Our Global Research and Analysis Team (GReAT) experts have discovered two malicious packages in the Python Package Index (PyPI) – a popular third-party software repository for Python. According to the packages’ descriptions, they were libraries that allowed to work with popular LLMs (large language models). However, in fact, they imitated the declared functionality using the demo version of ChatGPT, and their main purpose was to install JarkaStealer malware.
The packages were available for download for more than a year. Judging by the repository’s statistics, during this time they were downloaded more than 1700 times by users from more than 30 countries.
Malicious packages and what were they used for
The malicious packages were uploaded to the repository by one author and, in fact, differed from each other only in name and description. The first was called “gptplus” and allegedly allowed access to the GPT-4 Turbo API from OpenAI; the second was called “claudeai-eng” and, according to the description, also promised access to the Claude AI API from Anthropic PBC.
The descriptions of both packages included usage examples that explained how to create chats and send messages to language models. But in reality, the code of these packages contained a mechanism for interaction with the ChatGPT demo proxy in order to convince the victim that the package was working. Meanwhile, the __init__.py file contained in the packages decoded the data contained inside and downloaded the JavaUpdater.jar file from the GitHub repository. If Java was not found on the victim’s machine, it also downloaded and installed the Java Runtime Environment (JRE) from Dropbox. The jar file itself contained the JarkaStealer malware, which was used to compromise the development environment and for undetected exfiltration of stolen data.
What is JarkaStealer malware, and why is it dangerous?
JarkaStealer is malware, presumably written by Russian-speaking authors, which is used primarily to collect confidential data and send it to the attackers. Here’s what it can do:
Steal data from various browsers;
Take screenshots;
Collect system information;
Steal session tokens from various applications (including Telegram, Discord, Steam, and even a Minecraft cheat client);
Interrupt browser processes to retrieve saved data.
The collected information is then archived, sent to the attacker’s server, and then deleted from the victim’s machine.
The malware authors distribute it through Telegram using the malware-as-a-service (MaaS) model. However, we also found the source code of JarkaStealer on GitHub, so it’s possible that this campaign didn’t involve the original authors of the malware.
How to stay safe
We promptly informed PyPI administrators about the malicious implants in the gptplus and claudeai-eng packages, and as of now they’ve already been removed from the repository. However, there’s no guarantee that this (or a similar) trick won’t be pulled on some other platform. We continue to monitor activity related to the JarkaStealer malware and look for other threats in open source software repositories.
For those who downloaded and used one of the malicious packages, the main recommendation is to immediately delete it. The malware doesn’t have persistence functionality, so it’s launched only when the package is used. However, all passwords and session tokens that were used on a victim’s machine could have been stolen by JarkaStealer, and so should be immediately changed or reissued.
We also recommend that developers be especially vigilant when working with open source software packages, and inspect them thoroughly before integrating them into their projects. This includes a detailed analysis of the dependencies and the respective supply chain of software products – especially when it comes to such a hyped topic as the integration of AI technologies.
In this case, the author’s profile’s creation date on PyPI could have been a red flag. If you look closely at the screenshot above, you can see that both packages were published on the same day, while the account that published them was registered just a couple of days earlier.
In order to minimize the risks of working with third-party open source software packages and avoid an attack on the supply chain, we recommend including in DevSecOps processes the Kaspersky Open Source Software Threats Data Feed, which is designed specifically for monitoring used open source components in order to detect threats that might be hidden inside.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-21 14:06:402024-11-21 14:06:40Packages with infostealer found in PyPI repository | Kaspersky official blog
The U.S. Department of Agriculture (USDA) has announced the use of Fast IDentity Online (FIDO) protocols, a new solution for phishing-resistant authentication. This shift to FIDO-based multi-factor authentication (MFA) has proven successful in securing USDA systems against credential theft and phishing attacks.
With many seasonal employees and workers in specialized environments, such as laboratories requiring decontamination procedures, USDA cannot fully rely on Personal Identity Verification (PIV) cards, which are typically used for secure authentication across government agencies.
USDA’s workforce includes not only full-time employees but also a large number of seasonal workers who are ineligible for PIV cards. Furthermore, certain USDA staff work in environments, such as bio-containment labs, where standard PIV cards cannot survive the decontamination processes required.
Historically, USDA managed this by providing users with temporary user IDs and passwords. However, as credential phishing attacks became more sophisticated, the USDA found this approach increasingly vulnerable to cyber threats.
USDA identified the need for a secure, phishing-resistant authentication method that would work across a variety of environments and use cases. The agency needed to move beyond passwords and user IDs, adopting a solution that would meet modern cybersecurity standards while accommodating the unique needs of its workforce.
The Role of FIDO in Phishing-Resistant MFA
FIDO is a set of open standards designed to provide secure, passwordless authentication. Unlike traditional forms of MFA, which can still be vulnerable to phishing attacks, FIDO leverages public key cryptography to bind credentials to the user’s device. This approach is inherently resistant to phishing attempts because even if a malicious actor attempts to trick users into revealing their credentials, they cannot access the system without the physical device used for authentication.
The USDA’s decision to adopt FIDO was driven by its ability to prevent credential phishing—one of the most common and dangerous threats faced by organizations today. With FIDO, USDA employees can authenticate without passwords, using cryptographic keys stored on secure devices. This approach mitigates the risk posed by increasingly sophisticated credential phishing attacks that exploit the weaknesses of SMS codes, authenticator apps, or even push notifications.
The USDA’s Implementation Process
Before transitioning to FIDO, USDA’s Identity, Credential, and Access Management (ICAM) division conducted a thorough review of the agency’s needs. They identified key use cases where employees could not use PIV cards and where traditional MFA methods were insufficient.
These included seasonal workers, employees waiting for PIV cards, and those working in high-security or physically demanding environments where card-based solutions were impractical.
With a centralized identity management system already in place, USDA was well-positioned to implement a FIDO-based solution. The agency used Microsoft Entra ID to integrate FIDO capabilities, allowing them to extend phishing-resistant authentication to core services such as:
Windows desktop login
Microsoft 365 access
Virtual Private Network (VPN) access
Single Sign-On (SSO) systems
The centralization of USDA’s ICAM system under a unified platform allowed for more agile updates, enabling the rapid rollout of FIDO across various IT environments. By focusing on four main enterprise services, USDA was able to significantly reduce its exposure to phishing attacks while meeting the needs of its diverse workforce.
Key Features and Benefits of USDA’s MFA Solution
USDA’s adoption of FIDO technology was not just about protecting individual users—it was about addressing a systemic issue of security across the organization. FIDO protocols were integrated with USDA’s existing SSO platform, which serves over 600 internal applications. This integration allowed USDA to enhance the security of both cloud-based and on-premises systems, protecting users from more advanced forms of MFA bypass techniques.
