<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Evilproxy &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/evilproxy/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 24 Sep 2024 18:57:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Evilproxy &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hackers leverage Selenium Grid for malicious activity</title>
		<link>https://firsthackersnews.com/hackers-leverage-selenium-grid-for-malicious-activity/</link>
					<comments>https://firsthackersnews.com/hackers-leverage-selenium-grid-for-malicious-activity/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 17 Sep 2024 16:29:11 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Selenium Grid Tool]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8706</guid>

					<description><![CDATA[<p>Threat actors are exploiting Selenium Grid&#8217;s default lack of authentication in two active campaigns, deploying exploit kits, cryptominers,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/hackers-leverage-selenium-grid-for-malicious-activity/">Hackers leverage Selenium Grid for malicious activity</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Threat actors are exploiting Selenium Grid&#8217;s default lack of authentication in two active campaigns, deploying exploit kits, cryptominers, and proxyjackers.</p>



<h2 class="wp-block-heading"><strong>All about Selenium Grid Tool</strong></h2>



<p>Selenium Grid&#8217;s widespread adoption among developers, combined with its default lack of authentication, makes it an appealing target for attackers. These campaigns exploit the tool&#8217;s ability to run code on remote systems, allowing attackers to distribute and execute malicious payloads, such as exploit kits, cryptominers, and proxyjackers. This poses a significant threat to organizations using Selenium Grid for testing and automation, as it can lead to unauthorized system access and malware infections.</p>



<p>Attackers exploited an unsecured Selenium Grid instance lacking authentication. They injected a base64-encoded Python script into the “goog” configuration, executed via the Python3 binary in the WebDriver setup. </p>



<p>The script disabled shell command history logging and downloaded a reverse shell (GSocket) from a remote server, which created an encrypted TCP connection, allowing remote command execution on the compromised system.</p>



<p>A malicious script, “pl,” retrieved from a command and control server, performs system checks, stops specific Docker containers, and sets the installation path. </p>



<p>It then downloads IPRoyal Pawn and EarnFM payloads, used for selling the user’s internet bandwidth as a proxy service and other malicious activities. Additionally, “pl” includes a base64-encoded script “tm,” which checks for root privileges, installs Docker if needed, and configures Docker images for “traffmonetizer” and “WatchTower.”</p>



<p>The attacker used a multi-stage approach, starting with a base64-encoded Python script injected into Chrome that decoded into a Bash script. This prepared the system, downloaded an ELF binary packed with UPX, and attempted to exploit CVE-2021-4043 for root access. </p>



<p>The binary connected to Tor nodes for C2 communication, deployed cryptomining binaries, set up cron jobs for persistence, and created temporary directories for mining files.</p>



<p>The SHC-compiled ELF binary &#8220;Top&#8221; is a Bash script that checks environment variables to determine its actions. It exits if &#8220;ABWTRX&#8221; is set, or modifies the PATH and cleans up processes and files if &#8220;AAZHDE&#8221; is not. It then runs the &#8220;top&#8221; command to display system processes. This script was used to exploit misconfigured Selenium Grid instances, underscoring the need for proper authentication and configuration to prevent attacks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/hackers-leverage-selenium-grid-for-malicious-activity/">Hackers leverage Selenium Grid for malicious activity</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/hackers-leverage-selenium-grid-for-malicious-activity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Emansrepo Malware Targets Windows via HTML Files</title>
		<link>https://firsthackersnews.com/new-emansrepo-malware/</link>
					<comments>https://firsthackersnews.com/new-emansrepo-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 04 Sep 2024 17:10:45 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Emansrepo Malware]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8627</guid>

					<description><![CDATA[<p>Emansrepo, a Python infostealer, is spread through phishing emails with fake purchase orders. The attack has evolved, now</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/new-emansrepo-malware/">New Emansrepo Malware Targets Windows via HTML Files</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Emansrepo, a Python infostealer, is spread through phishing emails with fake purchase orders. The attack has evolved, now involving multiple stages. Stolen data is zipped and sent to the attacker, posing a significant threat to Windows users.</p>



<h2 class="wp-block-heading"><strong>Emansrepo Malware </strong></h2>



<p>All three phishing chains use 7z archive files to deliver payloads. Chain 1 uses a dropper disguised as a download page, triggering a fake download that redirects the user and installs a preconfigured Python infostealer.</p>



<p>Chain 2 uses a nested HTA file with JavaScript to decrypt and download a PowerShell script, which, like Chain 1, installs the Python stealer via a batch file. Chain 3 uses a BatchShield-obfuscated batch file to download and run a PowerShell script, leading to the same Python infostealer.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="367" src="https://firsthackersnews.com/wp-content/uploads/2024/09/image-1024x367.png" alt="" class="wp-image-8628" srcset="https://firsthackersnews.com/wp-content/uploads/2024/09/image-200x72.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-300x107.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-400x143.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-600x215.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-768x275.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-800x287.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-1024x367.png 1024w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-1200x430.png 1200w, https://firsthackersnews.com/wp-content/uploads/2024/09/image.png 1256w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">The download link for Emansrepo is embedded in RTGS Invoices.html.<br></figcaption></figure>



<p>Emansrepo is a Python infostealer that targets user data in three stages:</p>



<ol class="wp-block-list">
<li><strong>Part 1</strong>: Steals user info and text files (under 0.2 MB) from Desktop, Documents, and Downloads folders, as well as login data, credit card info, and browsing history from various browsers.</li>



<li><strong>Part 2</strong>: Targets PDF files (under 0.1 MB) and compresses browser extensions, crypto wallets, and game platform data into zip files.</li>



