π Know One Won Cyber Intel β March 18, 2025


π No One Won Cyber Intel β March 18, 2025
π ClickFix: How to Infect Your PC in Three Easy Steps π https://krebsonsecurity.com/2025/03/clickfix-how-to-infect-your-pc-in-three-easy-steps/ π A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed "ClickFix," the visitor to a hacked or malicious website is asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware.
π Microsoft: 6 Zero-Days in March 2025 Patch Tuesday π https://krebsonsecurity.com/2025/03/microsoft-6-zero-days-in-march-2025-patch-tuesday/ π Microsoft today issued more than 50 security updates for its various Windows operating systems, including fixes for a whopping six zero-day vulnerabilities that are already seeing active exploitation.
π Alleged Co-Founder of Garantex Arrested in India π https://krebsonsecurity.com/2025/03/alleged-co-founder-of-garantex-arrested-in-india/ π Authorities in India today arrested the alleged co-founder of Garantex, a cryptocurrency exchange sanctioned by the U.S. government in 2022 for facilitating tens of billions of dollars in money laundering by transnational criminal and cybercriminal organizations. Sources close to the investigation told KrebsOnSecurity the Lithuanian national Aleksej Besciokov, 46, was apprehended while vacationing on the coast of India with his family.
π Feds Link $150M Cyberheist to 2022 LastPass Hacks π https://krebsonsecurity.com/2025/03/feds-link-150m-cyberheist-to-2022-lastpass-hacks/ π In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022. In a court filing this week, U.S. federal agents investigating a spectacular $150 million cryptocurrency heist said they had reached the same conclusion.
π Who is the DOGE and X Technician Branden Spikes? π https://krebsonsecurity.com/2025/03/who-is-the-doge-and-x-technician-branden-spikes/ π At 49, Branden Spikes isn't just one of the oldest technologists who has been involved in Elon Musk's Department of Government Efficiency (DOGE). As the current director of information technology at X/Twitter and an early hire at PayPal, Zip2, Tesla and SpaceX, Spikes is also among Musk's most loyal employees. Here's a closer look at this trusted Musk lieutenant, whose Russian ex-wife was once married to Elon's cousin.
π Sperm donation giant California Cryobank warns of a data breach π https://www.bleepingcomputer.com/news/security/sperm-donation-giant-california-cryobank-warns-of-a-data-breach/ π US sperm donor giant California Cryobank is warning customers it suffered a data breach that exposed customers' personal information. [...]
π GitHub Action hack likely led to another in cascading supply chain attack π https://www.bleepingcomputer.com/news/security/github-action-hack-likely-led-to-another-in-cascading-supply-chain-attack/ π A cascading supply chain attack that began with the compromise of the "reviewdog/action-setup@v1" GitHub Action is believed to have led to the recent breach of "tj-actions/changed-files" that leaked CI/CD secrets. [...]
π Western Alliance Bank notifies 21,899 customers of data breach π https://www.bleepingcomputer.com/news/security/western-alliance-bank-notifies-21-899-customers-of-data-breach/ π Arizona-based Western Alliance Bank is notifying nearly 22,000 customers their personal information was stolen in October after a third-party vendor's secure file transfer software was breached. [...]
π Malicious Android 'Vapor' apps on Google Play installed 60 million times π https://www.bleepingcomputer.com/news/security/malicious-android-vapor-apps-on-google-play-installed-60-million-times/ π Over 300 malicious Android applications downloaded 60 million items from Google Play acted as adware or attempted to steal credentials and credit card information. [...]
π New Windows zero-day exploited by 11 state hacking groups since 2017 π https://www.bleepingcomputer.com/news/security/new-windows-zero-day-exploited-by-11-state-hacking-groups-since-2017/ π At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability in data theft and cyber espionage zero-day attacks since 2017. [...]
π Student Loan Breach Exposes 2.5M Records π https://threatpost.com/student-loan-breach-exposes-2-5m-records/180492/ π 2.5 million people were affected, in a breach that could spell more trouble down the line.
π Watering Hole Attacks Push ScanBox Keylogger π https://threatpost.com/watering-hole-attacks-push-scanbox-keylogger/180490/ π Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
π Tentacles of β0ktapusβ Threat Group Victimize 130 Firms π https://threatpost.com/0ktapus-victimize-130-firms/180487/ π Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
π Ransomware Attacks are on the Rise π https://threatpost.com/ransomware-attacks-are-on-the-rise/180481/ π Lockbit is by far this summerβs most prolific ransomware group, trailed by two offshoots of the Conti group.
π Cybercriminals Are Selling Access to Chinese Surveillance Cameras π https://threatpost.com/cybercriminals-are-selling-access-to-chinese-surveillance-cameras/180478/ π Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
π HP Launches Printers with Quantum Resilient Cryptography π https://www.securityweek.com/hp-launches-printers-with-quantum-resilient-cryptography/ π Printers can sit in the corner for ten years or more, while quantum decryption is thought by many to be less than 10 years away. The post HP Launches Printers with Quantum Resilient Cryptography appeared first on SecurityWeek.
π Industry Moves for the week of March 17, 2025 - SecurityWeek π https://www.securityweek.com/industry-moves/mar-17-2025/ π Explore industry moves and significant changes in the industry for the week of March 17, 2025. Stay updated with the latest industry trends and shifts.
π AI Is Turbocharging Organized Crime, EU Police Agency Warns π https://www.securityweek.com/ai-is-turbocharging-organized-crime-eu-police-agency-warns/ π AI and other technologies βare a catalyst for crime, and drive criminal operationsβ efficiency by amplifying their speed, reach, and sophistication,β the report said. The post AI Is Turbocharging Organized Crime, EU Police Agency Warns appeared first on SecurityWeek.
π Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover π https://www.securityweek.com/critical-ami-bmc-vulnerability-exposes-servers-to-disruption-takeover/ π A critical vulnerability affecting baseboard management controller (BMC) firmware made by AMI could expose many devices to remote attacks. The post Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover appeared first on SecurityWeek.
π Google Releases Major Update for Open Source Vulnerability Scanner π https://www.securityweek.com/google-releases-major-update-for-open-source-vulnerability-scanner/ π Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers. The post Google Releases Major Update for Open Source Vulnerability Scanner appeared first on SecurityWeek.
π New βRules File Backdoorβ Attack Lets Hackers Inject Malicious Code via AI Code Editors π https://thehackernews.com/2025/03/new-rules-file-backdoor-attack-lets.html π Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code. "This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious instructions into seemingly innocent
π Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017 π https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html π An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns that date back to 2017. The zero-day vulnerability, tracked by Trend Micro's Zero Day Initiative (ZDI) as ZDI-CAN-25373, refers to an issue that allows bad actors to execute hidden
π Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security π https://thehackernews.com/2025/03/google-acquires-wiz-for-32-billion-in.html π Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an all-cash deal worth $32 billion. "This acquisition represents an investment by Google Cloud to accelerate two large and growing trends in the AI era: improved cloud security and the ability to use multiple clouds (multicloud)," the tech giant said today. It added the acquisition, which is
π New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking π https://thehackernews.com/2025/03/new-critical-ami-bmc-vulnerability.html π A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and carry out post-exploitation actions. The vulnerability, tracked as CVE-2024-54085, carries a CVSS v4 score of 10.0, indicating maximum severity. "A local or remote attacker can exploit the vulnerability by accessing the
π How to Improve Okta Security in Four Steps π https://thehackernews.com/2025/03/how-to-improve-okta-security-in-four.html π While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this
Subscribe to my newsletter
Read articles from Anthony Merlas directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
