THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 16-22)

Hold on tight, guys, because last week's cybersecurity environment was a rollercoaster! We watched everything from North Korean hackers dangling "dream jobs" to unveil a new virus, to a startling twist in the Apple vs. NSO Group dispute. Even the apparently routine realm of domain names and cloud setups has its share of drama. Let's go into the specifics and see what lessons we can learn from the last week.

⚡ Threat of the Week#

Raptor Train Botnet Dismantled: The U.S. authorities reported the destruction of the Raptor Train botnet managed by a China-linked threat actor known as Flax Typhoon. The botnet consisted of about 260,000 devices in June 2024, with victims dispersed over North America, Europe, Asia, Africa, and Oceania, and South America. It also traced the Flax Typhoon threat actor to a publicly-traded, Beijing-based corporation called as Integrity Technology Group.

πŸ”” Top News#

Lazarus outfit's New Malware: The North Korea-linked cyber espionage outfit known as UNC2970 (aka TEMP.Hermit) has been detected deploying job-themed phishing lures to target potential victims in energy and aerospace sectors and infect them with a previously unreported backdoor called MISTPEN. The activity is also documented as Operation Dream Job.

iServer and Ghost Dismantled: In yet another huge triumph for law enforcement agencies, Europol announced the dismantling of an international criminal network that exploited a phishing platform called iServer to unlock stolen or lost mobile phones. The agency, in conjunction with the Australian Federal Police (AFP), also eliminated an encrypted communications network dubbed Ghost that permitted severe and organized crime around the globe.

Iranian APT Acts as Initial Access Provider: An Iranian threat actor tagged as UNC1860 is serving as an initial access facilitator that offers remote access to target networks by introducing numerous passive backdoors. This access is then exploited by other Iranian hacker organizations linked with the Ministry of Intelligence and Security (MOIS).

Apple Drops litigation against NSO Group: Apple submitted a move to "voluntarily" abandon the litigation it's pursuing against Israeli commercial spyware provider NSO Group, claiming a changing risk environment that might lead to disclosure of crucial "threat intelligence" information. The case was filed in November 2021.

Phishing attempts Exploit HTTP Headers: A new wave of phishing attempts is leveraging refresh entries in HTTP headers to serve faked email login pages that are aimed to steal victims' credentials. Targets of the campaigns include entities in South Korea and the U.S.

πŸ“° Around the Cyber World#

Sandvine Leaves 56 "Non-democratic" Countries: Sandvine, the business behind middleboxes that have permitted the transmission of commercial spyware as part of highly-targeted assaults, said it has quit 32 countries and is in process of stopping operations in another 24 nations, citing increasing dangers to digital rights. Earlier in February, the corporation was listed to the U.S. Entity List. "The misuse of deep packet inspection technology is an international problem that threatens free and fair elections, basic human rights, and other digital freedoms we believe are inalienable," it stated. It did not release the list of nations it's quitting as part of the reorganization.

.mobi Domain Acquired for $20: Researchers at watchTowr Labs paid a modest $20 to buy a legacy WHOIS server domain linked with the .mobi top-level domain (TLD) and set up a WHOIS server on that domain. This led to the finding that approximately 135,000 distinct computers still queried the old WHOIS server during a five day period ending on September 4, 2024, including cybersecurity tools and mail servers for government, military and academic groups. The investigation also indicated that the TLS/SSL procedure for the whole .mobi TLD had been compromised as multiple Certificate Authorities (CAs) were discovered to be still utilizing the "rogue" WHOIS server to "determine the owners of a domain and where verification details should be sent." Google has subsequently urged for discontinuing the usage of WHOIS data for TLS domain verifications.

ServiceNow Misconfigurations Leak Sensitive Data: Thousands of firms are unwittingly disclosing secrets from their internal knowledge base (KB) articles via ServiceNow misconfigurations. AppOmni blamed the problem to "outdated configurations and misconfigured access controls in KBs," perhaps suggesting "a systematic misunderstanding of KB access controls or possibly the accidental replication of at least one instance's poor controls to another through cloning." ServiceNow has given instructions on how to set its instances to prohibit unauthenticated access to KB articles.

Google Cloud Document AI Flaw Fixed: Speaking of misconfigurations, researchers have revealed that too permissive settings in Google Cloud's Document AI service might be used by threat actors to break into Cloud Storage buckets and steal critical information. Vectra AI defined the issue as an instance of transitive access abuse.

Microsoft Plans End of Kernel Access for EDR Software: Following the massive fallout from the CrowdStrike update mishap in July 2024, Microsoft has highlighted Windows 11's "improved security posture and security defaults" that allow for more security capabilities to security software makers outside of kernel mode access. It also claimed it would engage with ecosystem partners to achieve "enhanced reliability without sacrificing security."

πŸ”₯ Cybersecurity Resources & Insights#

— Upcoming Webinars#

Zero Trust: Anti-Ransomware Armor: Join our next webinar with Zscaler's Emily Laufer for a deep dive into the 2024 Ransomware Report, revealing the newest trends, upcoming threats, and the zero-trust methods that can secure your enterprise. Don't become another statistic - Register today and fight back!

SIEM Reboot: From Overload to Oversight: Drowning in data? Your SIEM should be a lifeline, not another hassle. Join us to explore how traditional SIEM went wrong, and how a contemporary strategy may simplify security without losing performance. We'll look into the roots of SIEM, its contemporary issues, and our community-driven solutions to cut through the noise and empower your security. Register today for a new view on SIEM!

— Ask the Expert#

Q: How does Zero Trust vary fundamentally from conventional Perimeter Defense, and what are the primary obstacles and benefits of moving an organization from a Perimeter Defense model to a Zero Trust architecture?

A: Zero Trust and perimeter defense are two techniques to defend computer systems. Zero Trust is like having numerous locks on your doors AND verifying IDs at every room, meaning it trusts no one and continually validates everyone and everything attempting to access anything. It's wonderful for blocking hackers, even if they manage to get in, and works well when people operate from various areas or utilize cloud services. Perimeter defense is like having a sturdy wall around your fortress, concentrating on keeping the bad men out. But, if someone smashes through, they have unfettered access to everything within. This older technique suffers with today's risks and remote work scenarios. Switching to Zero Trust is like updating your security system, except it requires effort and money. It's worth it since it gives much greater protection. Remember, it's not just one item, but a whole new way of thinking about security, and you can start small and build up over time. Also, don't remove the wall totally, it's still helpful for basic defense.

— Cybersecurity Jargon Buster#

Polymorphic Malware: Imagine a clever infection that continuously altering its disguise (signature) to mislead your antivirus. It's like a chameleon, making it challenging to capture.

Metamorphic Malware: This one's much difficult! It's like a shapeshifter, not just changing clothing, but entirely shifting its physique. It rewrites its own code each time it infects, making it virtually hard for antivirus to spot.

— Tip of the Week#

"Think Before You Click" Maze: Navigate a sequence of decision points based on real-world circumstances, selecting the safest path to avoid phishing traps and other online risks.

Conclusion#

"To err is human; to forgive, divine." - Alexander Pope. But in the domain of cybersecurity, forgiving may be expensive. Let's learn from these failures, enhance our defenses, and maintain the digital world a safer place for everybody.

Post a Comment