skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Newsletter 8 November 2024

Newsletter 8 November 2024

/ 8 min read

📧 Secure Transmission: Your Latest Intel

Welcome to our November 8, 2024 edition! This week, we’re delving into emerging threats, critical vulnerabilities, and innovative advancements impacting the cybersecurity landscape. From the identification of the new Earth Estries threat group to significant updates in security tools and protocols, we’ve gathered the essential intel you need to stay ahead. Discover how botnets like Androxgh0st are targeting IoT devices, explore advancements in post-quantum cryptography with NIST’s latest developments, and understand the growing adoption of Zero Trust security frameworks. Stay informed and fortified with this week’s top developments and actionable insights to keep your defenses strong and proactive!

🛠️ Security Enhancements and New Technologies

🔐 NIST Advances Fourteen Post-Quantum Signature Schemes. The National Institute of Standards and Technology (NIST) made progress on fourteen post-quantum signature schemes, marking a significant step in cryptographic research. This advancement aims to strengthen security against future quantum computing threats. NIST continues to collaborate with global cryptographers on this groundbreaking project. Read more

🔒 Zero Trust Security Framework Gains Popularity Among Organizations. The Zero Trust security model is seeing widespread adoption across organizations aiming to boost cybersecurity measures. By adopting “never trust, always verify” principles, businesses can mitigate risks from both external and internal threats. This shift highlights the growing importance of identity and access management in modern cybersecurity strategies. Read more

🕳️ Vulnerabilities and Exploits

📡 Androxgh0st Botnet Targets Web Servers and IoT Devices. The Androxgh0st botnet, known for attacking web servers and IoT devices, has resurfaced, leading to increased concern across the cybersecurity community. This botnet enables attackers to leverage compromised devices in large-scale DDoS attacks. Security experts recommend patching and monitoring for unusual traffic patterns. Read more

🚨 Fastly Experiences BGP Hijack Incident. Fastly, a major content delivery network, experienced a Border Gateway Protocol (BGP) hijack incident, disrupting internet traffic and highlighting vulnerabilities in internet routing protocols. The incident has sparked discussions on the need for stronger routing security measures to prevent similar occurrences in the future. Read more

💰 New Malware Campaign ‘Hidden Risk’ Targets Cryptocurrency Businesses. A new malware campaign, ‘Hidden Risk,’ has emerged, specifically targeting cryptocurrency businesses and exchanges. The malware leverages advanced obfuscation techniques, making it difficult to detect and potentially devastating to businesses operating in the cryptocurrency space. Read more

🎮 New Malware Winos4.0 Targets Windows Users in Gaming, Education. The Winos4.0 malware has been identified as a threat to Windows users, particularly in the gaming and education sectors. It infiltrates systems through malicious downloads, disrupting activities and causing financial losses for affected users. Experts suggest only downloading software from trusted sources. Read more

📈 Threat Actors Utilize Binance Smart Chain in Malware Campaign. Cybercriminals are increasingly using the Binance Smart Chain to conduct malware campaigns. This trend raises concerns about blockchain security as malicious actors exploit decentralized finance (DeFi) systems to anonymize their activities, making detection and prevention challenging. Read more

🛠️ Detection of Malware Packages in Open Source Registries. Malicious packages were detected in major open-source registries, leading developers to review dependencies more closely. This incident underscores the importance of securing the software supply chain to prevent malicious code from infiltrating systems via third-party libraries. Read more

🕸️ Discovery of New Cyberattack Campaign CRON#TRAP. The CRON#TRAP cyberattack campaign has been identified, using sophisticated techniques to evade detection and exploit vulnerable systems. Security researchers urge organizations to review their cron job schedules and employ real-time monitoring to mitigate risks. Read more

🌐 Cybersecurity Threat: Earth Estries Group Identified. A new threat actor group, Earth Estries (aka Salt Typhoon), has been identified. Active since 2020, this group has targeted Microsoft Exchange vulnerabilities using malware like Zingdoor and Snappybee. Security experts recommend patching and robust credential management to counter their tactics. Read more