FIDO’s support for hardware-bound authentication methods, like Microsoft’s Windows Hello for Business (WHfB) and FIPS-140 validated security keys, played a pivotal role. These devices are bound to the user’s hardware, making it almost impossible for a hacker to bypass the authentication process without physical access to the device.
Furthermore, USDA utilized its centralized human resources (HR) system as the authoritative source for identity lifecycle management, ensuring that access rights and credentials were appropriately provisioned and de-provisioned. This integration made managing user access more streamlined and secure, particularly as the agency transitioned to more cloud-based services.
The Significance of USDA’s FIDO Implementation
USDA’s early adoption of FIDO technology placed them ahead of the curve in implementing phishing-resistant MFA. Their solution aligns with the broader federal initiative outlined in the U.S. government’s Moving the U.S. Government Toward Zero Trust Cybersecurity Principles (M-22-0922), which mandates the transition to phishing-resistant MFA for federal agencies.
By adopting FIDO, USDA not only improved its security posture but also contributed to the federal push for Zero Trust cybersecurity, a model that assumes breaches are inevitable and advocates for continuous monitoring and verification of user access. FIDO, with its strong encryption and device-based authentication, is a critical part of this Zero Trust framework.
Recommendations and Mitigations for Other Organizations
USDA’s experience with FIDO offers valuable lessons for other organizations looking to enhance their cybersecurity defenses against phishing and credential theft. The key takeaways from USDA’s implementation include:
USDA’s decision to centralize its ICAM systems under a unified platform helped streamline the deployment of FIDO technology. Centralization improves security, user management, and the agility needed for rapid deployments.
The USDA adopted a philosophy of continuous improvement, piloting FIDO implementations incrementally. By testing solutions on smaller, non-critical user groups, USDA was able to fine-tune its approach before a broader rollout.
Every organization has unique needs. USDA’s approach to understanding its use cases—such as employees without PIV cards or those working in specialized environments—enabled it to tailor its MFA solution to meet specific challenges.
USDA’s involvement in the ICAM community helped them stay informed about emerging threats and best practices. This collaboration provided them with the insights needed to implement a robust solution.
Conclusion
The USDA’s adoption of Fast IDentity Online (FIDO) for phishing-resistant multi-factor authentication (MFA) has strengthened its cybersecurity defenses. By using FIDO, USDA has protected its diverse workforce from credential theft and phishing attacks while ensuring secure access to online systems.
The agency’s centralized approach to Identity, Credential, and Access Management (ICAM) and its commitment to incremental improvements have been a key factor to this success. USDA’s implementation not only meets federal cybersecurity requirements but also exemplifies a proactive approach to Zero Trust principles.
We’re excited to announce the latest update to Threat Intelligence (TI) Lookup. The enhanced home screen now integrates all techniques and tactics of the MITRE ATT&CK matrix, along with relevant malware samples and signatures.
Let’s dive into how these updates can transform your workflow and help you tackle threats with greater confidence.
Redesigned Threat Intelligence Dashboard
The centerpiece of the updated Threat Intelligence home screen is the MITRE ATT&CK matrix, neatly organizing tactics and techniques into a clear, actionable layout.
But here’s where it gets really exciting: The matrix is interactive and lets you explore actual malware samples tied to each technique. This bridges the gap between theoretical knowledge of attack patterns and practical insights into how those patterns are used in real-world attacks.
The new home screen is designed to be super functional for anyone working with malware, whether you’re a malware analyst, an incident responder, a threat researcher, or just someone curious about how malware operates.
Collect threat intel on the latest malware and phishing attacks with TI Lookup
One of the core goals of this redesign was to turn the MITRE ATT&CK classification into a working tool for analysts. Instead of just showcasing popular techniques, the matrix now:
Covers all techniques we detect—not just a subset.
Links techniques to detection data and real-world examples.
Helps analysts identify patterns and connections across incidents.
This update takes analysts beyond just understanding the techniques and tactics. It helps them put that knowledge into action.
They can see how specific techniques have been used in real attacks, spot the malware families tied to certain behaviors, and fine-tune their detection rules to better defend against similar threats in the future.
How to Use the Interactive MITRE ATT&CK Matrix
With the new home screen, all techniques and tactics are displayed clearly. Clicking on any technique opens up a wealth of information and analysis samples related to it, including its sub-techniques.
The updated TI Lookup now includes filtering options for MITRE ATT&CK matrix techniques to help users prioritize threats:
Red (danger): High-risk techniques requiring immediate action.
Yellow (warning): Moderate-risk techniques for ongoing analysis.
Blue (other): Low-risk or less urgent techniques.
Users can refine their view by choosing to hide or display specific categories using the button next to the labels.
Here’s an example of how the redesigned TI Lookup can be used to explore real-world malware scenarios. Let’s take a closer look at the samples related to spearphishing links.
In the Initial Access section of the MITRE ATT&CK matrix, you’ll find Phishing (T1566), which includes sub-techniques like spearphishing.
Clicking on Phishing brings up a new tab with detailed information, including:
An overview of Phishing and its popular sub-techniques, such as spearphishing links, spearphishing attachments, and more.
Insights into related processes and threats.
For example, under the Spearphishing Links sub-technique, you’ll see signatures pulled from actual analysis sessions.
A potential phishing attempt leveraging Freshdesk abuse,
Suspicious URLs identified in real-world samples, and much more.
When you select a technique, sub-technique, or a specific signature, the service will show relevant samples along with links to corresponding sandbox sessions where the selected TTP was identified.
If you want to dive deeper and gather Indicators of Compromise (IOCs) for your analysis, there are two ways to do so.
First, you can use the search icon next to each threat to instantly uncover additional details, such as domains, IPs, URLs, files, and other relevant context tied to the selected technique.
Alternatively, by clicking on TI Lookup in the upper-right corner of the tab, you’ll be redirected to the dedicated TI Lookup search page.
Here, you can refine your search and explore a wealth of actionable intelligence. TI Lookup is designed to provide everything an analyst needs in one place, comprehensive data about specific techniques, behavior patterns, malware families, and their associated IOCs, IOBs, and IOAs.
This new workflow not only makes it easier to understand the processes behind a specific technique but also provides the context needed to develop better strategies for combating similar threats.
For instance, by analyzing spearphishing links in-depth, you’ll gain insights into the methods attackers use to trick victims and the types of payloads delivered. Armed with this knowledge, you can:
Create detection rules tailored to phishing tactics.
Enhance your defense mechanisms to block similar attacks in the future.
Build detailed reports for stakeholders, complete with real-world examples and actionable recommendations.
Learn to Track Emerging Cyber Threats
Check out expert guide to collecting intelligence on emerging threats with TI Lookup
Read full guide
Conclusion
Whether it’s phishing, persistence techniques, or lateral movement, TI Lookup provides the tools you need to dive deep into the data and make informed decisions. With the redesigned home screen, the service is now even more useful for security analysts and researchers, as it helps them easily find samples where specific TTPs were used.
ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.
With ANY.RUN you can:
Detect malware in seconds
Interact with samples in real time
Save time and money on sandbox setup and maintenance
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-21 10:06:392024-11-21 10:06:39Explore MITRE ATT&CK Techniques in Real-World Samples with TI Lookup
Bad news for companies using WordPress sites with a two-factor authentication mechanism implemented via the Really Simple Security plugin. The recently discovered CVE-2024-10924 vulnerability in this plugin allows a complete stranger to authenticate as a legitimate user. It’s therefore recommended to update the plugin as soon as possible.
What’s the danger of the CVE-2024-10924 vulnerability
As ironic as it may sound, the CVE-2024-10924 vulnerability in the plugin called Really Simple Security has a CVSS rating of 9.8 and is classified as critical. In essence, it exists thanks to an error in the authentication mechanism, due to which an attacker can log on to the site as any of the registered users and with their privileges (even administrator rights). As a result, this can lead to the takeover of the website.
Proof of concept that shows exploitation of this vulnerability can already be found on GitHub. Moreover, apparently its exploitation can be automated. The researchers from Wordfence who discovered CVE-2024-10924 have called it the most dangerous vulnerability they’ve seen in 12 years of working in the field of WordPress security.
Who’s vulnerable to CVE-2024-10924?
Users of both paid and free versions of the Really Simple Security plugin starting from build 9.0.0 and ending with 9.1.1.1 are vulnerable. However, to exploit CVE-2024-10924, the plugin must have the two-factor authentication function enabled (it’s disabled by default, but many users choose this plugin specifically for this feature).
Thanks to the existence of a free version of the plugin, it’s extremely popular; researchers say that it’s installed on around four million sites.
How to stay safe
First of all, it’s recommended to update the plugin to version 9.1.2. If for some reason this isn’t possible, it’s worth disabling the two-factor authentication verification – but this is obviously not ideal since it weakens the security of your site. WordPress.org has enabled an automatic plugin update mechanism, but administrators are advised to go to the control panel and make sure that the plugin has been updated.
The plugin developer’s website also has a section with tips on updating it if the automatic update doesn’t work.
In addition, even if you promptly updated the plugin and at first glance didn’t notice any malicious activity on the site, it makes sense to carefully study the list of users with administrator rights – just to make sure there are no new unfamiliar entries there.
Apple has released a new security update to address two zero-day vulnerabilities that have been actively exploited in the wild. The update, released on November 19, 2024, affects iOS, iPadOS, macOS, visionOS, and the Safari browser and is part of Apple’s ongoing efforts to protect its users from increasingly sophisticated cyber threats.
The Apple vulnerabilities, identified in JavaScriptCore and WebKit, are serious, as they could allow maliciously crafted web content to execute arbitrary code or carry out cross-site scripting (XSS) attacks.
Apple was alerted to the potential for active exploitation of these flaws, particularly on Intel-based Mac systems, which prompted the urgent release of Apple Security Updates and Rapid Security Responses to address the issues immediately.
Details of the Apple Security Update
The updates address two primary Apple vulnerabilities in the WebKit and JavaScriptCore components, both of which are essential for web content processing in Apple devices.
These flaws could allow attackers to run arbitrary code or inject harmful scripts into web pages viewed through Apple’s browser technologies. If exploited, these vulnerabilities could compromise the security and privacy of users, putting them at risk.
CVE-2024-44308, identified by security researchers Clément Lecigne and Benoît Sevens of Google’s Threat Analysis Group, is the most critical of the two issues. It relates to a problem in WebKit, Apple’s open-source web browser engine, which could allow malicious web content to lead to arbitrary code execution on affected devices.
A second vulnerability in WebKit concerns cookie management, which could enable cross-site scripting attacks. The flaw could allow an attacker to manipulate cookies, potentially stealing sensitive user data or performing malicious actions under the guise of trusted websites.
These issues have been addressed with patches designed to improve the state management and verification processes in both JavaScriptCore and WebKit, blocking any attempts to exploit these vulnerabilities.
Apple’s Security Response
In keeping with its policy of prioritizing user safety, Apple did not confirm the details of these vulnerabilities until it had thoroughly investigated the issues and deployed updates. The company typically follows a strict protocol when it comes to security matters, releasing fixes only after extensive testing to ensure that the vulnerabilities are adequately addressed.
As part of the release process, Apple has rolled out Apple Security Updates for a range of devices, including the iPhone, iPad, Mac, and Apple Vision Pro. The following updates were released on November 19, 2024:
Safari 18.1.1 for macOS Ventura and macOS Sonoma: This update fixes the issue in JavaScriptCore and WebKit, ensuring that maliciously crafted web content can no longer execute arbitrary code on affected systems.
visionOS 2.1.1 for Apple Vision Pro: This update addresses the same vulnerabilities affecting macOS devices, ensuring the security of Apple’s newest AR headset.
iOS 18.1.1 and iPadOS 18.1.1: These updates apply to a wide range of devices, including the iPhone XS and later, iPad Pro 13-inch, iPad Air 3rd generation, and newer models.
iOS 17.7.2 and iPadOS 17.7.2: This update also addresses the critical vulnerabilities for earlier versions of iPhones and iPads, extending the security patch to models as old as the iPhone XS and iPad 6th generation.
macOS Sequoia 15.1.1: This security patch was issued for the latest macOS Sequoia and addresses the vulnerabilities in JavaScriptCore and WebKit.
Impacts and Risks
The vulnerabilities targeted by these updates are serious, as they could allow attackers to exploit unpatched devices in order to take control of systems, steal data, or disrupt operations. Apple’s proactive release of security updates and Rapid Security Responses is aimed at mitigating these risks by providing users with timely protection against active exploitation. The company has stressed that these vulnerabilities were actively being used in the wild, making it crucial for users to install the updates as soon as possible.
Apple’s commitment to Apple vulnerability updates and security releases underscores the company’s ongoing effort to secure its products against evolving threats. The rapid rollout of patches is part of Apple’s broader strategy to ensure that its devices remain secure, even as cybercriminals develop increasingly sophisticated attack techniques.
How Users Can Stay Protected
To stay protected, users are encouraged to install the latest updates as soon as they are available. These updates are critical not only for closing the immediate vulnerabilities but also for ensuring long-term device security. Apple has made it easy to check for updates by navigating to the Settings app on iOS or iPadOS devices or through the System Preferences or Software Update sections on macOS.
Apple’s detailed security documentation, available on its website, provides insights into each security update and the specific vulnerabilities addressed. The company also advises users to be cautious about visiting suspicious websites or downloading content from untrusted sources, as these are common vectors for exploitation.
