Defeating Future Threats Starts Today

Defeating Future Threats Starts Today

Welcome to this week’s edition of the Threat Source newsletter. 

You don’t need me to tell you that security is constantly changing and that more change is on its way. The enthusiastic adoption of new AI systems will inevitably lead to more demands on cybersecurity teams. Not only will these systems need protecting against the same threats which affect current systems, but also against new types of threats that target AI models. We can only expect that attacks designed to subvert AI models and get them to function in ways detrimental to their operators’ interests will become more effective and beneficial to attackers over time. 

The good news is that we can expect AI enabled security systems to help protect against attacks, detect incursions, and orchestrate the remediation of affected systems. However, we must not overlook the fact that people will remain involved and invested in the outcome. Within this AI powered future will be CISOs who will be held responsible for the security of systems. There will also be many analysts tasked with keeping systems operating correctly while trying to anticipate and protect against forthcoming malicious campaigns.

Although we may not be able to predict the nature of attacks in this distant future, we can predict some of the skills that will be necessary to beat these attacks. Threat intelligence skills will be vital to equip future cyber security professionals not only to understand the goals of the threat actors that they face but to situate their attacks within the context of these goals. Armed with this understanding, security teams will be able to make better decisions regarding the allocation and prioritization of resources to best defend against attacks. 

Developing threat intelligence skills within the cyber security professionals of tomorrow begins today. Training up people who are early in their careers and students yet to begin their careers is one of the best investments we can make to build resilience against future threats.

To help skill up future analysts, my colleagues and myself in collaboration with Cisco’s Networking Academy have developed an introductory course to threat intelligence. This course is free for all, only registration is required, and is intended to give an overview of the domain for someone without prior knowledge which can be used as a starting point for further study or employment.

For those looking to develop a threat intelligence program as part of their cyber security strategy, we are hosting a technical seminar at Cisco Live EMEA on Sunday February 9th. The session, “Establishing a Threat Intelligence Program, Why its Necessary, What to Expect and How to Go about it [TECSEC-2003]”, will present how managers can set-up a threat intelligence team as part of their arsenal against the bad guys and what can reasonably be expected.

The one big thing

One pointer to the nature of future threats against AI systems is a technique used in spam that Talos recently blogged about. Hiding the nature of the content displayed to the recipient from anti-spam systems is not a new technique. Spammers have included hidden text or used formatting rules to camouflage their actual message from anti-spam analysis for decades. However, we have seen increase in the use of such techniques during the second half of 2024.

Why do I care?

Parsers which are required for computers to understand text content, view the world very differently from humans. The human eye ignores text in miniscule font or can’t detect black letters on a black background, but this is not necessarily the case for parsers. Where the human eye sees readily readable text, the parser can see the gibberish that spammers have included to confuse them. Potentially the opposite is also true with humans seeing gibberish, but language parsing software seeing readable text.

Being able to disguise and hide content from machine analysis or from human oversight is likely to become a more important vector of attack against AI systems as they become a larger part of our lives. 

So now what?

Fortunately, the techniques to detect this kind of obfuscation are well known and already integrated into spam detection systems such as Cisco Email Threat Defense. Conversely, the presence of attempts to obfuscate content in this manner makes it obvious that a message is malicious and can be classed as spam.

Top security headlines of the week

Another incident of an undersea telecommunications cable being cut in the Baltic was encountered. (CNN). Organisations need to plan for the effects of a major telecommunications outage or internet bandwidth restriction affecting their business.

Three members of Russia’s GRU have been placed under sanctions for their suspected role in conducting cyber attacks against Estonia in 2020 (SecurityAffairs). Threat actors might try to hide their identities but eventually they will be discovered and held to account for their actions.

A botnet consisting of infected IoT devices is behind the largest ever DDoS attack (Help Net Security). Small network connected devices can easily be overlooked as part of a cyber security strategy, but they can be compromised by threat actors and used for nefarious purposes.

Can’t get enough Talos?

Today we released the new Cisco Talos Quarterly Trends Report – covering incidents from October to December 2024. The big call out? Threat actors are increasingly deployed web shells against vulnerable web applications. They primarily exploited vulnerable or unpatched public-facing applications to gain initial access, a notable shift from previous quarters.

Watch Hazel, Joe and Craig break down the report – they discuss hunting down web shells, the Interlock ransomware, and the increasing use of remote access tools within ransomware attacks.

Upcoming events where you can find Talos

Talos team members: Martin LEE, Thorsten ROSENDAHL, Yuri KRAMARZ, Giannis TZIAKOURIS, and Vanja SVAJCER will be speaking at Cisco Live EMEA. Amsterdam, Netherlands, 9-14 February.  (Cisco Live EMEA)

Most prevalent malware files of the week

SHA 256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507
MD5: 2915b3f8b703eb744fc54c81f4a9c67f
VirusTotal:https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507
Typical Filename: VID001.exe
Detection Name: Simple_Custom_DetectionClaimed Product: 

SHA 256: 47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca
MD5: 71fea034b422e4a17ebb06022532fdde
VirusTotal: https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca
Typical Filename: VID001.exe
Claimed Product: N/A
Detection Name: Coinminer:MBT.26mw.in14.Talos

SHA 256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91
MD5: 7bdbd180c081fa63ca94f9c22c457376
VirusTotal: https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91
Typical Filename: c0dwjdi6a.dll
Claimed Product: N/A
Detection Name: Trojan.GenericKD.33515991

Cisco Talos Blog – ​Read More

How the Banshee stealer infects macOS users | Kaspersky official blog

Many macOS users believe their operating system is immune to malware, so they don’t need to take extra security precautions. In reality, it’s far from the truth, and new threats keep popping up.

Are there viruses for macOS?

Yes — and plenty of ’em. Here are some examples of Mac malware we’ve previously covered on Kaspersky Daily and Securelist:

  • A crypto-wallet-stealing Trojan disguised as pirated versions of popular macOS apps.
The Trojan's installation in macOS

This Trojan’s malicious payload is stored in the “activator”. The cracked app won’t work until it’s launched.Source

We could go on with this list of past threats, but let’s instead now focus on one of the latest attacks targeting macOS users, namely – the Banshee stealer…

What the Banshee stealer does

Banshee is a fully-fledged infostealer. This is a type of malware that searches the infected device (in our case, a Mac) for valuable data and sends it to the criminals behind it. Banshee is primarily focused on stealing data related to cryptocurrency and blockchain.

Here’s what this malware does once it’s inside the system:

  • Steals logins and passwords saved in various browsers: Google Chrome, Brave, Microsoft Edge, Vivaldi, Yandex Browser, and Opera.
  • Steals information stored by browser extensions. The stealer targets over 50 extensions – most of which are related to crypto wallets, including Coinbase Wallet, MetaMask, Trust Wallet, Guarda, Exodus, and Nami.
  • Steals 2FA tokens stored in the Authenticator.cc browser extension.
  • Searches for and extracts data from cryptocurrency wallet applications, including Exodus, Electrum, Coinomi, Guarda, Wasabi, Atomic, and Ledger.
  • Harvests system information and steals the macOS password by displaying a fake password entry window.

Banshee compiles all this data neatly into a ZIP archive, encrypts it with a simple XOR cipher, and sends it to the attackers’ command-and-control server.

