Monday, May 20 2024 // (IG): BB // ShadowNews // Coffee for Bob
*Started adding the Proof Of Concepts (PoC) if available for mentioned CVE’s :
A Proof of Concept (PoC) is a small exercise to test a certain hypothesis or demonstrate that a potential project can be viable. It's primarily used to verify that certain concepts or theories have the potential for real-world application. The purpose of a PoC is to showcase the feasibility, functionality, and potential of a concept before proceeding to the development of the full-scale project. *
Russia Expels UK Defense Attache from Moscow in Tit-for-Tat Move
Bottom Line Up Front (BLUF): Russia has expelled the UK's defence attache, Captain Adrian Coghill, in retaliation for the UK’s expulsion of a Russian defence attache earlier this month. This action marks another escalation in the ongoing diplomatic tensions between the two countries.
Analyst Comments: The expulsion of Captain Adrian Coghill by Russia is a direct response to the UK’s recent actions against Russian diplomatic personnel, reflecting the deteriorating relations between the two nations. This move is part of a broader pattern of retaliatory expulsions that have become increasingly common as geopolitical tensions rise. The UK’s initial expulsion was based on allegations of espionage, indicating the deepening distrust and the aggressive postures both countries are adopting. This tit-for-tat diplomacy can further strain bilateral relations and complicate international efforts to address broader security issues, including those related to the ongoing conflict in Ukraine.
FROM THE MEDIA: Russia has declared UK defence attache Adrian Coghill persona non grata, giving him a week to leave the country. This decision follows the UK's expulsion of Russian defence attache Maxim Elovik on May 8, whom the UK accused of being an undeclared military intelligence officer. Russia's Ministry of Foreign Affairs stated that this expulsion is a response to the UK's "unfriendly and groundless decision" and accused the UK of politically motivated actions damaging bilateral relations. UK Defence Secretary Grant Shapps described Russia's move as "desperate," asserting that the expelled Russian attache was engaged in spying activities, whereas Coghill was a symbol of the UK's support for Ukraine
READ THE STORY: ANI
Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam
Bottom Line Up Front (BLUF): The U.S. Department of Justice has arrested and charged two Chinese nationals, Daren Li and Yicheng Zhang, for laundering $73 million obtained through a pig butchering cryptocurrency scam. The scam involved tricking victims into transferring funds to shell companies, which were then laundered through international banks and cryptocurrency platforms.
Analyst Comments: The arrest of Li and Zhang highlights the growing complexity and international scope of cryptocurrency-related crimes. Pig butchering scams, which prey on victims' trust, combined with sophisticated money laundering techniques, pose significant challenges to law enforcement agencies. This case underscores the importance of global cooperation in tracking and prosecuting cybercriminals who exploit the anonymity and cross-border nature of cryptocurrency transactions.
FROM THE MEDIA: Daren Li, 41, and Yicheng Zhang, 38, have been charged with orchestrating a scheme to launder $73 million through shell companies as part of a pig butchering scam. Arrested in Atlanta and Los Angeles, the pair allegedly managed an international syndicate that laundered funds obtained from victims of a cryptocurrency investment scam. The funds were moved through U.S. financial institutions to the Bahamas and converted to Tether (USDT) before being transferred to cryptocurrency wallets. The scam typically involved convincing victims to invest in fake cryptocurrency schemes, only for their funds to be funneled into controlled wallets. Li and Zhang face charges of conspiracy to commit money laundering, with potential penalties of up to 20 years in prison per count. This case is part of a broader trend of sophisticated cyber fraud operations exploiting the increasing popularity of cryptocurrencies.
READ THE STORY: THN // PoC: CVE-2024-4761
North Korea-linked Kimsuky APT Attack Targets Victims via Messenger
Bottom Line Up Front (BLUF): The Kimsuky APT group, linked to North Korea, has been targeting individuals in South Korea and Japan using rogue Facebook accounts to deliver malware through Facebook Messenger. The attack involves posing as South Korean public officials to gain the trust of victims and sharing malicious documents disguised as official content.
