Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

New MOVEit Bug Actively Exploited Within Hours of Public Disclosure

A high-severity security flaw in Progress Software's MOVEit Transfer platform is being exploited in the wild just hours after its disclosure. This vulnerability, identified as CVE-2024-5806, allows attackers to bypass authentication mechanisms and pose as any valid user, thereby gaining access to sensitive files.

Chinese APT Groups Use Ransomware for Espionage and Diversion

Cyberespionage groups are increasingly using ransomware not just for financial gain but also as a tactic to complicate attack attribution, distract defenders, or serve as a secondary objective to data theft. A recent report highlights the activities of ChamelGang, a suspected Chinese advanced persistent threat (APT) group, which uses the CatB ransomware strain to target high-profile organizations globally.

Levi's Suffers Credential Stuffing Attack: Steps to Secure Your Online Identity

In a recent cybersecurity incident, tens of thousands of Levi's customers had their accounts compromised following a credential stuffing attack. According to a notice published on the Maine Office of the Attorney General's website, 72,231 individuals were potentially impacted by the breach on June 13. Incident Details On June 13, Levi's detected unusual activity on their website, indicating a credential stuffing attack.

Rising Trend of Ransomware Attacks in Healthcare: Complications from Supply Chain Attacks in Healthcare

Incident Overview In a significant breach of healthcare data security, the Qilin ransomware gang has leaked 400GB of NHS and patient data on Telegram. The group, identified as the Qilin ransomware gang, claimed responsibility for the exfiltration and demanded a $50 million ransom, threatening to release the data if their demands were not met. Following failed negotiations, the gang followed through on their threat and made the entire dataset public.

Comprehensive Digital Risk Defense: Dark Web Monitoring | Cyber Threat Intelligence | Digital Risk Protection

Many people mistakenly believe that the dark web is an obscure corner of the internet that doesn't affect them, but the reality is far more concerning. Dark web monitoring is crucial for identifying potential threats that can jeopardize personal and organizational security. From stolen data and illegal goods to sophisticated cyber threats like ransomware and phishing attacks, the dark web is a breeding ground for malicious activities.

Emerging Rust Malware Uses PowerShell to Evade UAC and Steal Data

A new Rust-based information-stealing malware named Fickle Stealer has been identified, using multiple attack vectors to compromise systems and extract sensitive information. According to Fortinet FortiGuard Labs, Fickle Stealer is being distributed through four different methods: VBA dropper, VBA downloader, link downloader, and executable downloader. Some of these methods employ a PowerShell script to bypass User Account Control (UAC) and execute the malware.

Critical Mailcow Vulnerabilities: Safeguard Your Servers from Remote Code Execution

Mailcow Mail Server Vulnerabilities Expose Servers to Remote Code Execution Recently, two significant security vulnerabilities have been uncovered in the Mailcow open-source mail server suite. These vulnerabilities, which affect all versions prior to 2024-04, were disclosed by SonarSource on March 22, 2024, and could allow malicious actors to execute arbitrary code on vulnerable Mailcow instances. Understanding the Vulnerabilities.

Securing Docker Containers Against Commando Cat Attacks: Best Practices for Enhanced Cybersecurity

Cybersecurity researchers have uncovered a malicious Python package in the Python Package Index (PyPI) repository designed to distribute an information stealer known as Lumma (aka LummaC2). The counterfeit package, crytic-compilers, mimics the legitimate crytic-compile library through typosquatting tactics. Before its removal by PyPI maintainers, the counterfeit package was downloaded 441 times. Impersonation and Deception Tactics.

Beyond Detection: The Rise of Legitimate Software Abuse in Malware Attacks

Cybersecurity researchers have identified an increasing trend where threat actors are abusing legitimate and commercially available packer software, such as BoxedApp, to evade detection and distribute malware, including remote access trojans and information stealers. Targeted Industries and Geographical Spread According to Check Point security researcher Jiri Vinopal, the majority of malicious samples have targeted financial institutions and government sectors.

The AMD Data Breach: Cyber Threats and Dark Web Activity

Recently, our team at Foresiet Threat Intelligence detected a significant data breach affecting AMD, a prominent computing company. This breach, orchestrated by the renowned dark web threat actor IntelBroker. The breach, uncovered by the Foresight Threat Intelligence Team, revealed a vast array of compromised data, including details on future products, spec sheets, employee and customer databases, property files, ROMs, source code, firmware, and financial records. The Dark Web Connection.

FBI Recovers 7,000 LockBit Decryption Keys, Urges Ransomware Victims to Come Forward

The FBI has made a significant breakthrough in the fight against LockBit ransomware by recovering over 7,000 decryption keys, which can now be used by victims to restore their encrypted data at no cost. FBI's Efforts Against LockBit Ransomware During the 2024 Boston Conference on Cyber Security, FBI Cyber Division Assistant Director Bryan Vorndran announced the recovery of these keys, emphasizing the agency's commitment to assisting past LockBit victims.

Snowflake Data Breach: 165 Customers' Information Exposed in Ongoing Extortion Campaign

Recent reports reveal that up to 165 customers of Snowflake, a prominent cloud data warehousing platform, have fallen victim to a sophisticated data breach and extortion campaign. This ongoing operation, identified by cybersecurity firm Mandiant as UNC5537, underscores broader implications for cybersecurity practices in cloud environments. Understanding the UNC5537 Campaign.

