Newsletter Subject

THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 16-22)

From

thehackernews.com

Email Address

newsletter@thehackernews.com

Sent On

Mon, Sep 23, 2024 12:19 PM

Email Preheader Text

Catch up on last week's top cybersecurity stories—from dismantling the Raptor Train botnet and

Catch up on last week's top cybersecurity stories—from dismantling the Raptor Train botnet and uncovering vulnerabilities through a $20 domain to Nort     [The hacker News]   THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 16-22)   Hold on tight, folks, because last week's cybersecurity landscape was a rollercoaster! We witnessed everything from North Korean hackers dangling "dream jobs" to expose a new malware, to a surprising twist in the Apple vs. NSO Group saga. Even the seemingly mundane world of domain names and cloud configurations had its share of drama. Let's dive into the details and see what lessons we can glean from the past week. ⚡ Threat of the Week Raptor Train Botnet Dismantled: The U.S. government announced the [takedown of the Raptor Train botnet]( controlled by a China-linked threat actor known as Flax Typhoon. The botnet consisted of over 260,000 devices in June 2024, with victims scattered across North America, Europe, Asia, Africa, and Oceania, and South America. It also attributed the Flax Typhoon threat actor to a publicly-traded, Beijing-based company known as Integrity Technology Group.   [Raptor Train Botnet Dismantled]   🔔 Top News - Lazarus Group’s New Malware: The North Korea-linked cyber espionage group known as UNC2970 (aka TEMP.Hermit) has been observed utilizing [job-themed phishing lures]( to target prospective victims in energy and aerospace verticals and infect them with a previously undocumented backdoor dubbed MISTPEN. The activity is also tracked as Operation Dream Job. - iServer and Ghost Dismantled: In yet another big win for law enforcement agencies, Europol announced the [takedown of an international criminal network]( that leveraged a phishing platform to unlock stolen or lost mobile phones. The agency, in partnership with the Australian Federal Police (AFP), dismantled an encrypted communications network called Ghost that enabled serious and organized crime across the world. - Iranian APT Acts as Initial Access Provider: An Iranian threat actor tracked as UNC1860 is [acting as an initial access facilitator]( that provides remote access to target networks by deploying various passive backdoors. This access is then leveraged by other Iranian hacking groups affiliated with the Ministry of Intelligence and Security (MOIS). - Apple Drops Lawsuit against NSO Group: Apple filed a motion to "voluntarily" dismiss the lawsuit it's pursuing [against Israeli commercial spyware vendor]( NSO Group, citing a shifting risk landscape that could lead to exposure of critical "threat intelligence" information. The lawsuit was filed in November 2021. - Phishing Attacks Exploit HTTP Headers: A new wave of phishing attacks is [abusing refresh entries in HTTP headers]( to deliver spoofed email login pages that are designed to harvest users' credentials. Targets of the campaigns include entities in South Korea and the U.S.   📰 Around the Cyber World - Sandvine Leaves 56 "Non-democratic" Countries: Sandvine, the company behind middleboxes that have [facilitated]( the delivery of commercial spyware as part of highly-targeted attacks, said it has exited 32 countries and is in process of ceasing operations in another 24 countries, citing elevated threats to digital rights. Earlier this February, the company was [added]( to the U.S. Entity List. "The misuse of deep packet inspection technology is an international problem that threatens free and fair elections, basic human rights, and other digital freedoms we believe are inalienable," it [said](. It did not disclose the list of countries it’s exiting as part of the overhaul. - .mobi Domain Acquired for $20: Researchers from watchTowr Labs [spent]( a mere $20 to acquire a legacy WHOIS server domain associated with the .mobi top-level domain (TLD) and set up a WHOIS server on that domain. This led to the discovery that over 135,000 unique systems still queried the old WHOIS server over a five day period ending on September 4, 2024, including cybersecurity tools and mail servers for government, military and university entities. The research also [showed]( that the TLS/SSL process for the entire .mobi TLD had been undermined as numerous Certificate Authorities (CAs) were found to be still using the “rogue” WHOIS server to "determine the owners of a domain and where verification details should be sent." Google has since [called]( for stopping the use of WHOIS data for TLS domain verifications. - ServiceNow