login pages that appear identical to the real ones. When users enter their credentials and OTPs, the information is captured and used by the attackers to gain unauthorized access. 

Prevention Tips: 

  • Verify Requests: Always verify the legitimacy of any request for personal information or OTPs by contacting the organization directly using known contact details. 

  • Educate Employees: Regularly train employees to recognize phishing attempts and the latest tactics used by cybercriminals. 

  • Use Advanced Security Measures: Implement multi-factor authentication (MFA) methods that are resistant to phishing, such as hardware security keys. 

Stay Vigilant: Phishing attacks continue to grow in sophistication, posing significant risks even to those who use advanced security measures like 2FA. By staying informed and implementing robust security practices, you can protect yourself and your organization from these evolving threats. 

For more detailed information, visit the full article on Kaspersky's blog: Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling. 

 

 

FTC’s Spring Scam Roundup 

The FTC’s latest report highlights prevalent scams and their impact on consumers this spring. 

Key Findings: 

Most Impersonated Companies: 

  • Best Buy’s Geek Squad 

  • Amazon 

  • PayPal 

  • Microsoft (highest reported losses) 

  • Publishers Clearing House 

Common Contact Methods: 

  • Email and phone calls dominate. 

  • Social media scams, especially on Facebook and Instagram, result in the highest losses. 

Payment Methods: 

  • Investment scams use cryptocurrency and bank transfers. 

  • Gift cards are common in romance, tech support, and government impersonation scams. 

Protection Tips: 

  • Verify Requests: Always verify unexpected requests for money or personal information by contacting the source directly. 

  • Avoid Clicking Suspicious Links: Do not respond to unsolicited messages. 

  • Use Secure Payment Methods: Avoid using gift cards, cryptocurrency, or payment apps for urgent payments. 

Stay Vigilant: Scams continue to evolve, posing significant risks. By staying informed and following these security tips, you can better protect yourself and your organization. 

For more details, visit the FTC’s Spring Scam Roundup. 

Stay safe and secure! 

 

 

Beware of New Phishing Campaign Targeting Job Seekers 

A recent phishing campaign has been discovered deploying the WARMCOOKIE backdoor, specifically targeting job seekers. Cybercriminals are using fake job offers to lure victims into opening malicious attachments or clicking on harmful links. Once activated, the WARMCOOKIE backdoor allows attackers to gain unauthorized access to the victim's system, compromising sensitive information. 

Key Points: 

  • Be cautious of unsolicited job offers. 

  • Avoid opening attachments or clicking links from unknown sources. 

  • Verify the legitimacy of job offers through official company channels. 

Stay vigilant and protect your personal information! 

For more details, visit the Hacker News article. 

 

 

CISA Warns of Criminals Impersonating Its Employees 

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about criminals impersonating its employees in phone calls. These scammers attempt to deceive victims into transferring money by posing as CISA representatives. 

Key Points: 

  • CISA employees will never request money transfers, cryptocurrencies, or gift cards. 

  • Do not comply with demands for secrecy. 

  • Report suspicious calls to CISA at 844-729-2472 or to law enforcement. 

Impersonation Scams on the Rise: Last year, impersonation scams resulted in losses of $1.1 billion, highlighting the growing threat and the need for increased vigilance. Scammers posed as FTC staff as part of the scams. 

“The FBI's 2023 Internet Crime Report revealed a 22% increase in reported losses to online crime compared to 2022, totaling a record $12.5 billion.” 

Tips to Protect Yourself: 

  • Verify the caller's identity through official channels. 

  • Never share personal or financial information over the phone. 

For more details, visit the Bleeping Computer article. 

 

Beware of Fraudulent Olympics Ticketing Websites 

Recently, Proofpoint uncovered fraudulent websites claiming to sell tickets for the Paris 2024 Summer Olympics. Notably, “paris24tickets[.]com” appeared as a top search result on Google. This site, designed to mimic legitimate ticketing platforms, aimed to steal money and personal information. 

Key Findings 

  • Multiple Fraudulent Sites: Over 338 fake Olympics ticketing websites identified, with 51 shut down. 

  • Phishing Tactics: Some sites used search ads, while others used email campaigns offering “discounts.” 

  • Safety Tips: Only purchase tickets through the official Paris 2024 ticketing website. 

Stay Safe 

  • Verify URLs before purchasing. 

  • Be cautious of unsolicited emails offering deals on tickets. 

  • Report suspicious websites to authorities. 

Stay vigilant and share this information to help others avoid scams. For more details, visit the full article. 

 

Social Engineering Scams via Mail 

Social engineering scams aren't limited to digital channels; they can come through the mail too. KnowBe4 highlights a recent case where scammers sent fake refund checks via mail, tricking recipients into depositing them and sending a portion of the funds back. These checks appear realistic, but banks eventually discover they're fake, leaving the victim responsible for the amount. 

Protection Tips: 

  • Be skeptical of unexpected checks and financial requests. 

  • Verify the legitimacy of any communication by contacting the company directly. 

  • Educate yourself and others about recognizing various social engineering tactics. 

For more details, visit KnowBe4's blog. 

 

 

Beware of More_eggs Malware Targeting Hiring Managers 

Attention Hiring Managers: 

A new phishing campaign is using fake resume submissions to distribute the More_eggs malware. Cybercriminals target job listings on platforms like LinkedIn, directing recruiters to malicious websites that trigger a malware infection upon downloading a resume. This backdoor malware can steal sensitive data, deliver additional malicious payloads, and grant remote access to attackers. 

Key Recommendations: 

  • Always verify the source of resumes and job applications. 

  • Scan all downloads with reliable antivirus software. 

  • Provide regular security awareness training to all staff, including HR personnel. 

Stay vigilant and protect your organization from these sophisticated attacks. 

For more details, visit the KnowBe4 blog. 

 

 

Beware of Fraudulent Olympics Ticketing Websites 

As the excitement for the Paris 2024 Summer Olympics builds, so do the efforts of scammers looking to exploit unsuspecting fans. Proofpoint recently discovered multiple fraudulent websites claiming to sell Olympics tickets, with one notably appearing as a top search result on Google. These sites mimic legitimate ticketing platforms, luring users into providing personal and payment information. 

Key Points: 

  1. Fake Websites: Scammers create realistic-looking websites to steal money and personal data. 

  1. Search Ads: Fraudulent sites often appear as sponsored search results. 

  1. Official Source: Always purchase tickets through the official Olympics website. 

Stay Safe: 

  • Verify the URL: Ensure you are on the official Olympics ticketing site. 

  • Avoid Clicking Ads: Navigate directly to trusted sources. 

  • Be Skeptical: Offers that seem too good to be true likely are. 

For more detailed information, read the full article on Proofpoint's blog here. 

 

 

New Threat: "Paste and Run" Phishing 

Overview A new phishing campaign exploits a unique user interaction by tricking users into pasting and executing malicious commands from their clipboard. This technique can install malware such as DarkGate on the victim’s system, bypassing conventional security measures. 

Key Takeaways: 

  • Method: Users are instructed to paste clipboard contents into the Windows Run dialog box, executing a malicious PowerShell command. 

  • Impact: This method can lead to significant security breaches, installing malware and compromising systems. 

  • Prevention: Continuous security awareness training can help users recognize and avoid such phishing attempts. 

Stay vigilant and regularly update your security protocols. For more details, visit the KnowBe4 Blog. 

 

 

AI-Driven Travel Scams on the Rise 

Overview Booking.com warns that the rise of artificial intelligence (AI) is driving a significant increase in travel scams. According to Marnie Wilking, the firm's internet safety boss, there has been a 500 to 900% surge in scams over the past 18 months, particularly phishing attacks. 

Key Takeaways: 

  • Increase in Phishing: Generative AI tools like ChatGPT are being used to create highly convincing phishing emails, tricking people into handing over their financial details through fake booking links. 

  • Targeted Platforms: Scammers often target popular sites like Booking.com and Airbnb, listing fake accommodations to scam users out of money. 

  • Detection Challenges: AI-generated content makes scams harder to detect due to realistic images and accurate text in multiple languages. 

For further details, refer to the BBC News Article. 

 

 

Protect Yourself from Summer Vacation Scams 

Overview As summer approaches, the excitement of planning vacations is in full swing. However, cybercriminals are also gearing up, exploiting this time to launch scams targeting travelers. Check Point Research (CPR) has observed a significant rise in phishing scams and malicious websites related to summer vacations. 

Key Takeaways: 

  • Rise in Malicious Domains: In May 2024, CPR identified that 1 in every 33 new vacation-related domains were malicious or suspicious. 

  • Phishing Emails: Scammers are using realistic phishing emails to trick users into revealing personal information. One campaign mimicked Booking.com invoices to lure victims. 

  • Malicious Websites: Fraudulent websites like booking-secure928[.]com and hotel-housekeeper[.]com imitate legitimate travel sites to steal login credentials. 

Stay informed and vigilant to protect yourself from these evolving cyber threats. For more detailed information, visit Check Point’s blog on staying safe during summer vacations. 

 

In News Tags Newsletter, Security Awareness
Comment

Created using ChatGPT

Phishing Threat Intelligence June 2024

July 17, 2024

Little behind getting this out but still wanted to get it out. This is a newsletter of articles I thought might be valuable for our security team and helped me plan this months simulated phish. Created with help from ChatGPT

New Execution Technique in ClearFake Campaign 

ReliaQuest has identified a new execution technique used in the ClearFake campaign, a variant of the SocGholish malware family. This sophisticated method involves using JavaScript to trick users into executing malicious PowerShell commands, representing a significant evolution in attack tactics. 

Key Findings: 

  • Malicious JavaScript Files: The campaign leverages malicious JavaScript files named “update.js,” tricking users into copying and executing encoded PowerShell commands. 

  • Obfuscation and Execution: The PowerShell code is obfuscated using base64 encoding. Once decoded and executed, it performs various actions, including DNS cache clearing, displaying deceptive messages, and downloading additional payloads from malicious URLs. 

  • Persistence via Python: In a novel approach, the campaign uses Python scripts for establishing persistence, signaling an evolution in tactics to evade detection. 

Infection Chain: 

  1. Ingress: The malicious JavaScript downloads and extracts Python, then sets up a scheduled task for persistence. 

  1. Execution: The extracted Python script connects to command-and-control (C2) servers, facilitating further malicious activities. 

  1. Persistence: The scheduled task ensures the malware remains active on the infected system, making it harder to detect and remove. 

Conclusion: The ClearFake campaign exemplifies the increasing sophistication of cyber threats, highlighting the need for robust security measures and continuous vigilance. By understanding and implementing the recommended defensive measures, organizations can better protect against these evolving threats. 

For detailed information and technical analysis, visit ReliaQuest's blog on the ClearFake campaign. Stay informed and secure! 

 

 

Phishing Campaigns Exploiting Cloudflare Workers 

Netskope has identified sophisticated phishing campaigns leveraging Cloudflare Workers to deploy malicious content through two main techniques: HTML smuggling and transparent phishing. These methods are designed to evade detection and compromise user credentials. 

Key Findings: 

  • HTML Smuggling: This technique bypasses network controls by assembling the phishing page on the client side. Attackers embed the phishing page as a blob within a benign webpage, using JavaScript to decode and display the malicious content. 

  • Transparent Phishing: In this approach, attackers use Cloudflare Workers as reverse proxies for legitimate login pages, intercepting credentials, cookies, and tokens as users attempt to log in. 

Campaign Details: 

  • Targeted Regions: Recent phishing campaigns have primarily targeted victims in Asia, North America, and Southern Europe, focusing on sectors such as technology, financial services, and banking. 

  • Credential Theft: Most phishing pages aim to steal Microsoft login credentials, with other targets including Gmail, Yahoo Mail, and cPanel Webmail. 

For detailed technical analysis and more information, visit Netskope's blog on the ClearFake campaign. 

 

New Phishing Campaign Uses Malicious LNK Files 

A sophisticated phishing campaign has been discovered, leveraging malicious LNK files to deliver malware. This technique bypasses traditional email security filters and lures victims into executing harmful payloads. 

Phishing Lure: 

  • Email Content: Cybercriminals craft emails that appear to come from legitimate sources, often including urgent or enticing messages. 

  • Attachment: The email includes a seemingly harmless LNK file. When clicked, this file triggers the download and installation of malware. 

For more details, visit The Hacker News. 

 

 

New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers 

A sophisticated phishing campaign has been identified, deploying the WARMCOOKIE backdoor to exploit job seekers. The attack involves sending fake job offers with malicious attachments or links, which, when executed, install the WARMCOOKIE backdoor. This malware provides attackers with remote access to compromised systems, allowing data exfiltration and further exploitation. 

Attack Chain: 

  1. Initial Phishing Email: Victims receive fake job offer emails. 

  1. Malicious Attachment: The email contains a malicious attachment (e.g., .doc or .pdf). 

  1. Execution: Opening the attachment installs the WARMCOOKIE backdoor. 

  1. Backdoor Access: Attackers gain unauthorized access to the victim's system. 

  1. Data Exfiltration: Sensitive information is extracted and used for further attacks. 

Key Indicators: 

  • Fake job offer emails with .doc or .pdf attachments. 

  • Unusual email addresses and domains. 

  • Links redirecting to suspicious websites. 

 

For further details, visit the Hacker News article. 

 

 

RansomHub Strengthens Its Ransomware Arsenal with Scattered Spider Tactics 

A recent alliance between RansomHub and Scattered Spider has significantly boosted RansomHub’s capabilities, making it one of the largest active Ransomware-as-a-Service (RaaS) operations. 

Key Developments: 

  • Evolution from Knight Ransomware: RansomHub emerged from the Knight ransomware group, using similar codebases and recruiting affiliates from other disbanded ransomware operations like LockBit and BlackCat (ALPHV). 

  • Integration of Scattered Spider Techniques: Known for its sophisticated phishing campaigns, Scattered Spider has provided RansomHub with advanced phishing kits and data exfiltration techniques. 

Indicators of Compromise (IOCs): 

  • Use of .doc and .pdf attachments in phishing emails. 

  • Deployment of remote access tools such as Atera and Splashtop. 

  • Exploitation of the ZeroLogon vulnerability. 

Recommendations: 

  • Regularly update software and systems. 

  • Implement advanced email filtering solutions. 

  • Conduct security awareness training for employees. 

  • Segment networks to limit ransomware spread. 

  • Develop and test incident response plans. 

For more details, visit Security Boulevard and Dark Reading. 

 

 

Phorpiex Botnet and LockBit3 Ransomware Surge 

In May 2024, the cybersecurity landscape was significantly impacted by two major threats: the Phorpiex botnet and the LockBit3 ransomware group. 

Phorpiex Botnet's Phishing Campaign 

Researchers identified a large-scale phishing campaign involving the Phorpiex botnet, which sent millions of emails containing ransomware. The Phorpiex botnet, which resurfaced as a variant called "Twizt" in December 2021, used deceptive .doc.scr files in ZIP attachments to trigger ransomware encryption. This campaign employed over 1,500 unique IP addresses, primarily from regions such as Kazakhstan, Uzbekistan, Iran, Russia, and China. 

LockBit3 Ransomware Dominance 

LockBit3, operating as a Ransomware-as-a-Service (RaaS), accounted for 33% of published ransomware attacks in May. Despite previous law enforcement actions that disrupted their operations, LockBit3 quickly rebounded. This group continues to target large enterprises and government entities, particularly in regions excluding Russia and the Commonwealth of Independent States (CIS). 

Top Malware Families: 

  1. FakeUpdates (SocGholish): Downloader leading to further compromises. 

  1. Androxgh0st: Botnet targeting multiple platforms, stealing sensitive information. 

  1. Qbot (Qakbot): Multipurpose malware stealing credentials and deploying additional malware. 

Top Exploited Vulnerabilities: 

  1. Command Injection Over HTTP (CVE-2021-43936, CVE-2022-24086): Allows remote code execution. 

  1. Web Servers Malicious URL Directory Traversal: Permits unauthorized file access on vulnerable servers. 

  1. Apache Log4j Remote Code Execution (CVE-2021-44228): Enables attackers to execute arbitrary code. 

Top Mobile Malware: 

  1. Anubis: Android banking Trojan with ransomware capabilities. 

  1. AhMyth: Remote Access Trojan (RAT) stealing sensitive information. 

  1. Hydra: Banking Trojan stealing credentials through manipulated permissions. 

Most Attacked Industries: 

  1. Education/Research 

  1. Government/Military 

  1. Communications 

Top Ransomware Groups: 

  1. LockBit3: Responsible for 33% of attacks, targeting large enterprises. 

  1. Inc. Ransom: Emerging ransomware group targeting multiple sectors. 

  1. Play: A ransomware impacting businesses and critical infrastructure. 

Organizations must stay vigilant and implement robust cybersecurity measures to defend against these evolving threats. For more detailed information, visit Check Point. 

 

 

SmokeLoader Evolution and Impact 

Zscaler's ThreatLabz provides an in-depth historical analysis of SmokeLoader, a modular malware family first advertised in 2011. Initially serving as a downloader, SmokeLoader has evolved to include functionalities for data theft, DDoS attacks, and cryptocurrency mining. Key features include advanced anti-analysis techniques, modular capabilities, and encrypted C2 communications. Notable developments include the introduction of a stager component in 2014 and sophisticated obfuscation methods. SmokeLoader remains a persistent threat due to its continuous evolution and adaptability. 

Key Takeaways: 

  • Modular Design: Allows for flexible and varied attack strategies. 

  • Advanced Evasion: Sophisticated anti-analysis and obfuscation techniques. 

  • Persistent Threat: Continuous updates keep it relevant and dangerous. 

For detailed insights, visit the Zscaler Blog. 

 

DarkGate Malware's Evolving Tactics 

Cisco Talos has identified a significant increase in DarkGate malware activity through malicious email campaigns since March 2024. These campaigns use Remote Template Injection to bypass email security controls, deploying Excel attachments that trigger malware execution when opened. Notably, DarkGate has transitioned from using AutoIT to AutoHotKey scripts for its infection process, with the payload executing in-memory without being written to disk. 

Key Takeaways: 

  • Remote Template Injection: Bypasses security controls using Excel files. 

  • In-Memory Execution: Enhances evasion by avoiding disk writes. 

  • AutoHotKey Scripts: Replaces AutoIT for advanced automation. 

For detailed insights, visit the Cisco Talos Blog. 

 

Active Phishing Campaign: Yousign HR Lure 

Agari has identified an active phishing campaign using the Yousign platform to distribute malicious emails posing as HR notifications. These emails prompt recipients to review an updated employee handbook, leading to credential harvesting. By leveraging the legitimacy of Yousign's domain, attackers bypass email security filters. The campaign employs Remote Template Injection and unique URLs to evade detection. 

Key Takeaways: 

  • Legitimate Domains: Used to bypass security controls. 

  • Credential Harvesting: Malicious forms disguised as HR documents. 

  • Unique URLs: Hinders detection by security tools. 

For detailed insights, visit the Agari Blog. 

