22 Feb Newsletter For Fourth Week of February 2023
‘Russian Hacktivists’ Brag Of Flooding German Airport Sites A series of distributed denial-of-service (DDoS) attacks shut down seven German airports’ websites a day after a major IT glitch at Lufthansa grounded flights. The back-to-back interruption in operations has invoked suspicions of a possible cyber attack. The experts confirmed the network-flooding events in an emailed statement. Among the airports affected were Düsseldorf, Nüremberg, Erfurt-Weimar and Dortmund. The websites were either not reachable or flagged up failure messages. These attacks were in response to pro-Kremlin hacktivist crew KillNet’s call to arms after Germany announced the transfer of 14 Leopard 2A6 tanks to Ukraine. |
Hackers Using Google Ads To Spread FatalRAT Malware Disguised As Popular Apps
|
Atlassian: Leaked Data Stolen Via Third-Party App
|
RambleOn Android Malware Targeting South Korean Journalists
|
Mirai Variant V3G4 Targets 13 Vulnerabilities to Infect IoT Devices A new variant of the notorious Mirai botnet has been found leveraging several security vulnerabilities to propagate itself to Linux and IoT devices. The attacks primarily single out exposed servers and networking devices running Linux, with the adversary weaponizing as many as 13 flaws that could lead to remote code execution (RCE). Some of the notable flaws relate to critical flaws in Atlassian Confluence Server and Data Center, DrayTek Vigor routers, Airspan AirSpot, and Geutebruck IP cameras, among others. It also establishes contact with a command-and-control server to await commands for launching DDoS attacks against targets via UDP, TCP, and HTTP protocols. |
New Threat Actor WIP26 Targeting Telecom Service Providers In The Middle East An unknown threat actor is allegedly targeting Middle Eastern telecommunications service providers as part of an intelligence gathering mission.SentinelOne and QGroup are tracking the cluster of activity under the former’s work-in-progress moniker WIP26. |
Patch Now: Apple’s iOS, iPadOS, macOS, And Safari Under Attack With New Zero-Day Flaw Apple released security updates for iOS, iPadOS, macOS, and Safari on Monday to address a zero-day flaw that has been actively exploited in the wild.The vulnerability, identified as CVE-2023-23529, is a type confusion flaw in the WebKit browser engine and was discovered by an unidentified researcher.It’s unclear how the vulnerability is being exploited in real-world attacks, but it’s the second actively exploited type confusion flaw in WebKit to be patched by Apple. |
RedEyes Hacking Group Uses Steganography Technique To Deploy Malware On PC & Mobile Phones The threat group RedEyes Hacking Group (also known as APT37), which is well-known for its cyber espionage activities, has lately changed how it gathers information from targets.The sophisticated malware “M2RAT” that this organisation is currently deploying was created particularly to avoid detection by security programmes.It is believed that North Korea supports the APT37 hacking group, which engages in cyberespionage. In addition to using M2RAT, APT37 is also utilizing steganography, a method for concealing information within seemingly innocent files or images, to further conceal their activities.
HTTP Request Smuggling Bug Patched In HAProxy HAProxy is the popular open source load balancer and reverse proxy. It patched a bug that could be easy for attackers to enable HTTP request smuggling attacks. An Attacker will send a malicious crafted HTTP request and could bypass the filters of HAProxy and gain unauthorized access to back-end servers and some important headers fields such as transfer- Encoding, Host and etc after parsing. With potentially conflicting information, attackers try to achieve request smuggling.
New Frebniis Malware Abuses IIS Features For Secret Communications Frebniis is new malware, it’s called Failed Request Event Buffering (FREB). Frebniis has been found abusing Microsoft IIS features to execute malicious commands without any warning and it is used by unknown attackers to attack targeted organizations in Taiwan. FREB will collect information and inject malicious code into the DLL file, then track all HTTP POST passing through the IIS Server. FREB also injects backdoor into system and access internal network resources that are not exposed to the internet. The request of frebniis malware makes no files or suspicious processes running on the system, making Frebniis a relatively unique and rare type of HTTP backdoor seen in the wild.
|
The TechLab Cyber Security Team responsible for monitoring, identifying, detecting, protecting, isolating, responding and recovering based on current threats provides 24x7x365 services, TechLab Security specializes in various security products, projects, network devices, end-user devices, and system.
The TechLab Cyber Security Team Major Responsibilities Are:
• Monitor, Analyze, Correlate & Escalate Intrusion Events,
• Develop Appropriate Responses; Protect, Detect, Respond,
• Conduct Incident Management and Forensic Investigation,
• Maintain Security Community Relationships,
• Various Cyber Security Consulting Services such as Penetration Testing, Vulnerability Assessment, PCI-DSS Compliance and ISO27001 implementation and Audit compliances,
• Assist in Crisis Operations.