InfoSec News 20240111

  • Publicado: Qui, 11/01/2024 - 14:13

Top News


  • Atomic Stealer Gets an Upgrade - Targeting Mac Users with Encrypted Payload

"Cybersecurity researchers have identified an updated version of a macOS information stealer called Atomic (or AMOS), indicating that the threat actors behind the malware are actively enhancing its capabilities."

Link

TLP1 : Green

  • Mandiant's X Account Was Hacked Using Brute-Force Attack

"The compromise of Mandiant's X (formerly Twitter) account last week was likely the result of a "brute-force password attack," attributing the hack to a drainer-as-a-service (DaaS) group."

Link

TLP1 : Green

  • NoaBot: Latest Mirai-Based Botnet Targeting SSH Servers for Crypto Mining

"A new Mirai-based botnet called NoaBot is being used by threat actors as part of a crypto mining campaign since the beginning of 2023."

Link

TLP1 : Green

Cybersecurity State: Surveillance, Cyberwarfare, Cybercriminality and Hacktivism


  • Suspected Chinese hackers target US research organization in latest spying spree
    Sean Lyngaas

"Suspected Chinese hackers used two previously undiscovered software flaws to break into a US-based research organization last month as part of a persistent spying campaign aimed at collecting intelligence in China’s interests, researchers said Wednesday."

Link

TLP1 : Green

  • ShinyHunters member gets three years for hacking spree

"Raoult, aka Sezyo Kaizen, played a crucial role in developing fake websites for the ShinyHunters group. He was ordered to return $5 million in criminal proceeds, reflecting the severity of the financial losses and personal damage caused by the hacking spree."

Link

TLP1 : Green

  • JPM24: Scripps Health strengthens digital fortifications with ex-FBI cybercrime lead

"Scripps Health’s 2021 cyberattack was a major blow to the San Diego-based system. Care disruptions resulting from the breach drove more than $100 million in lost revenues, triggered class-action payouts and even had a ripple effect on surrounding, unaffiliated healthcare facilities."

Link

TLP1 : Green

Breaches: Data Breaches and Hacks


  • UoW implements new cloud controls following data breach

"The University of Wollongong (UoW) has implemented new controls on its cloud-based systems, as part of its response to a December 2023 security breach."

Link

TLP1 : Green

Vulnerabilities: Vulnerability Advisories, Zero-Days,Patches and Exploits


  • Chinese Hackers Exploit Zero-Day Flaws in Ivanti Connect Secure and Policy Secure

"A pair of zero-day flaws identified in Ivanti Connect Secure (ICS) and Policy Secure have been chained by suspected China-linked nation-state actors to breach less than 10 customers."

Link

TLP1 : Green

  • Cisco Fixes High-Risk Vulnerability Impacting Unity Connection Software

"Cisco has released software updates to address a critical security flaw impacting Unity Connection that could permit an adversary to execute arbitrary commands on the underlying system."

Link

TLP1 : Green

Incident Response: Infrastructure, Training, SIEM and Incident Handling


  • The Incident Lifecycle: How a Culture of Resilience Can Help You Accomplish Your Goals

"Incidents prevent us from meeting our goals. Whatever your goal is – such as selling tickets to the Taylor Swift concert, getting people home for the holidays without delays, or shipping goods across the globe – incidents will happen. In my talk at QCon San Francisco 2023, I shared my insights."

Link

TLP1 : Green

Technical Articles: Forensics, Reverse Engineering, Malware, Phishing, Pentesting, Software Security and Cryptography


  • Bugsy - Command-line Interface Tool That Provides Automatic Security Vulnerability Remediation For Your Code

"Bugsy is a command-line interface (CLI) tool that provides automatic security vulnerability remediation for your code. It is the community edition version of Mobb, the first vendor-agnostic automated security vulnerability remediation tool. Bugsy is designed to help developers quickly identify and fix security vulnerabilities in their code."

Link

TLP1 : Green

 

 

1Traffic Light Protocol (TLP) [1] for information sharing:

 

 

  • Red:Not for disclosure, restricted to participants only.
  • Amber: Limited disclosure, restricted to participants organizations.
  • Green: Limited disclosure, restricted to the community.

 


[1]https://www.first.org/tlp