 

FBI Alert: Healthcare Industry Phishing Campaign 

The FBI and HHS have issued a warning about a sophisticated phishing campaign targeting the healthcare sector. Threat actors are using social engineering tactics to steal login credentials and redirect Automated Clearing House (ACH) payments to accounts they control. These attackers manipulate help desk staff to gain access and then use stealth techniques to divert payments. Healthcare organizations, due to their size and access to sensitive data, are prime targets. Enhance employee training to recognize and thwart social engineering attacks. 

Key Takeaways: 

  1. Sophisticated Tactics: Attackers use social engineering to exploit help desk staff. 

  1. ACH Payment Redirection: Stolen credentials are used to divert ACH payments. 

  1. Targeted Sector: Healthcare organizations are primary targets due to their sensitive data. 

  1. Employee Training: Essential to enhance awareness and ability to recognize phishing attempts. 

For detailed information, visit the KnowBe4 blog. 

 

New Threat: ASCII-Based QR Codes 

QR code phishing, or "quishing," is evolving with attackers now using ASCII characters to create QR codes within HTML, bypassing traditional OCR-based security measures. These codes appear as legitimate QR codes to users but evade detection by security systems, leading to credential theft and malware deployment. 

Key Takeaways: 

  • Evolution of Technique: ASCII-based QR codes embedded in HTML are the latest in phishing tactics, making it harder for security systems to detect them (Avanan) (Techzine Europe) . 

  • Real-World Impact: Over 600 instances detected, with significant disruptions including a recent healthcare provider attack (Sechub) (Coalition) . 

  • Mitigation Strategies: 

  • Implement security that decodes and analyzes QR codes in emails. 

  • Use solutions that rewrite embedded QR codes with safe links. 

  • Employ advanced AI-based tools to detect phishing indicators. 

Stay informed and update your security measures to guard against these sophisticated threats. 

For more details, visit the Checkpoint Blog or read more on Techzine. 

 

 

New Threat: Exploitation of Microsoft SmartScreen 

Overview Hackers are actively exploiting a vulnerability in Microsoft SmartScreen (CVE-2024-21412) to deploy stealer malware such as Lumma and Meduza Stealer. Despite a patch released in February 2024, attackers continue to bypass SmartScreen using malicious internet shortcuts distributed via spam emails. 

Key Takeaways: 

  • Method: Bypassing SmartScreen through WebDAV-hosted shortcuts and executing multi-step attacks using PowerShell and JavaScript. 

  • Impact: Significant breaches leading to information theft and potential system compromise. 

  • Recommendations: Verify emails, use advanced filtering, avoid suspicious links, keep software updated, limit scripting languages, and segment networks. 

For more details, visit the Cyber Security News. 

 

New Threat: Volcano Demon Ransomware 

Overview A new ransomware group named Volcano Demon is using phone calls to pressure victims into paying ransoms. This group deploys LukaLocker ransomware to encrypt files and uses double extortion tactics by exfiltrating data before encryption. Victims receive threatening phone calls from unidentified numbers, increasing the pressure to comply with ransom demands. 

Key Takeaways: 

  • Method: Phone calls combined with data exfiltration and encryption. 

  • Impact: Significant disruption, with threats to leak data and continued attacks. 

  • Recommendations: Strengthen network security, train employees on phishing tactics, and prepare for potential ransomware attacks. 

For more details, visit the The Record. 

In News Tags Newsletter, Phishing, Threat Intelligence
Comment

Created with ChatGPT

Understanding the July 2024 AT&T Data Breach Incident

July 16, 2024

This was written for security awareness and to be distributed to all of our employees. Feel free to grab and use as part of your own security awareness program. Created with help from ChatGPT.

Introduction 

In an era where data breaches have become increasingly common, it is crucial to stay informed about the latest incidents and understand their implications. On July 12, 2024, AT&T disclosed a significant data breach that affected a vast number of its cellular customers. This blog post aims to break down the incident, its impact, and the steps being taken to enhance security measures. 

What Happened? 

On July 12, 2024, AT&T announced that a breach had occurred, involving the illegal download of customer data from a third-party cloud platform. The breach affected phone call and text message records of nearly all AT&T cellular customers from May to October 2022 and January 2023. The stolen data included phone numbers and call durations, detailing who contacted whom by phone or text. Importantly, no content of the calls or texts, nor personally identifiable information, was compromised. 

How Did the Breach Occur? 

Between April 14 and April 25, 2024, attackers exploited a vulnerability in a third-party cloud service used by AT&T. This vulnerability allowed unauthorized access to customer data over two distinct periods: May to October 2022 and January 2023. The breach was only discovered and disclosed in July 2024, highlighting the sophisticated methods used by the attackers and the ongoing challenges in detecting such breaches promptly. 

AT&T's Response 

Upon discovering the breach, AT&T took immediate action to secure the compromised access point and began notifying affected customers. The company is cooperating with law enforcement to investigate the incident and bring the perpetrators to justice. Additionally, AT&T is implementing enhanced security measures to prevent future breaches. These measures include strengthening the security of third-party services and conducting comprehensive security audits. 

Timeline of Events 

  • April 14 and April 25, 2024: Initial breach period where customer data From May 1, 2022, October 31, 2022, and January 2, 2023, was illegally accessed. 

  • July 12, 2024: AT&T publicly disclosed the breach and began notifying affected customers. 

  • Ongoing: AT&T is cooperating with law enforcement and implementing enhanced security measures to prevent future incidents. 

What Should Customers Do? 

AT&T has set up a dedicated webpage to address questions and provide steps for customers to check if their information was compromised. Customers are advised to: 

  1. Visit the AT&T support page for detailed information on the breach. 

  1. Monitor their accounts for any unusual activity. 

  1. Be vigilant against phishing attempts that may exploit the breach. 

  1. Consider changing passwords and enabling two-factor authentication for added security. 

Conclusion 

The July 2024 AT&T data breach serves as a reminder of the persistent threats to our personal information in the digital age. While AT&T is taking steps to enhance its security measures, customers must also remain vigilant and proactive in protecting their data. By staying informed and adopting best practices for data security, we can collectively reduce the risk and impact of such incidents. 

References 

  • NPR Article on AT&T Data Breach 

  • TechCrunch Report on AT&T Phone Records Theft 

  • SEC Filing on AT&T Data Breach 

  • AT&T Press Release on Customer Data Breach 

By staying informed and understanding the nuances of such breaches, we can better prepare and protect ourselves against the ever-evolving landscape of cyber threats. 

 

In News Tags AT&T Breach, Breach
Comment

Executive Summary: July 2024 AT&T Data Breach Incident 

July 12, 2024

I pulled some information on the recently announced AT&T Data Breach, 12 July 2024, for leadership at my company. Feel free to take and use for your own reports or security awareness programs.

Summary

On July 12, 2024, AT&T disclosed a significant data breach involving the illegal download of customer data from a third-party cloud platform. Attackers accessed a third-party cloud platform between April 14 and April 25, 2024. The breach affected phone call and text message records of nearly all AT&T cellular customers from May 1 to October 31, 2022, and January 2, 2023. The data included phone numbers and call durations, such as who contacted who by phone or text.  

Per AT&T, no content of the calls or texts, nor personally identifiable information, was compromised. Attackers exploited a vulnerability in a third-party cloud service. AT&T has secured the access point, notified affected customers, and is cooperating with law enforcement. They are enhancing security measures to prevent future incidents. 

Timeline of Events 

  • April 14 and April 25, 2024: Initial breach period where customer data From May 1, 2022, October 31, 2022, and January 2, 2023, was illegally accessed. 

  • July 12, 2024: AT&T publicly disclosed the breach and began notifying affected customers. 

  • Ongoing: AT&T is cooperating with law enforcement and implementing enhanced security measures to prevent future incidents. 

AT&T has set up a webpage to address questions and provide steps for checking if customer information is compromised.   

This summary was written with help from the links below: 

  • https://www.npr.org/2024/07/12/nx-s1-5037736/att-data-breach-call-text-records  

  • https://techcrunch.com/2024/07/12/att-phone-records-stolen-data-breach/  

  • https://www.sec.gov/ix?doc=/Archives/edgar/data/0000732717/000073271724000046/t-20240506.htm 

  • https://www.prnewswire.com/news-releases/att-addresses-illegal-download-of-customer-data-302195733.html 

In News Tags AT&T Breach, Breach
Comment

Created by ChatGPT

Security Awareness Newsletter May 2024

June 3, 2024

This is a security awareness newsletter meant for internal distribution. Feel free to grab and share with your company internally.

Steer Clear of Job Scams: Tips for New Graduates 

Be cautious of job scams targeting new graduates. Here are some key takeaways to protect new graduates: 

  • Be skeptical of unsolicited offers, especially those coming out of the blue. Legitimate companies typically have established recruitment channels. 

  • Guard your personal information. Don't share sensitive details like bank accounts or Social Security numbers in initial communications. 

  • High starting salaries with minimal experience requirements are often red flags. Scammers lure victims with unrealistic promises. 

  • Do your research! Verify the legitimacy of companies by checking their websites and contacting them directly through listed channels. 

  • Don't hesitate to leverage school resources. Career centers can offer guidance and help spot scams. 

  • Trust your gut. If something feels off about a job offer, it probably is. Don't be pressured into rushing forward.

By following these tips, graduates can navigate a job search with confidence and avoid falling victim to scams. Remember, protecting your personal information and conducting thorough research are crucial steps towards landing a safe and rewarding job opportunity. 

 

 

Love on the Rocks? Watch Out for Verification Scams! 

Looking for love online? While dating apps can be a great way to meet someone special, be on the lookout for scammers trying to exploit your emotions. The FBI recently issued a warning about verification scams targeting dating app users. 

