US-CERT Vulnerability Summary for the Week of January 20, 2025 – RedPacket Security
The CISA Vulnerability Bulletin has highlighted several new vulnerabilities identified within various software products, primarily focusing on vulnerabilities that pose risks of arbitrary code execution, cross-site scripting, and SQL injection among others. The vulnerabilities are categorized based on their severity. High-profile examples include serious security weaknesses in software from Enrich Technology, Apache Software Foundation, and WordPress plugins.…
Read More
Cracking the Ice: Unraveling the Snowflake Data Breach, Lessons, Impacts, and Strategies for Security Improvement
The Snowflake attack showcases a sophisticated exploitation of refresh tokens and infostealer malware to breach security defenses, leading to mass data compromise. Cybercriminals utilized tools to manipulate token management practices, resulting in unauthorized access across multiple platforms. The incident highlights vulnerabilities within authentication systems and emphasizes the necessity for robust cybersecurity measures.…
Read More
Technical Analysis of Xloader Versions 6 and 7 | Part 1
Xloader is a sophisticated malware family that targets various applications to steal sensitive information and deploy additional payloads. With its evolving obfuscation techniques and encryption layers, Xloader complicates detection and analysis efforts. This article provides a detailed examination of the latest versions (6 and 7) of Xloader, focusing on its behavior, persistence mechanisms, and advanced obfuscation methods.…
Read More
For , Cyberattackers Can Use GhostGPT to Write Malicious Code
Summary: A new uncensored AI chatbot called GhostGPT has emerged, enabling cybercriminals to create malware and execute scams with ease. Unlike mainstream AI tools, it is designed to bypass security measures and provide unrestricted responses, facilitating illegal activities. Its popularity is rising among bad actors due to its functionalities and anonymous operational model.…
Read More

Victim: www.computan.com Country : CA Actor: babuk2 Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/dc7ee87eb6a2e25dcd3f3dfd202126715f6160d98647bff01de1092dd89f9e33/ Discovered: 2025-01-27 07:11:02.227031 Published: 2025-01-27 07:09:56.304798 Description : Sure! Here are some key points about Computan based on the information typically associated with companies in the technology and IT services sector: Expertise in providing custom software development solutions.…
Read More

Victim: www.industrialdealimentos.com Country : CO Actor: babuk2 Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/43109641a8e48eacf077ae756b301acf81e33689c26a6170abf6e17983895bf4/ Discovered: 2025-01-27 07:14:28.540731 Published: 2025-01-27 07:13:21.356763 Description : Here are some key points about the website www.industrialdealimentos.com: Specializes in industrial food products and services. Offers a wide range of food ingredients and solutions for various sectors. Focuses on quality and innovation in food processing.…
Read More
TalkTalk Confirms Data Breach, Downplays Impact
Summary: UK telecommunications firm TalkTalk has confirmed a data breach involving a third-party supplier, triggered by unauthorized access to sensitive customer information. A threat actor claimed to be selling data of over 18.8 million customers, although TalkTalk disputes this number. Investigations are ongoing, and the company is collaborating with the third-party supplier to address the issue and safeguard customer data.…
Read More
The Case for Proactive, Scalable Data Protection
Summary: Natco Home Group faced critical vulnerabilities due to outdated backup systems, which prompted a significant overhaul of their data protection strategy. Transitioning to a modern cloud-first solution not only fortified their data security but also improved business continuity, especially during peak operational periods. This shift is a crucial reminder for organizations to proactively reassess their data protection strategies to stay resilient against evolving cyber threats.…
Read More

Victim: www.hcisystems.net Country : US Actor: babuk2 Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/cc5adb91cc4cdf96bb0a1236b37f9a9fffc0dabee01e286e779e5de765c2f33a/ Discovered: 2025-01-27 07:22:03.582036 Published: 2025-01-27 07:20:50.923600 Description : Here are some key points about HCISystems from the provided website: HCISystems specializes in healthcare information technology solutions. The company offers a range of services, including electronic health records (EHR) systems.…
Read More