Analyst Comments: Kimsuky's latest attack underscores the evolving sophistication of North Korean cyber operations. By leveraging social media platforms like Facebook Messenger, the group bypasses traditional email defenses and establishes a more personal connection with targets. This method reflects an increasing boldness in their strategies and aligns with historical tactics used by North Korean APT groups to gather intelligence and disrupt regional security.
FROM THE MEDIA: Researchers from the Genius Security Center (GSC) identified the Kimsuky APT's use of fake Facebook accounts to impersonate South Korean public officials. The attackers connect with targets via friend requests and messages, then share decoy documents hosted on OneDrive. These documents, such as "NZZ_Interview_Kohei Yamamoto.msc," are designed to appear as legitimate essays or content related to high-profile political events. The malware is initiated through a multi-stage attack chain involving a Microsoft Management Console (MMC) document. Once executed, it connects to a command-and-control server, gathers information, and maintains persistence through scheduled tasks. This campaign shows a consistent pattern with previous Kimsuky operations like 'BabyShark' and 'ReconShark.'
READ THE STORY: Security Affairs
Google Patches 3rd Chrome Browser Zero-Day Inside of a Week
Bottom Line Up Front (BLUF): Google has released nine patches for Chrome, including the third zero-day vulnerability of the week, CVE-2024-4947, which allows remote code execution through type confusion in the V8 engine. This zero-day is actively exploited in the wild, emphasizing the need for immediate updates to protect against potential data theft and system manipulation.
Analyst Comments: This string of zero-day vulnerabilities highlights the persistent focus of attackers on web browsers, particularly Chrome. With Chrome's significant user base across multiple platforms, the exploitation potential is vast, underscoring the importance of timely patch management. The discovery by Kaspersky researchers and the subsequent quick response from Google reflect the collaborative efforts necessary to maintain cybersecurity in an ever-evolving threat landscape.
FROM THE MEDIA: Google announced the release of Chrome 125 and accompanying nine patches on May 15, addressing a critical zero-day vulnerability, CVE-2024-4947, identified by Kaspersky researchers Vasily Berdnikov and Boris Larin. Described as a type confusion in V8 in Chrome prior to version 125.0.6422.60, this vulnerability allows remote code execution via a crafted HTML page. Security experts like Lionel Litty of Menlo Security and Patrick Tiquet of Keeper Security emphasize the urgency of these patches due to the active exploitation of CVE-2024-4947 in the wild, which poses significant risks of data theft and system compromise. Users of Chrome, as well as Chromium-based browsers like Edge, are advised to update promptly to mitigate potential threats.
READ THE STORY: SCMEDIA
US, UK Police Identify and Charge Russian Leader of LockBit Ransomware Gang
Bottom Line Up Front (BLUF): Russian national Dmitry Yuryevich Khoroshev has been identified and charged as the leader behind the notorious LockBit ransomware group. Khoroshev faces multiple charges, including computer crimes, fraud, and extortion, for his role in attacks that have affected over 2,000 victims and resulted in more than $100 million in ransomware payments.
Analyst Comments: he indictment of Dmitry Khoroshev marks a significant breakthrough in the international fight against ransomware. LockBit has been one of the most prolific ransomware groups, and this action demonstrates the effectiveness of international cooperation in cybercrime investigations. The charges and sanctions against Khoroshev will likely disrupt LockBit's operations and send a strong message to other cybercriminals.
FROM THE MEDIA: Dmitry Yuryevich Khoroshev, identified as the administrator and developer of the LockBit ransomware, has been charged by the U.S. Department of Justice and the UK's National Crime Agency. Khoroshev, operating under the alias "LockBitSupp," has allegedly orchestrated a ransomware campaign since 2020, targeting over 2,000 victims and extracting more than $100 million in payments. The U.S. Department of State has announced a $10 million reward for information leading to his arrest and conviction.
READ THE STORY: Yahoo News // MSN
Three Arrested for Helping North Koreans Secure Remote IT Jobs in the US
Bottom Line Up Front (BLUF): US authorities have arrested three individuals involved in a scheme to help North Korean IT workers secure remote jobs in the US, funneling earnings back to North Korea to support its weapons programs. The accused face multiple charges, including wire fraud and identity theft.