In its latest versions, Banshee’s developers have added the ability to bypass the built-in macOS antivirus, XProtect. Interestingly, to evade detection, the malware uses the same algorithm that XProtect uses to protect itself, encrypting key segments of its code and decrypting them on the fly during execution.

How the Banshee stealer spreads

The operators of Banshee primarily used GitHub to infect their victims. As bait, they uploaded cracked versions of expensive software such as Autodesk AutoCAD, Adobe Acrobat Pro, Adobe Premiere Pro, Capture One Pro, and Blackmagic Design DaVinci Resolve.

Banshee stealer distribution on GitHub

The creators of Banshee used GitHub to spread the malware under the guise of pirated software. Source

The attackers often targeted both macOS and Windows users at the same time: Banshee was often paired with a Windows stealer called Lumma.

Another Banshee campaign, discovered after the stealer’s source code was leaked (more on that below), involved a phishing site offering macOS users to download “Telegram Local” – supposedly designed to protect against phishing and malware. Of course, the downloaded file was infected. Interestingly, users of other operating systems wouldn’t even see the malicious link.

Banshee being spread through a phishing site

A phishing site offers to download Banshee disguised as “Telegram Local”, but only to macOS users (left). Source

The past and future of Banshee

Let’s now turn to Banshee’s history, which is really quite interesting. This malware first appeared in July 2024. Its developers marketed it as a malware-as-a-service (MaaS) subscription, charging $3000 per month.

Business must not have been great, as by mid-August they’d slashed the price by 50% – bringing the monthly subscription down to $1500.

Discounted Banshee stealer announcement

A hacker site ad announcing a discount on Banshee: $1500 instead of $3000 per month. Source

At some point, the creators either changed their strategy, or decided to add an affiliate program to their portfolio. They began recruiting partners for joint campaigns. In these campaigns, Banshee’s creators provided the malware, and the partners executed the actual attack. The developers’ idea was to split the earnings 50/50.

However, something must have gone very wrong. In late November, Banshee’s source code was leaked and published on a hacker forum – thus ending the malware’s commercial life. The developers announced they were quitting the business – but not before attempting to sell the entire project for 1BTC, and then for $30,000 (most likely having learned of the leak).

Thus, for several months now, this serious stealer for macOS has been available to essentially anyone completely free of charge. Even worse, with the source code also available, cybercriminals can now create their own modified versions of Banshee.

And judging from the evidence, this is already happening. For example, the original versions of Banshee stopped working if the operating system was running in the Russian language. However, one of the latest versions has removed the language check, meaning Russian-speaking users are now also at risk.

How to protect yourself from Banshee and other macOS threats

Here are some tips for macOS users to stay safe:

  • Don’t install pirated software on your Mac. The risk of running into a Trojan by doing so is very high, and the consequences can be severe.
  • This is especially true if you use the same Mac for cryptocurrency transactions. In this case, the potential financial damage could significantly exceed any savings you make on purchasing genuine software.
  • In general, avoid installing unnecessary applications, and remember to uninstall programs you no longer use.
  • Be cautious with browser extensions. They may seem harmless at first glance, but many extensions have full access to the contents of all web pages, making them just as dangerous as full-fledged apps.
  • And of course, be sure to install a reliable antivirus on your Mac. As we’ve seen, malware for macOS is a very real threat.

Finally, a word on Kaspersky security products. They can detect and block many Banshee variants with the verdict Trojan-PSW.OSX.Banshee. Some new versions resemble the AMOS stealer, so they can also be detected as Trojan-PSW.OSX.Amos.gen.

Kaspersky official blog – ​Read More

DeepSeek’s Growing Influence Sparks a Surge in Frauds and Phishing Attacks

Cyble DeepSeek Fraud

Overview

DeepSeek is a Chinese artificial intelligence company that has developed open-source large language models (LLMs). In January 2025, DeepSeek launched its first free chatbot app, “DeepSeek – AI Assistant”, which rapidly became the most downloaded free app on the iOS App Store in the United States, surpassing even OpenAI’s ChatGPT.

However, with rapid growth comes new risks—cybercriminals are exploiting DeepSeek’s reputation through phishing campaigns, fake investment scams, and malware disguised as DeepSeek. This analysis seeks to explore recent incidents where Threat Actors (TAs) have impersonated DeepSeek to target users, highlighting their tactics and how readers can secure themselves accordingly.

Recently, Cyble Research and Intelligence Labs (CRIL) identified multiple suspicious websites impersonating DeepSeek. Many of these sites were linked to crypto phishing schemes and fraudulent investment scams. We have compiled a list of the identified suspicious sites:

  • abs-register[.]com
  • deep-whitelist[.]com
  • deepseek-ai[.]cloud
  • deepseek[.]boats
  • deepseek-shares[.]com
  • deepseek-aiassistant[.]com
  • usadeepseek[.]com

Campaign Details

Crypto phishing leveraging the popularity of DeepSeek

CRIL uncovered a crypto phishing scheme leveraging DeepSeek’s rising popularity. Cybercriminals created fraudulent websites that closely mimic the legitimate DeepSeek platform, luring users into scanning a QR code that ultimately compromises their crypto wallets. We identified the three following deceptive websites designed to exploit unsuspecting victims.

  • hxxp://abs-register[.]com/
  • hxxps://deep-whitelist[.]com/

Figure 1 – Crypto phishing website impersonating DeepSeek

When users click on the “Connect Wallet” button, they are presented with a list of cryptocurrency wallets, including popular options such as MetaMask, WalletConnect, and others, as shown below.

Figure 2 – Phishing websites presenting a list of different crypto wallets

When a user selects any of the wallet options, a QR code is displayed to establish a wallet connection. Scanning this QR code leads to the compromise of the user’s wallet account, potentially resulting in the loss of all their crypto funds.

Figure 3 – Phishing site displaying QR code

QR code-based crypto phishing scams are increasingly common, often exploiting trending or widely recognized entities to deceive users. Cybercriminals take advantage of popular platforms to gain victims’ trust and trick them into compromising their wallets. With DeepSeek’s rising prominence, TAs have now increasingly started to impersonate this platform, using deceptive tactics to lure unsuspecting users into their traps.

In addition to QR code-based crypto phishing sites, we also identified several fraudulent websites promoting a fake DeepSeekAI Agent token. These sites display a coin address and urge users to purchase the mentioned cryptocurrency, ultimately scamming unsuspecting investors.

Figure 4 – Fraud website promoting DeepSeekAI Agent token

Upon analyzing the provided address “0x27238b76965387f5628496d1e4d2722b663d2698”, we found it to be a honeypot token that has already been blacklisted, confirming it as a fraudulent scheme. Victims who purchased tokens using this address will be unable to withdraw or trade the tokens, resulting in total financial loss.

Figure 5 – Token audit screenshot

Similar fraudulent schemes have emerged following DeepSeek’s announcement, capitalizing on its growing recognition. However, DeepSeek has not launched any official cryptocurrency or token, making any such claims entirely deceptive and a clear attempt to exploit unsuspecting investors.

Fake Investment scam

We discovered the domain “deepseek-shares.com”, which was registered on January 29, 2025. This website falsely presents itself as an official DeepSeek investment platform, claiming to offer DeepSeek Pre-IPO shares to lure potential investors.

Figure 6 – Fake investment website

However, DeepSeek is a privately held organization, and no official IPO announcements have been made at this point. This fraudulent website is designed to mislead users by promoting a fake investment opportunity. The primary intent behind its creation is to harvest sensitive user information, which could later be exploited for targeted phishing attacks, identity theft, or financial fraud.

