Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 43 / 228
The CVE-2024-11053 Sunday shenanigans https://curl.se/mail/lib-2024-12/0022.html
16/12/2024 11:41:35
QRCode
archive.org

I just wanted to make you all aware of what happened over the weekend.

On Sunday afternoon, Harry Sintonenen made us aware that several security
related websites posted articles about the "CRITICAL curl security flaw".

We announced that as severity LOW earlier this week. How and why did this
massive severiy level bump happen?

curl.se EN 2024 not-critical CVE-2024-11053 severity LOW
https://www.forescout.com/blog/draytek-routers-exploited-in-massive-ransomware-campaign-analysis-and-recommendations/ https://www.forescout.com/blog/draytek-routers-exploited-in-massive-ransomware-campaign-analysis-and-recommendations/
16/12/2024 09:24:00
QRCode
archive.org
  • Our 2024 Dray:Break report revealed 14 new vulnerabilities in DrayTek devices
    *See our upcoming presentation at Black Hat Europe for more details
  • PRODAFT shared threat intelligence from 2023 on a ransomware campaign exploiting DrayTek devices
  • This is the first time this campaign is discussed publicly
  • Our analysis shows sophisticated attack workflows to deploy ransomware including possible:
    • Zero-day vulnerabilities
    • Credential harvesting and password cracking
      VPN and tunneling abuse
forescout en 2024 draytek ALPHV ransomware
Serbian police used Cellebrite to unlock, then plant spyware, on a journalist's phone | TechCrunch https://techcrunch.com/2024/12/15/serbian-police-used-cellebrite-to-unlock-then-plant-spyware-on-a-journalists-phone/
16/12/2024 09:01:00
QRCode
archive.org
thumbnail

Amnesty said it found NoviSpy, an Android spyware linked to Serbian intelligence, on the phones of several members of Serbian civil society following police stops.

techcrunch EN 2024 Serbia Spyware NoviSpy Android intelligence spy privacy
Personal Data of Rhode Island Residents Breached in Large Cyberattack - The New York Times https://www.nytimes.com/2024/12/14/us/cyberattack-rhode-island-ribridges-snap-medicaid.html?smid=nytcore-ios-share&referringSource=articleShare
16/12/2024 06:49:11
QRCode
archive.org

An “international cybercriminal group” harvested the personal data of potentially hundreds of thousands of people from the state’s social services and health insurance systems, officials said.

nytimes EN 2024 nternational cybercriminal group data-leak US RIBridges Rhode-Island
Une centrale nucléaire mise sur les drones pour assurer sa sécurité https://www.blick.ch/fr/suisse/le-president-de-la-commune-publie-accidentellement-des-photos-sur-whatsapp-la-centrale-nucleaire-de-goesgen-mise-desormais-sur-les-drones-pour-assurer-sa-securite-id20413890.html
15/12/2024 10:31:20
QRCode
archive.org

La centrale nucléaire de Gösgen, dans le canton de Soleure, mise sur la technologie des drones pour sa sécurité et l'inspection. Aujourd'hui, la publication involontaire d'images suscite le débat.

blick FR CH Suisse leak WhatsApp nucléaire drones
300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks https://www.aquasec.com/blog/300000-prometheus-servers-and-exporters-exposed-to-dos-attacks/
14/12/2024 11:10:11
QRCode
archive.org
thumbnail

In this research, we uncovered several vulnerabilities and security flaws within the Prometheus ecosystem. These findings span across three major areas: information disclosure, denial-of-service (DoS), and code execution. We found that exposed Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and API keys.
Additionally, we identified an alarming risk of DoS attacks stemming from the exposure of pprof debugging endpoints, which, when exploited, could overwhelm and crash Prometheus servers, Kubernetes pods and other hosts.

