Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. | Continue reading


@threatpost.com | 1 year ago

Apt Lazarus Targets Engineers with macOS Malware

The North Korean APT is using a fake job posting for Coinbase in a cyberespionage campaign targeting users of both Apple and Intel-based systems. | Continue reading


@threatpost.com | 1 year ago

U.K. Water Supplier Hit with Clop Ransomware Attack

The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data. | Continue reading


@threatpost.com | 1 year ago

Black Hat and DEF Con Roundup

‘Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings. | Continue reading


@threatpost.com | 1 year ago

Phishers Swim Around 2FA in Coinbase Account Heists

Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds. | Continue reading


@threatpost.com | 1 year ago

Starlink Successfully Hacked Using $25 Modchip

Belgian researcher Lennert Wouters revealed at Black Hat how he mounted a successful fault injection attack on a user terminal for SpaceX’s satellite-based internet system | Continue reading


@threatpost.com | 1 year ago

Cisco Confirms Network Breach via Hacked Employee Google Account

Networking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account. | Continue reading


@threatpost.com | 1 year ago

Microsoft Patches ‘Dogwalk’ Zero-Day and 17 Critical Flaws

August Patch Tuesday tackles 121 CVEs, 17 critical bugs and one zero-day bug exploited in the wild. | Continue reading


@threatpost.com | 1 year ago

VMware Urges Users to Patch Critical Authentication Bypass Bug

Vulnerability—for which a proof-of-concept is forthcoming—is one of a string of flaws the company fixed that could lead to an attack chain. | Continue reading


@threatpost.com | 1 year ago

Malicious NPM Packages Tapped Again to Target Discord Users

Recent LofyLife campaign steals tokens and infects client files to monitor various user actions, such as log-ins, password changes and payment methods. | Continue reading


@threatpost.com | 1 year ago

Authentication Risks Discovered in Okta Platform

Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational data destruction. | Continue reading


@threatpost.com | 1 year ago

CISA Urges Patch of Exploited Windows 11 Bug by Aug. 2

Feds urge U.S. agencies to patch a Microsoft July Patch Tuesday 2022 bug that is being exploited in the wild by August 2. | Continue reading


@threatpost.com | 1 year ago

New Orbit Malware Backdoors Linux Devices

The novel threat steals data and can affect all processes running on the OS, stealing information from different commands and utilities and then storing it on the affected machine. | Continue reading


@threatpost.com | 1 year ago

Hack Allows Drone Takeover via ‘ExpressLRS’ Protocol

A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver. | Continue reading


@threatpost.com | 1 year ago

U.S. Healthcare Orgs Targeted with Maui Ransomware

State-sponsored actors are deploying the unique malware–which targets specific files and leaves no ransomware note–in ongoing attacks. | Continue reading


@threatpost.com | 1 year ago

Patchable and Preventable Security Issues Lead Causes of Q1 Attacks

Attacks against U.S. companies spike in Q1 2022 with patchable and preventable external vulnerabilities responsible for bulk of attacks. | Continue reading


@threatpost.com | 1 year ago

Leaky Access Tokens Exposed Amazon Photos of Users

Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents. | Continue reading


@threatpost.com | 1 year ago

Google Warns Spyware Being Deployed Against Android, iOS Users

The company is warning victims in Italy and Kazakhstan that they have been targeted by the malware from Italian firm RCS Labs. | Continue reading


@threatpost.com | 1 year ago

Evil Corp Pivots LockBit to Dodge U.S. Sanctions

The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity. | Continue reading


@threatpost.com | 1 year ago

International Authorities Take Down Flubot Malware Network

The info-stealing trojan used SMS messages and lifted contact credentials to spread with unprecedented speed across Android devices globally since December 2020. | Continue reading


@threatpost.com | 1 year ago

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread ransomware, spyware or steal data from browser sessions, researchers warn. | Continue reading


@threatpost.com | 1 year ago

Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack

Threat actors already are exploiting vulnerability, dubbed ‘Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said. | Continue reading


@threatpost.com | 1 year ago

Link Found Connecting Chaos, Onyx and Yashma Ransomware

A slip-up by a malware author has allowed researchers to taxonomize three ransomware variations going by different names. | Continue reading


@threatpost.com | 1 year ago

Verizon Ransomware, Human Error Among Top Security Risks

2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and how organizations and their employees are the reasons why incidents occur. | Continue reading


@threatpost.com | 1 year ago

Critical Flaws in Popular ICS Platform Can Trigger RCE

Cisco Talos discovered eight vulnerabilities in the Open Automation Software, two of them critical, that pose risk for critical infrastructure networks. | Continue reading


@threatpost.com | 1 year ago

Fronton IoT Botnet Packs Disinformation Punch

Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda. | Continue reading


@threatpost.com | 1 year ago

Snake Keylogger Spreads Through Malicious PDFs

Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug. | Continue reading


@threatpost.com | 1 year ago

Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites. | Continue reading


@threatpost.com | 1 year ago

380K Kubernetes API Servers Exposed to Public Internet

More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration engine for managing cloud deployments allow some form of access. | Continue reading


