The US Department of Justice, in collaboration with international law enforcement partners, has launched a major crackdown on RedLine and META, two of the world’s most prolific infostealer malware variants responsible for stealing sensitive data from millions of victims worldwide. In partnership with the Netherlands, Belgium, Eurojust, and other global agencies, the Department of Justice announced an extensive international operation aimed at dismantling the infrastructure supporting RedLine and META infostealers. This joint effort, coordinated through Europol’s Joint Cybercrime Action Taskforce (JCAT) and dubbed “Operation Magnus,” involved the seizure of domains, servers, and Telegram accounts utilized by the malware operators. Infostealers…
Author: ISB Staff Reporter
Three malicious packages uploaded to the npm registry were discovered to harbor BeaverTail, a JavaScript downloader and information stealer associated with a continuing North Korean campaign known as Contagious Interview. The packages—passports-js, bcrypts-js, and blockscan-api collectively amassed 323 downloads, and have been linked to threat actors from the Democratic People’s Republic of Korea (DPRK), also known as North Korea. According to a report from Palo Alto Networks’ Unit 42, the BeaverTail malware is associated with an ongoing cyber campaign dubbed Contagious Interview, which specifically targets job-seekers in the U.S. tech industry. In this scheme, victims are lured into participating in…
Cyware, a provider of threat intelligence management and cyber fusion solutions, has teamed up with ECS, a player in technology solutions for US public sector and defense organizations, to bolster government cybersecurity through an enhanced Intel Exchange platform. This partnership aims to tailor Cyware’s threat intelligence offerings for federal agencies, promoting collective defense and safeguarding critical national infrastructure. The collaboration will leverage ECS’s extensive expertise in public-sector cybersecurity to refine Cyware’s Intel Exchange, enabling government entities to adapt quickly to evolving threats. Key developments include upgrades to Cyware’s Threat Intel Risk Score engine, designed to accommodate the complex demands of…
The US Cybersecurity and Infrastructure Security Agency (CISA) has announced a set of proposed security requirements aimed at protecting Americans’ sensitive personal data and government-related information from foreign adversaries. These measures are part of the implementation of Executive Order 14117, signed by President Biden earlier this year, which seeks to mitigate the national security risks associated with unauthorized access to sensitive US data. The new guidelines focus on businesses and organizations involved in “restricted transactions” that handle large volumes of sensitive personal or government-related data. These entities could include technology developers, AI firms, cloud service providers, telecommunications companies, financial institutions,…
The manufacturing industry has emerged as the most targeted by cyber attacks, accounting for more than 25% of incidents across the top 10 sectors, with 45% of these involving malware. The industry’s appeal to malefactors has grown, largely due to its interconnectedness—dependent on elements ranging from raw materials to logistics—its low tolerance for operational disruptions, and the high value of intellectual property stored in its systems, which competitors could exploit to save millions. This was revealed by KnowBe4’s latest report, dubbed “Manufacturing: Maintaining Stability As Cyber Threats Explode in Volume and Sophistication.” The study delves into the state of cybersecurity…
On Friday, Eskenzi PR announced the winners of the 2024 Security Serious Unsung Heroes Awards in a ceremony held at Balfour St Barts in London. The event, now in its ninth year, recognized the work of cybersecurity professionals, educators, and advocates who play crucial roles in protecting online systems and promoting diversity within the industry. List of 2024 Winners: Sponsors for the event included KnowBe4, Check Point Software, ThinkCyber, Hornetsecurity, and Pulse Conferences. Irvin Shillingford, Regional Manager for Northern Europe at Hornetsecurity, acknowledged the importance of the Security Serious Unsung Heroes Awards in acknowledging the efforts of important, underappreciated cybersecurity…
Fortra’s Q2 2024 report has unveiled a series of concerning trends in the digital threat landscape, analyzing hundreds of thousands of attacks on enterprises, their employees, and brands across domains, social media, counterfeit websites, and the dark web. The findings provide valuable insights for security leaders to better understand the evolving tactics of threat actors and implement proactive measures to mitigate risk. Rise in Domain Impersonation Attacks The report highlights a rise in domain impersonation attacks, with brands facing an average of 73 look-alike domain attacks per month, peaking in May 2024 at over 80 attacks per brand. Despite fluctuations,…
Identity management, particularly privileged identity management, forms the backbone of an effective cybersecurity strategy. The ManageEngine Identity Security Survey 2024 sheds light on the current state of identity management, gathering insights from security decision-makers worldwide. The Importance of Identity Management The survey reflects the critical importance of identity management in a world where cyber threats are increasingly prevalent. A staggering 77% of CISOs reported experiencing an identity-related cyberattack in 2023. Jane Frankland, a cybersecurity influencer and author, notes: “The 2024 Identity Security Report by ManageEngine underscores the ever-growing importance of identity management in an increasingly digital world, revealing that while…
The Trend Micro Threat Hunting Team has identified an alarming new trend in cyber attacks: malefactors are adopting EDRSilencer, a red team tool designed to interfere with endpoint detection and response (EDR) systems. Originally developed as a tool for security professionals, EDRSilencer has been repurposed by malicious actors to block EDR communications, helping them slip through the security nets, A Red Team Tool Turned Dangerous The tool works by disrupting the transmission of telemetry and alerts from EDR systems to their management consoles, thus hindering the identification and removal of malware. Leveraging the Windows Filtering Platform (WFP), the tool dynamically…
Several interesting trends are emerging in the cybersecurity landscape, particularly the emergence of artificial intelligence (AI)-driven malware, as well as the ongoing dominance of ransomware threats. Threat actors have started using GenAI as part of their attack infrastructure, which illustrates the ongoing evolution of cyber-attack tactics. AI-driven malware aside, ransomware continues to dominate, with RansomHub maintaining its top spot among ransomware groups. Check Point’s VP of Research, Maya Horowitz, says: “The rise of generative AI in cybercrime is a clear signal that organizations must invest in proactive security strategies to stay ahead of these evolving threats.” It’s also clear that malefactors…