Collecting Personal Information

Some websites prompt users to submit Personally Identifiable Information (PII), such as their name and email. Collecting PII without clear consent raises serious privacy and security concerns, potentially leading to spam, phishing, or identity theft.

Figure 7 – A Website collecting PII

Threat Actors Leveraging DeepSeek’s Popularity for Malware Delivery

We have identified multiple websites claiming to offer DeepSeek app downloads for Windows, iOS, and Android. While some of these newly created websites appear to be in the development stage, it cannot be confirmed whether they ultimately redirect to the official page or serve any malicious content.

However, malicious samples with filenames starting with ‘DeepSeek’ have indeed been detected in the wild, suggesting that TAs are exploiting DeepSeek’s popularity to distribute malware, leveraging phishing sites to deliver malicious software such as AMOS Stealer. To stay secure, we recommend downloading DeepSeek only from its official website.

Figure 8 – AMOS Stealer Samples

Conclusion

As DeepSeek continues to gain global recognition, cybercriminals are capitalizing on its popularity to launch phishing campaigns, fake investment scams, and fraudulent cryptocurrency schemes. From QR code-based wallet phishing to counterfeit DeepSeek token promotions, these attacks pose serious risks to unsuspecting users, leading to financial losses and compromised security.

The rise of such threats highlights the importance of vigilance in the crypto and AI space. Users must remain cautious, verify official sources, and avoid interacting with suspicious websites or investment offers. DeepSeek has not announced any official cryptocurrency or IPO, making any claims to the contrary a clear red flag.

Our Recommendations

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below:

  • Always check the official DeepSeek website and social media channels for announcements.
  • Avoid scanning QR codes from unverified sources or suspicious websites.
  • Always confirm the legitimacy of a crypto project before sending any funds.
  • Avoid downloading files from unknown websites.
  • Use a reputed anti-virus and internet security software package on your connected devices, including PC, laptop, and mobile.
  • Be wary of opening any links received via SMS or emails delivered to your phone.
  • Educate employees on protecting themselves from threats like phishing/untrusted URLs.
  • Keep your devices, operating systems, and applications updated.

Indicators of Compromise (IOCs)

Indicators Indicator Type Description
hxxp://abs-register[.]com/ hxxps://deep-whitelist[.]com/ URL Crypto Phishing URLs
hxxps://deepseek-ai[.]cloud/ hxxps://deepseek[.]boats/ URL Phishing sites promoting fraudulent tokens
deepseek-aiassistant[.]com usadeepseek[.]com Domain Fake Deepseek website
deepseek-shares[.]com Domain Fake investment website
e596da76aaf7122176eb6dac73057de4417b7c24378e00b10c468d7875a6e69e a3d06ffcb336cba72ae32e4d0ac5656400decfaf40dc28862de9289254a47698 7d0e76c7682d33d36225620d3c82e4ddc0f6744baf387a0ea8124f968c185995 SHA256 AMOS Stealer

The post DeepSeek’s Growing Influence Sparks a Surge in Frauds and Phishing Attacks appeared first on Cyble.

Blog – Cyble – ​Read More

Talos IR trends Q4 2024: Web shell usage and exploitation of public-facing applications spike

Talos IR trends Q4 2024: Web shell usage and exploitation of public-facing applications spike

Threat actors increasingly deployed web shells against vulnerable web applications and primarily exploited vulnerable or unpatched public-facing applications to gain initial access in Q4, a notable shift from previous quarters. The functionality of the web shells and targeted web applications varied across incidents, highlighting the multitude of ways threat actors can leverage vulnerable web servers as a gateway into a victim’s environment. Prior to this quarter, use of valid accounts had been Cisco Talos Incident Response (Talos IR)’s most observed method of initial access for over a year.  

Ransomware made up a slightly smaller portion of threats observed this quarter than in the past. Notably, the end of the year saw a surge of ransomware and pre-ransomware incidents, primarily involving BlackBasta ransomware, suggesting this as a threat to monitor going into 2025.  

Watch The Talos Threat Perspective for additional insights into the report, and recommendations for defenders

Web shells increasingly observed in adversaries’ post-compromise toolkits 

In 35 percent of incidents in Q4, threat actors deployed a variety of open-source and publicly available web shells against vulnerable or unpatched web applications, a significant increase from less than 10 percent in the previous quarter. In one incident, Talos IR observed the adversary uploading a web shell with the file name “401.php”, which was also seen last quarter. This PHP web shell is based on the publicly available Neo-regeorg web shell on GitHub and has been leveraged in several adversaries’ attack chains, according to a CISA advisory. Another incident involved the web fuzzer Fuzz Faster U Fool, which is used to perform brute force attacks against web applications to discover usernames and passwords and perform directory and virtual host discovery.  

Adversaries also leveraged older tools to support their post-compromise objectives, serving as a reminder for organizations to remain vigilant in adding applications to the allowlist/blocklist to control what software operates on their systems. In one incident, the attacker targeted a vulnerable server of JBoss using a tool called JexBoss, which was originally released on Github in 2014 and can be used to test and exploit vulnerabilities in Java platforms. The adversary saved JexBoss as a WAR file, and the contents included a malicious web shell named “jexws4.jsp”.  

Ransomware trends 

Ransomware, pre-ransomware, and data theft extortion accounted for nearly 30 percent of engagements this quarter, a slight decrease from the previous quarter, in which these types of engagements accounted for 40 percent. Talos IR observed Interlock ransomware for the first time, while also responding to previously seen ransomware variants BlackBasta and RansomHub. Talos IR was able to identify dwell times in the majority of engagements this quarter, which ranged from approximately 17 to 44 days. For example, in the Interlock ransomware incident, it took the adversary 17 days from the initial compromise stage until the deployment of the ransomware encryptor binary. Longer dwell times can indicate that an adversary is trying to expand their access, evade defenses, and/or identify data of interest for exfiltration. For example, in a RansomHub incident this quarter, operators had access to the compromised network for over a month before executing the ransomware and performed actions such as internal network scanning, accessing passwords for backups, and credential harvesting.  

Operators leveraged compromised valid accounts in 75 percent of ransomware engagements this quarter to obtain initial access and/or execute ransomware on targeted systems, highlighting the risk of identity-based attacks and the need for secure authentication methods. In a BlackBasta incident, for example, operators posed as the targeted entity’s IT department and used social engineering to gain access to an employee’s account, which consequently facilitated lateral movement into the network. In a RansomHub engagement, affiliates leveraged a compromised Administrator account to execute the ransomware, dump credentials, and run scans using a commercial network scanning tool. Of note, all organizations impacted by ransomware incidents this quarter did not have multifactor authentication (MFA) properly implemented or MFA was bypassed during the attack. 

As forecasted in last quarter’s IR quarterly trends report, this quarter featured two RansomHub incidents, in which affiliates leveraged newly identified tools and techniques. Talos IR observed affiliates leveraging a Veeam password stealer to target the Veeam data backup application, and KMS Auto, a tool designed to illicitly activate cracked Microsoft products. The operators also used a previously unseen persistent access technique, modifying Windows Firewall settings on targeted hosts to enable remote access. This activity occurred shortly before the ransomware was executed, potentially as a method to maintain direct access to the compromised systems. 

