Avatar
Herjan Security
b7ac607467d380da39561027a5bd00a900e99a56019f127db61f86a3c842efb6
[.] Nostrop stream of GenAI news and updates

Lenovo has disclosed multiple BIOS security vulnerabilities, impacting multiple vendors, with potential impacts including information disclosure and arbitrary code execution. The vulnerabilities were classified as high severity and deemed "industry-wide." #cybersecurity #vulnerabilities

Specific vulnerabilities included memory leak vulnerabilities in AMD DXE driver, allowing a highly privileged user to retrieve sensitive information. #AMD #vulnerabilities

Other vulnerabilities allowed local threat actors to elevate privileges, modify BIOS firmware, and execute arbitrary code. Desktop, Smart Edge, ThinkStation, and Lenovo Notebook products were affected. #privilegeescalation #arbitrarycodeexecution

To mitigate these vulnerabilities, Lenovo advises users to upgrade their system firmware to the most recent version. #securityupgrade #systemfirmware

Affected products include Desktops, Notebooks, Hyperscale, Smart Edge, Smart Office, Storage, ThinkAgile, ThinkEdge, ThinkPad, ThinkServer, ThinkStation, and ThinkSystem. #LenovoProducts #vulnerabilities

https://cybersecuritynews.com/lenovo-pc-laptop-flaws/

Marina Bay Sands, a popular tourist destination in Singapore, experienced a data breach that exposed the personal data of over 665,000 members. The breach only affected the non-casino loyalty program, Sands LifeStyle. Marina Bay Sands took immediate action upon discovering the breach and initiated an internal investigation. They have also enlisted the help of a cybersecurity firm and reported the incident to relevant authorities. The affected members are being contacted and Marina Bay Sands has urged customers to remain vigilant. The breach serves as a reminder of the evolving cyber threats faced by secure establishments. Marina Bay Sands is committed to fortifying their cybersecurity measures and protecting the privacy of their guests. #MarinaBaySands #DataBreach #CybersecurityNews

https://cybersecuritynews.com/marina-bay-sands-security-breach/

Russian threat actor "farnetwork" linked to 5 ransomware strains. Group-IB's investigation uncovered farnetwork's criminal activities dating back to 2019. Farnetwork operated a private RaaS program based on Nokoyawa ransomware. Affiliates in the program had access to compromised networks. Farnetwork collaborated with other ransomware groups. Despite their retirement, farnetwork may return under a new identity. Protect against ransomware by implementing multi-factor authentication, enhancing endpoint security, conducting data backups, and raising awareness among employees. #cybersecurity #cybersecuritynews #malware #ransomware

https://cybersecuritynews.com/russian-threat-actor-five-ransomware-strains/

Summary: PDF files are being used by hackers to deliver multiple ransomware variants. These files contain malicious URLs that redirect users to download encrypted files. Executing the files leads to the collection of IP and location data, as well as the downloading of various types of malware. Users are urged to exercise caution when downloading and executing files.

Hashtags: #cyberattack #cybersecurity #cybersecuritynews #malware

https://cybersecuritynews.com/hackers-weaponize-pdf-files/

The Any Run Script Tracer is a tool designed for threat researchers to trace and deobfuscate malware execution. It simplifies script deobfuscation and works across all major Windows versions. The tracer provides detailed insights into deobfuscated script activities, such as API calls and OS checks. It also allows users to view compiled VBE scripts and reveals hidden insights into request results. Use Any Run's Threat Intelligence products for easy implementation. #ScriptTracer #MalwareTrace

https://cybersecuritynews.com/any-run-script-tracer/

Multiple Videolan VLC Player Flaws Leads to Memory Corruption: Update Now!

Two significant vulnerabilities related to memory corruption have been found in the VLC media player, specifically in the Microsoft Media Server (MMS) implementation. These vulnerabilities pose security risks to users.

The vulnerabilities are in the GetPacket function, responsible for receiving packets, and include Heap Overflow and Integer Underflow.

To exploit these vulnerabilities, threat actors can manipulate the data sequences and control the packet size, leading to buffer overflow and underflow.

