GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

Can’t find my thread to update it, but after a Chinese company acquired Polyfill.io last year (embedded in over 100k websites), it has started serving malware to users of said websites - prepare to be surprised.

https://sansec.io/research/polyfill-supply-chain-attack

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

The researchers who found the Polyfill supply chain attack are being DDoS’d

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

The Polyfill.io domain and sub domains have been nuked from orbit.

Sigourney Weaver Aliens GIF

RedPacketSecurity , to random
@RedPacketSecurity@mastodon.social avatar
GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

Good find by Elastic - possibly North Korean based threat actors using an unfixed bug in Windows to execute code, undetected across all vendors until that point (and as of writing only Elastic detect still)

They’ve named it GrimResource https://www.elastic.co/security-labs/grimresource

GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

Dropbox have filed an 8-K with the SEC for a breach. Access included user Oauth, API and MFA tokens.

https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/dbx-20240429.htm

GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

Snatch extortion group claim they are targeting the UK PM and security services.

GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

simontsui , to random
@simontsui@infosec.exchange avatar

CERT-EU warns of an exploited zero-day for Palo Alto Networks: CVE-2024-3400 (10.0 critical, disclosed 12 April 2024) command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software. Affected versions are PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1. This zero-day is NOT patched yet, and hotfix releases will be made available starting 14 April 2024. 🔗 https://cert.europa.eu/publications/security-advisories/2024-037/ and original Palo Alto Networks security advisory: https://security.paloaltonetworks.com/CVE-2024-3400

simontsui OP ,
@simontsui@infosec.exchange avatar

Just to make it easier to read through the various reports (saying almost the same exact thing), I've assembled a Palo Alto Networks zero-day MEGA list:

UPDATE: Volexity and Unit 42 talk about the threat actor, campaign, and include indicators of compromise:

Here's the rest of the related reporting:

simontsui OP ,
@simontsui@infosec.exchange avatar

It should come as no surprise that Palo Alto Networks did not release hotfixes* for affected versions of PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11 by the self-imposed deadline of Sunday 14 April 2024 like they estimated in their security advisory. 48 hours to develop/test/release is a tight delivery window with the whole infosec community breathing down their necks.

GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

On Friday night, Fujitsu quietly added a notice buried on their website in Japanese saying they’d been breached and that customer information may have been accessed. https://pr.fujitsu.com/jp/news/2024/03/15-1.html

GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

A few days ago, IT systems and services at Leicester City Council stopped working. Councillors were not told the cause. (Link: https://www.leicestermercury.co.uk/news/leicester-news/systems-outage-leicester-city-council-9151322)

At 7pm this Friday, they tweeted it is a "cyber incident". Services are still offline.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Inc Ransomware group just claimed Leicester City Council, 3tb of data exfil. I’m told it is indeed Inc.

Inc are also trying to extort NHS Dumfries and Galloway.

Inc Ransomware group need to go on the National Cyber Force shitlist.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Over 1tb of Leicester City Council docs have been published. https://www.bbc.co.uk/news/uk-england-leicestershire-68777506

Good on them for not paying. This ransomware group should be high on the shitlist at the NCA and GCHQ.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Street lights are on 24/7 in Leicester due to month+ long ransomware incident https://www.leicestermercury.co.uk/news/leicester-news/leicester-street-lights-stuck-day-9240197

GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

Huge US healthcare provider Change Healthcare has a “cybersecurity incident” going on for 15 hours and has shut down systems. https://techcrunch.com/2024/02/21/change-healthcare-cyberattack/

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Ransomhub group are claiming AlphV stole their money for Change Healthcare (this is believed to be true btw), and the operator has given them the data. So now they’re extorting Change Healthcare again.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Ransomhub have provided Wired journalists with files from Change Healthcare - meaning they’re being held to ransom again. https://www.wired.com/story/change-healthcare-ransomhub-threat/

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Ransomhub have dumped what they claim is some Change Healthcare sample data on their portal. Includes some patient data.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Wall Street Journal has a leak from the Change Healthcare ransomware incident

  • Initial entry was via a remote access system without MFA
  • Dwell time was 9 days
  • They paid the ransom, then got held to ransom again and had data leaked anyway

https://www.wsj.com/articles/change-healthcare-hackers-broke-in-nine-days-before-ransomware-attack-7119fdc6

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

UnitedHealth says Change Healthcare ransomware threat actor stole health data on ‘substantial proportion of people in America’

Change Healthcare deal with the healthcare information of around half of Americans. https://techcrunch.com/2024/04/22/unitedhealth-change-healthcare-hackers-substantial-proportion-americans/

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

The CEO says entry to Change Healthcare was via an unspecified Citrix vulnerability https://www.reuters.com/technology/cybersecurity/unitedhealth-hackers-took-advantage-citrix-vulnerabilty-break-ceo-says-2024-04-29/

This conflicts with a prior WSJ report saying lack of MFA. Although maybe lack of MFA on Netscaler was the vulnerability.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

TechCrunch has really good coverage: https://techcrunch.com/2024/04/30/uhg-change-healthcare-ransomware-compromised-credentials-mfa/

Change Healthcare didn’t use MFA on Citrix Netscaler. It was a bog standard ransomware incident.

One learning for the industry btw - I saw loads of threat intel channels circulating incorrect info about the incident. That’s fine, but some (eg the health info sharing authorities) reshared this wrong info.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

The CEO of UnitedHealth is due to give testimony in Washington on their Change Healthcare ransomware incident tomorrow, where he will say “Our company alone repels an attempted intrusion every 70 seconds – thwarting more than 450,000 intrusions per year”

That sound impressive, but if you own a Windows PC at home, you’re doing the same thing - it’s called the built in firewall.

Not having MFA on Citrix Netscaler is also called negligence.

GossiTheDog , to random
@GossiTheDog@cyberplace.social avatar

Werewolves Group are a ransomware group who attack primarily Russian organisations, although orgs across Europe in total. They've been operating under the radar for a few months.

There are many ransomware operators who aren't in Russia and aren't being tracked properly, so I imagine the odds are the problem is going to keep spiralling into other regions. Shout out to Kazakhstan.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Reupping this thread about Werewolves Group attacking Russian orgs.

GossiTheDog OP ,
@GossiTheDog@cyberplace.social avatar

Russia is very very exposed in terms of cybersecurity and resiliency as attacking local orgs there will get the local feds to bash your door in.. so ransomware groups have left it untested.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines