logo
Hackers Target Middle East Governments with Evasive "CR4T" Backdoor

The Hacker News - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

Government entities in the Middle East are being targeted by a new backdoor called CR4T, part of a campaign named DuneQuixote, discovered by Kaspersky. The attackers use evasive techniques to avoid detection and analysis.
  • Government entities in the Middle East are under attack by a new backdoor called CR4T as part of the DuneQuixote campaign.
  • The attackers have implemented sophisticated evasion methods to prevent detection and analysis of their malware.
  • The attack starts with a dropper that extracts a command-and-control (C2) address using a novel decryption technique.
  • The dropper establishes connections with the C2 server and downloads a next-stage payload, which remains inaccessible without the correct user agent.
  • The CR4T backdoor allows attackers to execute commands, perform file operations, and communicate with the C2 server.
  • An additional Golang version of CR4T has been discovered, indicating that the threat actors are refining their techniques with cross-platform malware.
Tags:  
Middle East
CR4T
DuneQuixote
evasion techniques
Meta Is Already Training a More Powerful Successor to Llama 3

Wired (AI) - 1

Categories:  ai-ml

2024-04-19  

tldr - powered by Generative AI

Open source AI models are advancing rapidly and pushing the boundaries of artificial intelligence development, with Meta leading the way in releasing powerful models like Llama 3 to the public.
  • Meta released Llama 3, an open source AI model, which is touted as the most powerful model available for public use.
  • Yann LeCun, Meta's chief AI scientist, announced the development of an even more powerful successor to Llama 3, with potentially over 400 billion parameters.
  • Meta's open source AI strategy aims to accelerate the progress of generative AI and promote collaboration in the AI community.
  • Concerns have been raised about the potential misuse of open source AI models for developing harmful technologies, prompting the need for responsible AI development practices.
  • Experts emphasize the importance of open access to all aspects of AI models, including data, training, code, and evaluations, to enhance collective understanding and innovation in the field.
Tags:  
Open Source
Meta
Llama 3
collaboration
Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware

Dark Reading - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

The main thesis of the presentation is how a security researcher exploited Palo Alto Networks' XDR software, turning it into a perfect malware tool.
  • The researcher reverse-engineered and weaponized Palo Alto's Cortex product to deploy a reverse shell and ransomware.
  • The exploit highlighted the immense power and access granted to XDR solutions, posing a significant security risk.
  • Despite fixes made by Palo Alto, a vulnerability in storing Lua files in plaintext remained, leaving room for similar attacks on other XDR platforms.
  • Encryption of sensitive files in XDR solutions may not be an effective deterrent for attackers, as decryption is necessary for the software to function.
Tags:  
XDR software
exploitation
security vulnerabilities
Cyberattack Takes Frontier Communications Offline

Dark Reading - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

The importance of cybersecurity measures in protecting personally identifiable information (PII) in telecom companies like Frontier Communications.
  • Telecom companies like Frontier Communications are prime targets for cyberattacks due to the valuable PII they hold.
  • Cyberattacks can result in operational disruptions and the theft of sensitive data, leading to the shutdown of business operations.
  • Engaging cybersecurity experts, notifying law enforcement, and conducting thorough investigations are crucial steps in responding to cyber incidents.
  • Implementing robust cybersecurity measures is essential to safeguarding PII and preventing financial and operational impacts.
Tags:  
telecom companies
PII protection
cyberattacks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor

The Hacker News - 1

Categories:  security

2024-04-18  

tldr - powered by Generative AI

The main theme of the text is the discovery of a malware campaign targeting users searching for tools related to Google AdSense, utilizing malicious files and techniques to infect systems and establish a backdoor for command-and-control communication.
  • Malware operators identified creating accounts on criminal underground forums to distribute malicious files
  • Users searching for Google AdSense tools are targeted with bogus sites containing malicious JavaScript code
  • Malicious files, including DLL and executable, are used to infect systems and establish a backdoor for command-and-control communication
  • Backdoor utilizes DNS tunneling for C2 communication and employs evasive techniques to evade security solutions
Tags:  
malware
Google Adsense
backdoor
command-and-control
Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes

The Hacker News - 1

Categories:  security

2024-04-18  

tldr - powered by Generative AI

Hackers are exploiting critical vulnerabilities in OpenMetadata to mine cryptocurrency on Kubernetes, highlighting the importance of strong authentication methods and staying compliant with fully patched workloads in containerized environments.
  • Threat actors are actively exploiting vulnerabilities in OpenMetadata for cryptocurrency mining.
  • The vulnerabilities allow for authentication bypass and remote code execution.
  • Attackers deploy crypto-mining malware and establish command-and-control communications.
  • Users are advised to use strong authentication methods, avoid default credentials, and update to the latest version of OpenMetadata.
  • Publicly accessible Redis servers are also being targeted for post-exploitation with Metasploit payloads.
Tags:  
OpenMetadata
cryptocurrency
Kubernetes
vulnerabilities
Nigeria & Romania Ranked Among Top Cybercrime Havens

