THN Cybersecurity Summary: Major Risks, Software, and Patterns (Oct 7 – Oct 13)

Oct 14, 2024Ravie LakshmananSummary / Cybersecurity

Hello, here is your weekly portion of “what’s happening in the cybersecurity realm” – and believe me, it’s essential to stay informed this time.

THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 - Oct 13)

Oct 14, 2024Ravie LakshmananSummary / Cybersecurity

Hello, here is your weekly portion of “what’s happening in the cybersecurity realm” – and believe me, it’s essential to stay informed this time. From unknown vulnerabilities and AI in rebellion to the FBI assuming a crypto pioneer role – it’s brimming with information they prefer to keep hidden 🤫.

Let’s delve in before we succumb to FOMO.

⚡ Top Risk of the Week

GoldenJackal Intrudes Air-Gapped Systems: Enter GoldenJackal, the hacker gang you might not be familiar with – but you absolutely should acquaint yourself with now. They are infiltrating highly secure, air-gapped computing systems using cunning worms distributed via tainted USB devices (indeed!), demonstrating that even the most isolated networks are vulnerable. ESET investigators apprehended them while using two distinct tailor-made utilities to target prominent victims, including a South Asian embassy in Belarus and a governmental body of the European Union.

🔔 Major Developments

  • Mozilla Irons Out Firefox 0-Day: Mozilla rectified a critical zero-day vulnerability in its Firefox browser that has been actively abused in real-world scenarios targeting Tor browser users. While specific details about the assaults are currently unavailable, users are urged to upgrade to Firefox 131.0.2, Firefox ESR 128.3.1, and Firefox ESR 115.16.1.
  • Continued Success of N. Korea’s Contagious Interview: Following the revelation of details on a North Korean cyber offensive dubbed Contagious Interview nearly a year ago, the campaign persists in focusing on the tech industry without signs of slowing down. These attacks intend to deploy backdoors and data-stealing malware by duping programmers into executing malicious scripts under the guise of a coding task as part of an interview process after approaching them on platforms like LinkedIn.
  • OpenAI Thwarts Malicious Efforts: OpenAI stated that it has disrupted more than 20 malevolent cyber incursions since the beginning of the year that exploited its generative artificial intelligence (AI) conversational agent, ChatGPT, for crafting and perfecting malware, propagating disinformation, evading detection, and exploring vulnerabilities. One of the clusters of activities was observed targeting OpenAI staff members through spear-phishing campaigns to distribute the SugarGh0st Remote Access Trojan (RAT).
  • FBI Establishes Sham Cryptocurrency to Dismantle Fraudulent Activity: The U.S. Federal Bureau of Investigation (FBI) took the “unorthodox measure” of formulating its digital currency token and a firm termed NexFundAI to dismantle a nefarious operation that allegedly manipulated cryptocurrency markets by orchestrating an illicit scheme referred to as wash trading. A total of 18 individuals and entities have been indicted in connection with the pump-and-dump hoax, with three detentions already made.
  • Gorilla Botnet Executes 300,000 DDoS Strikes Across 100 Nations: In September 2024 alone, a botnet malware cohort named Gorilla unleashed over 300,000 offensive directives, targeting educational institutions, government portals, telecommunications companies, financial institutions, gaming establishments, and betting sectors. China, the U.S., Canada, and Germany were among the countries targeted. The botnet is formed on the leaked Mirai botnet source code.