Here's the lowdown: 

  • The Scam: Scammers lure you in with the promise of a secure dating experience through a "verification process." 

  • The Hook: They'll often move the conversation to a private platform and then send a link to a fake website offering a "free" verification service. 

  • The Bait and Switch: This website is designed to trick you into signing up for a fraudulent monthly subscription . 

Don't let love blind you! Here are some tips to stay safe: 

  • Be wary of requests to move conversations off the dating platform. Legitimate dating apps have robust security features. 

  • Don't click on suspicious links, especially those promising verification. Verify information directly through the dating app's support channels. 

  • If something sounds too good to be true, it probably is. Don't fall for promises of guaranteed love matches or enhanced security behind a paywall. 

Remember, online dating requires a healthy dose of skepticism. Trust your instincts, and prioritize your safety! 

 

 

Shein Phishing Alert: Protect Your Fashion Finds and Login Info! 

Calling all fashionistas! Watch out for phishing emails spoofing popular online retailer Shein. These emails aim to steal your login credentials and compromise your online shopping accounts. 

Here's the Scheme: 

  • The Lure: The email might claim you have an unclaimed order, exclusive discounts, or a problem with your account. 

  • The Trap: Clicking a link in the email takes you to a fake Shein login page designed to steal your username and password. 

Don't Fall for Fake Fashion Frenzy! 

  • Beware of unsolicited emails, even if they look official. Shein won't contact you about account issues through unexpected emails. 

  • Inspect sender addresses carefully. Legitimate Shein emails will come from a Shein domain address, not a random one. 

  • Hover over links before clicking. See if the link's destination matches the displayed text. Don't enter your login details on suspicious websites. 

  • Always access your Shein account directly through the official website or app. Don't rely on links in emails. 

By staying vigilant, you can protect your hard-earned cash and sensitive information. Happy (and secure) shopping! 

 

North Korean Threat Actors Targeting Developers with Fake Job Interviews 

A new social engineering attack campaign is targeting software developers. This campaign is likely associated with North Korean threat actors. The attackers are sending fake job interviews that contain malicious software. 

How the Attack Works 

The attackers will send a seemingly legitimate job offer email to a software developer. The email will contain a link to a malicious website or a document that, when opened, will download malware onto the victim's computer. The malware is a Python-based RAT (Remote Access Trojan) that can steal information from the victim's computer, such as files, keystrokes, and browsing history. 

How to Protect Yourself 

  • Be cautious of unsolicited job offers, even if they seem to come from a legitimate company. 

  • Do not click on links or open attachments in emails from unknown senders. 

  • Verify the legitimacy of a job offer by contacting the company directly. 

  • Maintain a security-focused mindset during job interviews. If something seems too good to be true, it probably is. 

  • Monitor your computer for suspicious activity, such as unknown programs running or unusual network traffic. 

 

 

Don't Let Ransomware Hit You Where It Hurts: Protecting Your Family From SIM Swapping 

Cybercriminals are getting more personal in their attacks. A recent report from Mandiant highlights a disturbing trend: ransomware attackers targeting executives by SIM swapping their children's phones. 

What is SIM Swapping? 

SIM swapping is when a scammer takes control of your phone number by transferring it to a new SIM card. This allows them to receive your calls, texts, and potentially even two-factor authentication codes. 

How Can You Protect Yourself? 

  • Be Wary of Unusual Activity: Monitor your phone bill for any suspicious changes, like increased data usage or new charges. 

  • Enable Two-factor Authentication (2FA): But not with SMS verification! Use a dedicated authentication app instead. 

  • Don't Share Personal Information Online: This includes your birthday, address, and even your child's school name. 

  • Talk to Your Family: Educate them about SIM swapping and the importance of online safety. 

  • Contact Your Carrier: Ask about SIM swapping security measures and how to add additional protections to your account. 

For More Information: 

  • How to Protect Yourself from SIM Swapping: https://consumer.ftc.gov/consumer-alerts/2019/10/sim-swap-scams-how-protect-yourself 

 

 

Alert: Cybercriminals Exploiting Docusign with Sophisticated Phishing Scams 

Summary: Cybercriminals are increasingly targeting Docusign users by distributing customizable phishing templates on cybercrime forums. These templates closely mimic legitimate Docusign emails, luring recipients into providing sensitive information or clicking malicious links. These attacks facilitate various malicious activities, including credential theft and business email compromise (BEC) scams. 

Key Indicators of Docusign Phishing Emails: 

  • Sender's Email: Ensure it originates from the docusign.net domain. 

  • Greetings: Genuine emails use your name, not generic salutations. 

  • Security Codes: Authentic codes are long and complex. 

  • Links: Hover over links to check if they lead to docusign.net. 

  • Direct Access: Use Docusign's secure document access instead of clicking links. 

Prevention Tips: 

  • Always verify the sender's email address. 

  • Avoid clicking on suspicious links and attachments. 

  • Contact the sender through trusted channels if in doubt. 

 

 

Growing Confidence Among CISOs Despite Rising Cyber Threats 

Overview: According to Proofpoint's 2024 Voice of the CISO report, 70% of CISOs feel at risk of a cyber attack, yet only 43% feel unprepared—a significant improvement from previous years. Despite this growing confidence, human error remains a critical vulnerability, with 74% of CISOs identifying it as a top concern. Encouragingly, the adoption of AI-powered solutions and enhanced employee education are seen as key strategies to mitigate these risks. However, challenges such as ransomware, malware, and employee turnover continue to test cybersecurity resilience. 

Key Points: 

  • Rising Confidence: 43% of CISOs feel unprepared for attacks, down from 61% last year. 

  • Human Error: 74% of CISOs see human error as the biggest vulnerability. 

  • AI Solutions: 87% are deploying AI to combat human-centric threats. 

  • Top Threats: Ransomware, malware, and email fraud are major concerns. 

Takeaway: Continuous improvement in AI adoption and employee training is vital for bolstering cybersecurity defenses. 

 

 

New Social Engineering Scheme by Black Basta Ransomware Group 

Overview: The Black Basta ransomware group has launched a new mass spam and social engineering campaign, targeting various industries. The attackers flood users' emails with spam and then pose as IT support, convincing victims to download remote access tools like Quick Assist or AnyDesk. This grants the attackers initial access to deploy ransomware and steal credentials. 

Key Points: 

  • Spam Overload: Victims receive thousands of spam emails. 

  • Impersonation: Attackers pose as IT support to gain trust. 

  • Remote Access: Tools like Quick Assist and AnyDesk are used to gain access. 

  • Prevention: Block newly registered domains and restrict remote management tools. 

Takeaway: Stay vigilant against unsolicited IT support offers and ensure employees are aware of this tactic. 

 

From Phish to Phish Phishing: How Email Scams Got Smart

Phishing scams have evolved dramatically over the years, becoming more sophisticated and harder to detect. Here are key points from Check Point's recent article on how email scams have become smarter:

  1. Evolution of Phishing Tactics:

    • Old vs. New: Early phishing attempts were often easy to spot due to obvious mistakes like all-caps subject lines, poor grammar, and bad spoofing. Modern phishing emails, however, are much more convincing, using official-looking logos and professional language.

    • Advanced Spoofing: Attackers now use advanced techniques to spoof emails, making them appear as if they come from trusted sources such as banks, government agencies, or company executives. This creates a sense of urgency and legitimacy.

  2. Techniques and Vectors:

    • Email and Attachments: Phishing emails often include links to fake websites or attachments that require personal information. These can lead to data theft or malware infections.

    • Vishing and SMiShing: Phishing is not limited to emails. Attackers use voice phishing (vishing) and SMS phishing (SMiShing) to trick victims into revealing sensitive information over the phone or through text messages.

  3. Common Scams:

    • Ransomware Delivery: A significant number of phishing emails now deliver ransomware, locking victims' files and demanding a ransom for their release.

    • Fake Alerts: Emails claiming to be from PayPal, Wells Fargo, or even the FBI often contain urgent messages about account issues, prompting victims to click on malicious links or provide personal information.

  4. Preventive Measures:

    • Stay Vigilant: Always verify the sender’s email address and look for signs of phishing, such as generic greetings and urgent requests for personal information.

    • Check Links and Attachments: Hover over links to see their true destination and avoid clicking on suspicious attachments.

    • Use Security Tools: Employ email filtering and antivirus software to help detect and block phishing attempts.

By staying informed and cautious, you can protect yourself and your organization from falling victim to these increasingly sophisticated email scams.

 

 

Beware the Piano Scam 

Cybercriminals are exploiting unsuspecting individuals with a new scheme known as the "Piano Scam." Victims receive emails offering a free piano due to a family death, but they are asked to pay shipping fees through fake shipping companies. These scammers also collect personal information. Protect yourself by verifying the sender, avoiding clicking on unknown links, and reporting suspicious emails. 

 Key Points:

  • Advance Fee Fraud (AFF): The scam involves requesting a small upfront fee for a larger promised reward, in this case, a free piano.

  • Payment Methods: Scammers request payment via Zelle, Cash App, PayPal, Apple Pay, or cryptocurrency.

  • Personally Identifiable Information (PII): Scammers collect names, addresses, and phone numbers.

  • Indicators of Compromise: Emails from unknown senders, requests for upfront payments, and varied sender addresses.

In News Tags Newsletter, Security Awareness
Comment

Created by ChatGPT

Beware Advance Fee Fraud (AFF): The Piano Scam 

May 31, 2024

This is a short blog post I wrote for our security awareness internal communication. Feel free to grab and use for your own program. Created with the help of ChatGPT.

