<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Targeted Attacks &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/targeted-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Wed, 07 Jan 2026 07:58:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Targeted Attacks &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Infostealers Lead to Cloud Account Compromises</title>
		<link>https://firsthackersnews.com/zestix/</link>
					<comments>https://firsthackersnews.com/zestix/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 06 Jan 2026 07:53:31 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[access security]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[identity security]]></category>
		<category><![CDATA[infostealer malware]]></category>
		<category><![CDATA[leaked credentials]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10924</guid>

					<description><![CDATA[<p>Several large organizations worldwide have been breached after attackers reused stolen login details collected by infostealer malware. How</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zestix/">Infostealers Lead to Cloud Account Compromises</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Several large organizations worldwide have been breached after attackers reused stolen login details collected by <a href="https://firsthackersnews.com/wired/">infostealer malware</a>.</p>



<h2 class="wp-block-heading">How the Attacks Unfolded -Zestix <strong>Infostealer</strong></h2>



<p>Researchers link the activity to a threat actor known as Zestix, also operating under the alias Sentap. The actor accessed cloud storage platforms such as ShareFile, Nextcloud, and OwnCloud, affecting around 50 organizations.</p>



<p>The impacted companies span sectors including aviation, healthcare, finance, defense, and government services. In several cases, attackers were able to access and extract large volumes of sensitive data.</p>



<p>The attacks typically start when employees unknowingly download malicious files that install infostealer malware such as RedLine, Lumma, or Vidar. These programs silently collect saved credentials and browser data from infected systems.</p>



<p>The stolen information is later aggregated into underground databases. The attacker then searches these datasets for corporate cloud credentials and uses them to gain unauthorized access to enterprise environments.</p>



<p>Researchers found that the main weakness was not an advanced exploit, but the lack of multi-factor authentication. Without MFA in place, attackers were able to access systems using only stolen usernames and passwords, some of which had been exposed in infostealer logs for years.</p>



<p>The impact of the breaches is significant. An engineering firm supporting U.S. utilities lost sensitive infrastructure data, while a robotics company exposed defense-related design files.</p>



<p>An airline also saw internal maintenance and safety documents leaked. In another case, health records and personal data tied to Brazilian military personnel were exposed, totaling several terabytes of sensitive information.</p>



<h2 class="wp-block-heading"><strong>How Credentials Are Stolen and Abused</strong></h2>



<p>The attacks follow a simple but effective flow that makes them hard to stop if basic controls are missing.</p>



<ul class="wp-block-list">
<li>An employee downloads what looks like a normal file or software update from email or the web.</li>



<li>An infostealer runs quietly in the background, often blending into legitimate system activity.</li>



<li>The malware collects saved passwords and session data from browsers, password managers, and apps like email or collaboration tools.</li>



<li>The stolen data is encrypted and sent to attacker-controlled servers.</li>



<li>Attackers search through large credential dumps to find logins tied to corporate systems such as cloud storage and business platforms.</li>
</ul>



<p>This method is dangerous because it is cheap, scalable, and easy to repeat. Access to corporate accounts is then sold on underground forums, allowing multiple attackers to reuse the same stolen credentials.</p>



<p>Many organizations were compromised not due to a lack of training, but because multi-factor authentication was not enforced across critical systems.</p>



<p>The fix is simple but urgent: enable MFA everywhere it matters and actively monitor for exposed credentials before they are used by attackers.</p>



<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zestix/">Infostealers Lead to Cloud Account Compromises</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zestix/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloudflare Reveals Key Technical Causes of Massive Global Outage</title>
		<link>https://firsthackersnews.com/cloudflare-2/</link>
					<comments>https://firsthackersnews.com/cloudflare-2/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 19 Nov 2025 05:28:44 +0000</pubDate>
				<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10658</guid>

					<description><![CDATA[<p>Cloudflare released a detailed report explaining the cause of a major network outage that disrupted global internet traffic</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cloudflare-2/">Cloudflare Reveals Key Technical Causes of Massive Global Outage</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cloudflare released a detailed report explaining the cause of a major network outage that disrupted global internet traffic for several hours. Millions of users and services were affected.</p>



<p>The outage began at 11:20 UTC and was caused by an internal configuration mistake—not a cyberattack—showing that even strong cloud systems can fail.</p>



<p>This event follows similar outages at Azure and AWS, raising concerns about how dependent the world has become on large cloud providers.</p>



<p>Cloudflare’s issue started with a routine permissions update in its ClickHouse database cluster. At 11:05 UTC, the change exposed table metadata in the ‘r0’ database. A Bot Management query didn’t handle this correctly, pulling duplicate columns and creating a feature file twice the normal size.</p>