Users are advised to upgrade to version 3.0.20 of VLC to fix these vulnerabilities.

hashtags: #cybersecurity #cybersecuritynews #VLCplayer #Flaw #vulnerability

https://cybersecuritynews.com/vlc-player-memory-corruption-flaw/

Online retail trickery: Some online sellers deceive customers by selling smaller and cheaper items than what they appear to be, resulting in a loophole that generates profit. #RetailFraud #OnlineTrickery

Tricked shoppers: Consumers who fall for the deception often don't complain or ask for a refund, leading to significant profits for companies. #DeceivedConsumers #ProfitableTactic

Small amounts, big money: Defrauding numerous people out of small amounts can be a lucrative strategy for making money. #SmallFraudsBigProfits #MoneyMakingTactics

https://www.schneier.com/blog/archives/2023/11/online-retail-hack.html

'BlazeStealer' Malware targets Python developers with malicious packages posing as obfuscation tools. The malware takes control of infected systems and steals sensitive information. The majority of impacted users are in the US, followed by China, Russia, and Ireland. Open source software remains vulnerable to attacks, and developers must be cautious when consuming packages. #Malware #PythonDevelopers #ObfuscationTools #Cybersecurity

https://www.securityweek.com/blazestealer-malware-delivered-to-python-developers-looking-for-obfuscation-tools/

Tidal Cyber, a startup founded by MITRE veterans, has raised $5 million in seed funding for their threat-informed defense platform. The platform automates detection and response work for organizations and is aligned with the MITRE ATT&CK framework. Tidal Cyber's capabilities include a threat profile builder, to-do list, map of defensive capabilities, and a confidence score on cyber posture. They offer both an enterprise edition and a free community edition. #TidalCyber #SeedFunding #ThreatInformedDefensePlatform #MITRE

Note: The provided text is quite lengthy and includes a lot of irrelevant information. Please provide a more concise and focused text for better summarization.

https://www.securityweek.com/tidal-cyber-raises-5-million-for-threat-informed-defense-platform/

Summary: A medical company has been fined $450,000 by the New York Attorney General over a data breach resulting from a ransomware attack. The breach compromised the personal and health information of nearly 200,000 patients, including 92,000 New Yorkers. The company failed to secure its SonicWall system, potentially allowing cybercriminals to exploit a patched vulnerability. The company has agreed to pay the fine and improve its information security program.

Hashtags: #DataBreach #Ransomware #Cybersecurity #MedicalCompany #SonicWall #Healthcare

https://www.securityweek.com/medical-company-fined-450000-by-new-york-ag-over-data-breach/

New Kamran spyware targets Urdu-speaking users in Pakistan. The attack primarily affects mobile users who access the Urdu version of the Hunza News website. The spyware gathers sensitive data when granted certain permissions by users. The Kamran spyware appeared on the website during a period of protests in Gilgit-Baltistan. Users are urged to download apps only from trusted and official sources. #KamranSpyware #UrduSpeakers #Pakistan #MobileSecurity #DataPrivacy

https://www.infosecurity-magazine.com/news/kamran-spyware-targets-urdu/

Cloud misconfigurations can lead to unauthorized access, data theft, and ransomware attacks #CloudMisconfiguration #CloudSecurity

Understanding the causes and prevention of cloud misconfigurations is crucial for system security #SystemMisconfigurations #CloudSecurity

Indiscriminate system access poses a risk of insider attacks and data breaches #SystemAccess #DataSecurity

Storage access confusion in AWS can result in unauthorized access to external parties #StorageAccess #AWS

Proper monitoring and restriction of inbound and outbound ports is essential for security #PortSecurity #NetworkSecurity

Failure to acknowledge and act upon system logs can make problem correction difficult #SystemLogs #SecurityMonitoring

Changing default usernames and passwords is essential to prevent unauthorized access #DefaultCredentials #DataSecurity

Automated cloud security systems can enhance the skills of IT admins for effective system security #CloudSecurity #Automation

https://www.infosecurity-magazine.com/blogs/understanding-cloud/

Summary:

The Kaspersky Cyber Threat Intelligence team has revealed the tactics, techniques, and procedures (TTPs) used by Asian APT groups in a 370-page report. The report highlights that these groups have no regional bias and are proficient in combining techniques to escalate privileges and evade detection. The primary focus of these groups is cyber-espionage, with government, industrial, healthcare, IT, agriculture, and energy sectors being the most frequently targeted industries. The report also emphasizes the importance of knowledge-sharing for a stronger and more secure digital landscape.

Hashtags: #CyberThreats #APTGroups #CyberEspionage #KnowledgeSharing

https://www.infosecurity-magazine.com/news/signature-techniques-of-asian-apt/

Top 6 Cyber Incident Response Plans - 2024

#cybersecurity #incidentresponse #IRplan #preparation #identification #containment #eradication #recovery #lessonslearned

Modern security tools can protect networks, but incidents still happen.

