InfoSec News 20240308

  • Publicado: Sex, 08/03/2024 - 12:21

Top News


  • Analysis-UnitedHealth hack could take months for full recovery

"UnitedHealth Group, the largest U.S. health insurer, is likely to need several months to make a full recovery from a cyberattack that has been one of the most disruptive hacks against America’s healthcare infrastructure, security experts said."

Link

TLP1 : Green

  • CYBER CRIMEEuropol-Led Crackdown On Child Sexual Abuse Material in Europe: 57 Arrested, Over 100,000 Illegal Files Seized

"Combatting child sexual abuse, 57 men have been arrested across Europe for possessing and distributing illicit material, with numerous children being protected from further harm. This operation, stemming from specialized training under the EMPACT (European Multidisciplinary Platform Against Criminal Threats) framework, marks a pivotal moment in international law enforcement efforts against child exploitation."

Link

TLP1 : Green

  • US court orders forfeiture of 145 crypto accounts tied to North Korea cybercrime

"Washington alleges two Chinese nationals used accounts to launder some $100M in virtual assets stolen by DPRK"

Link

TLP1 : Green

Cybersecurity State: Surveillance, Cyberwarfare, Cybercriminality and Hacktivism


  • Chinese hacking industry linked to the state through connections, alcohol, and sex, leak reveals

"China’s hackers-for-hire take government officials out for lavish banquets, binge drinking and late-night karaoke with young women in a bid to win favor and business, as revealed in a highly unusual leak last month of internal documents from a private contractor linked to Chinese police."

Link

TLP1 : Green

  • Crypto Ransomware & Tornado Cash Emerge as Standouts in Cybercrime: Chainalysis

"According to the latest comprehensive analysis by Chainalysis, a leader in blockchain analytics, ransomware payments have astonishingly exceeded the $1 billion threshold, underlining a significant escalation in the prevalence of these cyberattacks."

Link

TLP1 : Green

  • AG’s Cyber Crime Unit arrests Gonzales man for possession of child pornography

"Goodwin was arrested for: LA R.S. 14:81.1 Possession of Pornography Involving Juveniles Under the Age of Thirteen; two hundred and forty-seven (247) counts.
Agents initially got a tip from the National Center for Missing and Exploited Children (NCMEC), which led to Goodwin’s arrest.
This arrest was a result of a joint investigation with General Murrill’s Cyber Crime Unit, U.S. Homeland Security Investigations, and Ascension Parish Sheriff’s Office."

Link

TLP1 : Green

Breaches: Data Breaches and Hacks


  • Jersey data breach leaks personal information

"A data breach at Jersey's Financial Services Commission has allowed access to non-public names and addresses."

Link

TLP1 : Green

Vulnerabilities: Vulnerability Advisories, Zero-Days,Patches and Exploits


  • Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

"Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that of a targeted user."

Link

TLP1 : Green

  • QEMU Emulator Exploited as Tunneling Tool to Breach Company Network

"Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed "large company" to connect to their infrastructure."

Link

TLP1 : Green

Incident Response: Infrastructure, Training, SIEM and Incident Handling


  • Secrets Sensei: Conquering Secrets Management Challenges

"In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management — the foundational pillar upon which your security infrastructure rests. We're all familiar with the routine: safeguarding those API keys, connection strings, and certificates is non-negotiable. However, let's dispense with the pleasantries; this isn't a simple 'set it and forget it' scenario. It's about guarding your secrets in an age where threats morph as swiftly as technology itself."

Link

TLP1 : Green

Technical Articles: Forensics, Reverse Engineering, Malware, Phishing, Pentesting, Software Security and Cryptography


  • Mhf - Mobile Helper Framework - A Tool That Automates The Process Of Identifying The Framework/Technology Used To Create A Mobile Application

"Mobile Helper Framework is a tool that automates the process of identifying the framework/technology used to create a mobile application. Additionally, it assists in finding sensitive information or provides suggestions for working with the identified platform."

Link

TLP1 : Green

 

 

1Traffic Light Protocol (TLP) [1] for information sharing:

 

 

  • Red:Not for disclosure, restricted to participants only.
  • Amber: Limited disclosure, restricted to participants organizations.
  • Green: Limited disclosure, restricted to the community.

 


[1]https://www.first.org/tlp