<p>This file, updated every five minutes to support machine-learning bot detection, exceeded the software’s 200-feature limit. That caused failures in Cloudflare’s core proxy system, FL.</p>



<p>At first, engineers suspected a massive DDoS attack, especially since Cloudflare’s status page was also down. The problem was harder to trace because good and bad files appeared in an alternating pattern during the rollout.</p>



<p>When the Bot Management module failed, request scoring stopped completely. In Cloudflare’s newer FL2 proxy, this resulted in 5xx HTTP errors. Older FL versions defaulted bot scores to zero, which could block real users on sites using strict bot rules.</p>



<p>The outage hit key Cloudflare services. Many websites showed error pages, latency increased, and debugging became difficult. Turnstile CAPTCHA stopped working, blocking logins. Workers KV also had higher error rates, affecting dashboard access and Cloudflare Access authentication.</p>



<p>Email Security briefly lost some spam detection, and configuration updates slowed, though no customer data was compromised. Cloudflare restored full service by 17:06 UTC after stopping the bad files, rolling back to a stable version, and restarting proxies.</p>



<p>Cloudflare’s CEO, Matthew Prince, apologized and called this the company’s worst traffic outage since 2019.</p>



<p>This incident also reflects a broader pattern of configuration-related failures across major cloud providers.</p>



<p>On October 29, 2025, Azure went down globally due to a faulty change in its Front Door CDN, disrupting Microsoft 365, Teams, Xbox, and even airline systems.<br>AWS suffered a 15-hour outage on October 20 in US-East-1 caused by DNS issues in DynamoDB, which affected EC2, S3, Snapchat, and Roblox.<br>Another AWS issue on November 5 slowed Amazon.com checkouts during holiday preparation.</p>



<p>Experts warn these outages show how dangerous it is to rely heavily on centralized cloud services—one mistake can impact the entire internet.</p>



<p>To avoid future problems, Cloudflare is improving its file ingestion process, adding global kill switches, reducing excessive error logging, and reviewing proxy failure behavior.</p>



<p>Although this incident wasn’t caused by an attack, it highlights the need for stronger operational controls as cloud systems continue to grow.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cloudflare-2/">Cloudflare Reveals Key Technical Causes of Massive Global Outage</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cloudflare-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>“Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector</title>
		<link>https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/</link>
					<comments>https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Oct 2025 11:52:44 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#GiftCardFraud]]></category>
		<category><![CDATA[#Microsoft365Security]]></category>
		<category><![CDATA[#PaloAltoNetworks]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#RetailSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10550</guid>

					<description><![CDATA[<p>Cybersecurity researchers have uncovered a sophisticated cybercriminal operation dubbed “Jingle Thief,” which has been targeting cloud environments linked</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/">“Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity researchers have uncovered a sophisticated cybercriminal operation dubbed <strong>“Jingle Thief,”</strong> which has been targeting cloud environments linked to retail and consumer service organizations to carry out large-scale <strong>gift card fraud.</strong></p>



<p>According to a new analysis by <strong>Palo Alto Networks Unit 42</strong> researchers <strong>Stav Setty</strong> and <strong>Shachar Roitman</strong>, the attackers use <strong>phishing and smishing campaigns</strong> to steal employee credentials from companies that issue or manage gift cards. Once inside, they escalate privileges and issue unauthorized cards for financial gain — often reselling them on <strong>gray markets</strong>.</p>



<p>Gift cards remain a preferred target for cybercriminals due to their <strong>ease of redemption</strong>, <strong>anonymity</strong>, and <strong>traceability challenges</strong>, making such fraud difficult to investigate.</p>



<h2 class="wp-block-heading"><strong>A Seasonal Threat with Long-Term Persistence</strong></h2>



<p>The group’s name, <em>Jingle Thief</em>, stems from its pattern of ramping up fraud campaigns around <strong>holiday and festive seasons</strong>, when gift card transactions surge. Palo Alto Networks tracks the operation internally under the identifier <strong>CL-CRI-1032</strong>, with “CL” representing cluster and “CRI” indicating criminal motivation.</p>



<p>Researchers have <strong>linked Jingle Thief with moderate confidence</strong> to financially motivated actors <strong>Atlas Lion</strong> and <strong>Storm-0539</strong>, groups previously associated with operations traced back to <strong>Morocco</strong>. The threat cluster is believed to have been active since <strong>late 2021</strong>.</p>



<p>One of the most concerning traits of Jingle Thief is its <strong>long-term persistence</strong> within compromised environments — in some cases, maintaining access for <strong>over a year</strong>. During this period, attackers conduct <strong>extensive reconnaissance</strong>, map cloud infrastructures, move laterally, and implement methods to avoid detection.</p>