<li><strong>Part 3</strong>: Collects browser cookies, zipping them into <code>{process_name}_cookies.zip</code>.</li>
</ol>



<p>A new Remcos malware campaign, using a phishing email with a malicious DBatLoader attachment, mirrors the attack pattern of the earlier Python infostealer. </p>



<p>Both share identical email content but differ in distribution methods. The Remcos campaign uses a simpler approach, directly downloading and decrypting the Remcos payload, protected by a packer.</p>



<p>Emansrepo, an active threat actor since November, continuously evolves its attack methods and malware. FortiGuard urges organizations to stay vigilant due to the dynamic nature of these threats.</p>



<h2 class="wp-block-heading">IOCs</h2>



<h3 class="wp-block-heading">Address</h3>



<p>hxxps://bafybeigm3wrvmyw5de667rzdgdnct2fvwumyf6zyzybzh3tqvv5jhlx2ta[.]ipfs[.]dweb[.]link/wetrankfr[.]zip<br>hxxps://bafybeifhhbimsau6a6x4m2ghdmzer5c3ixfztpocqqudlo4oyzer224q4y[.]ipfs[.]w3s[.]link/myscr649612[.]js<br>https://estanciaferreira[.]com[.]br/wp-includes/TIANJIN-DOC-05082024-xls[.]7z<br>hxxps://dasmake[.]top/reader/timer[.]php<br>hxxps://hedam[.]shop/simple/Enquiry.7z<br>191[.]101[.]130[.]185<br>192[.]236[.]232[.]35<br><a></a></p>



<h3 class="wp-block-heading">Email address</h3>



<p>stealsmtp@dasmake[.]xyz<br>hanbox@dasmake[.]xyz<br>publicsmtp@dasmake[.]xyz<br>publicbox@dasmake[.]xyz<br>minesmtp8714@dasmake[.]xyz<br>minestealer8412@dasmake.xyz<br>minesmtp8714@maternamedical[.]top<br>minestealer8412@maternamedical[.]top<br>extensionsmtp@maternamedical[.]top<br>filelogs@maternamedical[.]top<br>cookiesmtp@maternamedical[.]top<br>cooklielogs@maternamedical[.]top<br><a></a></p>



<h3 class="wp-block-heading">Phishing mail</h3>



<p>a6c2df5df1253f50bd49e7083fef6cdac544d97db4a6c9c30d7852c4fd651921<br>9e5580d7c3c22e37b589ec8eea2dae423c8e63f8f666c83edabecf70a0948b99<br>9bd3b8d9ac6ad680b0d0e39b82a439feedd87b9af580f37fa3d80d2c252fef8c<br>915bad0e2dbe0a18423c046f84d0ff7232fff4e5ba255cc710783f6e4929ab32<br>64e5c9e7b8dfb8ca8ca73895aa51e585fa7e5414f0e1d10659d3a83b9f770333<br>b343cce5381b8633b3fd3da56698f60db70c75422e120235a00517d519e37d8d<br>32bcbce53bfee33112b447340e7114d6d46be4ccf1a5391ad685431afdc8fb86</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong>&nbsp;<a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener">&nbsp;Instagram</a>,&nbsp;<a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong>&nbsp;to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/new-emansrepo-malware/">New Emansrepo Malware Targets Windows via HTML Files</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/new-emansrepo-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Flaw in Voice Over Wi-Fi Allows Eavesdropping</title>
		<link>https://firsthackersnews.com/voice-over-wi-fi/</link>
					<comments>https://firsthackersnews.com/voice-over-wi-fi/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 05 Aug 2024 01:02:45 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Voice Over Wi-Fi flaw]]></category>
		<category><![CDATA[VoWiFi]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8430</guid>

					<description><![CDATA[<p>Voice Over Wi-Fi (VoWiFi) is commonly used for making voice calls over Wi-Fi, improving call quality and reliability.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/voice-over-wi-fi/">Critical Flaw in Voice Over Wi-Fi Allows Eavesdropping</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Voice Over Wi-Fi (VoWiFi) is commonly used for making voice calls over Wi-Fi, improving call quality and reliability. Recently, cybersecurity researchers discovered a vulnerability in VoWiFi that allows attackers to eavesdrop on calls and SMS.</p>



<h2 class="wp-block-heading"><strong>Voice Over Wi-Fi flaw</strong></h2>



<p>Voice over Wi-Fi (VoWiFi) uses IPsec tunnels to route IP-based calls through mobile network operators&#8217; core networks via the Evolved Packet Data Gateway (ePDG).</p>



<p>The process involves negotiating encryption parameters and exchanging keys via the Internet Key Exchange protocol, followed by authentication. VoWi-Fi enhances coverage and saves costs by providing cellular network access without traditional radio networks. </p>



<p>However, many operators still use outdated Diffie-Hellman groups, ignore 3GPP specs, and share private keys across regions, raising security concerns.</p>



<p>These vulnerabilities risk exposing VoWiFi communications to MITM attacks, compromising data integrity and confidentiality. Security practices in VoWiFi are assessed by examining carrier configurations on various smartphone platforms. </p>



<p>Devices like iPhones and Android models may use outdated or weak cryptographic algorithms, such as the insecure DH21024 group.</p>



<p>Apple uses single-algorithm settings for VoWiFi, while Android supports multiple options. Key lifetimes of 10 to 24 hours may allow for attacks. </p>



<p>This highlights the need for standardized VoWiFi configurations. An analysis of Internet Key Exchange (IKE) handshakes revealed vulnerabilities: 275 of 423 tested ePDG domains responded, and 33 rejected all key exchange methods.</p>