Victim: www.skywaycoach.ca Country : CA Actor: babuk2 Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/21d76746113e42307fe8fe34abb2cf5d6582549feab72e9293c63bedfd78b0ad/ Discovered: 2025-01-27 07:25:27.447091 Published: 2025-01-27 07:24:23.065378 Description : Here are some key points about Skyway Coach from their website: Skyway Coach offers charter bus services across Canada and the United States. The company provides a fleet of modern, comfortable coaches equipped with amenities for passenger convenience.…
Read More

Victim: Alo Center (hq.aloteknik.se) Country : SE Actor: lynx Source: http://lynxblog.net/leaks/67978a0305a779c3d32e2bfa Discovered: 2025-01-27 14:55:44.232013 Published: 2025-01-27 14:54:38.405314 Description : ALO started more than 80 years ago as a family-owned business in Sweden. Passionate about producing machines for sawblades since the beginning. Committed to originating principles of innovation and manufacturing.…
Read More

Victim: Aquasys Country : CZ Actor: dragonforce Source: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog/?post_uuid=2638ff55-c088-4975-b8e1-e387c80bdfbc Discovered: 2025-01-27 14:12:30.364590 Published: 2025-01-27 14:11:23.126449 Description : Specializes in construction Focuses on water infrastructure Expertise in environmental construction Transport network development Engineering network construction

About Country: CZ (Czech Republic)

– Cybersecurity Framework: The Czech Republic has established a comprehensive national cybersecurity strategy, governed by the National Cyber and Information Security Agency (NÚKIB).…

Read More

Victim: lhps.org Country : US Actor: incransom Source: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/67977b1f038775d37837fdae Discovered: 2025-01-27 12:52:50.072423 Published: 2025-01-27 12:51:40.261889 Description : Founded in 1970 8th largest coeducational independent day school in the nation Two campuses totaling 42 acres in Orlando Approximately 1,950 students in grades Pre-K through 12 Rigorous college preparatory program Accredited by Florida Council of Independent Schools, Southern Association of Colleges and Schools, and Florida Kindergarten Council

About Country: US

– Cybersecurity Landscape: The US has a robust cybersecurity framework led by agencies such as the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA).…

Read More
Sweden seizes ship suspected of Baltic Sea cable sabotage
Summary: Swedish authorities have seized the cargo ship Vezhen, suspected of damaging a communications cable in the Baltic Sea, prompting a preliminary investigation into sabotage. This event follows heightened scrutiny over subsea infrastructure due to previous incidents, including one involving the ship Eagle S. Various Swedish agencies, including the Security Service, are collaborating on this investigation amid rising tensions regarding maritime activities in the region.…
Read More

Victim: www.dvttechnologyltd.com Country : US Actor: babuk Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/720acf2ad8b733584750bc37aad17dfbd6accf6634e9ac4ca5348ae0e55f986c/ Discovered: 2025-01-27 07:32:23.071242 Published: 2025-01-27 07:31:17.618408 Description : www.dvttechnologyltd.com has been previously claimed by ransomhub. This could suggest a potential new attack. There may be a cross-claim between brands by the same threat actor. It indicates the possibility of recycling previously leaked stolen data.…
Read More

Victim: qed.co.ug Country : UG Actor: funksec Source: http://funkxxkovrk7ctnggbjnthdajav4ggex53k6m2x3esjwlxrkb3qiztid.onion/qed.co.ug Discovered: 2025-01-27 11:36:56.476038 Published: 2025-01-27 11:36:56.476038 Description : QED Solutions Ltd operates a Ugandan-based recruitment platform: qed.co.ug Connects employers with potential employees Offers a range of human resource services Services include recruitment, consultancy, and training Covers various sectors: finance, IT, sales, oil and gas Serves entities seeking small to large workforces

About Uganda (UG) – Cybersecurity Perspective

– Cybersecurity Framework: Uganda has established a national cybersecurity framework to enhance its capacity to protect its information systems and data.…

Read More