<h2 class="wp-block-heading"><strong>Recent Global Campaigns</strong></h2>



<p>Unit 42 reported a surge in coordinated Jingle Thief campaigns between <strong>April and May 2025</strong>, targeting multiple global enterprises. In one notable incident, the attackers compromised <strong>60 user accounts</strong> within a single organization and maintained access for <strong>approximately 10 months</strong>.</p>



<p>By exploiting stolen credentials, Jingle Thief operators <strong>impersonate legitimate users</strong> to infiltrate <strong>Microsoft 365</strong> environments, steal sensitive data, and execute <strong>high-value gift card fraud</strong> at scale. They also modify <strong>log settings</strong> and <strong>forensic trails</strong> to conceal unauthorized issuance activities.</p>



<h2 class="wp-block-heading"><strong>Phishing Tactics and Cloud Abuse</strong></h2>



<p>The group employs highly tailored phishing pages mimicking <strong>Microsoft 365 login portals</strong>, distributed via <strong>email or SMS</strong>, to harvest credentials. Once credentials are obtained, the attackers perform a <strong>second round of reconnaissance</strong> inside the organization, focusing on <strong>SharePoint</strong>, <strong>OneDrive</strong>, and internal documentation.</p>



<p>Targets include:</p>



<ul class="wp-block-list">
<li>Gift card issuance workflows</li>



<li>VPN configuration guides</li>



<li>Access credentials for Citrix or cloud systems</li>



<li>Financial process documentation</li>
</ul>



<p>Jingle Thief further <strong>leverages compromised accounts</strong> to send <strong>internal phishing emails</strong>, often disguised as <strong>IT service notifications</strong> or <strong>ticketing updates</strong>, exploiting the trust of corporate communication systems.</p>



<p>To maintain persistence, the group creates <strong>malicious inbox rules</strong> to forward emails, deletes sent messages, and even registers <strong>rogue authenticator apps</strong> to bypass <strong>multi-factor authentication (MFA)</strong>. In some cases, attackers <strong>enroll their own devices in Entra ID</strong>, ensuring continued access even after password resets.</p>



<p>Unlike many threat actors that deploy custom malware, Jingle Thief relies heavily on <strong>identity misuse</strong> and <strong>cloud-native exploitation techniques</strong>. This stealthy approach allows them to <strong>blend in with legitimate activity</strong> and <strong>evade detection tools</strong> focused on endpoint-based threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/">“Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud</title>
		<link>https://firsthackersnews.com/microsoft-says-silk-typhoon/</link>
					<comments>https://firsthackersnews.com/microsoft-says-silk-typhoon/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 06 Mar 2025 18:03:07 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[credential abuse]]></category>
		<category><![CDATA[mcirosoft]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Supply Chain Attacks]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9752</guid>

					<description><![CDATA[<p>Microsoft says Silk Typhoon is now targeting remote management tools and cloud apps for access, showing a wide</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-says-silk-typhoon/">Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft says Silk Typhoon is now targeting remote management tools and cloud apps for access, showing a wide and fast exploitation strategy.</p>



<p>Since late 2024, Silk Typhoon has been using stolen API keys and credentials from privilege access management (PAM), cloud app providers, and cloud data companies.</p>



<p>This lets them access customer environments of the compromised companies.</p>



<p>They’ve also gained access through password spray attacks and by finding leaked corporate passwords in public repositories.</p>



<h2 class="wp-block-heading"><strong>Supply Chain Attacks and Credential Abuse</strong></h2>



<p>Silk Typhoon targets many industries worldwide, including IT services, healthcare, legal, education, defense, government, NGOs, and energy. Most of their attacks focus on the United States but also happen globally.</p>



<p>They are skilled at working with cloud environments, which helps them move between systems, stay hidden, and steal data quickly.</p>



<p>Since 2020, Silk Typhoon has used different web shells to run commands, stay in networks, and steal data.</p>



<p>Recently, Silk Typhoon used stolen API keys to access downstream customers, gather data, and run recon with admin accounts.</p>



<p>They also reset admin accounts, planted web shells, created new users, and cleared activity logs.</p>



<p>Microsoft notified affected customers to help secure their systems.</p>



<h2 class="wp-block-heading"><strong>Recommended Actions:</strong></h2>



<ul class="wp-block-list">
<li>Review Entra Connect server logs for any suspicious activity.</li>



<li>Check newly created applications to ensure they are legitimate.</li>



<li>Monitor multi-tenant applications, especially for any unexpected changes.</li>



<li>Investigate any Microsoft Graph or eDiscovery activity, especially involving SharePoint or email data access — these are common targets for Silk Typhoon.</li>
</ul>