<p>Most alarmingly, session security was compromised as 12 operators shared ten static private keys, allowing decryption of session secrets. Poor practices, such as handshake and nonce reuse, violate IKEv2 specifications. These findings expose systemic flaws in VoWiFi, increasing vulnerability to man-in-the-middle attacks and underscoring the need for improved security measures in VoWiFi protocols.</p>



<p><strong>Recommendations for Addressing Voice Over Wi-Fi Flaws:</strong></p>



<ol class="wp-block-list">
<li><strong>Update Cryptographic Algorithms:</strong> Transition from outdated algorithms and weak Diffie-Hellman groups to more secure, modern algorithms.</li>



<li><strong>Implement Strong Key Management:</strong> Avoid sharing static private keys across operators and ensure unique key management practices to prevent decryption of session secrets.</li>



<li><strong>Enhance Configuration Standards:</strong> Standardize VoWiFi configurations across manufacturers and operators to ensure consistent security practices and reduce vulnerabilities.</li>



<li><strong>Regularly Update Firmware:</strong> Ensure that all devices use the latest firmware versions to address known vulnerabilities and apply security patches promptly.</li>



<li><strong>Improve Security Practices:</strong> Adhere strictly to IKEv2 specifications to prevent handshake and nonce reuse, which can lead to security breaches.</li>
</ol>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/voice-over-wi-fi/">Critical Flaw in Voice Over Wi-Fi Allows Eavesdropping</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/voice-over-wi-fi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SMS Bombing: The Risks and Dangers of Text Message Attacks</title>
		<link>https://firsthackersnews.com/sms-bombing/</link>
					<comments>https://firsthackersnews.com/sms-bombing/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 04 Mar 2024 01:52:49 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[calls]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[SMS]]></category>
		<category><![CDATA[SMS bombing]]></category>
		<category><![CDATA[text message]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7491</guid>

					<description><![CDATA[<p>In the realm of cybersecurity, SMS Bomber attacks are emerging as a modern threat with significant and concerning</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sms-bombing/">SMS Bombing: The Risks and Dangers of Text Message Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In the realm of cybersecurity, SMS Bomber attacks are emerging as a modern threat with significant and concerning consequences. Many of us have experienced receiving SMS or calls from unknown numbers on our phones, often from businesses, sales companies, or illegal betting sites that obtain SMS permission from their customers.</p>



<h2 class="wp-block-heading"><strong>What is SMS Bombing</strong></h2>



<p><br>SMS bombing, also known as text bombing or SMS flooding, is a cyberattack where an attacker sends a large volume of text messages to a target&#8217;s phone number in a short period of time. The purpose of SMS bombing is to overwhelm the target&#8217;s device with a flood of incoming messages, causing disruptions such as draining the phone&#8217;s battery, slowing down or crashing the messaging app, or even rendering the device temporarily unusable.</p>



<p>SMS bombing can be carried out using automated tools or scripts that send numerous messages to the target&#8217;s phone number. Attackers may use SMS bombing for various malicious purposes, including harassment, revenge, or disrupting the target&#8217;s communication.</p>



<p>SMS Bomber attacks can serve various purposes, including trolling, cyberbullying, or diverting the target&#8217;s attention. </p>



<p>These attacks often involve the use of simple scripts and are facilitated through underground forums, messaging platforms like Telegram, ICQ, and Discord, as well as open-source code sharing platforms such as GitHub and Replit. Throughout our research, our goal was to maintain a comprehensive understanding of SMS Bomber attacks and their impact.</p>



<h2 class="wp-block-heading"><strong>Example of SMS Bombing</strong></h2>



<p><br>An example of SMS bombing might involve an individual using an automated tool or script to send hundreds or even thousands of text messages to a target&#8217;s phone number within a short period of time.</p>



<p>For instance, let&#8217;s say an individual wants to harass someone they have a grudge against. They obtain the target&#8217;s phone number and input it into an SMS bombing tool they found online. They set the tool to send 500 text messages to the target&#8217;s phone number every minute.</p>



<p>As a result, the target&#8217;s phone begins receiving an overwhelming number of text messages, causing their device to slow down or freeze. The continuous stream of messages may drain the phone&#8217;s battery quickly and make it difficult for the target to use their device for normal communication.</p>



<p>In this scenario, the attacker&#8217;s goal is to disrupt the target&#8217;s communication and cause frustration or inconvenience. SMS bombing attacks like this can have serious consequences for the target and are considered illegal and unethical.</p>



<h2 class="wp-block-heading"><strong>How to prevent SMS bombing</strong></h2>



<p>To prevent SMS bombing, consider the following measures:</p>



<ol class="wp-block-list"><li><strong>Use a Spam Filter</strong>: Enable spam filters on your messaging app or mobile device to automatically detect and block suspicious messages.</li><li><strong>Enable Do Not Disturb Mode</strong>: Activate &#8220;Do Not Disturb&#8221; mode on your phone to silence notifications from unknown or unwanted numbers.</li><li><strong>Block Suspicious Numbers</strong>: Block phone numbers that are sending spam or unwanted messages to prevent further communication.</li><li><strong>Report Spam</strong>: Report spam messages to your mobile service provider or the appropriate authorities to help identify and stop the source of the spam.</li><li><strong>Use Security Software</strong>: Install reputable security software on your device that includes features to detect and block spam messages.</li><li><strong>Avoid Sharing Personal Information</strong>: Be cautious about sharing your phone number online or with unknown individuals or websites to minimize the risk of receiving unsolicited messages.</li><li><strong>Update Software</strong>: Keep your messaging app and mobile operating system up to date with the latest security patches and updates to protect against known vulnerabilities.</li><li><strong>Educate Yourself</strong>: Stay informed about the latest SMS bombing techniques and scams, and educate yourself on how to recognize and avoid suspicious messages.</li><li><strong>Use Two-Factor Authentication (2FA)</strong>: Enable two-factor authentication on your accounts whenever possible to add an extra layer of security and prevent unauthorized access, even if your phone number is compromised.</li><li><strong>Contact Your Service Provider</strong>: If you are being targeted by SMS bombing or receiving a high volume of spam messages, contact your mobile service provider for assistance and advice on how to address the issue.</li></ol>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sms-bombing/">SMS Bombing: The Risks and Dangers of Text Message Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/sms-bombing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SYSDF Ransomware: Analysis, .SYSDF File Recovery, and Removal Guide</title>
		<link>https://firsthackersnews.com/sysdf-ransomware/</link>
					<comments>https://firsthackersnews.com/sysdf-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 19 Feb 2024 02:21:50 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[decryption]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[malware analysis]]></category>
		<category><![CDATA[malware removal]]></category>
		<category><![CDATA[ransom payments]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[SYSDF]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7408</guid>

					<description><![CDATA[<p>SYSDF is a ransomware program belonging to the Dharma malware family. Typically targeting small businesses, it encrypts files</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sysdf-ransomware/">SYSDF Ransomware: Analysis, .SYSDF File Recovery, and Removal Guide</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SYSDF is a ransomware program belonging to the Dharma malware family. Typically targeting small businesses, it encrypts files and demands ransom payments for decryption. The ransomware was first identified by Jakub Kroustek on February 16, 2024.</p>



<h2 class="wp-block-heading"><strong>WHAT IS SYSDF RANSOMWARE?</strong></h2>



<p>SYSDF ransomware is another variant of the Dharma ransomware family, which has been active since 2016. Initially identified on February 16, it adds a unique &#8220;.SYSDF&#8221; extension to encrypted files, along with a complex mask containing attack details such as victim ID and contact email for the hackers. After encryption, affected files exhibit the following pattern:</p>



<pre class="wp-block-preformatted">Image1.png → Image1.png.id-C3B22A85.[Dec24hepl@aol.com].SYSDF

</pre>



<p>Upon finishing the encryption, malware creates its specific read.txt files in each folder that includes encrypted files, and also on the desktop. Additionally, malware spawns and opens&nbsp;<strong>a file named info.hta</strong>, so it acts as notification for a victim. Below, you can see the messages from both ransom notes.</p>



<p>Text in the read.txt ransom note:</p>



<pre class="wp-block-preformatted">all your data has been locked us


You want to return?


write email Dec24hepl@aol.com
</pre>



<h2 class="wp-block-heading"><strong>HOW TO RECOVER .SYSDF FILES?</strong></h2>



<p>Regrettably, there are currently no viable options for decrypting files affected by Dharma ransomware. Many online file recovery services offered by purported &#8220;certified hackers&#8221; merely facilitate negotiations with cybercriminals. Paying these criminals is ill-advised, as it incentivizes further attacks. While losing files is undoubtedly unpleasant, statistics indicate that there are numerous avenues available for file recovery.</p>



<p>Explore options such as searching for backups or file duplicates stored outside the affected system or network. Even retrieving a previous version of the file is preferable to losing it entirely. Additionally, ransomware decryptors offer hope by exploiting vulnerabilities in encryption mechanisms, providing a means to recover files without payment. In January and February 2024 alone, four decryptors for various ransomware families were released. Exercise patience, as this option is becoming increasingly popular in combating ransomware attacks.</p>



<h2 class="wp-block-heading"><strong>HOW TO REMOVE RANSOMWARE?</strong></h2>



<p>Before attempting any file recovery operations, it&#8217;s crucial to remove the malware first. SYSDF doesn&#8217;t vanish after completing encryption; it remains active, continuously seeking out new files to encrypt. Rest assured, it will swiftly encrypt any fresh, unencrypted files as soon as they are added to the disk.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sysdf-ransomware/">SYSDF Ransomware: Analysis, .SYSDF File Recovery, and Removal Guide</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/sysdf-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Can Patches Prevent Zero-Day Attacks?</title>
		<link>https://firsthackersnews.com/zero-day-attack/</link>
					<comments>https://firsthackersnews.com/zero-day-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 16 Jan 2024 18:07:44 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security recommendation]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[Zero-day]]></category>
		<category><![CDATA[zero-day attack]]></category>
		<category><![CDATA[zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7319</guid>

					<description><![CDATA[<p>In recent years, zero-day exploits and attacks have emerged as prominent threats. Leveraging unknown vulnerabilities within software, these</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zero-day-attack/">Can Patches Prevent Zero-Day Attacks?</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In recent years, zero-day exploits and attacks have emerged as prominent threats. Leveraging unknown vulnerabilities within software, these attacks are nearly impossible to detect and prevent. Zero-day attacks can result in severe consequences, enabling attackers to gain control of systems, pilfer data, or install malware.</p>



<h2 class="wp-block-heading"><strong>WHAT IS A ZERO-DAY ATTACK?</strong></h2>



<p>A zero-day attack is a type of cyber threat that takes advantage of a software vulnerability unknown to the developer or vendor. Attackers exploit this undisclosed weakness before a fix or patch is available, making it challenging for security measures to detect or prevent such attacks. Zero-day attacks can target various applications, posing a significant challenge for cybersecurity professionals.</p>



