<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cyber Oracle]]></title><description><![CDATA[Discover Cyber Oracle – Your weekly update on cybersecurity innovation! Explore cutting-edge tech, global insights, interesting jobs/internships, and practical tips to secure your digital world. Subscribe now for the latest directly in your inbox!]]></description><link>https://www.cyber-oracle.com</link><image><url>https://substackcdn.com/image/fetch/$s_!CqKa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57abd4d0-be3d-43e6-a3e6-1cae0356eb2d_1000x1000.png</url><title>Cyber Oracle</title><link>https://www.cyber-oracle.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 29 Apr 2026 03:59:41 GMT</lastBuildDate><atom:link href="https://www.cyber-oracle.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Nikunj Patel]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyberoracle@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyberoracle@substack.com]]></itunes:email><itunes:name><![CDATA[Nikunj Patel]]></itunes:name></itunes:owner><itunes:author><![CDATA[Nikunj Patel]]></itunes:author><googleplay:owner><![CDATA[cyberoracle@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyberoracle@substack.com]]></googleplay:email><googleplay:author><![CDATA[Nikunj Patel]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Google Rushes Emergency Fix for Zero-Day Chrome Vulnerability CVE-2024-4761 Under Active Exploitation]]></title><description><![CDATA[Plus, VMware Issues Urgent Fixes for Critical Security Flaws in Workstation and Fusion Products]]></description><link>https://www.cyber-oracle.com/p/google-rushes-emergency-fix-for-zero</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/google-rushes-emergency-fix-for-zero</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 14 May 2024 17:45:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HJTq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Chrome Users Urged to Update Immediately as Google Unveils Patch for Critical V8 Engine Flaw</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HJTq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HJTq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png 424w, https://substackcdn.com/image/fetch/$s_!HJTq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png 848w, https://substackcdn.com/image/fetch/$s_!HJTq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png 1272w, https://substackcdn.com/image/fetch/$s_!HJTq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HJTq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png" width="800" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Google Chrome - Wikipedia&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Google Chrome - Wikipedia" title="Google Chrome - Wikipedia" srcset="https://substackcdn.com/image/fetch/$s_!HJTq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png 424w, https://substackcdn.com/image/fetch/$s_!HJTq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png 848w, https://substackcdn.com/image/fetch/$s_!HJTq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png 1272w, https://substackcdn.com/image/fetch/$s_!HJTq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d320954-8874-4f6a-9147-6f7091f782a5_800x800.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Google has swiftly responded to the discovery of a new zero-day vulnerability, identified as CVE-2024-4761, affecting its Chrome web browser. This high-severity flaw impacts the V8 JavaScript and WebAssembly engine and was anonymously reported on May 9, 2024. The vulnerability, categorized as an out-of-bounds write bug, has already been exploited in the wild, prompting Google to expedite the release of emergency fixes. Out-of-bounds write bugs are notorious for their potential to corrupt data, cause crashes, or enable malicious actors to execute arbitrary code on compromised systems.</p><p>Notably, this development follows closely on the heels of Google patching another actively exploited vulnerability, CVE-2024-4671, which involved a use-after-free flaw in the Visuals component. Google's prompt action underscores the ongoing efforts to safeguard users against emerging cyber threats and underscores the critical importance of timely software updates.</p><p>Since the beginning of the year, Google has addressed a total of six zero-day vulnerabilities, with three of them showcased at the Pwn2Own hacking contest held in Vancouver in March. These vulnerabilities, including CVE-2024-0519, CVE-2024-2886, CVE-2024-2887, CVE-2024-3159, and CVE-2024-4671, highlight the evolving landscape of cyber threats and the continuous need for vigilance in software security.</p><p>To mitigate potential risks associated with CVE-2024-4761, users are strongly advised to update their Chrome browsers to the latest version - specifically, version 124.0.6367.207/.208 for Windows and macOS, and version 124.0.6367.207 for Linux. Additionally, users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi should remain vigilant and apply the necessary patches as soon as they become available.</p><h3>Newly Disclosed Vulnerabilities in VMware Workstation and Fusion Pose Risk of Code Execution and Data Exposure</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Blva!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Blva!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!Blva!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!Blva!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!Blva!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Blva!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;VMware (Endpoint Protection) - Tech Partners | Cloudflare&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="VMware (Endpoint Protection) - Tech Partners | Cloudflare" title="VMware (Endpoint Protection) - Tech Partners | Cloudflare" srcset="https://substackcdn.com/image/fetch/$s_!Blva!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!Blva!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!Blva!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!Blva!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2a974a7-31e2-4a84-9616-72be788e9206_5000x3000.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The recent disclosure by VMware highlights four security vulnerabilities affecting its Workstation and Fusion products, posing risks of information exposure, denial-of-service (DoS) attacks, and potential code execution under specific conditions. These vulnerabilities, collectively tracked as CVE-2024-22267, CVE-2024-22268, CVE-2024-22269, and CVE-2024-22270, impact Workstation versions 17.x and Fusion versions 13.x. VMware promptly addressed these issues in version 17.5.2 for Workstation and version 13.5.2 for Fusion.</p><p>The vulnerabilities span a range of weaknesses, including a use-after-free flaw in the Bluetooth device (CVE-2024-22267), a heap buffer-overflow vulnerability in Shader functionality (CVE-2024-22268), and two information disclosure flaws affecting Bluetooth functionality (CVE-2024-22269) and Host Guest File Sharing (HGFS) functionality (CVE-2024-22270). Exploitation of these vulnerabilities could allow threat actors with varying levels of access privileges to execute arbitrary code, trigger DoS conditions, or access sensitive information stored in hypervisor memory.</p><p>Notably, CVE-2024-22267, CVE-2024-22269, and CVE-2024-22270 were initially demonstrated at the Pwn2Own hacking contest in March 2024, underscoring the real-world exploitability of these flaws. As interim measures, VMware recommends users disable Bluetooth support on virtual machines and deactivate the 3D acceleration feature until the patches can be applied. However, there are no equivalent mitigations for CVE-2024-22270, emphasizing the importance of promptly updating affected systems.</p><p>This advisory follows VMware's earlier patch release addressing critical security flaws in ESXi, Workstation, and Fusion products, reaffirming the company's commitment to promptly addressing security vulnerabilities to protect its users and their virtual environments.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Supply Chain Attack Unveiled in Linux Distro Utility XZ Utils, Facilitating Remote Code Execution]]></title><description><![CDATA[Plus, Earth Freybug Cyber Threat Group Unleashes New UNAPIMON Malware, Poses Significant Security Risk]]></description><link>https://www.cyber-oracle.com/p/supply-chain-attack-unveiled-in-linux</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/supply-chain-attack-unveiled-in-linux</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 02 Apr 2024 15:02:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qYpB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>CVE-2024-3094 Discovered in XZ Utils Raises Concerns Over Backdoor Inserted by Maintainer, Potentially Allowing Remote Attackers Complete Access to Systems</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qYpB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qYpB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qYpB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qYpB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qYpB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qYpB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg" width="889" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:889,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution" title="Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution" srcset="https://substackcdn.com/image/fetch/$s_!qYpB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qYpB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qYpB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qYpB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28c1b512-2af9-44df-9c67-4e67e5aa02ac_889x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A critical security flaw tracked as CVE-2024-3094 has been exposed in the widely used Linux data compression utility XZ Utils, allowing remote code execution. Discovered by Microsoft engineer Andres Freund, the backdoor enables attackers to bypass secure shell authentication and gain full system access.</p><p>The malicious code was deliberately inserted by a project maintainer named Jia Tan, who meticulously built credibility over two years before introducing the backdoor in the XZ Utils 5.6.0 and 5.6.1 release tarballs. Tan's sockpuppet accounts, including Jigar Kumar and Dennis Ens, reportedly orchestrated feature requests and issue reports to influence the addition of Tan as a co-maintainer.</p><p>Lasse Collin, the original maintainer, acknowledged the breach, emphasizing that the compromised tarballs were created and signed by Tan. Filippo Valsorda's analysis revealed that remote attackers can execute arbitrary payloads through an SSH certificate, circumventing authentication protocols to take control of victim machines.</p><p>The incident underscores the sophistication of the state-sponsored operation behind the supply chain attack, prompting concerns over the security of open-source software projects and the need for robust tools and processes to detect tampering and malicious features.</p><p>This discovery echoes previous supply chain attacks like Apache Log4j, highlighting the vulnerabilities inherent in open-source and volunteer-run projects and emphasizing the importance of adopting measures to identify and mitigate such threats.</p><h3>Trend Micro Exposes Sophisticated Tactics of Earth Freybug's Latest Espionage Campaign with UNAPIMON Malware</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IoLP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IoLP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp 424w, https://substackcdn.com/image/fetch/$s_!IoLP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp 848w, https://substackcdn.com/image/fetch/$s_!IoLP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp 1272w, https://substackcdn.com/image/fetch/$s_!IoLP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IoLP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp" width="728" height="380" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/decba835-ebeb-4d60-946e-4745835446cb_728x380.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:380,&quot;width&quot;:728,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations" title="China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations" srcset="https://substackcdn.com/image/fetch/$s_!IoLP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp 424w, https://substackcdn.com/image/fetch/$s_!IoLP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp 848w, https://substackcdn.com/image/fetch/$s_!IoLP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp 1272w, https://substackcdn.com/image/fetch/$s_!IoLP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdecba835-ebeb-4d60-946e-4745835446cb_728x380.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Security experts have identified a new threat activity cluster dubbed Earth Freybug, which has unleashed a sophisticated malware named UNAPIMON as part of its espionage and financially motivated campaigns since at least 2012. Earth Freybug, believed to be a subset of the China-linked APT41 group, employs a variety of tactics, including living-off-the-land binaries (LOLBins) and custom malware, to target organizations globally.</p><p>UNAPIMON, the latest addition to Earth Freybug's arsenal, is designed to evade detection by employing advanced techniques. It prevents child processes from being monitored by leveraging DLL hijacking and API unhooking methods. This allows the malware to operate stealthily, avoiding detection in sandbox environments that utilize API monitoring through hooking mechanisms.</p><p>The attack chain initiated by Earth Freybug begins with the use of a legitimate executable associated with VMware Tools to create a scheduled task and deploy a malicious batch script named "cc.bat" on the victim's machine. This batch script collects system information and launches another scheduled task to execute UNAPIMON.</p><p>Notably, UNAPIMON utilizes a service called SessionEnv to load a malicious DLL, TSMSISrv.DLL, which is responsible for dropping the UNAPIMON DLL file and injecting it into critical processes like cmd.exe and SessionEnv itself. This grants the attackers remote access to the compromised system, effectively turning it into a backdoor.</p><p>Despite its simple C++ codebase, UNAPIMON demonstrates the author's coding prowess and creativity. By leveraging the Detours library, the malware evades detection and analysis, making it challenging for security researchers to uncover its malicious activities.</p><p>The discovery of UNAPIMON underscores the evolving tactics of Earth Freybug and highlights the importance of implementing robust cybersecurity measures. Even seemingly simple techniques, when applied effectively, can significantly enhance the stealth and effectiveness of cyberattacks. As such, organizations must remain vigilant and employ comprehensive security solutions to detect and mitigate threats posed by sophisticated threat actors like Earth Freybug.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[BIPClip: Python Packages on PyPI Infected to Steal Cryptocurrency Wallet Recovery Phrases]]></title><description><![CDATA[Plus, WordPress Plugin Vulnerabilities Fuel Malware Campaigns, Infecting Thousands of Sites]]></description><link>https://www.cyber-oracle.com/p/bipclip-python-packages-on-pypi-infected</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/bipclip-python-packages-on-pypi-infected</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 12 Mar 2024 16:15:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vfrF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Security Researchers Uncover Sophisticated Software Supply Chain Attack Aiming to Compromise Crypto Assets, Highlighting Risks in Open-Source Repositories</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vfrF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vfrF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png 424w, https://substackcdn.com/image/fetch/$s_!vfrF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png 848w, https://substackcdn.com/image/fetch/$s_!vfrF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png 1272w, https://substackcdn.com/image/fetch/$s_!vfrF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vfrF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png" width="1316" height="593" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:593,&quot;width&quot;:1316,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;How to publish a python command line application to pip (PyPI) | by Albert  Acebr&#243;n | Level Up Coding&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="How to publish a python command line application to pip (PyPI) | by Albert  Acebr&#243;n | Level Up Coding" title="How to publish a python command line application to pip (PyPI) | by Albert  Acebr&#243;n | Level Up Coding" srcset="https://substackcdn.com/image/fetch/$s_!vfrF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png 424w, https://substackcdn.com/image/fetch/$s_!vfrF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png 848w, https://substackcdn.com/image/fetch/$s_!vfrF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png 1272w, https://substackcdn.com/image/fetch/$s_!vfrF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec69f02f-dba6-46a3-8d7d-585d3481ed1f_1316x593.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A set of seven packages discovered on the Python Package Index (PyPI) repository has been found to harbor malware designed to steal BIP39 mnemonic phrases, crucial for recovering private keys of cryptocurrency wallets. ReversingLabs has dubbed the software supply chain attack campaign as BIPClip, noting that the packages collectively amassed 7,451 downloads before being removed from PyPI.</p><p>According to security researcher Karlo Zanki, the attack, active since December 4, 2022, targets developers involved in cryptocurrency wallet generation and security projects, reflecting the persistent interest of threat actors in crypto-related supply chain attacks.</p><p>In a bid to evade detection, one of the packages, mnemonic_to_address, appeared benign but listed bip39-mnemonic-decrypt as a dependency, containing the malicious component. The malware operates by exfiltrating stolen mnemonic phrases to a server controlled by the threat actors.</p><p>Additionally, packages such as public-address-generator and erc20-scanner serve as lures to transmit stolen data to the same command-and-control (C2) server. Another package, hashdecrypts, functions independently, harvesting data through near-identical code.</p><p>ReversingLabs uncovered references to a GitHub profile named "HashSnake," featuring a repository named hCrypto, advertised as a tool to extract mnemonic phrases from crypto wallets. The campaign, ongoing for over a year, indicates a concerted effort by threat actors to compromise crypto assets.</p><p>Furthermore, the HashSnake account maintains a presence on Telegram and YouTube, promoting malicious tools such as xMultiChecker 2.0, emphasizing the threat posed by organized cybercriminals within open-source ecosystems.</p><p>These findings underscore the risks inherent in open-source repositories, exacerbated by the exploitation of abandoned projects by threat actors. The case serves as a reminder for developers and organizations to remain vigilant against software supply chain attacks and adopt robust security measures to safeguard against such threats.</p><h3>Exploitation of Popup Builder and Ultimate Member Plugins Puts WordPress Sites at Risk, Highlighting Urgency for Patching and Vigilance</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Uuu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Uuu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Uuu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png" width="1456" height="786" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:786,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Graphics &amp; Logos &#8211; WordPress.org&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Graphics &amp; Logos &#8211; WordPress.org" title="Graphics &amp; Logos &#8211; WordPress.org" srcset="https://substackcdn.com/image/fetch/$s_!9Uuu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png 424w, https://substackcdn.com/image/fetch/$s_!9Uuu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png 848w, https://substackcdn.com/image/fetch/$s_!9Uuu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!9Uuu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce73da7d-0cf6-4098-9660-4bf063a3fff9_2000x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A new malware campaign exploiting a high-severity security flaw in the Popup Builder plugin for WordPress has infected more than 3,900 sites within three weeks, as reported by Sucuri. Orchestrated from domains registered since February 12, 2024, the attacks capitalize on CVE-2023-6000, allowing the injection of malicious JavaScript code.</p><p>The malware campaign, identified by security researcher Puja Srivastava, injects two variants of malicious code aimed at redirecting site visitors to phishing and scam pages. WordPress site owners are urged to maintain up-to-date plugins and conduct scans for suspicious code or users to mitigate risks.</p><p>This incident occurs alongside Wordfence's disclosure of a high-severity cross-site scripting (XSS) vulnerability in the Ultimate Member plugin (CVE-2024-2123), affecting versions up to 2.8.3. Exploitation of this flaw, characterized by insufficient input sanitization, could grant unauthenticated attackers administrative user access on vulnerable sites.</p><p>The Ultimate Member vulnerability follows a similar flaw (CVE-2024-1071) addressed in version 2.8.3, highlighting the ongoing security challenges faced by WordPress plugins. Additionally, a file upload vulnerability in the Avada WordPress theme (CVE-2024-1468) has been discovered, allowing authenticated attackers to upload arbitrary files for potential remote code execution.</p><p>These incidents underscore the critical need for WordPress site owners to promptly apply security patches and remain vigilant against emerging threats to safeguard their websites from exploitation and malware infections.