<h2 class="wp-block-heading"><strong>Stronger Defenses:</strong></h2>



<ul class="wp-block-list">
<li>Make sure all public-facing devices are fully patched to prevent known exploits.</li>



<li>Apply strict controls and monitoring on all important accounts, especially privileged accounts.</li>



<li>Focus on credential hygiene, such as removing unused accounts, enforcing strong passwords, and applying least privilege access to limit damage if an account is compromised.</li>



<li>Set up Conditional Access policies to enforce Zero Trust principles — requiring users to verify their identity before accessing critical systems.</li>



<li>Enable risk-based sign-in protection, so suspicious logins (like from unusual locations or devices) trigger extra security checks.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-says-silk-typhoon/">Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-says-silk-typhoon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security</title>
		<link>https://firsthackersnews.com/amazon-guardduty/</link>
					<comments>https://firsthackersnews.com/amazon-guardduty/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Dec 2024 17:06:36 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Amazon GuardDuty]]></category>
		<category><![CDATA[AWS's cloud]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9162</guid>

					<description><![CDATA[<p>Amazon has improved cloud security with AI/ML threat detection in GuardDuty. This new feature enhances threat detection by</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/amazon-guardduty/">Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Amazon has improved cloud security with AI/ML threat detection in GuardDuty. This new feature enhances threat detection by using AWS&#8217;s cloud visibility and scale to better protect applications, workloads, and data.</p>



<p>Modern cloud environments and evolving security threats create major challenges for organizations. Security teams struggle to manage the high volume of events, making it harder to detect and respond to threats quickly.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="846" height="1024" src="https://firsthackersnews.com/wp-content/uploads/2024/12/image-846x1024.png" alt="" class="wp-image-9163" srcset="https://firsthackersnews.com/wp-content/uploads/2024/12/image-200x242.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-248x300.png 248w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-400x484.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-600x726.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-768x930.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-800x969.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-846x1024.png 846w, https://firsthackersnews.com/wp-content/uploads/2024/12/image.png 1068w" sizes="(max-width: 846px) 100vw, 846px" /><figcaption class="wp-element-caption">Amazon GuardDuty tool</figcaption></figure>



<p>The complexity is increased because many attacks unfold in multiple stages, making it critical for security solutions to identify these stages as part of a larger attack pattern. To address this, Amazon has upgraded GuardDuty with advanced AI and machine learning features. </p>



<p>These enhancements allow GuardDuty to detect not only known attack types but also new, previously unseen attack sequences. By recognizing related activities across time, security teams can quickly identify potential threats and prevent larger attacks before they can cause significant damage to systems and data.</p>



<p>GuardDuty’s enhanced threat detection uses advanced AI/ML models to identify complex attack sequences in AWS. These sequences may include actions like privilege discovery, API manipulation, and data exfiltration. </p>



<p>The update introduces a new high-severity finding level for more urgent threats and improves existing detections, making them easier to act on.</p>



<p>The system now offers composite detections that cover multiple data sources, timeframes, and resources in an account, giving a better view of complex cloud attacks and improving response efforts. GuardDuty’s enhanced capabilities work smoothly with existing security workflows. </p>



<p>Users can access these new AI/ML features through the Amazon GuardDuty console, where additional widgets appear on the Summary page.</p>



<p>The widgets show an overview of detected attack sequences and allow users to sort findings by severity for easier threat investigation. </p>



<p>Each finding includes a summary of the threat, linked to tactics from the MITRE ATT&amp;CK® framework, and provides remediation recommendations based on AWS best practices. The enhanced detection is enabled by default, with no extra cost beyond the standard GuardDuty fees.</p>



<p>The new features integrate with Amazon GuardDuty workflows, including AWS Security Hub and third-party systems. It recommends activating S3 Protection to detect data risks with S3 buckets.</p>



<p>With AI/ML-driven detection, GuardDuty improves cloud security by providing deeper, actionable insights and automating the detection of complex threats, helping organizations strengthen their security.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/amazon-guardduty/">Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/amazon-guardduty/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lazarus Group Targets Log4Shell Flaw Via Telegram Bots</title>
		<link>https://firsthackersnews.com/lazarus-group-targets-log4shell/</link>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 11 Dec 2023 17:57:23 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploits log4j]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[Log4Shell]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security threat]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[threat actors]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7184</guid>

					<description><![CDATA[<p>Lazarus Group, the threat actor, has been detected engaging in a fresh wave of attacks named &#8220;Operation Blacksmith,&#8221;</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lazarus-group-targets-log4shell/">Lazarus Group Targets Log4Shell Flaw Via Telegram Bots</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Lazarus Group, the threat actor, has been detected engaging in a fresh wave of attacks named &#8220;Operation Blacksmith,&#8221; focusing on exploiting the Log4Shell vulnerability (CVE-2021-44228).</p>