Beware Advance Fee Fraud (AFF): The Piano Scam 

Cyber threats are constantly evolving, and one of the latest scams targets unsuspecting individuals with a piano-themed fraud. This scheme, dubbed the "Piano Scam," preys on the goodwill of victims by offering a "free" piano, only to defraud them through advance fee payments for shipping. 

This type of scam is targeting people in the education sector but other scams like this will target other industries such as healthcare or the food industry. Understanding these types of scams will help identify when similar scams are used against our company.  

How the Scam Works 

  1. Initial Contact: Victims receive an email claiming a free piano is available due to a family death. 

  1. Shipping Fraud: The scammer directs victims to a fake shipping company, which requests payment for delivery fees via various methods, including Zelle, PayPal, and cryptocurrency. 

  1. Data Harvesting: Personal information such as names, addresses, and phone numbers are also solicited. 

Recognizing the Scam 

  • Too Good to Be True: Be cautious of unsolicited offers that seem excessively generous. 

  • Unverified Senders: Emails from unfamiliar addresses or free email services should raise suspicion. 

  • Payment Requests: Legitimate giveaways do not require upfront fees for shipping or handling. 

Prevention Tips 

  • Verify Sources: Independently verify the sender and the legitimacy of the offer. 

  • Avoid Clicking Links: Do not click on links or download attachments from unknown emails. 

  • Report Suspicious Activity: Inform your IT department or local authorities if you encounter such scams. 

Understanding the tactics used in the Piano Scam can help you avoid becoming a victim. Stay vigilant and informed to protect yourself from these and other cyber threats. 

For more detailed information on this scam, visit Proofpoint's Security Brief. 

 

In News Tags Proofpoint, Security Awareness, Scams
Comment

Created by ChatGPT

Phishing Threat Intelligence May 2024

May 30, 2024

These are the articles and blogs I’ve read over the last month with a lean towards phishing and healthcare. I share this internally with the security team. Feel free to take and use for your own programs.

Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks 

Okta identified a substantial rise in credential stuffing attacks targeting online services in the past month. These attacks exploit widely available resources like stolen login credentials, residential proxies, and scripting tools to gain unauthorized access to user accounts. The attacks appear to originate from anonymizing services like Tor and leverage proxies to bypass security measures. 

Key Takeaways: 

  • Identity and access management (IAM) provider Okta has observed a significant increase in credential stuffing attacks over the past month. 

  • These attacks leverage readily available resources like residential proxy services, stolen credential lists, and scripting tools. 

  • The attacks target online services and seem to originate from anonymizing tools like Tor exit nodes and various proxies. 

Indicators of Compromise (IOCs): 

  • The timeframe for this attack surge is noted to be between April 19th and April 26th, 2024. 

  • Okta's Identity Threat Research detected the activity. 

  • While specific IoCs aren't listed, the report mentions attacks targeting VPN appliances and routers from various vendors. 

 

 

Black Hat SEO Techniques Used to Distribute Malware 

This report details a malware distribution campaign that leverages black hat SEO techniques. Attackers create malicious websites designed to look legitimate and rank high in search results. These websites are then used to trick users into clicking on them and downloading malware. 

Technical Details: 

  • The malware payloads are delivered through multi-level zipped files. 

  • Once downloaded and executed, the malware can steal sensitive information such as browsing history and user credentials. 

 

 

Phishing Remains a Top Threat Despite Decline in Q4 

Phishing attacks continue to be a major threat to organizations of all sizes. According to a recent report by the Anti-Phishing Working Group (APWG), 2023 saw a significant increase in phishing activity, making it the worst year on record. Over 5 million phishing attacks were detected in 2023, highlighting the prevalence of this cyber threat. 

The report also details a decrease in phishing attacks during the fourth quarter of 2023. This decline is attributed to the takedown of Freenom, a service frequently abused by attackers to register domains that spoofed legitimate companies. While this is a positive development, it serves as a reminder that threat actors are constantly evolving their tactics. 

Key Takeaways 

  • 2023 was the worst year on record for phishing attacks, with over 5 million attempts detected. 

  • While there was a decline in Q4 2023 due to the takedown of Freenom, phishing remains a significant threat. 

  • Security awareness training is crucial for educating employees on how to identify and avoid phishing attempts. 

  • Organizations should implement a layered security approach that includes email filtering, employee training, and staying informed about the latest phishing tactics. 

 

 

New Technique for Detecting Malware Stealing Browser Data 

A recent blog post by Google Security Blog details a new technique for detecting malware that steals browser data. The technique involves monitoring Windows Event Logs for signs of unauthorized access to browser data. 

How Browser Data Theft Works 

Many malware programs target browser data, such as cookies and saved credentials. This data can be valuable to attackers, as it can be used to gain access to online accounts, steal financial information, or launch other attacks. 

Traditional Detection Methods 

Traditional methods for detecting malware that steals browser data often rely on behavioral analysis or signature-based detection. However, these methods can be ineffective against new or sophisticated malware. 

Detecting Browser Data Theft with Windows Event Logs 

The new technique described by Google Security Blog involves monitoring Windows Event Logs for DPAPI events. DPAPI (Data Protection API) is a Windows API that is used to protect sensitive data. When an application attempts to decrypt data protected by DPAPI, a DPAPI event is generated in the Windows Event Log. 

By monitoring DPAPI events, it is possible to identify unauthorized attempts to access browser data. This is because legitimate applications should not need to decrypt browser data unless the user is actively using the browser. 

Benefits of This Technique 

This technique has several benefits over traditional methods for detecting browser data theft. First, it is less reliant on signatures, making it more effective against new and unknown malware. Second, it can provide valuable forensic information, such as the time and process that attempted to access the data. 

Security Implications 

This technique highlights the importance of monitoring Windows Event Logs for security threats. By monitoring these logs, security professionals can gain valuable insights into the activities of applications running on their systems. 

Recommendations 

  • Enable logging of DPAPI events in Windows Event Logs. 

  • Monitor Windows Event Logs for suspicious DPAPI events. 

  • Investigate any unauthorized attempts to access browser data. 

  • Regularly update your security software and operating system. 

By following these recommendations, organizations can improve their ability to detect and prevent browser data theft. 

 

 

Healthcare Organizations Targeted in Social Engineering Campaign with Deceptive Tactics 

High Importance 

A recent report by ReliaQuest exposes a cunning social engineering campaign targeting healthcare organizations' revenue cycle management (RCM) departments. Then attackers employed deceptive tactics to manipulate help desk staff into resetting multifactor authentication (MFA) credentials. This allowed them to infiltrate the system and steal funds by altering bank routing information for fraudulent money transfers. 

Social Engineering Techniques Used: 

The report details how attackers impersonated legitimate users, often healthcare staff, by leveraging readily available personal information. This information might have been obtained through various means, including phishing emails, data breaches, or even social media. Once impersonating a staff member, attackers would contact the help desk, feigning an issue with their MFA and requesting a reset. To heighten their legitimacy, they might provide seemingly valid personal details associated with the target user, such as the last four digits of their Social Security number, date of birth, or home address. By exploiting trust and creating a sense of urgency, attackers could potentially trick help desk personnel into resetting the MFA, compromising the account's security. 

 

LockBit Black Ransomware Delivered via Phorpiex Botnet Spam Campaign 

High Importance 

A recent phishing campaign leveraged the Phorpiex botnet to distribute LockBit Black ransomware. Millions of malicious emails were sent, targeting a widespread audience. 

Campaign Details: 

  • Phishing emails with malicious ZIP attachments 

  • LockBit Black ransomware deployed upon opening the attachment 

  • Ransomware likely based on leaked LockBit 3.0 source code 

LockBit Black Ransomware: 

LockBit Black is a ransomware variant known for encrypting victim files and demanding a ransom payment for decryption. This iteration is likely derived from a leaked version of LockBit 3.0, raising concerns about potential widespread attacks. 

 

 

Alert: Threat Actors Expand Malicious Use of DNS Tunneling 

High Importance 

Security researchers warn of a growing trend: threat actors are increasingly exploiting DNS tunneling for malicious purposes. DNS tunneling involves encoding data within legitimate DNS requests, creating covert communication channels that bypass traditional security measures. 

Why is this concerning? 

  • Evasion Capabilities: DNS tunneling allows attackers to fly under the radar of firewalls and security tools, making detection difficult. 

  • Operational Flexibility: This technique offers attackers a versatile tool for various malicious activities, including: 

  • Phishing Email Monitoring: Attackers can use DNS tunneling to monitor how users interact with phishing emails, allowing them to refine their tactics. 

  • Network Vulnerability Scanning: Malicious actors can leverage DNS tunneling to scan networks for vulnerabilities without raising red flags. 

  • Security Measure Bypassing: This technique can be used to bypass security controls and establish persistence within a compromised network. 

 

 

Cybercriminals Exploit Docusign Phishing Templates 

Summary: Cybercriminals are increasingly targeting Docusign users by distributing customizable phishing templates on cybercrime forums. These templates closely mimic legitimate Docusign emails, luring recipients into providing sensitive information or clicking malicious links. These attacks facilitate various malicious activities, including credential theft and business email compromise (BEC) scams. 

 

Rising Shadow AI Accounts Elevate Corporate Data Risks 

Summary: Recent research by Cyberhaven Labs reveals a 485% surge in AI tool usage among workers, with 90% occurring through personal "shadow AI" accounts. This trend exposes sensitive corporate data to public AI models, posing significant security risks. Key findings highlight that tech workers are the highest contributors, with substantial portions of sensitive data like legal documents, source code, and HR records being inputted into non-corporate accounts. Companies must address these vulnerabilities to safeguard their data. 

Action Points: 

  • Implement strict AI usage policies. 

  • Educate employees on the risks of shadow AI. 

  • Monitor AI tool usage within the organization. 

