Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 6 / 76
1513 résultats taggé 2024  ✕
Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials | Datadog Security Labs https://securitylabs.datadoghq.com/articles/mut-1244-targeting-offensive-actors/
14/12/2024 10:58:04
QRCode
archive.org
thumbnail
  • In this post, we describe our in-depth investigation into a threat actor to which we have assigned the identifier MUT-1244.
  • MUT-1224 uses two initial access vectors to compromise their victims, both leveraging the same second-stage payload: a *phishing campaign targeting thousands of academic researchers and a large number of trojanized GitHub repositories, such as proof-of-concept code for exploiting known CVEs.
  • Over 390,000 credentials, believed to be for WordPress accounts, have been exfiltrated to the threat actor through the malicious code in the trojanized "yawpp" GitHub project, masquerading as a WordPress credentials checker.
  • Hundreds of victims of MUT-1244 were and are still being compromised. Victims are believed to be offensive actors—including pentesters and security researchers, as well as malicious threat actors— and had sensitive data such as SSH private keys and AWS access keys exfiltrated.
  • We assess that MUT-1244 has overlap with a campaign tracked in previous research reported on the malicious npm package 0xengine/xmlrpc and the malicious GitHub repository hpc20235/yawpp.
securitylabs.datadoghq.com EN 2024 pentesters script-kiddies offensive actors MUT-1244 PoC PoC-abuse MUT-1224 credentials steal
Oasis Security Research Team Discovers Microsoft Azure MFA Bypass https://oasis.security/resources/blog/oasis-security-research-team-discovers-microsoft-azure-mfa-bypass
14/12/2024 10:30:01
QRCode
archive.org
thumbnail

Oasis Security's research team uncovered a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation, allowing attackers to bypass it and gain unauthorized access to the user’s account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more. Microsoft has more than 400 million paid Office 365 seats, making the consequences of this vulnerability far-reaching.

The bypass was simple: it took around an hour to execute, required no user interaction and did not generate any notification or provide the account holder with any indication of trouble.

oasis.security EN 2024 research MFA Microsoft MFA-bypass
He Investigates the Internet’s Most Vicious Hackers—From a Secret Location https://www.wsj.com/tech/cybersecurity/hacking-brian-krebs-snowflake-waifu-49b87fce?st=9G8m8W&reflink=desktopwebshare_permalink
13/12/2024 23:59:56
QRCode
archive.org

In the increasingly dangerous world of cybercrime, Brian Krebs faces threats, manipulation and the odd chess challenge

wsj EN 2024 BrianKrebs Secret Location
NodeLoader Used to Deliver Malware https://www.zscaler.com/blogs/security-research/nodeloader-exposed-node-js-malware-evading-detection
13/12/2024 18:13:49
QRCode
archive.org
thumbnail

A technical analysis of how a malware campaign using a game cheat lure leverages Node.js to distribute XMRig, Lumma and Phemedrone Stealer.

zscaler EN 2024 NodeLoader analysis Node.js game-cheat
Axpo annonce lancer le premier SOC suisse pour les infrastructures OT | ICTjournal https://www.ictjournal.ch/news/2024-12-12/axpo-annonce-lancer-le-premier-soc-suisse-pour-les-infrastructures-ot
13/12/2024 15:08:01
QRCode
archive.org
thumbnail

Axpo Systems annonce la mise en service de ce que l'entreprise décrit comme le premier Security Operation Cent

ictjournal FR CH 2024 Suisse SOC OT AxpoSystems
Citrix Denial of Service: Analysis of CVE-2024-8534 https://www.assetnote.io/resources/research/citrix-denial-of-service-analysis-of-cve-2024-8534
13/12/2024 08:28:16
QRCode
archive.org

An analysis of CVE-2024-8534, a memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway.

assetnote EN 2024 CVE-2024-8534 analysis NetScaler Gateway ADC vulnerability
Threat Actors Push ClickFix Fake Browser Updates Using Stolen Credentials https://www.godaddy.com/resources/news/threat-actors-push-clickfix-fake-browser-updates-using-stolen-credentials
12/12/2024 12:02:49
QRCode
archive.org
thumbnail

ClickFix fake browser updates are being distributed by bogus WordPress plugins. Learn about the common indicators of compromise.

godaddy EN 2024 ClickFix Fake Browser Updates WordPress
Unveiling Dark Internet Service Providers: Bulletproof Hosting | by team | Dec, 2024 | Medium https://medium.com/@knownsec404team/unveiling-dark-internet-service-providers-bulletproof-hosting-243ddb2b787d
11/12/2024 11:06:24
QRCode
archive.org

Bulletproof hosting services provide the infrastructure for cybercriminal activities, enabling criminals to evade legal constraints and are often used for malware, hacking attacks, fraudulent…

Knownsec404 medium EN 2024 Dark Internet Service Providers Bulletproof hosting
NATO to launch new cyber center by 2028: Official https://breakingdefense.com/2024/12/nato-to-launch-new-cyber-center-by-2028-official/
11/12/2024 11:05:55
QRCode
archive.org
thumbnail

The center, called the NATO Integrated Cyber Defense Center, will have multiple locations, but will be headquartered in Mons, Belgium.

breakingdefense.com EN 2024 NATO Integrated-Cyber-Defense-Center Belgium
Publicités insérées entre les courriels : sanction de 50 millions d’euros à l’encontre de la société ORANGE https://www.cnil.fr/fr/publicites-inserees-entre-les-courriels-sanction-de-50-millions-deuros-orange
11/12/2024 11:05:27
QRCode
archive.org

Le contexte ORANGE met à disposition de ses clients un service de messagerie électronique (« Mail Orange »). À la suite de plusieurs contrôles, la CNIL a constaté que la société affichait, entre les courriels présents au sein des boîtes de réception des utilisateurs, des annonces publicitaires prenant la forme de courriels.