Analyst Comments: The arrests underscore the sophisticated methods North Korea employs to circumvent international sanctions and fund its regime. By infiltrating the US job market through remote work and identity fraud, North Korea exploits global connectivity for economic gain. This highlights the need for robust identity verification and cybersecurity measures in remote work environments to prevent similar breaches.
FROM THE MEDIA: On May 17, three individuals were arrested for allegedly helping North Korean IT workers secure remote jobs in the US to funnel money back to Kim Jong-Un’s regime. Minh Phuong Vong of Maryland secured jobs in his name and outsourced the work to North Koreans, while Christina Marie Chapman of Arizona allegedly ran a "laptop farm" to provide North Korean workers with US IP addresses, defrauding over 300 companies. Ukrainian Oleksandr Didenko, arrested earlier this month, ran a website to help North Koreans and others secure IT jobs using stolen identities. The scheme generated $6.8 million, funding North Korea’s weapons programs. The FBI emphasizes the critical link between cybersecurity and national security, urging vigilance against such sophisticated fraud schemes.
READ THE STORY: The Register // Securityweek
How Two Brothers Allegedly Swiped $25M in a 12-Second Ethereum Heist
Bottom Line Up Front (BLUF): Anton and James Pepaire-Bueno, aged 24 and 28, have been arrested for allegedly exploiting a software bug in the Ethereum blockchain, enabling them to steal $25 million in cryptocurrency within 12 seconds. The scheme exploited a flaw in the MEV-Boost project's relay code.
Analyst Comments: This incident highlights significant vulnerabilities in blockchain systems, despite their reputation for security and transparency. The use of advanced technical knowledge to manipulate decentralized financial systems underscores the ongoing challenges in securing these networks. The case also raises questions about the effectiveness of current safeguards and the need for more robust security measures to protect against sophisticated cybercriminal activities.
FROM THE MEDIA: The US Department of Justice has charged Anton and James Pepaire-Bueno with wire fraud and money laundering, accusing them of orchestrating a $25 million heist by exploiting a flaw in the Ethereum blockchain's MEV-Boost relay code. The brothers, both computer science graduates from a prestigious university, set up validators and manipulated transaction lists to profit from illiquid cryptocurrency trades. Their actions involved creating shell companies and performing complex financial maneuvers to launder the stolen funds. The heist, which took only 12 seconds, has raised concerns about the integrity of blockchain systems and the adequacy of current security protocols. The brothers face up to 20 years in prison if convicted.
READ THE STORY: The Register
North Korea’s Kimsuky Hackers Deploy New Gomir Backdoor on Linux
Bottom Line Up Front (BLUF): The North Korean cyber-espionage group Kimsuky has introduced a new Linux malware variant named Gomir, which is being distributed through trojanized software installers. This marks another significant threat in their ongoing campaign to infiltrate and gather intelligence from South Korean targets.
Analyst Comments: Kimsuky’s deployment of the Gomir backdoor underscores the evolving nature of cyber threats from North Korea. By targeting supply chains and leveraging sophisticated malware capable of persistent control and data exfiltration, Kimsuky continues to pose a significant risk to national security. This development highlights the critical need for enhanced cybersecurity measures, particularly in monitoring and securing software supply chains.
FROM THE MEDIA: On May 17, 2024, cybersecurity researchers revealed that Kimsuky, a North Korean state-sponsored hacking group linked to the Reconnaissance General Bureau (RGB), is utilizing a new Linux malware variant called Gomir. This backdoor is a variant of the GoBear malware and is being distributed via compromised software installers like TrustPKI and Wizvera VeraPort. Gomir is designed to maintain persistence and facilitate extensive command and control operations, including executing shell commands and exfiltrating files. This campaign primarily targets South Korean entities, continuing Kimsuky’s focus on espionage through supply-chain attacks. The US Department of Justice recently arrested individuals involved in related identity theft schemes, further illustrating the global reach and impact of North Korean cyber activities.
READ THE STORY: THN // Tech Times
China-Linked Hackers Use Advanced Two-Stage Tactic to Deploy Deuterbear RAT
Bottom Line Up Front (BLUF): China-linked hackers, specifically the BlackTech group, have developed a sophisticated two-stage infection tactic to deploy the advanced Deuterbear RAT, significantly enhancing their cyber espionage capabilities.
Analyst Comments: The BlackTech group, associated with the Chinese government, has been active in cyber espionage since 2007, targeting organizations in East Asia, including Japan and Taiwan. Their use of the Deuterbear RAT marks a notable shift from their previous malware, Waterbear. Deuterbear features advanced capabilities such as shellcode plugins, anti-memory scanning techniques, and encrypted HTTPS communication for command and control (C&C), making it more resilient and harder to detect. The two-stage infection process involves an initial loader that fetches the RAT from a C&C server, followed by a second-stage loader that establishes persistence and deploys additional plugins. This tactic not only enhances functionality but also complicates detection and analysis efforts, making it a significant threat in cyber espionage campaigns. The group's focus on government, technology, and media sectors indicates a strategic intent to gather intelligence and disrupt operations in these critical areas.
FROM THE MEDIA: This group has adopted a two-stage infection method to deploy the Deuterbear RAT, a remote access trojan that improves upon the previous Waterbear RAT by adding capabilities such as shellcode plugins, anti-memory scanning, and encrypted HTTPS communication for C&C. The two-stage tactic involves an initial loader fetching the RAT from a C&C server, followed by a second-stage loader establishing persistence and deploying additional plugins. This approach enhances functionality and complicates detection and analysis efforts, making Deuterbear a significant threat in cyber espionage campaigns. BlackTech's focus on government, technology, and media sectors highlights their strategic intent to gather intelligence and disrupt operations in these critical areas. The evolution of their tactics and tools reflects a sophisticated approach to maintaining persistence and evading detection, posing a substantial challenge to cybersecurity defenses.
READ THE STORY: THN
Critical D-Link Router Vulnerabilities Added to CISA’s Exploited Catalog
Bottom Line Up Front (BLUF): The Cybersecurity and Infrastructure Security Agency (CISA) has updated its exploited vulnerabilities catalog, adding critical flaws in D-Link routers (CVE-2014-100005, CVE-2021-40655). These vulnerabilities allow attackers to hijack administrative privileges, obtain sensitive information, and execute malicious code.
Analyst Comments: These vulnerabilities highlight the importance of retiring end-of-life devices and updating security measures. With exploits confirmed in the wild, organizations must prioritize replacing outdated routers to prevent network compromises. The flaws enable attackers to redirect traffic, block access, and gain control over networks, emphasizing the critical need for updated hardware and vigilant security practices.
FROM THE MEDIA: Sarah Jones, a cyber threat intelligence research analyst at Critical Start, explained that CVE-2014-100005 allows attackers to modify network configurations, potentially redirecting traffic or launching attacks on other devices. CVE-2021-40655 enables attackers to steal usernames and passwords in plain text, compromising the router’s settings and other accounts using the same credentials. Casey Ellis, founder and chief strategy officer at Bugcrowd, noted that these vulnerabilities affect home and SOHO network devices, stressing that attackers who can modify router configurations can gain extensive control over the network.
READ THE STORY: The Cyber Express // SCMAG PoCs: CVE-2014-100005, CVE-2021-40655
Biden Outspends Trump on Social Media Ads, Faces More Attacks
Bottom Line Up Front (BLUF): Joe Biden outspends Donald Trump on Facebook and Instagram ads by a ratio of 7-to-1, but ads attacking Biden are more prevalent than those attacking Trump. This data comes from a research project by Syracuse University using a Neo4j graph database to analyze social media ad spending and sentiment.
Analyst Comments: The significant disparity in ad spending between Biden and Trump reflects a strategic choice by the Biden campaign to heavily invest in social media platforms. However, the higher volume of attack ads targeting Biden indicates a substantial effort by conservative-leaning groups to undermine the incumbent. This dynamic underscores the aggressive and polarized nature of current political advertising strategies, where both direct campaign ads and third-party attack ads play crucial roles.
FROM THE MEDIA: Syracuse University's Institute for Democracy, Journalism and Citizenship (IDJC) conducted a study with the support of Neo4j, revealing that Joe Biden's campaign spent significantly more on Facebook and Instagram ads compared to Donald Trump's campaign. Despite this, Biden was the target of more attack ads. The study, led by Professor Jennifer Stromer-Galley, found that conservative groups like the Liberty Defender Group and Americans for Prosperity were among the top ad spenders. The research utilized Meta's ad library API and Google's BERT for data tagging, transitioning from MongoDB to Neo4j's graph database to better manage and analyze the relationships in the data. The findings highlight the complexities and technical challenges of tracking political ad spending across multiple platforms, especially given the limited availability of comparable data from other social media networks.
READ THE STORY: The Register
TeslaLogger Vulnerability Exposes Over 30 Tesla Cars to Remote Hacking
Bottom Line Up Front (BLUF): A security researcher discovered a critical vulnerability in TeslaLogger, a third-party data logging software for Tesla vehicles, which allowed unauthorized access to sensitive API credentials. The flaw exposed over 30 TeslaLogger instances to potential remote attacks, enabling control over various vehicle functions.
Analyst Comments: This incident underscores the significant risks associated with third-party software in the automotive sector, particularly those that integrate deeply with vehicle APIs. The insecure default settings in TeslaLogger, such as plain-text storage of credentials and lack of authentication, highlight the need for stringent security practices in software development and deployment. Organizations utilizing such third-party applications must ensure robust security configurations to protect against unauthorized access and potential vehicle manipulation.
FROM THE MEDIA: Security researcher Harish SG identified vulnerabilities in TeslaLogger, an open-source data logger for Tesla cars, which exposed over 30 instances to remote hacking risks. By exploiting insecure default settings and credentials, attackers could gain access to Tesla API keys stored in TeslaLogger databases, allowing them to control various car functions remotely. The researcher responsibly reported the findings to the TeslaLogger maintainer, who subsequently implemented security measures such as encrypting API credentials and adding authentication protocols. This vulnerability did not affect Tesla's infrastructure directly but highlighted the broader risks posed by third-party software integrations.
READ THE STORY: Cyber Security News
Critical RCE Vulnerability in Popular Python Package Affects Over 6,000 AI Models
Bottom Line Up Front (BLUF): A critical vulnerability, CVE-2024-34359, in the llama-cpp-python package, used by over 6,000 AI models, allows remote code execution (RCE) through server-side template injection. This flaw poses significant supply chain risks, potentially enabling attackers to inject malicious code into AI models and compromise systems upon execution.
Analyst Comments: The discovery of CVE-2024-34359 highlights the growing intersection of AI and supply chain security risks. The vulnerability in the llama-cpp-python package, which binds Python to the llama.cpp C++ library for running large language models (LLMs), underscores the importance of secure software development practices. The improper implementation of the Jinja2 template engine allows unsanitized metadata to be parsed, enabling attackers to execute arbitrary code. This incident serves as a crucial reminder for developers to ensure robust input validation and sandboxing measures, especially when dealing with AI models and third-party integrations.
FROM THE MEDIA: Security researcher Patrick Peng identified CVE-2024-34359, a critical vulnerability in the llama-cpp-python package, which allows remote code execution via server-side template injection. The package, providing Python bindings for the llama.cpp library, is widely used to integrate large language models into Python applications. Peng demonstrated a proof-of-concept exploit showing how compromised models could execute arbitrary code through unsanitized metadata in Jinja2 templates. Over 6,000 models on platforms like Hugging Face are potentially affected. A patch in version 0.2.72 of llama-cpp-python introduces input validation and sandboxing to mitigate this flaw. The incident underscores the urgent need for rigorous security practices in AI development to prevent supply chain attacks.
READ THE STORY: SCMAG
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Bottom Line Up Front (BLUF): The Grandoreiro banking trojan, previously disrupted by law enforcement, has re-emerged in a global phishing campaign targeting over 1,500 banks across 60 countries. The campaign, active since March 2024, uses advanced techniques to bypass security measures and spread through Microsoft Outlook clients.
Analyst Comments: The resurgence of the Grandoreiro banking trojan exemplifies the persistent and evolving nature of cyber threats. Despite law enforcement takedowns, cybercriminals adapt and continue their operations, often improving their tactics. This case underscores the importance of robust cybersecurity measures and international cooperation in combating cybercrime. The use of malware-as-a-service (MaaS) models also highlights the growing sophistication and commercialization of cyber attacks.
FROM THE MEDIA: IBM X-Force reports that the Grandoreiro banking trojan has resurfaced in a widespread phishing campaign affecting over 1,500 banks in more than 60 countries. This new wave of attacks, active since March 2024, follows a law enforcement takedown of the trojan's infrastructure in January. The phishing emails lure victims into downloading a ZIP file containing a Grandoreiro loader executable, designed to evade anti-malware scans and avoid sandbox environments. Once installed, the trojan establishes persistence through the Windows Registry and uses an updated domain-generating algorithm (DGA) to connect to command-and-control servers for further instructions. Notably, it can now exploit Microsoft Outlook clients on infected systems to spread phishing emails, significantly increasing its reach. This renewed threat showcases ongoing active development and strategic shifts in targeting, now encompassing regions beyond its original focus in Latin America, Spain, and Portugal.
READ THE STORY: THN
WiFi Flaw Allows Eavesdropping Attacks via Downgrading Strategy
Bottom Line Up Front (BLUF): Security researchers have identified a vulnerability in the IEEE 802.11 WiFi standard, CVE-2023-52424, which enables attackers to eavesdrop on network traffic by downgrading security protocols. This flaw affects all WiFi clients and operating systems, posing a significant risk to network security.
Analyst Comments: The newly discovered CVE-2023-52424 vulnerability underscores the critical need for robust WiFi security practices. By exploiting SSID confusion, attackers can downgrade a network's security and intercept data, particularly impacting environments with high credential reuse like educational institutions. Mitigation strategies include updating to the latest 802.11 standards that authenticate SSIDs and avoiding credential reuse across networks. This vulnerability highlights the importance of continuous security updates and vigilant network management to protect against evolving threats.
FROM THE MEDIA: Researchers have uncovered a severe flaw in the WiFi standard (CVE-2023-52424), allowing adversaries to eavesdrop on network traffic by downgrading a network's security. This attack exploits SSID confusion, tricking devices into connecting to networks with lower security. The vulnerability affects all WiFi clients and operating systems, including those using WPA3, WEP, AMPE, and 802.11X/EAP. Attackers can disable VPNs with auto-disconnect features, further compromising network security. To mitigate this risk, users should store network beacons with SSID data, update to the latest 802.11 standard, and avoid reusing credentials across different networks. The discovery highlights the critical need for secure WiFi configurations and regular updates to safeguard against such vulnerabilities.
READ THE STORY: Spiceworks
Items of interest
Putin is Plotting 'Physical Attacks' on the West, Says GCHQ Chief
Bottom Line Up Front (BLUF)
British intelligence chief Anne Keast-Butler has warned that Russia is planning physical attacks against Western targets. This warning comes amid increasing concerns over Russia's and China's growing cyber and physical threat capabilities against the UK and its allies.
Analyst Comments
Russia's strategic shift towards potential physical attacks marks an escalation in its hostile actions against the West. The growing collaboration between Russian intelligence and proxy groups for cyber and physical operations signifies a multifaceted threat. Additionally, China’s aggressive cyber activities highlight the broader context of state-sponsored threats facing the UK and other Western nations. These developments underline the importance of enhanced intelligence and cybersecurity measures to counter these emerging threats.
FROM THE MEDIA
Anne Keast-Butler, head of GCHQ, highlighted the escalating threats from Russia and China during her speech at the CyberUK conference. She emphasized the increasing concern over Russia's potential for physical attacks and China's aggressive cyber activities. The UK’s support for Ukraine remains steadfast, and efforts are being made to bolster cyber defenses against these multifaceted threats
READ THE STORY: Telegraph
Proxy war between China and US | John Mearsheimer and Lex Fridman (Video)
FROM THE MEDIA: John Mearsheimer is an international relations scholar at University of Chicago. He is one of the most influential and controversial thinkers in the world on the topics of war and power.
Russia-Ukraine War: Proxy war between spy agencies amid Russia's invasion of Ukraine (Video)
FROM THE MEDIA: According to a Newsweek magazine cover article titled "CIA's blind spot about Ukraine war," the enormous intelligence network is facing its greatest test in recent memory as the United States struggles to understand what is happening in the corridors of power in Moscow and Kyiv.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.