Australia and New Zealand’s cyber threat landscape has become increasingly complex, with challenges affecting critical infrastructure, healthcare, finance, and more. The Threat Landscape Report 2024 by Cyble stresses the growing dangers posed by cybercriminals and state-sponsored threat actors alike while highlighting the proactive measures that businesses, especially CISOs (Chief Information Security Officers), can take to strengthen their defenses.
Cyble has found a notable soar in cyberattacks targeting Australia and New Zealand (ANZ). The Threat Landscape Report 2024 has identified these trends as a high priority. Among these, the rise in Ransomware-as-a-Service (RaaS) models and increasing cyberattacks targeting critical sectors such as healthcare, government, and finance stand out. Geopolitical tensions have also intensified the threat, with state-sponsored cyber actors from countries like China and Russia targeting Australian networks for espionage, financial gain, and geopolitical influence.
In FY2023-24, the Australian Signals Directorate (ASD) responded to over 1,100 cyber incidents, with 11% of these attacks focused on critical infrastructure. Furthermore, there was a 12% increase in calls to the Australian Cyber Security Hotline, with more than 36,700 inquiries related to cyber threats.
This surge reflects the growing concern about cybersecurity vulnerabilities across sectors. Data breaches, ransomware attacks, and politically motivated Distributed Denial of Service (DDoS) attacks have been prevalent, underlining the urgent need for more robust security measures across organizations in Australia and New Zealand.
For CISOs, these developments are not just concerning; they accentuate the importance of proactively identifying threats, implementing security protocols in place, and continuously updating cybersecurity strategies to protect against cyber threats.
Key Findings and Threats Identified in the ANZ Threat Landscape Report 2024
Several key findings stand out in the ANZ Threat Landscape Report 2024, providing critical insights into the nature of cybersecurity threats facing organizations in the region:
Ransomware and RaaS: The rise of RaaS models, particularly with groups like SpiderX, has made it easier for even less experienced cybercriminals to launch ransomware attacks. These services offer low-cost, turnkey solutions that lower the barriers to entry for launching ransomware campaigns. As a result, CISOs must be especially vigilant in defending against these attacks, which often involve data exfiltration and encryption for financial gain.
Exploitation of Software Vulnerabilities: Exploiting vulnerabilities such as CVE-2024-21887, which affects Industrial Control Systems (ICS) and IoT devices, continues to be a notable attack vector. These vulnerabilities allow attackers to gain unauthorized access and disrupt critical services, making timely patching and vulnerability management crucial for organizations to mitigate risk.
Geopolitically Motivated Attacks: Tensions in the geopolitical domain have led to a rise in ideologically driven cyberattacks, particularly those targeting government websites, infrastructure, and financial institutions. DDoS attacks, often carried out by groups such as the People’s Cyber Army and Mysterious Team Bangladesh, have been used to send political messages and disrupt operations, making it critical for organizations to strengthen defenses against such campaigns.
Supply Chain and Phishing Attacks: The Threat Landscape Report 2024 highlights the risk of targeted supply chain attacks, with threat actors leveraging trojanized software packages or compromising third-party vendors to gain access to larger networks. Alongside these threats, phishing remains a pervasive attack technique, making employee training and awareness more important than ever.
IoT and ICS Systems Vulnerabilities: Cyble also reported a rise in threat to IoT and ICS systems, especially in sectors like manufacturing, energy, and critical infrastructure. Exploits targeting these systems can cause widespread disruption, underscoring the need for specialized security measures tailored to these environments.
Strategic Insights for CISOs
CISOs across Australia and New Zealand must prioritize cybersecurity strategies that address both immediate and long-term risks. Here are several strategic takeaways for CISOs based on the Threat Landscape Report 2024:
Given the rise in sophisticated attacks like RaaS and supply chain breaches, CISOs should prioritize proactive security measures such as vulnerability management, continuous monitoring, and threat intelligence sharing. Investing in comprehensive threat detection tools, like Cyble Vision, can help organizations stay alert to cyber threats in the modern world.
With incidents like ransomware and data breaches on the rise, it is essential for organizations to have a robust incident response plan in place. Engaging with Cyble’s incident response and digital forensics services can help organizations swiftly identify, contain, and mitigate cyberattacks.
As critical infrastructure remains a primary target, with 11% of cyber incidents in the report related to this sector, CISOs should invest in specialized security solutions to safeguard critical systems. For example, Cyble’s IoT and ICS security tools can help identify vulnerabilities in these environments, reducing the risk of significant disruption.
The complex nature of cyber threats necessitates using advanced Cyber Threat Intelligence (CTI). Using platforms like Cyble Vision, Hawk, and ODIN, CISOs can access real-time threat data and better understand attack trends, improving decision-making and response times.
Cyble’s Role in Mitigating Cyber Threats
The ANZ Threat Landscape Report 2024 highlights the escalating sophistication of cyber threats targeting organizations in Australia and New Zealand, ranging from RaaS attacks to IoT and ICS systems vulnerabilities. To fight against these threats, CISOs need a comprehensive, proactive approach to cybersecurity. Cyble, a leading threat intelligence provider, offers several cybersecurity solutions to help organizations understand and fight against these challenges.
Attack Surface Management (ASM)
Cyble’s Attack Surface Management (ASM) solution helps organizations gain visibility into their digital footprint, identifying potential vulnerabilities before they can be exploited. Cyble’s ASM tools can detect exposed assets, including software vulnerabilities like those detailed in the Threat Landscape Report 2024, such as CVE-2024-21887, by continuously monitoring and analyzing an organization’s attack surface. With real-time alerts and actionable insights, ASM allows CISOs to stay ahead of threats and ensure timely remediation.
Cyber Threat Intelligence (CTI)
One of the most significant takeaways from the report is the increasing complexity and scale of cyber threats. To stay ahead of attackers, organizations need actionable threat intelligence. Cyble’s Cyber Threat Intelligence (CTI) solutions provide real-time insights into emerging threats, from RaaS to politically motivated attacks. By aggregating data from various sources, including the dark web and hacker forums, Cyble’s CTI platform helps organizations understand threat actors employ tactics, techniques, and procedures (TTPs), enabling a faster, more targeted response to potential attacks.
Dark Web Monitoring
As data breaches and ransomware attacks become more common, compromised information is often sold or traded on the dark web. Cyble’s Dark Web Monitoring solution helps organizations continuously scan for leaked data, stolen credentials, and other sensitive information that may be used in attacks. For CISOs, this means enhanced visibility into the risk of data exfiltration and the ability to take swift action to mitigate the potential impact of a breach.
Incident Response and Digital Forensics
The ANZ Threat Landscape Report 2024 highlights that supply chain threats and data breaches raise business concerns. In a cyberattack, quick and efficient incident response is crucial. Cyble’s Digital Forensics & Incident Response (DFIR) services help organizations investigate and recover from cyber incidents. By identifying the root cause of an attack and mitigating its impact, Cyble’s expert team ensures that businesses can resume operations with minimal downtime.