VMware ESXi Systems with Admin Rights Targeted by New Mallox Ransomware Variant

Novel Attack Vector Uses Custom Shell for Payload Delivery and Execution A fresh variant of the Mallox ransomware has emerged, specifically targeting VMware ESXi environments with administrative privileges. This advanced attack method, discovered by researchers at Trend Micro, demonstrates the evolving sophistication of ransomware tactics. Mallox Ransomware: An Overview Mallox, also known as Fargo and Tohnichi, first emerged in June 2021.

Securing Docker Containers: Strategies to Prevent Commando Cat Attacks

Cybercriminals have been exploiting misconfigured Docker containers to deploy cryptocurrency mining software, and a particularly aggressive campaign dubbed "Commando Cat" has been at the forefront since early this year. This trend highlights the growing threat of cryptojacking through container misconfigurations. How Cybercriminals Exploit Docker Containers Containers have revolutionized how organizations deploy and manage applications, but they have also provided new opportunities for cyberattackers.

Heightened Exploit Attempts on Check Point's Recent VPN Zero-Day Vulnerability

A significant surge in exploitation attempts targeting a newly disclosed information disclosure flaw in Check Point's VPN technology has been observed recently. This has underscored the urgent need for organizations to address the vulnerability immediately.

Security Flaws Discovered in Popular WooCommerce Plugin

Patchstack has recently identified multiple security vulnerabilities in the WooCommerce Amazon Affiliates (WZone) plugin. Created by AA-Team, this widely-used premium WordPress plugin has garnered significant popularity, amassing over 35,000 sales. It serves as a crucial asset for website owners and bloggers aiming to monetize their sites through the Amazon affiliate program.

Expanding Cyber Threats: Sticky Werewolf Targets Russia and Belarus

The cyber threat landscape is constantly evolving, with new threat actors emerging and expanding their targets. Cybersecurity researchers have recently revealed information about a threat actor named Sticky Werewolf, who has been associated with cyber attacks on organizations in Russia and Belarus. This development highlights the critical need for robust cybersecurity measures, including stolen credentials detection, darknet monitoring services, and dark web surveillance.

Massive Data Leak Targets New York Times: Implications and Cybersecurity Insights

In a startling cybersecurity development, an anonymous threat actor has posted what they claim to be 270GB of source code stolen from the New York Times on a popular imageboard website. This incident, reported on Friday, suggests the leak contains "basically all source code" from the publisher.

Surge in CatDDoS Attacks: Exploiting Vulnerabilities to Spread Mirai Variant

The cybersecurity landscape has recently been shaken by a surge in activity involving a Mirai distributed denial-of-service (DDoS) botnet variant known as CatDDoS. Over the past three months, threat actors have aggressively exploited more than 80 vulnerabilities to spread this malware. In this blog, we explore the recent CatDDoS attacks, the targeted sectors, and the implications for cybersecurity practices.

Emerging Threat: Attackers Target Check Point VPNs to Breach Corporate Networks

In the ever-evolving landscape of cybersecurity, the tools designed to protect us can sometimes become our greatest vulnerabilities. This paradox is becoming evident as attackers increasingly target Check Point VPNs, exploiting them to gain initial access to corporate networks. Recent findings highlight a growing trend where cybercriminals are leveraging vulnerabilities in remote access VPNs, posing a significant risk to organizational security.

First American Data Breach in December Impacts 44,000 Individuals

In an alarming revelation, First American Financial Corporation, the second-largest title insurance company in the United States, disclosed that a cyberattack in December resulted in a significant data breach affecting 44,000 people. This incident underscores the importance of robust cybersecurity measures and services such as phishing takedown, online risk evaluation, stolen credentials detection, and darknet monitoring.

New Phishing Tactics: Cloudflare Workers, HTML Smuggling, and GenAI

Cybersecurity researchers are ringing the alarm on new phishing campaigns exploiting Cloudflare Workers, HTML smuggling, and generative AI (GenAI) to target user credentials. These innovative techniques highlight the sophisticated strategies cybercriminals are deploying to bypass security measures and harvest sensitive information.

Enterprise Risk Management Failures: Insights from the Cencora Breach

In a significant cybersecurity incident, Cencora, a leading pharmaceutical services provider, experienced a data breach in February 2024, exposing sensitive patient information from 11 major pharmaceutical companies. This breach underscores the critical importance of robust enterprise risk management, vulnerability management, and endpoint security in protecting sensitive data and managing online reputation.

Live Nation/Ticketmaster Data Breach: Insights and Implications

On May 20th, 2024, Live Nation, the parent company of Ticketmaster, uncovered "unauthorized activity" within one of its cloud databases. This breach was swiftly followed by the hacker named called ShinyHunters claiming responsibility. The repercussions of this incident are vast, impacting millions of users and revealing significant vulnerabilities in the security infrastructure of one of the world's largest entertainment companies.

Hackers Phish Finance Organizations Using Trojanized Minesweeper Clone

In a concerning development, hackers are leveraging a Python clone of Microsoft’s iconic Minesweeper game to target financial organizations across Europe and the United States. This novel approach involves concealing malicious scripts within the game code, posing a significant challenge to enterprise risk management and endpoint security. As organizations grapple with these evolving threats, Foresiet remains steadfast in its commitment to providing cutting-edge cybersecurity solutions.