CNIL FR 2024 ORANGE MailOrange Publicités sanction France
'Operation Digital Eye' Attack Targets European IT Orgs https://www.darkreading.com/cyberattacks-data-breaches/operation-digital-eye-attack-targets-european-it-orgs
10/12/2024 12:16:03
QRCode
archive.org
thumbnail

A Chinese threat actor infiltrated several IT and security companies in a bring-your-own VS code, with an eye to carrying out a supply-chain-based espionage attack.

darkreading EN 2024 Cyberattacks Data-Breaches Application-Security bring-your-own VS code EU
Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/
10/12/2024 10:31:54
QRCode
archive.org
thumbnail

In this article, I explained how I could compromise the sysupgrade.openwrt.org service by exploiting the command injection and the SHA-256 collision.
As I never found the hash collision attack in a real-world application, I was surprised that I could successfully exploit it by brute-forcing hashes.

flatt.tech EN 2024 Hash-collision OpenWrt Command-injection SHA-256 Supply-chain
Fraudulent shopping sites tied to cybercrime marketplace taken offline https://www.europol.europa.eu/media-press/newsroom/news/fraudulent-shopping-sites-tied-to-cybercrime-marketplace-taken-offline
10/12/2024 09:00:53
QRCode
archive.org
thumbnail

The investigation began in the autumn of 2022, following reports of fraudulent phone calls in which scammers impersonated bank employees to extract sensitive information, such as addresses and security answers, from victims. The stolen data was traced back to a specialised online marketplace that operated as a central hub for the trade of illegally obtained information.A central hub for cyber...

europol EN 2024 Fraudulent shopping marketplace MansonMarket
On These Apps, the Dark Promise of Mothers Sexually Abusing Children https://www.nytimes.com/2024/12/07/us/child-abuse-apple-google-apps.html
09/12/2024 20:49:11
QRCode
archive.org

Smartphone apps downloaded from Apple and Google can allow parents and other abusers to connect with pedophiles who pay to watch — and direct — criminal behavior.

nytimes EN 2024 investigation BigoLive abuse stream child Apps Apple Google pedophiles criminal
What a new threat report says about Mac malware in 2024 https://appleinsider.com/articles/24/12/04/what-a-new-threat-report-says-about-mac-malware-in-2024
09/12/2024 14:02:09
QRCode
archive.org
thumbnail

Apple's macOS has been under siege in 2024 as malware-as-a-service platforms and AI-driven threats make the year a turning point for Mac security.

appleinsider EN 2024 Apple macOS AI-driven Mac security malware-as-a-service
Moonlock's 2024 macOS threat report https://moonlock.com/moonlock-2024-macos-threat-report
09/12/2024 14:00:04
QRCode
archive.org
thumbnail

A deep dive into macOS malware this year.

moonlock EN 2024 macOS malware report
Why Phishers Love New TLDs Like .shop, .top and .xyz https://krebsonsecurity.com/2024/12/why-phishers-love-new-tlds-like-shop-top-and-xyz/
09/12/2024 13:54:53
QRCode
archive.org

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) -- such as .shop, .top, .xyz -- that attract scammers with rock-bottom…

krebsonsecurity EN 2024 TLDs Phishing scammers
Zero-Day: How Attackers Use Corrupted Files to Bypass Detection https://any.run/cybersecurity-blog/corrupted-files-attack/
09/12/2024 12:13:02
QRCode
archive.org
thumbnail

See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.

any.run EN 2024 Corrupted Files Bypass Detection Analysis
Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asia https://www.cyfirma.com/research/unidentified-threat-actor-utilizes-android-malware-to-target-high-value-assets-in-south-asia/
09/12/2024 11:43:26
QRCode
archive.org
thumbnail

The team at CYFIRMA analyzed a malicious Android sample designed to target high-value assets in Southern Asia. This sample, attributed to an unknown threat actor, was generated using the Spynote Remote Administration Tool. While the specifics of the targeted asset remain confidential, it is likely that such a target would attract the interest of APT groups. However, we are restricted from disclosing further details about the actual target and its specific region. For a comprehensive analysis, please refer to the detailed report

cyfirma EN 2024 Unidentified Threat Actor Malware research Android Spynote Remote Administration Tool
Log In POLITICO Pro Home Latest news Romanian elections War in Ukraine French political crisis Newsletters Podcasts Poll of Polls Policy news Events News Politics Hungarian CIA reportedly spied on EU officials https://www.politico.eu/article/hungary-viktor-orban-cia-spy-wiretap-hack-laptop-eu-officials-information-office-budapest-olaf/
09/12/2024 11:33:39
QRCode
archive.org
thumbnail

Officials from EU anti-fraud office were allegedly followed, wiretapped and had their laptops hacked by Hungary’s intelligence agency.

politico EN 2024 Espionage European-politics Hungarian-politics Hungary Intelligence Law-enforcement MEPs Spying Spyware Viktor-Orbán
page 6 / 76
4508 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio