Quotidien Hebdomadaire Mensuel

Hebdomadaire Shaarli

Tous les liens d'un semaine sur une page.

Semaine 04 (January 23, 2023)

A Major App Flaw Exposed the Data of Millions of Indian Students

A mandatory app exposed the personal information of students and teachers across the country for over a year.

Chinese PlugX Malware Hidden in Your USB Devices?

PlugX remains an active threat. A newly discovered variant infects USB devices and a similar variant makes copies of PDF and Microsoft Word files.

An unfaithful employee leaked Yandex source code repositoriesSecurity Affairs

A source code repository allegedly stolen by a former employee of the Russian tech giant Yandex has been leaked online. A Yandex source code repository allegedly stolen by a former employee of the Russian IT giant has been leaked on a popular cybercrime forum. The announcement published on BreachForums includes a magnet link to the alleged […]

Cybercriminals stung as HIVE infrastructure shut down

In the last year, HIVE ransomware has been identified as a major threat as it has been used to compromise and encrypt the data and computer systems of large IT and oil multinationals in the EU and the USA. Since June 2021, over 1 500 companies from over 80 countries worldwide have fallen victim to HIVE associates and lost almost...

The Titan Stealer: Notorious Telegram Malware Campaign

The Uptycs threat research team discovered a Titan stealer malware campaign, which is marketed and sold by a threat actor (TA) through a Telegram channel.

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats

We observed a recent spate of supply chain attacks attempting to exploit CVE-2021-35394, affecting IoT devices with chipsets made by Realtek.

La vidéosurveillance de l’armée présente des failles de sécurité

Un audit interne révèle que les appareils qui surveillent les places d’armes ou les centres logistiques sont mal protégés

Suisse: Caméras de surveillance de l’armée jugées trop vulnérables

Obsolètes, des caméras sont des «proies faciles pour les pirates», conclut un audit interne qui affirme que l’armée néglige sa sécurité informatique.

Apple patches are out – old iPhones get an old zero-day fix at last!

Don’t delay, especially if you’re still running an iOS 12 device… please do it today!

Following the LNK metadata trail

While tracking some prevalent commodity malware threat actors, Talos observed the popularization of malicious LNK files as their initial access method to download and execute payloads. A closer look at the LNK files illustrates how their metadata could be used to identify and track new campaigns.

Threat groups are using Windows LNK files to gain access

Microsoft's move last year to block macros by default in Office applications is forcing miscreants to find other tools with which to launch cyberattacks, including the software vendor's LNK files – the shortcuts Windows uses to point to other files.

Bitzlato: senior management arrested

Almost half of all Bitzlato transactions linked to criminal activities Targeting crucial crime facilitators such as crypto exchanges is becoming a key priority in the battle against cybercrime. Bitzlato allowed the rapid conversion of various crypto-assets such as bitcoin, ethereum, litecoin, bitcoin cash, dash, dogecoin and USDT into Russian roubles. It is estimated that the crypto exchange platform has received...

how to completely own an airline in 3 easy steps

and grab the TSA nofly list along the way

U.S. ‘No Fly List’ Leaks After Being Left in an Unsecured Airline Server

The list, which was discovered by a Swiss hacker, contains names and birth dates and over 1 million entries.

Hostile Takeover: Kraken Hacks Rival Darknet Market Solaris

Since Hydra Market Got Shuttered by Police, Russian Rivals Battle for Market Share.
Competition between Russian-language darknet markets remains fierce following the takedown of market leader Hydra last April by a multinational law enforcement operation.

Darth Vidar: The Dark Side of Evolving Threat Infrastructure

Summary Three key takeaways from our analysis of Vidar infrastructure: Russian VPN gateways are potentially providing anonymity for Vidar operators / customers, making it more challenging for analysts to have a complete overview of this threat. These gateways now appear to be migrating to Tor. Vidar operators appear to be expanding their infrastructure, so analysts need to keep them in their sights. We expect a new wave of customers and as a result, an increase of campaigns in the upcoming weeks

Risky Biz News: Crypto-crime volumes went down in 2022, ransomware payments too

Crypto-crime volumes went down in 2022, ransomware payments too
In other news: Riot Games cancels game updates after hack; T-Mobile discloses eighth breach since 2018; APT group deploys DNS changer on victims' routers.