Plus récents

🌐 12,784,191 of credentials are leaked from the users and are distributed on Dark/Deep Web in Feb 2022. More than 4,900 organizations have suffered damage from internal data leaking into the by ransomware gangs. Lapsus$ gang initially accessed the affected organizations through leaked credentials collected from Redline Stealer malware. More than 10,000 of Okta Inc (okta.com) login credentials are leaked from infected users with Redline.

How difficult was it for Vice Society to attack 🇦🇷 Argentina's Senate (senado.gob.ar) ? According to the spokesperson, it took « 6 hours to get access to every IT system » (100 computers) and « 6 hours to attack. » When the Senate realized that they had been attacked, Vice Society was reportedly still in their system and able to observe them.

databreaches.net/it-took-6-hou

⚖️ Igor Dekhtyarchuk, a resident and national of the Russian Federation (), was named in an indictment returned by a federal grand jury on March 16, 2022, charging him with offenses related to operating a cyber-criminal marketplace that sold thousands of stolen login credentials, personal identifiable information, and authentication tools.

justice.gov/usao-edtx/pr/russi

Okta Inc, whose authentication services are used to provide access to corporate networks, is investigating a breach after hackers posted screenshots of what they said was internal information. The scope of the hack is unknown, but it could have major consequences. In a statement, Okta official Chris Hollis said the hack could be related to a previously undisclosed incident in January 2022 which he said had since been contained.
\reuters.com/article/okta-breac

Unlike most activity groups that stay under the radar, DEV-0537 (LAPSUS$) doesn’t seem to cover its tracks. They go as far as announcing their attacks on social media or advertising their intent to buy credentials from employees of target organizations. DEV-0537 also uses several tactics that are less frequently used by other threat actors tracked by Microsoft. Their tactics include phone-based social engineering and SIM-swapping.

microsoft.com/security/blog/20

Lapsus$ leaked in a downloadable archive file most of the Microsoft Bing Maps source code, and about half of the Microsoft Bing and code. The gang also claims to have compromised LG Electronics for the second time in a year, and the Okta, Inc (̀ okta.com`), an IdP service that stores and verifies user identities.

theregister.com/2022/03/21/mic

Anne Neuberger, the 🇺🇸 U.S. deputy national security adviser for cyber and emerging technology, joined the White House briefing on Monday to discuss potential Russian cyberattacks and urge companies to raise their defenses.

youtube.com/watch?v=VMhfacxfFc

President Biden have previously warned about the potential that Russia could conduct malicious cyber activity against the 🇺🇸 United States. Today, my Administration is reiterating those warnings based on evolving intelligence that the 🇷🇺 Russian Government is exploring options for potential cyberattacks.

whitehouse.gov/briefing-room/s

CVE-2021-34484 - A Windows local privilege escalation zero-day vulnerability that has failed to fully address for several months now, allows users to gain administrative privileges in Windows 10, 11, and Windows Server.

bleepingcomputer.com/news/micr

🔌 Apple services including the App Store and iCloud are experiencing international service outages at the present time. Apple now confirms outages on its website: App Store, Arcade, Business Manager, Music, School Manager, TV+, Device Enrollment Program, iTunes Store, Schoolwork, Radio, Podcasts.

apple.com/support/systemstatus

A new targets 🇫🇷 french entities with unique attack chain.

Proofpoint observed new, targeted activity impacting French entities in the construction and government sectors. The threat actor used macro-enabled Word documents to distribute the Chocolatey installer package, an open-source package installer. The attack targeted French entities in the construction, real estate, and government industries. The attacker used a resume themed subject and lure purporting to be information. The attacker used steganography, including a cartoon image, to download and install the Serpent backdoor. The attacker also demonstrated a novel detection bypass technique using a Scheduled Task.

proofpoint.com/us/blog/threat-

🇬🇷 Κυβερνοεπίθεση διέλυσε τα ΕΛΤΑ. Hellenic Post (ELTA) had isolated all its data center services as a preventive measure following a cyber-attack. « les paiements des factures, l'envoi du courrier et les services financiers sont suspendus temporairement »

olympia.gr/1471066/oikonomia/k

🇨🇩 Les opérateurs Lockbit revendiquent une attaque informatique sur Ministère des Finances, du Budget et du Porte-Feuille Public (finances.gouv.cg)

The primary goal of this research is to analyze one of the DirtyMoe module groups, which provides the spreading of the DirtyMoe malware using worming techniques. The second aim of this study was to investigate the effects of worming and investigate which exploits are in use. #informatique

decoded.avast.io/martinchlumec

🇫🇷 Dysfonctionnement technique à la FDJ, les tribunaux lui donnent raison. Ce « bug » faisait apparaître un gain que les joueures n'ont en réalité jamais gagné.

brest.maville.com/actu/actudet

Plus anciens