Talos IR observed operators leveraging remote access tools in 100 percent of ransomware engagements this quarter, a significant uptick from last quarter, when it was only seen in 13 percent of ransomware or pre-ransomware engagements. Commercial remote desktop software Splashtop in particular was involved in 75 percent of ransomware engagements this quarter, and other observed remote access tools included Atera, Netop, AnyDesk, and LogMeIn. In at least 50 percent of engagements, these tools were used to facilitate lateral movement, as actors used this remote access to pivot to other systems in the environment. 

Looking forward: Talos IR saw BlackBasta ransomware in one engagement that closed this quarter, as well as in a number of engagements that kicked off near the end of the year. In the observed attack chain, BlackBasta operators impersonate IT personnel to conduct double extortion attacks, which involves exfiltration of sensitive information that is then encrypted to pressure victims into paying. Our observations and corresponding public reporting on the group’s recent uptick in activity since December indicate that this is a ransomware threat to monitor going into the new year. 

Targeting  

Organizations in the education vertical were most affected for the second quarter in a row, accounting for nearly 30 percent of engagements. This is also consistent with Talos IR Q1 2024 (January–March) targeting trends, where the education sector was tied for the top targeted industry vertical. 

Talos IR trends Q4 2024: Web shell usage and exploitation of public-facing applications spike

Initial access 

For the first time in over a year, the most observed means of gaining initial access was the exploitation of public-facing applications, accounting for nearly 40 percent of engagements when initial access could be determined. This is a significant departure compared to previous quarters, where the use of valid accounts was consistently a top observed technique leveraged for initial access. While we still observed adversaries leverage compromised credentials and valid accounts to gain access, this shift is likely largely due to the number of web shell and ransomware incidents that took advantage of poorly patched or publicly exposed applications. 

Talos IR trends Q4 2024: Web shell usage and exploitation of public-facing applications spike

Looking forward: Since early December 2024, Talos IR has observed a surge in password-spraying attacks, leading to user account lockouts and denied VPN access. These attacks are often characterized by large volumes of traffic. For example, one organization reported nearly 13 million attempts were made in 24 hours against known accounts, indicating the adversary was likely running automated attacks. This activity primarily affected organizations in the public administration sector and was likely random and opportunistic. Although adversaries have been using password-spraying attacks for credential access for years, the sheer volume of authentication attempts in quick succession is a reminder that organizations should continue to stress the importance of MFA and strong password policies to limit unauthorized access attempts. 

Recommendations for addressing top security weaknesses 

 Implement MFA and other identity and access control solutions  

Talos IR recommends ensuring MFA is enforced on all critical services, including all remote access and identity and access management (IAM) services. In addition, to defend against MFA bypass via social engineering where prompts are accepted by a legitimate user, regular cybersecurity awareness training should cover relevant and updated social engineering topics. 

We continue to see a significant number of compromises involving misconfigured, weak, or lack of MFA. This issue was present in nearly 40 percent of total engagements this quarter and, as mentioned above, 100 percent of organizations impacted by ransomware incidents did not have MFA properly implemented or it was bypassed via social engineering.  

Since compromised accounts remains a top initial access vector, consider investing in IAM sevices and User Behavior Analytics (UBA), which can help identity suspicious account usage. 

Talos IR trends Q4 2024: Web shell usage and exploitation of public-facing applications spike

Patch regularly and replace end-of-life assets 

Talos IR also strongly recommends organizations ensure all operating systems and software in the environment are currently supported and replace those that have reached end-of-life. Unpatched and/or vulnerable software helped facilitate initial access across several incidents this quarter, and nearly 15 percent of incidents suffered from outdated and end-of-life software.  

If patching is not possible consider other mitigations, such as monitoring, especially for typical post-exploitation tools and behaviors; improving segmentation through firewalls, switch VLANs, subnetting, etc.; and disabling access to administrative shares.  In 40 percent of the web shell engagements, poor network segmentation and access to administrative shares resulted in adversaries moving laterally. 

Implement properly configured EDR solution  

Implement properly configured EDR and other security solutions. If an organization lacks the resources to successfully implement these solutions, they can consider outsourcing to a Managed XDR vendor to ensure proper configuration and 24/7 monitoring by security experts. 

Misconfigured or missing EDR solutions affected over 25 percent of all incidents for the quarter.   

Top-observed MITRE ATT&CK techniques  

The table below represents the MITRE ATT&CK techniques observed in this quarter’s Talos IR engagement. Given that some techniques can fall under multiple tactics, we grouped them under the most relevant tactic in which they were leveraged. Please note this is not an exhaustive list.  

Key findings from the MITRE ATT&CK framework include: 

  • The use of remote access tooling, such as Splashtop or AteraAgent, was leveraged in nearly 40 percent of engagements, compared to 5 percent in the previous quarter. 
  • Remote access tooling was leveraged in 100 percent of the ransomware incidents observed in Q4, a significant shift compared to that of the previous quarter. 
  • This is the first quarter in well over a year in which the use of valid accounts was not the top initial access technique. Instead, exploitation of public-facing applications, largely contributed by the high number of web shell incidents, was the top means of gaining access this quarter. 

Reconnaissance (TA0043)

T1589.001 Gather Victim Identity Information: Credentials

Adversaries may gather credentials that can be used during their attack.

T1598.003 Phishing for Information: Spearphishing Link

Adversaries may send a spearphishing email with a link to a credential harvesting page to collect credentials for their attack.

T1595.002 Active Scanning: Vulnerability Scanning

Adversaries may run vulnerability scans against an organization’s public-facing infrastructure to identify potential vulnerabilities to exploit.

T1598 Phishing for Information

Threat actor sent phishing messages to elicit sensitive information that can be used during targeting.

T1598.004 Phishing for Information: Spearphishing Voice

After clicking a malicious link contained within a trusted third-party site, the user was directed to call a fake Microsoft support site. After the user did so, they received repeated vishing calls for further information.

Initial Access (TA0001)

T1190 Exploit in Public-Facing Application

Adversaries may exploit a vulnerability to gain access to a target system.

T1078 Valid Accounts

Adversaries may use compromised credentials to access valid accounts during their attack.

T1189 Drive-by Compromise

Uses compromised websites or ads to lure victims into downloading a malicious installer.

T1566 Phishing Link

Adversary sends a phishing email which contains a malicious link.

Execution (TA0002)

T1059.001 Command and Scripting Interpreter: PowerShell

Adversaries may abuse PowerShell to execute commands or scripts throughout their attack.

T1204.001 User Execution: Malicious Link

The victim clicked on a malicious link in a phishing email.

T1059.006 Command and Scripting Interpreter: Python

Adversary used Python commands for execution.

T1059.003 Command and Scripting Interpreter: Windows Command Shell

Adversaries may abuse Windows Command Shell to execute commands or scripts throughout their attack.

T1047 Windows Management Instrumentation

Adversaries may use Windows Management Instrumentation (WMI) to execute malicious commands during the attack.

T1059.004 Command and Scripting Interpreter: Unix Shell

The adversary executed shell commands.

Persistence (TA0003)

T1505.003 Server Software Component: Web Shell

Deploy web shells on vulnerable systems.

T1136 Create Account

Adversaries may create a new account to maintain persistence in a target environment.

T1053.005 Scheduled Task/Job: Scheduled Task

Adversaries may abuse the Windows Task Scheduler to perform task scheduling for recurring execution of malware or malicious commands.