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Guardio Uncovers Sophisticated Email Hijacking Scheme Involving 8,000 Subdomains of Major Brands, Orchestrated by Threat Actor ResurrecAds]]></title><description><![CDATA[Plus, Ukrainian Entities in Finland Targeted in Malicious Campaign Using IDAT Loader to Distribute Remcos RAT]]></description><link>https://www.cyber-oracle.com/p/guardio-uncovers-sophisticated-email</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/guardio-uncovers-sophisticated-email</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Mon, 26 Feb 2024 15:31:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IXZN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>SubdoMailing Campaign Exploits Legitimate Brand Subdomains for Spam Distribution and Click Monetization, Circumventing Standard Security Measures</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IXZN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IXZN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png 424w, https://substackcdn.com/image/fetch/$s_!IXZN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png 848w, https://substackcdn.com/image/fetch/$s_!IXZN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png 1272w, https://substackcdn.com/image/fetch/$s_!IXZN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IXZN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png" width="1247" height="686" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:686,&quot;width&quot;:1247,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SubdoMailing campaign spams 5 million emails daily via 8k hijacked domains&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SubdoMailing campaign spams 5 million emails daily via 8k hijacked domains" title="SubdoMailing campaign spams 5 million emails daily via 8k hijacked domains" srcset="https://substackcdn.com/image/fetch/$s_!IXZN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png 424w, https://substackcdn.com/image/fetch/$s_!IXZN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png 848w, https://substackcdn.com/image/fetch/$s_!IXZN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png 1272w, https://substackcdn.com/image/fetch/$s_!IXZN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98578d5-a045-4a11-ba3b-6059c7b7b21a_1247x686.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Guardio Labs has exposed a complex email hijacking operation named SubdoMailing, which exploits over 8,000 subdomains belonging to reputable brands and institutions for the proliferation of spam and click monetization. Tracked since September 2022, the campaign is orchestrated by a threat actor dubbed ResurrecAds, known for reviving defunct domains associated with major brands to manipulate the digital advertising ecosystem for illicit gains.</p><p>ResurrecAds manages an extensive infrastructure including hosts, SMTP servers, IP addresses, and private residential ISP connections, leveraging stolen resources to circulate millions of spam and phishing emails daily. The emails, masquerading as legitimate communications, deceive recipients and evade standard security measures by using images instead of text, and employing sophisticated redirection techniques.</p><p>Notably, the subdomains targeted belong to prominent brands such as ACLU, eBay, Marvel, and VMware, among others, adding credibility to the malicious emails. By bypassing Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting and Conformance (DMARC) checks, the campaign successfully circumvents email authentication methods designed to prevent spoofing.</p><p>Guardio's investigation revealed instances of deceptive email origins, with subdomains like marthastewart.msn.com redirecting to malicious domains through CNAME records. This technique inherits SPF policies, enabling attackers to send emails as if from reputable domains. Furthermore, the hijackers exploit abandoned subdomains with dangling CNAME records or defunct DNS SPF records, seizing control to host malicious content.</p><p>To counter this threat, Guardio has launched a SubdoMailing Checker tool to help domain administrators and site owners detect signs of compromise. The operation, meticulously designed to distribute malicious advertisements and maximize click revenue, demonstrates the sophistication and agility of modern cybercriminal networks.</p><h3>Threat Actor UAC-0184 Utilizes Steganography and War-Themed Lures to Deploy Remote Access Trojans, CERT-UA Reports Additional Attacks via Signal App and PikaBot Malware Resurgence</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SpqD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SpqD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png 424w, https://substackcdn.com/image/fetch/$s_!SpqD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png 848w, https://substackcdn.com/image/fetch/$s_!SpqD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png 1272w, https://substackcdn.com/image/fetch/$s_!SpqD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SpqD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What Is Steganography? | WIRED&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What Is Steganography? | WIRED" title="What Is Steganography? | WIRED" srcset="https://substackcdn.com/image/fetch/$s_!SpqD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png 424w, https://substackcdn.com/image/fetch/$s_!SpqD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png 848w, https://substackcdn.com/image/fetch/$s_!SpqD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png 1272w, https://substackcdn.com/image/fetch/$s_!SpqD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232e8552-df8c-46f6-b77a-d12d5fb47868_2560x1920.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A malicious campaign targeting Ukrainian entities based in Finland has been uncovered, employing a commercial remote access trojan (RAT) named Remcos RAT, distributed via a malware loader known as IDAT Loader. Tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as UAC-0184, the attack leverages steganography techniques for defense evasion.</p><p>Morphisec researcher Michael Dereviashkin emphasized the role of steganography in evading defenses, as IDAT Loader, associated with the Hijack Loader family, serves payloads like DanaBot, SystemBC, and RedLine Stealer. TA544, another threat actor, has also used IDAT Loader to distribute Remcos RAT and SystemBC via phishing attacks.</p><p>The phishing campaign, disclosed by CERT-UA in January 2024, utilizes war-themed lures to initiate an infection chain leading to IDAT Loader deployment, which extracts Remcos RAT using embedded steganographic PNG files.</p><p>In a separate development, CERT-UA revealed targeting of defense forces through the Signal instant messaging app, distributing a booby-trapped Microsoft Excel document executing COOKBOX, a PowerShell-based malware attributed to cluster UAC-0149.</p><p>Simultaneously, malware campaigns propagating PikaBot malware have resurged since February 8, 2024, using an updated variant with new unpacking methods, heavy obfuscation, and modifications to core module functionality. Elastic Security Labs reported ongoing development of this variant.</p><p>The coordinated efforts of threat actors utilizing various attack vectors underscore the evolving nature of cyber threats, demanding continuous vigilance and adaptation of defense strategies to safeguard against malicious activities.</p><h3>Jobs/Internships</h3><p>Coinbase - <a href="https://www.coinbase.com/careers/5469054?gh_jid=5469054&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer, Frontend - Consumer</a> - Fully Remote</p><p>Roku - <a href="https://www.weareroku.com/jobs/5701678?gh_jid=5701678&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Senior Product Manager, Ad Measurement</a> - New York, New York &#183; On-site</p><p>Amplitude - <a href="https://boards.greenhouse.io/amplitude/jobs/7029250002?ref=levels.fyi&amp;utm_source=levels.fyi">Staff Software Engineer, Data Pipeline</a> - Vancouver, BC, Canada &#183; On-site</p><p>Motorola Solutions - <a href="https://motorolasolutions.wd5.myworkdayjobs.com/Careers/job/Schaumburg-IL/Data-Scientist-Intern--Summer-2024-_R44198/apply/autofillWithResume?ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Data Scientist Intern (Summer 2024)</a> - Schaumburg, IL</p><p>Adobe - <a href="https://careers.adobe.com/us/en/job/ADOBUSR139304EXTERNALENUS/2024-Intern-Software-Engineer?utm_medium=phenom-feeds&amp;source=levels.fyi&amp;utm_source=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi">2024 Intern - Software Engineer</a> - New York, NY &#183; On-site</p><p>UBS - <a href="https://jobs.ubs.com/TGnewUI/Search/home/HomeWithPreLoad?jobid=288791&amp;siteid=5131&amp;partnerid=25008&amp;source=ilevels.fyi&amp;PageType=JobDetails&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Internship 2024, DevOps Developer, UBS Scenario Hub</a> - Zurich, Zurich, Switzerland &#183; Hybrid</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Chinese Threat Actor GoldFactory Unveils Sophisticated Banking Trojans, Including iOS Malware GoldPickaxe, Targeting Asian Financial Institutions]]></title><description><![CDATA[Plus, Russian Threat Actor Turla Deploys TinyTurla-NG Backdoor in Campaign Targeting Polish NGOs]]></description><link>https://www.cyber-oracle.com/p/chinese-threat-actor-goldfactory</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/chinese-threat-actor-goldfactory</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Fri, 16 Feb 2024 00:48:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lhAi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>GoldFactory's Advanced Malware Campaigns Employ Social Engineering Tactics to Infiltrate Android and iOS Devices, Evading Traditional Security Measures</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lhAi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lhAi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp 424w, https://substackcdn.com/image/fetch/$s_!lhAi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp 848w, https://substackcdn.com/image/fetch/$s_!lhAi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp 1272w, https://substackcdn.com/image/fetch/$s_!lhAi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lhAi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp" width="1456" height="734" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:734,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Gold Rush is back to APAC: Group-IB unveils first iOS trojan stealing your  face | Group-IB&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Gold Rush is back to APAC: Group-IB unveils first iOS trojan stealing your  face | Group-IB" title="Gold Rush is back to APAC: Group-IB unveils first iOS trojan stealing your  face | Group-IB" srcset="https://substackcdn.com/image/fetch/$s_!lhAi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp 424w, https://substackcdn.com/image/fetch/$s_!lhAi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp 848w, https://substackcdn.com/image/fetch/$s_!lhAi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp 1272w, https://substackcdn.com/image/fetch/$s_!lhAi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d2e7b4e-4d0c-4d8a-8a8a-55b2e2021077_1600x807.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A Chinese-speaking threat actor known as GoldFactory has been identified as the creator of highly sophisticated banking trojans, unveiling a previously undocumented iOS malware named GoldPickaxe capable of harvesting sensitive personal data. Active since mid-2023, GoldFactory has also developed Android-based malware such as GoldDigger and its variants, targeting users in the Asia-Pacific region, particularly Thailand and Vietnam.</p><p>GoldPickaxe, distributed through social engineering campaigns, employs a variety of distribution methods including smishing and phishing messages, as well as fake URLs leading to the installation of the malware. Notably, the iOS variant leverages Apple's TestFlight platform and booby-trapped URLs to gain complete control over iOS devices.</p><p>The sophistication of GoldPickaxe extends to its ability to bypass security measures such as facial recognition for transaction confirmation. The malware prompts victims to record a video, later used to create deepfake videos with face-swapping AI services.</p><p>Both Android and iOS variants of GoldPickaxe are designed to intercept SMS messages, collect identity documents and photos, and proxy traffic through compromised devices. The Android version, an evolutionary successor of GoldDiggerPlus, targets over 20 applications from various sectors to steal login credentials.</p><p>GoldDigger, discovered in June 2023, targets Vietnamese financial applications and has spawned upgraded variants like GoldDiggerPlus, which embeds another trojan component named GoldKefu. GoldKefu, impersonating a popular Vietnamese messaging app, tricks victims into revealing banking credentials through fake alerts and overlays.</p><p>The emergence of GoldFactory's mobile banking malware underscores the evolving landscape of cyber threats, with social engineering schemes evolving to deliver malware while circumventing traditional security measures. To mitigate these risks, users are advised to avoid clicking on suspicious links, installing apps from untrusted sources, and regularly reviewing app permissions.</p><p>GoldFactory's operations reflect a high level of sophistication and operational maturity, with separate development and operator groups dedicated to specific regions. The group continuously enhances its toolset to adapt to targeted environments, posing significant challenges for cybersecurity defenses.</p><h3><br>Turla Expands Arsenal with TinyTurla-NG, Utilizes Compromised WordPress Sites for Command-and-Control in Latest Campaign</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yHH5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yHH5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png 424w, https://substackcdn.com/image/fetch/$s_!yHH5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png 848w, https://substackcdn.com/image/fetch/$s_!yHH5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png 1272w, https://substackcdn.com/image/fetch/$s_!yHH5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yHH5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png" width="600" height="376" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:376,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Turla Hiding in the Sky: Russian Speaking Cyberespionage Group Exploits  Satellites to Reach the Ultimate Level of Anonymity | Kaspersky&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Turla Hiding in the Sky: Russian Speaking Cyberespionage Group Exploits  Satellites to Reach the Ultimate Level of Anonymity | Kaspersky" title="Turla Hiding in the Sky: Russian Speaking Cyberespionage Group Exploits  Satellites to Reach the Ultimate Level of Anonymity | Kaspersky" srcset="https://substackcdn.com/image/fetch/$s_!yHH5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png 424w, https://substackcdn.com/image/fetch/$s_!yHH5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png 848w, https://substackcdn.com/image/fetch/$s_!yHH5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png 1272w, https://substackcdn.com/image/fetch/$s_!yHH5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375cd224-8b21-4c87-82ed-b8e3dbf96526_600x376.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Russian-linked threat actor Turla has been identified deploying a new backdoor, TinyTurla-NG, in a targeted campaign spanning three months, aimed at Polish non-governmental organizations (NGOs) in December 2023. Cisco Talos, in a recent technical report, described TinyTurla-NG as a "last chance" backdoor deployed when other unauthorized access methods fail or are detected.</p><p>This backdoor shares similarities with TinyTurla, a previously documented implant used by Turla in intrusions targeting entities in the U.S., Germany, and Afghanistan since at least 2020. Turla, also known as Iron Hunter and Venomous Bear, is associated with the Russian Federal Security Service (FSB).</p><p>In addition to targeting Polish NGOs, Turla has recently focused on the defense sector in Ukraine and Eastern Europe, deploying a new .NET-based backdoor named DeliveryCheck, and upgrading its Kazuar implant, utilized since 2017.</p><p>The campaign involving TinyTurla-NG commenced on December 18, 2023, and continued until January 27, 2024, although suspicions suggest activity might have begun in November 2023 based on malware compilation dates. The distribution method of the backdoor remains unknown, but compromised WordPress-based websites serve as command-and-control (C2) endpoints, enabling the execution of commands via PowerShell or Command Prompt, as well as file download/upload.</p><p>Furthermore, TinyTurla-NG serves as a conduit for delivering PowerShell scripts labeled TurlaPower-NG, designed to extract key material used to secure password databases of popular password management software.</p><p>In a related development, Microsoft and OpenAI disclosed that Russian nation-state actors are exploring generative artificial intelligence tools, including large language models like ChatGPT, to understand satellite communication protocols, radar imaging technologies, and seek assistance with scripting tasks, underscoring the evolving sophistication of cyber threats.</p><h3>Jobs/Internships:</h3><p>Prodigy Education - <a href="https://jobs.lever.co/prodigyeducation/0bb20676-3984-428b-88f9-d2668430e5b4/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Data Scientist</a> - Greater Toronto Area, Ontario &#183; Hybrid</p><p>EasyPost - <a href="https://jobs.lever.co/easypost-2/dbad0349-b144-4dbf-9270-280fce8902bd/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Staff Automation Engineer</a> - Fully Remote</p><p>Expedition Technology - <a href="https://grnh.se/0efbeaf47us?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer</a> - Full Stack - Herndon, Virginia, United States &#183; On-site</p><p>Coinbase - <a href="https://www.coinbase.com/careers/5466500?gh_jid=5466500&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Summer 2024 - Software Engineer Intern</a> - Fully Remote</p><p>Chime - <a href="https://boards.greenhouse.io/chime/jobs/7108334002?gh_jid=7108334002&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern, Savings</a> - San Francisco, CA &#183; Hybrid</p><p>Neuralink - <a href="https://boards.greenhouse.io/neuralink/jobs/5469297003?gh_jid=5469297003&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern, Implant Team</a> - Fremont, California, United States &#183; On-site</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Russian State-Backed Hacker Group APT28 Executes Global NTLM v2 Hash Relay Attacks on High-Profile Targets]]></title><description><![CDATA[CERT-UA Issues Warning as Malware DirtyMoe Infects Over 2,000 Computers in Ukraine; Ongoing Phishing Campaign Targets Military Personnel]]></description><link>https://www.cyber-oracle.com/p/russian-state-backed-hacker-group</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/russian-state-backed-hacker-group</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Fri, 02 Feb 2024 18:46:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Captiva AI - A Special Part of our Jobs Initiative </h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7ZzS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7ZzS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png 424w, https://substackcdn.com/image/fetch/$s_!7ZzS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png 848w, https://substackcdn.com/image/fetch/$s_!7ZzS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png 1272w, https://substackcdn.com/image/fetch/$s_!7ZzS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7ZzS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png" width="1051" height="1226" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1226,&quot;width&quot;:1051,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:96044,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7ZzS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png 424w, https://substackcdn.com/image/fetch/$s_!7ZzS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png 848w, https://substackcdn.com/image/fetch/$s_!7ZzS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png 1272w, https://substackcdn.com/image/fetch/$s_!7ZzS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd63b6a98-b5b0-4185-ae00-c623c5e209cc_1051x1226.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Hello Subscribers,</p><p>I hope you are having a great day. As the job market tightens we feel that interview preparation for any job is crucial to landing a job these days. This is why we have partnered with <a href="https://apps.apple.com/app/apple-store/id6474557904?pt=126011983&amp;ct=campaign15&amp;mt=8">Captiva AI</a>, an artificial intelligence powered job preparation platform for technology, marketing, consulting, sales, finance, and accounting roles. The app is free for download my scanning the QR code above or following this <a href="https://apps.apple.com/app/apple-store/id6474557904?pt=126011983&amp;ct=campaign15&amp;mt=8">link.</a></p><h3>Aggressive APT28 Exploits NTLM Vulnerabilities, Targets Organizations Across Sectors Worldwide</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B3Ck!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B3Ck!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg 424w, https://substackcdn.com/image/fetch/$s_!B3Ck!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg 848w, https://substackcdn.com/image/fetch/$s_!B3Ck!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!B3Ck!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B3Ck!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Why Have Russian Hackers Been So Quiet in Ukraine?&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Why Have Russian Hackers Been So Quiet in Ukraine?" title="Why Have Russian Hackers Been So Quiet in Ukraine?" srcset="https://substackcdn.com/image/fetch/$s_!B3Ck!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg 424w, https://substackcdn.com/image/fetch/$s_!B3Ck!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg 848w, https://substackcdn.com/image/fetch/$s_!B3Ck!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!B3Ck!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d6b0bf-82e3-46f0-8ffc-f4c2bc48c9b0_1200x630.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>From April 2022 to November 2023, Russian state-sponsored actors, identified as the notorious hacking crew APT28, executed NT LAN Manager (NTLM) v2 hash relay attacks on high-value targets globally. The group, also known as Blue Athena, Fancy Bear, and others, focused on organizations involved in foreign affairs, energy, defense, transportation, labor, social welfare, finance, parenthood, and local city councils.