<p>Cyber attackers exploit undisclosed vulnerabilities in programs or operating systems to execute their code more effectively. The frequently utilized exploits include those enabling remote code execution and privilege escalation, granting attackers extensive control within the compromised environment. These sophisticated attacks are typically directed at corporations, given their possession of more valuable data.</p>



<p>Exploiting a breach without raising alarms or attracting attention is made simple when the only individual aware of it is the criminal who discovered it. Even advanced EDR solutions may err by overlooking actions from trusted programs without recognizing their potential malicious intent. Hence, opting for an endpoint protection application capable of preventing zero-day attacks is a prudent choice.</p>



<h2 class="wp-block-heading"><strong>IDENTIFYING AND ADDRESSING ZERO-DAY EXPLOITS AND ATTACKS</strong></h2>



<p><br>Identifying and addressing zero-day exploits and attacks involves several key steps:</p>



<ol class="wp-block-list"><li><strong>Continuous Monitoring:</strong> Implement robust monitoring systems to detect unusual patterns or behaviors within your network and systems. Real-time monitoring can help identify potential zero-day exploits early on.</li><li><strong>Anomaly Detection:</strong> Utilize anomaly detection tools and machine learning algorithms to identify deviations from normal system behavior. Unusual network traffic, unexpected file modifications, or abnormal user activities can be indicators of zero-day exploits.</li><li><strong>Threat Intelligence Feeds:</strong> Subscribe to threat intelligence feeds to stay informed about emerging threats and vulnerabilities. These feeds provide up-to-date information on potential zero-day exploits, enabling proactive measures.</li><li><strong>Behavioral Analysis:</strong> Employ behavioral analysis tools that can identify malicious activities based on behavior rather than known signatures. This approach is effective against previously unseen threats.</li><li><strong>Patch Management:</strong> Regularly update and patch software and systems to address known vulnerabilities. While this doesn&#8217;t directly identify zero-day exploits, it reduces the attack surface and makes it harder for attackers to find and exploit vulnerabilities.</li><li><strong>User Training and Awareness:</strong> Educate users about phishing attacks and social engineering tactics, as these are common entry points for zero-day exploits. Users should be cautious about clicking on suspicious links or downloading attachments from unknown sources.</li><li><strong>Network Segmentation:</strong> Implement network segmentation to limit the impact of potential exploits. Isolating critical systems and data can prevent lateral movement within the network.</li><li><strong>Incident Response Plan:</strong> Develop and regularly update an incident response plan that includes procedures for addressing zero-day exploits. This ensures a coordinated and efficient response when an attack is detected.</li><li><strong>Endpoint Protection:</strong> Utilize advanced endpoint protection solutions that employ heuristics, behavioral analysis, and other advanced techniques to identify and block zero-day exploits.</li><li><strong>Collaboration:</strong> Engage with cybersecurity communities, share threat intelligence, and collaborate with industry peers to stay informed about evolving threats and effective mitigation strategies.</li></ol>



<p>Organizations have faced persistent challenges in patch management, partly due to the sheer volume of patches requiring attention. In 2021 alone, more than 20,000 vulnerabilities were addressed, adding to the complexity of staying abreast of all the necessary updates.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="961" height="435" src="https://firsthackersnews.com/wp-content/uploads/2024/01/image-2.png" alt="" class="wp-image-7320" srcset="https://firsthackersnews.com/wp-content/uploads/2024/01/image-2-200x91.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-2-300x136.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-2-400x181.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-2-600x272.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-2-768x348.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-2-800x362.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-2.png 961w" sizes="(max-width: 961px) 100vw, 961px" /></figure>



<p>Ignoring timely updates, many users believe they can postpone software updates for days or weeks without consequences. This practice poses significant risks, often underestimated by users. Additionally, patch management receives minimal emphasis in security awareness training, despite the Department of Homeland Security advising the application of critical patches within 15 days of release.</p>



<p>Identifying critical patches can pose a dilemma for security teams. They adhere to internal testing procedures to verify the reliability of patches before deployment, considering potential bugs or ineffectiveness that could cause harm. Additionally, IT teams have established processes to monitor and track patch deployments, ensuring comprehensive coverage to prevent any device or system from being left unpatched.</p>



<h2 class="wp-block-heading"><strong>HOW TO PROTECT AGAINST ZERO-DAYS?</strong></h2>



<p>Protecting against zero-days involves implementing a multi-faceted approach:</p>



<ol class="wp-block-list"><li><strong>Up-to-Date Security Measures:</strong><ul><li>Ensure all security software, including antivirus and intrusion detection systems, is updated regularly.</li></ul></li><li><strong>Network Segmentation:</strong><ul><li>Implement network segmentation to limit the impact of potential zero-day exploits, isolating critical systems.</li></ul></li><li><strong>User Training:</strong><ul><li>Educate users on recognizing phishing attempts and suspicious activities to minimize the risk of falling victim to zero-day attacks.</li></ul></li><li><strong>Behavioral Analysis:</strong><ul><li>Use behavioral analysis tools to identify anomalous activities and behaviors that may indicate a zero-day attack.</li></ul></li><li><strong>Threat Intelligence Feeds:</strong><ul><li>Subscribe to threat intelligence feeds to stay informed about emerging threats and vulnerabilities, including potential zero-days.</li></ul></li><li><strong>Patch Management:</strong><ul><li>Regularly update and patch software to reduce the attack surface and address known vulnerabilities, minimizing the risk of exploitation.</li></ul></li><li><strong>Zero-Day Threat Detection Tools:</strong><ul><li>Utilize advanced threat detection tools designed to identify patterns associated with zero-day attacks.</li></ul></li><li><strong>Endpoint Protection:</strong><ul><li>Employ robust endpoint protection solutions with heuristic and behavioral analysis capabilities to detect and prevent zero-day exploits.</li></ul></li><li><strong>Incident Response Plan:</strong><ul><li>Develop a comprehensive incident response plan that includes procedures specific to handling zero-day attacks, ensuring a swift and effective response.</li></ul></li><li><strong>Collaboration:</strong><ul><li>Engage with cybersecurity communities, share threat intelligence, and collaborate with industry peers to enhance awareness and preparedness against zero-day threats.</li></ul></li><li><strong>Continuous Monitoring:</strong><ul><li>Implement continuous monitoring of network traffic, user activities, and system behaviors to detect unusual patterns indicative of potential zero-day exploits.</li></ul></li><li><strong>Security Updates and Best Practices:</strong><ul><li>Stay informed about security updates, industry best practices, and recommended security configurations to strengthen overall defense against zero-day vulnerabilities.</li></ul></li></ol>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zero-day-attack/">Can Patches Prevent Zero-Day Attacks?</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zero-day-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GitLab Zero-Click Account Hijack Vulnerability Revealed</title>
		<link>https://firsthackersnews.com/gitlab-zero-click-vulnerability/</link>
					<comments>https://firsthackersnews.com/gitlab-zero-click-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 16 Jan 2024 17:46:07 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[gitlab]]></category>
		<category><![CDATA[hijack account]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[zero-click]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7313</guid>

					<description><![CDATA[<p>On January 11, 2024, GitLab issued an update containing a crucial security fix for a vulnerability. This flaw</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gitlab-zero-click-vulnerability/">GitLab Zero-Click Account Hijack Vulnerability Revealed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>On January 11, 2024, GitLab issued an update containing a crucial security fix for a vulnerability. This flaw enables a user to send the account password reset form to an unverified email address, potentially granting unauthorized access to the repository. Nearly all versions in the 16.x series of their software package are vulnerable to this exploit.</p>



<h2 class="wp-block-heading"><strong>GITLAB ZERO-CLICK VULNERABILITY ALLOWS ACCOUNT HIJACKING</strong></h2>



<p>According to the company&#8217;s official description of CVE-2023-7028, a critical bug is present in a few versions. Exploiting this, a potential adversary can send a password reset email to any email address, enabling hackers to easily hijack accounts with varying access privileges. The simplicity of exploitation and the severity of potential consequences contribute to this vulnerability receiving a CVSS score of 10/10.</p>



<p>Accessing the repository grants attackers the ability to manipulate the stored code at will. </p>



<p>This includes activities such as selling corporate secrets, searching for potential software vulnerabilities, injecting malicious code to compromise employees&#8217; systems, or even launching a supply chain attack. Patching this vulnerability is not just urgent; it requires immediate action.</p>



<p>According to GitLab, activating 2FA on the account could have prevented hijacking, as two-factor authentication is not vulnerable to the bug and remains securely verified. However, there are individuals who neglect the security of Git repository access, expanding the potential impact of CVE-2023-7028.</p>



<h2 class="wp-block-heading"><strong>GITLAB 0-CLICK VULNERABILITY FIXES AVAILABLE</strong></h2>



<p>The company not only issued a security notification but also incorporated it into the patch notes for an update addressing the situation. According to the provided information, only version 16 is susceptible, particularly a series of its minor updates.</p>



<ul class="wp-block-list"><li>16.1 to 16.1.5</li><li>16.2 to 16.2.8</li><li>16.3 to 16.3.6</li><li>16.4 to 16.4.4</li><li>16.5 to 16.5.5</li><li>16.6 to 16.6.3</li><li>16.7 to 16.7.1</li></ul>



<p>The latest available versions are 16.5.6, 16.6.4, and 16.7.2, leaving users of versions 16.4 and below with no current options. However, GitLab has provided backports of the vulnerability fix to versions 16.1.6, 16.2.9, 16.3.7, 16.4.5, 16.5.6, and 16.6.4. This implies that updating to the most recent version may not be necessary, and since no mitigation options are available, updates remain the only viable choice.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gitlab-zero-click-vulnerability/">GitLab Zero-Click Account Hijack Vulnerability Revealed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gitlab-zero-click-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Researchers identify FBot hacking tool hijacking cloud and payment services.</title>
		<link>https://firsthackersnews.com/fbot-hacking-tool-hijacking-cloud/</link>
					<comments>https://firsthackersnews.com/fbot-hacking-tool-hijacking-cloud/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 12 Jan 2024 05:31:22 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Credential harvesting]]></category>
		<category><![CDATA[FBot]]></category>
		<category><![CDATA[hacking tool]]></category>
		<category><![CDATA[hijacking cloud]]></category>
		<category><![CDATA[IOCS]]></category>
		<category><![CDATA[malware hunters]]></category>
		<category><![CDATA[payment services]]></category>
		<category><![CDATA[python based hacking tool]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7300</guid>

					<description><![CDATA[<p>SentinelOne&#8217;s malware hunters flagged a recently uncovered Python-based hacking tool employed by cybercriminals to hijack cloud platforms and</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fbot-hacking-tool-hijacking-cloud/">Researchers identify FBot hacking tool hijacking cloud and payment services.</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SentinelOne&#8217;s malware hunters flagged a recently uncovered Python-based <a href="https://firsthackersnews.com/blackcats-sphynx/">hacking tool </a>employed by cybercriminals to hijack cloud platforms and payment services.</p>



<h2 class="wp-block-heading"><strong>FBot hacking tool hijacking cloud and payment services</strong></h2>



