Essential Cyber Intel Brief: 11/05/2024
No one has time to sift through dozens of websites for critical cybersecurity insights. That’s why I developed a better solution-it’s automated, curated, and absolutely free.
Get the important updates you need as a cybersecurity professional or business leader without the time drag or hassle.
Designed for efficiency, my custom program pinpoints the most critical cybersecurity events security professionals and business leaders need to know and I publish them every business day at 9 AM CT for you.
In just one to two minutes, you’ll determine if the latest cybersecurity developments require further attention, allowing you to stay informed without losing your valuable time.
Subscribe to receive automated notifications and stay ahead of key developments-no spam, just concise, relevant updates delivered directly to your inbox.
You can connect with me on LinkedIn and join my professional network.
11/05/2024 — New Cybersecurity Updates
Nokia investigates breach after hacker claims to steal source code — Nokia is investigating whether a third-party vendor was breached after a hacker claimed to be selling the company’s stolen source code. Source
Schneider Electric confirms dev platform breach after hacker steals data — Schneider Electric has confirmed a developer platform was breached after a threat actor claimed to steal 40GB of data from the company’s JIRA server. Source
Custom “Pygmy Goat” malware used in Sophos Firewall hack on govt network — UK’s National Cyber Security Centre (NCSC) has published an analysis of a Linux malware named “Pigmy Goat” created to backdoor Sophos XG firewall devices as part of recently disclosed attacks by Chinese threat actors. Source
Windows infected with backdoored Linux VMs in new phishing attacks — A new phishing campaign dubbed ‘CRON#TRAP’ infects Windows with a Linux virtual machine that contains a built-in backdoor to give stealthy access to corporate networks. Source
City of Columbus: Data of 500,000 stolen in July ransomware attack — The City of Columbus, Ohio, notified 500,000 individuals that a ransomware gang stole their personal and financial information in a July 2024 cyberattack. Source
Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices — Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Source
Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages — An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. Source
Canadian Suspect Arrested Over Snowflake Data Breach and Extortion Attacks — Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. Source
Google Warns of Actively Exploited CVE-2024–43093 Vulnerability in Android System — Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. Source
Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning — Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning, and model theft. Source
German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested — German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. Source
Top Cybersecurity Threats, Tools, and Practices (Oct 28 — Nov 03) — This week was a total digital dumpster fire! Hackers were like, “Let’s cause some chaos!” and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ️ Source
Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It) — As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain. Source
Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine — Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep (formerly Project Naptime). Source
Schneider Electric Launches Probe After Hackers Claim Theft of User Data — Hackers claim to have stolen sensitive information, including user data, after breaching Schneider Electric’s Jira system. Source
210,000 Impacted by Saint Xavier University Data Breach — Saint Xavier University is notifying over 210,000 individuals of personal information compromise in a July 2023 data breach. Source
US Sentences Nigerian to 26 Years in Prison for Stealing Millions Through Phishing — Kolade Akinwale Ojelade was sentenced to 26 years in prison in the US for compromising email accounts through phishing and stealing millions. Source
Google Says Its AI Found SQLite Vulnerability That Fuzzing Missed — Google has showcased the capabilities of its Big Sleep LLM agent, which found a previously unknown exploitable memory safety issue in SQLite. Source
FBI Seeking Information on Chinese Hackers Targeting Sophos Firewalls — The FBI is asking for information on the Chinese threat actors targeting Sophos edge devices to compromise private and government entities. Source
Altenen — 1,267,701 breached accounts — In June 2022, the malicious “carding” (referring to credit card fraud) website Altenen suffered a data breach that was later redistributed as part of a larger corpus of data. The data included 1.3M unique email addresses, usernames, bcrypt password hashes and cryptocurrency wallet addresses. Source
Copyright: Copyright © 2024 Tim Layton & Associates, LLC. All rights reserved. All information and content on this website are protected by copyright and may not be reproduced, distributed, or transmitted in any form without prior written permission from Tim Layton & Associates, LLC.
Originally published at https://timlaytonllc.com on November 5, 2024.