</p><p>Cybersecurity firm Trend Micro characterized these intrusions as a cost-efficient method automating brute-force attempts to infiltrate networks. APT28, operated by Russia's GRU military intelligence service since at least 2009, has a history of spear-phishing and strategic web compromises.</p><p>In April 2023, the group was implicated in attacks exploiting patched flaws in Cisco networking equipment, and later in the year, it gained attention for exploiting privilege escalation flaws in Microsoft Outlook and WinRAR. This allowed APT28 to access user Net-NTLMv2 hashes and stage NTLM Relay attacks, compromising email accounts.</p><p>The threat actor continued evolving its tactics, incorporating anonymization layers such as VPN services, Tor, data center IP addresses, and compromised EdgeOS routers. These routers, potentially breached or compromised by a third party, were used for scanning, probing, and sending spear-phishing emails. Post-exploitation activities involved modifying folder permissions in victims' mailboxes, enabling lateral movement within organizations.</p><p>Notably, APT28 targeted Ukrainian entities using CVE-2023-23397 exploits, leveraging lures related to the Israel-Hamas conflict, and employing custom backdoors like HeadLace. Recent campaigns against European governments involved bogus Microsoft Outlook login pages on webhook[.]site URLs. At least 100 EdgeOS routers were estimated to be infected.</p><p>The article concludes with insights into the group's sophisticated post-exploitation actions, emphasizing the complexity of initial intrusions drowned out by loud and aggressive campaigns. Simultaneously, another Russian threat actor, COLDRIVER, was revealed to impersonate researchers and academics in an ongoing hacking campaign, redirecting victims to credential harvesting pages.</p><h3>UAC-0027 Identified as Threat Actor Behind DirtyMoe Malware, While Phishing Campaign STEADY#URSA Linked to Russian Threat Actor Shuckworm</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Y0VQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;DirtyMoe modules expand the bot using worm-like techniques&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="DirtyMoe modules expand the bot using worm-like techniques" title="DirtyMoe modules expand the bot using worm-like techniques" srcset="https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Y0VQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ce8972b-d498-4803-8571-72830ceb14fe_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Computer Emergency Response Team of Ukraine (CERT-UA) has raised an alarm, reporting that more than 2,000 computers in Ukraine have fallen victim to the DirtyMoe malware, with the campaign attributed to the threat actor UAC-0027. DirtyMoe, operational since 2016, possesses the capabilities of cryptojacking and launching distributed denial-of-service (DDoS) attacks. Earlier this year, cybersecurity firm Avast highlighted the malware's worm-like propagation through known security flaws.</p><p>Delivery of the DDoS botnet is facilitated by the Purple Fox malware or via fraudulent MSI installer packages for popular software like Telegram. Purple Fox, equipped with a rootkit for stealth, complicates detection and removal. The initial access vector in the Ukrainian campaign remains unknown. CERT-UA recommends organizations keep systems updated, enforce network segmentation, and monitor network traffic for anomalies.</p><p>Simultaneously, security firm Securonix revealed an ongoing phishing campaign, STEADY#URSA, targeting Ukrainian military personnel. The campaign aims to deploy a custom PowerShell backdoor named SUBTLE-PAWS. The attack involves executing a malicious shortcut file, initiating a PowerShell payload. The threat actor behind this campaign is identified as Shuckworm, also known as Aqua Blizzard, Gamaredon, and others, associated with Russia's Federal Security Service (FSB) since at least 2013.</p><p>SUBTLE-PAWS, beyond establishing persistence, employs Telegram's platform Telegraph for command-and-control (C2) communication, a tactic noted since early 2023. The malware can spread through removable drives, using advanced techniques to execute dynamic payloads stored in the Windows Registry. This method enhances evasion of traditional file-based detection, allowing the malware to initiate itself post-reboots or interruptions. The disclosure follows previous reports of Gamaredon's USB-based worm named LitterDrifter, further underscoring the evolving and persistent nature of cyber threats targeting Ukraine.</p><h3><a href="https://hackerpulse.substack.com">HackerPulse</a></h3><p>Want to get a remote job at Amazon?</p><p>Start reading HackerPulse Dispatch &amp; level up your skills as an engineer.</p><p>Get weekly:</p><p>&#128313; Useful Tools &amp; Libs</p><p>&#128313; Best AI paper digests</p><p>&#128313; No-nonsense career boosters</p><p>Go &#128073; <a href="https://hackerpulse.substack.com">https://hackerpulse.substack.com</a></p><h3>Jobs/Internships:</h3><p>Roku - <a href="https://www.weareroku.com/jobs/product-manager-advertising-santa-monica-california-united-states?gh_jid=5666043&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Product Manager, Advertising</a> - Santa Monica, California &#183; On-site</p><p>Coinbase - <a href="https://www.coinbase.com/careers/positions/5107002?gh_jid=5107002&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Site Reliability Engineer - Client Platform</a> - Fully Remote</p><p>Airbnb - <a href="https://careers.airbnb.com/positions/5646843/">Senior Frontend Engineer, Guest Displays &amp; Platforms</a> - On-site</p><p>Intel - <a href="https://jobs.intel.com/en/job/-/-/599/60728759376?source=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Software Engineering Intern - Santa Clara, CA</a> &#183; On-site</p><p>Western Digital - <a href="https://jobs.smartrecruiters.com/WesternDigital/743999964529563-summer-2024-intern-python-development?src=levels.fyi&amp;trid=2d92f286-613b-4daf-9dfa-6340ffbecf73&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Summer 2024 Intern, Python Development</a> - San Jose, CA</p><p>Neuralink - <a href="https://boards.greenhouse.io/neuralink/jobs/5469297003?gh_jid=5469297003&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern, Implant Team</a> - Fremont, California, United States &#183; On-site</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Critical Google Kubernetes Engine Vulnerability Exposes 250,000 Clusters: Threat Actors Could Seize Control with Google Account]]></title><description><![CDATA[Plus, Ransomware Group Kasseika Employs BYOVD Tactic to Disable Security Processes on Windows Hosts]]></description><link>https://www.cyber-oracle.com/p/critical-google-kubernetes-engine</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/critical-google-kubernetes-engine</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Wed, 24 Jan 2024 18:18:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RhZ7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Security Alert: Sys: All Flaw in GKE Puts 250,000 Active Clusters at Risk of Unauthorized Takeover</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RhZ7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RhZ7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp 424w, https://substackcdn.com/image/fetch/$s_!RhZ7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp 848w, https://substackcdn.com/image/fetch/$s_!RhZ7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp 1272w, https://substackcdn.com/image/fetch/$s_!RhZ7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RhZ7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Android Apps by Google LLC on Google Play&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Android Apps by Google LLC on Google Play" title="Android Apps by Google LLC on Google Play" srcset="https://substackcdn.com/image/fetch/$s_!RhZ7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp 424w, https://substackcdn.com/image/fetch/$s_!RhZ7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp 848w, https://substackcdn.com/image/fetch/$s_!RhZ7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp 1272w, https://substackcdn.com/image/fetch/$s_!RhZ7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3067fa7-2974-4e1f-930e-435bbc28a539_3840x2160.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A critical vulnerability named Sys:All has been uncovered in Google Kubernetes Engine (GKE), putting an estimated 250,000 active clusters at risk of unauthorized takeover. Discovered by cloud security firm Orca, the flaw arises from a widespread misconception regarding the system:authenticated group in GKE, allowing any Google-authenticated account (even outside the organization) to be included. Security researcher Ofir Yakobi notes that this misconfiguration, if exploited, could enable external threat actors with a Google account to seize control of the Kubernetes cluster.</p><p>The system:authenticated group, meant to include verified and deterministic identities, includes all authenticated entities, including human users and service accounts. Exploiting this loophole could lead to severe consequences, enabling threat actors to perform lateral movement, engage in cryptomining, execute denial-of-service attacks, and steal sensitive data without leaving traceable links to the originating Gmail or Google Workspace account.</p><p>The attack vector could expose various sensitive data, such as JWT tokens, GCP API keys, AWS keys, Google OAuth credentials, private keys, and credentials to container registries. Following responsible disclosure to Google, the company has taken steps to address the issue, blocking the binding of the system:authenticated group to the cluster-admin role in GKE versions 1.28 and later. Google recommends users avoid binding the system:authenticated group to any RBAC roles and assess and remove unsafe bindings.</p><p>While there is no public record of large-scale attacks exploiting this vulnerability, Orca warns that it could be a matter of time, underscoring the need for users to take immediate steps to secure their cluster access controls. The improvement in GKE versions is acknowledged, but the company emphasizes the continued existence of other roles and permissions that can still be assigned to the system:authenticated group, urging heightened security measures.</p><h3>Emerging Threat: Kasseika Ransomware Utilizes Bring Your Own Vulnerable Driver (BYOVD) Attack for Effective Security Disarmament</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!O-jY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!O-jY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg 424w, https://substackcdn.com/image/fetch/$s_!O-jY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg 848w, https://substackcdn.com/image/fetch/$s_!O-jY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!O-jY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!O-jY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg" width="1106" height="558" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:558,&quot;width&quot;:1106,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits  Martini Driver&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits  Martini Driver" title="Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits  Martini Driver" srcset="https://substackcdn.com/image/fetch/$s_!O-jY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg 424w, https://substackcdn.com/image/fetch/$s_!O-jY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg 848w, https://substackcdn.com/image/fetch/$s_!O-jY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!O-jY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27379bf8-fbd6-482f-8d29-9d1e6fe2921f_1106x558.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The ransomware group Kasseika has adopted the Bring Your Own Vulnerable Driver (BYOVD) attack, following in the footsteps of other threat actors like Akira, AvosLocker, BlackByte, and RobbinHood. Identified by cybersecurity firm Trend Micro in mid-December 2023, Kasseika demonstrates similarities with the now-defunct BlackMatter ransomware, raising suspicions of a potential connection. The BYOVD tactic allows threat actors to terminate antivirus processes and services, facilitating the deployment of ransomware on compromised Windows hosts.</p><p>Kasseika's attack chain begins with a phishing email for initial access, deploying remote administration tools (RATs) to gain privileged access and move laterally within the target network. The threat actors employ Microsoft's Sysinternals PsExec utility to execute a malicious batch script, checking for the existence of the "Martini.exe" process and terminating it if found. The subsequent download and execution of the "Martini.sys" driver aim to disable 991 security tools.</p><p>The ransomware payload, named "smartscreen_protected.exe," then initiates the encryption process using ChaCha20 and RSA algorithms, terminating processes and services accessing Windows Restart Manager. Kasseika demands a 50 bitcoin payment within 72 hours, threatening an additional $500,000 every 24 hours after the deadline. Victims must post a payment screenshot to an actor-controlled Telegram group to receive a decryptor.</p><p>Additionally, Kasseika wipes traces of its activity by clearing the system's event logs using the wevtutil.exe binary, enhancing the challenge for security tools to identify and respond to malicious activities. This development underscores the evolving tactics of ransomware groups, emphasizing the need for robust cybersecurity measures to thwart sophisticated attacks.</p><h3>Jobs/Internships</h3><p>Zip Co - <a href="https://boards.greenhouse.io/zipcolimited/jobs/4299337006?gh_src=e98b4b5b6us&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer, Core Product</a> - Sydney, New South Wales, Australia </p><p>Coinbase - <a href="https://www.coinbase.com/careers/positions/5107002?gh_jid=5107002&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Site Reliability Engineer - Client Platform</a> - Fully Remote</p><p>BlackSky - <a href="https://boards.greenhouse.io/blacksky/jobs/7099976002?gh_jid=7099976002&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Senior Machine Learning Engineer</a> - Fully Remote</p><p>SpaceX - <a href="https://boards.greenhouse.io/spacex/jobs/6917839002?gh_jid=6917839002&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Summer 2024 Software Engineering Internship/Co-op</a> - On-site</p><p>NeuraFlash - <a href="https://boards.greenhouse.io/neuraflash/jobs/5064790004?ref=levels.fyi&amp;utm_source=levels.fyi">UX Design Intern</a> - United States, NY &#183; On-site</p><p>T-Mobile - <a href="https://careers.t-mobile.com/job-details/19764677/?codes=int-levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Summer 2024 Data Science Internship</a> - Bellevue, WA</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Over 178,000 SonicWall Firewalls at Risk: Critical Vulnerabilities Expose Devices to DoS and Remote Code Execution]]></title><description><![CDATA[Plus, Phemedrone Stealer Exploits Patched Windows Flaw: Threat Actors Target Browsers, Crypto Wallets, and Messaging Apps]]></description><link>https://www.cyber-oracle.com/p/over-178000-sonicwall-firewalls-at</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/over-178000-sonicwall-firewalls-at</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 16 Jan 2024 14:40:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NUPS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>SonicOS Flaws Put Massive Number of Devices in Jeopardy; Critical Patches Urged</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NUPS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NUPS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NUPS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NUPS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NUPS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NUPS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg" width="1456" height="711" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:711,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SonicWall SonicOS Operating System | SonicGuard.com&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SonicWall SonicOS Operating System | SonicGuard.com" title="SonicWall SonicOS Operating System | SonicGuard.com" srcset="https://substackcdn.com/image/fetch/$s_!NUPS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NUPS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NUPS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NUPS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc16a65cb-04ee-419f-858d-129932ebe42a_1914x935.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A startling revelation by cybersecurity experts highlights the vulnerability of over 178,000 SonicWall firewalls to critical flaws that could lead to denial-of-service (DoS) and remote code execution (RCE) attacks. The two security vulnerabilities, CVE-2022-22274 and CVE-2023-0656, potentially allow remote, unauthenticated attackers to exploit SonicOS via HTTP requests, triggering stack-based buffer overflows.</p><p>Jon Williams, a senior security engineer at Bishop Fox, emphasizes that the flaws, though fundamentally similar, are exploitable at different HTTP URI paths due to the reuse of a vulnerable code pattern. While there are no reports of active exploitation in the wild, a proof-of-concept (PoC) for CVE-2023-0656 was published in April 2023 by the SSD Secure Disclosure team.</p><p>The cybersecurity firm emphasizes the potential weaponization of these vulnerabilities by malicious actors to induce repeated crashes, forcing the SonicWall appliance into maintenance mode. This action necessitates administrative intervention to restore normal functionality, posing a significant risk to affected devices.</p><p>It's noteworthy that over 146,000 publicly-accessible devices are susceptible to a flaw that was disclosed almost two years ago, underlining the urgency for users to update to the latest versions and ensure that the management interface is not exposed to the internet. The revelation underscores the critical need for proactive measures to safeguard network infrastructure against potential threats exploiting these SonicOS vulnerabilities.</p><h3>Security Alert: Cybercriminals Utilize Microsoft Windows Vulnerability to Deploy Phemedrone Stealer</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oZuX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oZuX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oZuX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oZuX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oZuX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oZuX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg" width="624" height="392" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:392,&quot;width&quot;:624,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign" title="CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign" srcset="https://substackcdn.com/image/fetch/$s_!oZuX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oZuX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oZuX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oZuX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21659c6a-c6cf-42c4-8e0a-a42310107d3f_624x392.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Threat actors are capitalizing on a recently patched security flaw in Microsoft Windows to deploy an open-source information stealer known as Phemedrone Stealer, targeting web browsers, cryptocurrency wallets, and messaging apps such as Telegram, Steam, and Discord. Trend Micro researchers identified the active exploitation of CVE-2023-36025, a security bypass vulnerability in Windows SmartScreen, which Microsoft addressed in its November 2023 Patch Tuesday updates.</p><p>Phemedrone Stealer's capabilities include capturing screenshots, collecting data on hardware, location, and operating system details, and stealing sensitive information. The stolen data is then sent to the attackers via Telegram or their command-and-control (C&amp;C) server. The attack vector involves the use of malicious Internet Shortcut (.URL) files hosted on Discord or cloud services, exploiting CVE-2023-36025 to execute a control panel (.CPL) file that circumvents Windows Defender SmartScreen.</p><p>The researchers outline the infection process, wherein the malicious .CPL file executes a PowerShell loader ("DATA3.txt") that serves as a launchpad for Donut, an open-source shellcode loader. Donut decrypts and executes Phemedrone Stealer, which is actively maintained on GitHub and Telegram by its developers.</p><p>Despite the security patch, threat actors persist in exploiting CVE-2023-36025, showcasing their adaptability in evading Windows Defender SmartScreen protections. The incident underscores the ongoing challenges in securing systems against evolving cyber threats, with attackers swiftly incorporating newly disclosed exploits into their attack chains to maximize impact.</p><h3>Jobs/Internships:</h3><p>The Trade Desk - <a href="https://boards.greenhouse.io/thetradedesk/jobs/4150183007?ref=levels.fyi&amp;utm_source=levels.fyi">2024 Summer Internship - Software Engineering</a> - Hong Kong</p><p>Workato - <a href="https://boards.greenhouse.io/workato">Intern - Technical Program Manager (Partner Success)</a> - Bangalore, India</p><p>Bybit - <a href="https://jobs.bybitglobal.com/social-recruitment/bybit/45685?ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi#/job/69600e98-d1f7-4509-9aab-76ce631eaf18">APP/Mobile Engineer (Full-Time Internship)</a> - Hong Kong, Hong Kong SAR</p><p>Spark Investment Management - <a href="https://www.linkedin.com/jobs/view/phd-computer-scientist-software-developer-%24750k%2B%2B-at-spark-investment-management-llc-3731380315/?ref=levels.fyi&amp;utm_source=levels.fyi">PhD Computer Scientist/Software Developer $750K++</a> - New York, NY</p><p>Roblox - <a href="https://careers.roblox.com/jobs/5445529?gh_jid=5445529&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Principal Technical Program Manager, Engine</a> - San Mateo, CA, United States</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[FBot Emerges: Python-Based Hacking Tool Targets AWS, Microsoft 365, PayPal, and More]]></title><description><![CDATA[Plus, GitHub Becomes a Haven for Cyber Threats: Adversaries Exploit Platform's Ubiquity for Stealthy Malicious Activities]]></description><link>https://www.cyber-oracle.com/p/fbot-emerges-python-based-hacking</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/fbot-emerges-python-based-hacking</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Fri, 12 Jan 2024 01:00:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mFUe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>SentinelOne Uncovers FBot, a New Cloud Hacking Tool with Diverse Attack Capabilities</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mFUe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mFUe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png 424w, https://substackcdn.com/image/fetch/$s_!mFUe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png 848w, https://substackcdn.com/image/fetch/$s_!mFUe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png 1272w, https://substackcdn.com/image/fetch/$s_!mFUe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mFUe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png" width="820" height="490" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:490,&quot;width&quot;:820,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SentinelLabs Details Discovery of FBot Tool for Compromising Cloud Services  - Security Boulevard&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SentinelLabs Details Discovery of FBot Tool for Compromising Cloud Services  - Security Boulevard" title="SentinelLabs Details Discovery of FBot Tool for Compromising Cloud Services  - Security Boulevard" srcset="https://substackcdn.com/image/fetch/$s_!mFUe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png 424w, https://substackcdn.com/image/fetch/$s_!mFUe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png 848w, https://substackcdn.com/image/fetch/$s_!mFUe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png 1272w, https://substackcdn.com/image/fetch/$s_!mFUe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec8ef90d-2157-4de4-8816-a33e53ffa55d_820x490.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A newly discovered Python-based hacking tool named FBot is causing concern in cybersecurity circles as it actively targets web servers, cloud services, content management systems (CMS), and SaaS platforms, including heavyweights like Amazon Web Services (AWS), Microsoft 365, PayPal, Sendgrid, and Twilio. Uncovered by SentinelOne researchers, FBot stands out due to its diverse set of features, including credential harvesting for spamming attacks, tools for AWS account hijacking, and functionalities enabling assaults on PayPal and various SaaS accounts.</p><p>While FBot shares similarities with other cloud hacking tools like AlienFox, GreenBot, Legion, and Predator, it distinguishes itself by not referencing any source code from AndroxGh0st. Its primary objective is to compromise cloud, SaaS, and web services, harvesting credentials for initial access, with the eventual goal of monetizing this access by selling it to other threat actors.</p><p>FBot's capabilities include generating API keys for AWS and Sendgrid, random IP address generation, reverse IP scanning, and validation of PayPal accounts and associated email addresses. Interestingly, FBot initiates PayPal API requests through a retail sales website, "robertkalinkin.com," indicating a noteworthy point of convergence with several Legion Stealer samples.</p><p>The tool also features AWS-specific functionalities, checking for AWS Simple Email Service (SES) email configuration details and determining EC2 service quotas for targeted accounts. Additionally, its Twilio-related functionality gathers information about the account, such as balance, currency, and connected phone numbers.</p><p>SentinelOne uncovered FBot samples dating from July 2022 to the present, suggesting active usage in the wild. While it remains unclear whether the tool is actively maintained and how it's distributed, the cybersecurity firm notes indications that FBot is likely a product of private development work, potentially being distributed through smaller-scale operations. This aligns with the trend of bespoke "private bots" in the realm of cloud attack tools, tailored to individual buyers and highlighting the evolving landscape of cyber threats.</p><h3>Cybersecurity Alert: GitHub's Popularity Exploited by Threat Actors for Command-and-Control and Payload Delivery</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dgBm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dgBm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dgBm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dgBm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dgBm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dgBm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg" width="1100" height="619" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:619,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Why you should start using GitHub Right now? | by Sourav Kumar Nanda |  codeburst&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Why you should start using GitHub Right now? | by Sourav Kumar Nanda |  codeburst" title="Why you should start using GitHub Right now? | by Sourav Kumar Nanda |  codeburst" srcset="https://substackcdn.com/image/fetch/$s_!dgBm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dgBm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dgBm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dgBm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda4eff34-a5c9-4c81-8758-a231a2121f1a_1100x619.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The widespread adoption of GitHub in IT environments has inadvertently turned the platform into a prime choice for threat actors seeking to host and deliver malicious payloads, establish command-and-control (C2) operations, and serve as points for data exfiltration. Recorded Future has coined this tactic as "living-off-trusted-sites" (LOTS), a play on the living-off-the-land (LotL) techniques employed by threat actors to camouflage their activities within legitimate platforms, making detection and attribution more challenging.</p><p>GitHub's appeal to threat actors lies in its ability to blend with legitimate network traffic, effectively evading traditional security defenses. While the platform is not commonly used for full-fledged C2 implementations, it serves as a prevalent dead drop resolver, wherein threat actors leverage actor-controlled GitHub repositories to obtain the actual C2 URL. This tactic is notably employed by malware such as Drokbk and ShellBox.</p><p>Another observed but less frequent use of GitHub by threat actors is for data exfiltration. Recorded Future suggests that this rarity could be attributed to concerns related to file size and storage limitations, as well as discoverability issues.</p><p>Beyond these main schemes, threat actors employ various GitHub features for infrastructure-related purposes. GitHub Pages, for example, have been repurposed as phishing hosts or traffic redirectors, with some campaigns employing GitHub repositories as backup C2 channels.</p><p>This trend aligns with a broader pattern of malicious actors exploiting legitimate internet services, including Google Drive, Microsoft OneDrive, Dropbox, Notion, Firebase, Trello, and Discord. Other source code and version control platforms like GitLab, BitBucket, and Codeberg are also not immune to exploitation.</p><p>Recorded Future emphasizes the complexity of addressing GitHub abuse detection, noting that a combination of detection strategies tailored to specific environments, organizational structures, service usage patterns, and risk tolerance is essential in combating these evolving cyber threats. The report serves as a cybersecurity alert, highlighting the need for heightened vigilance in the face of adversaries leveraging trusted platforms for nefarious purposes.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Google Settles Class-Action Lawsuit Over 'Incognito' Mode Tracking Allegations]]></title><description><![CDATA[Plus, Albania's Assembly and Telecom Giant Hit by Cyber Attacks: Iran-Linked Hacker Group Claims Responsibility]]></description><link>https://www.cyber-oracle.com/p/google-settles-class-action-lawsuit</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/google-settles-class-action-lawsuit</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Wed, 03 Jan 2024 01:40:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3rfB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Privacy Dispute: Google's Incognito Mode Faces Legal Scrutiny and Settlement</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3rfB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3rfB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3rfB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3rfB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3rfB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3rfB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Google Chrome's Incognito mode isn't 100% private | London Evening Standard  | Evening Standard&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Google Chrome's Incognito mode isn't 100% private | London Evening Standard  | Evening Standard" title="Google Chrome's Incognito mode isn't 100% private | London Evening Standard  | Evening Standard" srcset="https://substackcdn.com/image/fetch/$s_!3rfB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3rfB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3rfB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3rfB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a0e652-0457-41e5-b966-cc04701f85cb_1200x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Google has reached a settlement in a lawsuit filed back in June 2020, where the company faced accusations of misleading users about the privacy of their internet activity while using the "incognito" or "private" mode on web browsers. The lawsuit, seeking at least $5 billion in damages, alleged that Google's tracking practices violated federal wiretap laws, allowing the collection of user data despite the presumption of privacy in these modes.</p><p>The specific terms of the settlement remain undisclosed. Plaintiffs argued that Google utilized Google Analytics to gather information even in private mode, amassing a significant volume of user data unbeknownst to those who believed their browsing was shielded from tracking.</p><p>While Google defended itself by highlighting warnings displayed when users activated Chrome's incognito mode, indicating that some information might still be visible to certain entities, U.S. District Judge Yvonne Gonzalez Rogers contested this defense. The Judge ruled that Google's failure to explicitly inform users about the extent of data collection in incognito mode nullified the argument that users had consented to this tracking.</p><p>Importantly, enabling incognito or private mode merely prevents the local storage of browsing history, providing users with a browsing session without saving data on the device. However, this does not prevent websites utilizing advertising technologies and analytics APIs from tracking and potentially correlating user activity, such as IP addresses, within that session.</p><p>This legal battle underlines the nuances of online privacy and user consent, shedding light on the complexities surrounding how user data is managed, tracked, and disclosed by tech giants. The settlement brings closure to this contentious issue, prompting a reexamination of the transparency and user notification practices in digital privacy policies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>National Security Alarms Sound as Attacks Strike Albanian Infrastructure</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gKH7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gKH7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png 424w, https://substackcdn.com/image/fetch/$s_!gKH7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png 848w, https://substackcdn.com/image/fetch/$s_!gKH7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png 1272w, https://substackcdn.com/image/fetch/$s_!gKH7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gKH7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png" width="1200" height="857" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:857,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Albania - Wikipedia&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Albania - Wikipedia" title="Albania - Wikipedia" srcset="https://substackcdn.com/image/fetch/$s_!gKH7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png 424w, https://substackcdn.com/image/fetch/$s_!gKH7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png 848w, https://substackcdn.com/image/fetch/$s_!gKH7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png 1272w, https://substackcdn.com/image/fetch/$s_!gKH7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fd0e3e2-dc21-4099-bfec-b9c340ba4d2f_1200x857.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Albania faced another wave of cyber assaults targeting significant entities, including the Assembly of the Republic and One Albania, revealed by the country's National Authority for Electronic Certification and Cyber Security (AKCESK). Despite these attacks not currently classified as critical infrastructure under prevailing legislation, they've raised concerns about the nation's cybersecurity defenses.</p><p>One Albania, serving a substantial subscriber base, reassured customers via Facebook that its services remained unscathed by the security incident, asserting the swift handling of the situation.</p><p>AKCESK disclosed that the intrusions originated from non-Albanian IP addresses, emphasizing their real-time identification of potential threats. Efforts are now focused on tracking the source, restoring compromised systems, and reinforcing security measures to thwart future incidents.</p><p>The agency's proactive response includes a thorough review and bolstering of existing cybersecurity strategies prompted by this breach.</p><p>Although the full scale of the attacks remains unclear, an Iranian hacker group named Homeland Justice claimed responsibility on its Telegram channel. The group's statement also mentioned breaching Air Albania, the country's flag carrier airline, in a quest to target "supporters of terrorists," amplifying the gravity of the situation.</p><p>This development follows prior cyber assaults on Albanian government services in mid-July 2022, where Homeland Justice similarly claimed responsibility. These previous attacks prompted the U.S. government to impose sanctions on Iran's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence, Esmail Khatib, citing their involvement in cyber-enabled activities against the U.S. and its allies. The recent events in Albania underscore the persistent challenges in safeguarding against international cyber threats and highlight the need for robust defense mechanisms in the face of evolving cyber warfare tactics.</p><h3>Jobs/Internships:</h3><p>ByteDance - <a href="https://jobs.bytedance.com/en/position/7238824732342667557/detail?spread=BSPP2KS&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Operating System Software Engineer (Operating System), System Technologies and Engineering</a> - Singapore</p><p>Microsoft - <a href="https://jobs.careers.microsoft.com/us/en/job/1673175/Product-Manager?jobsource=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi">Product Manager</a> - Redmond, WA</p><p>Northrop Gruman - <a href="https://www.northropgrumman.com/jobs/Engineering/MissionQuality-Assurance/United-States-of-America/Pennsylvania/Philadelphia/R10143717/sr-principal-engineer-quality?ref=levels.fyi&amp;src=levels.fyi&amp;utm_campaign=engineering1&amp;jClickId=cb260f76-bcce-48a0-87e0-b35790ecdace&amp;utm_audience=null&amp;utm_medium=jobboard&amp;utm_code=JB-18202&amp;utm_format=null&amp;utm_content=null&amp;utm_source=linkedin-organic&amp;source=JB-18202">Sr. Principal Engineer Quality</a> - Philadelphia, PA</p><p>Facebook - <a href="https://www.metacareers.com/jobs/1537475243691167/?rx_campaign=levels.fyi1&amp;rx_ch=connector&amp;rx_group=126320&amp;rx_job=a1k2k0000036xauuay_1006&amp;rx_medium=post&amp;rx_r=none&amp;rx_source=linkedin&amp;rx_ts=20240101t184801z&amp;rx_vp=slots&amp;utm_campaign=job%2Bboard&amp;utm_medium=jobs&amp;utm_source=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi&amp;rx_viewer=7c38052c949811eeb9114f2b19c6062dc84266bfc3144bef8294d09d6d6f0fb6">Data Engineering Intern, Analytics</a> - San Francisco, CA</p><p>Panasonic - <a href="https://careers.na.panasonic.com/careers/software-engineering-intern?__jvst=Job%20Board&amp;__jvsd=levels.fyi&amp;nl=1">Software Engineering Intern</a> - Irvine, CA</p><p>Mastercard - <a href="https://careers.mastercard.com/us/en/job/MASRUSR210201EXTERNALENUS/Data-Scientist-Intern-Internship-Program-2024-Dubai-United-Arab-Emirates?utm_medium=phenom-feeds&amp;source=levels.fyi&amp;utm_source=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi">Data Scientist Intern, Internship Program 2024</a> - Dubai, United Arab Emirates</p>]]></content:encoded></item><item><title><![CDATA[Over 15,000 GitHub Repositories Vulnerable to "Repojacking" Attacks, Threatening Software Supply Chain]]></title><description><![CDATA[Plus, Unveiling Post-Exploitation Deception: Fake Lockdown Mode on Compromised iPhones Threatens Security]]></description><link>https://www.cyber-oracle.com/p/over-15000-github-repositories-vulnerable</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/over-15000-github-repositories-vulnerable</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 05 Dec 2023 16:01:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!17ID!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Unveiling Vulnerabilities in Go Modules and Exposed API Tokens Highlight Perils to Open-Source Integrity</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!17ID!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!17ID!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png 424w, https://substackcdn.com/image/fetch/$s_!17ID!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png 848w, https://substackcdn.com/image/fetch/$s_!17ID!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png 1272w, https://substackcdn.com/image/fetch/$s_!17ID!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!17ID!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png" width="1400" height="791" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:791,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!17ID!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png 424w, https://substackcdn.com/image/fetch/$s_!17ID!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png 848w, https://substackcdn.com/image/fetch/$s_!17ID!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png 1272w, https://substackcdn.com/image/fetch/$s_!17ID!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdda3f924-4c99-4b71-9c24-8f51fd6aa6c5_1400x791.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>New findings reveal a vulnerability in over 15,000 Go module repositories hosted on GitHub, exposing them to a threat termed "repojacking." Repojacking exploits changes or deletions in account usernames, allowing malicious actors to create repositories under the same name and former username to execute open-source software supply chain attacks.</p><p>Chief Technology Officer at VulnCheck, Jacob Baines, highlighted the issue, stating that more than 9,000 repositories are vulnerable due to GitHub username changes, with an additional 6,000 susceptible to account deletions. These repositories collectively house a staggering 800,000 Go module-versions.</p><p>Repojacking poses a significant risk to software repositories on GitHub, as malicious actors can leverage username changes or deletions to stage attacks, particularly affecting Go programming language modules. Unlike other package managers like npm or PyPI, Go modules are decentralized, published on version control platforms, making them more prone to such attacks.</p><p>The attack involves an attacker registering an unused username, duplicating a module repository, and publishing a new module to caching platforms like proxy.golang.org and go.pkg.dev. This bypasses GitHub's countermeasure of popular repository namespace retirement, which blocks attempts to create repositories with retired namespaces cloned more than 100 times. Vulnerability in Go modules remains as they are cached by the module mirror, allowing possible bypasses despite less frequent cloning.</p><p>VulnCheck highlighted the challenge in mitigating these repojackings, suggesting that a resolution requires intervention from either Go or GitHub. Baines advised Go developers to remain vigilant about the modules they use and the state of their repositories.</p><p>Additionally, a separate disclosure by Lasso Security revealed the exposure of 1,681 API tokens on platforms like Hugging Face and GitHub, including tokens linked to major companies like Google, Meta, Microsoft, and VMware. These exposed tokens pose threats of supply chain attacks, training data poisoning, and model theft.</p><p>The discoveries highlight the urgency for enhanced security measures on repository platforms and increased awareness among developers to safeguard against potential vulnerabilities and attacks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Insights into a Novel Technique to Circumvent iOS Security Measures, Exploiting Lockdown Mode Vulnerabilities</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6lqj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6lqj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png 424w, https://substackcdn.com/image/fetch/$s_!6lqj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png 848w, https://substackcdn.com/image/fetch/$s_!6lqj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png 1272w, https://substackcdn.com/image/fetch/$s_!6lqj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6lqj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6lqj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png 424w, https://substackcdn.com/image/fetch/$s_!6lqj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png 848w, https://substackcdn.com/image/fetch/$s_!6lqj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png 1272w, https://substackcdn.com/image/fetch/$s_!6lqj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7837b5-e67c-40f3-9b39-a28977894d9c_1600x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Researchers at Jamf Threat Labs have unveiled a worrying technique that exploits an iPhone's Lockdown Mode, creating a deceptive appearance of heightened security while covertly maintaining access to compromised devices. Lockdown Mode, introduced by Apple as a security feature with the release of iOS 16, is designed to protect individuals, especially high-risk targets, from sophisticated digital threats such as spyware. However, despite its intended purpose, Lockdown Mode doesn't prevent malware execution on infected devices. This vulnerability allows attackers, having infiltrated a device through other security flaws, to activate a simulated Lockdown Mode, misleading users into believing their device is secure.