<h2 class="wp-block-heading"><strong>Lazarus Group Targets Log4Shell</strong></h2>



<p>As of today, a recent advisory released by security researchers at Cisco Talos reveals that the attacks exploited the Log4Shell vulnerability in VMWare Horizon servers exposed to the public, gaining initial access.</p>



<p>The advisory states, &#8220;This campaign involves persistent opportunistic targeting of global enterprises that openly host and expose susceptible infrastructure to n-day vulnerability exploitation, such as CVE-2021-44228.&#8221;</p>



<p>The advisory further notes, &#8220;Lazarus has been observed focusing on companies within the manufacturing, agricultural, and physical security sectors.&#8221;</p>



<p><br>After successfully exploiting the system, Lazarus carried out thorough reconnaissance by executing various commands to collect system information, query event logs, and perform OS credential dumping.</p>



<p>The attackers utilized a specially crafted implant called HazyLoad, serving as a proxy tool to establish direct access to the compromised system.</p>



<p>Remarkably, Lazarus departed from its previous tactics by generating a local user account with administrative privileges, deviating from the use of unauthorized domain-level accounts.</p>



<p>In a noteworthy development, the threat actors altered their tactics during the hands-on-keyboard phase by downloading and employing credential dumping utilities, which included ProcDump and MimiKatz.</p>



<p>During the second phase of the operation, the deployment of a previously unknown Remote Access Trojan (RAT) named &#8220;NineRAT&#8221; was uncovered. Of significance is the RAT&#8217;s use of a Telegram-based Command and Control (C2) channel to receive initial commands for fingerprinting infected systems.</p>



<p>Moreover, the research identified a shift in Lazarus&#8217; tactics, as NineRAT is coded in DLang, signaling a departure from conventional frameworks.</p>



<p>The company also highlighted, &#8220;NineRAT possesses the capability to uninstall itself from the system using a BAT file.&#8221;</p>



<p>According to Cisco Talos, the information gathered by Lazarus through NineRAT might be shared with distinct Advanced Persistent Threat (APT) groups, stored in a separate repository distinct from the initial access and implant deployment data.</p>



<h2 class="wp-block-heading">IOCs</h2>



<h3 class="wp-block-heading" id="hazyload">HazyLoad</h3>



<p>000752074544950ae9020a35ccd77de277f1cd5026b4b9559279dc3b86965eee</p>



<h3 class="wp-block-heading" id="ninerat">NineRAT</h3>



<p>534f5612954db99c86baa67ef51a3ad88bc21735bce7bb591afa8a4317c35433</p>



<p>ba8cd92cc059232203bcadee260ddbae273fc4c89b18424974955607476982c4</p>



<p>47e017b40d418374c0889e4d22aa48633b1d41b16b61b1f2897a39112a435d30</p>



<p>f91188d23b14526676706a5c9ead05c1a91ea0b9d6ac902623bc565e1c200a59</p>



<p>5b02fc3cfb5d74c09cab724b5b54c53a7c07e5766bffe5b1adf782c9e86a8541</p>



<p>82d4a0fef550af4f01a07041c16d851f262d859a3352475c62630e2c16a21def</p>



<h3 class="wp-block-heading" id="bottomloader">BottomLoader</h3>



<p>0e416e3cc1673d8fc3e7b2469e491c005152b9328515ea9bbd7cf96f1d23a99f</p>



<h3 class="wp-block-heading" id="dlrat">DLRAT</h3>



<p>e615ea30dd37644526060689544c1a1d263b6bb77fe3084aa7883669c1fde12f</p>



<p>9a48357c06758217b3a99cdf4ab83263c04bdea98c347dd14b254cab6c81b13a</p>



<h2 class="wp-block-heading" id="network-iocs">Network IOCs</h2>



<p>tech[.]micrsofts[.]com</p>



<p>tech[.]micrsofts[.]tech</p>



<p>27[.]102[.]113[.]93</p>



<p>185[.]29[.]8[.]53</p>



<p>155[.]94[.]208[.]209</p>



<p>162[.]19[.]71[.]175</p>



<p>201[.]77[.]179[.]66</p>



<p>hxxp://27[.]102[.]113[.]93/inet[.]txt</p>



<p>hxxp[://]162[.]19[.]71[.]175:7443/sonic/bottom[.]gif</p>



<p>hxxp[://]201[.]77[.]179[.]66:8082/img/lndex[.]php</p>



<p>hxxp[://]201[.]77[.]179[.]66:8082/img/images/header/B691646991EBAEEC[.]gif</p>