📰 Global Cyber Activities

  • Microsoft Introduces Windows 11 Security Standard: Microsoft has unveiled the Windows 11, version 24H2 security blueprint with enhanced safeguards for LAN Manager, Kerberos, User Account Control, and Microsoft Defender Antivirus. The package also incorporates Windows Protected Print (WPP), described by the corporation as the “new, streamlined, and more secure printing standard for Windows developed with an emphasis on security.” Simultaneously, the technology magnate announced a revamped Windows Hello user experience and support for third-party passkey providers such as 1Password and Bitwarden to integrate with the Windows 11 ecosystem through APIs.
  • Apple macOS iPhone Screen Replication Flaw: Apple unveiled an iPhone screen replication capability with macOS 15.0 Sequoia, but cybersecurity company Sevco unveiled a confidentiality threat that could disclose metadata related to applications on an individual’s personal iPhone to their corporate IT unit. The concern arises from the fact that iOS applications mirrored on the Mac display the identical application metadata as native macOS apps, thereby releasing details about the apps possibly installed on their devices. Apple has acknowledged the issue and is reportedly working on a resolution.
  • Social Engineering Via Telephonic Communications: Malicious actors have identified a potent social engineering channel through phone communications to deceive users into executing inadvertent actions, a stratagem also known as telephone-based attack delivery (TOAD), callback phishing, and hybrid vishing (fusion of voice and phishing). Intel 471 disclosed that there has been a “significant surge in clandestine offerings for illicit call center services that can facilitate malware distribution, ransomware-related calls, and other deceitful social-engineering endeavors.”
  • Malicious Extensions Can Evade Manifest V3: Google stated ManifestV3 has been released, marking the most recent upgrade concerning the plugins system. This version addresses the security vulnerabilities present in its forerunner that permitted excessive permissions for browser add-ons and the injection of arbitrary JavaScript. Nevertheless, recent investigations have uncovered the potential for malicious entities to capitalize on limited permissions and pilfer data. These findings were showcased by SquareX at the DEF CON conference held back in August, coinciding with a study that revealed “multiple extensions automatically extracting user content from web pages, impacting a vast number of users.”
  • What kind of insight can a USB reveal?: Group-IB has conducted a new study delving into the traces left on USB devices when files are accessed or modified on devices running different operating systems. According to the company’s report, “USBs formatted with NTFS, FAT32, and ExFAT usually generate temporary files, especially during file alterations.” USBs formatted with NTFS on Windows are observed to provide more insights into file system modifications from the $Logfile due to its journaling features. USBs formatted with HFS+ have been noted to store edited file versions in a versioning database. Similarly, when USBs are formatted with FAT32/ExFAT on macOS, they produce “. _filename” files to ensure compatibility for storing extended attributes.

🔥 Resources & Insights on Cybersecurity

  • Specialized Webinars
    • Developing an Effective Data Security Posture Management Scheme: Overwhelmed by data security challenges? Gain firsthand insights from Global-e’s CISO on how Data Security Posture Management (DSPM) revolutionized their data security approach. Receive practical advice, real-world insights, have your queries addressed, and obtain actionable strategies during this exclusive webinar. Secure your spot today!
    • Identity Theft Tactics Unveiled by Former Mandiant Specialist: LUCR-3 is infiltrating organizations like yours through identity-based assaults. Learn how to safeguard your cloud and SaaS environments from this sophisticated threat. Cybersecurity expert Ian Ahl, a former Mandiant professional, unveils the latest tactics and ways to safeguard your organization. Enroll in this vital webinar to gain an advantage.
  • Consult with the Expert
    • Q: As mobile devices become increasingly targeted by cybercriminals, how can individuals shield their devices from network-based attacks, particularly in unfamiliar or high-risk environments like while traveling?
    • A: During your travels, your mobile device could be a target for rogue base stations—bogus cell towers established to pilfer data or monitor your movements. To enhance your protection, initiate the Lockdown Mode on iPhones to block vulnerable 2G connections. Employ a VPN consistently to encrypt your internet traffic and abstain from using public Wi-Fi without it. An excellent tool for boosting your vigilance is the CellGuard app for iOS. This app scans your network for dubious activities, such as rogue base stations, by evaluating factors like signal strength and anomalous networks. While it might generate occasional false warnings, it provides an added layer of security.
  • Cybersecurity Utilities
    • Broken Hill: A Fresh Tool for Evaluating Weaknesses in AI Models – This advanced tool simplifies the process of coaxing large AI models to malfunction by bypassing their constraints. Utilizing the Greedy Coordinate Gradient (GCG) attack, it formulates shrewd prompts that prompt popular models such as Llama-2 and Microsoft’s Phi to respond in unusual ways. The flexibility to execute this tool on consumer GPUs, like the Nvidia RTX 4090, without necessitating expensive cloud servers is a standout feature. Ideal for researchers and security evaluators, Broken Hill helps to expose and amend vulnerabilities in AI models, rendering it an indispensable asset in combating AI threats.
  • Weekly Recommendation
    • Your Browser Extensions Are Observing You: While browser extensions are beneficial, they also pose risks, potentially accessing your data or harboring concealed malware. Safeguard yourself by eliminating redundant extensions, scrutinizing their permissions, and limiting their operation to specific websites. Enable “Click to Activate” for enhanced control and leverage tools like Chrome’s Extension Source Viewer to identify any suspicious activities. Maintain your extensions updated, monitor network traffic for unusual movements, and weigh the option of employing a separate browser for sensitive tasks. Features like Firefox’s Temporary Container Tabs can also assist by segregating extension activities. By adhering to these uncomplicated measures, you can bolster your browsing security.

Wrap-Up

That wraps up the cybersecurity digest for this week! Before you sign off and unwind, a friendly reminder: always double-verify the sender’s email address before clicking on any links, even if it appears to be from a trusted individual or entity. Phishing scams are growing increasingly sophisticated, so vigilance is key! Until next time, stay vigilant and stay cyber-safe!

If you found this article intriguing, feel free to connect with us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.