BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
GitLab Warns of Max Severity Authentication Bypass Bug
/in General NewsCompany urges organizations using self-hosting GitLab instances to apply updates for CVE-2024-45409 as soon as possible.
darkreading – Read More
CrowdStrike Expands Cybersecurity Startup Accelerator With AWS and NVIDIA
/in General NewsPost Content
darkreading – Read More
Vice Society Pivots to Inc Ransomware in Healthcare Attack
/in General NewsInc ransomware — one of the most popular among cybercriminals today — meets healthcare, the industry sector most targeted by RaaS.
darkreading – Read More
Concerns Over Supply Chain Attacks on US Seaports Grow
/in General NewsUS ports rely on cranes manufactured by a Chinese state-owned company, many with unmonitored cellular connections, causing cybersecurity concerns.
darkreading – Read More
1 PoC Exploit for Critical RCE Flaw, But 2 Patches from Veeam
/in General NewsThe first patch lets threat actors with low-level credentials still exploit the vulnerability, while the second fully resolves the flaw.
darkreading – Read More
This Windows PowerShell Phish Has Scary Potential
/in General NewsMany GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware. While it’s unlikely that many programmers fell for this scam, it’s notable because less targeted versions of it are likely to be far more successful against the average Windows user.
A reader named Chris shared an email he received this week that spoofed GitHub’s security team and warned: “Hey there! We have detected a security vulnerability in your repository. Please contact us at https://github-scanner[.]com to get more information on how to fix this issue.”
Visiting that link generates a web page that asks the visitor to “Verify You Are Human” by solving an unusual CAPTCHA.
This malware attack pretends to be a CAPTCHA intended to separate humans from bots.
Clicking the “I’m not a robot” button generates a pop-up message asking the user to take three sequential steps to prove their humanity. Step 1 involves simultaneously pressing the keyboard key with the Windows icon and the letter “R,” which opens a Windows “Run” prompt that will execute any specified program that is already installed on the system.
Executing this series of keypresses prompts the built-in Windows Powershell to download password-stealing malware.
Step 2 asks the user to press the “Control” key and the letter “V” at the same time, which pastes malicious code from the site’s virtual clipboard.
Step 3 — pressing the “Enter” key — causes Windows to launch a PowerShell command, and then fetch and execute a malicious file from github-scanner[.]com called “l6e.exe.”
PowerShell is a powerful, cross-platform automation tool built into Windows that is designed to make it simpler for administrators to automate tasks on a PC or across multiple computers on the same network.
According to an analysis at the malware scanning service Virustotal.com, the malicious file downloaded by the pasted text is called Lumma Stealer, and it’s designed to snarf any credentials stored on the victim’s PC.
This phishing campaign may not have fooled many programmers, who no doubt natively understand that pressing the Windows and “R” keys will open up a “Run” prompt, or that Ctrl-V will dump the contents of the clipboard.
But I bet the same approach would work just fine to trick some of my less tech-savvy friends and relatives into running malware on their PCs. I’d also bet none of these people have ever heard of PowerShell, let alone had occasion to intentionally launch a PowerShell terminal.
Given those realities, it would be nice if there were a simple way to disable or at least heavily restrict PowerShell for normal end users for whom it could become more of a liability.
However, Microsoft strongly advises against nixing PowerShell because some core system processes and tasks may not function properly without it. What’s more, doing so requires tinkering with sensitive settings in the Windows registry, which can be a dicey undertaking even for the learned.
Still, it wouldn’t hurt to share this article with the Windows users in your life who fit the less-savvy profile. Because this particular scam has a great deal of room for growth and creativity.
Krebs on Security – Read More
Microsoft’s GRIN-MoE AI model takes on coding and math, beating competitors in key benchmarks
/in General NewsMicrosoft’s new AI model, GRIN-MoE, delivers groundbreaking scalability and performance in coding and math tasks, outperforming competitors like GPT-3.5 and LLaMA3, making it a powerful tool for enterprise applications.Read More
Security News | VentureBeat – Read More
Iran backdoors planted across Middle East telecoms, government agencies, Google says
/in General NewsA cyber operation housed within Iran’s Ministry of Intelligence and Security (MOIS) has become a sophisticated initial access broker for the country’s hackers, providing persistent entry to the systems of telecommunications and government organizations across the Middle East.
The Record from Recorded Future News – Read More
FTC report exposes massive data collection by social media brands – how to protect yourself
/in General NewsThe world’s biggest online platforms collect way more data than previously known and make it very hard for users to opt out.
Latest stories for ZDNET in Security – Read More
Apple’s new macOS Sequoia update is breaking some cybersecurity tools
/in General NewsOn Monday, Apple released its latest computer operating system update called macOS 15, or Sequoia. And, somehow, the software update has broken the functionality of several security tools made by CrowdStrike, SentinelOne, Microsoft, and others, according to posts on social media, as well as messages posted in a Mac-focused Slack channel. At this point, it’s […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More