</p><p>The fake Lockdown Mode is achieved by manipulating specific functions triggered when the setting is activated. By manipulating these functions, such as setLockdownModeGloballyEnabled, the attacker can create a fake Lockdown Mode, generate a file ("/fakelockdownmode_on"), and initiate a userspace reboot. This reboot terminates all processes and restarts the system, appearing to activate Lockdown Mode, yet it doesn't affect the kernel. As a result, any malware present on the device without persistence mechanisms continues to exist and operate even after this type of reboot, enabling surreptitious surveillance of the device's users.</p><p>Furthermore, attackers can alter Lockdown Mode settings within the Safari web browser, potentially allowing access to PDF files, which are usually restricted when Lockdown Mode is enabled.</p><p>While Lockdown Mode has been elevated to a kernel-level security feature in iOS 17, making it more difficult to modify without a system reboot, this discovery highlights potential vulnerabilities in thwarting post-exploitation tampering attempts. This latest revelation follows a previous demonstration by Jamf, where they illustrated a method to maintain access to an Apple device by tricking users into believing their device's Airplane Mode was activated. These discoveries underscore the ongoing challenges in fortifying iOS devices against sophisticated exploitation attempts.</p><h3>Jobs/Internships:</h3><p>Sysdig - <a href="https://boards.greenhouse.io/sysdig/jobs/5388399?ref=levels.fyi&amp;utm_source=levels.fyi">Director of Engineering</a> - Hybrid</p><p>Rocket Lab - <a href="https://boards.greenhouse.io/rocketlab/jobs/5820161003?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer - Operations</a> - Long Beach, California, United States &#183; On-site</p><p>Brex - <a href="https://www.brex.com/careers/7005784002?gh_jid=7005784002&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer, Product Security</a> - On-site</p><p>Plume - <a href="https://www.plume.com/career-opportunities/7049718002/job?gh_jid=7049718002&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern - Palo Alto, CA</a> &#183; Hybrid</p><p>Humane - <a href="https://boards.greenhouse.io/humane/jobs/5029926004?ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineering Intern, Device Experiences</a> - San Francisco, CA &#183; On-site</p><p>Instro - <a href="https://boards.greenhouse.io/insitro/jobs/4295590006?ref=levels.fyi&amp;utm_source=levels.fyi">Data Science &amp; Machine Learning Intern</a> - South San Francisco, CA &#183; On-site</p>]]></content:encoded></item><item><title><![CDATA[Critical Vulnerabilities Expose Windows Hello Authentication on Popular Laptops: Research]]></title><description><![CDATA[Plus, Indie AI Tools: The Unchecked Frontier in Enterprise Security Threats]]></description><link>https://www.cyber-oracle.com/p/critical-vulnerabilities-expose-windows</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/critical-vulnerabilities-expose-windows</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 28 Nov 2023 16:00:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TekK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Blackwing Intelligence Uncovers Exploitable Weaknesses in Fingerprint Sensors of Dell, Lenovo, and Microsoft Devices</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TekK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TekK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png 424w, https://substackcdn.com/image/fetch/$s_!TekK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png 848w, https://substackcdn.com/image/fetch/$s_!TekK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png 1272w, https://substackcdn.com/image/fetch/$s_!TekK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TekK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png" width="618" height="337" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:337,&quot;width&quot;:618,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TekK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png 424w, https://substackcdn.com/image/fetch/$s_!TekK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png 848w, https://substackcdn.com/image/fetch/$s_!TekK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png 1272w, https://substackcdn.com/image/fetch/$s_!TekK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a54f74e-15f9-4827-8065-af5c9e446640_618x337.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>New research from Blackwing Intelligence has unveiled a series of vulnerabilities posing a significant risk to Windows Hello authentication on Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X laptops. The flaws, identified in the fingerprint sensors manufactured by Goodix, Synaptics, and ELAN, could potentially bypass the authentication process.</p><p>Researchers Jesse D'Aguanno and Timo Ter&#228;s discovered weaknesses in the "match on chip" (MoC) fingerprint sensors, which integrate biometric management functions directly into the sensor's integrated circuit. Despite MoC preventing stored fingerprint data replay, it fails to stop a malicious sensor from falsely authenticating a user or replaying previously recorded host-sensor communications.</p><p>The vulnerabilities in the sensors, particularly ELAN, Synaptics, and Goodix, open avenues for adversary-in-the-middle (AitM) attacks and bypassing Secure Device Connection Protocol (SDCP) protections. ELAN's lack of SDCP support enables USB devices to mimic the fingerprint sensor and authenticate unauthorized users.</p><p>Synaptics' flawed implementation, turning off SDCP by default and relying on an insecure Transport Layer Security (TLS) stack, facilitates the circumvention of biometric authentication.</p><p>Exploiting Goodix's sensor involves taking advantage of differences in enrollment operations between Windows and Linux systems, leveraging cleartext USB communication and unauthenticated configuration packets to bypass authentication.</p><p>To address these vulnerabilities, the researchers recommend OEMs enable SDCP and conduct audits by independent experts on fingerprint sensor implementations. Despite Microsoft's efforts with SDCP, device manufacturers' misinterpretation of its objectives and the limited coverage of device operations leave substantial attack surfaces exposed.</p><p>This revelation echoes previous instances where Windows Hello biometric authentication was compromised, underscoring the need for continuous improvements and meticulous scrutiny of security implementations in biometric authentication systems.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>As Employee Demand Soars, CISOs Wrestle with Risks Posed by Unsuspected AI Adoptions</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d7Wy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d7Wy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png 424w, https://substackcdn.com/image/fetch/$s_!d7Wy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png 848w, https://substackcdn.com/image/fetch/$s_!d7Wy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png 1272w, https://substackcdn.com/image/fetch/$s_!d7Wy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d7Wy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png" width="800" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!d7Wy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png 424w, https://substackcdn.com/image/fetch/$s_!d7Wy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png 848w, https://substackcdn.com/image/fetch/$s_!d7Wy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png 1272w, https://substackcdn.com/image/fetch/$s_!d7Wy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd49eff5-0cbb-419a-b768-36bd3ad1fd81_800x480.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The rapid adoption of AI tools by employees outside conventional review procedures is becoming a significant challenge for CISOs and cybersecurity teams, mirroring the historical dilemma posed by shadow IT in the SaaS landscape. With AI, the surge in employee-driven demand for tools, exemplified by ChatGPT's swift ascent to 100 million users, intensifies the pressure on security teams to accommodate this trend.</p><p>While studies highlight a potential 40% boost in productivity through generative AI, the urgency to fast-track AI adoption without proper scrutiny is mounting. However, succumbing to these demands introduces serious risks of SaaS data leakage and breaches, especially with employees gravitating towards AI tools developed by small entities and indie developers.</p><p>Indie AI startups, boasting tens of thousands of apps, entice users with freemium models and product-led growth strategies but typically lack the stringent security measures inherent in enterprise-grade solutions. Offensive security engineer and AI researcher Joseph Thacker outlines the risks associated with these indie AI tools:</p><p>Data Leakage: Generative AI tools have broad access to user inputs, leading to potential data exposure and leaks, as seen in the case of leaked ChatGPT chat histories.</p><p>Content Quality Issues: Large language models (LLMs) can generate inaccurate or nonsensical outputs (termed hallucinations), raising concerns about misinformation and ethical considerations.</p><p>Product Vulnerabilities: Smaller organizations behind indie AI tools often overlook addressing common product vulnerabilities, making them more susceptible to various attack vectors.</p><p>Compliance Risk: Non-compliance with established data privacy laws and regulations (like SOC 2 compliance) could result in hefty penalties for organizations using these tools.</p><p>Connecting indie AI tools to enterprise SaaS apps elevates productivity but significantly amplifies the risk of backdoor attacks. AI-to-SaaS connections, facilitated by OAuth access tokens, inherit lax security standards of indie AI tools, creating potential entry points for threat actors targeting sensitive data within organizational SaaS systems.</p><p>To mitigate these risks, CISOs and cybersecurity teams should focus on fundamental strategies:</p><p>Standard Due Diligence: Understand and review AI tool terms thoroughly.</p><p>Application and Data Policies: Establish clear guidelines on allowed AI tools and data usage.</p><p>Employee Training: Educate employees on risks and policy adherence.</p><p>Vendor Assessments: Scrutinize security measures and compliance of indie AI vendors.</p><p>Communication and Accessibility: Establish open dialogue and clear guidelines for AI tool usage.</p><p>Creating an environment where security is seen as a business enabler rather than a barrier is crucial for long-term SaaS and AI security. Aligning cybersecurity goals with business objectives fosters cooperation and compliance, reducing the chances of unauthorized AI tool adoptions that jeopardize SaaS security.</p><h3>Jobs/Internships</h3><p>Iterable - <a href="https://iterable.com/company/job/?gh_jid=5511659&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer, Backend (Ecosystems)</a> - Fully Remote</p><p>Coupang - <a href="https://www.coupang.jobs/en/jobs/job/staff-backend-engineer-fts-data-science-5341394/?gh_jid=5341394&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Staff, Backend Engineer (FTS-Data Science)</a> - Seoul, South Korea &#183; On-site</p><p>Ripple - <a href="https://ripple.com/careers/all-jobs/job/4473025/?gh_jid=4473025&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Staff Software Engineer, Finance Engineering</a> - Toronto, Canada &#183; On-site</p><p>HashiCorp - <a href="https://www.hashicorp.com/career/5523956?gh_jid=5523956&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineering Intern</a> - Hybrid</p><p>Datto - <a href="https://boards.greenhouse.io/openmesh/jobs/4145207007?gh_src=d80409e77us&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Junior Software Engineer Intern</a> - Sydney Central Business District, New South Wales, Australia &#183; On-site</p><p>Thermo Fisher Scientific - <a href="https://jobs.thermofisher.com/global/en/job/r-01208452/software-engineering-intern?rx_ch=jobpost&amp;rx_job=r-01208452-2&amp;rx_medium=post&amp;rx_paid=0&amp;rx_r=none&amp;rx_source=levels.fyi&amp;rx_ts=20231126t204202z&amp;rx_vp=linkedindirectindex&amp;utm_medium=post&amp;utm_source=recruitics_linkedindirectindex&amp;refId=34jd24&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi&amp;rx_viewer=dd308d7f49bc11eeaf32c927aa7d3a0d8137d4a9b28a4dd39474c20430b901d5">Software Engineering Intern</a> - Pleasanton, CA</p><p>Ubisoft - <a href="https://jobs.smartrecruiters.com/Ubisoft2/743999946579780-machine-learning-engineer-assistant-internship-6-month-february-march-2024-f-h-nb-?ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Machine Learning Engineer Assistant &#8211; Internship (6-month) February/March 2024 (F/H/NB)</a> - Paris, &#206;le-de-France, France</p>]]></content:encoded></item><item><title><![CDATA[FCC Implements New Safeguards Against SIM-Swapping Scams and Port-Out Frauds]]></title><description><![CDATA[Plus, Russian Cyber Espionage Groups Unleash New Worm and Exploit Tactics in Targeted Attacks on Ukraine]]></description><link>https://www.cyber-oracle.com/p/fcc-implements-new-safeguards-against</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/fcc-implements-new-safeguards-against</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 21 Nov 2023 16:00:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3SVY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Regulatory Measures Aimed at Curtailing Malicious Attacks on Consumer Phone Accounts</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3SVY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3SVY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png 424w, https://substackcdn.com/image/fetch/$s_!3SVY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png 848w, https://substackcdn.com/image/fetch/$s_!3SVY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png 1272w, https://substackcdn.com/image/fetch/$s_!3SVY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3SVY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png" width="1411" height="1411" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1411,&quot;width&quot;:1411,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3SVY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png 424w, https://substackcdn.com/image/fetch/$s_!3SVY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png 848w, https://substackcdn.com/image/fetch/$s_!3SVY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png 1272w, https://substackcdn.com/image/fetch/$s_!3SVY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d8ff9ae-2ceb-4610-9199-1adc2dedae20_1411x1411.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The U.S. Federal Communications Commission (FCC) has announced the adoption of new regulations designed to shield consumers from cell phone account scams, particularly targeting SIM-swapping attacks and port-out frauds orchestrated by malicious actors.</p><p>These rules aim to protect consumers from scammers who execute covert SIM card swaps or transfer phone numbers to new carriers without gaining physical access to a victim's phone, as stated by the FCC this week.</p><p>SIM swapping involves transferring a user's account to a SIM card controlled by a scammer by convincing the victim's wireless carrier. Conversely, port-out fraud occurs when a bad actor, posing as the victim, moves their phone number from one service provider to another without the victim's knowledge.</p><p>The newly adopted rules, proposed in July 2023, mandate wireless providers to implement secure authentication methods before redirecting a customer's phone number to a new device or provider.</p><p>Furthermore, these regulations demand that customers receive immediate notifications whenever a SIM change or port-out request occurs on their accounts, allowing them to take necessary steps to protect themselves against such attacks.</p><p>The severity of SIM swapping as a threat has been evident, enabling threat actors like LAPSUS$ and Scattered Spider to infiltrate corporate networks. By gaining control of a victim's phone number, attackers can intercept SMS-based two-factor authentication codes, leading to the compromise of victims' online accounts.</p><p>FCC Commissioner Geoffrey Starks highlighted the importance of secure verification procedures and privacy guarantees from wireless providers to protect consumers. He emphasized the need for consumers to feel secure without fearing unauthorized phone control.</p><p>In addition to these measures, the FCC has announced an inquiry into the impact of artificial intelligence (AI) on robocalls and robotexts. While AI could enhance tools to block unwanted calls and texts, the agency recognizes the potential for AI to aid bad actors in defrauding consumers by mimicking trusted voices or sources.</p><p>The FCC's proactive steps aim to reinforce security in telecommunications and mitigate evolving threats, ensuring consumer confidence and trust in the integrity of phone services amidst technological advancements and emerging risks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Check Point Reveals Intricate Techniques Employed by Gamaredon and APT29 in State-Sponsored Campaigns</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rkPS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rkPS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png 424w, https://substackcdn.com/image/fetch/$s_!rkPS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png 848w, https://substackcdn.com/image/fetch/$s_!rkPS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png 1272w, https://substackcdn.com/image/fetch/$s_!rkPS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rkPS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png" width="800" height="420" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:420,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rkPS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png 424w, https://substackcdn.com/image/fetch/$s_!rkPS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png 848w, https://substackcdn.com/image/fetch/$s_!rkPS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png 1272w, https://substackcdn.com/image/fetch/$s_!rkPS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F662ba057-3d84-4bc2-a5df-053e675a4041_800x420.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been identified utilizing a USB-propagating worm, dubbed LitterDrifter, in a series of attacks targeting entities within Ukraine. Check Point, uncovering the latest tactics of the Gamaredon group, highlighted their large-scale campaigns focused on espionage objectives.</p><p>LitterDrifter, a multifaceted worm, spreads through USB drives and establishes communication with command-and-control (C&amp;C) servers. Written in VBS, its spreader module conceals the malware in USB drives alongside a randomized LNK file. Notably, the worm's C&amp;C strategy involves using domains as placeholders for circulating IP addresses used as C2 servers.</p><p>The worm's ability to connect to a C&amp;C server extracted from a Telegram channel has been observed repeatedly throughout the year, indicating its adaptive tactics. Although primarily targeting Ukraine, signs of potential infection outside the region were detected across various countries.</p><p>Gamaredon's evolving attack methods have exhibited rapid data exfiltration capabilities, highlighting the group's efficiency in transmitting sensitive information within an hour of the initial compromise. Check Point concluded that LitterDrifter was designed for expansive data collection, employing straightforward yet highly effective techniques to target a broad spectrum of entities in the region.</p><p>Concurrently, Ukraine's National Cybersecurity Coordination Center (NCSCC) reported Russian state-sponsored hacker intrusions targeting European embassies, leveraging the WinRAR vulnerability (CVE-2023-38831). Attributed to APT29, these attacks employed benign-looking lures offering BMWs for sale, with the attack chain exploiting the vulnerability to deploy a PowerShell script from a remote server.</p><p>NCSCC highlighted the growing sophistication and popularity of exploiting the CVE-2023-38831 vulnerability by Russian intelligence services, demonstrating a concerning trend in cyber operations.</p><p>Additionally, the Computer Emergency Response Team of Ukraine (CERT-UA) identified a phishing campaign deploying malicious RAR archives masquerading as Security Service of Ukraine (SBU) documents. Tracked as UAC-0050, this campaign aimed at state authorities in Ukraine, deploying the Remcos RAT through deceptive executable files within the archives.</p><p>These recent revelations underscore the escalating cyber threats faced by Ukraine, portraying a landscape wherein advanced espionage groups continually refine their tactics and exploit vulnerabilities to infiltrate critical entities, emphasizing the necessity for heightened vigilance and robust cybersecurity measures.</p><h3>Jobs/Internships:</h3><p>Cognite - <a href="https://jobs.lever.co/cognite/1182db9f-a1b9-4d2a-ac18-cfceaffd1d81/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Machine Learning Engineer</a> - Austin, Texas &#183; Hybrid</p><p>Everbridge - <a href="https://jobs.lever.co/everbridge/6460b238-2fb3-4040-856f-3db9c6392929/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer I</a> - Lansing, MI &#183; Hybrid</p><p>Mistplay - <a href="https://jobs.lever.co/mistplay/01bb50fd-8ad8-4518-951d-ae76ad6130c2/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Manager, DevOps Engineering</a> - Fully Remote</p><p>Coinbase - <a href="https://www.coinbase.com/careers/positions/5458493?gh_jid=5458493&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Summer 2024 - Product Design Intern</a> - Fully Remote</p><p>Freddie Mac - <a href="https://careers.freddiemac.com/us/en/job/FRMAUSJR11159EXTERNAL/Single-Family-Software-Developer-Intern-Summer-2024-Hybrid-3-Days-in-Office?utm_source=levels.fyi&amp;utm_medium=phenom-feeds&amp;utm_medium=phenom-feeds&amp;ref=levels.fyi&amp;src=levels.fyi">Single-Family Software Developer Intern - Summer 2024 (Hybrid - 3 Days in Office)</a> - McLean, VA &#183; Hybrid</p><p>The Aerospace Corporation - <a href="https://aero.wd5.myworkdayjobs.com/External/job/El-Segundo-CA/XMLNAME-2024-Data-Science-Graduate-Intern--_R009328?ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">2024 Data Science Graduate Intern</a> -&nbsp; Colorado Springs, CO &#183; El Segundo, CA &#183; Hybrid</p>]]></content:encoded></item><item><title><![CDATA[Dependabot's Deception: Uncovering Vulnerabilities in CI/CD Pipelines]]></title><description><![CDATA[Plus, Vietnamese Cyber Threat Actors Evolve Tactics with Delphi-Powered Malware Targeting Facebook Business Accounts]]></description><link>https://www.cyber-oracle.com/p/dependabots-deception-uncovering</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/dependabots-deception-uncovering</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 14 Nov 2023 16:01:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Balancing Automation and Security in Modern Software Development</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jNf7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jNf7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png 424w, https://substackcdn.com/image/fetch/$s_!jNf7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png 848w, https://substackcdn.com/image/fetch/$s_!jNf7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png 1272w, https://substackcdn.com/image/fetch/$s_!jNf7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jNf7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png" width="770" height="462" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:462,&quot;width&quot;:770,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jNf7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png 424w, https://substackcdn.com/image/fetch/$s_!jNf7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png 848w, https://substackcdn.com/image/fetch/$s_!jNf7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png 1272w, https://substackcdn.com/image/fetch/$s_!jNf7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f58e6af-3b82-4c06-aba6-14e06c39d8f7_770x462.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Dependabot, lauded as a revolutionary tool in software development for simplifying the arduous task of managing outdated dependencies, recently faced a significant issue highlighted by Checkmarx. This issue exposed a vulnerability exploited by malicious actors who leveraged Dependabot's credibility, attempting to deceive developers by impersonating the tool and pushing changes disguised as authentic suggestions. While Dependabot represents a considerable advancement in automating software maintenance, this incident brings to light inherent vulnerabilities within Continuous Integration and Continuous Deployment (CI/CD) workflows.</p><p>The advent of CI/CD workflows has substantially transformed the landscape of software development. These workflows enable developers to seamlessly merge code and deploy it to production environments while ensuring high standards of code quality and security. However, they also act as conduits between the external and internal realms of development, creating potential risks. For instance, there are concerns about the incorporation of unvetted third-party libraries or the insecure management of external APIs, which can lead to the integration of malicious code or expose sensitive credentials.</p><p>Despite the industry's push towards secure-by-design workflows, platforms such as GitHub Actions and GitLab CI/CD often prioritize user-friendliness over robust security measures. This trade-off can result in inherent vulnerabilities. Issues like the inadvertent leakage of sensitive information, including credentials, remain prevalent concerns. These vulnerabilities are further exacerbated by misconfigurations and breaches in CI/CD provider systems.</p><p>To fortify CI/CD pipelines and ensure the security of the software supply chain, developers and organizations must adopt proactive security measures. Recommendations encompass several strategies, including enforcing strict access controls, implementing multi-factor authentication (MFA), utilizing OpenID Connect for secure external connections, vetting pre-reviewed dependencies, securing runtime secrets, deploying advanced defense systems like honeytokens, and adopting scalable solutions for monitoring and incident management.</p><p>The necessity of a holistic approach is paramount, emphasizing vigilance and proactive measures. Solutions like the GitGuardian Platform serve as comprehensive tools aiding organizations in monitoring and preventing CI/CD incidents, thereby fortifying security in software development pipelines. By collectively adopting these strategies, organizations can establish adaptable security protocols, mitigating evolving threats within CI/CD workflows and the broader software supply chain landscape.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Kaspersky Uncovers Advanced Ducktail Stealer Campaign Aimed at Indian Marketing Professionals</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aqxq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aqxq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png 424w, https://substackcdn.com/image/fetch/$s_!aqxq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png 848w, https://substackcdn.com/image/fetch/$s_!aqxq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png 1272w, https://substackcdn.com/image/fetch/$s_!aqxq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aqxq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png" width="600" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aqxq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png 424w, https://substackcdn.com/image/fetch/$s_!aqxq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png 848w, https://substackcdn.com/image/fetch/$s_!aqxq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png 1272w, https://substackcdn.com/image/fetch/$s_!aqxq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e14db55-7f3a-4468-ad87-db23df5bb1aa_600x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Vietnamese threat actors associated with the Ducktail stealer malware have expanded their cyber operations in a campaign that specifically targeted marketing professionals in India between March and early October 2023, with a focus on hijacking Facebook business accounts.</p><p>Kaspersky's recent report highlighted a significant departure in the attackers' strategy. Unlike previous campaigns reliant on .NET applications, this one utilized Delphi as its programming language. Ducktail, alongside Duckport and NodeStealer, comprises a cybercrime ecosystem originating from Vietnam. The attackers leveraged sponsored Facebook ads to propagate malicious content, aiming to deploy malware capable of extracting victims' login cookies and assuming control of their accounts.</p><p>The modus operandi of these attacks primarily targets users with access to a Facebook Business account. Once unauthorized access is gained, the fraudsters exploit the accounts for financial gain by placing advertisements, perpetuating the infections further.</p><p>The campaign detailed by the Russian cybersecurity firm involved sending archive files to potential victims disguised as PDFs. Upon opening the file, a malicious executable is launched, saving a PowerShell script and a decoy PDF locally. The script, leveraging the default PDF viewer, initiates a series of actions, including pausing the Chrome browser process.</p><p>The executable further downloads and executes a rogue library named libEGL.dll, scanning specific folders for Chromium-based browser shortcuts. The malware alters these shortcuts, appending a command line switch to launch a rogue extension camouflaged as the legitimate Google Docs Offline add-on.</p><p>This rogue extension covertly sends information about open tabs to a server controlled by the threat actors in Vietnam while simultaneously hijacking the targeted Facebook business accounts.</p><p>This evolution in tactics, deploying Delphi-based malware and employing intricate techniques to infiltrate and manipulate browser extensions, signals an escalated threat level and a shift towards more sophisticated cyber operations by these Vietnamese threat actors. This revelation underscores the evolving nature of cyber threats and the importance of heightened vigilance and security measures to counter such advanced attacks in the digital landscape.</p><h3>Jobs/Internships:</h3><p>Coinbase - <a href="https://www.coinbase.com/careers/positions/5104457?gh_jid=5104457&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Senior Product Manager, Base Ecosystem</a> - Fully Remote</p><p>Roku - <a href="https://www.weareroku.com/jobs/senior-software-engineer-cloud-services-roku-pay-bengaluru-karnataka-india?gh_jid=5496736&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer, Cloud Services - Roku Pay</a> - Bengaluru, India &#183; On-site</p><p>Motional - <a href="https://motional.com/open-positions?gh_jid=5735999003&amp;ref=levels.fyi&amp;utm_source=levels.fyi#/5735999003">Senior Software Engineer, Real-Time Infrastructure</a> - Singapore, Central, Singapore &#183; On-site</p><p>Discord - <a href="https://boards.greenhouse.io/discord/jobs/7005241002?ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern, Data Products</a> - Fully Remote</p><p>NBC - <a href="https://jobs.smartrecruiters.com/NBCUniversal3/743999944030994-software-engineering-internships-summer-2024?ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Software Engineering Internships &#8211; Summer 2024</a> - Universal City, CA</p><p>Neuralink - <a href="https://boards.greenhouse.io/neuralink/jobs/5752879003?gh_jid=5752879003&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineering Intern, Implant and Robot Manufacturing</a> - Fremont, California, United States &#183; On-site</p>]]></content:encoded></item><item><title><![CDATA[Arid Viper, Aligned with Hamas, Behind Android Spyware Campaign Targeting Arabic-speaking Users]]></title><description><![CDATA[Plus, Iranian Nation-State Hacking Group "Agonizing Serpens" Targets Israeli Higher Education and Tech Sectors with Destructive Cyber Attacks]]></description><link>https://www.cyber-oracle.com/p/arid-viper-aligned-with-hamas-behind</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/arid-viper-aligned-with-hamas-behind</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 07 Nov 2023 16:00:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rgGy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Cyber espionage group Arid Viper linked to Hamas deploys counterfeit dating app to harvest data from infected devices</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rgGy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rgGy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png 424w, https://substackcdn.com/image/fetch/$s_!rgGy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png 848w, https://substackcdn.com/image/fetch/$s_!rgGy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png 1272w, https://substackcdn.com/image/fetch/$s_!rgGy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rgGy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png" width="947" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/571be257-192b-4425-a13d-6369d930d6be_947x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:947,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rgGy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png 424w, https://substackcdn.com/image/fetch/$s_!rgGy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png 848w, https://substackcdn.com/image/fetch/$s_!rgGy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png 1272w, https://substackcdn.com/image/fetch/$s_!rgGy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F571be257-192b-4425-a13d-6369d930d6be_947x500.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Arid Viper, also known as APT-C-23, Desert Falcon, or TAG-63, has been identified as the perpetrator of an Android spyware campaign targeting Arabic-speaking users. Cisco Talos, a cybersecurity firm, revealed that this espionage group employs a counterfeit dating app to surreptitiously collect sensitive information from infected devices and execute additional malicious code. Although active since at least 2017, there is no apparent connection between this campaign and the Israel-Hamas conflict.</p><p>The campaign, believed to have started no earlier than April 2022, features a mobile malware strain that shares source code similarities with a legitimate dating app named Skipped, suggesting a potential link between the malicious operators and the app's developers or an attempt to deceive users.</p><p>Arid Viper's tactics include using seemingly benign chat applications to deliver malware, akin to the 'honey trap' strategy employed in the past, where fake profiles on social media platforms were used to trick potential targets into installing malicious software.</p><p>Cisco Talos also uncovered a network of companies creating dating-themed applications similar to Skipped, available for download from official app stores for Android and iOS. Notably, these simulated dating apps raise the possibility that Arid Viper operators may utilize them in future malicious campaigns.</p><p>The attack chain involves sending targets a link to a tutorial video for the purported dating application, hosted on video-sharing services like YouTube. Within the video description is a URL that, when clicked, leads to a domain controlled by the attackers, serving the APK malware.</p><p>Once installed, the malware hides on the victim's device by disabling system and security notifications, especially on Samsung mobile devices and Android phones with APK package names containing the word "security" to avoid detection. It also requests intrusive permissions to record audio and video, read contacts, access call logs, intercept SMS messages, alter Wi-Fi settings, terminate background apps, take pictures, and create system alerts.</p><p>Additionally, the malware can retrieve system information, receive updated command-and-control (C2) domains from the current C2 server, and download additional malware disguised as legitimate apps, including Facebook Messenger, Instagram, and WhatsApp.</p><p>This revelation coincides with Recorded Future's findings, suggesting possible connections between Arid Viper and Hamas through infrastructure overlaps related to an Android application called Al Qassam. This app has been disseminated in a Telegram Channel claiming affiliation with the Izz ad-Din al-Qassam Brigades, the military wing of Hamas. These observations hint at potential shared infrastructure resources between Arid Viper (TAG-63) and the broader Hamas organization.</p><h3>Agonizing Serpens deploys novel wiper malware to steal sensitive data and render infected systems unusable, raising concerns about upgraded capabilities</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JayD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JayD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png 424w, https://substackcdn.com/image/fetch/$s_!JayD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png 848w, https://substackcdn.com/image/fetch/$s_!JayD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png 1272w, https://substackcdn.com/image/fetch/$s_!JayD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JayD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png" width="860" height="520" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:520,&quot;width&quot;:860,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JayD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png 424w, https://substackcdn.com/image/fetch/$s_!JayD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png 848w, https://substackcdn.com/image/fetch/$s_!JayD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png 1272w, https://substackcdn.com/image/fetch/$s_!JayD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7023dabe-1fdf-4fad-b271-7a3ad285859e_860x520.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A series of destructive cyber attacks that commenced in January 2023 and persisted until October have specifically targeted Israeli higher education and technology sectors. The attacks have been attributed to an Iranian nation-state hacking group known as "Agonizing Serpens," which also goes by the aliases Agrius, BlackShadow, and Pink Sandstorm (formerly Americium). According to a report from Palo Alto Networks Unit 42, these attacks are marked by attempts to steal sensitive data, including personally identifiable information (PII) and intellectual property, followed by deploying various wiper malware to cover the attackers' tracks and render the compromised endpoints inoperable.</p><p>The novel wiper malware used in these attacks includes MultiLayer, PartialWasher, and BFG Agonizer, alongside a bespoke tool called Sqlextractor, which is employed to extract information from database servers. Agonizing Serpens has been active since at least December 2020 and has a history of launching wiper attacks against Israeli entities. In May, Check Point reported on the group's use of the ransomware strain "Moneybird" in attacks targeting Israel.</p><p>The modus operandi in these recent attacks involves exploiting vulnerable internet-facing web servers as initial access points to deploy web shells, perform reconnaissance on victim networks, and acquire administrative user credentials. The attackers then move laterally within the network, exfiltrate data using a combination of public and custom tools, such as Sqlextractor, WinSCP, and PuTTY, and finally deliver the wiper malware.</p><ul><li><p>MultiLayer: This .NET malware enumerates files for deletion or corruption with random data, making data recovery extremely challenging and rendering the system unusable by wiping the boot sector.</p></li><li><p>PartialWasher: A C++-based malware that scans drives to wipe specified folders and their subfolders.</p></li><li><p>BFG Agonizer: This malware leverages the open-source project CRYLINE-v5.0 and plays a significant role in the attacks.</p></li></ul><p>Agonizing Serpens is linked to Agrius through code overlaps with other malware families like Apostle, IPsec Helper, and Fantasy, which the group has previously used. The researchers at Unit 42 have noted an apparent enhancement of the group's capabilities, including efforts to bypass endpoint detection and response (EDR) and other security measures. To achieve this, Agonizing Serpens has been rotating between various known proof-of-concept (PoC) and pentesting tools, as well as custom tools, signaling an ongoing and concerning evolution in their tactics and resources.</p><h3>Jobs/Internships:</h3><p>OKX - <a href="https://boards.greenhouse.io/okx/jobs/5514629003?ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer - Python (Quant Platform - Data Services/ HFT Service)</a> - On-site</p><p>AccelByte - <a href="https://accelbyte.io/job?gh_jid=4335727005&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Senior Site Reliability Engineer (SRE)</a> - Fully Remote</p><p>Rocket Lab - <a href="https://boards.greenhouse.io/rocketlab/jobs/5647101003?ref=levels.fyi&amp;utm_source=levels.fyi">Principal Neutron Safety &amp; Reliability Engineer</a> - Auckland, New Zealand &#183; On-site</p><p>Coinbase - <a href="https://www.coinbase.com/careers/positions/5458491?gh_jid=5458491&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Summer 2024 - Product Design Intern</a> - Fully Remote</p><p>Circle - <a href="https://boards.greenhouse.io/circle/jobs/6999631002?gh_src=5ee41e4a2us&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer, Intern 2024</a> - Boston, Massachusetts, United States &#183; On-site</p><p>ByteDance - <a href="https://careers.tiktok.com/position/7267611363882617149/detail?spread=5MWH5CQ&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern (Data-Data Platform-Data Management Suite-US) - 2024 Summer (BS/MS)</a> - San Jose, CA</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Canada Bans Tencent and Kaspersky Apps from Government Mobile Devices Over Privacy and Security Concerns]]></title><description><![CDATA[Plus, Meta Introduces Ad-Free Subscription Option for Facebook and Instagram in EU, EEA, and Switzerland to Comply with Data Protection Regulations]]></description><link>https://www.cyber-oracle.com/p/canada-bans-tencent-and-kaspersky</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/canada-bans-tencent-and-kaspersky</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 31 Oct 2023 15:01:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DKEp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Government takes a proactive stance to protect sensitive data from potential risks associated with WeChat and Kaspersky's applications</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DKEp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DKEp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png 424w, https://substackcdn.com/image/fetch/$s_!DKEp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png 848w, https://substackcdn.com/image/fetch/$s_!DKEp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png 1272w, https://substackcdn.com/image/fetch/$s_!DKEp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DKEp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png" width="848" height="558" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:558,&quot;width&quot;:848,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DKEp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png 424w, https://substackcdn.com/image/fetch/$s_!DKEp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png 848w, https://substackcdn.com/image/fetch/$s_!DKEp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png 1272w, https://substackcdn.com/image/fetch/$s_!DKEp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cf928d-098b-48b2-a971-2c032d1129fd_848x558.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In a decisive move to bolster its national cybersecurity, Canada has implemented a ban on the use of Tencent's WeChat and Kaspersky's suite of applications on government-issued mobile devices, effective as of October 30, 2023. The government's decision is grounded in concerns over an "unacceptable level of risk to privacy and security." Anita Anand, President of the Treasury Board, emphasized that this action is a risk-based approach to safeguarding government information and networks, as these apps reportedly grant considerable access to device contents.</p><p>WeChat, developed by the Chinese tech giant Tencent, is an all-in-one platform with over 1 billion monthly active users, encompassing instant messaging, social media, and mobile payment services. Meanwhile, Kaspersky, a prominent Russian cybersecurity vendor, decried the ban as politically motivated, asserting that it lacks comprehensive evaluation of the integrity of their products and services. The prohibition follows a similar ban on ByteDance-owned TikTok from government devices in February 2023 and the U.S. Federal Communications Commission's addition of Kaspersky to the "Covered List" in March 2022, citing "unacceptable risk to national security." Canada's action underscores its commitment to maintaining the security and privacy of government information, in a landscape where concerns over data security and geopolitical influences continue to shape digital policy decisions.