Security News > 2021 > November

Ukraine links members of Gamaredon hacker group to Russian FSB
2021-11-04 13:54

SSU and the Ukrainian secret service say they have identified five members of the Gamaredon hacking group, a Russian state-sponsored operation known for targeting Ukraine since 2014. This Gamaredon hacking group, tracked as Armageddon by the SSU, is allegedly operated under the FSB and is believed to be responsible for over 5,000 attacks in Ukraine since the operation began.

Crypto investors lose $500,000 to Google Ads pushing fake wallets
2021-11-04 13:23

Threat actors are using advertisements in Google Search to promote fake cryptocurrency wallets and DEX platforms to steal user's cryptocurrency. These advertisements promote sites that install fake Phantom and MetaMask wallets used for Solana and Ethereum, and fake decentralized exchange platforms, such as PancakeSwap and Uniswap.

Magecart Credit Card Skimmer Avoids VMs to Fly Under the Radar
2021-11-04 12:51

A new Magecart threat actor is stealing people's payment card info from their browsers using a digital skimmer that uses a unique form of evasion to bypass virtual machines so it targets only actual victims and not security researchers. Detecting VMs used by security researchers and sandboxing solutions that are set to pick up Magecart activity is "The most popular method" used to evade detection, Segura said.

Tens of thousands unpatched GitLab servers under attack via CVE-2021-22205
2021-11-04 12:43

Attackers are actively exploiting an "Old" vulnerability to take over on-premise GitLab servers, Rapid7 researcher Jacob Baines warns. The additional bad news is that at least half of the 60,000 internet-facing GitLab installations the company detects are not patched against this issue.

FYI: Code compiled to WebAssembly may lack standard security defenses
2021-11-04 12:14

In a paper titled, The Security Risk of Lacking Compiler Protection in WebAssembly, distributed via ArXiv, the technical trio say that when a C program is compiled to WASM, it may lack anti-exploit defenses that the programmer takes for granted on native architectures. "We compiled 4,469 C programs with known buffer overflow vulnerabilities to x86 code and to WebAssembly, and observed the outcome of the execution of the generated code to differ for 1,088 programs," the paper states.

US Blacklists NSO Group
2021-11-04 11:52

The Israeli cyberweapons arms manufacturer - and human rights violator, and probably war criminal - NSO Group has been added to the US Department of Commerce's trade blacklist. Aside from the obvious difficulties this causes, it'll make it harder for them to buy zero-day vulnerabilities on the open market.

Lockean multi-ransomware affiliates linked to attacks on French orgs
2021-11-04 11:22

Details about the tools and tactics used by a ransomware affiliate group, now tracked as Lockean, have emerged today in a report from France's Computer Emergency Response Team. Lockean activity was first noticed in 2020 when the actor hit a French company in the manufacturing sector and deployed DoppelPaymer ransomware on the network.

Lockean multi-RaaS affiliate linked to attacks against French businesses
2021-11-04 11:22

Details about the tools and tactics used by a ransomware affiliate group, now tracked as Lockean, have emerged today in a report from France's Computer Emergency Response Team. Lockean activity was first noticed in 2020 when the actor hit a French company in the manufacturing sector and deployed DoppelPaymer ransomware on the network.

Break into the cybersecurity field by learning the NIST risk management framework
2021-11-04 10:02

Cybersecurity is a lucrative field, and you don't have to spend years learning all the various aspects of it. If you are an advanced IT professional, you can actually break into it with very specialized training, such as the NIST Cybersecurity & Risk Management Frameworks course.

Lean security: How small cybersecurity teams perform at Fortune 2000 levels
2021-11-04 07:00

There's a widespread misconception that small IT security teams, or "Lean sec teams", cannot protect their organizations as comprehensively as bigger security teams who enjoy rich portfolios of countless security layers, vendors, and tools. How do CISOs and leaders of lean security teams at small- and mid-sized organizations get by when they face the same threats as major corporations but have only a fraction of the cybersecurity resources at hand?