Security News > 2022 > April

Don't let ransomware crooks spend months in your network – like this govt agency did
2022-04-14 00:12

Lockbit ransomware operators spent nearly six months in a government agency's network, deleting logs and using Chrome to download hacking tools, before eventually deploying extortionware, according to Sophos threat researchers. As Sophos researchers noted, the point of entry is "Nothing spectacular." It's not said exactly how the miscreants got in - via brute-forcing a weak password, using a stolen credential, tapping up a rogue insider, or exploiting a security bug, for example - but we're told the intruders managed to hijack a local administrator account on the server that also had Windows domain admin privileges, which would make exploring and compromising the network simple.

CISA warns orgs to patch actively exploited Windows LPE bug
2022-04-13 22:48

The Cybersecurity and Infrastructure Security Agency has added ten new security bugs to its list of actively exploited vulnerabilities, including a high severity local privilege escalation bug in the Windows Common Log File System Driver. According to a binding operational directive issued in November, all Federal Civilian Executive Branch Agencies agencies must secure their systems against this security flaw after being added to CISA's catalog of Known Exploited Vulnerabilities.

African banks heavily targeted in RemcosRAT malware campaigns
2022-04-13 22:17

African banks are increasingly targeted by malware distribution campaigns that employ HTML smuggling tricks and typo-squatted domains to drop remote access trojans. Cybercriminals interested in quick financial gains are a constant source of trouble for banks in Africa, which have resorted to deploying strict gateway security controls.

Apache says Struts 2 security bug wasn't fully fixed in 2020
2022-04-13 21:30

Apache has taken another shot at fixing a critical remote code execution vulnerability in its Struts 2 framework for Java applications - because the first patch, issued in 2020, didn't fully do the trick. The security flaw exists in Struts versions 2.0.0 to 2.5.29, and an attacker could exploit it to gain control of a vulnerable system.

Over 16,500 Sites Hacked to Distribute Malware via Web Redirect Service
2022-04-13 21:21

"The TDS has infected various web servers hosting more than 16,500 websites, ranging from adult content sites, personal websites, university sites, and local government sites," Avast researchers Pavel Novák and Jan Rubín said in a report published last week. Earlier this January, the BlackBerry Research and Intelligence Team detailed another TDS called Prometheus that has been put to use in different campaigns mounted by cybercriminal groups to distribute Campo Loader, Hancitor, IcedID, QBot, Buer Loader, and SocGholish malware.

Hackers Exploiting Spring4Shell Vulnerability to Deploy Mirai Botnet Malware
2022-04-13 21:20

The recently disclosed critical Spring4Shell vulnerability is being actively exploited by threat actors to execute the Mirai botnet malware, particularly in the Singapore region since the start of April 2022. The development comes as the U.S. Cybersecurity and Infrastructure Security Agency earlier this week added the Spring4Shell vulnerability to its Known Exploited Vulnerabilities Catalog based on "Evidence of active exploitation."

E.U. Officials Reportedly Targeted with Israeli Pegasus Spyware
2022-04-13 21:19

Senior officials in the European Union were allegedly targeted with NSO Group's infamous Pegasus surveillance tool, according to a new report from Reuters. NSO Group said in a statement shared with Reuters that it was not responsible for the hacking attempts, adding that the targeting "Could not have happened with NSO's tools."

New Fodcha DDoS botnet targets over 100 victims every day
2022-04-13 20:11

A rapidly growing botnet is ensnaring routers, DVRs, and servers across the Internet to target more than 100 victims every day in distributed denial-of-service attacks. The number of unique IP addresses linked to the botnet also oscillates, with 360 Netlab saying that they're tracking a 10,000-strong Fodcha army of bots using Chinese IP addresses every day, most of them using the services of China Unicom and China Telecom.

US cryptocurrency coder gets 5 years for North Korea sanctions busting
2022-04-13 18:52

You may recall the late cryptocurrency trading hamster, Mr Goxx, who went viral during his brief and colourful life as a rodentine coinhodler. Sadly, given how this particular story ends, US cryptocurrency developer Virgil Griffith has provided another episode in the never-a-dull-moment world of cryptocurrencies.

Hackers exploit critical VMware CVE-2022-22954 bug, patch now
2022-04-13 18:32

A proof-of-concept exploit has been released online for the VMware CVE-2022-22954 remote code execution vulnerability, already being used in active attacks that infect servers with coin miners. The vulnerability is a critical remote code execution impacting VMware Workspace ONE Access and VMware Identity Manager, two widely used software products.