Quotidien Hebdomadaire Mensuel

Quotidien Shaarli

Tous les liens d'un jour sur une page.

March 3, 2024

Popular video doorbells can be easily hijacked, researchers find

Walmart and Temu pulled the affected doorbell cameras from their stores. Amazon and others have taken no action.

8,000+ Domains of Trusted Brands Hijacked for Massive Spam Operation

Over 8,000 subdomains belonging to recognized brands and organizations are being exploited for malicious email distribution.

Russian hackers hijack Ubiquiti routers to launch stealthy attacks

Russian APT28 military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory issued with the NSA, the U.S. Cyber Command, and international partners.
#APT28 #Computer #FBI #InfoSec #Router #Russia #Security #Ubiquiti

FBI’s LockBit Takedown Postponed a Ticking Time Bomb in Fulton County, Ga. – Krebs on Security

The FBI’s takedown of the LockBit ransomware group last week came as LockBit was preparing to release sensitive data stolen from government computer systems in Fulton County, Ga. But LockBit is now regrouping, and the gang says it will publish the stolen Fulton County data on March 2 unless paid a ransom. LockBit claims the cache includes documents tied to the county’s ongoing criminal prosecution of former President Trump, but court watchers say teaser documents published by the crime gang suggest a total leak of the Fulton County data could put lives at risk and jeopardize a number of other criminal trials

LoanDepot Ransomware Attack Exposed 16.9 Million Individuals - SecurityWeek

Lending firm LoanDepot said the personal information of 16.9 million individuals was stolen in a ransomware attack in early January 2024.

US prescription market hamstrung for 9 days (so far) by ransomware attack | Ars Technica

Patients having trouble getting lifesaving meds have the AlphV crime group to thank.

Mail in the middle – a tool to automate spear phishing campaigns

The idea is simple; take advantage of the typos that people make when they enter email addresses. If we positioned ourselves in between the sender of an email (be it a person or a system) and the legitimate recipient, we may be able to capture plenty of information about the business, including personally identifiable information, email verification processes, etc. This scenario is effectively a Person-in-the-Middle (PiTM), but for email communications.