<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Online Pitstop</title>
	<atom:link href="https://onlinepitstop.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://onlinepitstop.com/</link>
	<description>The best source for news on cybersecurity, cybercrime, privacy and more.</description>
	<lastBuildDate>Sat, 01 Mar 2025 01:03:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Third-Party Attacks Drive Major Financial Losses in 2024</title>
		<link>https://onlinepitstop.com/2025/03/01/third-party-attacks-drive-major-financial-losses-in-2024/</link>
					<comments>https://onlinepitstop.com/2025/03/01/third-party-attacks-drive-major-financial-losses-in-2024/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 01 Mar 2025 01:03:56 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/03/01/third-party-attacks-drive-major-financial-losses-in-2024/</guid>

					<description><![CDATA[<p>Third-party attacks emerged as a significant driver of material financial losses from cyber incidents in 2024, according to cyber risk management firm Resilience. Third-party risks made up 31% of all client insurance claims and 23% of material losses last year. This marks a significant change from 2023, when no third-party claims led to material losses</p>
<p>The post <a href="https://onlinepitstop.com/2025/03/01/third-party-attacks-drive-major-financial-losses-in-2024/">Third-Party Attacks Drive Major Financial Losses in 2024</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div></div>
<div id="layout-453e7af8-af92-4d13-827f-886ad6f5bc9a" data-layout-id="2" data-edit-folder-name="text" data-index="0" readability="76.118935837246">
<p>Third-party attacks emerged as a significant driver of material financial losses from cyber incidents in 2024, according to cyber risk management firm Resilience.</p>
<p><a href="https://www.infosecurity-magazine.com/news/third-party-risk-failures-uk/" target="_blank">Third-party risks</a> made up 31% of all client insurance claims and 23% of material losses last year. This marks a significant change from 2023, when no third-party claims led to material losses for Resilience clients.</p>
<p>&#x201C;This shift underscores the growing vulnerabilities created by interconnected systems and reliance on external vendors in 2023,&#x201D; the firm wrote in a report dated February 27.</p>
<h2><strong>Ransomware the Biggest Cause of Losses</strong></h2>
<p>Ransomware attacks targeting vendors made up 42% of the third-party claims, with losses from these incidents rising four-fold compared to 2023. The attack on <a href="https://www.infosecurity-magazine.com/news/ransomware-industries-downtime/" target="_blank">automotive software firm CDK</a>, which impacted thousands of car dealerships across the US and Canada, is an example of a ransomware attack on a vendor that financially impacts customers.</p>
<p>Vendor security failings, including the <a href="https://www.infosecurity-magazine.com/news/crowdstrike-fault-it-outages/" target="_blank">CrowdStrike global outage in July 2024</a>, made up 4% of all material claims. Not all the claims arising from this incident have been fully developed, Resilience noted.</p>
<p>The company said that this trend is driving insurance companies to adjust their underwriting practices regarding third-party risk.</p>
<p>Overall, <a href="https://www.infosecurity-magazine.com/news/ransomware-record-high-december/" target="_blank">ransomware</a> held its position as the top cause of material losses for businesses from 2023 to 2024. First-party ransomware incidents made up 44% of client &#x2018;s material claims, while ransomware targeting vendors contributed to 18% of such claims.</p>
<p>Altogether, 62% of claims with losses were related to ransomware.</p>
<p>Despite these figures, the researchers noted that there are indications that ransomware frequency may be declining in broader markets.</p>
<p>&#x201C;This is likely due to threat actors focusing on larger, high-profile organizations that yield bigger payouts, as opposed to the previous &#x201C;spray and prey&#x201D; approach,&#x201D; they said.</p>
</div>
<div id="layout-be50a645-80fe-46d0-9592-7841bafd836d" data-layout-id="2" data-edit-folder-name="text" data-index="2" readability="54">
<h2><strong>Phishing Claims Fall Significantly</strong></h2>
<p>Phishing-related cyber incidents made up 9% of incurred claims in 2024, representing a 55% fall compared to 2023.</p>
