Summary: GitLab has released a critical security update to address a severe vulnerability (CVE-2024-45409) affecting its Community and Enterprise Editions, which could allow unauthorized access through SAML authentication flaws. Administrators are urged to upgrade to the latest patched versions to mitigate potential exploitation risks.

Threat Actor: Unknown | unknown Victim: GitLab users | GitLab

Key Point :

GitLab’s vulnerability arises from improper validation of SAML responses, allowing attackers to bypass authentication.…
Read More

Short Summary:

This article discusses a sophisticated phishing attack that impersonates a company’s human resources department. It highlights the tactics used by threat actors to deceive employees into clicking malicious links and entering their credentials on fake login pages. The article emphasizes the importance of vigilance and robust cybersecurity measures to combat such threats.…

Read More

Summary: Scattered Spider, a notorious ransomware group, has been executing sophisticated phishing attacks targeting financial and insurance companies to steal credentials and launch ransomware attacks on cloud environments. Their tactics include social engineering techniques such as smishing and vishing, which allow them to manipulate high-privileged accounts and bypass multifactor authentication.…

Read More

Short Summary:

EclecticIQ analysts have researched ransomware operations, particularly focusing on SCATTERED SPIDER, a group targeting cloud infrastructures in the insurance and financial sectors. They employ social engineering tactics, including phishing and smishing, to compromise high-privileged accounts. The group utilizes various methods to maintain persistent access and evade detection, leveraging cloud-native tools and exploiting vulnerabilities in cloud services.…

Read More

Summary: Lowe’s employees are being targeted by phishing attacks through malicious Google ads that mimic the company’s employee portal, MyLowesLife. These typosquatting websites are designed to steal employee credentials by presenting a convincing facade of the legitimate site.

Threat Actor: Unknown | unknown Victim: Lowe’s employees | Lowe’s employees

Key Point :

Malicious websites closely mimic the MyLowesLife portal, tricking employees into entering sensitive information.…
Read More

Short Summary:

Recently, an employee received a phishing email attempting to steal AWS login credentials. The email contained a link that redirected to a credential harvesting page mimicking the legitimate AWS sign-in page. While the employee recognized the phishing attempt, the investigation revealed several indicators of compromise and emphasized the importance of AWS security measures.…

Read More

“`html Short Summary:

The article discusses the rise of Account-in-the-Middle (AiTM) phishing attacks, particularly focusing on the NakedPages phishing toolkit. It outlines various techniques used by attackers to evade detection, including the use of legitimate SaaS services, Cloudflare Workers, and sophisticated redirection methods. The article emphasizes the challenges in detecting these attacks and suggests that traditional MFA methods are often insufficient against such tactics.…

Read More

Published On : 2024-07-26

EXECUTIVE SUMMARY

A recent update from CrowdStrike caused the Blue Screen of Death (BSOD) on many Windows computers globally, leading to widespread disruption. Cybercriminals quickly exploited the chaos, using phishing campaigns and malicious domains to deceive users.

The CYFIRMA Research team is continuously monitoring the ongoing situation and has carried out an analysis of the tactics, techniques & procedures (TTPs) on deployed malware and malicious campaigns of the threat actors.…

Read More

Summary: This blog post discusses a recent phishing attempt that impersonates a company’s HR department and provides insights to help recognize and avoid falling victim to such scams.

Threat Actor: Unknown | Unknown Victim: Employees | Employees

Key Point :

The phishing email impersonates the company’s HR department and arrives in the victim’s inbox with a subject line urging them to review the employee handbook.…
Read More

IntelBroker, a notorious figure known for orchestrating high-profile cyberattacks, operates within BreachForums. Specializing in identifying and selling access to compromised systems, sensitive data leaks, and possibly extortion, IntelBroker facilitates various malicious activities.

Most known profile picture of IntelBroker

BreachForums, IntelBroker’s long-time base, was recently taken down once again in an operation.…

Read More

Summary: This article discusses a cybercrime incident where a terminated worker unlawfully accessed patient information at Geisinger, a healthcare organization.

Threat Actor: Former employee of Nuance Communications Inc. | Nuance Communications Inc. Victim: Geisinger | Geisinger

Key Point :

An ex-employee of Nuance Communications Inc. has been indicted for unlawfully accessing patient information at Geisinger, a healthcare organization.…
Read More

Summary: The Scattered Spider gang has shifted their focus to stealing data from software-as-a-service (SaaS) applications and creating new virtual machines for persistence.

Threat Actor: Scattered Spider | Scattered Spider Victim: Various targets | Various targets

Key Point :

The Scattered Spider gang is known for engaging in social engineering attacks such as SMS phishing, SIM swapping, and account hijacking.…
Read More
Introduction

UNC3944 is a financially motivated threat group that carries significant overlap with public reporting of “0ktapus,” “Octo Tempest,” “Scatter Swine,” and “Scattered Spider,” and has been observed adapting its tactics to include data theft from software-as-a-service (SaaS) applications to attacker-owned cloud storage objects (using cloud synchronization tools), persistence mechanisms against virtualization platforms, and lateral movement via SaaS permissions abuse.…

Read More