<p>The tool, named FBot, possesses the capability for<a href="https://firsthackersnews.com/microsoft-issues-warning-coldriver/"> credential harvesting</a> in spamming attacks, AWS account hijacking, and facilitates assaults against PayPal and various SaaS accounts.</p>



<p>As per documentation from the company&#8217;s SentinelLabs research unit, FBot is distinguished by a smaller footprint compared to similar tools, suggesting potential private development and a more targeted distribution approach.</p>



<p>SentinelLabs researcher Alex Delamotte analyzed the internals of the attack tool and identified functionalities geared towards targeting web servers, cloud services, and Software-as-a-Service (SaaS) technologies, including Aws, Office365, PayPal, Sendgrid, and Twilio.</p>



<p>While its primary purpose is to enable actors to hijack cloud, SaaS, and web services, Delamotte uncovered a secondary focus on acquiring accounts for the purpose of conducting spamming attacks.</p>



<p>&#8220;The tool incorporates various utilities, including an IP address generator and port scanner. Additionally, it features an email validator function that utilizes an Indonesian technology service provider for validating email addresses,&#8221; mentioned the SentinelLabs researcher.</p>



<p>The anti-malware company identified various features aimed at targeting payment services, such as a PayPal Validator feature, a SendGrid API key generator, and functionalities for harvesting key secrets.</p>



<p>Delamotte suggests that organizations implement multi-factor authentication (MFA) for AWS services with programmatic access and establish systems to notify security operations teams when a new AWS user account is added to the organization.</p>



<p>The researcher recommends configuring alerts for the addition of new identities or significant configuration changes to SaaS bulk mailing applications.</p>



<h2 class="wp-block-heading">Indicators of Compromise</h2>



<figure class="wp-block-table"><table><tbody><tr><td><strong>SHA1</strong></td><td><strong>Notes</strong></td></tr><tr><td>1ad78e99918fd66ed43d42a93d2f910a2173b3c5</td><td>Bot.py, January 2024 version of FBot</td></tr><tr><td>2becd32162b2b0cb1afc541e33ace3a29dad96f1</td><td>April 2023 version of FBot</td></tr><tr><td>8ba3fca4deada6dbdc94b17a0c3c55a0b785331e</td><td>Bot.py, July 2022 version of FBot</td></tr><tr><td>iDevXploit</td><td>Hardcoded AWS IAM Username</td></tr><tr><td>MCDonald2021D#1337</td><td>Hardcoded AWS IAM User password</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fbot-hacking-tool-hijacking-cloud/">Researchers identify FBot hacking tool hijacking cloud and payment services.</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fbot-hacking-tool-hijacking-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SMTP Smuggling Emerges as a Fresh Email Security Concern</title>
		<link>https://firsthackersnews.com/smtp-smuggling/</link>
					<comments>https://firsthackersnews.com/smtp-smuggling/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 08 Jan 2024 18:03:02 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[email server]]></category>
		<category><![CDATA[email transmission process]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[SMTP]]></category>
		<category><![CDATA[SMTP protocol]]></category>
		<category><![CDATA[targeted attack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7274</guid>

					<description><![CDATA[<p>An innovative SMTP Smuggling technique has been reported with the capability to circumvent current security protocols. Additionally, it</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/smtp-smuggling/">SMTP Smuggling Emerges as a Fresh Email Security Concern</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>An innovative SMTP Smuggling technique has been reported with the capability to circumvent current security protocols. Additionally, it empowers attackers to send forged emails that appear to originate from authentic addresses. This could inject renewed vitality into email spam, as its effectiveness has not waned over the recent period.</p>



<h2 class="wp-block-heading"><strong>WHAT IS SMTP SMUGGLING?</strong></h2>



<p>SMTP (Simple Mail Transfer Protocol) Smuggling is a technique used by attackers to manipulate the behavior of mail servers during the email transmission process. It involves exploiting inconsistencies or variations in the way different servers interpret and implement the SMTP protocol.</p>



<p>In a typical SMTP transaction, there are two phases: the client&#8217;s request to the server (DATA phase) and the server&#8217;s response. SMTP Smuggling takes advantage of discrepancies in how proxy servers and mail servers interpret the length of the message content during these phases.</p>



<p>By carefully crafting the headers and body of an email, attackers can deceive the servers into misinterpreting the message length, leading to discrepancies between the front-end proxy server and the back-end mail server. This can result in various security issues, such as bypassing security filters, evading detection, and enabling malicious activities like spoofing or injecting arbitrary content into emails.</p>



<p>SMTP Smuggling attacks are a type of protocol-level manipulation, exploiting the intricacies of communication between different components in the email delivery process. Defending against SMTP Smuggling often involves implementing secure and consistent configurations across all involved mail servers and proxies to prevent the exploitation of these protocol variations.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="823" height="437" src="https://firsthackersnews.com/wp-content/uploads/2024/01/image.png" alt="" class="wp-image-7275" srcset="https://firsthackersnews.com/wp-content/uploads/2024/01/image-200x106.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-300x159.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-400x212.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-600x319.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-768x408.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-800x425.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/01/image.png 823w" sizes="(max-width: 823px) 100vw, 823px" /></figure>



<p>SMTP smuggling centers around inconsistencies in how distinct servers process the end-of-data sequence (&lt;CR&gt;&lt;LF&gt;.&lt;CR&gt;&lt;LF&gt;). Through exploiting these variations, attackers can escape the standard message data, introducing unauthorized commands. </p>



<p>This method relies on the inbound server&#8217;s ability to accept multiple SMTP commands in a batch, a functionality widely supported by most servers today.</p>



