Tue.Aug 29, 2023

article thumbnail

Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI

Troy Hunt

Today, the US Justice Department announced a multinational operation involving actions in the United States, France, Germany, the Netherlands, and the United Kingdom to disrupt the botnet and malware known as Qakbot and take down its infrastructure. Beyond just taking down the backbone of the operation, the FBI began actively intercepting traffic from the botnet and instructing infected machines the uninstall the malware: To disrupt the botnet, the FBI was able to redirect Qakbot botnet traffic

Malware 359
article thumbnail

U.S. Hacks QakBot, Quietly Removes Botnet Infections

Krebs on Security

The U.S. government today announced a coordinated crackdown against QakBot , a complex malware family used by multiple cybercrime groups to lay the groundwork for ransomware infections. The international law enforcement operation involved seizing control over the botnet’s online infrastructure, and quietly removing the Qakbot malware from tens of thousands of infected Microsoft Windows computers.

Hacking 313
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

The threat of bad actors hacking into airplane systems mid-flight has become a major concern for airlines and operators worldwide. Related: Pushing the fly-by-wire envelope This is especially true because systems are more interconnected and use more complex commercial software than ever before, meaning a vulnerability in one system could lead to a malicious actor gaining access to more important systems.

Software 264
article thumbnail

Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

Tech Republic Security

A new study from Abnormal found that 4.31% of phishing attacks mimicked Microsoft, far ahead of second most-spoofed brand PayPal.

Phishing 195
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

UNC4841 threat actors hacked US government email servers exploiting Barracuda ESG flaw

Security Affairs

China-linked threat actors breached government organizations worldwide with attacks exploiting Barracuda ESG zero-day. In June, Mandiant researchers linked the threat actor UNC4841 to the attacks that exploited the recently patched Barracuda ESG zero-day vulnerability to China. “Through the investigation, Mandiant identified a suspected China-nexus actor, currently tracked as UNC4841, targeting a subset of Barracuda ESG appliances to utilize as a vector for espionage, spanning a multitude of reg

article thumbnail

Google Applies Generative AI Tools to Cloud Security

Tech Republic Security

At the Google Next '23 conference, the company announced a slew of AI-powered cybersecurity solutions for the cloud, featuring Duet AI, Mandiant and Chronicle Security Operations.

LifeWorks

More Trending

article thumbnail

FBI Dismantles Qakbot Botnet in Landmark Cyber Op

SecureWorld News

In a major milestone for global cybersecurity efforts, the U.S. Federal Bureau of Investigation (FBI) has successfully collaborated with international partners to take down the notorious Qakbot botnet. This operation, which spans multiple countries, is being hailed as one of the largest ever enforcement actions led by the United States against a botnet.

article thumbnail

The Weird, Big-Money World of Cybercrime Writing Contests

WIRED Threat Level

The competitions, which are held on Russian-language cybercrime forums, offer prize money of up to $80,000 for the winners.

article thumbnail

MOVEit Was a SQL Injection Accident Waiting to Happen

Dark Reading

SQL injection and its ilk will stop being "a thing" only after organizations focus on security by construction.

109
109
article thumbnail

FTX, BlockFi Users' Info Exposed in SIM Swapping Security Incident

SecureWorld News

Kroll, a leading provider of risk management and financial consulting services, finds itself in the midst of dealing with the consequences of a recent and alarming security breach. An advisory from the company states that a "highly sophisticated" SIM swapping attack targeted one of Kroll's employees, resulting in unauthorized access to personal information related to bankruptcy claimants associated with cryptocurrency firms FTX, BlockFi, and Genesis.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Sprawling Qakbot Malware Takedown Spans 700,000 Infected Machines

Dark Reading

"Operation Duck Hunt" is not likely to eliminate the initial access botnet forever, but the proactive removal of the malware from victim machines by law enforcement is one of the largest and most significant efforts of its kind.

Malware 100
article thumbnail

Hackers infiltrated Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) for months

Security Affairs

Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) has been infiltrated for months. Threat actors have infiltrated Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) for as much as nine months. The intruders China-linked hackers may have gained access to sensitive data, according to three government and private sector sources familiar with the situation, reported the Financial Times.

article thumbnail

Unpatched Citrix NetScaler Devices Targeted by Ransomware Group FIN8

Dark Reading

Citrix issued a patch for the critical remote code execution bug in July for its NetScaler devices.

article thumbnail

Nordic Users Targeted by National Danish Police Phishing Attack

Heimadal Security

A new type of cyber-attack is currently spreading like wildfire in the Nordics, targeting email addresses indiscriminate of user profiles (i.e., small office/home user, home user, mobile user, power user, and large business user). Earmarked the National Danish Police phishing attack after the email that would accompany the full incident disclosure, this type of cyber-aggression […] The post Nordic Users Targeted by National Danish Police Phishing Attack appeared first on Heimdal Security B

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

FBI Dismantles QakBot Malware, Frees 700,000 Computers, Seizes $8.6 Million

The Hacker News

A coordinated law enforcement effort codenamed Operation Duck Hunt has felled QakBot, a notorious Windows malware family that's estimated to have compromised over 700,000 computers globally and facilitated financial fraud as well as ransomware. To that end, the U.S.