<p>The researchers believe this trend is a reflection of improvements in phishing defenses and the shift towards third-party attacks.</p>
<p>There was a marked increase in transfer fraud claims, making up 18% of claims in 2024 compared to 14% in 2023.</p>
<p>Transfer fraud is where a scammer tricks a person into transferring them money using psychological manipulation. Resilience said it has observed scammers&#x2019; use of AI to scale such social engineering campaigns, resulting in increased susceptibility and higher success rates.</p>
<p>&#x201C;As transfer fraud continues to grow, organizations must strengthen internal controls, educate employees on fraud prevention, and implement more robust verification processes for financial transactions,&#x201D; the firm commented.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/03/01/third-party-attacks-drive-major-financial-losses-in-2024/">Third-Party Attacks Drive Major Financial Losses in 2024</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/03/01/third-party-attacks-drive-major-financial-losses-in-2024/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone</title>
		<link>https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/</link>
					<comments>https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 01 Mar 2025 01:03:51 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/</guid>

					<description><![CDATA[<p>&#xE802;Feb 28, 2025&#xE804;Ravie LakshmananMobile Security / Zero-Day A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. &#8220;The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android</p>
<p>The post <a href="https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/">Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 28, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Mobile Security / Zero-Day</span></p>
</div>
<div id="articlebody" readability="107.51699663803">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf4g-SMzauU7AoANXasCQJWZ3ggBAs1-_HL5aXP6Vw8kf_ESVKTjOnWN0am_qLHCNYTOlQajxJmSUwLTiDzi_Cg5w2xu4PUdCd66EJItIYQyNjZQfmx1tfjuz56QUBA3tlGByU-2ab2H6pmZiGq0_eD1FapY58j1YFljL0uTaK8Sh_nfum8n1W7ycMVBaS/s728-rw-e365/phone-hacking.png"></a></div>
<p>A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International.</p>
<p>&#8220;The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite,&#8221; the international non-governmental organization <a href="https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/" rel="noopener" target="_blank">said</a>, adding the traces of the exploit were discovered in a separate case in mid-2024.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img fetchpriority="high" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>The vulnerability in question is <a href="https://thehackernews.com/2025/02/google-patches-47-android-security.html" rel="noopener" target="_blank">CVE-2024-53104</a> (CVSS score: 7.8), a case of privilege escalation in a kernel component known as the USB Video Class (UVC) driver. A patch for the flaw was addressed in the Linux kernel in December 2024. It was subsequently addressed in Android earlier this month.</p>
<p>It&#8217;s believed that CVE-2024-53104 was combined with two other flaws &#x2013; CVE-2024-53197 and CVE-2024-50302 &#x2013; both of which have been resolved in the Linux kernel. They are yet to be included in an Android Security Bulletin.</p>
<ul>
<li><strong><a href="https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/" rel="noopener" target="_blank">CVE-2024-53197</a></strong> (CVSS score: N/A) &#8211; An out-of-bounds access vulnerability for Extigy and Mbox devices</li>
<li><strong><a href="https://lore.kernel.org/linux-cve-announce/2024111908-CVE-2024-50302-f677@gregkh/" rel="noopener" target="_blank">CVE-2024-50302</a></strong> (CVSS score: 5.5) &#8211; A use of an uninitialized resource vulnerability that could be used to leak kernel memory</li>
</ul>
<p>&#8220;The exploit, which targeted Linux kernel USB drivers, enabled Cellebrite customers with physical access to a locked Android device to bypass an Android phone&#8217;s lock screen and gain privileged access on the device,&#8221; Amnesty said.</p>
<p>&#8220;This case highlights how real-world attackers are exploiting Android&#8217;s USB attack surface, taking advantage of the broad range of legacy USB kernel drivers supported in the Linux kernel.&#8221;</p>
