Quotidien Hebdomadaire Mensuel

Hebdomadaire Shaarli

Tous les liens d'un semaine sur une page.

Semaine 01 (January 1, 2024)

ALPHV Ransomware Claims Cyberattack on US Firm Ultra Intelligence and Communications

Russian-speaking BlackCat/ALPHV ransomware group has claimed to have carried out a cyberattack on Ultra Intelligence and Communications, a US-based company

L’UDC Andreas Glarner contraint de payer les frais de justice occasionnés par son «deepfake» de Sibel Arslan

Avant les élections fédérales, le conseiller national argovien avait publié sur les réseaux sociaux une vidéo générée par intelligence artificielle qui montrait l’élue verte appelant à voter pour lui. Saisie par l’écologiste bâloise, la justice donne raison à cette dernière

Du nouveau dans la (l'in) sécurité de l'Internet ?

Le 3 janvier 2024, une partie du trafic IP à destination de la filiale espagnole d'Orange n'a pas été transmis, en raison d'un problème BGP, le système dont dépend tout l'Internet. Une nouveauté, par rapport aux nombreux autres cas BGP du passé, est qu'il semble que le problème vienne du piratage d'un compte utilisé par Orange. Quelles leçons tirer de cette apparente nouveauté ?

Three New Malicious PyPI Packages Deploy CoinMiner on Linux Devices | FortiGuard Labs

FortiGuard Labs cover the attack phases of three new PyPI packages that bear a resemblance to the culturestreak PyPI package discovered earlier this year. Learn more.

Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords

Sometimes, making particular security design decisions can have unexpected consequences. For security-critical software, such as password managers, this can easily lead to catastrophic failure: In this blog post, we show how Bitwarden’s Windows Hello …

Analyzing DPRK's SpectralBlur

In both his twitter (err, X) thread and in a subsequent posting he provided a comprehensive background and triage of the malware dubbed SpectralBlur. In terms of its capabilities he noted:

SpectralBlur is a moderately capable backdoor, that can upload/download files, run a shell, update its configuration, delete files, hibernate or sleep, based on commands issued from the C2. -Greg
He also pointed out similarities to/overlaps with the DPRK malware known as KandyKorn (that we covered in our “Mac Malware of 2024” report), while also pointing out there was differences, leading him to conclude:

We can see some similarities ... to the KandyKorn. But these feel like families developed by different folks with the same sort of requirements. -Greg

Canton de Berne: Suite à une faille de sécurité dans un système informatique: plusieurs personnes prévenues identifiées et perquisitions effectuées

Suite à une faille de sécurité, l’été dernier, dans l’application «MobileIron», également utilisée par la Police cantonale bernoise, des données d’utilisatrices et d’utilisateurs avaient manifestement pu être téléchargées et consultées. Une enquête a permis d’identifier plusieurs personnes prévenues. De plus amples investigations sont en cours.

Ivanti warns critical EPM bug lets hackers hijack enrolled devices

Ivanti fixed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers hijack enrolled devices or the core server.

Weak password and infostealer blamed for Orange Spain outage

No 2FA or special characters to prevent database takeover and BGP hijack

Hackers hijack govt and business accounts on X for crypto scams

Hackers are increasingly targeting verified accounts on X (formerly Twitter) belonging to government and business profiles and marked with 'gold' and 'grey' checkmarks to promote cryptocurrency scams, phishing sites, and sites with crypto drainers.

Exclusive: Russian hackers were inside Ukraine telecoms giant for months

Russian hackers were inside Ukrainian telecoms giant Kyivstar's system from at least May last year in a cyberattack that should serve as a "big warning" to the West, Ukraine's cyber spy chief told Reuters.

The hack, one of the most dramatic since Russia's full-scale invasion nearly two years ago, knocked out services provided by Ukraine's biggest telecoms operator for some 24 million users for days from Dec. 12.

Hacker hijacks Orange Spain RIPE account to cause BGP havoc

Orange Spain suffered an internet outage today after a hacker breached the company's RIPE account to misconfigure BGP routing and an RPKI configuration.

The State of Ransomware in the U.S.: Report and Statistics 2023

The U.S. was bombarded by financially-motivated ransomware attacks throughout 2023. This report looks at the numbers, the costs and the solution.

Qualcomm chip vulnerability enables remote attack by voice call

The critical bug that could lead to a remote attack via voice call is one of 26 vulnerabilities affecting hundreds of Qualcomm chipsets.

Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop

The Cactus ransomware group claims to have hacked Coop, one of the largest retail and grocery providers in Sweden.