🛠 Tools

  • Wazuh (v4.9.2) | Security and SIEM | Fixed unhandled exception in IPC parsing, resolved vulnerabilities table scroll in dashboard, improving usability.
  • Netmaker (v0.26.0) | Network automation for WireGuard | Added ACLs, managed DNS, simplified user roles, and scalability improvements for distributed networks.
  • Artemis (v3.4.0) | Modular vulnerability scanner | Enhanced SQL injection detection, more Nuclei templates, improved scanning speed, UI and bug fixes.
  • Authentik (v2024.10.1) | Authentication management | Resolved OAuth2 token size issue, refined API schema, added None check for device descriptions.
  • Cartography (v0.95.0) | Infrastructure asset graphing | Added API token generation, Docker improvements, deprecated crxcavator, governance guidelines added.
  • Chainloop (v0.103.0) | Supply chain attestation store | Added Helm support, policy group references, pre-release cleanup, and run error visibility improvements.
  • Firezone (v1.3.11) | Zero-trust access platform | Minor GUI updates, check changelog for full security feature details.
  • Ghidra (Ghidra_11.2.1_build) | Reverse engineering framework | Latest stable release with complete installation guide and SHA-256 verification for integrity.
  • Kanidm (v1.4.2) | Identity management platform | Overhauled web UI, strict OAuth2 redirects, reduced memory, fixed access controls migration for security.
  • osctrl (v0.4.1) | Osquery management | Added Kafka backend, Prometheus metrics, elastic logging, updated osquery support, and minor bug fixes.
  • Panther Analysis (v3.67.0) | Detection rules and policies | New AWS WAF policy, ThinkstCanary detection rules, GSuite external sharing, and bug fixes.
  • Prowler (v4.5.0) | Cloud security assessments | Expanded AWS checks (104 new), Bedrock security features, IAM gap closures for resource visibility.
  • Substation (v0.6.0) | Security event toolkit | Improved audit logging, added export filters, enhancements to data sorting and event tagging.
  • YaraHunter (v1.2.0) | Cloud-native malware scanner | Multi-language support, optimized cloud scanning, enhanced malware rule set, streamlined workflows.
  • Trivy (v0.41.0) | Vulnerability scanner | Updated secrets detection, faster misconfiguration checks, enhanced scanning speed, and optimized workflows.

🌐 Upcoming Events


⚡ Briefs

Threats

  • Cybercriminals are increasingly using legitimate DocuSign accounts to send fraudulent invoices that resemble those from reputable companies, posing challenges for detection and prompting security experts to recommend enhanced verification and training measures.
  • Interpol’s operation Synergia II resulted in the arrest of 41 individuals and the dismantling of cybercrime infrastructure across 95 countries, targeting over 22,000 IP addresses and identifying over 30,000 suspicious IPs.

Vulnerabilities

  • Ubuntu has released a security update addressing multiple vulnerabilities in OpenSSL that could allow for arbitrary code execution or denial of service, urging users to upgrade their systems.
  • CISA has identified critical vulnerabilities in PTZOptics camera models, urging organizations to upgrade their systems to mitigate security risks.
  • Cisco has released a patch for a critical vulnerability in certain Ultra-Reliable Wireless Backhaul access points that could allow unauthenticated attackers to execute commands with root privileges.
  • Hewlett Packard Enterprise has issued a security advisory for critical vulnerabilities in its Aruba Networking Access Points, urging users to upgrade to the latest software to mitigate potential risks.
  • Microsoft Mandiant report highlights vulnerabilities in Intune permissions that could allow advanced threat actors to gain elevated privileges within Microsoft Entra ID environments.
  • November 2024 Android Security Bulletin highlights several security vulnerabilities, including a critical remote code execution risk, advising users to update their devices to the latest security patch levels.

Breaches

  • Bainbridge, Georgia Memorial Hospital and Manor faced a ransomware attack that disrupted its Electronic Health Record system, involving the theft of 1.15 terabytes of data, with the Embargo ransomware gang claiming responsibility.
  • SelectBlinds experienced a data breach affecting over 200,000 customers, compromising personal and payment information due to malware embedded on its website.
  • Washington state’s court systems faced a significant outage due to a cyberattack, affecting judicial information and websites.
  • Earth 2 reported a security incident exposing 421,000 email addresses linked to player usernames, though no sensitive personal information or financial data was compromised.
  • employee data breach at Microlise following a cyberattack limited to employee information, not affecting customer data, with investigations underway.

Policy

  • Canada has ordered TikTok to cease operations due to national security concerns, while the company plans to challenge the decision in court.
  • Google announced mandatory multi-factor authentication for Google Cloud users signing in with passwords, effective late 2024, to bolster security against phishing and credential theft.
  • U.S. government agencies will expand access to Meta’s open-source Llama AI models to enhance national security and improve public services.

Industry

  • Newpark Resources faced a ransomware attack on October 29, disrupting access to internal information systems, though manufacturing and field operations remain unaffected.

Tools

  • Ghidra 11.2.1 has been released, featuring an improved user interface, enhanced scripting capabilities, and support for additional file formats.
  • Researchers introduced Mantis, a defensive framework countering cyberattacks driven by large language models, demonstrating over 95% effectiveness in tests and available as an open-source tool.

Education

  • Ferris State University faculty member emphasizes hands-on learning and the integration of real-world applications in cybersecurity education, stressing the importance of soft skills.

Cybercrime

  • Amazon Web Services Researchers discovered a malicious package called “fabrice” on PyPI, which exfiltrated AWS credentials from users’ systems.
  • GitHub A script on GitHub, “steam-account-checker,” contained malicious code compromising Steam user accounts and exfiltrating data.
  • Python Remote Access Trojan Remote Access Trojan includes a “screenshare” command, allowing attackers to control a victim’s computer and capture screenshots.

Challenge

  • ReverseMe challenge launched, featuring an intermediate-level task that requires participants to decipher a hidden seed, adding complexity due to minimal testing.

Thank you for tuning in to this week’s Secure Transmission! We’re dedicated to providing you with the latest insights to keep your defenses strong. If you found this edition valuable, feel free to share it with others committed to cybersecurity. Stay alert, and join us next week for more essential updates and expert insights!

Check out what's latest