In News Tags Newsletter, Phishing, Healthcare
Comment

Exploring the security awareness newsletter - Image created by ChatGPT

Security Awareness Newsletter April 2024

May 6, 2024

These are the stories I’ve been tracking that are of interest to people outside of security. Feel free to take this and use it as part of your own security awareness program. The items were created with the help of ChatGPT

Confirmed: AT&T Data Breach Exposes Millions

A large data leak containing personal information of millions of AT&T customers is being investigated. While AT&T denies the breach originated from their systems, this incident highlights the importance of protecting your personal information.

Here are some steps you can take to stay safe:

  • Be mindful of the information you share online and over the phone.

  • Use strong passwords and change them regularly.

  • Monitor your bank statements and credit reports for suspicious activity.

 

 

AI in Elections: Beware the Deepfakes!

AI is shaking up elections! Check Point Research warns of deepfakes and voice cloning being used to mislead voters. They found evidence in 10 out of 36 recent elections. Stay informed - the future of voting might depend on it!

 

Heads Up, Gamers! Malware Lurks in YouTube Video Game Cracks

Phishing for free games can land you in hot water!

A recent report by Proofpoint discovered threat actors using YouTube to distribute malware disguised as popular video game cracks.

Here's the breakdown:

  • Compromised Accounts: Hackers are targeting both legitimate and newly created YouTube accounts.

  • Deceptive Content: Videos promise free software or game upgrades, but descriptions contain malicious links.

  • Targeting Young Gamers: The campaigns exploit younger audiences' interest in bypassing paid features.

 

 

Alert on Privacy Risks in Dating Apps: Spotlight on Hornet

Recent investigations by Check Point Research have exposed critical privacy vulnerabilities in the popular dating app Hornet, affecting its 10+ million users. Despite Hornet's attempts to safeguard user locations by randomizing displayed distances, researchers found ways to determine users' exact locations within 10 meters using trilateration techniques. This finding poses a significant privacy risk, particularly in dating apps that rely on geolocation features to connect users.

Highlights:

  • Hornet's geolocation vulnerabilities could allow attackers to pinpoint users' precise locations.

  • Even after implementing new safety measures, locations could still be determined within 50 meters.

  • Check Point Research advises users to be cautious about app permissions and consider disabling location services to protect their privacy.

The study illustrates the ongoing challenges and potential dangers of balancing app functionality with user privacy, urging both developers and users to remain vigilant.

 

 

Ransomware Scams Can Get Creative

Ransomware gangs are constantly looking for new ways to pressure companies into paying up. A recent article on TechCrunch describes a hilarious (but ultimately unsuccessful) attempt by a hacker to extort a company through their front desk Ransomware gang's new extortion trick? Calling the front desk.

While this specific incident might be lighthearted, it serves as a reminder that ransomware attackers are always adapting their tactics. Here's what you should be aware of:

  • Be cautious of any unsolicited calls or emails claiming a security breach. Don't engage with the sender and report them to the IT department immediately.

  • Never click on suspicious links or attachments. These could contain malware that gives attackers access to our systems.

  • Be mindful of what information you share over the phone. Hackers may try to sound legitimate to gather details about our company's network.

  • Stay informed about cybersecurity best practices. The IT department may send out phishing simulations or training materials – take advantage of these resources.

By staying vigilant and following these tips, we can all play a part in protecting our company from ransomware attacks. Remember, if you see something suspicious, report it!

 

 

FBI Alert: Increase in Social Engineering Attacks

The FBI has issued a warning about the rise in social engineering attacks targeting personal and corporate accounts. These attacks employ methods like impersonating employees, SIM swap attacks, call forwarding, simultaneous ringing, and phishing, which are designed to steal sensitive information.

Key Techniques:

  • Employee Impersonation: Fraudsters trick IT or helpdesk staff into providing network access.

  • SIM Swapping: Attackers take control of victims' phone numbers to bypass security measures like multi-factor authentication.

  • Call Forwarding and Simultaneous Ring: Calls are redirected to the attackers' numbers, potentially overcoming security protocols.

  • Phishing: Cybercriminals use fake emails from trusted entities to collect personal and financial data.

How to Protect Yourself:

  • Ignore unsolicited requests for personal information.

  • Ensure unique, strong passwords for all accounts.

  • Contact mobile carriers to restrict SIM changes and call forwarding.

  • Regularly monitor account activity for signs of unauthorized access.

If Compromised:

  • Immediately secure accounts by changing passwords and contacting service providers.

  • Report the incident to the FBI’s Internet Crime Complaint Center at www.ic3.gov.

Stay vigilant and implement these protective measures to defend against these sophisticated social engineering threats.

 

Smishing Scam Hits the Road!

Beware of texts claiming unpaid tolls! Scammers are targeting drivers with smishing attacks. The texts claim that the recipient has unpaid tolls. Don't click links or give out info. Report scams to the FBI: https://www.ic3.gov/Home/ComplaintChoice. Stay safe!

 

 

Data Breach at Hospital: Ex-Employee Admits to Sharing Patient Records

Patients at Jordan Valley Community Health Center in Missouri are being notified of a data breach involving over 2,500 individuals. The culprit? A former employee, Chante Falcon, who admitted to accessing and sharing patient records.

Facing federal charges for wrongful disclosure of patient information, Ms. Falcon pleaded guilty and awaits sentencing. The potential penalty? Up to 10 years in prison.

 

 

Tax Time Trouble: Don't Fall Victim to Tax Scams!

It's tax season again! While you're busy gathering documents and filing your return, scammers are out in force trying to steal your money and personal information.

This year, security experts are seeing a rise in Artificial Intelligence (AI)-powered tax scams. These scams can look and feel more sophisticated than ever before, making them even trickier to spot.

Here are some red flags to watch out for:

  • Urgency and Threats: Scammers often try to pressure you into acting quickly by claiming you owe overdue taxes or face penalties.

  • Suspicious Emails and Texts: Be wary of emails or texts claiming to be from the IRS or tax software companies. Don't click on links or attachments unless you're sure they're legitimate.

  • Phishing for Information: Scammers may ask for your Social Security number, bank account details, or other personal information you wouldn't normally share via email or text.

Stay Safe This Tax Season:

  • Go Directly to the Source: If you receive a message about your taxes, contact the IRS directly using a phone number you know is correct (don't use the one provided in the message).

  • Don't Share Personal Information Unsolicited: The IRS will never ask for sensitive information through email or text message.

By following these tips and staying vigilant, you can protect yourself from tax scams and ensure a smooth tax season!

 

 

Tracking AI's Influence in Global Elections

Rest of World, a news organization, has launched a new initiative to monitor and document the impact of artificial intelligence (AI) on global elections. This effort comes as generative AI tools become increasingly accessible, presenting both innovative uses and potential risks in political contexts.

Scope and Objective: The project tracks AI incidents across the globe, particularly focusing on regions outside the Western hemisphere. From the general elections in Bangladesh to those in Ghana, the tracker will compile AI-generated content related to elections, encompassing both positive applications and problematic issues like misinformation.

Noteworthy Incidents:

  • In Belarus, a ChatGPT-powered virtual candidate is providing voter information while circumventing censorship.

  • AI-generated videos have enabled Pakistan’s former Prime Minister Imran Khan to address the public from imprisonment.

  • A spam campaign against Taiwan’s president has been linked to a Chinese Communist Party actor.

  • Deepfake videos falsely depicted Bangladeshi candidates withdrawing on election day.

 

 

Comprehensive ChatGPT Risk Assessment

Walter Haydock from StackAware has conducted an exhaustive risk assessment of OpenAI's ChatGPT. This summary encapsulates the critical findings and documentation from the assessment, aiming to enhance your understanding and governance of AI tools.

Key Findings from the Assessment:

  • Purpose and Criticality: ChatGPT serves multiple functions, from generating marketing content to converting unstructured data into structured formats. Its operational importance is significant, with potential major business impacts in case of system failure.

  • System Complexity and Reliability: Despite its complex nature, ChatGPT has shown reliable performance, although occasional performance and availability issues have been documented on OpenAI’s status page.

  • Environmental and Economic Impacts: ChatGPT's operation is energy-intensive, with considerable carbon emissions and water usage. However, it also offers potential economic benefits, potentially contributing significantly to global productivity and economic output.

  • Societal and Cultural Impacts: The system’s ability to automate repetitive tasks could liberate millions from mundane work but also poses risks to employment and misinformation, particularly during sensitive periods like elections.

  • Legal and Human Rights Considerations: The system's deployment must carefully navigate potential impacts on employment and privacy, with strict adherence to legal and human rights norms.

 

 

Deepfake Phishing Attempt Targets LastPass Employee: Audio Social Engineering on the Rise

A recent incident reported by LastPass sheds light on a concerning trend: the use of audio deepfakes in social engineering attacks.

What Happened?

  • A LastPass employee received a series of calls, text messages, and voicemails supposedly from the company's CEO.

  • The voice messages utilized deepfake technology to convincingly mimic the CEO's voice.

  • The attacker attempted to pressure the employee into performing actions outside of normal business communication channels and exhibiting characteristics of a social engineering attempt.

Why This Matters:

  • This incident marks a potential turning point in social engineering tactics. Deepfakes can bypass traditional email-based phishing attempts and create a more believable scenario for the target.

  • Audio deepfakes pose a significant threat because they exploit the inherent trust we place in familiar voices.

How LastPass Responded:

  • The targeted employee, recognizing the red flags of the situation, did not respond to the messages and reported the incident to internal security.

  • LastPass highlights the importance of employee awareness training in identifying and reporting social engineering attempts.

