logo
Dates

Sites

Sort by:  

Hackers Target Middle East Governments with Evasive "CR4T" Backdoor

The Hacker News - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

Government entities in the Middle East are being targeted by a new backdoor called CR4T, part of a campaign named DuneQuixote, discovered by Kaspersky. The attackers use evasive techniques to avoid detection and analysis.
  • Government entities in the Middle East are under attack by a new backdoor called CR4T as part of the DuneQuixote campaign.
  • The attackers have implemented sophisticated evasion methods to prevent detection and analysis of their malware.
  • The attack starts with a dropper that extracts a command-and-control (C2) address using a novel decryption technique.
  • The dropper establishes connections with the C2 server and downloads a next-stage payload, which remains inaccessible without the correct user agent.
  • The CR4T backdoor allows attackers to execute commands, perform file operations, and communicate with the C2 server.
  • An additional Golang version of CR4T has been discovered, indicating that the threat actors are refining their techniques with cross-platform malware.
Tags:  
Middle East
CR4T
DuneQuixote
evasion techniques
Meta Is Already Training a More Powerful Successor to Llama 3

Wired (AI) - 1

Categories:  ai-ml

2024-04-19  

tldr - powered by Generative AI

Open source AI models are advancing rapidly and pushing the boundaries of artificial intelligence development, with Meta leading the way in releasing powerful models like Llama 3 to the public.
  • Meta released Llama 3, an open source AI model, which is touted as the most powerful model available for public use.
  • Yann LeCun, Meta's chief AI scientist, announced the development of an even more powerful successor to Llama 3, with potentially over 400 billion parameters.
  • Meta's open source AI strategy aims to accelerate the progress of generative AI and promote collaboration in the AI community.
  • Concerns have been raised about the potential misuse of open source AI models for developing harmful technologies, prompting the need for responsible AI development practices.
  • Experts emphasize the importance of open access to all aspects of AI models, including data, training, code, and evaluations, to enhance collective understanding and innovation in the field.
Tags:  
Open Source
Meta
Llama 3
collaboration
Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware

Dark Reading - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

The main thesis of the presentation is how a security researcher exploited Palo Alto Networks' XDR software, turning it into a perfect malware tool.
  • The researcher reverse-engineered and weaponized Palo Alto's Cortex product to deploy a reverse shell and ransomware.
  • The exploit highlighted the immense power and access granted to XDR solutions, posing a significant security risk.
  • Despite fixes made by Palo Alto, a vulnerability in storing Lua files in plaintext remained, leaving room for similar attacks on other XDR platforms.
  • Encryption of sensitive files in XDR solutions may not be an effective deterrent for attackers, as decryption is necessary for the software to function.
Tags:  
XDR software
exploitation
security vulnerabilities
Cyberattack Takes Frontier Communications Offline

Dark Reading - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

The importance of cybersecurity measures in protecting personally identifiable information (PII) in telecom companies like Frontier Communications.
  • Telecom companies like Frontier Communications are prime targets for cyberattacks due to the valuable PII they hold.
  • Cyberattacks can result in operational disruptions and the theft of sensitive data, leading to the shutdown of business operations.
  • Engaging cybersecurity experts, notifying law enforcement, and conducting thorough investigations are crucial steps in responding to cyber incidents.
  • Implementing robust cybersecurity measures is essential to safeguarding PII and preventing financial and operational impacts.
Tags:  
telecom companies
PII protection
cyberattacks
US Government Releases Guidance on Securing Election Infrastructure

SecurityWeek - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

The US government has issued new guidance to help election infrastructure stakeholders increase their resilience against malign influence operations seeking to undermine trust in democratic institutions.
  • State-sponsored threat actors from China, Russia, and Iran are known for their hostile efforts to influence US policies.
  • Foreign malign influence campaigns have focused on undermining public confidence in the US election process and exacerbating partisan tensions.
  • Election officials and infrastructure stakeholders are advised to proactively debunk potential malign influence narratives, direct audiences to official websites and trusted sources of information, train staff to respond to suspected AI-generated media, and establish relations with local media and community leaders.
  • To secure systems, accounts, and public-facing assets, stakeholders should make social media accounts private, harden personal and organizational accounts, use strong cybersecurity protocols, including multi-factor authentication, on all accounts, and use non-repudiation and authentication techniques to mark their content.
Tags:  
Election Infrastructure
Malign Influence Operations
guidance
Akira Ransomware Made Over $42 Million in One Year: Agencies