Privilege Escalation (TA0004)

T1078.002 Valid Accounts: Domain Accounts

Adversaries may abuse their access to valid accounts allowing access to privileged resources of the domain.

Defense Evasion (TA0005)

T1562.001 Impair Defenses: Disable or Modify Tools

Adversaries may disable or uninstall security tools to evade detection.

T1027.010 Obfuscated Files or Information: Command Obfuscation

Adversaries may obfuscate commands to evade detection during their attack.

T1070.004 Indicator Removal: File Deletion

Adversaries may delete files to cover their tracks during the attack.

T1484.001 Domain or Tenant Policy Modification: Group Policy Modification

Modify GPOs to push out malicious scheduled tasks.

T1070.001 Indicator Removal: Clear Windows Event Logs

Adversaries may clear the Windows event logs to cover their tracks and impair forensic analysis.

T1036 Masquerading

The attacker deployed a ransomware encryptor binary with the file name “conhost.exe”, masquerading as a legitimate file onto the victim machine.

T1070.002 Indicator Removal: Clear Linux or Mac System Logs

Log clearing via sudo.

T1218.014 System Binary Proxy Execution: MMC

Adversaries abuse MMC to carry out malicious activities, such as execute malicious files.

T1112 Modify Registry

Adversary used some registry modifications to get privilege escalation.

Credential Access (TA0006)

T1003 OS Credential Dumping

Adversaries may dump credentials from various sources to enable lateral movement.

T1110.003 Brute Force: Password Spraying

Adversaries use a list of usernames and passwords to try and gain access to user accounts.

T1621 Multi-Factor Authentication Request Generation

Adversaries may generate MFA push notifications causing an MFA exhaustion attack.

T1555.003 Credentials from Password Stores: Credentials from Web Browsers

Adversaries may obtain credentials from the victim’s Chrome browser.

T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting

Use Kerberoasting PowerShell commands for credential access.

Discovery (TA0007)

T1046 Network Service Discovery

Adversaries may use tools like Advanced Port Scanner for network scanning.

T1069.002 Permission Groups Discovery

Adversary identified domain admins in the environment.

T1018 Remote System Discovery

Adversaries may attempt to discover information about remote systems with commands, such as “net view”.

T1082 System Information Discovery

Adversary performed large scale host enumeration

T1083 File and Directory Discovery

Adversary enumerated files and directories to identify certain key files.

T1033 System Owner / User Discovery

Adversaries may attempt to discover information about the logged in user of a compromised account with commands, such as “whoami”.

T1016 System Network Configuration Discovery

Adversaries may use commands, such as ifconfig and net use, to identify network connections.

T1087.001 Account Discovery: Local Account

Enumerate user accounts on the system.

T1135 Network Share Discovery

Enumerate network shares on a host.

Lateral Movement (TA0008)

T1021.001 Remote Services: Remote Desktop Protocol

Adversaries may abuse valid accounts using RDP to move laterally in a target environment.

T1021.004 Remote Services: SSH

Adversaries may abuse valid accounts using SSH to move laterally in a target environment.

T1550.002 Use Alternative Authentication Material: Pass the Hash

Adversaries may bypass access controls by using stolen password hashes.

T1570 Lateral Tool Transfer

Adversary transfers tools and files between systems in a compromised environment

Collection (TA0009)

T1005 Data from Local System

Adversaries may collect information from an infected system

T1074 Data Staged

Adversary collected data in a central location prior to exfiltration

T1560 Archive Collected Data

Adversaries may archive staged data using tools, such as WinRAR.

T1530 Data from Cloud Storage

Collect files from cloud services.

Command and Control (TA0011)

T1219 Remote Access Software

Adversaries may abuse remote access software, such as AnyDesk, to establish an interactive C2 channel during their attack.

T1105 Ingress Tool Transfer

Adversaries may transfer tools from an external system to a compromised system.

T1071.001 Application Layer Protocol: Web Protocols

Communicate between compromised hosts and attacker-controlled servers via HTTP POST/GET requests.

T1090 Proxy

An adversary used a tool called Invoke-SocksProxy, intended for command and control.

T1102 Web Service

Adversary performed reconnaissance and made network connections to a Discord IP address.

Exfiltration (TA0010)

T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage

Exfiltrate data to web server.

T1537 Transfer Data to Cloud Account

Adversary exfiltrated data to an attacker-controlled cloud account.

Impact (TA0040)

T1486 Data Encrypted for Impact

Adversaries may use ransomware to encrypt data on a target system.

T1490 Inhibit System Recovery

Adversaries may disable system recovery features, such as volume shadow copies.

Software/Tool

S0029 PsExec

Free Microsoft tool that can remotely execute programs on a target system.

S0349 LaZagne

A post-exploitation, open-source tool used to recover stored passwords on a system.

S0357 Impacket

An open-source collection of modules written in Python for programmatically constructing and manipulating network protocols.

S0002 Mimikatz

Credential dumper that can obtain plaintext Windows logins and passwords.

S0154 Cobalt Strike

Adversary simulation tool.

S0552 AdFind

Freely available command-line query tool used for gathering information from Active Directory.

S0097 Ping

An operating system utility commonly used to troubleshoot and verify network connections.

S0225 Sqlmap

An open-source penetration testing tool used to automate the process of detecting and exploiting SQL injection flaws.

Cisco Talos Blog – ​Read More

UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI

Cyble UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI

Overview

The rapid evolution of generative artificial intelligence (AI) has introduced both opportunities and risks in the digital landscape. While AI-generated content can enhance creativity and efficiency, it also presents significant challenges related to misinformation, deepfakes, and digital content authenticity. In response, the concept of Content Credentials has emerged as a critical solution for maintaining transparency and trust in multimedia content.

The Rise of AI-Generated Content and Its Challenges

Generative AI tools allow users to create realistic images, videos, and audio clips with minimal effort. This accessibility has raised concerns about digital deception, particularly in cybersecurity, journalism, and law enforcement. Malicious actors can leverage AI-generated media for fraudulent activities, impersonation, and disinformation campaigns, eroding trust in online information.

Traditional verification methods, such as metadata analysis and forensic detection, are increasingly inadequate in detecting sophisticated AI-generated content. As a result, organizations and governments worldwide are seeking innovative solutions to establish content provenance and ensure media integrity.

What Are Content Credentials?

Content Credentials serve as a digital “nutrition label” for media, embedding cryptographically signed metadata that tracks the origin, authorship, and modifications of digital content. This metadata can be attached to images, videos, and other media at the point of creation or during post-processing.

The Coalition for Content Provenance and Authenticity (C2PA) has been at the forefront of developing Content Credentials as an open standard. Supported by major technology firms like Adobe, Microsoft, and Google, this initiative aims to enhance transparency and counteract the proliferation of deceptive content.

Durable Content Credentials to Enhance Media Integrity

To further strengthen digital provenance, Durable Content Credentials have added additional layers of security through:

  • Digital Watermarking: Embedding invisible watermarks in media files to retain metadata even when content is altered or stripped of visible credentials.
  • Media Fingerprinting: Creating a unique fingerprint for content that enables verification even if metadata is removed.

These mechanisms help ensure the persistence of Content Credentials, making them more resistant to tampering or erasure.

