Law enforcement operation dismantled phishing-as-a-service platform LabHost
Security Affairs
by Pierluigi Paganini
3h ago
An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost. An international law enforcement operation, codenamed Nebulae and coordinated by Europol, led to the disruption of LabHost, which is one of the world’s largest phishing-as-a-service platforms. Law enforcement from 19 countries participated in the operation which resulted in the arrest of 37 individuals. The phishing-as-a-service platform was available on the clear web and has been shut down by the police. Between April 14th and April 17th, law enforcement agencies conducted ..read more
Visit website
Previously unknown Kapeka backdoor linked to Russian Sandworm APT
Security Affairs
by Pierluigi Paganini
6h ago
Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since 2022. WithSecure researchers identified a new backdoor named Kapeka that has been used in attacks targeting victims in Eastern Europe since at least mid-2022. The backdoor is very sophisticated, it serves as both an initial toolkit and as a backdoor for maintaining long-term access to compromised systems. The nature of the targets, low detection rate, and sophisticated malware-supported features suggest that an APT group developed it. WithSecure noticed overlaps bet ..read more
Visit website
Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available
Security Affairs
by Pierluigi Paganini
10h ago
Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly available exploit code exists. Cisco has addressed a high-severity Integrated Management Controller (IMC) vulnerability and is aware of a public exploit code for this issue. The PoC exploit code allows a local attacker to escalate privileges to root. Cisco Integrated Management Controller (IMC) is a baseboard management controller (BMC) that provides embedded server management for Cisco UCS C-Series Rack Servers and Cisco UCS S-Series Storage Servers. The vulnerability, tracked as ..read more
Visit website
Linux variant of Cerber ransomware targets Atlassian servers
Security Affairs
by Pierluigi Paganini
22h ago
Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. At the end of October 2023, Atlassian warned of a critical security flaw, tracked as CVE-2023-22518 (CVSS score 9.1), that affects all versions of Confluence Data Center and Server. The vulnerability is an improper authorization issue that can lead to significant data loss if exploited by an unauthenticated attacker. Cado Security Labs recently became aware that Cerber ransomware is being deployed into Confluence servers via the CV ..read more
Visit website
Ivanti fixed two critical flaws in its Avalanche MDM
Security Affairs
by Pierluigi Paganini
1d ago
Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can lead to remote command execution. Ivanti addressed multiple flaws in its Avalanche mobile device management (MDM) solution, including two critical flaws, tracked as CVE-2024-24996 and CVE-2024-29204, that can lead to remote command execution. The MDM software allows administrators to configure, deploy, update, and maintain up to 100,000 mobile IT assets all in one system. Below is the description for the two vulnerabilities: CVE-2024-24996 (CVSS score 9.8) – A Heap overflow vulnera ..read more
Visit website
Researchers released exploit code for actively exploited Palo Alto PAN-OS bug
Security Affairs
by Pierluigi Paganini
2d ago
Researchers released an exploit code for the actively exploited vulnerability CVE-2024-3400 in Palo Alto Networks’ PAN-OS. Researchers at watchTowr Labs have released a technical analysis of the vulnerability CVE-2024-3400 in Palo Alto Networks’ PAN-OS and a proof-of-concept exploit that can be used to execute shell commands on vulnerable firewalls. CVE-2024-3400 (CVSS score of 10.0) is a critical command injection vulnerability in Palo Alto Networks PAN-OS software. An unauthenticated attacker can exploit the flaw to execute arbitrary code with root privileges on affected firewalls. This ..read more
Visit website
Cisco warns of large-scale brute-force attacks against VPN and SSH services
Security Affairs
by Pierluigi Paganini
2d ago
Cisco Talos warns of large-scale brute-force attacks against a variety of targets, including VPN services, web application authentication interfaces and SSH services.   Cisco Talos researchers warn of large-scale credential brute-force attacks targeting multiple targets, including Virtual Private Network (VPN) services, web application authentication interfaces and SSH services since at least March 18, 2024.   Below is a list of known affected services:  Cisco Secure Firewall VPN  Checkpoint VPN   Fortinet VPN   SonicWall VPN   RD Web Services ..read more
Visit website
PuTTY SSH Client flaw allows of private keys recovery
Security Affairs
by Pierluigi Paganini
2d ago
The PuTTY Secure Shell (SSH) and Telnet client are impacted by a critical vulnerability that could be exploited to recover private keys. PuTTY tools from 0.68 to 0.80 inclusive are affected by a critical vulnerability, tracked as CVE-2024-31497, that resides in the code that generates signatures from ECDSA private keys which use the NIST P521 curve. An attacker can exploit the vulnerability to recover NIST P-521 private keys. “The effect of the vulnerability is to compromise the private key. An attacker in possession of a few dozen signed messages and the public key has enough inform ..read more
Visit website
A renewed espionage campaign targets South Asia with iOS spyware LightSpy
Security Affairs
by Pierluigi Paganini
2d ago
Researchers warn of a renewed cyber espionage campaign targeting users in South Asia with the Apple iOS spyware LightSpy Blackberry researchers discovered a renewed cyber espionage campaign targeting South Asia with an Apple iOS spyware called LightSpy. The sophisticated mobile spyware has resurfaced after several months of inactivity, the new version of LightSpy, dubbed “F_Warehouse”, supports a modular framework with extensive spying capabilities. LightSpy can steal files from multiple popular applications like Telegram, QQ, and WeChat, as well as personal documents and media stored on ..read more
Visit website
Misinformation and hacktivist campaigns targeting the Philippines skyrocket
Security Affairs
by Pierluigi Paganini
2d ago
Amidst rising tensions with China in the SCS, Resecurity observed a spike in malicious cyber activity targeting the Philippines in Q1 2024. Amidst rising tensions with China in the South China Sea, Resecurity has observed a significant spike in malicious cyber activity targeting the Philippines in Q1 2024, increasing nearly 325% compared to the same period last year. The number of cyberattacks involving hacktivist groups and foreign misinformation campaigns has nearly tripled. In Q2 2024, this growth trajectory continues, with Resecurity observing multiple cyberattacks staged by previousl ..read more
Visit website

Follow Security Affairs on FeedSpot

Continue with Google
Continue with Apple
OR