<p>The activist, who has been given the name &#8220;Vedran&#8221; to protect their privacy, was taken to a police station and his phone confiscated on December 25, 2024, after he attended a student protest in Belgrade.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>Amnesty&#8217;s analysis found that the exploit was used to unlock his Samsung Galaxy A32 and that the authorities attempted to install an unknown Android application. While the exact nature of the Android app remains unclear, the modus operandi is consistent with that of prior <a href="https://thehackernews.com/2024/12/novispy-spyware-installed-on.html" rel="noopener" target="_blank">NoviSpy spyware</a> infections reported in mid-December 2024. </p>
<p>Earlier this week, Cellebrite <a href="https://cellebrite.com/en/cellebrite-statement-about-amnesty-international-report/" rel="noopener" target="_blank">said</a> its tools are not designed to facilitate any type of offensive cyber activity and that it works actively to curtail the misuse of its technology.</p>
<p>The Israeli company also said it will no longer allow Serbia to use its software, stating &#8220;we found it appropriate to stop the use of our products by the relevant customers at this time.&#8221;</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/">Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen</title>
		<link>https://onlinepitstop.com/2025/02/28/dragonforce-ransomware-hits-saudi-firm-6tb-data-stolen/</link>
					<comments>https://onlinepitstop.com/2025/02/28/dragonforce-ransomware-hits-saudi-firm-6tb-data-stolen/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 01:02:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/28/dragonforce-ransomware-hits-saudi-firm-6tb-data-stolen/</guid>

					<description><![CDATA[<p>A new ransomware attack by DragonForce has targeted organizations in Saudi Arabia. The attack, which affected a prominent Riyadh-based real estate and construction firm, resulted in the exfiltration of over 6TB of sensitive data. According to a new advisory by Resecurity, threat actors first announced the breach on February 14, 2025, demanding ransom before publishing</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/28/dragonforce-ransomware-hits-saudi-firm-6tb-data-stolen/">DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div></div>
<p>A new ransomware attack by<a href="https://www.infosecurity-magazine.com/news/dragonforce-ransomware-lockbit/" target="_blank"> DragonForce</a> has targeted organizations in Saudi Arabia.</p>
<p>The attack, which affected a prominent Riyadh-based real estate and construction firm, resulted in the exfiltration of over 6TB of sensitive data.</p>
<p>According to a new advisory by Resecurity, threat actors first announced the breach on February 14, 2025, demanding ransom before publishing the stolen information. The deadline was set for February 27, one day before the start of Ramadan.</p>
<h3><strong>Advanced Data Leak Strategies</strong></h3>
<p>Following the expiration of the ransom deadline, DragonForce published the stolen data through a dedicated leak site (DLS), separate from its primary platform.&#xA0;</p>
<p>The ransomware group, which operates on a Ransomware-as-a-Service (RaaS) model, continues to expand its affiliate network, providing tools and resources to cyber-criminals in exchange for a share of ransom payments. Notably, its DLS features advanced CAPTCHA mechanisms to prevent automated tracking by cybersecurity firms.</p>
<p>DragonForce has been active since December 2023, with its first known victim being the Heart of Texas Region MHMR Center. The group has since evolved, leveraging sophisticated encryption techniques, TOR-based communications and secure payment methods, including Bitcoin wallets and private chat systems.</p>
<p><em><a href="https://www.infosecurity-magazine.com/news/dragonforce-malaysia-windows-lpe/" target="_blank">Read more on this group: DragonForce Malaysia Group Releases Windows LPE Exploit and Turns to Ransomware Tactics</a></em></p>
<h3><strong>Ransom Payment Collection and Affiliate Network</strong></h3>
<p>The group recruits affiliates through the RAMP underground forum, offering one of the highest commission rates in the cybercrime market&#x2014;up to 80% of ransom proceeds.</p>
<p>Affiliates communicate via TOR-based instant messaging (TOX) and must prove their capability by demonstrating access to victim networks. To enhance security, DragonForce has tightened its vetting process after a previous leak exposed affiliate URLs.</p>