Vulnerability Management
Cyble’s Vulnerability Management solution provides advanced scanning and remediation strategies that give organizations a comprehensive view of exploitable vulnerabilities. According to the Threat Landscape Report 2024, flaws like CVE-2024-56789, which affects cloud platforms and virtual machines, are increasingly exploited. With Cyble’s solution, businesses can proactively identify and address vulnerabilities, reducing the likelihood of successful cyberattacks and minimizing the risk of exploitation.
Brand Intelligence
Another key area highlighted in the Threat Landscape Report 2024 is the rise in brand impersonation, phishing attacks, and fraudulent domains targeting businesses. Cyble’s Brand Intelligence services help protect organizations from these threats by identifying fraudulent activities that could damage a company’s reputation or lead to financial losses. By monitoring fake websites, social media impersonation, and phishing attempts, Cyble helps companies safeguard their digital presence.
Executive Monitoring
Cyble’s Executive Monitoring Solution offers comprehensive protection for executives by actively monitoring and tracking impersonations, deepfake content, and leaks of personally identifiable information (PII) across social media, dark web platforms, and cybercrime forums. Utilizing advanced AI technology, the solution can quickly identify and remove manipulated media, including deepfakes, in real time. This helps protect the reputation and integrity of key personnel by preventing identity theft, reputation damage, and the exploitation of sensitive information.
Physical Security Intelligence
Cyble cybersecurity solutions offer comprehensive threat management that provides real-time updates to identify and address potential physical security risks proactively. Designed to protect assets and personnel, the solution ensures that security measures are always up-to-date and effective. With a centralized oversight platform, organizations can easily manage security across multiple locations, including offices and warehouses, from one unified interface. This streamlined approach by Cyble’s physical security intelligence helps improve operational efficiency while ensuring security remains a top priority across diverse environments.
Takedown Services
Cyble offers powerful tools to combat online fraud and cybercrime by identifying and removing malicious content. These takedown services ensure that fraudulent activities and harmful online threats are promptly addressed, helping to protect organizations from reputational damage and financial loss. Cyble’s solution provides a critical layer of defense by disrupting cybercrime operations and protecting digital environments from online threats.
Bot Shield
Cyble offers advanced intelligence on compromised hosts within your network, providing detailed insights into infected devices communicating with known command-and-control infrastructures. This bot shield solution helps detect and mitigate botnet activities by identifying and isolating compromised devices, preventing further exploitation. By monitoring and addressing threats in real-time, Cyble enhances network security and protects your organization from potential cyberattacks driven by botnet infections.
Third Party Risk Management (TPRM)
Cyble’s Third-Party Risk Management (TPRM) solution helps identify and mitigate risks associated with third-party collaborations, ensuring secure business operations. By assessing the security posture of vendors and partners, Cyble enables organizations to proactively manage potential vulnerabilities in their supply chain and external relationships.
Cloud Security Posture Management (CSPM)
Cyble’s Cloud Security Posture Management (CSPM) solution continuously monitors cloud environments to identify misconfigurations and ensure compliance with security policies. Consistent evaluation of cloud infrastructure helps businesses secure their cloud platforms, mitigate potential security gaps, and enhance the overall security posture, providing real-time protection against cloud threats.
Conclusion
The ANZ Threat Landscape Report 2024 vividly describes the growing cybersecurity threats facing organizations across Australia and New Zealand. With ransomware attacks, politically motivated cybercrimes, and critical infrastructure vulnerabilities on the rise, CISOs must be more vigilant than ever in strengthening their organizations’ defenses.
Cyble offers a suite of cybersecurity solutions for organizations in Australia and New Zealand, including Cyble Vision for real-time threat intelligence and vulnerability management, Cyble Hawk for national security insights, Odin for internet scanning and vulnerability detection, AmIBreached for dark web risk mitigation, and The Cyber Express for expert cybersecurity news. These tools help organizations proactively address threats and enhance security in a complex cyberspace.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-20 12:07:182024-11-20 12:07:18CISOs’ Key Takeaways from the ANZ (Australia and New Zealand) Threat Landscape Report 2024
Persistence mechanisms are techniques used by attackers to keep malware active, even after log-offs, reboots, or restarts. In other words, they’re techniques that make malware tougher to detect and even harder to remove once it’s on a system.
Let’s dive into a few of the common mechanisms attackers use to keep their malware persistent, quietly doing its work in the background.
What’s Persistence in Cybersecurity?
In cybersecurity, persistence refers to the ability of malware or an attacker to maintain access to a compromised system over time.
Persistence mechanisms are tools or techniques that allow malware or unauthorized users to stay embedded within a system without needing to reinitiate the attack every time the system restarts.
For cyber attackers, persistence can be useful for activities like data theft, surveillance, and further spreading of malware.
These mechanisms can be simple, such as adding files to the system’s startup folder. They also get more complicated, like modifying system registry keys or even embedding code into core system processes
Let’s explore some of the most common malware persistence mechanisms attackers use and detect them with the help of ANY.RUN’s Interactive Sandbox.
1. Startup Directory Execution
MITRE ATT&CK ID: T1547.001
One of the go-to techniques for malware persistence is dropping files in the Startup directory.
When a program is placed in the Startup folder on a Windows system, it automatically runs every time the user logs in.
It’s a straightforward, built-in function. Windows lets you put programs there for convenience, so your favorite apps or tools can launch without you having to click anything.
Attackers know this and use it to their advantage. They sneak a malicious file into the Startup folder, so each time the computer boots up, their malware launches too, right along with everything else.
Why is this technique effective? Well, most people don’t ever look in their Startup folder, so it’s easy for these files to go unnoticed. Plus, it doesn’t take a lot of effort for malware to blend in here. It just quietly restarts itself with every logon or reboot without raising obvious alarms.
We can observe this persistence mechanism inside the following sandbox session. Here, the Snake Keylogger malware adds malicious files inside the Startup directory of the Windows system.
To see this in the ANY.RUN sandbox, check the Process Tree on the right side of the screen, where you’ll find the malware’s actions demonstrated.
Click on it to get further details.
In this case, the file is created in the following location C:UsersadminAppDataRoamingMicrosoftWindowsStart MenuProgramsStartup, which is the Startup folder on a Windows system.
Creating files in the Startup directory is a simpler approach. It doesn’t require any changes to the system’s registry or deep permissions, and it’s a method users could technically spot by checking their Startup folder.
On the other hand, Registry Autorun key modification dives a bit deeper. By creating or modifying specific registry keys, malware can make sure it runs automatically every time the system starts.
Malware achieves this type of persistence by altering the registry keys in one of ASEPs (AutoStart Extension Points).