Misconfigurations Leak Sensitive Data: Thousands of companies are inadvertently exposing secrets from their internal knowledge base (KB) articles via ServiceNow misconfigurations. AppOmni [attributed]( the issue to "outdated configurations and misconfigured access controls in KBs," likely indicating "a systematic misunderstanding of KB access controls or possibly the accidental replication of at least one instance's poor controls to another through cloning." ServiceNow has [published]( guidance on how to configure their instances to prevent unauthenticated access to KB articles. - Google Cloud Document AI Flaw Fixed: Speaking of misconfigurations, researchers have [found]( that overly permissive settings in Google Cloud's Document AI service could be leveraged by threat actors to hack into Cloud Storage buckets and steal sensitive information. Vectra AI described the vulnerability as an instance of transitive access abuse. - Microsoft Plans End of Kernel Access for EDR Software: Following the [massive fallout]( from the [CrowdStrike update mishap]( in July 2024, Microsoft has highlighted Windows 11’s "improved security posture and security defaults" that allow for more security capabilities to security software makers outside of [kernel mode access](. It also said it will collaborate with ecosystem partners to achieve "enhanced reliability without sacrificing security."   🔥 Cybersecurity Resources & Insights - Upcoming Webinars - [Zero Trust: Anti-Ransomware Armor]( Join our next webinar with Zscaler's Emily Laufer for a deep dive into the 2024 Ransomware Report, uncovering the latest trends, emerging threats, and the zero-trust strategies that can safeguard your organization. Don't become another statistic – Register now and fight back! - [SIEM Reboot: From Overload to Oversight]( Drowning in data? Your SIEM should be a lifesaver, not another headache. Join us to uncover how legacy SIEM went wrong, and how a modern approach can simplify security without sacrificing performance. We'll dive into the origins of SIEM, its current challenges, and our community-driven solutions to cut through the noise and empower your security. Register now for a fresh take on SIEM! - Ask the Expert - Q: How does Zero Trust differ fundamentally from traditional Perimeter Defense, and what are the key challenges and advantages when transitioning an organization from a Perimeter Defense model to a Zero Trust architecture? - A: Zero Trust and perimeter defense are two ways to protect computer systems. Zero Trust is like having multiple locks on your doors AND checking IDs at every room, meaning it trusts no one and constantly verifies everyone and everything trying to access anything. It's great for stopping hackers, even if they manage to sneak in, and works well when people work from different places or use cloud services. Perimeter defense is like having a strong wall around your castle, focusing on keeping the bad guys out. But, if someone breaks through, they have easy access to everything inside. This older approach struggles with today's threats and remote work situations. Switching to Zero Trust is like upgrading your security system, but it takes time and money. It's worth it because it provides much better protection. Remember, it's not just one thing, but a whole new way of thinking about security, and you can start small and build up over time. Also, don't ditch the wall completely, it's still useful for basic protection. - Cybersecurity Jargon Buster - Polymorphic Malware: Imagine a sneaky virus that keeps changing its disguise (signature) to trick your antivirus. It's like a chameleon, making it tough to catch. - Metamorphic Malware: This one's even trickier! It's like a shapeshifter, not just changing clothes, but completely transforming its body. It rewrites its own code each time it infects, making it nearly impossible for antivirus to recognize. - Tip of the Week - "Think Before You Click" Maze: Navigate a series of decision points based on real-world scenarios, choosing the safest option to avoid phishing traps and other online threats. Conclusion "To err is human; to forgive, divine." - Alexander Pope. But in the realm of cybersecurity, forgiveness can be costly. Let's learn from these mistakes, strengthen our defenses, and keep the digital world a safer place for all.   Follow Us for More Updates [linkedin]( [twitter]( [telegram]( You may [unsubscribe]( or [change your contact details]( at any time. Powered by:[GetResponse](

Marketing emails from thehackernews.com

View More
Sent On

30/10/2024

Sent On

16/10/2024

Sent On

19/09/2024

Sent On

10/09/2024

Sent On

04/09/2024

Sent On

28/08/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2024 SimilarMail.