New Star Blizzard spear-phishing campaign targets WhatsApp accounts | Microsoft Security Blog
In mid-November 2024, Microsoft Threat Intelligence reported a shift in tactics by the Russian threat actor Star Blizzard, who began targeting WhatsApp accounts through spear-phishing campaigns. This new approach involves impersonating US government officials to lure victims into malicious links that compromise their WhatsApp data. The campaign highlights the actor’s resilience and adaptability in the face of operational disruptions.…
Read More
Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
In December 2024, a new Adversary-in-the-Middle (AiTM) phishing kit known as Sneaky 2FA was identified, targeting Microsoft 365 accounts. This phishing kit, sold as Phishing-as-a-Service (PhaaS) by the cybercrime service “Sneaky Log”, utilizes sophisticated techniques including autograb functionality and anti-bot measures. The analysis reveals its operational methods, including the use of Telegram for distribution and support.…
Read More
Microsoft Patch Tuesday January 2025 Security Update Review Qualys ThreatPROTECT
January 2025 marks the release of Microsoft’s first Patch Tuesday, addressing 159 vulnerabilities, including 10 critical and 149 important. Among these, eight zero-day vulnerabilities have been patched, with three actively exploited. Key updates include fixes for various Microsoft products, notably in Windows and Microsoft Office. Affected: Microsoft Windows, Microsoft Office, .NET,…
Read More
Illicit HuiOne Telegram Market Surpasses Hydra, Hits  Billion in Crypto Transactions
Summary: HuiOne Guarantee has emerged as the largest online illicit marketplace, surpassing Hydra with over $24 billion in cryptocurrency transactions. The platform is linked to various criminal activities, including money laundering and human trafficking, and has connections to organized crime groups globally.

Threat Actor: HuiOne Guarantee | HuiOne Guarantee Victim: Global online users | online users

Key Point :

HuiOne Guarantee has received at least $24 billion in cryptocurrency, significantly more than the defunct Hydra marketplace.…
Read More

Victim: mymobileforms app Country : US Actor: funksec Source: http://funknqn44slwmgwgnewne6bintbooauwkaupik4yrlgtycew3ergraid.onion/Breach68.html Discovered: 2025-01-13 15:16:23.006825 Published: 2025-01-13 15:16:23.006825 Description : [AI generated] MyMobileForms app is an innovative platform facilitating the creation of customized mobile forms to streamline data collection and processing. The mobile forms can be integrated with databases, designed with GPS and images, and shared across multiple devices.…
Read More

This article outlines critical vulnerabilities affecting various software products, including Citrix, Cisco, Fortinet, and Microsoft. Threat actors are exploiting these vulnerabilities, such as CVE-2023-3519 and CVE-2023-34362, to gain unauthorized access and execute malicious activities. Regular updates and security patches are essential to mitigate these risks. #CyberSecurity #VulnerabilityManagement #ThreatIntelligence

Keypoints :

Multiple critical vulnerabilities identified across various software products.…
Read More

Summary: A new Android malware named FireScam has been identified as an information stealer and spyware, capable of harvesting sensitive information from various applications. It is distributed through a phishing website disguised as the legitimate ‘Telegram Premium’ application, targeting devices running Android 8 and newer.

Threat Actor: Unknown | FireScam Victim: Android Users | Android Users

Key Point :

FireScam is distributed via a phishing website that mimics the RuStore application store.…
Read More

In an increasingly connected digital era, macOS has become an enticing target for cybercriminals. From exploiting vulnerabilities that allow malicious applications to access sensitive data without user consent to sophisticated malware attacks targeting cryptocurrency assets, these threats underscore the importance of security awareness.

This article will explore recent incidents, including TCC-based vulnerabilities, attacks by APT groups, and malware specifically targeting macOS users, as well as essential protective measures that users should take to safeguard their personal data and devices from these emerging threats.…

Read More

### #IoTSecurity #MalwareDisruption #BotnetMitigation

Summary: Germany’s BSI has successfully disrupted the BadBox malware, which was pre-installed on over 30,000 Android-based IoT devices, by employing DNS sinkholing techniques. This operation is part of a broader effort to combat a botnet linked to malicious apps and firmware that has affected over 280,000 devices globally.…

Read More

Summary :

Cyble’s latest Sensor Intelligence report reveals a surge in malware, phishing, and IoT vulnerabilities, highlighting critical threats and vulnerabilities that organizations must address. #CyberThreats #MalwareSurge #IoTVulnerabilities

Keypoints :

Cyble has identified multiple instances of exploitation attempts, malware intrusions, financial fraud, and brute-force attacks. The report covers various vulnerabilities including high-profile malware variants and CVE attempts.…
Read More

### #EagleMsgSpy #MobileSurveillance #WuhanChinasoft

Summary: Researchers have uncovered a sophisticated surveillance tool, EagleMsgSpy, used by Chinese law enforcement to collect extensive data from mobile devices, requiring physical access for installation. This tool has been operational since at least 2017 and is linked to a private technology company in Wuhan.…

Read More

Threat Actor: Wuhan Chinasoft Token Information Technology Co., Ltd. | Wuhan Chinasoft Token Information Technology Co., Ltd. Victim: Various mobile device users | mobile device users Price: Not publicly disclosed Exfiltrated Data Type: Sensitive personal information

Key Points :

EagleMsgSpy is a sophisticated surveillance tool used by law enforcement in China since at least 2017.…
Read More

### #TCCBypass #AppleSecurityFlaw #DataPrivacyThreats

Summary: A newly identified vulnerability in Apple’s Transparency, Consent, and Control (TCC) framework, designated as CVE-2024-44131, allows malicious applications to bypass user consent and access sensitive data on both macOS and iOS systems. This flaw has been patched in the latest versions of the operating systems, but it raises significant concerns about user privacy and data security.…

Read More

### #MoqHaoMalware #RoamingMantis #MobilePhishing

Summary: MoqHao, a mobile malware family associated with the Roaming Mantis group, utilizes SMS phishing (smishing) to deliver malicious payloads targeting both Android and iOS users. This analysis reveals the sophisticated tactics employed in their campaigns, including localized phishing pages and the use of trusted services for malware distribution.…

Read More

### #SpywareDiscovery #FSBIntrusion #DigitalPrivacyThreats

Summary: A Russian programmer discovered that spyware was secretly installed on his phone after being detained by the FSB, raising concerns about government surveillance and digital privacy. The malware, resembling a legitimate app, grants extensive permissions to monitor user activities.

Threat Actor: FSB | FSB Victim: Kirill Parubets | Kirill Parubets

Key Point :

The spyware impersonates a popular Android app, ‘Cube Call Recorder,’ allowing extensive access to the device.…
Read More

### #SpywareDetection #MobileSecurity #PegasusThreat

Summary: A recent hunt on 2,500 mobile devices revealed a concerning prevalence of NSO Group’s Pegasus malware, with several users unknowingly compromised. The findings highlight the need for enhanced mobile security measures, especially among high-risk individuals such as journalists and activists.

Threat Actor: NSO Group | NSO Group Victim: Various individuals | journalists, human rights activists, corporate executives

Key Point :

Six to seven infections of Pegasus malware were detected among 2,500 mobile devices during the hunt.…
Read More

### #UKCyberThreats #NCSCAnnualReview #RansomwareRisks

Summary: The UK’s National Cyber Security Centre (NCSC) warns of increasing cyber-attack frequency and severity, highlighting the urgent need for stronger defenses across organizations. The report reveals a significant rise in incidents, particularly ransomware attacks, and emphasizes the role of nation-state actors in escalating threats.…

Read More