90年代申花出租车司机夜晚在车内看文汇报90年代申花出租车司机夜晚在车内看文汇报

September 3, 2024

In a sophisticated cyberattack, hackers have set their sights on the SSL VPN systems of cybersecurity firms, using them as bait to distribute malicious software, according to a recent report by the Information Security Daily.

The attack, revealed by cybersecurity firm Trend Micro, involves the use of fake applications disguised as legitimate SSL VPN software from a specific vendor. This targeted approach is particularly concerning as it suggests that the attackers are well-informed about their potential victims, potentially lowering the defenses of users who might otherwise be cautious.

Targeted Attack on Middle Eastern Organizations

The attackers have specifically targeted Middle Eastern organizations, using a fake version of the GlobalProtect SSL VPN service from Palo Alto Networks. The intent is to steal internal data and execute PowerShell commands to infiltrate the network environments of the affected organizations.

Researchers are not entirely clear on how the attackers are distributing the malware, but they suspect it is likely through phishing campaigns that entice users to install the GlobalProtect agent as a pretext for distribution.

OceanLotus APT Group Targets Vietnamese Human Rights Organization

In a separate incident, the OceanLotus (also known as APT32, APT-C-00, Canvas Cyclone) hacking group, linked to the Vietnamese government, has been discovered infiltrating a local human rights organization for over four years. The attackers used various techniques to maintain persistence, including伪装ing as Adobe Flash update tools and Microsoft Defender update tasks.

The attackers planted five scheduled tasks on one of the compromised computers, which executed Windows Script, Java, and other payloads to load Metasploit and Cobalt Strike, processed Shell Code, VBS scripts, BAT batch files, and COM objects.

NPM Supply Chain Attack on Roblox Platform

Cybersecurity firm Checkmarx has warned of an ongoing supply chain attack targeting developers on the Roblox platform. Hackers have been using fake and malicious NPM packages to steal sensitive information or compromise systems for over a year.

The attackers are primarily mimicking the JavaScript library noblox.js, designed for Roblox platform developers, by creating malicious packages with names like noblox.js-async, noblox.js-thread, or noblox.js-api. These packages are then distributed through the NPM software package management system.

The malicious programs primarily steal Discord credentials, access system information, and allow attackers to maintain persistent activity on the victim’s computer, as well as deploy additional malware.

London Transport Authority Faces Cyberattack

The Transport for London (TfL) has confirmed that it is dealing with an ongoing cybersecurity incident, although it has assured the public that transport services have not been affected and no passenger data has been compromised. TfL has reported the incident to the National Cyber Security Centre and the National Crime Agency.

Local media reports suggest that the incident occurred around 6 PM, with millions of passengers receiving messages about the situation. One unit of the organization was advised to work from home as much as possible, and the attack likely targeted the backend systems of one of TfL’s suppliers.

Recent Cybersecurity Incidents

Other recent cybersecurity incidents include a fine of $2.95 million against Verkada, a surveillance company, for a breach. There have also been attacks involving the Godulla backdoor targeting Atlassian Confluence, North Korean hackers distributing malicious NPM packages, and an Iranian hacking group发起 GreenCharlie attacks targeting U.S. political groups with phishing and malware distribution.

Additionally, researchers have published a conceptual validation tool for the Windows Downdate downgrade vulnerability.

Strengthening Cyber Defenses

In response to these threats, the Department of Health and Welfare in Taiwan held its annual cybersecurity drill, selecting the Guotai Hospital as a demonstration site. The drill involved simulating ransomware attacks and other hacking techniques, challenging staff to respond effectively under limited time and resources.

Guotai Hospital’s Chief Information Security Officer, Lin Chaoxiang, believes that the drill has enhanced the sensitivity of cybersecurity personnel to various scenarios, improving their ability to respond to future threats.

As cyber threats continue to evolve, organizations and individuals must remain vigilant and proactive in implementing robust cybersecurity measures to protect against these sophisticated attacks.


read more

Views: 0

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注