Uncategorized

Facebook, Instagram appear to partly reconnect after nearly six-hour outage

post credit: Reuters.com Facebook and Instagram appeared to be partially reconnected to the global internet on Monday afternoon, nearly six hours into an outage that paralyzed the social media platform. Facebook and its WhatsApp and Instagram apps went dark at around noon Eastern time, in what website monitoring group Downdetector said was the largest such failure it had ever seen, with 10.6 million problem reports globally. Oct 4 (Reuters) – Facebook and Instagram appeared to be partially reconnected to the global internet on Monday afternoon, nearly six hours into an outage that paralyzed the social media platform. Facebook and its WhatsApp and Instagram apps went dark at around noon Eastern time, in what website monitoring group Downdetector said was the largest such failure it had ever seen, with 10.6 million problem reports globally. Around 5:45 pm ET, some Facebook users began to regain partial access to the social media app. WhatsApp continued to have connection problems for at least some people. The outage was the second blow to the social media giant in as many days after a whistleblower on Sunday accused the company of repeatedly prioritizing profit over clamping down on hate speech and misinformation. Shares of Facebook, which has nearly 2 billion daily active users, opened lower after the whistleblower report and slipped further to trade down 5.3% in afternoon trading on Monday. They were on track for their worst day in nearly a year, amid a broader selloff in technology stocks. Security experts said the disruption could be the result of an internal mistake, though sabotage by an insider would be theoretically possible. “Facebook basically locked its keys in its car,” tweeted Jonathan Zittrain, director of Harvard’s Berkman Klein Center for Internet & Society.

Facebook, Instagram appear to partly reconnect after nearly six-hour outage Read More »

Hackers Target Indian Military with Spyware Loaded in Dating and Communication Apps

News Credit: Cyware An active spyware campaign has been discovered that is mainly targeting Indian military personnel. The spyware campaign has been active since January and detected in dating and instant messaging apps. According to researchers, the recent version of PJobRAT spyware was first observed in December 2019. What has happened? Cyble and 360 Core Security Lab have recently detected the PJobRAT spyware and claimed that the spyware samples are disguised as Android dating apps. During their investigation, researchers detected that this recent variant is disguising as a dating app known as Trendbanter, as well as the Signal app, for non-resident Indians. In some of the cases, the spyware mimics other apps to fool unsuspecting users, such as HangOn, SignalLite, Rita, and Ponam. Moreover, through third-party app stores and other mediums, including malicious URLs and SMS, the attackers had accomplished their propagation goals in which they distributed multiple spyware. To hide in the app list, it imitates WhatsApp or any legitimate-looking app. However, the most unusual thing is that it doesn’t even have the exact icon shown in the app store with the installed one. About PJobRAT  The researchers who detected the recent operation did not link it to any of the hacker groups currently. However, the specific nature of the targets hint at China- or Pakistan-based actors. PJobRAT exfiltrates .pdf, .doc, .docx, .xls, .xlsx, .ppt, and .pptx files from the infected devices. It uploads address books, SMS, audio files, video files, and image files.  Additionally, it uploads a list of installed apps, WiFi/GPS information, geographic location, external storage files, phone number, WhatsApp contacts/messages, and recording via the mic or camera. Conclusion According to recent findings, the attackers behind this spyware are not sophisticated ones since their private servers are accessible publicly where they are holding the exfiltrated data. However, it doesn’t undermine the fact that it is still active and poses a danger to unsuspecting users.

Hackers Target Indian Military with Spyware Loaded in Dating and Communication Apps Read More »

