Written by: Daniel Kapellmann Zafra, Alden Wahlstrom, James Sadowski, Josh Palatucci, Davyn Baumann, Jose Nazario Since early 2022, Mandiant has observed the revival and intensification of threat activity from actors leveraging hacktivist tactics and techniques.
Continue ReadingAuthor: Anowar Hossain Rana
What Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary], (Wed, Jun 26th)
[This is a Guest Diary by Kelly Fiocchi-Tapani, an ISC intern as part of the SANS.edu BACS program] For the last several months I have been participating in the SANS Internet Storm Center. The Storm Center
Continue ReadingISC Stormcast For Thursday, June 27th, 2024 https://isc.sans.edu/podcastdetail/9038, (Thu, Jun 27th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Continue ReadingISC Stormcast For Friday, June 28th, 2024 https://isc.sans.edu/podcastdetail/9040, (Fri, Jun 28th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Continue ReadingSupport of SSL 2.0 on web servers in 2024, (Fri, Jun 28th)
We last discussed SSLv2 support on internet-exposed web servers about a year ago, when we discovered that there were still about 450 thousand web servers that supported this protocol left on the internet[1]. We also found
Continue ReadingSSH “regreSSHion” Remote Code Execution Vulnerability in OpenSSH., (Mon, Jul 1st)
Qualys published a blog posts with details regarding a critical remote code execution vulnerability [1] This week is far from ideal to have to deal with a critical vulnerability in widely used software like OpenSSH. So
Continue ReadingHurdling Over Hazards: Multifaceted Threats to the Paris Olympics
The 2024 Paris Olympic Games face numerous threats due to their high-profile nature and international significance. Insikt Group's research identifies several key risks: cybercriminals targeting critical sectors with ransomware, hacktivists aiming to disrupt due to geopolitical
Continue ReadingIsrael-Hamas Conflict and US Elections Drive Violent Extremist Threats in 2024
The ongoing Israel-Hamas conflict, the upcoming 2024 US presidential election, and the rise of violent extremist content online are likely to escalate homegrown and domestic violent extremist (HVE and DVE) threats. HVEs and DVEs are expected
Continue ReadingThe Travels of “markopolo”: Self-Proclaimed Meeting Software Vortax Spreads Infostealers, Unveils Expansive Network of Malicious macOS Applications
Recorded Futures Insikt Group identified that Vortax, a purported virtual meeting software, spreads three infostealersRhadamanthys, Stealc, and Atomic macOS Stealer (AMOS). This extensive campaign targets cryptocurrency users, exploiting macOS vulnerabilities. Operated by the threat actor markopolo,
Continue ReadingRansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates
RansomHub, a new ransomware-as-a-service (RaaS) platform, emerged in February 2024, targeting Windows, Linux, and ESXi systems with malware written in Go and C++. Its high 90% commission rate attracts seasoned affiliates, leading to a surge in
Continue Reading