</p><h3>Meta's move aims to address evolving data protection regulations in Europe, offering users the choice to access Facebook and Instagram without ads for a fee</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lrq6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lrq6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png 424w, https://substackcdn.com/image/fetch/$s_!Lrq6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png 848w, https://substackcdn.com/image/fetch/$s_!Lrq6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png 1272w, https://substackcdn.com/image/fetch/$s_!Lrq6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lrq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png" width="1000" height="750" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lrq6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png 424w, https://substackcdn.com/image/fetch/$s_!Lrq6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png 848w, https://substackcdn.com/image/fetch/$s_!Lrq6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png 1272w, https://substackcdn.com/image/fetch/$s_!Lrq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5fbc043-3bd8-4d0d-b1ab-89f1f7277f37_1000x750.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In response to changing data protection regulations in the European Union (EU), European Economic Area (EEA), and Switzerland, Meta, the parent company of Facebook and Instagram, has unveiled plans to introduce an ad-free subscription option for users in these regions. This ad-free subscription, priced at &#8364;9.99 per month on the web and &#8364;12.99 per month on iOS and Android, is set to be officially available starting next month, granting users the choice to enjoy a personalized ad-free experience on these social media platforms.</p><p>Meta's decision to offer this subscription model follows a &#8364;390 million fine imposed in January related to breaches of the General Data Protection Regulation (GDPR) by the Irish Data Protection Commission (DPC). The DPC found that users had no option but to accept Meta's terms of service to access its digital platforms, which included consent for targeted advertising based on their online activity.</p><p>Starting in November, users in these regions will be able to choose between the free, ad-supported version or the paid, ad-free subscription. During the subscription period, Meta commits not to use subscribers' information for advertising purposes.</p><p>Additionally, Meta plans to introduce a fee for additional accounts listed in a user's Account Center, beginning March 1, 2024, amounting to &#8364;6 per month on the web and &#8364;8 per month on iOS or Android.</p><p>This move aligns with Meta's intention, announced in August 2023, to transition to a consent-based approach that allows users to opt out of behavioral advertising practices. The company cites a July ruling from the Court of Justice of the European Union (CJEU), which supports the concept of offering an equivalent alternative for a fee, not accompanied by extensive data processing operations.</p><p>Simultaneously, Meta will temporarily pause displaying ads to users under 18 in regions where the ad-free subscription is accessible, starting on November 6, 2023.</p><p>In presenting this ad-free subscription option, Meta seeks to balance the demands of European regulators, empower users with choice, and maintain its ability to serve all individuals in the EU, EEA, and Switzerland, emphasizing its commitment to data privacy and compliance with evolving regulations.</p><h3>Jobs/Internships:</h3><p>Amazon - <a href="https://www.amazon.jobs/en/jobs/2394340/sr-software-development-engineer-device-os?ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi&amp;utm_campaign=JB_LVDS301046B">Sr. Software Development Engineer, Device OS</a> - Mexico City, Mexico</p><p>Rocket Lab - <a href="https://boards.greenhouse.io/rocketlab/jobs/5707008003?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer &#8211; Operations Software</a> - Auckland, New Zealand &#183; On-site</p><p>Loop - <a href="https://boards.greenhouse.io/loop/jobs/4998105004?gh_src=9e83895a4us&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer, 2024 New Grad - San Francisco</a> - California, United States &#183; On-site</p><p>Apptronik - <a href="https://boards.greenhouse.io/apptronik/jobs/5008502004?gh_jid=5008502004&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern - Perception (Summer 2024)</a> - Austin, TX &#183; On-site</p><p>Stripe - <a href="https://stripe.com/jobs/listing/software-engineering-intern/5297261">Software Engineering Intern</a> - On-site</p><p>Adobe - <a href="https://careers.adobe.com/us/en/job/ADOBUSR141245EXTERNALENUS/2024-Intern-Machine-Learning-Engineer?utm_source=levels.fyi&amp;utm_medium=phenom-feeds&amp;source=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi">2024 Intern - Machine Learning Engineer</a> - San Jose, CA &#183; On-site</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Google Enhances Play Protect: Real-Time Code Scanning to Thwart Novel Malicious Apps]]></title><description><![CDATA[Plus, Former NSA Employee Pleads Guilty to Espionage Charges: Transmitting Classified Data to Russian 'Agent']]></description><link>https://www.cyber-oracle.com/p/google-enhances-play-protect-real</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/google-enhances-play-protect-real</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 24 Oct 2023 15:01:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oePC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Google Play Protect Gets a Vital Upgrade to Detect Emerging Threats</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oePC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oePC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png 424w, https://substackcdn.com/image/fetch/$s_!oePC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png 848w, https://substackcdn.com/image/fetch/$s_!oePC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png 1272w, https://substackcdn.com/image/fetch/$s_!oePC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oePC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png" width="1456" height="787" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:787,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oePC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png 424w, https://substackcdn.com/image/fetch/$s_!oePC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png 848w, https://substackcdn.com/image/fetch/$s_!oePC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png 1272w, https://substackcdn.com/image/fetch/$s_!oePC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820cb41f-eb46-4b35-9f39-f8efb660d8cc_1600x865.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In a robust move to safeguard Android users, Google is strengthening its defenses with a significant update to Play Protect. This enhancement introduces real-time code-level scanning to thwart novel malicious apps even before they make their way onto Android devices.</p><p>Google proudly states, "Google Play Protect will now recommend a real-time app scan when installing apps that have never been scanned before to help detect emerging threats." Play Protect, a free built-in threat detection service, diligently scans Android devices for any potentially harmful apps, whether they're sourced from the Play Store or external locations. In the most severe cases, it may even prevent the installation of suspicious apps.</p><p>This latest check builds upon existing protective measures, where users were alerted if an app was known to be malicious based on existing scanning data or if it raised suspicions through on-device machine learning. With the introduction of this real-time safeguard, key signals from the app are extracted and sent to Play Protect's backend infrastructure for a code-level evaluation. This process happens in real-time, determining whether the app is safe to install or harbors malicious intent.</p><p>Google emphasizes that this enhancement is essential in the ongoing battle against malicious polymorphic apps, which employ various tactics, including AI, to shape-shift and avoid detection. This crucial feature is initially being rolled out in select countries, commencing with India.</p><p>This security upgrade arrives as threat actors continuously devise new methods to disseminate Android malware, often through deceptive apps or APK files distributed via messaging platforms. Additionally, it follows a comprehensive revision to the Android Security Paper, offering an overview of the platform's proactive security measures, spanning hardware, anti-exploitation, Google Security Services, and APIs tailored for businesses and governments. As the Android landscape evolves, Google remains committed to keeping users safe from emerging threats. Stay vigilant and keep your devices updated!</p><h3>Ex-NSA Insider's Bold Espionage Attempt Unraveled by Covert FBI Operation</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JuYk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JuYk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!JuYk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!JuYk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!JuYk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JuYk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JuYk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!JuYk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!JuYk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!JuYk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc2be2b-54e1-4442-be4a-c38e8bc8627f_1280x720.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In a gripping espionage tale, a former employee of the U.S. National Security Agency (NSA), Jareh Sebastian Dalke, has admitted guilt in a dramatic case involving the attempted transmission of classified defense information to a supposed Russian contact. This startling development unfolded more than a year after his arrest, shedding light on a covert operation that saw the tables turned on the would-be spy.</p><p>Dalke, who held a position as an Information Systems Security Designer at the NSA, enjoyed Top Secret clearance during his brief tenure from June 6, 2022, to July 1, 2022. He had access to highly sensitive documents, which he allegedly tried to share with Russia. The U.S. Department of Justice revealed that Dalke confessed to sending excerpts from three classified documents to an individual he believed to be a Russian agent. However, unbeknownst to him, this supposed agent was, in fact, an undercover employee of the U.S. Federal Bureau of Investigation (FBI).</p><p>Not stopping at the transmission, Dalke reportedly requested a substantial $85,000 in exchange for the classified information he possessed, which he claimed would be of significant value to Russia, with promises of sharing more documents in the future.</p><p>This cloak-and-dagger exchange took place at Union Station in downtown Denver, Colorado, via a laptop. It included five files, four of which contained Top Secret National Defense Information (NDI). These documents encompassed critical details about the NSA's plans for an undisclosed cryptographic program, as well as assessments of U.S. defense capabilities and Russia's offensive capacities.</p><p>The fifth file was a letter from Dalke, expressing his willingness to provide information and hinting at a future partnership with the recipient.</p><p>However, the story took a sudden turn when authorities arrested Dalke on September 28, 2022, just moments after the file transfer, revealing the FBI's covert operation.</p><p>Having now pleaded guilty, Dalke faces his sentencing on April 26, 2024, with the possibility of a maximum penalty of life in prison, marking a dramatic conclusion to a tale of espionage and intrigue.</p><h3>Jobs/Internships:</h3><p>iHerb - <a href="https://boards.greenhouse.io/iherb/jobs/5697567003?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Developer- Back End</a> - On-site</p><p>Lyft - <a href="https://app.careerpuck.com/job-board/lyft/job/6954581002?gh_jid=6954581002&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Data Scientist, Decisions - Lyft Business</a> - San Francisco, CA &#183; Hybrid</p><p>Airbnb - <a href="https://careers.airbnb.com/positions/5096054/">Staff Software Engineer, Host Pricing &amp; Settings</a> - Fully Remote</p><p>Walmart - <a href="https://walmart.wd5.myworkdayjobs.com/WalmartExternal/job/Dallas-TX/Software-Engineer-III---Front-End_R-1643502?source=Job_Board_LinkedIn&amp;_ccid=16936787417927c0vfu62p">Software Engineer III - Front End</a> - Dallas, TX</p><p>Coinbase - <a href="https://www.coinbase.com/careers/positions/5442125?gh_jid=5442125&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern, Backend</a> - Fully Remote</p><p>Two Six Technologies - <a href="https://boards.greenhouse.io/twosixtechnologies/jobs/4992903004?ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Summer Intern</a> - Arlington, Virginia &#183; On-site</p><p>Pinterest - <a href="https://www.pinterestcareers.com/en/jobs/5387508/software-engineering-intern-2024-palo-alto/?ref=levels.fyi&amp;utm_source=levels.fyi?gh_jid=5387508">Software Engineering Intern 2024 (Palo Alto)</a> - Palo Alto, CA, US &#183; On-site</p><p>Dropbox - <a href="https://jobs.dropbox.com/listing/5449187?gh_jid=5449187&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineer Intern (Summer 2024)</a> - Fully Remote</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[EtherHiding: Malware Campaign Exploits Binance's Smart Chain to Serve Deceptive Browser Updates]]></title><description><![CDATA[SpyNote Android Banking Trojan Unveiled: A Stealthy Threat with Invasive Capabilities]]></description><link>https://www.cyber-oracle.com/p/etherhiding-malware-campaign-exploits</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/etherhiding-malware-campaign-exploits</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 17 Oct 2023 15:01:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YIQJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Threat Actors Evade Detection with 'Next Level' Bulletproof Hosting Tactic</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YIQJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YIQJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!YIQJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!YIQJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!YIQJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YIQJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;How We Back Binance-Peg BUSD (and Explaining Historical Discrepancies) |  Binance Blog&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="How We Back Binance-Peg BUSD (and Explaining Historical Discrepancies) |  Binance Blog" title="How We Back Binance-Peg BUSD (and Explaining Historical Discrepancies) |  Binance Blog" srcset="https://substackcdn.com/image/fetch/$s_!YIQJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!YIQJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!YIQJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!YIQJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4effc143-71fb-4ac5-9a4e-893b2959806c_1600x900.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In a cyber twist that sounds like it's straight out of a thriller, a devious malware campaign dubbed "EtherHiding" has emerged, taking advantage of Binance's Smart Chain (BSC) contracts to serve malicious code. Guardio Labs discovered this campaign, and it marks a significant escalation in the ongoing battle against online threats. Initially, the attackers utilized compromised WordPress sites, tricking visitors with fake browser update warnings, ultimately leading to the deployment of information-stealing malware. But when their initial hosting method was taken down, they cleverly pivoted to the decentralized and anonymous world of blockchain, making their campaign harder than ever to detect and stop.</p><p>Security experts Nati Tal and Oleg Zaytsev commented, "This campaign is up and harder than ever to detect and take down." This devious campaign targets WordPress sites, exploiting vulnerabilities in plugins and known security flaws, giving attackers the power to hijack websites at will. The latest attacks involve injecting obfuscated JavaScript into infected sites to query Binance's Smart Chain, creating a smart contract controlled by the attacker. This contract retrieves a third-stage payload from a command-and-control server to serve deceptive browser update notices. When victims click the update button, they unknowingly download a malicious executable from legitimate file hosting services, making it an intricate and elusive operation.</p><p>What makes it even more challenging to combat is that the decentralized nature of blockchain hosting means there's currently no way to intervene and disrupt the attack chain. As the researchers pointed out, "Visitors of compromised WordPress sites have no clue as to what is going on under the hood." The malware campaign, despite being tagged as fake and malicious, continues to deliver its harmful payload, leaving users at risk.</p><p>This is part of a broader campaign called "ClearFake," which employs a JavaScript framework to deploy malware on compromised websites using drive-by download techniques. The attack chains lead to the deployment of various malware loaders and trojans, suggesting a connection between different threat groups. So, users of WordPress, beware! It's crucial to follow security best practices, keep your systems updated, remove unwanted admin users, and use strong passwords to protect your website from these stealthy attackers. Stay safe in the ever-evolving world of cyber threats.</p><h3>SMS Phishing Campaigns Weaponize Spyware, Evading Detection and Data Theft</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U17w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U17w!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png 424w, https://substackcdn.com/image/fetch/$s_!U17w!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png 848w, https://substackcdn.com/image/fetch/$s_!U17w!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png 1272w, https://substackcdn.com/image/fetch/$s_!U17w!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U17w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png" width="1200" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Beware of Spyware&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Beware of Spyware" title="Beware of Spyware" srcset="https://substackcdn.com/image/fetch/$s_!U17w!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png 424w, https://substackcdn.com/image/fetch/$s_!U17w!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png 848w, https://substackcdn.com/image/fetch/$s_!U17w!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png 1272w, https://substackcdn.com/image/fetch/$s_!U17w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feefc8c34-b87b-40ce-b4f8-661aeccf0233_1200x600.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the world of Android malware, SpyNote is a formidable adversary, and it's just been laid bare, revealing its extensive information-gathering arsenal. This cunning banking trojan is typically disseminated through SMS phishing campaigns, luring victims into installing the app via embedded links, as disclosed by cybersecurity experts at F-Secure.</p><p>SpyNote doesn't stop at seeking invasive permissions to access call logs, camera, SMS messages, and external storage. What sets it apart is its talent for remaining hidden from prying eyes, camouflaging itself on the Android home screen and the Recents screen, making it incredibly challenging to detect.</p><p>F-Secure researcher Amit Tambe explained, "The SpyNote malware app can be launched via an external trigger. Upon receiving the intent, the malware app launches the main activity." However, its real power lies in obtaining accessibility permissions, which it then exploits to grant itself even more permissions. This includes the ability to record audio and phone calls, log keystrokes, and capture screenshots using the MediaProjection API.</p><p>But there's more to this threat. A closer examination has revealed the existence of diehard services, designed to thwart any attempts at termination, whether by victims or the Android operating system. This is achieved by registering a broadcast receiver that automatically restarts the malware whenever it's on the verge of being shut down. Additionally, trying to uninstall the malicious app via the device's Settings is an exercise in frustration, as it cleverly thwarts attempts by exploiting accessibility APIs.</p><p>As Amit Tambe pointed out, "The SpyNote sample is spyware that logs and steals a variety of information, including key strokes, call logs, information on installed applications, and so on. It stays hidden on the victim's device making it challenging to notice. It also makes uninstallation extremely tricky." In fact, victims are left with no recourse but to perform a factory reset, wiping all data in the process.</p><p>This revelation coincides with the disclosure by F-Secure of a deceptive Android app posing as an operating system update. It entices victims into granting accessibility services permissions and then stealthily siphons off SMS and bank data, highlighting the ever-evolving and insidious nature of cyber threats in the Android ecosystem. Stay vigilant, Android users!</p><h3>Jobs/Internships:</h3><p>Ada - <a href="https://jobs.lever.co/ada/912274e3-3585-4b9d-83d3-08be166e427e/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Intermediate Full Stack Engineer, Growth</a> - Fully Remote</p><p>Improbable - <a href="https://jobs.lever.co/improbable/2f62aa85-40c9-481e-be58-9df63a972f3f/apply?ref=levels.fyi&amp;utm_source=levels.fyihttps://jobs.lever.co/improbable/2f62aa85-40c9-481e-be58-9df63a972f3f/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Full Stack Senior Software Engineer &#8211; Backend Services</a> - Fully Remote</p><p>Stripe - <a href="https://stripe.com/jobs/listing/software-engineering-new-grad/5306080">Software Engineering, New Grad</a> - On-site</p><p>CrowdStrike - <a href="https://crowdstrike.wd5.myworkdayjobs.com/crowdstrikecareers/job/USA---Remote/Sr-Software-Engineer---Cloud-Platform--Remote-_R14562?etd=MUVP6CXQ22IN5GFG6HV4QIQ2PXM276YN3RHLNYOCLSPVSTVJPYY6HKGNMSPV6BTGQXB4QPJLODPTG2Y5J53BNJWVELIT6JLKDYIVDZWVJ7X5O6GYVW2GAHDLLZJWXYPCUW2PXQATSCSUVGFHZRHAC2QBSJ7F2JSCRZ46ZI4ECISGHRI4GTPQ%253d%253d%253d%253d&amp;piq_uuid=a55d32d4-5814-4b07-8db0-9def7cb9a3b7&amp;clickuid=20337831477&amp;source=pando_ppc">Sr. Software Engineer - Cloud Platform (Remote)</a> - New York, NY</p><p>Intel - <a href="https://jobs.intel.com/en/job/-/-/599/55706847456?ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">GPU Software Engineering Intern</a> - Gdansk Metropolitan Area &#183; On-site</p><p>Johns Hopkins University Applied Physics Laboratory - <a href="https://careers.jhuapl.edu/jobs/53795?lang=en-us&amp;mode=job&amp;iis=Job+Board&amp;iisn=LinkedIn">2024 Internship -Computer Scientist / Applied Mathematician / Engineer - Scientific Applications for Intelligence, Surveillance, and Reconnaissance</a> - Laurel, MD</p><p>MKS - <a href="https://mksinst.wd1.myworkdayjobs.com/MKSCareersUniversity/job/Rochester-NY/XMLNAME-2024-Summer-Undergraduate-Intern-Co-op---Software-Engineer_R8186?ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">2024 Summer Undergraduate Intern/Co-op - Software Engineer</a> - Rochester, NY</p><p>John Deere - <a href="https://jobs.deere.com/eightfold/job/Grovetown-Product-Engineering-Intern-ElectricalSoftware-Design%2C-Spring-2024-Grovetown%2C-GA-GA-30813/993560500/?feedId=190400&amp;utm_source=levels.fyi&amp;utm_campaign=johndeere_levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi">Product Engineering Intern - Electrical/Software Design, Spring 2024 Grovetown, GA</a> - Grovetown, GA</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Gaza-Based Threat Actor 'Storm-1133' Targeting Israeli Energy, Defense, and Telecom Firms Unveiled in Microsoft's Digital Defense Report]]></title><description><![CDATA[Plus, AI Jailbreaks: Cybersecurity Risks of Misusing Large Language Models]]></description><link>https://www.cyber-oracle.com/p/gaza-based-threat-actor-storm-1133</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/gaza-based-threat-actor-storm-1133</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 10 Oct 2023 15:00:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fHjS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Microsoft Exposes Cyber Campaign by Gaza-Linked Group Targeting Israeli Entities</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fHjS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fHjS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!fHjS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!fHjS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!fHjS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fHjS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fHjS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!fHjS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!fHjS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!fHjS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86d81297-33f3-4c8d-b753-49204da07c5b_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A threat actor originating from Gaza, identified as "Storm-1133," has been uncovered in a series of cyber attacks primarily targeting private-sector organizations in Israel, with a focus on energy, defense, and telecommunications companies. Microsoft disclosed these details in its fourth annual Digital Defense Report.</p><p>Microsoft's assessment links this group to furthering the interests of Hamas, a Sunni militant organization that holds de facto authority in the Gaza Strip. The majority of their activities have been directed toward organizations perceived as hostile to Hamas.</p><p>The campaign involved a range of targets, including entities within the Israeli energy and defense sectors, as well as those aligned with Fatah, a Palestinian political party based in the West Bank.</p><p>The attack strategy employed by Storm-1133 is multifaceted, incorporating social engineering and the creation of fake profiles on LinkedIn. These fraudulent profiles masquerade as Israeli human resources managers, project coordinators, and software developers. The goal is to initiate contact with employees at Israeli organizations, send phishing messages, conduct reconnaissance, and deliver malware.</p><p>Microsoft also observed attempts by Storm-1133 to infiltrate third-party organizations with known links to Israeli entities of interest. These intrusions aim to establish backdoors and configure a command-and-control (C2) infrastructure hosted on Google Drive, allowing the group to dynamically update their C2 infrastructure.</p><p>This tactic serves to stay one step ahead of static network-based defenses and enhances their evasion capabilities, as noted by Microsoft.</p><p>The disclosure coincides with an increase in hacktivist operations amid the escalation of the Israeli-Palestinian conflict. Groups like "Ghosts of Palestine" have conducted malicious activities targeting government websites and IT systems in Israel, the United States, and India.</p><p>The evolving threat landscape also reveals a shift in nation-state cyber activities, moving from destructive and disruptive operations to long-term espionage campaigns. Nations such as the United States, Ukraine, Israel, and South Korea have become prominent targets in Europe, the Middle East, North Africa, and the Asia-Pacific regions.</p><p>Iranian and North Korean state actors are demonstrating heightened sophistication in their cyber operations, inching closer to the capabilities of cyber actors from nations like Russia and China.</p><p>This evolution in tradecraft is exemplified by the repeated use of custom tools and backdoors, such as "MischiefTut" employed by Mint Sandstorm (also known as Charming Kitten), which are designed to facilitate persistence, evade detection, and steal credentials.</p><h3>AI Models Like ChatGPT Pose Security Risks When Misused or Prompted Inappropriately</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!teH7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!teH7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png 424w, https://substackcdn.com/image/fetch/$s_!teH7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png 848w, https://substackcdn.com/image/fetch/$s_!teH7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png 1272w, https://substackcdn.com/image/fetch/$s_!teH7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!teH7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png" width="1456" height="992" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:992,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!teH7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png 424w, https://substackcdn.com/image/fetch/$s_!teH7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png 848w, https://substackcdn.com/image/fetch/$s_!teH7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png 1272w, https://substackcdn.com/image/fetch/$s_!teH7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed5a6417-6f98-4166-9bfe-caff07d04914_1600x1090.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The proliferation of large language models (LLMs), such as ChatGPT, has raised concerns about their potential misuse and the cybersecurity risks they pose. Researchers have discovered that these models can be manipulated through prompt engineering to generate malicious content, including code for keyloggers and other harmful software.</p><p>In one case, Moonlock Lab, a cybersecurity company, shared an incident where their malware research engineer had a dream about an attacker writing code with keywords like "MyHotKeyHandler," "Keylogger," and "macOS." Moonlock Lab approached ChatGPT to recreate the malicious code and seek ways to counter the attack. While the generated code may not always be functional, it can assist malicious actors in creating polymorphic malware.</p><p>The issue of malicious prompt engineering is widespread, with cybersecurity researchers even developing a "Universal LLM Jailbreak" that bypasses content filters of various AI systems, including ChatGPT. These jailbreaks use carefully crafted reprompts to manipulate the AI models into providing unwanted or harmful responses.</p><p>AI models' accessibility and adaptability have made them susceptible to hacking, allowing them to bypass content filters and societal restrictions. From role-playing characters to unconventional requests, AI can deviate from its intended use, potentially revealing dangerous information or assisting in unethical activities.</p><p>Prompt injections, where users instruct AI models to work unexpectedly, are a rising concern. These injections can subtly reprogram the AI without its knowledge, making them difficult to detect and prevent. As AI becomes more integrated into applications and services, the risk of indirect prompt injections grows.</p><p>To mitigate these risks, organizations using LLMs must establish trust boundaries and implement security guardrails. These guardrails should limit the AI's access to data and restrict its ability to make significant changes, helping prevent misuse and potential cybersecurity breaches as generative AI continues to evolve.</p><h3>Jobs/Internships</h3><p>Moxion Power - <a href="https://jobs.lever.co/moxionpower/721d0a26-e248-4064-aaa1-14a98d1b82a0/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Director of Manufacturing Engineering</a> - Richmond, CA</p><p>Gopuff - <a href="https://jobs.lever.co/gopuff/9b7527b6-eed9-41ff-b682-10a658781f0c/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer - Platform</a> - Hybrid</p><p>Rackspace - <a href="https://jobs.lever.co/rackspace/6ac92170-609a-4c14-af76-64d68112d2b7/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Azure Cloud Engineer - II (R -17732)</a> - Fully Remote</p><p>ION - <a href="https://jobs.lever.co/ion/55f7c35e-4769-406a-b025-619a5c6e596e/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Product Manager</a> - Hybrid</p><p>Scale AI - <a href="https://boards.greenhouse.io/scaleai/jobs/4305872005?ref=levels.fyi&amp;utm_source=levels.fyi">Machine Learning Research Engineering Intern</a> - San Francisco, CA &#183; Hybrid</p><p>Riot Games - <a href="https://www.riotgames.com/en/work-with-us/job/5330414?gh_jid=5330414&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Software Engineering Intern</a> - Los Angeles, USA &#183; On-site</p><p>Pentair - <a href="https://pentair.wd5.myworkdayjobs.com/Pentair_Careers/job/Golden-Valley-MN/Engineering-Leadership-Development-Internship-Program---Summer-2024_R17396?source=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Engineering Leadership Development Internship Program</a> - Summer 2024 - Hanover Park, IL &#183; Apex, NC &#183; Boardman, OH &#183; White Bear, MN</p><p>Adobe - <a href="https://careers.adobe.com/us/en/job/ADOBUSR139226EXTERNALENUS/2024-Intern-Software-Developer?utm_source=levels.fyi&amp;utm_medium=phenom-feeds&amp;source=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi">2024 Intern - Software Developer</a> - San Jose, CA</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[GitHub Accounts Compromised in Deceptive Campaign; Malicious Code Disguised as Dependabot Contributions]]></title><description><![CDATA[Plus, Lazarus Group's Espionage Campaign Targets Spanish Aerospace Firm in Elaborate LinkedIn Scam]]></description><link>https://www.cyber-oracle.com/p/github-accounts-compromised-in-deceptive</link><guid isPermaLink="false">https://www.cyber-oracle.com/p/github-accounts-compromised-in-deceptive</guid><dc:creator><![CDATA[Nikunj Patel]]></dc:creator><pubDate>Tue, 03 Oct 2023 15:00:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JXEe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Developers Targeted in Elaborate Scheme to Steal Passwords and GitHub Secrets</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JXEe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JXEe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!JXEe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!JXEe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!JXEe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JXEe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da14f426-1960-4788-a128-b97aa44c5226_1200x630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JXEe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!JXEe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!JXEe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!JXEe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda14f426-1960-4788-a128-b97aa44c5226_1200x630.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A troubling and deceptive campaign has emerged, involving the compromise of GitHub accounts and the surreptitious commitment of malicious code disguised as contributions from Dependabot. The nefarious objective behind this campaign is to pilfer passwords from unsuspecting developers.</p><p>In a technical report, Checkmarx provides insight into the workings of this campaign, revealing that "the malicious code exfiltrates the GitHub project's defined secrets to a malicious C2 server and modifies any existing JavaScript files in the attacked project with web-form password-stealer malware code, affecting any end-user who submits their password in a web form."</p><p>Notably, the malware is engineered to capture GitHub secrets and variables and transmit them to a remote server through the utilization of a GitHub Action.</p><p>Checkmarx observed unusual commits to numerous public and private GitHub repositories occurring between July 8 and 11, 2023. These deceptive commits were the result of malicious actors utilizing stolen GitHub personal access tokens (PATs) to make fraudulent code contributions to users' repositories while posing as Dependabot.</p><p>Dependabot, a legitimate service, is designed to notify users of security vulnerabilities in a project's dependencies by autonomously generating pull requests to keep them updated.</p><p>The attackers gained unauthorized access to these accounts by compromising PATs, which were likely silently exfiltrated from the victims' development environments. A significant portion of the compromised users appears to be located in Indonesia.</p><p>The exact method by which this theft occurred remains unclear, though suspicions point toward a potential rogue package inadvertently installed by the developers.</p><p>This incident underscores the ongoing efforts of threat actors to taint open-source ecosystems and facilitate supply chain compromises. It is indicative of a larger trend, as evidenced by a recent data exfiltration campaign targeting npm and PyPI. This campaign employed 39 counterfeit packages to collect sensitive machine information and transmit it to a remote server.</p><p>These modules were published over a span of several days in September 2023 and demonstrated a progressive increase in complexity, scope, and obfuscation techniques, according to Phylum, a software supply chain security company.</p><p>Phylum is also tracking what it categorizes as a substantial typosquat campaign targeting npm. In this campaign, 125 packages masquerading as "angular" and "react" are being used to send machine information to a remote Discord channel. The author claims this is part of a "research project" to identify potential vulnerabilities in bug bounty programs, a violation of npm's Acceptable Use Policy that places strain on those tasked with maintaining clean ecosystems.</p><p>As the threat landscape continues to evolve, such incidents emphasize the importance of vigilance and security measures in the realm of software development and open-source contributions.</p><h3>North Korea-Linked Threat Actors Employ Crafty Social Engineering Tactics to Infiltrate Strategic Targets</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RQae!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RQae!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png 424w, https://substackcdn.com/image/fetch/$s_!RQae!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png 848w, https://substackcdn.com/image/fetch/$s_!RQae!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png 1272w, https://substackcdn.com/image/fetch/$s_!RQae!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RQae!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png" width="1456" height="637" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:637,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RQae!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png 424w, https://substackcdn.com/image/fetch/$s_!RQae!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png 848w, https://substackcdn.com/image/fetch/$s_!RQae!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png 1272w, https://substackcdn.com/image/fetch/$s_!RQae!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27c70147-377a-4ec0-b5f5-f2c9963d7e75_1600x700.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In a concerning revelation, the Lazarus Group, a notorious North Korea-linked cyber-espionage outfit, has been tied to a sophisticated cyber-espionage attack directed at an undisclosed aerospace company in Spain. The attack involved a clever ruse in which employees of the targeted firm were approached by threat actors impersonating recruiters from Meta Platforms.</p><p>ESET security researcher Peter K&#225;lnai, who shared the technical details of the attack, explained, "Employees of the targeted company were contacted by a fake recruiter via LinkedIn and tricked into opening a malicious executable file presenting itself as a coding challenge or quiz."</p><p>This cyber offensive is part of a broader spear-phishing campaign referred to as "Operation Dream Job." The campaign's primary aim is to lure employees working for potential strategic targets, enticing them with fictitious job opportunities as bait to initiate the infection chain.</p><p>Earlier in the year, the same hacking group was linked to an attack wave targeting Linux users. In this previous campaign, threat actors utilized counterfeit HSBC job offers as a guise to deploy a backdoor named SimplexTea.</p><p>The most recent attack, designed for Windows systems, culminates in the deployment of an implant dubbed "LightlessCan," representing a significant leap in sophistication compared to its predecessor, "BLINDINGCAN." The latter is also known as AIRDRY or ZetaNile and is a malware known for its ability to harvest sensitive information from compromised hosts.</p><p>The attack was initiated when the target received a message on LinkedIn from a bogus recruiter claiming to work for Meta Platforms. The impersonator sent two coding challenges, supposedly part of the recruitment process, and persuaded the victim to execute test files (named Quiz1.iso and Quiz2.iso) hosted on a third-party cloud storage platform.</p><p>These ISO files contained malicious binaries (Quiz1.exe and Quiz2.exe) and, when downloaded and executed on a company-provided device, led to the compromise of the system and the breach of the corporate network.</p><p>Subsequently, the attackers employed an HTTP(S) downloader known as NickelLoader to facilitate the deployment of various programs into the victim's computer's memory. This included the LightlessCan remote access trojan and a variant of BLINDINGCAN referred to as "miniBlindingCan" (also known as AIRDRY.V2).</p><p>LightlessCan boasts support for up to 68 distinct commands, with 43 of them currently implemented. On the other hand, miniBlindingCan's primary function is to transmit system information and retrieve files from a remote server, among other tasks.</p><p>A notable feature of this campaign is the use of execution guardrails to ensure that payloads are decrypted and executed only on the intended victim's machine. This strategic shift enhances stealthiness and complicates the detection and analysis of the attackers' activities.</p><p>The Lazarus Group, along with other threat clusters from North Korea, has been increasingly active in recent months, targeting a range of industries and sectors across various countries. Their operations span manufacturing and real estate in India, telecom companies in Pakistan and Bulgaria, and government, research, and defense contractors in Europe, Japan, and the United States, as reported by Kaspersky.</p><h3>Jobs/Internships:</h3><p>Attentive - <a href="https://jobs.lever.co/attentive/ae899b91-8ec1-4420-9e42-cf0abafda349/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Senior Software Engineer, Fullstack</a> - New York, NY &#183; Hybrid</p><p>Mews - <a href="https://www.mews.com/en/careers/jobs/4222366101?gh_jid=4222366101&amp;gh_src=1e602b92teu&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Full-Stack Engineer</a> - Barcelona, Barcelona, Spain &#183; Hybrid</p><p>Coinbase - <a href="https://www.coinbase.com/careers/positions/1631592?gh_jid=1631592&amp;ref=levels.fyi&amp;utm_source=levels.fyi">Product Manager II</a> - Fully Remote</p><p>Improbable - <a href="https://jobs.lever.co/improbable/c728156e-9781-4b2d-8b95-328e2e15a5ff/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Lead Software Engineer - Gameplay, Metaverse</a> - Fully Remote</p><p>Zoox - <a href="https://jobs.lever.co/zoox/17940748-8d1b-44ae-bc85-d9306d7b32c7/apply?ref=levels.fyi&amp;utm_source=levels.fyi">Robot Software Infrastructure, Software Engineering Intern</a> - Foster City, CA</p><p>Northrop Gruman - <a href="https://www.northropgrumman.com/jobs/Administrative-Services/Intern/United-States-of-America/Georgia/Warner-Robins/R10131662/2024-software-engineering-intern-warner-robins-ga?ref=levels.fyi&amp;src=levels.fyi&amp;utm_campaign=businessmanegment1&amp;jClickId=08ccca08-89aa-47ae-9e8d-c4e9d45ec33a&amp;utm_audience=null&amp;utm_medium=jobboard&amp;source=JB-18202&amp;utm_code=JB-18202&amp;utm_format=null&amp;utm_content=null&amp;utm_source=linkedin-organic">2024 Software Engineering Intern</a> - Warner Robins, GA&nbsp;</p><p>Temasek - <a href="https://career2.successfactors.eu/career?navBarLevel=JOB_SEARCH&amp;career_job_req_id=10760&amp;rcm_site_locale=en_GB&amp;company=temasekcapP2&amp;career_ns=job_listing&amp;source=levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Project Intern, Cybersecurity (Data Science &amp; Analytics)</a> - Singapore, Singapore</p><p>IBM - <a href="https://careers.ibm.com/job/19205343/front-end-developer-intern-may-2024-16-months-markham-ca/?codes=SN_LinkedIn&amp;Codes=sn_levels.fyi&amp;ref=levels.fyi&amp;src=levels.fyi&amp;utm_source=levels.fyi">Front End Developer Intern (May 2024 - 16 months)</a> - Markham, Ontario, Canada &#183; Hybrid</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyber-oracle.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Oracle! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>