<p>hxxp[://]201[.]77[.]179[.]66:8082/img/images/header/7AEBC320998FD5E5[.]gif</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lazarus-group-targets-log4shell/">Lazarus Group Targets Log4Shell Flaw Via Telegram Bots</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gafgyt: Exploits five year old flaw in EoL Zyxel</title>
		<link>https://firsthackersnews.com/gafgyt-malware/</link>
					<comments>https://firsthackersnews.com/gafgyt-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 14 Aug 2023 01:16:20 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Daily attacks]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[fortinet]]></category>
		<category><![CDATA[Gafgyt]]></category>
		<category><![CDATA[router]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security center]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security policy]]></category>
		<category><![CDATA[security threat]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[zyxel EoL router]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6823</guid>

					<description><![CDATA[<p>Fortinet has raised an alert regarding the Gafgyt botnet malware, which is currently targeting a vulnerability in the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gafgyt-malware/">Gafgyt: Exploits five year old flaw in EoL Zyxel</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Fortinet has raised an alert regarding the Gafgyt botnet malware, which is currently targeting a vulnerability in the Zyxel EoL router. This vulnerability occurs during the router&#8217;s final phase and results in thousands of daily attacks.</p>



<h2 class="wp-block-heading"><strong>what is Gafgyt?</strong></h2>



<p>Gafgyt is a type of malware that targets and takes control of vulnerable Internet-connected devices to launch cyber attacks, often participating in DDoS attacks.</p>



<p>Gafgyt targets the&nbsp;<strong>CVE-2017-18368</strong>, a command injection vulnerability of critical severity (CVSS v3: 9.8) in the forwarding mode of remote device logging systems. This vulnerability was patched by Zyxel in 2017.</p>



<p>Zyxel warned about the new Gafgyt variant in 2019, advising firmware updates. Yet, Fortinet still sees 7,100 daily attacks since July 2023, with ongoing high attack numbers.</p>



<p>&#8220;Until August 7, 2023, FortiGuard Labs has observed ongoing attack attempts on the 2017 vulnerability. In the last month alone, they&#8217;ve thwarted attacks on over a thousand distinct IPS devices,&#8221; states a recent Fortinet alert.</p>



<p>It is not clear which part of the attack attempts resulted in successful infections. Nevertheless, activity has remained flat since July.</p>



<p>The CISA&nbsp;he warned&nbsp;this week to actively exploit CVE-2017-18368 in this case, adding the vulnerability to the list of known vulnerabilities under attack. The cybersecurity agency now requires federal&nbsp;services&nbsp;to patch the Zyxel vulnerability by August 28, 2023.</p>



<p>In response to the growing exploit, Zyxel has updated its security advisory. They&#8217;ve informed customers that CVE-2017-18363 impacts only Appliances using firmware versions 7.3.15.0 v001/3.40(ULM.0)b31 or earlier.</p>



<p>Zyxel P660HN-T1A routers with the latest 2017 firmware (version 3.40(BYF.11)) remain unaffected by these attacks. However, the device has reached the end of its life cycle and is no longer supported. Therefore, it&#8217;s recommended to think about upgrading to a newer model.</p>



<p>Indicators of router botnet infections often involve connection issues, device overheating, settings changes, unresponsiveness, odd network activity, new ports opening, and unexpected reboots.</p>



<p>If you suspect a botnet attack, consider doing a factory reset, updating firmware, and changing admin user credentials.</p>



<h2 class="wp-block-heading"><strong>Recommendation</strong></h2>



<p>Zyxel advises users to frequently update device firmware and consider replacing older devices with newer models for optimal data and network security.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gafgyt-malware/">Gafgyt: Exploits five year old flaw in EoL Zyxel</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gafgyt-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lapsus$: How They Hacked Some of the Biggest Targets</title>
		<link>https://firsthackersnews.com/lapsus-team/</link>
					<comments>https://firsthackersnews.com/lapsus-team/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 14 Aug 2023 01:05:39 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[advanced skills]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hacking technique]]></category>
		<category><![CDATA[Lapsus$]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security recommendation]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[targeted attack]]></category>
		<category><![CDATA[threat actors]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6821</guid>

					<description><![CDATA[<p>The amateur hacker group Lapsus$—mostly teenagers with limited technical training—has skillfully breached major targets like Microsoft, Okta, Nvidia,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lapsus-team/">Lapsus$: How They Hacked Some of the Biggest Targets</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The amateur hacker group Lapsus$—mostly teenagers with limited technical training—has skillfully breached major targets like Microsoft, Okta, Nvidia, and Globant. The government is studying their methods to enhance cybersecurity.</p>