aquasec EN 2024 Prometheus Servers DoS attacks Exposed research
PROXY.AM Powered by Socks5Systemz Botnet https://www.bitsight.com/blog/proxyam-powered-socks5systemz-botnet
14/12/2024 11:08:56
QRCode
archive.org
thumbnail
  • Socks5Systemz, identified last year during large-scale distribution campaigns involving Privateloader, Smokeloader, and Amadey, has actually been active since 2013.
  • This malware was sold as a standalone product or integrated into other malware as a SOCKS5 proxy module. Such malware included, at least, Andromeda, Smokeloader and Trickbot.
  • In recent months, Bitsight TRACE investigated a Socks5Systemz botnet with 250,000 compromised systems at its peak, geographically dispersed across almost every country in the world.
  • The proxy service PROXY.AM, active since 2016, exploits the botnet to provide its users with proxy exit nodes and enable them to pursue broader criminal objectives.
bitsight EN 2024 PROXY.AM Socks5Systemz Botnet criminal
Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation | Akamai https://www.akamai.com/blog/security-research/2024-december-windows-ui-automation-attack-technique-evades-edr
14/12/2024 11:04:20
QRCode
archive.org
  • Akamai security researcher Tomer Peled explored new ways to use and abuse Microsoft's UI Automation framework and discovered an attack technique that evades endpoint detection and response (EDR).

  • To exploit this technique, a user must be convinced to run a program that uses UI Automation. This can lead to stealthy command execution, which can harvest sensitive data, redirect browsers to phishing websites, and more.

  • Detection of this technique is challenging in several ways, including for EDR. All EDR technologies we have tested against this technique were unable to find any malicious activity.

  • This technique can be used on every Windows endpoint with operating system XP and above.

  • In this blog post, we provide a full write-up on how to (ab)use the UI Automation framework (including possible attacks that could leverage it) and we present a proof of concept (PoC) for each abuse vector we discuss. We also provide detection and mitigation options.

akamai EN 2024 Microsoft abuse automation-framework UIAutomation technique
Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials | Datadog Security Labs https://securitylabs.datadoghq.com/articles/mut-1244-targeting-offensive-actors/
14/12/2024 10:58:04
QRCode
archive.org
thumbnail
  • In this post, we describe our in-depth investigation into a threat actor to which we have assigned the identifier MUT-1244.
  • MUT-1224 uses two initial access vectors to compromise their victims, both leveraging the same second-stage payload: a *phishing campaign targeting thousands of academic researchers and a large number of trojanized GitHub repositories, such as proof-of-concept code for exploiting known CVEs.
  • Over 390,000 credentials, believed to be for WordPress accounts, have been exfiltrated to the threat actor through the malicious code in the trojanized "yawpp" GitHub project, masquerading as a WordPress credentials checker.
  • Hundreds of victims of MUT-1244 were and are still being compromised. Victims are believed to be offensive actors—including pentesters and security researchers, as well as malicious threat actors— and had sensitive data such as SSH private keys and AWS access keys exfiltrated.
  • We assess that MUT-1244 has overlap with a campaign tracked in previous research reported on the malicious npm package 0xengine/xmlrpc and the malicious GitHub repository hpc20235/yawpp.
securitylabs.datadoghq.com EN 2024 pentesters script-kiddies offensive actors MUT-1244 PoC PoC-abuse MUT-1224 credentials steal
Oasis Security Research Team Discovers Microsoft Azure MFA Bypass https://oasis.security/resources/blog/oasis-security-research-team-discovers-microsoft-azure-mfa-bypass
14/12/2024 10:30:01
QRCode
archive.org
thumbnail

Oasis Security's research team uncovered a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation, allowing attackers to bypass it and gain unauthorized access to the user’s account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more. Microsoft has more than 400 million paid Office 365 seats, making the consequences of this vulnerability far-reaching.

The bypass was simple: it took around an hour to execute, required no user interaction and did not generate any notification or provide the account holder with any indication of trouble.

oasis.security EN 2024 research MFA Microsoft MFA-bypass
Le Parlement favorable au "Swiss Governement Cloud" https://www.parlament.ch/fr/services/news/Pages/2024/20241212110540269194158159026_bsf072.aspx
14/12/2024 00:07:35
QRCode
archive.org

L'administration fédérale doit avoir son propre service en nuage souverain. Suivant le National, le Conseil des Etats a accepté jeudi à l'unanimité un crédit de 246,9 millions de francs pour le "Swiss Governement Cloud" (SGC).

parlament.ch FR CH Suisse administration fédérale SGC Swiss-Governement-Cloud
He Investigates the Internet’s Most Vicious Hackers—From a Secret Location https://www.wsj.com/tech/cybersecurity/hacking-brian-krebs-snowflake-waifu-49b87fce?st=9G8m8W&reflink=desktopwebshare_permalink
13/12/2024 23:59:56
QRCode
archive.org

