### #BulletproofHosting #Proton66 #MaliciousInfrastructure

Summary: This report investigates the connections between the Russian autonomous systems PROSPERO and Proton66, highlighting their involvement in various cybercriminal activities, including malware distribution and phishing campaigns. The findings suggest a sophisticated network of bulletproof hosting services facilitating these malicious operations.

Threat Actor: Proton66 | Proton66 Victim: Various individuals and organizations | phishing victims

Key Point :

PROSPERO and Proton66 share similar network configurations and peering agreements, indicating a strong operational link.…
Read More

Summary: Team AXON has identified an ongoing threat campaign named “VEILDrive,” which exploits Microsoft SaaS services for malicious activities, including a unique OneDrive-based Command & Control (C&C) method. The campaign is believed to originate from Russia and has prompted Team AXON to alert Microsoft and affected organizations to mitigate further risks.…

Read More

Summary:

Hunters’ Team AXON has identified an ongoing threat campaign named “VEILDrive,” which exploits Microsoft SaaS services to conduct spear-phishing attacks and malware deployment. The campaign employs a unique OneDrive-based Command & Control method, indicating a probable Russian origin. Team AXON has reported findings to Microsoft and affected organizations to mitigate further risks.…
Read More

Summary: Concentric AI, a data security startup, has raised $45 million in Series B funding to enhance its capabilities in identity governance, risk monitoring, and breach investigations using large language models. The company aims to expand its market reach and establish itself as a leader in the data security sector by leveraging innovative technologies and strengthening partnerships.…

Read More

Cyber Resiliency Summary

Summary

The video discusses the concept of cyber resiliency, which is the ability of an organization to quickly and effectively recover from a cyber attack. With the increasing complexity and frequency of these attacks, it’s crucial for everyone involved in data management to understand and implement strategies for enhanced cyber resilience.…

Read More
Short Summary: In a recent malware campaign targeting Russian-speaking users, attackers have been using unconventional methods to mine cryptocurrency on victims’ devices without consent. They exploit popular software download sites, Telegram channels, and YouTube videos to distribute malicious files. The infection chain involves sophisticated techniques for persistence and evasion, including the use of a legitimate SIEM agent, Wazuh, as a backdoor.…
Read More
Short Summary

In March 2024, Elastic Security Labs uncovered a sophisticated Linux malware campaign targeting vulnerable servers. The attackers exploited an Apache2 web server to gain initial access and deployed various malware, including KAIJI and RUDEDEVIL, for DDoS attacks and cryptocurrency mining. The investigation revealed potential money laundering activities through compromised hosts and highlighted the attackers’ use of advanced techniques for persistence, privilege escalation, and command and control communication.…

Read More

Short Summary:

Huntress analysts have identified various indicators and tactics used in Akira ransomware attacks, highlighting the importance of early detection and monitoring. The analysis reveals that threat actors often create new user accounts, exploit vulnerabilities in MSSQL servers, and utilize RDP for unauthorized access. Recommendations include conducting asset inventories and enhancing monitoring to prevent ransomware deployment.…

Read More

Threat Actor: Mr. Hamza | Mr. Hamza Victim: Turkey | Turkey Price: Not specified Exfiltrated Data Type: Sensitive data from Turkish entities, personal data of Turkish citizens

Key Points :

The operation is named #Ops_Turkia, described as a “warning operation.” The threat actor aims to leak sensitive data from high-profile Turkish entities, including intelligence services and defense companies.…
Read More

Short Summary:

Medusa is a Ransomware-as-a-Service (RaaS) targeting Windows environments, active since June 2021. It gained attention in early 2023 with the launch of its Dedicated Leak Site. Medusa spreads through exploiting vulnerabilities and hijacking accounts, utilizing advanced techniques to evade detection. Security teams are encouraged to validate their defenses against Medusa’s tactics using new tools from AttackIQ.…

Read More

Short Summary:

The article discusses the challenges organizations face in cybersecurity due to fragmented detection tools and the need for comprehensive threat visibility. It highlights how Recorded Future’s Threat Intelligence Cloud Platform and Collective Insights can bridge these gaps by integrating diverse data sources, enhancing threat detection, and providing actionable intelligence to security teams.…

Read More

Summary: GitLab has released an urgent security update to address a critical vulnerability (CVE-2024-45409) affecting both Community and Enterprise Editions, which poses a severe risk by allowing unauthenticated attackers to forge SAML responses and gain unauthorized access to sensitive projects. The flaw is linked to improper signature verification in the Ruby-SAML library, necessitating immediate updates to prevent potential exploitation.…

Read More

Summary: The report by Command Zero highlights the significant challenges faced by SecOps leaders, particularly the skills gap in cybersecurity and the operational difficulties with commonly used tools. It emphasizes the need for investment in talent development and continuous learning to address these issues effectively.

Threat Actor: Command Zero | Command Zero Victim: Cybersecurity Professionals | Cybersecurity Professionals

Key Point :

There is a significant skills shortage in cybersecurity, particularly in cyber investigations, leading to burnout among existing teams.…
Read More
Short Summary

Rapid7 has been recognized as a Leader in the IDC MarketScape: Worldwide SIEM for SMB 2024 Vendor Assessment. The company highlights the unique features of its InsightIDR product, which addresses common challenges faced by traditional SIEMs, including complex deployments and high operational overhead. InsightIDR offers intuitive deployment, optimized threat detection, effective response capabilities, and a tangible return on investment.…

Read More
Short Summary: The FBI, CISA, and NSA have assessed that Russian GRU Unit 29155 is responsible for cyber operations targeting global entities for espionage and sabotage since 2020. They have utilized the WhisperGate malware against Ukrainian organizations since January 2022. Organizations are advised to implement security measures to mitigate these threats.…
Read More

Summary: Version 4.0.1 of the Payment Card Industry Data Security Standard (PCI DSS) introduces significant changes aimed at enhancing security in response to evolving technologies and threats, with a focus on vulnerability management and multi-factor authentication. Organizations must prepare for complex new requirements, many of which will take effect by April 2025, necessitating substantial changes in processes and technologies.…

Read More