Richard Giddey

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

As many as five different malware families were deployed by suspected nation-state actors as part of post-exploitation activities leveraging two zero-day vulnerabilities in Ivanti Connect Secure (ICS) VPN appliances since early December 2023. “These families allow the threat actors to circumvent authentication and provide backdoor access to these devices,” Mandiant said in an analysis published […]

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families Read More »

Akira ransomware attackers are wiping NAS and tape backups - Help Net Security

Akira ransomware attackers are wiping NAS and tape backups – Help Net Security

Akira ransomware attackers are wiping NAS and tape backups “The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end of the year,” the Finnish National Cybersecurity Center (NCSC-FI) has shared on Wednesday. NCSC-FI has received 12 reports of Akira ransomware hitting Finnish organizations in 2023,

Akira ransomware attackers are wiping NAS and tape backups – Help Net Security Read More »

There is a Ransomware Armageddon Coming for Us All

There is a Ransomware Armageddon Coming for Us All

Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation MFA devices can stop The least surprising headline from 2023 is that ransomware again set new records for a number of incidents and the damage inflicted. We saw new headlines every week, which included a who’s-who of big-name organizations. If MGM, Johnson

There is a Ransomware Armageddon Coming for Us All Read More »

Threat Actors Increasingly Abusing GitHub for Malicious Purposes

Threat Actors Increasingly Abusing GitHub for Malicious Purposes

The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat actors to host and deliver malicious payloads and act as dead drop resolvers, command-and-control, and data exfiltration points. “Using GitHub services for malicious infrastructure allows adversaries to blend in with legitimate network traffic, often bypassing traditional security defenses

Threat Actors Increasingly Abusing GitHub for Malicious Purposes Read More »

New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms

New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms

A new Python-based hacking tool called FBot has been uncovered targeting web servers, cloud services, content management systems (CMS), and SaaS platforms such as Amazon Web Services (AWS), Microsoft 365, PayPal, Sendgrid, and Twilio. “Key features include credential harvesting for spamming attacks, AWS account hijacking tools, and functions to enable attacks against PayPal and various

New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms Read More »

Microsoft Disables App Installer After Feature is Abused for Malware

Microsoft Disables App Installer After Feature is Abused for Malware

Microsoft has disabled the App Installer feature to protect users and prevent threat actors from maliciously exploiting its products and features. The ms-appinstaller URI scheme, which allows users to download and install apps directly from websites using the MSIX package installer, is being abused in malicious activities, reports Microsoft Threat Intelligence. Researchers found that ‘financially

Microsoft Disables App Installer After Feature is Abused for Malware Read More »

China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks

China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks

The individuals confessed to creating variations of ransomware, enhancing the software through the utilization of OpenAI’s ChatGPT, carrying out vulnerability scans, infiltrating networks to secure access, deploying ransomware, and engaging in extortion. Chinese media has reported the country’s first major step towards countering the use of ChatGPT as four Chinese individuals have been arrested for

China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks Read More »

Cyber-hackers target UK nuclear waste company RWM

Cyber-hackers target UK nuclear waste company RWM

Cyber-hackers have targeted the company behind a £50bn project to build a vast underground nuclear waste store in Britain, its developer has said. Radioactive Waste Management, the company behind the Geological Disposal Facility (GDF) project, has said that hackers unsuccessfully attempted to breach the business using LinkedIn. RWM is the government-owned entity behind a trio

Cyber-hackers target UK nuclear waste company RWM Read More »

Malware Leveraging Google Cookie Exploit via OAuth2 Functionality

Malware Leveraging Google Cookie Exploit via OAuth2 Functionality

Among others, developers of the infamous Lumma, an infostealer malware, are already using the exploit by employing advanced tactics like token manipulation and encryption in targeted attacks. CloudSEK’s threat research team has reported a critical exploit affecting Google services, allowing threat actors to generate Google cookies continuously while ensuring continuous access to Google services even

Malware Leveraging Google Cookie Exploit via OAuth2 Functionality Read More »

5 pivotal cybersecurity trends for 2024 - Help Net Security

5 pivotal cybersecurity trends for 2024 – Help Net Security

5 pivotal cybersecurity trends for 2024 In 2023, cyberattacks surged both in terms of frequency and sophistication. The proliferation of cutting-edge hacking tools and technologies – now more accessible than ever thanks to advances in generative AI – created an environment conducive for cyber threats to flourish, forcing organizations to adopt proactive measures to keep

5 pivotal cybersecurity trends for 2024 – Help Net Security Read More »

Scroll to Top