Cisco Smart Switches Detected with Vulnerabilities

News Credit: e hacking news In Cisco’s Small Business 220 Series smart switches a researcher has uncovered various vulnerabilities, especially those with high severity assessments. This Monday, the networking giant advised its consumers that patches for these vulnerabilities are available.  The impact switch runs firmware versions earlier than 1.2.0.6 and has the web-based management interface enabled.  Cisco Systems, Inc. is a US conglomerate based in San Jose, California, in the Silicon Valley center. Cisco designs manufacture and distribute high-tech services and products for networking hardware, software, telecommunications equipment, and others.  Security researcher Jasper Lievisse Adriaanse has identified the vulnerabilities. He discovered four kinds of safety holes on the small enterprise switch as published in a notice by Cisco.  One can be used by a remote, unverified attacker, tracked as CVE-2021-1542, which is rated as high severity to take over the user session and obtain access to the web portal of a switch. The attacker could acquire managerial access to the management interface, based on the rights of the potential customer.  Another high-severity problem is CVE-2021-1541, which enables a remote device attacker with admin access to perform arbitrary root-privileged commands on the operating system underneath it. The two other weaknesses identified by the investigator, both of which were Cisco’s medium severity, might allow a remote attacker to initiate XSS (CVE-2021-1543) or HTML injection attacks (CVE-2021-1571).  “[In the case of the] XSS flaw, the vector which I tested and verified was by exploiting a vulnerability in how certain packets which are only valid on the same L2 domain are parsed,” Adriaanse explained. He added, “It should be possible, if you’re on the same L2 domain, to perform the XSS attack through CVE-2021-1543, obtain the CSRF token and perform arbitrary actions as the logged-in user. As I don’t write a lot of Javascript I didn’t attempt to write a payload to subsequently exploit CVE-2021-1541. Note however that due to lacking Content-Security-Policy headers you can use CVE-2021-1543 to include remote Javascript code. So you’re not limited by the packet size of the abused L2 protocol. I guess with enough experience and determination one could concoct a payload to do anything in the UI.”  The XSS defect is due to inspections by the web-based management interface of the device being submitted by the user. An attacker could use this error by deceiving the victims into clicking a malicious link and accessing a certain page. The attacker may induce weakness in running arbitrary script code in connection with the affected interface or access sensitive, browser-based information. The HTML Injection Vulnerability is caused by faulty parameter checks on affected pages. In order to address certain vulnerabilities, Cisco has published software updates.  Thank you… 🙂

Cisco Smart Switches Detected with Vulnerabilities Read More »

North Korea Exploited VPN Flaw to Hack South’s Nuclear Research Institute

Post Credit: thecybersecurity news South Korea’s condition-operate Korea Atomic Vitality Analysis Institute (KAERI) on Friday disclosed that its interior network was infiltrated by suspected attackers running out of its northern counterpart. The intrusion is mentioned to have taken position on May possibly 14 via a vulnerability in an unnamed digital personal network (VPN) seller and concerned a complete of 13 IP addresses, a person of which — “27.102.114[.]89” — has been earlier connected to a state-sponsored risk actor dubbed Kimsuky. KAERI, proven in 1959 and positioned in the metropolis of Daejeon, is a federal government-funded research institute that designs and develops nuclear technologies relevant to reactors, fuel rods, radiation fusion, and nuclear protection. Next the intrusion, the consider tank said it took measures to block the attacker’s IP addresses in concern and used essential security patches to the susceptible VPN answer. “Currently, the Atomic Strength Investigation Institute is investigating the issue of the hacking and the amount of money of hurt,” the entity mentioned in a assertion. The improvement will come pursuing a report from SISA Journal, which disclosed the breach, alleging that the company was trying to address up the hack by denying such an incident took position. KAERI attributed it to a “mistake in the response of the working-level workers.” Lively due to the fact 2012, Kimsuky (aka Velvet Chollima, Black Banshee, or Thallium) is a North Korean risk actor recognized for its cyberespionage campaigns concentrating on assume tanks and nuclear electrical power operators in South Korea. Before this thirty day period, cybersecurity business Malwarebytes disclosed a wave of attacks undertaken by the adversary to strike large-profile authorities officials in the state by setting up an Android and Windows backdoor named AppleSeed for amassing important information and facts. The specific entities associated the Ministry of Overseas Affairs, Ambassador of the Embassy of Sri Lanka to the Condition, Intercontinental Atomic Strength Agency (IAEA) Nuclear Security Officer, and the Deputy Consul Basic at Korean Consulate Basic in Hong Kong, with the aforementioned IP deal with used for command-and-control (C2) communications. It is not immediately distinct what VPN vulnerability was exploited to breach the network. But it’s really worth noting that unpatched VPN techniques from Pulse Secure, SonicWall, Fortinet FortiOS, and Citrix have been subjected to attacks by various threat actors in new yrs. Thanks you for reading …. 🙂

North Korea Exploited VPN Flaw to Hack South’s Nuclear Research Institute Read More »

