Managed Detection and Response – How are you monitoring?
Summary: Security Information and Event Management (SIEM) systems are essential for modern enterprise security, enabling organizations to detect and respond to cyber threats effectively. Smarttech247 highlights the challenges faced by traditional SIEM platforms and emphasizes the importance of advanced analytics and automation in addressing these issues.…
Read More
Email Bombing, ‘Vishing’ Tactics Abound in Microsoft 365 Attacks
Summary: Sophos X-Ops’ Managed Detection and Response (MDR) warns of ransomware attacks that utilize email bombing and vishing tactics through Microsoft Office 365. These attacks are attributed to two threat groups, STAC5143 and STAC5777, which have been active in recent months. The researchers emphasize the need for organizations to enhance their security measures and employee awareness to combat these evolving threats.…
Read More
Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing”
Sophos X-Ops’ Managed Detection and Response (MDR) has reported on two active threat clusters, STAC5143 and STAC5777, utilizing Microsoft Office 365 to infiltrate organizations for data theft and ransomware deployment. The tactics include email-bombing, fake tech support, and exploiting remote control tools. Both clusters exhibit overlapping techniques with known threat groups like FIN7 and Storm-1811.…
Read More
Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls – Arctic Wolf
Arctic Wolf has observed a campaign targeting Fortinet FortiGate firewall devices that involves unauthorized logins, account creation, and configuration changes through management interfaces exposed on the public internet. The campaign is likely exploiting a zero-day vulnerability. Organizations are urged to disable public access to firewall management interfaces immediately.…
Read More
Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls – Arctic Wolf
Arctic Wolf has identified a campaign targeting Fortinet FortiGate firewall devices, where unauthorized administrative access was gained through exposed management interfaces. The attackers created new accounts, altered configurations, and exploited a potential zero-day vulnerability. Organizations are urged to disable public access to firewall management interfaces immediately.…
Read More
How Cracks and Installers Bring Malware to Your Device
This article discusses the tactics used by attackers to distribute fake installers via trusted platforms like YouTube and file hosting services. By employing encryption and social engineering, these attackers aim to evade detection and steal sensitive browser data from unsuspecting users. Affected: YouTube, Mediafire, Mega.nz, OpenSea, SoundCloud

Keypoints :

Attackers exploit user trust by using platforms like YouTube to share fake installer links.…
Read More
CryptBot: Hunting for initial access vector –
Summary: CryptBot, an infostealer malware, continues to proliferate primarily through fake cracked software and Pay-Per-Install services, posing significant threats to users’ sensitive information. Despite legal actions by Google, new domains for CryptBot’s command-and-control infrastructure have emerged, indicating ongoing challenges in combating this malware.

Threat Actor: CryptBot Operators | CryptBot Operators Victim: Users of Cracked Software | users of cracked software

Key Point :

CryptBot is primarily distributed through fake cracked software and Pay-Per-Install solutions like PrivateLoader.…
Read More

Modern ransomware attacks have shifted to sophisticated double extortion tactics, where sensitive data is exfiltrated before encryption, increasing pressure on victims. The financial impact of these breaches is significant, with average costs reaching $4.88 million. Early detection of unusual internal data-copying activities is crucial for organizations to defend against these evolving threats.…
Read More

Threat Actor: Identity Fraud Criminals | Identity Fraud Criminals Victim: Individuals Selling Biometric Data | Individuals Selling Biometric Data Price: Varies (Individuals compensated for their data) Exfiltrated Data Type: Authentic identity documents and biometric data

Key Points :

The operation involves a clandestine group amassing authentic identity documents and corresponding facial images.…
Read More

Summary :

Kaspersky’s GERT team uncovered a cyber incident involving the exploitation of a known Fortinet vulnerability (CVE-2023-48788) leading to unauthorized access and deployment of remote access tools. The incident highlights the importance of timely patching and monitoring of exposed systems. #CyberSecurity #VulnerabilityManagement #IncidentResponse

Keypoints :

Attackers exploited a patched Fortinet vulnerability (CVE-2023-48788) to infiltrate a company’s network.…
Read More

Summary :

The recent disruption of the Rockstar2FA phishing-as-a-service platform has led to the emergence of a similar service called FlowerStorm, which displays striking similarities to its predecessor. The transition highlights ongoing challenges in the phishing landscape as operators adapt to technical setbacks. #Phishing #CyberSecurity #FlowerStorm

Keypoints :

Rockstar2FA, a phishing-as-a-service platform, experienced a significant infrastructure collapse in November.…
Read More

Summary :

Rapid7’s analysis uncovered a sophisticated multi-stage attack exploiting Cleo software, utilizing a Java-based Remote Access Trojan (RAT) for reconnaissance and data exfiltration. #CleoExploitation #JavaRAT #CyberThreats

Keypoints :

A novel multi-stage attack was identified targeting Cleo software, deploying an encoded Java Archive (JAR) payload. The attack involves a modular Java-based Remote Access Trojan (RAT) for system reconnaissance and file exfiltration.…
Read More

### #BulletproofHosting #Proton66 #MaliciousInfrastructure

Summary: This report investigates the connections between the Russian autonomous systems PROSPERO and Proton66, highlighting their involvement in various cybercriminal activities, including malware distribution and phishing campaigns. The findings suggest a sophisticated network of bulletproof hosting services facilitating these malicious operations.

Threat Actor: Proton66 | Proton66 Victim: Various individuals and organizations | phishing victims

Key Point :

PROSPERO and Proton66 share similar network configurations and peering agreements, indicating a strong operational link.…
Read More

Summary: Lumifi has announced its acquisition of Critical Insight, marking its third acquisition in 13 months, which enhances its incident response capabilities and strengthens its position in the healthcare and critical infrastructure cybersecurity sectors. This strategic move aims to meet the growing demand for advanced cybersecurity solutions as cyber attacks in the healthcare sector increase.…

Read More

Summary: GootLoader has evolved from a tool used by cybercriminals to an initial access-as-a-service platform, facilitating the deployment of information stealers and ransomware through SEO poisoning techniques. Recent investigations have uncovered a new variant of GootLoader, showcasing its sophisticated methods of delivering malicious payloads via compromised websites.…

Read More

Summary:

GootLoader has evolved into an initial access as a service platform, primarily used by cybercriminals to deliver GootKit, a sophisticated info stealer and remote access Trojan. Utilizing SEO poisoning techniques, GootLoader entices victims to download malicious payloads disguised as legitimate files, leading to further exploitation and potential ransomware deployment.…
Read More

Summary: Socure is set to acquire Effectiv for $136 million to enhance its identity verification and onboarding processes, aiming to streamline services and boost revenue. The integration will allow Socure to offer a unified platform experience, improving customer workflows and security protocols.

Threat Actor: Socure | Socure Victim: Effectiv | Effectiv

Key Point :

Socure’s acquisition of Effectiv aims to enhance enterprise-grade identity verification tools and improve customer experience.…
Read More