In the increasingly dangerous world of cybercrime, Brian Krebs faces threats, manipulation and the odd chess challenge

wsj EN 2024 BrianKrebs Secret Location
NodeLoader Used to Deliver Malware https://www.zscaler.com/blogs/security-research/nodeloader-exposed-node-js-malware-evading-detection
13/12/2024 18:13:49
QRCode
archive.org
thumbnail

A technical analysis of how a malware campaign using a game cheat lure leverages Node.js to distribute XMRig, Lumma and Phemedrone Stealer.

zscaler EN 2024 NodeLoader analysis Node.js game-cheat
Axpo annonce lancer le premier SOC suisse pour les infrastructures OT | ICTjournal https://www.ictjournal.ch/news/2024-12-12/axpo-annonce-lancer-le-premier-soc-suisse-pour-les-infrastructures-ot
13/12/2024 15:08:01
QRCode
archive.org
thumbnail

Axpo Systems annonce la mise en service de ce que l'entreprise décrit comme le premier Security Operation Cent

ictjournal FR CH 2024 Suisse SOC OT AxpoSystems
Citrix Denial of Service: Analysis of CVE-2024-8534 https://www.assetnote.io/resources/research/citrix-denial-of-service-analysis-of-cve-2024-8534
13/12/2024 08:28:16
QRCode
archive.org

An analysis of CVE-2024-8534, a memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway.

assetnote EN 2024 CVE-2024-8534 analysis NetScaler Gateway ADC vulnerability
Threat Actors Push ClickFix Fake Browser Updates Using Stolen Credentials https://www.godaddy.com/resources/news/threat-actors-push-clickfix-fake-browser-updates-using-stolen-credentials
12/12/2024 12:02:49
QRCode
archive.org
thumbnail

ClickFix fake browser updates are being distributed by bogus WordPress plugins. Learn about the common indicators of compromise.

godaddy EN 2024 ClickFix Fake Browser Updates WordPress
Unveiling Dark Internet Service Providers: Bulletproof Hosting | by team | Dec, 2024 | Medium https://medium.com/@knownsec404team/unveiling-dark-internet-service-providers-bulletproof-hosting-243ddb2b787d
11/12/2024 11:06:24
QRCode
archive.org

Bulletproof hosting services provide the infrastructure for cybercriminal activities, enabling criminals to evade legal constraints and are often used for malware, hacking attacks, fraudulent…

Knownsec404 medium EN 2024 Dark Internet Service Providers Bulletproof hosting
NATO to launch new cyber center by 2028: Official https://breakingdefense.com/2024/12/nato-to-launch-new-cyber-center-by-2028-official/
11/12/2024 11:05:55
QRCode
archive.org
thumbnail

The center, called the NATO Integrated Cyber Defense Center, will have multiple locations, but will be headquartered in Mons, Belgium.

breakingdefense.com EN 2024 NATO Integrated-Cyber-Defense-Center Belgium
Publicités insérées entre les courriels : sanction de 50 millions d’euros à l’encontre de la société ORANGE https://www.cnil.fr/fr/publicites-inserees-entre-les-courriels-sanction-de-50-millions-deuros-orange
11/12/2024 11:05:27
QRCode
archive.org

Le contexte ORANGE met à disposition de ses clients un service de messagerie électronique (« Mail Orange »). À la suite de plusieurs contrôles, la CNIL a constaté que la société affichait, entre les courriels présents au sein des boîtes de réception des utilisateurs, des annonces publicitaires prenant la forme de courriels.

CNIL FR 2024 ORANGE MailOrange Publicités sanction France
'Operation Digital Eye' Attack Targets European IT Orgs https://www.darkreading.com/cyberattacks-data-breaches/operation-digital-eye-attack-targets-european-it-orgs
10/12/2024 12:16:03
QRCode
archive.org
thumbnail

A Chinese threat actor infiltrated several IT and security companies in a bring-your-own VS code, with an eye to carrying out a supply-chain-based espionage attack.

darkreading EN 2024 Cyberattacks Data-Breaches Application-Security bring-your-own VS code EU
page 43 / 228
4542 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio