Security News > 2023 > February

TrickGate crypter discovered after 6 years of infections
2023-02-06 16:41

In new research, Check Point has exposed a crypter dubbed TrickGate developed by cybercriminals and sold as a service. The crypter has been in development since 2016 when it was used to spread the Cerber malware, but it has been used for several major malware campaigns, including Trickbot and Emotet.

Keeping unstructured data safe and sound
2023-02-06 13:00

Webinar There was a time when data was stored in cardboard files inside metal filing cabinets. These days the language has evolved to include secure unstructured data environments, threat actors, and risk factors.

GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce Industry
2023-02-06 12:36

The malspam activity is notable for transitioning away from malware-laced Microsoft Word documents to NSIS executable files for loading the malware. While attack chains in 2021 leveraged a ZIP archive containing a macro-laced Word document to drop an executable file tasked with loading GuLoader, the new phishing wave employs NSIS files embedded within ZIP or ISO images to activate the infection.

Microsoft: Iranian Nation-State Group Sanctioned by U.S. Behind Charlie Hebdo Hack
2023-02-06 12:09

An Iranian nation-state group sanctioned by the U.S. government has been attributed to the hack of the French satirical magazine Charlie Hebdo in early January 2023. Two Iranian nationals have been accused for their role in the disinformation and threat campaign.

Thousands of unpatched VMware ESXi servers hit by ransomware via old bug (CVE-2021-21974)
2023-02-06 12:06

Late last week, unknown attackers launched a widespread ransomware attack hitting VMware ESXi hypervisors via CVE-2021-21974, an easily exploitable vulnerability that allows them to run exploit code remotely, without prior authentication. Patches for CVE-2021-21974, a vulnerability in ESXi's OpenSLP service, have been provided by VMware two years ago, and this attack has revealed just how many servers are out there are still unpatched, with the SLP service still running and the OpenSLP port still exposed.

Attacking Machine Learning Systems
2023-02-06 11:02

There is a lesson in that similarity: the complex mathematical attacks make for good academic papers, but we mustn't lose sight of the fact that insecure software will be the likely attack vector for most ML systems. At their core, modern ML systems have complex mathematical models that use training data to become competent at a task.

SaaS in the Real World: Who's Responsible to Secure this Data?
2023-02-06 10:00

Today, most security and IT teams understand the shared responsibility model, in which the SaaS vendor is responsible for securing the application, while the organization is responsible for securing their data. SaaS data breaches and SaaS ransomware attacks can lead to the loss or public exposure of that data.

OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability
2023-02-06 09:55

The maintainers of OpenSSH have released OpenSSH 9.2 to address a number of security bugs, including a memory safety vulnerability in the OpenSSH server.Tracked as CVE-2023-25136, the shortcoming has been classified as a pre-authentication double free vulnerability that was introduced in version 9.1.

Trust, not tech, is holding back a safer internet
2023-02-06 09:30

We have so little reason to trust what's on offer or those offering it. The state has to take on that role - usually late, usually badly, and usually against the wishes of those who like their crimes kept in the private sector, but usually to better effect than the alternatives.

FormBook Malware Spreads via Malvertising Using MalVirt Loader to Evade Detection
2023-02-06 08:11

The shift to Google malvertising is the latest example of how crimeware actors are devising alternate delivery routes to distribute malware ever since Microsoft announced plans to block the execution of macros in Office by default from files downloaded from the internet. NET applications for concealing its behavior and are tasked with distributing the FormBook malware family.