Use Cases of Content Credentials

The implementation of Content Credentials extends across multiple industries, including:

  • Journalism: News organizations can use Content Credentials to verify the authenticity of images and videos, preventing the spread of doctored media.
  • Cybersecurity: Organizations can track the origins of AI-generated media to mitigate the risks of deepfake attacks and impersonation fraud.
  • Forensics and Law Enforcement: Digital evidence can be authenticated to maintain chain-of-custody integrity.
  • Government and National Security: Authorities can use Content Credentials to combat foreign interference and disinformation campaigns.
  • Artificial Intelligence and Data Science: AI models can be trained with verified data, reducing the risk of “model collapse” from synthetic data contamination.

The Global Push for Adoption

Governments and cybersecurity agencies worldwide are recognizing the importance of Content Credentials. The National Security Agency (NSA), Australian Signals Directorate (ASD), Canadian Centre for Cyber Security (CCCS), and United Kingdom’s National Cyber Security Centre (NCSC-UK) have jointly emphasized the need for widespread adoption of these technologies.

The European Union’s AI Act also mandates transparency measures for AI-generated content, reinforcing the importance of provenance tracking.

Preparing for a Future of Trusted Digital Content

Organizations looking to integrate Content Credentials should take proactive steps:

  1. Upgrade Software and Hardware: Use cameras and editing software that support Content Credentials.
  2. Implement Metadata Preservation Policies: Ensure that metadata remains intact throughout content creation and distribution.
  3. Engage with Open Standards Initiatives: Join the C2PA community to stay informed about best practices and technological advancements.
  4. Educate Stakeholders: Train employees and users on the importance of media provenance and how to verify Content Credentials.

Conclusion

As AI-generated content becomes more prevalent, the need for verifiable digital integrity has never been more urgent. Content Credentials offer a robust framework for establishing trust in digital media by providing transparent, verifiable information about content origins. By adopting and promoting these technologies, organizations, and individuals can help safeguard the integrity of digital ecosystems, ensuring a more trustworthy information landscape in the generative AI era.

References:

https://media.defense.gov/2025/Jan/29/2003634788/-1/-1/0/CSI-CONTENT-CREDENTIALS.PDF

The post UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI appeared first on Cyble.

Blog – Cyble – ​Read More

ICS Vulnerability Report: Cyble Urges Critical mySCADA Fixes

Cyble ICS Vulnerability Report: Cyble Urges Critical mySCADA Fixes

Overview

A pair of 9.8-severity flaws in mySCADA myPRO Manager SCADA systems were among the vulnerabilities highlighted in Cyble’s weekly Industrial Control System (ICS) Vulnerability Intelligence Report.

Cyble Research & Intelligence Labs (CRIL) examined eight ICS vulnerabilities in the January 28 report for clients, including high-severity flaws in critical manufacturing, energy infrastructure, and transportation networks.

OS Command Injection (CWE-78) and Improper Security Checks (CWE-358, CWE-319) accounted for half of the vulnerabilities in the report, “indicating a persistent challenge in securing authentication and execution processes in ICS environments,” Cyble said.

Critical mySCADA Vulnerabilities

The critical mySCADA myPRO supervisory control and data acquisition (SCADA) vulnerabilities haven’t yet appeared in the NIST National Vulnerability Database (NVD) or the MITRE CVE database, but they were the subject of a CISA ICS advisory on January 23.

The mySCADA myPRO Manager system provides user interfaces and functionality for real-time monitoring and control of industrial processes across a range of critical industries and applications. CISA said the vulnerabilities can be exploited remotely with low attack complexity, potentially allowing a remote attacker to execute arbitrary commands or disclose sensitive information.

CVE-2025-20061 was assigned a CVSS v3.1 base score of 9.8 and is an Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability. CISA said mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information, so the vulnerability could be used to execute arbitrary commands on an affected system.

CVE-2025-20014 is also a 9.8-severity OS Command Injection vulnerability, as myPRO also does not properly neutralize POST requests sent to a specific port with version information, which could potentially lead to an attacker executing arbitrary commands.

The following mySCADA products are affected:

  • myPRO Manager: Versions prior to 1.3
  • myPRO Runtime: Versions prior to 9.2.1

mySCADA recommends that users update to the latest versions:

  • mySCADA PRO Manager 1.3
  • mySCADA PRO Runtime 9.2.1

CISA also recommended that users minimize network exposure for all control system devices and systems to ensure they are not accessible from the Internet, locate control system networks and remote devices behind firewalls, and isolate them from business networks. If remote access is necessary, additional security steps, such as an updated VPN on a secure device, should be used.

Recommendations for Mitigating ICS Vulnerabilities 

Cyble recommends several controls for mitigating ICS vulnerabilities and improving the overall security of ICS systems. The measures include:

  1. Staying on top of security advisories and patch alerts issued by vendors and regulatory bodies like CISA is recommended. A risk-based approach to vulnerability management reduces the risk of exploitation.
  2. Implementing a Zero-Trust Policy to minimize exposure and ensure that all internal and external network traffic is scrutinized and validated.
  3. Developing a comprehensive patch management strategy that covers inventory management, patch assessment, testing, deployment, and verification. Automating these processes can help maintain consistency and improve efficiency.
  4. Proper network segmentation can limit the potential damage caused by an attacker and prevent lateral movement across networks. This is particularly important for securing critical ICS assets.
  5. Conducting regular vulnerability assessments and penetration testing to identify gaps in security that might be exploited by threat actors.
  6. Establishing and maintaining an incident response plan and ensuring that it is tested and updated regularly to adapt to the latest threats.
  7. All employees, especially those working with Operational Technology (OT) systems, should be required to undergo ongoing cybersecurity training programs. The training should focus on recognizing phishing attempts, following authentication procedures, and understanding the importance of cybersecurity practices in day-to-day operations.

Conclusion

Industrial Control Systems (ICS) vulnerabilities can threaten critical infrastructure environments, with the potential to disrupt operations, compromise sensitive data, and cause physical damage. Staying on top of ICS vulnerabilities and applying good cybersecurity hygiene and controls are critical cybersecurity practices for ICS, OT, and SCADA environments.

To access the full report on ICS vulnerabilities observed by Cyble, along with additional insights and details, click here. By adopting a comprehensive, multi-layered security approach that includes effective vulnerability management, timely patching, and ongoing employee training, organizations can reduce their exposure to cyber threats. With the right tools and intelligence, such as those offered by  Cyble, critical infrastructure can be better protected, ensuring its resilience and security in an increasingly complex cyber landscape.

The post ICS Vulnerability Report: Cyble Urges Critical mySCADA Fixes appeared first on Cyble.

Blog – Cyble – ​Read More

Whatsup Gold, Observium and Offis vulnerabilities

Whatsup Gold, Observium and Offis vulnerabilities

Cisco Talos’ Vulnerability Research team recently disclosed three vulnerabilities in Observium, three vulnerabilities in Offis, and four vulnerabilities in Whatsup Gold.   

These vulnerabilities exist in Observium, a network observation and monitoring system; Offis DCMTK, a collection of libraries and applications implementing DICOM (Digital Imaging and Communications in Medicine) standard formats; and WhatsUp Gold, an IT infrastructure management product.  

The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy.  

For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website.   

Observium Vulnerabilities  

Discovered by Marcin “Icewall” Noga.   

Two cross-site scripting vulnerabilities exist in Observium, which can lead to arbitrary JavaScript code execution, as well as one HTML code injection vulnerability. All three can be triggered by an authenticated user clicking a malicious link crafted by the attacker.  