<p>Affiliates also receive support services, such as:</p>
<ul readability="0">
<li readability="-1">
<p>&#x2018;Call services&#x2019; for direct victim intimidation</p>
</li>
<li readability="-1">
<p>NTLM/Kerberos hash decryption to aid post-compromise operations</p>
</li>
<li readability="-1">
<p>A highly flexible ransomware builder allowing customization of encryption settings</p>
</li>
</ul>
<h3><strong>Tools, Tactics&#xA0;and Exploited Vulnerabilities</strong></h3>
<p>DragonForce employs phishing attacks and exploits vulnerabilities in Remote Desktop Protocol (RDP) and Virtual Private Network (VPN) services to gain initial access.</p>
<p>The group also employs dual extortion tactics, encrypting victim data while threatening to publish stolen information if ransom demands are unmet. Additionally, DragonForce has been known to release audio recordings of ransom negotiations, increasing pressure on victims to comply.</p>
<p>&#x201C;The combination of wealthy targets, cybersecurity gaps and geopolitical factors make the Middle East an attractive region for ransomware groups to exploit, making these attacks more profitable,&#x201D; Resecurity wrote.</p>
<p>&#x201C;The DragonForce ransomware targeting KSA and the associated data leak from the recent victim in KSA underscore the urgent need for enhanced cybersecurity measures to protect vital national assets and sensitive information.&#x201D;</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/28/dragonforce-ransomware-hits-saudi-firm-6tb-data-stolen/">DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/28/dragonforce-ransomware-hits-saudi-firm-6tb-data-stolen/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations</title>
		<link>https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/</link>
					<comments>https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 01:02:42 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/</guid>

					<description><![CDATA[<p>&#xE802;Feb 27, 2025&#xE804;Ravie LakshmananMalware / Threat Intelligence A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country&#8217;s National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related applications.</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/">Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 27, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Malware / Threat Intelligence</span></p>
</div>
<div id="articlebody" readability="143.79468845761">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg47PL0ZbHS5btqMcc81H_gNFpwCPZc8VuxdgAShybUmXcbRc6nsQdag75fgmGIuAxd2vFn8YnJQMJ8enagDtby_mqJk9FJAaNrgP6i664TFTzsvFrwz4QJ7j17djIYUKCRCZ-e7JzGwsv-lSEHF9pfhv306I26pQ-Y7vgMwJ7Sc2jsnwb1jQ3Fn3CzW89_/s728-rw-e365/hackers.png"></a></div>
<p>A new campaign is targeting companies in Taiwan with malware known as <strong>Winos 4.0</strong> as part of phishing emails masquerading as the country&#8217;s National Taxation Bureau.</p>
<p>The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged <a href="https://thehackernews.com/2024/11/new-winos-40-malware-infects-gamers.html" rel="noopener" target="_blank">malicious game-related applications</a>.</p>
<p>&#8220;The sender claimed that the malicious file attached was a list of enterprises scheduled for tax inspection and asked the receiver to forward the information to their company&#8217;s treasurer,&#8221; security researcher Pei Han Liao <a href="https://www.fortinet.com/blog/threat-research/winos-spreads-via-impersonation-of-official-email-to-target-users-in-taiwan" rel="noopener" target="_blank">said</a> in a report shared with The Hacker News.</p>
<p>The attachment mimics an official document from the Ministry of Finance, urging the recipient to download the list of enterprises scheduled for tax inspection.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>But in reality, the list is a ZIP file containing a malicious DLL (&#8220;lastbld2Base.dll&#8221;) that lays the groundwork for the next attack stage, leading to the execution of shellcode that&#8217;s responsible for downloading a Winos 4.0 module from a remote server (&#8220;206.238.221[.]60&#8221;) for gathering sensitive data.</p>