 

 

Change Healthcare Cyberattack: A Costly Reminder for Physicians

A recent cyberattack on Change Healthcare, a major healthcare IT provider, has had a significant impact on physicians across the country. According to a KnowBe4 article, a staggering 80% of physicians reported financial losses due to the attack. United Health announced the attack cost them $1.6 billion alone.

The High Cost of the Breach

The article details the financial strain placed on physician practices:

  • Revenue Loss: Disruptions caused by the attack made it difficult to submit claims and verify benefits, leading to lost revenue.

  • Increased Costs: Extra staff time and resources were required to complete revenue cycle tasks.

  • Personal Expenses: Some practices were forced to use personal funds to cover business expenses.

 

 

USPS Now the Most Impersonated Brand in Phishing Attacks

Phishing attacks are one of the most common cyber threats. Criminals impersonate well-known brands to trick people into giving up personal information. According to a recent report, the United States Postal Service (USPS) has surged to the top spot on the list of most impersonated brands.

Here are some tips to avoid falling victim to a USPS phishing attack:

  • Be wary of emails or text messages that claim to be from USPS about a delivery issue or package requiring additional fees.

  • Do not click on any links or attachments in suspicious emails or text messages.

  • If you are unsure about the legitimacy of an email or text message, contact USPS directly.

  • Be mindful of the sender's email address and look for typos or inconsistencies.

By following these tips, you can help protect yourself from phishing attacks.

 

In News Tags Security Awareness, Newsletter, AI, Deepfake, Malware, Phishing
Comment

Exploring phishing threat intelligence from April 2024 - Image created by ChatGPT

Phishing Threat Intelligence April 2024

April 29, 2024

These are the phishing related stories I paid attention to in April 2024. Feel free to use these and share them with your own security teams.

 The NaurLegal Campaign Unveiled 

BlueVoyant's Threat Fusion Cell has exposed a new cyber attack campaign, dubbed ‘NaurLegal’, led by the notorious eCrime group Narwhal Spider. This campaign ingeniously exploits the trust in legal transactions by distributing malicious PDF files posing as invoices from reputable law firms. With filenames like "Invoice_[number]from[law firm name].pdf," these documents are crafted to bypass casual scrutiny and initiate malware infections. 

Key Insights: 

  • Tactic Exploitation: NaurLegal leverages the routine nature of legal document exchanges, using this as a vector to deploy malware, including sophisticated threats like WikiLoader and potentially IcedID. 

  • Infrastructure: The campaign operates through compromised WordPress sites for command and control (C2), a hallmark of Narwhal Spider’s modus operandi. 

  • Evolving Threat: Unlike previous attacks primarily targeting Italian entities, NaurLegal broadens its focus, indicating a strategic shift towards exploiting a wider array of organizational vulnerabilities. 

 

 

Google Ads Malware Alert for Security Professionals 

In a recent discovery by AhnLab Security Intelligence Center (ASEC), a sophisticated malware distribution campaign has been identified exploiting Google Ads' tracking feature. Dubbed by ASEC, this campaign cleverly disguises malware as popular groupware installers like Notion, Slack, and Trello, leveraging Google Ads to reach a broad audience. The exploitation of the Ads platform's vast user base and complex targeting options presents a notable security concern, highlighting the innovative strategies of cybercriminals to breach defenses. 

Key Campaign Insights: 

  • Malware Distribution: Attackers create or hijack Google Ads to distribute malware through tracking URLs hidden in legitimate-looking ads, leading unsuspecting users to download harmful executables. 

  • Targeted Malware: The campaign specifically uses malware-laden files with names mimicking reputable software installers to trick users into initiating downloads. 

  • Sophisticated Evasion Techniques: Upon execution, the malware contacts attacker-controlled servers to fetch additional malicious payloads, utilizing compromised domains and text-sharing sites for hosting. 

  • Payloads and Execution: The Rhadamanthys infostealer malware, fetched from these links, is then injected into legitimate Windows system files, enabling it to steal private data while avoiding detection. 

 

 

Security Alert: New Loader and Agent Tesla Campaign Detected 

SpiderLabs has identified a phishing campaign deploying Agent Tesla via a sophisticated new loader. Initiated via email attachments disguised as bank payment receipts, this campaign utilizes advanced obfuscation and encryption to deliver its malicious payload while evading detection. 

Key Insights:

  • Attack Vector: Phishing emails with attachments that trigger a complex infection chain to deploy Agent Tesla. 

  • Evasion Tactics: The loader showcases advanced evasion, including polymorphism and AMSI bypass techniques, to execute the payload stealthily. 

  • Agent Tesla Execution: Executes entirely in memory, focusing on data theft and utilizing SMTP for data exfiltration through compromised accounts. 

 

 

AI-Powered Malware Spreads Through Social Media Malvertising Campaigns 

This article from Bitdefender highlights a recent surge in information-stealing malware campaigns targeting social media users. 

Key Points: 

  • Attackers Exploit Popularity of AI Software: Cybercriminals are leveraging the rising interest in AI-powered image and video generators to distribute malware. 

  • Malicious Ads Impersonate Legitimate Software: Fake social media pages and sponsored ads mimic popular AI tools like Midjourney, Sora, and CapCut. 

  • Ads Trick Users into Downloading Malware: Clicking on these ads leads users to download malicious software disguised as official installers. 

  • Malware Steals Sensitive Information: The malware steals login credentials, browsing history, cookies, and even crypto wallet information. 

  • Rilide V4, Vidar, IceRAT, and Nova Stealer Used: The report identifies various information stealers used in these campaigns, including Rilide V4, Vidar, IceRAT, and Nova Stealer. 

  • Midjourney Most Targeted Platform: Midjourney, a popular AI image generation tool, was the most impersonated platform in this campaign. 

 

Attention Security Teams: Malware Spreads Through YouTube Video Game Cracks 

Threat actors are leveraging compromised YouTube accounts to distribute information stealers disguised as popular video game cracks. This campaign, detailed in a recent Proofpoint report, targets unsuspecting gamers, particularly younger audiences. 

  • Compromised Accounts: Legitimate and newly created YouTube accounts are being used to upload malicious videos. 

  • Deceptive Content: Videos advertise access to pirated software or game upgrades. Descriptions contain links that download malware upon clicking. 

  • Targeted Audience: The campaign exploits the desire to bypass paid features, likely appealing to younger gamers. 

Security Implications: 

  • Information stealers like Vidar, StealC, and Lumma Stealer can compromise user credentials and other sensitive data. 

  • Compromised accounts can be used to further distribute malware or host phishing attacks. 

  • Younger audiences may be less familiar with online safety best practices, increasing susceptibility. 

For further investigation: The Proofpoint report provides Indicators of Compromise (IOCs) to assist in identifying these malicious videos. 

 

 

ReliaQuest’s Annual Cyber-Threat Report: 2024 

According to the report: 

  • Phishing links or attachments were involved in 71% of all initial access phases of cyber attacks 

  • The top three MITRE ATT&CK techniques in attacks involved phishing or spear phishing 

  • Drive-by-compromise was used in 29% of attack 

  • QR code phishing saw a 51% increase in just one month – September – over the previous 8 months combined 

 

 

Android Malware Vultur Expands Its Capabilities 

A recent report by Fox-IT details the evolving capabilities of the Android malware Vultur. Key takeaways: 

  • New Functionality: Vultur now possesses features that enable remote interaction with a device's screen through Accessibility Services. 

  • Enhanced File Management: The malware can now download, upload, delete, install, and locate files on infected devices. 

  • Evasion Techniques: Vultur employs app impersonation and communication encryption to evade detection. 

These expanded capabilities pose a significant threat to Android users, as Vultur can now perform a wider range of malicious activities. 

 

Agent Tesla Targets US and AU Organizations: A Newsletter for Security Professionals 

A recent campaign by cyberespionage actors, nicknamed "Bignosa" and "Gods", has been targeting organizations in the United States and Australia. The attackers use phishing emails with topics related to purchasing goods and order delivery to distribute the Agent Tesla malware. Once installed, Agent Tesla can steal keystrokes and login credentials. 

Key takeaways: 

  • Malicious Mails: Phishing emails with seemingly legitimate topics are being used to lure unsuspecting victims. 

  • Agent Tesla: This malware steals keystrokes and login credentials, posing a significant threat to compromised systems. 

  • Stay Vigilant: Keeping software updated and exercising caution regarding unexpected emails are crucial for mitigating such attacks. 

 

 

New Download Threat: Latrodectus Emerges 

A new downloader malware called Latrodectus has emerged, posing a threat to system security. Two threat actors, TA577 and TA578, have been distributing Latrodectus, raising concerns about its potential reach. 

This malware functions as a downloader, capable of not only information theft but also installing additional malware, potentially escalating the attack. Security experts believe Latrodectus might be linked to the creators of IcedID, another malicious software. Key takeaways: 

  • Latrodectus's Reach: The involvement of multiple threat actors (TA577 and TA578) indicates a wider distribution network, increasing the potential for encountering this malware. 

  • Multi-faceted Threat: Latrodectus goes beyond information theft; its ability to install additional malware poses a serious risk of system compromise. 

  • Possible Connection to IcedID: The link to IcedID suggests a potentially sophisticated threat actor behind Latrodectus. 

 

 

New Malware Delivery Techniques on the Rise 

New research from Check Point reveals that cybercriminals are developing new methods to deliver malware. These techniques involve novel infection chains designed to bypass common security measures and deliver Remcos, a powerful Remote Access Trojan (RAT). 

The report also highlights the evolving tactics employed by attackers to exploit vulnerabilities. While Lockbit3 remains the most prevalent ransomware, Blackbasta has worryingly climbed the ranks, entering the top three. 