Malware targeting user-level persistence will typically modify these registry keys:
In the following analysis session, Njrat changes the registry key at the User level: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
3. Logon/Logoff Helper Path Modification
MITRE ATT&CK ID: T1547.004
Windows has built-in “helper” paths in the registry that handle tasks during login and logoff. They’re meant to run specific programs or scripts to assist with the user’s session start or end, like running a script that sets up a network drive when you log in.
Attackers know this, and they’ve figured out that by tweaking these paths, they can set up their malware to launch every time someone logs in or out of the system.
How does it work? By altering registry keys that manage these login/logoff helpers, like the ones in HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWinlogon, malware can slip itself into the sequence of programs that automatically run during these key moments.
This means every time you log in, the malware gets a fresh start without needing to infect the system repeatedly.
For instance, the following analysis session shows how malware uses this technique to achieve persistence.
4. Kernel Modules and Extensions (Linux)
MITRE ATT&CK ID: T1547.006
In Linux, the kernel, the core part of the operating system, is responsible for handling essential functions like managing system resources and hardware interactions.
Kernel modules are pieces of code that can be loaded and run within the kernel to extend its capabilities, like adding support for new hardware.
Normally, these modules are legitimate and provide helpful functions, but attackers have found a way to use them to their advantage.
Here’s how this malware persistence mechanism works.
Loading the malicious module
Malware can install a malicious kernel module, giving it the ability to load directly into the kernel.
To achieve this, malware usually requires root (administrator) privileges. Once these privileges are obtained, the malware can use commands like insmod, modprobe, or depmod to load the malicious module into the kernel.
Since kernel modules run in kernel space, the malware operates with high privilege levels, which means it has almost unrestricted access to system resources.
This includes access to the network stack, filesystem, memory, and hardware devices, which allows it to monitor or intercept communications, manipulate data, and hide its presence.
Stealth and evasion
It’s a highly stealthy technique because, once loaded, the malware becomes part of the core system functions.
Once loaded, the malicious module can camouflage itself by removing signs of its presence, like clearing log entries or hooking into kernel functions to hide processes or files. Since standard antivirus and security tools operate at the user level, they often can’t detect or interact with kernel-level threats.
Learn to analyze cyber threats
See a detailed guide to using ANY.RUN’s Interactive Sandbox for malware and phishing analysis
Read full guide
5. Office Application Startup
MITRE ATT&CK ID: T1137
Microsoft Office applications, like Word or Excel, have certain startup files or templates they load whenever you open them. Attackers know that Office is used widely, especially in workplaces, so they take advantage of this feature to get their malware up and running whenever someone opens an Office app.
Office offers various mechanisms that attackers can manipulate to ensure their malware relaunches every time an Office application starts up.
Two common methods for achieving persistence in Office applications include:
Office template macros: Attackers can embed malicious macros in Office template files. These templates are automatically loaded each time the application is opened, which means the embedded malicious code is executed without additional prompts or interaction from the user.
Add-ins: Microsoft Office allows users to install add-ins—mini applications that extend Office functionality. Attackers can create malicious add-ins and place them in Office’s add-in directories. When the infected add-in is installed, it loads alongside the Office application, providing another layer of persistence that activates whenever the application starts.
In the following malware analysis session, the attackers used a macro to achieve persistence in Office applications. It’s immediately detected by the ANY.RUN sandbox:
The infected Office file in displayed inside the virtual machine:
6. Boot or Logon Initialization Scripts
MITRE ATT&CK ID: T1037
Adversaries often leverage scripts that automatically run during system boot or user logon to establish persistence. These initialization scripts are typically used for administrative tasks, like launching other programs or sending logs to an internal server. Because of this, they’re a convenient target for attackers looking to maintain a foothold on a system.
The details of these scripts vary by operating system and setup—they can be applied either locally on a single machine or across multiple systems in a network. By modifying these scripts, attackers ensure their malware executes at every startup or login, keeping it active without requiring user interaction.
In the example above, attackers modified RC scripts to achieve persistence in the system.
Detect Persistence Mechanisms Quickly in ANY.RUN Sandbox
To spot persistence mechanisms used by attackers, ANY.RUN integrates the MITRE ATT&CK Matrix framework.
Simply click the ATT&CK button on the right side of the screen, and ANY.RUN sandbox will display all the techniques and sub-techniques observed in that specific analysis session, making it fast and easy to see exactly what’s in play.
Conclusion
Attackers use various methods to keep their malware active on infected systems. These methods range from simple, like putting malicious files in the Startup directory, to complex, such as changing registry keys or targeting kernel modules. Each technique uses built-in system features to avoid detection and stay in control. With ANY.RUN’s Interactive Sandbox you can identify these persistence methods and put into a larger context of the attack, seeing how it plays out at every stage.
About ANY.RUN
ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.
With ANY.RUN you can:
Detect malware in seconds
Interact with samples in real time
Save time and money on sandbox setup and maintenance
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-20 11:06:462024-11-20 11:06:466 Common Persistence Mechanisms in Malware
QR codes are disproportionately effective at bypassing most anti-spam filters, as most filters are not designed to recognize that a QR code is present in an image and decode the QR code. According to Talos’ data, roughly 60% of all email containing a QR code is spam.
Talos discovered two effective methods for defanging malicious QR codes, a necessary step to make them safe for consumption. Users could obscure the data modules, the black and white squares within the QR code that represent the encoded data. Alternatively, users could remove one or more of the position detection patterns — large square boxes located in corners of the QR code used to initially identify the code’s orientation and position.
Further complicating detection, both by users and anti-spam filters, Talos found QR code images which are “QR code art”. These images blend the data points of a QR code seamlessly into an artistic image, so the result does not appear to be a QR code at all.
Prior to 1994, most code scanning technology utilized one-dimensional barcodes. These one-dimensional barcodes consist of a series of parallel black lines of varying width and spacing. We are all familiar with these codes, like the type you might find on the back of a cereal box from the grocery store. However, as the use of barcodes spread, their limitations became problematic, especially considering that a one-dimensional barcode can only hold up to 80 alphanumeric characters of information. To eliminate this limitation, a company named Denso Wave created the very first “Quick Response“ codes (QR codes).
QR codes are a 2-dimensional matrix bar code that can hold encode just over seven thousand numeric characters, or up to approximately four thousand three hundred alphanumeric characters. While they can represent almost any data, most frequently we encounter QR codes that are used to encode URLs.
Quantifying the QR code problem
Cisco Talos extracts QR codes from images inside email messages and attached PDF files for analysis. QR codes in email messages make up as little as .01% up to .2% of all email, worldwide. This equates to roughly 1 out of every 500 email messages. This is not a very big number. However, because QR codes are disproportionately effective at bypassing anti-spam filters, a significant number find their way into users’ email inboxes, skewing users’ perception of the overall problem.