Conti Ransomware Gang: An Summery

Post Credit: palo alto networks Conti ransomware stands out as one of the most ruthless of the dozens of ransomware gangs that we follow. The group has spent more than a year attacking organizations where IT outages can have life-threatening consequences: hospitals, 911 dispatch carriers, emergency medical services and law enforcement agencies. Ireland has yet to recover from an attack in mid-May that prompted the shutdown of the entire information technology network of the nation’s healthcare system – prompting cancellation of appointments, the shutdown of X-ray systems and delays in COVID testing. Conti also stands out as unreliable. We’ve seen the group stiff victims who pay ransoms, expecting to be able to recover their data. The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million. This makes Conti one of the greediest groups out there. Conti Ransomware Overview Some researchers from paloaltonetwork followed Conti for more than a year through our work helping organizations respond to ransomware attacks. It appears to be one of many private cybercrime groups that have set up their operations by leveraging the booming ransomware-as-a-service (RaaS) ecosystem. Such gangs obtain their foothold in the networks of their victims by purchasing access from other threat actors, who sell it as a commodity. They can also procure infrastructure, malware, communications tools and money laundering from other RaaS providers. Most of these actors use the same methods of access found in many ransomware attacks, such as phishing emails and exploiting unprotected internet-facing applications, the lack of multi-factor authentication (MFA), as well as the typical avenues used to preserve and enhance access once it’s achieved, such as through the use of Cobalt Strike or PowerShell. These approaches are not particularly clever or sophisticated, but often they are effective. Conti’s methodology often follows the “double extortion” approach that many leading ransomware groups are presently using. When using double extortion, attackers will not only lock up a victim’s files and demand ransom, but they will also steal files and threaten to publish them on a website or otherwise leak them if their initial ransom demand is not met. But Conti’s methods do have atypical elements. Usually, the more successful ransomware operators put a lot of effort into establishing and maintaining some semblance of “integrity” as a way of facilitating ransom payments from victims. They want to establish stellar reputations for “customer service” and for delivering on what they promise – that if you pay a ransom, your files will be decrypted (and they will not appear on a leak website). Yet in our experience helping clients remediate attacks, Conti has not demonstrated any signs that it cares about its reputation with would-be victims. In one recent case, Conti did not return a client’s files who had paid the ransom. This client got only a small fraction of the file restorations that were promised before the Conti ransomware representatives disappeared back into the dark web. In another case, our client needed an inventory of all files accessed, so that they could notify parties whose data was affected. Conti agreed to share that information if a payment was made, then changed their minds, saying, “We do not own that data anymore. It was deleted and there is no chance to restore it.” Like many ransomware gangs, Conti is constantly adapting to changes, including recent heightened scrutiny by law enforcement and policy makers following high-profile disruptive attacks on the Colonial pipeline and healthcare organizations. When Ireland’s healthcare system refused to pay any ransom, Conti provided the agency with what it said was a free decryption key. But there was a twist: The group maintained that it would still make good on its “double extortion” threat to publish stolen data on its leak site. Conclusion Unfortunately, keeping Conti out of your network often isn’t simple. A primary means of infection appears to be through phishing scams, and attackers are constantly upping their game in this area. While phishing emails used to be pretty easy for almost anyone to spot, particularly after some awareness training, we are seeing increasingly sophisticated attacks in which the threat actors have done plenty of homework on their intended victims. Sometimes they’ll send a blitz of scam emails to employees throughout an organization, and it takes only one to open the attachment and release the malware into the network. Ransomware attacks are getting easier to unleash, and the rewards to the attackers are still growing by leaps and bounds. Accordingly, it continues to be a growth industry that will attract multitudes of new practitioners, and it is likely that high-profile targets will continue to fall. Palo Alto Networks detects and prevents Conti ransomware in the following ways: WildFire: All known samples are identified as malware. Cortex XDR with: Indicators for Conti ransomware. Anti-Ransomware Module to detect Conti ransomware encryption behaviors. Local Analysis detection for Conti binaries. Next-Generation Firewalls: DNS Signatures detect the known Conti ransomware command and control (C2) domains, which are also categorized as malware in Advanced URL Filtering. AutoFocus: Tracking related activity using the Conti tag. Unit 42 Security Consulting: The Ransomware Readiness Assessment detects any hidden threats, tests for preparedness and provides remediation recommendations. Additionally, Indicators of Compromise (IoCs) associated with Conti are available on GitHub, and have been published to the Unit 42 TAXII feed. Thank you …. 🙂

Conti Ransomware Gang: An Summery Read More »