North Korea-linked APT groups target South Korean defense contractors
Security Affairs
by Pierluigi Paganini
6h ago
The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting defense industry entities. The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting defense industry entities to steal defense technology information. North Korea-linked APT groups Lazarus, Andariel, and Kimsuky hacked multiple defense companies in South Korea, reported the National Police Agency. The state-sponsored hackers hacked into the subcontractors of defense companies by exploiting vulnerabilities in the targeted systems and deployed malware. “N ..read more
Visit website
U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity
Security Affairs
by Pierluigi Paganini
17h ago
The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the commercial spyware business. The US Department of State is imposing visa restrictions on 13 individuals involved in the development and sale of commercial spyware or their immediate family members. The measure aims to counter the misuse of surveillance technology targeting journalists, academics, human rights defenders, dissidents, and US Government personnel, as documented in the Country Reports on Human Rights Practices. “the Department is taking steps to impose visa restrictions on 13 individual ..read more
Visit website
Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw
Security Affairs
by Pierluigi Paganini
1d ago
Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler service flaw. Microsoft reported that the Russia-linked APT28 group (aka “Forest Blizzard”, “Fancybear” or “Strontium” used a previously unknown tool, dubbed GooseEgg, to exploit the Windows Print Spooler flaw CVE-2022-38028. Since at least June 2020, and possibly earlier, the cyberespionage group has used the tool GooseEgg to exploit the CVE-2022-38028 vulnerability. This tool modifies a JavaScript constraints file and executes it with SYSTEM-level permissions. Microsoft has observed AP ..read more
Visit website
Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities
Security Affairs
by Pierluigi Paganini
2d ago
A financially motivated group named GhostR claims the theft of a sensitive database from World-Check and threatens to publish it. World-Check is a global database utilized by various organizations, including financial institutions, regulatory bodies, and law enforcement agencies, for assessing potential risks associated with individuals and entities. It compiles information from diverse sources like public records, regulatory filings, and proprietary databases to create profiles of entities susceptible to financial crime, terrorism, or corruption. World-Check aids organizations in conducting d ..read more
Visit website
Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities
Security Affairs
by Pierluigi Paganini
2d ago
Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve rootkit-like capabilities. SafeBreach researcher Or Yair devised a technique, exploiting vulnerabilities in the DOS-to-NT path conversion process, to achieve rootkit-like capabilities on Windows. When a user executes a function with a path argument in Windows, the DOS path of the file or folder is converted to an NT path. However, a known issue arises during this conversion process where the function removes trailing dots from any path element and trailing spaces from the last pat ..read more
Visit website
A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites
Security Affairs
by Pierluigi Paganini
2d ago
Japan’s CERT warns of a vulnerability in the Forminator WordPress plugin that allows unrestricted file uploads to the server. Japan’s CERT warned that the WordPress plugin Forminator, developed by WPMU DEV, is affected by multiple vulnerabilities, including a flaw that allows unrestricted file uploads to the server. Forminator is a popular WordPress plugin that allows users to easily create various forms for their website without needing any coding knowledge. The plugin is installed in over 500,000. One of these vulnerabilities is a critical issue, tracked as CVE-2024-28890 (CVSS v3: 9.8 ..read more
Visit website
Akira ransomware received $42M in ransom payments from over 250 victims
Security Affairs
by Pierluigi Paganini
2d ago
Government agencies revealed that Akira ransomware has breached over 250 entities worldwide and received over $42 million in ransom payments. A joint advisory published by CISA, the FBI, Europol, and the Netherlands’ National Cyber Security Centre (NCSC-NL) revealed that since early 2023, Akira ransomware operators received $42 million in ransom payments from more than 250 victims worldwide. The Akira ransomware has been active since March 2023, the threat actors behind the malware claim to have already hacked multiple organizations in multiple industries, including education, financ ..read more
Visit website
Security Affairs newsletter Round 468 by Pierluigi Paganini – INTERNATIONAL EDITION
Security Affairs
by Pierluigi Paganini
3d ago
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Critical CrushFTP zero-day exploited in attacks in the wild A French hospital was forced to reschedule procedures after cyberattack MITRE revealed that nation-state actors breached its systems via Ivanti zero-days FBI chief says China is preparing to attack US critical infrastructure United Nations Development Programme (UNDP) investi ..read more
Visit website
Critical CrushFTP zero-day exploited in attacks in the wild
Security Affairs
by Pierluigi Paganini
3d ago
Threat actors exploited a critical zero-day vulnerability in the CrushFTP enterprise in targeted attacks, Crowdstrike experts warn. CrushFTP is a file transfer server software that enables secure and efficient file transfer capabilities. It supports various features such as FTP, SFTP, FTPS, HTTP, HTTPS, WebDAV, and WebDAV SSL protocols, allowing users to transfer files securely over different networks. CrushFTP also provides support for automation, scripting, user management, and extensive customization options to meet the diverse needs of businesses and organizations. CrushFTP has notified us ..read more
Visit website
A French hospital was forced to reschedule procedures after cyberattack
Security Affairs
by Pierluigi Paganini
3d ago
A French hospital was forced to return to pen and paper and postpone medical treatments after a cyber attack. A cyber attack hit Hospital Simone Veil in Cannes (CHC-SV) on Tuesday, impacting medical procedures and forcing personnel to return to pen and paper. The Hospital Simone Veil in Cannes is a public hospital located in Cannes, France. The hospital provides a range of medical services and healthcare facilities to the local community and surrounding areas. CHC-SV has more than 2,000 employees and has a capacity of more than 800 beds. The website of the hospital states that ..read more
Visit website

Follow Security Affairs on FeedSpot

Continue with Google
Continue with Apple
OR