Also, of course, not all email messages with a QR code inside are spam or malicious. Many email users send QR codes as part of their email signature, or you may also find legitimate emails containing QR codes used as signups for events, and so on. However, according to Talos’ data, roughly 60% of all email containing a QR code is spam.
Truly malicious QR codes can be found in a much smaller number of messages. These emails contain links to phishing pages, etc. The most common malicious QR codes tend to be multifactor authentication requests used for phishing user credentials.
One of the problems that defenders may encounter when dealing with users’ scanning of QR codes received via email, assuming the user’s device is not connected to the corporate Wi-Fi, is that subsequent traffic between the victim and the attacker will traverse the cellular network, largely outside the purview of corporate security devices. This can complicate defense, because few/no alerts from security devices will notify security teams that this has occurred.
Why are malicious QR codes hard to detect?
Because QR codes are displayed in images, it can be difficult for anti-spam systems to identify problematic codes. Identifying and filtering these messages requires the anti-spam system to recognize that a QR code is present in an image, decode the QR code, then analyze the link (or other data) present in the decoded data. As spammers are always looking for innovative ways to bypass spam filters, using QR codes has been a valuable technique for spammers to accomplish this.
As anti-spam systems improve their capability to detect malicious QR codes in images, enterprising attackers have instead decided to craft their QR codes using Unicode characters. Below is an example of an email containing a Unicode art QR code.
The graphical parts of the image are contained within a PDF file. The PDF metadata indicates was created from HTML using the tool wkhtmltopdf. Converting the PDF back into HTML shows the Unicode that is being used to construct the QR code.
Defanging QR codes
When sharing malicious URLs, it is common to change the protocol from “http” to “hxxp”, or to add brackets [] around one of the dots in the URL. This makes it so browsers and other applications do not render the link as an active URL, ensuring that users do not inadvertently click on the malicious URL. This is a process known as “defanging”. Unfortunately, while defanging URLs is commonplace, many people do not defang malicious QR codes. For example, below is a news article from BBC about criminals who put QR code stickers on parking meters in an attempt to harvest payment credentials from unsuspecting victims.
The problem is that these QR codes can still be scanned, taking visitors to whatever malicious link that the QR code encoded. To make malicious QR codes safe for consumption, they should be defanged.
There are a couple of different ways to do this. One way is to obscure the data modules, the black and white squares within the QR code that represent the encoded data. This is where the data that the QR code represents is located. However, based on Talos’ own research, a far easier way to defang a QR code is to remove one or more of the position detection patterns (a.k.a. finder patterns). These are the large square boxes located in three of the four corners of the QR code, which are used by the QR code scanner to initially identify the code’s orientation and position. Removing the position detection patterns renders a QR code unscannable by virtually all scanners.
Be careful what you scan!
For years security professionals have encouraged users not to click on unfamiliar or suspicious URLs. These URLs could potentially lead to phishing pages, malware or other harmful sites. However, many users do not exercise the same care when scanning an unknown QR code as they do when clicking on a suspicious link. To be clear, scanning an unknown/suspicious QR code is equivalent to clicking on a suspicious URL.
To complicate the situation even more, there are QR code images which are “QR code art”. These images blend the data points of a QR code seamlessly into an artistic image, so the result does not appear to be a QR code at all. The potential danger with QR code art images is that a user could conceivably be tricked into scanning a QR code art image with their camera, and then inadvertently navigate to the linked content without realizing it. Below are some QR codes found online by Talos which illustrate a range of artistic possibilities.
Note: these images have been created by third parties and posted online. Talos is not responsible for the artwork, nor the linked content.
How to protect yourself from malicious QR codes
QR codes have become ubiquitous, appearing in email, on restaurant menus, at events, on retail packaging, in museums, even public parks and trails. The perfect defense is to avoid scanning *any* QR codes, however, it can be difficult to avoid scanning these entirely, so users must exercise caution. Scanning a QR code is essentially the same as clicking on an unknown hyperlink, but without the ability to see the full URL beforehand.
There are several QR code decoders freely available online. Typically, if you can save a screenshot of the QR code, you can upload this image to one of these decoders, and the QR code decoder will tell you what data was encoded inside the QR code. This will enable you more closely inspect the link. You can also choose to navigate to that URL using an application like Cisco Secure Malware Analytics (Threat Grid). This will allow you to view the content behind the URL from a safe place, without jeopardizing the security of your desktop or mobile device. As always, never EVER enter your username and password into an unknown site. It is better to navigate directly to anywhere you wish to login, rather than clicking on a URL presented to you from an unknown third party.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-20 11:06:452024-11-20 11:06:45Malicious QR codes
In 2024, the Middle East faces an escalating wave of cyberattacks amid its rapid digital transformation, with zero-day exploits and advanced attack techniques targeting critical infrastructure, government entities, and supply chains. Cybercriminals are increasingly exploiting vulnerabilities like CVE-2024-4577 and CVE-2024-26169, demonstrating a heightened ability to disrupt sectors such as oil, gas, and telecommunications.
In response, regional governments are strengthening Middle East cybersecurity frameworks, with nations like Qatar, Saudi Arabia, and Oman enforcing stricter regulations and fostering cross-sector collaboration. The cost of cyber incidents has surged, with financial and operational tolls reaching unprecedented levels. To mitigate these threats, organizations are urged to adopt proactive patch management, invest in AI-driven defense, and strengthen supply chain security, while enhancing regional cooperation to combat shared threats.
The Rise of Zero-Day Exploits: A Double-Edged Sword
Cyber adversaries in 2024 have demonstrated an unsettling ability to weaponize zero-day vulnerabilities faster than ever before. Take CVE-2024-4577, for example: within days of its patch release, attackers wielded it to propagate the infamous TellYouThePass ransomware. Similarly, the Cardinal cybercrime group exploited CVE-2024-26169—a Windows kernel flaw—weeks before Microsoft rolled out a patch. These incidents are a stark reminder of the urgent need for organizations to adopt real-time monitoring systems and robust patch management strategies.
Attack Techniques That Redefine Sophistication
The arsenal of cybercriminals is expanding. In 2024, innovative attack techniques such as the Terrapin Attack (CVE-2023-48795) and OpenSSH Command Injection (CVE-2023-51385) have exposed vulnerabilities in encryption protocols and communication systems. The Terrapin Attack, a downgrade assault on the SSH protocol, revealed the fragility of encryption systems under certain conditions. Meanwhile, the exploitation of OpenSSH’s ProxyCommand feature underscored the critical need for securing shell operations in enterprise environments.
Targeted Sectors: Where the Hits Keep Coming
Some industries in the Middle East have become favored targets:
Government Institutions: Almost 25% of all reported attacks in 2024 targeted government entities, with a mix of ransomware and wiper malware like the “BiBi Wiper” aimed at destabilizing operations in Israel.
