Author: SecurityOnline
Threat Actor: CoughingDown | CoughingDownVictim: Internet Service Providers and Government Institutions | Internet Service Providers and Government Institutions
Key Point :
The EAGERBEE backdoor employs DLL hijacking techniques to gain initial access and deploy malicious payloads.…Threat Actor: Cybercriminals | cybercriminals Victim: Online shoppers | online shoppers
Key Point :
PhishWP creates convincing fake payment interfaces to deceive users.…Key Points :
Space Bears claimed to have infiltrated an Atos database on December 28, 2024. Atos categorically denied any compromise to its infrastructure or proprietary data.…Summary: A recent study highlights the alarming prevalence of fraudulent stars on GitHub, which are being used to manipulate the perceived popularity of repositories, posing significant security risks. Researchers developed a detection tool, StarScout, to identify and combat these deceptive practices.
Threat Actor: Fraudulent Actors | fraudulent actors Victim: GitHub Users | GitHub
Key Point :
Over 4.5 million suspected fake stars identified across more than 15,000 repositories.…Summary: A sophisticated cyber campaign targeting Chrome extension developers has been uncovered, utilizing phishing and malicious code to compromise both developers and users. The operation has affected at least 35 extensions and potentially over 2.5 million users, highlighting the evolving nature of cyber threats.…
Summary: A recent study reveals that large language models (LLMs) have achieved a groundbreaking 95% success rate in offensive cybersecurity tasks, significantly outperforming previous benchmarks. This research highlights the potential of LLMs to transform cybersecurity strategies while raising concerns about their implications in real-world scenarios.…
Summary: The Lazarus group has launched a new campaign targeting financial institutions and cryptocurrency exchanges by weaponizing the IPMsg installer to deliver backdoors and steal sensitive information. This sophisticated attack showcases their advanced social engineering tactics and evasion techniques.
Threat Actor: APT-C-26 (Lazarus) | Lazarus Victim: Financial Institutions and Cryptocurrency Exchanges | financial institutions and cryptocurrency exchanges
Key Point :
The attack begins with a weaponized version of the IPMsg installer, which deploys both a legitimate installer and a malicious DLL file.…Summary: The U.S. Department of the Treasury has reported a significant cybersecurity breach involving unauthorized access to sensitive information through a third-party software vulnerability. This incident, linked to a state-sponsored threat actor from China, highlights critical concerns regarding the security of government systems.…
Key Points :
Cisco reassured that there was no new security breach following the data leak. The leaked data was part of a previously identified incident from October 2024.…Key Points :
A misconfiguration in Cariad’s software exposed the location data of approximately 800,000 electric vehicles. The breach was discovered by the Chaos Computer Club, which reported the vulnerability on November 26th.…Key Points :
Over 30,000 publicly accessible Postman workspaces exposed sensitive information.…Key Points :
The operation involves a clandestine group amassing authentic identity documents and corresponding facial images.…Key Points :
Netflix was fined for failing to provide clear information about personal data usage. The investigation was initiated in 2019 after complaints from the NGO None of Your Business (noyb).…Threat Actor: Wuhan Chinasoft Token Information Technology Co., Ltd. | Wuhan Chinasoft Token Information Technology Co., Ltd. Victim: Various mobile device users | mobile device users Price: Not publicly disclosed Exfiltrated Data Type: Sensitive personal information
Key Points :
EagleMsgSpy is a sophisticated surveillance tool used by law enforcement in China since at least 2017.…Threat Actor: DDoSecrets | DDoSecrets Victim: Various individuals and organizations | leaked documents Price: Free access with a “library card” system for sensitive data Exfiltrated Data Type: Leaked documents, Personally Identifiable Information (PII)
Key Points :
DDoSecrets has launched a new public search engine called the Library of Leaks, providing access to millions of leaked documents.…