Iranian Cyber Group TA453 Targets Jewish Leader with New AnvilEcho Malware – OfficialSarkar

Iranian Cyber Group TA453 Targets Jewish Leader with New AnvilEcho Malware – OfficialSarkar

Iranian state-sponsored threat actors have been observed orchestrating spear-phishing campaigns targeting a prominent Jewish figure starting in late July 2024 with the goal of delivering a new intelligence-gathering tool called AnvilEcho. Enterprise security company Proofpoint is tracking the activity under the name TA453, which overlaps with activity tracked by the broader cybersecurity community under the…

Researchers Uncover TLS Bootstrap Attack on Azure Kubernetes Clusters – OfficialSarkar

Researchers Uncover TLS Bootstrap Attack on Azure Kubernetes Clusters – OfficialSarkar

Aug 20, 2024Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have disclosed a security flaw impacting Microsoft Azure Kubernetes Services that, if successfully exploited, could allow an attacker to escalate their privileges and access credentials for services used by the cluster. “An attacker with command execution in a Pod running within an affected Azure Kubernetes Services…

Anatomy of an Attack – OfficialSarkar

Anatomy of an Attack – OfficialSarkar

In today’s rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to combat them is crucial. This article delves into the mechanics of a common application attack, using the infamous Log4Shell vulnerability as an example, and demonstrates how Application Detection and Response (ADR) technology…

Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor – OfficialSarkar

Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor – OfficialSarkar

Aug 20, 2024Ravie LakshmananVulnerability / Threat Intelligence A previously undocumented backdoor named Msupedge has been put to use against a cyber attack targeting an unnamed university in Taiwan. “The most notable feature of this backdoor is that it communicates with a command-and-control (C&C) server via DNS traffic,” the Symantec Threat Hunter Team, part of Broadcom,…

CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks – OfficialSarkar

CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks – OfficialSarkar

Aug 20, 2024Ravie LakshmananVulnerability / Ransomware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw impacting Jenkins to its Known Exploited Vulnerabilities (KEV) catalog, following its exploitation in ransomware attacks. The vulnerability, tracked as CVE-2024-23897 (CVSS score: 9.8), is a path traversal flaw that could lead to code execution. “Jenkins…

Blind Eagle Hackers Exploit Spear-Phishing to Deploy RATs in Latin America – OfficialSarkar

Blind Eagle Hackers Exploit Spear-Phishing to Deploy RATs in Latin America – OfficialSarkar

Aug 20, 2024Ravie LakshmananMalware / Cyber Espionage Cybersecurity researchers have shed light on a threat actor known as Blind Eagle that has persistently targeted entities and individuals in Colombia, Ecuador, Chile, Panama, and other Latin American nations. Targets of these attacks span several sectors, including governmental institutions, financial companies, energy and oil and gas companies….

Thousands of Oracle NetSuite Sites at Risk of Exposing Customer Information – OfficialSarkar

Thousands of Oracle NetSuite Sites at Risk of Exposing Customer Information – OfficialSarkar

Aug 20, 2024Ravie LakshmananEnterprise Security / Data Breach Cybersecurity researchers are warning about the discovery of thousands of externally-facing Oracle NetSuite e-commerce sites that have been found susceptible to leaking sensitive customer information. “A potential issue in NetSuite’s SuiteCommerce platform could allow attackers to access sensitive data due to misconfigured access controls on custom record…

Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware – OfficialSarkar

Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware – OfficialSarkar

Aug 19, 2024Ravie LakshmananMalvertising / Cybercrime Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. “These attacks are opportunistic in nature, targeting users seeking popular business software,” the Mandiant Managed Defense team said in a technical report. “The infection utilizes a trojanized MSIX installer, which executes…

New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia – OfficialSarkar

New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia – OfficialSarkar

Aug 19, 2024Ravie LakshmananThreat Intelligence / Cryptocurrency A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads like Gh0st RAT and Mimikatz. The Cyberint Research Team, which discovered the malware, said it’s distributed in the form of malicious installers for legitimate applications targeting Korean and Chinese speakers. There…

How to Automate the Hardest Parts of Employee Offboarding – OfficialSarkar

How to Automate the Hardest Parts of Employee Offboarding – OfficialSarkar

According to recent research on employee offboarding, 70% of IT professionals say they’ve experienced the negative effects of incomplete IT offboarding, whether in the form of a security incident tied to an account that wasn’t deprovisioned, a surprise bill for resources that aren’t in use anymore, or a missed handoff of a critical resource or…