<h2 class="wp-block-heading"><strong>The Lapsus$ team</strong></h2>



<p>The group uses simple but effective hacking techniques. They might lack advanced skills, but their persistence and creativity make up for it. For instance, they found a way to bypass strong security measures like MFA in well-protected organizations.</p>



<p>Instead of hacking into the MFA infrastructure like more advanced teams, a Lapsus$ leader used a different tactic. He said, &#8220;Call the employee multiple times at 1 a.m. when they&#8217;re sleeping. They&#8217;ll probably answer. Then, you can access the MFA portal and add another device.&#8221;</p>



<p>Recently, the Department of Homeland Security&#8217;s Cybersecurity Review Board issued a report. It shared effective Lapsus$ tactics and advised organizations to create defenses against them.</p>



<p>The Lapsus$ team, even though they&#8217;ve been around for only a little over a year and are mostly motivated by fame, has managed to breach a surprisingly long list of targets. </p>



<p>They successfully conducted a phishing attack on MFA provider Twilio, hacked into Nvidia&#8217;s corporate network to steal a huge amount of data, sent out confidential data from Microsoft and Okta, breached Globant IT&#8217;s network, and executed multiple attacks on T-Mobile using SIM swapping. </p>



<p>In addition, the Brazilian Ministry of Health was breached, leading to the deletion of more than 50 terabytes of data. Various other organizations were also targeted, including Vodafone Portugal, Impresa, Confina, Samsung, and Localiza.</p>



<p> The group employed straightforward methods, such as purchasing authentication cookies and credentials through initial access brokers.</p>



<p>The report has suggestions. One main idea is to switch to passwordless systems, called passkeys, using FIDO2. Passkeys are secure against credential phishing because they need devices to be nearby.</p>



<p>Another tip is for the Federal Communications Commission and Federal Trade Commission to make rules stronger for transferring phone numbers between SIM cards to prevent SIM swapping.</p>



<ul class="wp-block-list"><li>Organizations need to take immediate action to safeguard themselves, as outlined by the Council&#8217;s suggestions in collaboration with the US government and expert companies.</li><li>The authors of the report emphasized that many of the Council&#8217;s recommendations align with the &#8220;security by design&#8221; approach, in line with broader industry discussions, including efforts by CISA for &#8220;Secure by Design.&#8221;</li></ul>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lapsus-team/">Lapsus$: How They Hacked Some of the Biggest Targets</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/lapsus-team/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>QakBot Malware Operators Ramp Up C2 Network with 15 New Servers</title>
		<link>https://firsthackersnews.com/qakbot-malware/</link>
					<comments>https://firsthackersnews.com/qakbot-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 08 Aug 2023 16:05:37 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[C2 network]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[malware attack]]></category>
		<category><![CDATA[malware variants]]></category>
		<category><![CDATA[new server]]></category>
		<category><![CDATA[qakbot]]></category>
		<category><![CDATA[qakbot malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6800</guid>

					<description><![CDATA[<p>As of late June 2023, the QakBot (aka QBot) malware operators have established 15 new command-and-control (C2) servers.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/qakbot-malware/">QakBot Malware Operators Ramp Up C2 Network with 15 New Servers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As of late June 2023, the QakBot (aka QBot) <a href="https://firsthackersnews.com/bundlebot-malware/">malware</a> operators have established 15 new command-and-control (C2) servers.</p>



<p>The findings come as a follow-up to Team Cymru&#8217;s previous malware infrastructure analysis, emerging just over two months after Lumen Black Lotus Labs disclosed that 25% of its C2 servers remain active for only a single day.</p>



<h2 class="wp-block-heading"><strong>QakBot Malware</strong></h2>



<p>QakBot, also known as QBot, is a sophisticated <a href="https://firsthackersnews.com/bundlebot-malware/">banking Trojan malware</a> that targets financial institutions and their customers. It steals sensitive information, creates botnets, and establishes a command-and-control network to control infected computers remotely.</p>



<p>The cybersecurity firm reported that QakBot has a consistent pattern of going on an extended break each summer and then resurfacing sometime in September. This year, its spamming activities halted around 22 June 2023.</p>



<p><br>QakBot&#8217;s C2 network has a tiered architecture similar to Emotet and IcedID. The C2 nodes communicate with Tier 2 (T2) C2 nodes hosted on VPS providers in Russia.</p>



<p>Most of the bot C2 servers, which communicate with victim hosts, are in India and the U.S. The outbound T2 connections lead to IP addresses primarily based in the U.S., India, Mexico, and Venezuela.</p>



<p>Additionally, there is a BackConnect (BC) server alongside the C2s and Tier 2 C2s, which turns the infected bots into proxies for other malicious activities.</p>