Malware 98
article thumbnail

Multinational Operation Disrupts QakBot Botnet

Digital Shadows

The U.S. Department of Justice announced that a multinational operation successfully disrupted the QakBot botnet, which infected over 700,000 computers worldwide.

article thumbnail

Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote Attacks

The Hacker News

VMware has released software updates to correct two security vulnerabilities in Aria Operations for Networks that could be potentially exploited to bypass authentication and gain remote code execution. The most severe of the flaws is CVE-2023-34039 (CVSS score: 9.8), which relates to a case of authentication bypass arising as a result of a lack of unique cryptographic key generation.

Risk 98
article thumbnail

What Is Firewall-as-a-Service? FWaaS Ultimate Guide

eSecurity Planet

Firewall-as-a-Service (FWaaS) offers firewall capabilities as a cloud-based service. Traditional firewalls protect the network perimeter, enforcing security standards by regulating incoming and outgoing traffic according to rules and traffic analysis. These physical or virtual appliances sit between a network and external entities like the Internet.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Citrix NetScaler Alert: Ransomware Hackers Exploiting Critical Vulnerability

The Hacker News

Unpatched Citrix NetScaler systems exposed to the internet are being targeted by unknown threat actors in what's suspected to be a ransomware attack. Cybersecurity company Sophos is tracking the activity cluster under the moniker STAC4663.

article thumbnail

Most Helpful Apps For Students

SecureBlitz

Are you a student looking to excel in your studies? Discover the most helpful apps for students, ranging from time management to note-taking, and elevate your academic success today! In the world of education, technology has swiftly become a crucial component for students. Among the various technological tools, mobile apps have proven groundbreaking in making […] The post Most Helpful Apps For Students appeared first on SecureBlitz Cybersecurity.

article thumbnail

Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and Telecom

The Hacker News

A suspected Chinese-nexus hacking group exploited a recently disclosed zero-day flaw in Barracuda Networks Email Security Gateway (ESG) appliances to breach government, military, defense and aerospace, high-tech industry, and telecom sectors as part of a global espionage campaign.

article thumbnail

How to Manage XDR Alerts with Heimdal

Heimadal Security

With Heimdal XDR, you gain complete visibility into XDR alerts, network traffic, user behavior, and endpoint activity. It makes investigating threats much easier, showing you how threats happened and when they occurred. This empowers you to swiftly identify the cause behind each XDR alert trigger. Plus, you can take immediate action right from our Unified […] The post How to Manage XDR Alerts with Heimdal appeared first on Heimdal Security Blog.

98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

9 Ways Technology Can Be Utilized to Streamline Workforce Management

SecureBlitz

This post will show you 9 ways technology can be utilized to streamline workforce management. Workforce management, or WFM, is a complex and dynamic aspect of business operations, and optimizing it properly is crucial for organizational success. WFM ensures that businesses effectively allocate and utilize their most valuable resource: their workforce.

article thumbnail

DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates

The Hacker News

A new malspam campaign has been observed deploying an off-the-shelf malware called DarkGate. "The current spike in DarkGate malware activity is plausible given the fact that the developer of the malware has recently started to rent out the malware to a limited number of affiliates," Telekom Security said in a report published last week.

Malware 98
article thumbnail

Mom’s Meals Warns of Major Data Breach Affecting Over 1.2 Million Individuals

Heimadal Security

Mom’s Meals, a medical meal delivery service operated by PurFoods in the U.S., has alerted its users about a significant ransomware attack. The breach has compromised the personal information of approximately 1.2 million customers, employees, and independent contractors. The initial signs of suspicious network activity came to light in February, prompting the company to enlist […] The post Mom’s Meals Warns of Major Data Breach Affecting Over 1.2 Million Individuals appeared fi

article thumbnail

"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams: Lock and Code S04E18

Malwarebytes

Becky Holmes is a big deal online. Hugh Jackman has invited her to dinner. Prince William has told her she has "such a beautiful name." Once, Ricky Gervais simply needed her photos ("I want you to take a snap of yourself and then send it to me on here.Send it to me on here!" he messaged on Twitter ), and even Tom Cruise slipped into her DMs (though he was a tad boring, twice asking about her health and more often showing a core misunderstanding of grammar).

Scams 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Meta Cripples China's Signature 'Spamouflage' Influence Op

Dark Reading

The social media giant is taking on Dragonbridge, the "largest known cross-platform covert influence operation in the world.

Media 97
article thumbnail

Survey Provides Takeaways for Security Pros to Operationalize their Remediation Life Cycle

The Hacker News

Ask any security professional and they’ll tell you that remediating risks from various siloed security scanning tools requires a tedious and labor-intensive series of steps focused on deduplication, prioritization, and routing of issues to an appropriate “fixer” somewhere in the organization. This burden on already resource-strapped security teams is an efficiency killer.

Risk 96
article thumbnail

Social Security Numbers leaked in ransomware attack on Ohio History Connection

Malwarebytes

The Ohio History Connection (OHC) has posted a breach notification in which it discloses that a ransomware attack successfully encrypted internal data servers. During the attack, the cybercriminals may have had access to names, addresses, and Social Security Numbers (SSNs) of current and former OHC employees (from 2009 to 2023). Additionally, they may have gained access to W-9 reports and other records revealing the names and personal SSNs of vendors who contracted to provide services to OHC.

article thumbnail

Rackspace Faces Massive Cleanup Costs After Ransomware Attack

Dark Reading

Eight months after the cyberattack, the cloud hosting services company's remediation costs top $10 million as it tries to repair the damage caused by the Play ransomware gang.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!