Offis Vulnerabilities  

Discovered by Emmanuel Tacheau.   

Three vulnerabilities were found in the Offis DCMTK libraries that support the DICOM standard format. TALOS-2024-1957 (CVE-2024-28130) is an incorrect type conversion vulnerability that can lead to arbitrary code execution, and TALOS-2024-2121 (CVE-2024-52333) and TALOS-2024-2122 (CVE-2024-47796) are improper array index validation vulnerabilities that can lead to out-of-bounds write capabilities. All can be triggered with specially crafted malicious DICOM files.  

Whatsup Gold Vulnerabilities  

Discovered by Marcin “Icewall” Noga.   

Two Whatsup Gold vulnerabilities include a risk of information disclosure (TALOS-2024-1932 (CVE-2024-5017) and TALOS-2024-2089 (CVE-2024-12105)), which can be triggered by an attacker making an authenticated HTTP request. 

There is also a risk of disclosure of sensitive information (TALOS-2024-1933 (CVE-2024-5010)), and denial of service (TALOS-2024-1934 (CVE-2024-5011)). These two vulnerabilities can be triggered by an attacker making an unauthenticated HTTP request. 

Cisco Talos Blog – ​Read More

New ICS Vulnerabilities Discovered in Schneider Electric and B&R Automation Systems

Cyble New ICS Vulnerabilities Discovered in Schneider Electric and B&R Automation Systems

Overview

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued two urgent advisories regarding serious ICS vulnerabilities in industrial control systems (ICS) products. These ICS vulnerabilities, identified in Schneider Electric’s RemoteConnect and SCADAPack x70 Utilities, as well as B&R Automation’s Runtime software, pose online risks to critical infrastructure systems worldwide. The ICS vulnerabilities, if exploited, could lead to potentially devastating impacts on the integrity, confidentiality, and availability of systems within energy, critical manufacturing, and other essential sectors.

Schneider Electric’s Vulnerability in RemoteConnect and SCADAPack x70 Utilities

The ICS vulnerability in Schneider Electric’s RemoteConnect and SCADAPack x70 Utilities arises from the deserialization of untrusted data, identified as CWE-502. This flaw could allow attackers to execute remote code on affected workstations, leading to several security risks, including the loss of confidentiality and integrity. The issue is triggered when a non-admin authenticated user opens a malicious project file, which could potentially be introduced through email, file sharing, or other methods.

Schneider Electric has assigned the CVE identifier CVE-2024-12703 to this vulnerability, with a base CVSS v3 score of 7.8 and a CVSS v4 score of 8.5. Both versions highlight the severity of the issue, with potential consequences including unauthorized remote code execution.

This vulnerability affects all versions of both RemoteConnect and SCADAPack x70 Utilities, products widely deployed in sectors such as energy and critical manufacturing across the globe. Although Schneider Electric is working on a remediation plan for future product versions, there are interim steps that organizations can take to mitigate the risk. These include:

  • Only opening project files from trusted sources
  • Verifying file integrity by computing and checking hashes regularly
  • Encrypting project files and restricting access to trusted users
  • Using secure communication protocols when exchanging files over the network
  • Following established SCADAPack Security Guidelines for added protection

CISA recommends minimizing the network exposure of control system devices, ensuring they are not directly accessible from the internet, and placing control system networks behind firewalls to isolate them from business networks. When remote access is necessary, using secure methods like Virtual Private Networks (VPNs) is strongly advised. However, organizations should ensure that VPNs are regularly updated and adequately secured.

B&R Automation Runtime Vulnerability

The second advisory concerns a vulnerability in B&R Automation Runtime, a key software used in industrial control systems. The flaw arises from the use of a broken or risky cryptographic algorithm in the SSL/TLS component of B&R Automation Runtime versions prior to 6.1 and B&R mapp View versions prior to 6.1. Unauthenticated network-based attackers could exploit this vulnerability to impersonate legitimate services on impacted devices, creating opportunities for unauthorized access.

B&R Automation assigned CVE-2024-8603 to this vulnerability, which is identified as CWE-327. The CVSS v3 base score for this flaw is 7.5, indicating a moderately high risk to the affected systems. This vulnerability is especially concerning as it is exploitable remotely, with low attack complexity, making it a viable target for attackers seeking to compromise ICS environments.

The affected products are used worldwide, primarily in the critical manufacturing sector. B&R Automation has released an update (version 6.1) that corrects the issue, and users are strongly encouraged to apply this update to mitigate the risk. In the meantime, CISA recommends several mitigation strategies to limit exposure, including:

  • Applying the update to B&R Automation Runtime and B&R mapp View products as soon as possible
  • Minimizing network exposure for all control system devices to prevent direct internet access
  • Implementing firewalls and isolating control system networks from business networks
  • Utilizing VPNs for remote access while ensuring that VPNs are kept up-to-date and secure

Conclusion

While no known public exploits targeting these vulnerabilities have been reported to CISA at the time of publication, the discovery of these flaws in Schneider Electric and B&R Automation products highlights the ongoing risks facing critical infrastructure sectors. Exploiting vulnerabilities in ICS products can lead to serious consequences, including data breaches, operational disruptions, and physical damage to infrastructure.

These incidents emphasize the urgent need for organizations to adopt proactive cybersecurity measures, such as regular patching, file integrity verification, and secure network configurations. By following CISA’s guidance and implementing comprehensive defense-in-depth strategies, organizations can better protect their systems from both known and emerging threats, ultimately reducing their exposure to cyber risks and ensuring the security of critical assets.

References:

The post New ICS Vulnerabilities Discovered in Schneider Electric and B&R Automation Systems appeared first on Cyble.

Blog – Cyble – ​Read More

What scareware is and how to protect yourself | Kaspersky official blog

Imagine: you’re calmly working away on your computer, when suddenly a scary message appears on the screen: “Your computer is infected with viruses! Install an antivirus immediately!” or “Your data is at risk! Clean your system immediately!” Panic? That’s what the scammers are hoping for.

This post explains what scareware is and why this threat is dangerous. We also give tips for avoiding falling for scarewarers’ tricks, and protecting you and your family from such attacks.

What is scareware?

Scareware is a type of digital fraud that weaponizes users’ fears. The aim is to frighten the victim into visiting a malicious site and downloading something they shouldn’t. Scareware usually mimics antiviruses, system optimizers, registry cleaners, and the like. But other, more exotic types also exist.

Scareware notification

The user is not so subtly informed that no fewer than five viruses have been found on their computer. However, the window header contains a small misprint: “Threaths detected” Source

To display their alarming messages, scammers tend to deploy browser pop-up windows and notifications, banner ads, and on occasion even good-old email.

Scareware creators use a variety of social engineering tricks to instill a sense of danger in the user. Often, threatening messages appear at the most unexpected moment — catching the victim off guard.

And scammers frequently hurry the victim into taking rash actions — not giving them time to think things over. Then, when the target has been properly prepared (that is, put into a state of panic), the attackers offer a simple solution to the problem: just install such-and-such software and all your troubles will be gone.

Fake antivirus

Fake antiviruses pretend to search for malware in the user’s system. Source

Upon receiving a scareware notification, in the best case scenario the victim will install a useless but harmless program on their device and pay a relatively small sum for the pleasure. But sometimes an attack can have more serious consequences. Under the guise of an “antivirus” or “system optimizer”, the victim may be fed proper malware that encrypts data or steals money from online bank accounts.