<p>Team Cymru&#8217;s latest research shows a significant decrease in the number of C2s communicating with the T2 layer, leaving only eight remaining. This reduction was partly due to Black Lotus Labs&#8217; null-routing of the higher-tier infrastructure in May 2023.</p>



<p>An analysis of NetFlow data reveals a pattern where increased outbound T2 connections often follow spikes in inbound bot C2 connections. Conversely, spikes in outbound T2 connections coincide with a decline in bot C2 activity.</p>



<p>Team Cymru explained that QakBot&#8217;s strategy of using victims as C2 infrastructure with T2 communication results in double harm to users &#8211; first in the initial compromise and then in the risk of being publicly identified as malicious.</p>



<h2 class="wp-block-heading"><strong>Indicators of Compromise</strong></h2>



<figure class="wp-block-image size-large"><img decoding="async" width="235" height="506" src="https://firsthackersnews.com/wp-content/uploads/2023/08/image-3.png" alt="" class="wp-image-6801" srcset="https://firsthackersnews.com/wp-content/uploads/2023/08/image-3-139x300.png 139w, https://firsthackersnews.com/wp-content/uploads/2023/08/image-3-200x431.png 200w, https://firsthackersnews.com/wp-content/uploads/2023/08/image-3.png 235w" sizes="(max-width: 235px) 100vw, 235px" /></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/qakbot-malware/">QakBot Malware Operators Ramp Up C2 Network with 15 New Servers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/qakbot-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft: Stolen key gave access to cloud services</title>
		<link>https://firsthackersnews.com/microsoft-stolen-key-gave-access-to-cloud-services/</link>
					<comments>https://firsthackersnews.com/microsoft-stolen-key-gave-access-to-cloud-services/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 26 Jul 2023 02:08:14 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[cloud services]]></category>
		<category><![CDATA[Compromise]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security researcher]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[signing key]]></category>
		<category><![CDATA[stolen key]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6756</guid>

					<description><![CDATA[<p>Wiz security researchers have revealed that Chinese hackers, known as Storm-0558, successfully stole Microsoft&#8217;s consumer signing key. With</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-stolen-key-gave-access-to-cloud-services/">Microsoft: Stolen key gave access to cloud services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Wiz security researchers have revealed that Chinese hackers, known as Storm-0558, successfully stole Microsoft&#8217;s consumer signing key.</p>



<p> With this key, the hackers gained access to breached accounts on Exchange Online and Outlook.com, as previously acknowledged by the company.</p>



<p>The cloud-based email service, Exchange Online, has gained widespread adoption among small, medium, and large businesses. Offering enhanced security, reliability, and scalability, it has become a preferred choice for many organizations.</p>



<h2 class="wp-block-heading"><strong>Microsoft: Stolen key </strong></h2>



<p>In essence, Microsoft initially stated that only Outlook.com and Exchange Online were affected by the token forging technique. However, Wiz Research uncovered that the compromised signing key was more powerful than initially believed and wasn&#8217;t limited to just those two services.</p>



<p> According to their security researchers, the compromised MSA key could have allowed the threat actor to forge access tokens for various types of Azure Active Directory applications.</p>



<p>After revoking the stolen signing key, Microsoft did not recover from any other unauthorized access to its customers&#8217; accounts using the same technique.</p>



<p>Microsoft reports that it has noticed a change in Storm-0558&#8217;s tactics, and this suggests that the&nbsp;malicious agents&nbsp;they no longer have access to any signing keys.</p>



<p>The company has recently made an announcement stating that they are yet to determine how Chinese hackers were able to steal the signature key used by Microsoft consumers. </p>



<p>However, in response to pressure from CISA, they have now agreed to provide free extended access to cloud log data. This decision aims to assist defenders in recognizing and thwarting similar breach attempts in the future.</p>



<h2 class="wp-block-heading"><strong>How to Detect the Compromised Key in Your Environment?</strong></h2>



<ul class="wp-block-list"><li>Monitor key activity and access regularly.</li><li>Utilize robust key management solutions with logging capabilities.</li><li>Analyze log data for unusual patterns or anomalies.</li><li>Implement IDS and IPS to identify suspicious activities.</li><li>Monitor user and system behavior related to key access.</li><li>Conduct regular security audits to identify vulnerabilities.</li><li>Stay updated with threat intelligence to be aware of potential attacks.</li><li>Use multi-factor authentication for key access.</li><li>Engage in red teaming or penetration testing to identify weaknesses.</li><li>Have an incident response plan to respond quickly to suspected compromises.</li></ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-stolen-key-gave-access-to-cloud-services/">Microsoft: Stolen key gave access to cloud services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-stolen-key-gave-access-to-cloud-services/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