SecurityWeek - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

Akira ransomware has targeted over 250 victims worldwide and made $42 million in ransom payments, utilizing various tactics to gain access to organizations' systems and exfiltrate data.
  • Since early 2023, Akira ransomware has targeted organizations in multiple industries, including services, manufacturing, education, finance, and healthcare.
  • The ransomware initially targeted Windows systems but has expanded to infect VMware ESXi virtual machines and has been used in conjunction with Megazord.
  • Akira operators have been observed exploiting vulnerabilities in Cisco products, using RDP, spear-phishing, and valid credentials to gain initial access to victims' environments.
  • The threat actors create new domain accounts for persistence, extract credentials, and disable security software to prevent detection.
  • Akira exfiltrates victims' data before encrypting it and demands ransom payments in Bitcoin, threatening to publish exfiltrated data on the Tor network if demands are not met.
Tags:  
Akira ransomware
ransomware
data exfiltration
Frontier Communications Shuts Down Systems Following Cyberattack

SecurityWeek - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

Frontier Communications experienced a cyberattack leading to the shutdown of certain systems, likely due to ransomware. The incident was contained, and normal operations are being restored.
  • Frontier Communications shut down systems following a cyberattack on April 14
  • The attack involved unauthorized access to the company's IT environment, likely by a cybercrime group
  • Systems were shut down to contain the incident, impacting operations
  • The incident has not had a material impact on the company's financial condition or results of operations
  • Frontier has notified law enforcement and is in the process of restoring normal business operations
Tags:  
ransomware
incident response
data breach

tldr - powered by Generative AI

The importance of addressing vulnerabilities in the OSS AI/ML supply chain to prevent exploitation by cybercriminals.
  • Protect AI's April 2024 Vulnerability Report identified 48 vulnerabilities in the OSS AI/ML supply chain, a 220% increase from November 2023.
  • 17 of the vulnerabilities were rated as 'critical', highlighting the severity of the issues present.
  • Addressing these vulnerabilities is crucial to prevent cybercriminals like FIN7 from targeting industries like automotive firms.
  • Proactive measures such as bug bounty programs can help in identifying and mitigating these vulnerabilities before they are exploited.
Tags:  
vulnerabilities
AI/ML
cybercriminals
bug bounty programs
First Major Attempts to Regulate AI Face Headwinds From All Sides

SecurityWeek - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

The first major proposals to regulate bias in AI decision making are facing challenges from various stakeholders, including civil rights groups, industry, and lawmakers.
  • Lawmakers are working on bills in states like Colorado, Connecticut, and Texas to address bias in AI decision making.
  • Civil rights groups and labor unions are advocating for more transparency and legal recourse for citizens to sue over AI discrimination.
  • The industry is offering tentative support but resisting measures that increase accountability.
  • Bipartisan lawmakers are collaborating across states to address AI legislation due to federal inaction.
  • Over 400 AI-related bills are being debated in statehouses, with a focus on oversight and addressing AI discrimination.
  • Experts emphasize the need for explicit actions to mitigate bias in AI systems.
  • Proposals in Colorado and Connecticut require companies to perform impact assessments for AI systems to analyze risks of discrimination.
Tags:  
AI regulation
bias mitigation
legislation
civil rights
industry resistance
How Attackers Can Own a Business Without Touching the Endpoint

The Hacker News - 1

Categories:  security

2024-04-19  

tldr - powered by Generative AI

Cloud identities are the new perimeter in cybersecurity, and organizations need to be aware of the various attack techniques that can target businesses in the cloud.
  • Cloud identities are now the primary focus for cybersecurity defenses.
  • Attack techniques such as AiTM phishing, IM phishing, SAMLjacking, Oktajacking, and shadow workflows can bypass traditional security measures.
  • Push Security has released a matrix of SaaS attack techniques and blog posts to educate on these threats.
  • Organizations must be vigilant and implement strategies to protect against these cloud-based attacks.
Tags:  
cloud security
identity attacks
phishing techniques