<p>Thorough investigation into this vulnerability has uncovered that SMTP servers belonging to major email providers such as Microsoft, GMX, and Cisco are susceptible to this exploit. Although Microsoft and GMX have taken steps to address these issues, Cisco has categorized the findings as a feature rather than a vulnerability and has opted not to modify the default configuration.</p>



<h2 class="wp-block-heading"><strong>WHAT IS THE DANGER OF SMTP VULNERABILITY?</strong></h2>



<p>SMTP smuggling poses alarming implications as attackers can send deceptive emails from seemingly credible sources, evading authentication checks like DKIM, DMARC, and SPF.</p>



<p>In essence, employing this technique could allow fraudsters to infiltrate corporate emails previously immune to spam. While companies implementing this security method are likely cognizant of the risks and employ additional protective measures, the exposure itself increases the overall vulnerability to potential cyberattacks.</p>



<h2 class="wp-block-heading"><strong>MITIGATING THE EFFECTS OF VULNERABILITY</strong></h2>



<p>To mitigate the effects of SMTP vulnerability:</p>



<ol class="wp-block-list"><li><strong>Implement Security Updates:</strong> Regularly update and patch SMTP servers to address known vulnerabilities and ensure they are equipped with the latest security measures.</li><li><strong>Enable Encryption:</strong> Utilize encryption mechanisms, such as STARTTLS, to secure the communication channels between SMTP servers and prevent eavesdropping or unauthorized access.</li><li><strong>Protocol Compliance:</strong> Ensure that SMTP servers adhere to standardized protocols and follow best practices to minimize the risk of exploitation through protocol-level vulnerabilities.</li><li><strong>Network Monitoring:</strong> Implement robust network monitoring tools to detect unusual SMTP traffic patterns, which may indicate potential exploitation or malicious activities.</li><li><strong>Authentication Mechanisms:</strong> Strengthen authentication mechanisms, including enforcing strong passwords and implementing multi-factor authentication, to prevent unauthorized access to SMTP servers.</li><li><strong>Implement Access Controls:</strong> Configure access controls to restrict access to SMTP servers only to authorized personnel, reducing the risk of unauthorized manipulation or exploitation.</li><li><strong>Regular Security Audits:</strong> Conduct regular security audits and vulnerability assessments to identify and address potential weaknesses in the SMTP infrastructure.</li><li><strong>User Awareness Training:</strong> Educate users about phishing attacks and social engineering tactics that may exploit SMTP vulnerabilities, emphasizing vigilance in email interactions.</li><li><strong>Intrusion Detection and Prevention:</strong> Deploy intrusion detection and prevention systems to monitor and block suspicious activities or unauthorized access attempts targeting SMTP servers.</li><li><strong>Collaborate with Vendors:</strong> Stay informed about vendor advisories, security updates, and patches related to SMTP vulnerabilities, and promptly apply recommended mitigations.</li><li><strong>Incident Response Plan:</strong> Develop and maintain an incident response plan specific to SMTP vulnerabilities, outlining procedures for detecting, responding to, and recovering from potential security incidents.</li><li><strong>Backup and Recovery:</strong> Regularly back up critical email data and ensure the availability of efficient recovery mechanisms to minimize data loss in the event of a security breach.</li></ol>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/smtp-smuggling/">SMTP Smuggling Emerges as a Fresh Email Security Concern</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/smtp-smuggling/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability</title>
		<link>https://firsthackersnews.com/ivanti-vulnerability/</link>
					<comments>https://firsthackersnews.com/ivanti-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 08 Jan 2024 17:38:55 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[critical vulnerability]]></category>
		<category><![CDATA[endpoint solution]]></category>
		<category><![CDATA[EPM]]></category>
		<category><![CDATA[Ivanti]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security recommendation]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7272</guid>

					<description><![CDATA[<p>Ivanti has resolved a critical vulnerability in its Endpoint Manager (EPM) solution, designated as CVE-2023-39336, carrying a severity</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ivanti-vulnerability/">Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Ivanti has resolved a critical vulnerability in its Endpoint Manager (EPM) solution, designated as CVE-2023-39336, carrying a severity score of 9.6/10. </p>



<p>This vulnerability, impacting EPM versions 2021 and 2022 before SU5, has the potential to facilitate Remote Code Execution (RCE) on servers affected by it.</p>



<p>The vulnerability encompasses an SQL injection that operates without requiring authentication, granting attackers the capability to execute arbitrary SQL queries and potentially gain control over machines running the EPM agent. The severity of the issue is heightened, particularly when the core server utilizes SQL Express.</p>



<h2 class="wp-block-heading"><strong>Details of the CVE-2023-39336 Vulnerability Affecting Ivanti EPM</strong></h2>



<p>Ivanti has issued an advisory available and restricted access for its customers <a href="https://chat.openai.com/c/link" target="_blank" rel="noopener">here</a> for comprehensive details and further information. While specific vulnerability details are currently withheld, likely to allow customers time for mitigation, they are slated to be disclosed in the upcoming days, and this blog will be promptly updated with the latest information.</p>



<p>In its security update for Avalanche, Ivanti addressed 22 vulnerabilities last month in its Mobile Device Management (MDM) product, with 13 of them categorized as critically severe. </p>



<p>These vulnerabilities were found in older versions of Avalanche (going back to 6.3.1 and potentially impacting all 6.X versions) and encompassed stack-based, unauthenticated, and heap-based buffer overflows. These vulnerabilities have the potential to allow Remote Code Execution without requiring user interaction. Over the course of the year, we have posted blog entries covering other noteworthy vulnerabilities affecting Ivanti products.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ivanti-vulnerability/">Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ivanti-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