@threatpost.com | 1 year ago

Attacker Breach ‘Dozens’ of GitHub Repos Using Stolen OAuth Tokens

GitHub shared the timeline of breaches in April 2022, this timeline encompasses the information related to when a threat actor gained access and stole private repositories belonging to dozens of organizations. | Continue reading


@threatpost.com | 2 years ago

Microsoft Zero-Days patched, including an RCE with a 9.8 CVE score

For April Patch Tuesday, the computing giant addressed a zero-day under active attack and several critical security vulnerabilities, including three that allow self-propagating exploits. | Continue reading


@threatpost.com | 2 years ago

Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info

Threat actors target Office 365 and Google Workspace in a new campaign, which uses a legitimate domain associated with a road-safety center in Moscow to send messages. | Continue reading


@threatpost.com | 2 years ago

UK Cops Arrest 7 Suspected Lapsus$ Gang Members

London Police can't say if they nabbed the 17-year-old suspected mastermind & multimillionaire – but researchers say they’ve been tracking an Oxford teen since mid-2021. | Continue reading


@threatpost.com | 2 years ago

Russia Lays Groundwork for Cyberattacks on US Infrastructure

"Evolving intelligence" shows Russia amping up for cyber-war in response to Ukraine-related sanctions, the White House said — but researchers warn that many orgs are not prepared. | Continue reading


@threatpost.com | 2 years ago

Dev Sabotages Popular NPM Package to Protest Russian Invasion

In the latest software supply-chain attack, the code maintainer added malicious code to the hugely popular node-ipc library to replace files with a heart emoji and a peacenotwar module. | Continue reading


@threatpost.com | 2 years ago

Russia Issues Its Own TLS Certs

The country’s citizens are being blocked from the internet because foreign certificate authorities can't accept payments due to Ukraine-related sanctions, so it created its own CA. | Continue reading


@threatpost.com | 2 years ago

Zero-click flaws in widely used UPS devices threaten critical infratructure

The 'TLStorm' vulnerabilities, found in APC Smart-UPS products, could allow attackers to cause both cyber and physical damage by taking down critical infrastructure. | Continue reading


@threatpost.com | 2 years ago

Samsung Screwed Up Encryption on 100M Phones

'Serious flaws' in the way Samsung phones encrypt sensitive material, as revealed by academics from Tel Aviv U, are 'embarrassingly bad.' | Continue reading


@threatpost.com | 2 years ago

Two Active Directory Bugs Lead to Easy Windows Domain Takeover

Microsoft is urging customers to patch two Active Directory domain controller bugs after a PoC tool was publicly released on Dec. 12. | Continue reading


@threatpost.com | 2 years ago

Pegasus Spyware Infects U.S. State Department iPhones

It's unknown who's behind the cyberattacks against at least nine employees' iPhones, who are all involved in Ugandan diplomacy. | Continue reading


@threatpost.com | 2 years ago

Hackers Steal FIFA 21 Source Code, Tools in EA Breach

Raft of other proprietary game data and related software and developer kits also pilfered in the unspecified attack, which the company is investigating. | Continue reading


@threatpost.com | 2 years ago

GoDaddy Breach Widens to Include Reseller Subsidiaries

Customers of several brands that resell GoDaddy Managed WordPress have also been caught up in the big breach, in which millions of emails, passwords and more were stolen. | Continue reading


@threatpost.com | 2 years ago

Proofpoint Phish Harvests Microsoft O365, Google Logins

A savvy campaign impersonating the cybersecurity company skated past Microsoft email security. | Continue reading


@threatpost.com | 2 years ago

Cisco SD-WAN Security Bug Allows Root Code Execution

The high-severity bug, tracked as CVE-2021-1529, is an OS command-injection flaw. | Continue reading


@threatpost.com | 2 years ago

Brizy WordPress Plugin Exploit Chains Allow Full Site Takeovers

A stored XSS and arbitrary file-upload bug can be paired with an authorization bypass to wreak havoc. | Continue reading


@threatpost.com | 2 years ago

VMware ESXi Servers Encrypted by Lightning-Fast Python Script

It's a little snippet of Python code – 6KB – that strikes fast and nasty, taking less than three hours to complete from initial breach to encryption. | Continue reading


@threatpost.com | 2 years ago

Twitch Leak Included Emails, Passwords in Clear Text: Researcher

A researcher combed through the Twitch leak and found what they said was evidence of PayPal chargebacks with names and emails; employees' emails; and more. | Continue reading


@threatpost.com | 2 years ago

MFA Glitch Leads to 6K+ Coinbase Customers Getting Robbed

Coinbase suspects phishing led to attackers getting personal details needed to access wallets but also blamed a flaw in its SMS-based 2FA. | Continue reading


@threatpost.com | 2 years ago