The biggest cybersecurity and cyberattack stories of 2023

2023 was a big year for cybersecurity, with significant cyberattacks, data breaches, new threat groups emerging, and, of course, zero-day vulnerabilities.

La ville de Nyon se cherche un SOC

Un centre opérationnel de sécurité (SOC) est essentiel pour la surveillance continue des cybermenaces et être en mesure de répondre rapidement à un incident. La ville de Nyon a lancé

Porsche To Kill ICE-Powered Macan In Europe Over Cybersecurity Laws | Carscoops

Porsche's best-selling model will be discontinued from markets within the European Union in spring of 2024

smith (CVE-2023-32434)

This write-up presents an exploit for a vulnerability in the XNU kernel:

  • Assigned CVE-2023-32434.

  • Fixed in iOS 16.5.1 and macOS 13.4.1.

  • Reachable from the WebContent sandbox and might have been actively exploited.
    *Note that this CVE fixed multiple integer overflows, so it is unclear whether or not the integer overflow used in my exploit was also used in-the-wild. Moreover, if it was, it might not have been exploited in the same way.
    The exploit has been successfully tested on:

  • iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max)

  • macOS 13.1 and 13.4 (MacBook Air M2 2022)

  • All code snippets shown below are from xnu-8792.81.2.

D-Link D-View 8 Unauthenticated Probe-Core Server Communication

A security issue exists in D-Link D-View 8 v2.0.2.89 and prior that could allow an attacker to manipulate the probe inventory of the D-View service. This could result in the disclosure of info

Downfall - A Slay the Spire Fan Expansion :: Downfall (Steam Standalone) was Breached. Please read.

UPDATE 12/29 - While there is no new alerts regarding the Steam product or risk of downloads, the Discord account remains compromised. I have reports that the account is trying to DM people and either send malware to them impersonating themselves as a developer, or trying to gain sensitive information. Do not engage with this account and absolutely do not click on any links sent.

Serbia Stays Silent About Alleged Ransomware Attack on EPS

Authorities have declined to comment on the reported ransomware attack ten days on Serbia's public energy company EPS.

Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania

Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania, a government agency reported.

CVE-2023-46747 : Unauthenticated Remote Code Execution in F5 BIG-IP - Malware Analysis - Malware Analysis, News and Indicators

On 26th October, 2023 F5 released a security advisory about a critical unauthenticated remote code execution vulnerability, CVE-2023-46747, in F5’s BIG-IP configuration utility. This vulnerability could allow unauthent…

After ransomware claims, Xerox says subsidiary hit with cyberattack

The printing and business services giant said its XBS division "experienced a security incident." A cybercrime gang called INC said it was responsible.

Hackers Attack UK's Nuclear Waste Services Through LinkedIn

Fortunately for Radioactive Waste Management (RWM), the first-of-its-kind hacker attack on the project was unsuccessful.

Victoria Courts Confront Unprecedented Ransomware Assault on AV Technology Network

Victoria's court system fell victim to a ransomware attack allegedly orchestrated by the Qilin ransomware gang. The Victoria court ransomware

Objective-See's Blog

A comprehensive analysis of the year's new malware

Adaptation des ordonnances sur la surveillance des télécommunications pour suivre l'évolution technologique

Trois ordonnances d’exécution de la loi fédérale sur la surveillance de la correspondance par poste et télécommunication (LSCPT) sont modifiées pour répondre à l’évolution technologique, et notamment à l’arrivée de la 5G. Elles entreront en vigueur le 1er janvier 2024. L’objectif est d’éviter des lacunes dans la surveillance des télécommunications, de permettre une détermination plus précise de la position et de continuer de garantir l’efficacité de la poursuite pénale.

Les autorités suisses disposeront de moyens renforcés | blue News

Les autorités suisses disposeront dès le 1er janvier de moyens élargis pour surveiller les données issues d'internet et de la téléphonie mobile. Elles pourront notamment plus facilement identifier qui se cache derrière un numéro usurpé ou inconnu.

A New Kind of AI Copy Can Fully Replicate Famous People. The Law Is Powerless.

New AI-generated digital replicas of real experts expose an unnerving policy gray zone. Washington wants to fix it, but it’s not clear how.

2023, une année riche en vulnérabilités critiques

L’exploitation de vulnérabilités critiques revient en force sur le devant de la scène pour l’établissement d’un accès initial et le lancement de cyberattaques. Elles étaient nombreuses l'an dernier.

Cyberattaques : 2023, année noire pour les ESN

L’année qui s’achève a vu de nombreuses entreprises de services numériques frappées par des cyberattaques, en France et au-delà. Avec à chaque fois, un nombre conséquent d’organisations affectées indirectement.