Key takeaways: 

  • Cybercriminals are developing new methods to deliver malware, employing novel infection chains to bypass common security measures. 

  • Remcos, a powerful Remote Access Trojan (RAT), is being delivered through these new techniques. 

  • Lockbit3 remains the most prevalent ransomware, but Blackbasta has risen in prominence. 

  • FakeUpdates is the most common malware encountered. 

 

 

Tycoon 2FA: Phishing As A Service Evolving to Bypass MFA 

MFA Fatigue? Tycoon 2FA Raises Concerns 

A new variant of the Tycoon 2FA phishing kit is making waves for its effectiveness in bypassing multi-factor authentication (MFA). This phishing-as-a-service (PhishingaaS) tool targets Microsoft 365 credentials and utilizes a technique known as adversary-in-the-middle (AiTM) to steal session cookies, granting access even with MFA enabled. 

Key Points for Security Teams: 

  • Active Threat: First observed in August 2023, Tycoon 2FA has become a prevalent threat due to its ease of use and affordability. 

  • MFA Bypass: The phishing kit steals Microsoft 365 session cookies, allowing attackers to bypass MFA and gain access to compromised accounts. 

  • Stealthier Than Ever: Recent updates enhance the kit's stealth capabilities, potentially reducing detection by security products. 

  • Widespread Impact: Sekoia has identified over 1200 domain names associated with Tycoon 2FA infrastructure since its release. 

 

 

Alert: Cisco Duo's Multifactor Authentication Service Compromised 

Cisco Duo has issued a warning to its customers following a breach involving a third-party telephony service provider. This incident, which unfolded on April 1, 2024, involved the unauthorized access of SMS logs due to a social engineering cyberattack. 

Key Details: 

  • Breach Dynamics: Threat actors gained access by using compromised employee credentials at a third-party provider that handles SMS and VOIP services for Cisco Duo's multifactor authentication (MFA). 

  • Data Compromised: The breach resulted in the unauthorized download of message logs for SMS messages sent between March 1, 2024, and March 31, 2024. These logs included phone numbers, carriers, country and state data, and other metadata like the date, time, and type of messages. 

  • No Message Content Exposed: It's important to note that the content of the messages was not exposed in the breach. 

Customer Advisory: Cisco Duo has advised all impacted users to notify individuals whose information was compromised and to stay alert for potential phishing attacks leveraging the stolen data. 

 

 

Tech Giants Lead Phishing Charge: Microsoft, Google Top Q1 Brand Impersonation 

Phishing remains a top threat, with technology brands the most impersonated. 

A recent report by Check Point Research (CPR) paints a concerning picture of the evolving phishing landscape. Their analysis of brand phishing attempts in Q1 2024 reveals a worrying trend: technology giants are the most targeted sectors. 

Key Findings: 

  • Microsoft Maintains Top Spot: Microsoft continues to be the most impersonated brand in phishing attacks, accounting for a staggering 38% of all attempts in Q1 2024. 

  • Google Makes Gains: Google rose to the second-place position, capturing 11% of phishing attempts – a significant increase from its previous third-place ranking. 

  • Tech Sector Dominates: Technology remains the most impersonated industry, likely due to its prevalence in corporate environments and the potential for lucrative access to company assets through stolen credentials. 

Why Tech Brands? 

Cybercriminals often target technology brands for several reasons: 

  • Widespread Use: These brands are familiar and widely used, making them a believable target for phishing attempts. 

  • Access to Sensitive Data: Gaining access to compromised accounts in these platforms can grant attackers access to sensitive corporate data or financial information. 

  • Remote Work Reliance: The increased use of cloud-based services and remote work environments expands the potential attack surface for tech-focused phishing campaigns. 

 

 

Beware of Sophisticated Phishing Attacks Targeting Help Desks! 

Alert! A recent report from the Department of Health and Human Services (HHS) warns of a rise in sophisticated social engineering attacks targeting IT help desks within the healthcare sector. 

Here's what you need to know: 

  • Impersonation Tactics: Attackers are making phone calls to help desks, impersonating employees (often in financial roles) and claiming they require urgent assistance. 

  • Credentials at Risk: These imposters are armed with convincing details about the targeted employee, including the last four digits of their Social Security number and corporate ID. This information allows them to bypass initial security checks. 

  • Potential for Data Breaches: The ultimate goal of these attacks is to steal login credentials or trick help desk personnel into granting access to sensitive systems and data. 

 

Malvertising Campaign Targets IT Teams with "MadMxShell" Backdoor 

Threat actors are leveraging malvertising campaigns to distribute a previously unseen backdoor dubbed "MadMxShell." This campaign targets IT security and network administration teams by spoofing legitimate IP scanner software websites. 

Key Details: 

  • Attack Chain: The threat actors register typosquatted domain names resembling popular IP scanner software. 

  • Google Ads Abuse: They then exploit Google Ads to push these malicious websites to the top of search engine results pages (SERPs) for relevant keywords used by IT professionals searching for IP scanner tools. 

  • Delivery of Backdoor: Unsuspecting victims who visit the spoofed websites are redirected to download links that deliver the MadMxShell backdoor. 

Technical Analysis: 

  • MadMxShell Backdoor: This backdoor offers remote access capabilities, allowing attackers to gain unauthorized control over compromised systems. 

  • Limited Information: While details about MadMxShell's functionalities are scarce, the report suggests it possesses file system manipulation and process execution abilities. 

 

 

Shift in Attack Tactics: Vulnerability Exploitation on the Rise 

Phishing Declines, Zero-Days Soar 

A recent report by Mandiant indicates a significant shift in cyberattacker tactics. Vulnerability exploitation has overtaken phishing as the primary method for gaining initial network access. Researchers found that in 2023, vulnerabilities were exploited in 38% of intrusions, a 6% increase over 2022. Phishing attempts, while still the second most common initial infection vector, dropped from 22% to 17% over the same period. 

The report also highlights a sharp rise in the exploitation of zero-day vulnerabilities, previously unknown flaws in software, by 56% year-over-year. Chinese cyber espionage groups were found to be the most active users of zero-days, while financially motivated attackers continue to leverage these vulnerabilities to steal financial data. 

Key Takeaways 

  • Patching vulnerabilities promptly is crucial to preventing initial network access by attackers. 

  • Organizations should prioritize vulnerability management and invest in threat detection solutions capable of identifying zero-day exploits. 

  • While phishing remains a threat, user awareness training should be supplemented with additional security measures to mitigate the evolving tactics of cybercriminals. 

 

 

Ransomware on the Rise: More Groups, More Victims 

Ransomware is back with a vengeance. A GRIT report shows a worrying 20% increase in victims in Q1 2024 compared to the same period last year. This coincides with a surge in active ransomware groups, jumping from 29 to 45 (a 55% increase). BlackBasta and Play are new major players, joining the persistent LockBit. 

Brutality and Distribution Mark New Era 

These groups are targeting critical infrastructure like hospitals, highlighting a ruthless shift in tactics. Additionally, RaaS groups are recruiting affiliates, creating a more distributed threat landscape. 

Key Takeaways: 

  • Patching and Detection are Critical: Shore up defenses by patching vulnerabilities and implementing security solutions. 

  • Beyond Phishing: Non-phishing attacks are the new norm, so vulnerability management is key. 

  • Backups are Essential: Regular backups ensure a swift recovery from an attack. 

  • Stay Ahead of the Curve: Keeping informed about the evolving threat landscape allows for proactive defense. 

 

 

Phishing Attacks on the Rise: AI-powered Threat Landscape 

A recent report by AI-ThreatLabz highlights a significant increase in phishing attacks, with a staggering 58% rise observed in 2024 compared to the previous year. This surge is attributed to the growing adoption of Artificial Intelligence (AI) by attackers, enabling them to craft highly personalized and believable phishing campaigns. 

Key Takeaways 

  • Phishing Attacks are Soaring: Phishing remains a major threat, with a sharp increase in incidents this year. 

  • AI-powered Attacks: Attackers are leveraging AI to create more believable and personalized phishing emails, making them harder to detect. 

  • Zero Trust Security is Key: Traditional security approaches may not be sufficient. Zero trust security principles can help mitigate the risk of phishing attacks by continuously verifying access requests. 

 

In News Tags Phishing, Threat Intelligence, Newsletter
Comment
← Newer Posts Older Posts →

Latest PoDCASTS

Featured
Jul 15, 2025
[RERELEASE] What are BEC attacks?
Jul 15, 2025
Jul 15, 2025
Jul 8, 2025
[RERELEASE] How to crack passwords
Jul 8, 2025
Jul 8, 2025
Jul 2, 2025
[RERELEASE] How to find vulnerabilites
Jul 2, 2025
Jul 2, 2025
Jun 24, 2025
[RERELEASE] What is data driven security?
Jun 24, 2025
Jun 24, 2025
Jun 17, 2025
[RERELEASE] What is a CISSP?
Jun 17, 2025
Jun 17, 2025
Jun 10, 2025
[RERELEASE] From ShowMeCon 2017: Dave Chronister, Johnny Xmas, April Wright, and Ben Brown talk about Security
Jun 10, 2025
Jun 10, 2025
Jun 4, 2025
How to Perform Incident Response and Forensics on Drones with Wayne Burke
Jun 4, 2025
Jun 4, 2025
Jun 3, 2025
That Shouldn't Have Worked: A Red Teamer's Confessions with Corey Overstreet
Jun 3, 2025
Jun 3, 2025
May 28, 2025
when machines take over the world with Jeff Man
May 28, 2025
May 28, 2025
May 20, 2025
How to Disconnect From Cybersecurity
May 20, 2025
May 20, 2025

Powered by Squarespace