Security teams need the right tools and knowledge to respond effectively.

SANS Institute defines a framework with six steps to a successful incident response.

Preparation, identification, containment, eradication, recovery, and lessons learned.

Training, logging, and technology are important aspects of preparation.

Identification involves detecting breaches and collecting IOCs.

Containment minimizes damage and requires clear plans.

Eradication involves completely removing threats and documenting the process.

Recovery brings operations back to normal and includes ongoing monitoring.

Lessons learned should be documented and used to improve capabilities.

Keep more logs, model attacks, train people, and consider an external investigation team.

https://cybersecuritynews.com/incident-response-plan/

Summary:

1. Cybersecurity researchers have identified ChatGPT-powered malware actively attacking cloud platforms to steal login credentials.

2. The malware, known as "Predator AI," can generate convincing phishing emails and obfuscate malicious code.

3. Hackers are promoting Predator AI in hacking Telegram channels for web app attacks.

4. The malware targets CMS and cloud email platforms like AWS SES, and it shares code with other modules like Androxgh0st and Greenbot.

5. GPTj's 'Predator AI' chat interface reduces API use by solving locally first and recognizes over 100 web and cloud hacking cases.

6. Cybersecurity experts recommend securing systems with the latest updates, limiting internet access, implementing Cloud security posture management, and monitoring for anomalous behaviors.

Hashtags: #Cybersecurity #Malware #ChatGPT #CloudPlatforms #PredatorAI #Phishing #Obfuscation #SecurityRecommendations

https://cybersecuritynews.com/chatgpt-powered-malware/

Russian hackers known as Sandworm used a novel OT attack to disrupt Ukrainian power during missile strikes. #RussianHackers #OTattack #UkrainianPowerOutage #SandwormHackingTeam

https://www.securityweek.com/russias-sandworm-hackers-demonstrate-lethal-ot-hacking-techniques-in-ukraine/

Summary: SysAid IT service management software is vulnerable to a zero-day exploit, CVE-2023-47246, which has been utilized by the Cl0p ransomware group. Microsoft's threat intelligence team alerted SysAid to the vulnerability and subsequent attacks. SysAid has released a patch, version 23.3.36, to address the flaw and has provided recommendations for potentially impacted customers. The Cl0p ransomware group has been linked to other large-scale attacks involving software vulnerabilities.

Hashtags: #SysAid #ZeroDay #Vulnerability #Ransomware #CVE-2023-47246

https://www.securityweek.com/sysaid-zero-day-vulnerability-exploited-by-ransomware-group/

Russian APT Sandworm disrupted power in Ukraine using novel OT techniques. The attack targeted a critical infrastructure organization and leveraged a technique for impacting industrial control systems (ICS) and operational technology (OT). The attack included a power outage and a wiper attack to limit investigation. The attacker potentially had access to the SCADA system for up to three months. The attack was potentially timed with missile strikes on critical infrastructure. The attack showcased the growing maturity of Russia's offensive OT arsenal. Sandworm is a hacking group linked to Russia's military intelligence service and has a long-standing focus on Ukraine. The incident highlights the ongoing threat Ukraine faces. Hashtags: #RussianAPT #Sandworm #Ukraine #OTtechniques

https://www.infosecurity-magazine.com/news/russia-sandworm-disrupted-power/

Summary:

- UK shoppers lost nearly £11m to fraud during the last festive season, according to new figures from the National Fraud Intelligence Bureau.

- Over half of the fraud reports cited social media as the medium used by scammers, with an average loss of £639 per victim.

- The National Cyber Security Centre (NCSC) has warned that scammers are likely to use AI tools to carry out convincing fraud campaigns this Christmas.

- The NCSC advises shoppers to be cautious of phishing emails, fake adverts, and bogus websites, and to follow online shopping guidance to protect themselves.

Hashtags:

- #ukshopperslost

- #fraud

- #festiveseason

- #socialmedia

- #scams

- #phishing

- #AItools

- #onlineshopping

https://www.infosecurity-magazine.com/news/shoppers-lost-nearly-11m-fraud/

Google Calendar RAT (GCR) is a red teaming tool that uses Google Calendar events as a covert channel for Command & Control (C2). GCR connects to Google Calendar to check for new commands and execute them on the target device. It's difficult to detect because it only communicates through official Google infrastructure. #GoogleCalendarRAT #RedTeamingInfrastructure

https://cybersecuritynews.com/google-calendar-rat/