Dark Reading - 1

Categories:  security

2024-04-18  

tldr - powered by Generative AI

The main thesis of the conference presentation is that the World Cybercrime Index provides valuable insights for policymakers and diplomats to address cybercrime issues in different countries.
  • Data from the World Cybercrime Index is more useful for policymakers and diplomats than defenders.
  • Countries listed in the index may not be interested in reducing their cybercrime rank.
  • The index does not reflect recent major changes in the cyberthreat landscape.
  • Policies promoting technology sectors in countries with high cybercrime rankings could have a positive economic impact.
  • The index correlates with characteristics like GDP, income inequality, Internet penetration, and corruption.
  • Countries lower in the index provide insights into the factors enabling cybercriminal activity.
  • There is room for improvement in using the index to address cybercrime issues globally.
Tags:  
World Cybercrime Index
policymakers
diplomats
Economic Impact
Sneaky Shellcode: Windows Fibers Offer EDR-Proof Code Execution

Dark Reading - 1

Categories:  security

2024-04-18  

tldr - powered by Generative AI

The presentation discusses new malicious fiber execution techniques, including callstack masking and injecting payloads into dormant fibers, to evade detection by security tools.
  • New techniques like Phantom Thread and Poison Fiber improve on existing malicious fiber methods by hiding malicious activities from detection mechanisms.
  • Phantom Thread masquerades fibers as threads to avoid memory scans targeting fibers.
  • Poison Fiber injects payloads into dormant fibers, enabling remote code execution without suspending threads.
  • Fibers, although less common in modern computing, provide a stealthy way to execute malicious code as they are often overlooked by security tools.
  • Traditional detection mechanisms in EDR platforms and antivirus engines tend to ignore fibers, making them an attractive avenue for attackers.
Tags:  
malicious fiber execution
security evasion
stealth techniques
Recover from Ransomware in 5 Minutes—We will Teach You How!

The Hacker News - 1

Categories:  security

2024-04-18  

tldr - powered by Generative AI

Zerto provides unique capabilities for ransomware resilience, allowing for quick recovery and detection of suspicious activity to limit damage.
  • Zerto enables quick identification of infected machines and limits blast radius during a cyberattack.
  • Instant File Level Recovery feature allows for real-time restoration of files with minimal data loss.
  • Zerto's automation and orchestration capabilities streamline large-scale recoveries, making the process simple and fast.
  • Real-time encryption detection helps in identifying anomalous activity and providing early warning signals of a potential attack.
Tags:  
Zerto
ransomware resilience
recovery
suspicious activity detection
New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks

The Hacker News - 1

Categories:  security

2024-04-18  

tldr - powered by Generative AI

The new Android trojan 'SoumniBot' evades detection by using clever tricks in the manifest extraction and parsing process.
  • SoumniBot uses invalid Compression method values to write uncompressed data in the manifest file, tricking the Android APK parser.
  • The trojan misrepresents the manifest file size, causing the parser to ignore the 'overlay' data and only copy the 'uncompressed' file.
  • SoumniBot utilizes long XML namespace names in the manifest file to make it difficult for analysis tools to allocate enough memory.
  • The malware searches for digital certificates issued by Korean banks, a technique uncommon for Android banking malware.
  • SoumniBot is designed to collect and send sensitive information, manipulate device settings, and evade detection by hiding its icon.
Tags:  
Android
trojan
SoumniBot
manifest extraction
parsing

About

Hack Dojo offers access to over 3,000 research presentations (and counting) on the latest insights and trends in cybersecurity, DevOps, and AI research. Our platform scours the internet for the most insightful and informative presentations, making it the ultimate tool for professionals and enthusiasts alike.

Articles: 10000
Conferences: 31
Presentations: 3529

Recent Updates


Added RSA USA 2023 presentations (2023-06-10)

365 presentations with 276 videos have ben added


Added KubeCon + CloudNativeCon Europe 2023 presentations (2023-05-02)

316 presentations with 265 videos have ben added


Added Cloud Native SecurityCon North America 2023 (2023-03-04)

87 presentations with 67 videos have ben added


Added Global AppSec Dublin 2023 (2023-03-02)

44 presentations with 33 videos have ben added