Critical Infrastructure:Cyberattacks on oil, gas, and transportation sectors exploited vulnerabilities in operational technology (OT), such as CVE-2024-9463 in Palo Alto Networks’ Expedition platform.
Telecommunications: Hacktivist campaigns leveraged CVE-2023-41570, disrupting wireless network management systems and cascading impacts across dependent industries.
Supply Chains Under Siege
The introduction of malicious components into electronic devices in September 2024 marked a new low for supply chain vulnerabilities. These attacks bypassed traditional defenses, enabling long-term, undetected infiltration into critical ecosystems. The lesson? Rigorous supply chain risk management must become a priority.
Governments Fight Back: A Unified Cybersecurity Front
The region’s response to escalating threats has been commendable.
Qatar: Under the National Cybersecurity Strategy (2024), the National Cyber Security Agency (NCSA) has championed cross-sector collaboration.
Saudi Arabia: The National Cybersecurity Authority (NCA) enforces its Essential Cybersecurity Controls (ECC) with a focus on resilience and governance.
Oman: Foundational frameworks like the Basic Security Controls (BSC) continue to guide both public and private entities toward stronger defenses.
Meanwhile, stricter regulations, including Qatar’s Personal Data Protection Law (PDPL) and Saudi Arabia’s Anti-Cyber Crime Law, are pushing organizations to prioritize data security, incident response, and compliance.
The Cost of Cyber Insecurity
Cyberattacks are exacting a steep toll in the Middle East cybersecurity in 2024. The average cost of a cyber incident in the region hit $8.75 million in 2024—almost double the global average. Critical infrastructure and financial services bore the brunt, with operational disruptions at gas stations in Iran exemplifying the widespread ripple effects of such incidents.
The dark web has only added fuel to the fire. Over 10 million sensitive credentials from government and financial institutions surfaced online this year, exacerbating public distrust and inviting stricter regulatory scrutiny.
Strategic Recommendations for Organizations
Accelerate Patch Management: A proactive approach to real-time monitoring and immediate patching can mitigate vulnerabilities before attackers exploit them.
Invest in AI-Driven Defense: Advanced AI tools for threat detection and automated response can outpace even the most sophisticated attackers.
Strengthen Supply Chain Security: Stringent vetting of suppliers and the adoption of robust risk management practices are now non-negotiable.
Enhance Regional Collaboration: Real-time intelligence sharing between nations and industries is critical to combating shared threats.
Looking Ahead
As the Middle East continues its digital transformation, its cybersecurity challenges will only grow. Yet, with the right investments in technology, collaboration, and governance, the region has the potential to turn these challenges into opportunities for resilience and innovation. For organizations operating in this dynamic landscape, staying ahead of the curve is not just a strategic advantage—it’s an imperative.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-19 14:06:412024-11-19 14:06:41Middle East Cybersecurity in 2024: From Zero-Day Exploits to Supply Chain Attacks
Today, we’re excited to introduce a major update to Kaspersky Password Manager for mobile devices. This update will be available in all app stores during November 2024. We’re confident this refresh will make storing and managing passwords, two-factor authentication codes, and encrypted documents even easier. In this article, we’ll cover advanced filtering, search functionality, synchronization, and more.
Highlights
The mobile version of our password manager is celebrating its 10th anniversary this year (while the desktop version turns 15), and in those 10 years we’ve managed to consolidate all the best features into a single app. In recent years, we’ve been conducting extensive Kaspersky Password Manager user-behavior research and, based on the findings, we’ve completely revamped the navigation in our mobile app.
What’s new:
The side menu has been replaced with a navigation bar at the bottom of the screen. The product’s core features are now organized into sections.
We’ve created a dedicated section for the in-app search, and improved the search scenarios.
Managing favorite entries is now more convenient; they’re now pinned at the top of the list.
We’ve added a “Sync” button and placed it in a prominent location.
The password generator, import, and security-check features have been grouped into a separate “Tools” section.
These changes are available to all Kaspersky Password Manager users on both Android (app version 9.2.106 and later) and iOS (app version 9.2.92 and later).
Navigation bar
All core Kaspersky Password Manager functions are now accessible through the navigation bar at the bottom of the screen.
Updated home screen of Kaspersky Password Manager for iOS (left) and Android (right)
Let’s look at each element of the new bar from left to right.
All Entries. This is the main menu – the heart of our password manager.
Subscription. Here, you can view your current subscription, including the expiry date and provider. If you don’t have a subscription, you can create or log in to a My Kaspersky account to activate or purchase one.
Tools. Here, you’ll find the “Password Generator”, “Password Check”, and “Import Passwords” tools. The names speak for themselves. With a single click, you can create strong, unique passwords, check your existing passwords for uniqueness, strength, security, and compromise in data breaches, and import passwords from built-in browser password managers and similar products into our secure vault.
Search. If you’re an active internet user and have dozens or even hundreds of unique passwords for different accounts saved in Kaspersky Password Manager, simply click on the magnifying glass icon and type just a few characters to quickly find the entry you need.
Settings. This is where you can enable notifications, change your primary password, configure auto-lock and login methods, choose sorting options, access help resources, check the app version, and log out of your account.
New filtering
Let’s dive a little deeper. Another additional feature is the option to select entry categories within a section. Now, clicking “All Entries” opens a dropdown menu with these categories: websites, apps, other, bank cards, documents, addresses, notes, authenticator, and folders (you can create new folders as needed).
New entry category display in Kaspersky Password Manager for iOS (left) and Android (right)
Other additions
In the top right corner, you’ll notice a new “Sync” icon – replacing the “Search” button, which now resides in the navigation bar. Clicking this new icon displays the current synchronization status of your entries between your cloud storage and devices. If everything is in order, and your smartphone is connected to the internet and operating normally, you’ll see “All data is synced” with the date and time of the last sync. To refresh the data manually, click “Sync”.
The Search function has not only gotten its own tab in the navigation bar, but now also remembers your last search within the current session. For example, let’s say you were searching for your virtual card details while shopping, then switched to the “All Entries” menu, checked the settings and sync status, and then returned to “Search”. Your query and results will remain, despite your little wander through Kaspersky Password Manager. However, if you restart the app or clear the search, you’ll have to enter the query again.
Important note for Kaspersky Password Manager users on iOS 18. Due to Apple’s policies, the default source for auto-filling passwords and logins in iOS 18 is Apple’s built-in “Passwords” app, not Kaspersky Password Manager. This is easy to fix:
After updating to iOS 18, you need to launch Apple’s “Passwords” app at least once. This will activate the “AutoFill & Passwords” section in your device settings.
Go to “AutoFill & Passwords” in the device settings.
Everything is now set for secure password management. On Android devices, when you first launch the password manager, enable autofill permissions. Simply follow the in-app instructions to do so.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-19 10:06:312024-11-19 10:06:31Kaspersky Password Manager Update | Kaspersky official blog