Sextortion scareware

Sometimes scammers employ a hybrid scheme: scareware combined with sextortion. It may go as follows: the user receives an intimidating email saying they’ve been caught in a compromising video.

To see for themselves, the victim is invited to visit a website where they can watch the footage. However, to view the video, they first need to install a special player. This, of course, is malware in disguise.

Faulty screen caused by a virus

In a new variant of the scareware scheme, the user is told that a virus has infected their smartphone. Nothing unusual so far — mobile versions of scareware have been around for ages. Here, however, the focus is artfully placed on what perhaps all smartphone owners fear the most: a faulty screen:

A faulty screen — falsely presented as the result of a virus

The scareware simulates screen damage caused by a virus that must be removed.Source

Curiously, the “faulty” display — which also blinks for added alarm — is capable of clearly showing the message about the supposed virus infection. How this window is able to float above a damaged screen is a mystery… To “fix” the screen, you just need to tap the button in the box and purchase the offered “antivirus”.

How to protect against scareware

Of course, the best defense against fake “protection” is the real thing. To defeat scareware, install a bona fide antivirus from a reputable developer, keep a close eye on its notifications, and always heed its recommendations.

Also bear in mind that it’s seniors who are most likely to fall victim. So it’s worth helping your older relatives get the right protection since it can be a challenge for them.

Kaspersky official blog – ​Read More

Australia’s Health Sector Receives $6.4 Million Cybersecurity Boost with New Threat Information-Sharing Network

Cyble Australia’s Health Sector Receives $6.4 Million Cybersecurity Boost with New Threat Information-Sharing Network

The Australian Government has awarded a $6.4 million grant to CI-ISAC Australia, enabling the establishment of a new Health Cyber Sharing Network (HCSN). This initiative is designed to facilitate the rapid exchange of critical cyber threat information within Australia’s healthcare industry, which has become a target for cyberattacks.

The recent surge in cyberattacks on Australian healthcare organizations, including hospitals and health insurance providers, has highlighted the pressing need for enhanced cybersecurity measures. In response, the Australian Government has made healthcare the priority sector for its formal funding efforts.

This grant is part of a broader strategy to address the vulnerabilities in the nation’s health sector and ensure it is better equipped to handle the cyber threats faced by the industry.

A Growing Threat: The Cost of Cybersecurity Breaches

The healthcare industry globally has been facing increasing cybersecurity challenges, and Australia is no exception. According to reports from 2023, the global healthcare sector continues to experience the most expensive data breaches across industries for the 13th consecutive year. The average cost of a healthcare data breach was a staggering AUD$10.93 million, nearly double that of the financial industry, which recorded an average cost of $5.9 million.

Australia’s health sector, which encompasses a diverse range of organizations, from public and private hospitals to medical clinics and insurance providers, is increasingly vulnerable to cyber threats. This sector includes approximately 750 government hospitals, 650 private hospitals, and over 6,500 general practitioner clinics, along with numerous third-party suppliers and vendors.

The creation of the HCSN aims to address these risks by providing a secure, collaborative platform for information sharing. The network will enable health sector organizations to work together more effectively, breaking down silos and improving the speed and quality of cybersecurity threat information exchange.

The Role of CI-ISAC and the Health Cyber-Sharing Network

CI-ISAC Australia, the recipient of the $6.4 million Australian Government grant, will spearhead the creation and management of the Health Cyber Sharing Network. The HCSN will focus on fostering collaboration between Australian healthcare organizations, ensuring they can share relevant cyber threat information in a secure and confidential environment.

David Sandell, CEO of CI-ISAC Australia, emphasized the importance of this initiative: “The health and medical sector holds a large amount of incredibly private and personal medical and financial information. We have already seen several high-profile data breaches in the health sector, and the new network can help members reduce their cyber risks. Cyberattacks can also greatly disrupt important health services, and this industry cannot afford interruptions with patients’ wellbeing at stake.”

The Health Cyber Sharing Network will support the healthcare sector and bolster Australia’s broader critical infrastructure. Many critical infrastructure sectors, including healthcare, are interdependent. By participating in the network, healthcare organizations will contribute to improving the overall cyber resilience of Australia’s critical infrastructure.

Strengthening Cybersecurity Resilience

The new Health Cyber Sharing Network aims to better equip Australian healthcare organizations to manage and mitigate cyber threats. The platform will serve as a ‘neighborhood watch’ for the health sector, where organizations can exchange cybersecurity intelligence and collaborate to identify and respond to threats more efficiently.

Lieutenant General Michelle McGuinness CSC, the National Cyber Security Coordinator, expressed the strategic importance of this initiative: “We have seen in recent years the very real impact that healthcare-related cyberattacks can have on millions of Australians. Increasing threat information sharing contributes to the prevention of cyberattacks and builds resilience.”

The Australian Government’s funding is seen as an important step in achieving the nation’s goal of becoming a global leader in cybersecurity by 2030. McGuinness further noted, “Many in the healthcare sector would know well the philosophy that prevention is better than a cure. This also applies to cybersecurity and is the driving concept behind this grant.”

Invitation for Healthcare Organizations to Join the Network

To launch the Health Cyber Sharing Network, CI-ISAC is inviting eligible Australian healthcare organizations and their suppliers to join the network. As part of the initiative, new members will receive a complimentary 12-month CI-ISAC membership, which will provide them with access to a wealth of cybersecurity threat intelligence from across Australia’s critical infrastructure sectors.

By joining the network, healthcare organizations will benefit from closed-source, cross-sectoral cyber threat intelligence shared by other CI-ISAC members, which include organizations with high cyber maturity. This collaboration will improve the detection and response times to cyber threats, ultimately enhancing the security posture of Australian healthcare organizations.

A Trusted Platform for Collaboration

CI-ISAC, as a not-for-profit organization, facilitates collaboration between organizations within a trusted, industry-led environment. This includes the bi-directional sharing of cyber threat intelligence, which is essential for improving cybersecurity across Australia’s critical sectors. The new funding will allow CI-ISAC to expand its educational efforts, offering training on mitigating cyber threats, cyber and insider threat awareness, attack surface monitoring, and improving cyber incident response plans (CIRPs).

The broader cybersecurity ecosystem benefits as well, as CI-ISAC’s members span across 11 critical infrastructure sectors, including government, education, energy, water, telecommunications, and more. Existing members include major organizations such as Google Cloud AU, NBN, DXC Technology, and Transgrid. As the network grows, the value of cross-sector sharing will continue to increase, improving the ability of healthcare organizations to act swiftly and decisively when cyber threats are detected.

“The value for all sectors increases exponentially as more participants join the trusted network and share their own insights,” said Sandell. “Cross-sector sharing improves incident detection and response times, enabling health organizations and their suppliers to act more swiftly on threats observed in other industries.”

Conclusion

This initiative marks an important step forward in protecting the health sector’s sensitive data and ensuring the continued delivery of critical health services. The Australian Government’s $6.4 million grant to CI-ISAC Australia demonstrates the growing importance of cybersecurity within the healthcare sector. The Health Cyber Sharing Network is positioned to become a cornerstone in Australia’s broader strategy to strengthen its cybersecurity resilience and ensure the safety of its most sensitive data in the digital age.

The post Australia’s Health Sector Receives $6.4 Million Cybersecurity Boost with New Threat Information-Sharing Network appeared first on Cyble.

Blog – Cyble – ​Read More