<p>The component, described as a login module, is capable of taking screenshots, logging keystrokes, altering clipboard content, monitoring connected USB devices, running shellcode, and permitting the execution of sensitive actions (e.g., cmd.exe) when security prompts from Kingsoft Security and Huorong are displayed.</p>
<p>Fortinet said it also observed a second attack chain that downloads an <a href="https://www.esentire.com/blog/winos4-0-online-module-staging-component-used-in-cleversoar-campaign" rel="noopener" target="_blank">online module</a> that can capture screenshots of WeChat and online banks.</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbnRoNBDygoMABKioZAKGWpr-tg8K6YxcDzKVfdV5d_fq6YTq-pSYyydokyhNVcvU5uJMG5ABNt6-QftbMxCoOIS1b25coSKn6sy9plCwU-vcsITf9fhoYziDhFmPxskrLIY_qay4td2HbEv_IkiY2GZXOtdTQDfnzu8WauoxGPCtQZIyTEWeeKHy92HgN/s728-rw-e365/cyber.jpeg"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbnRoNBDygoMABKioZAKGWpr-tg8K6YxcDzKVfdV5d_fq6YTq-pSYyydokyhNVcvU5uJMG5ABNt6-QftbMxCoOIS1b25coSKn6sy9plCwU-vcsITf9fhoYziDhFmPxskrLIY_qay4td2HbEv_IkiY2GZXOtdTQDfnzu8WauoxGPCtQZIyTEWeeKHy92HgN/s728-rw-e365/cyber.jpeg" alt="" border="0" data-original-height="316" data-original-width="1091"></a></div>
<p>It&#8217;s worth noting that the <a href="https://hunt.io/blog/unearthing-new-infrastructure-by-revisiting-past-threat-reports" rel="noopener" target="_blank">intrusion set</a> distributing the Winos 4.0 malware has been assigned the monikers Void Arachne and Silver Fox, with the malware also overlapping with <a href="https://thehackernews.com/2024/08/multi-stage-valleyrat-targets-chinese.html" rel="noopener" target="_blank">another remote access trojan</a> tracked as <a href="https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html" rel="noopener" target="_blank">ValleyRAT</a>.</p>
<p>&#8220;They are both derived from the same source: Gh0st RAT, which was developed in China and open-sourced in 2008,&#8221; Daniel dos Santos, Head of Security Research at Forescout&#8217;s Vedere Labs, told The Hacker News.</p>
<p>&#8220;Winos and ValleyRAT are variations of Gh0st RAT attributed to Silver Fox by different researchers at different points in time. Winos was a name commonly used in 2023 and 2024 while now ValleyRAT is more commonly used. The tool is constantly evolving, and it has both local Trojan/RAT capabilities as well as a command-and-control server.&#8221;</p>
<p><a href="https://www.splunk.com/en_us/blog/security/valleyrat-insights-tactics-techniques-and-detection-methods.html" rel="noopener" target="_blank">ValleyRAT</a>, first identified in early 2023, has been recently observed using fake Chrome sites as a conduit to infect Chinese-speaking users. Similar drive-by download schemes have also been employed to deliver Gh0st RAT.</p>
<p>Furthermore, Winos 4.0 attack chains have incorporated what&#8217;s called a CleverSoar installer that&#8217;s executed by means of an MSI installer package distributed as fake software or gaming-related applications. Also dropped alongside Winos 4.0 via CleverSoar is the open-source <a href="https://github.com/Idov31/Nidhogg" rel="noopener" target="_blank">Nidhogg</a> rootkit. </p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>&#8220;The CleverSoar installer [&#8230;] checks the user&#8217;s language settings to verify if they are set to Chinese or Vietnamese,&#8221; Rapid7 <a href="https://www.rapid7.com/blog/post/2024/11/27/new-cleversoar-installer-targets-chinese-and-vietnamese-users/" rel="noopener" target="_blank">noted</a> in late November 2024. &#8220;If the language is not recognized, the installer terminates, effectively preventing infection. This behavior strongly suggests that the threat actor is primarily targeting victims in these regions.&#8221;</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid8BktR182U26Pj1ygUARaboBStyAjgIjGwsS9rVZLym8awmIo4ioWGfjZw7icq6JSJwUpJ_OkAgxjg9jTye-HPPDLFvPu4nu6B0tdtvncON1sUZjlhigJe1hR20xvLFuLW6aXliMenQw-cXQ4cL8viEEFhlKcXV7K_jbeRTxNMKmMBlef0ATfLvaJqOAS/s728-rw-e365/chain.png"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid8BktR182U26Pj1ygUARaboBStyAjgIjGwsS9rVZLym8awmIo4ioWGfjZw7icq6JSJwUpJ_OkAgxjg9jTye-HPPDLFvPu4nu6B0tdtvncON1sUZjlhigJe1hR20xvLFuLW6aXliMenQw-cXQ4cL8viEEFhlKcXV7K_jbeRTxNMKmMBlef0ATfLvaJqOAS/s728-rw-e365/chain.png" alt="" border="0" data-original-height="2062" data-original-width="1920"></a></div>
<p>The disclosure comes as the Silver Fox APT has been linked to a new campaign that leverages trojanized versions of Philips DICOM viewers to deploy ValleyRAT, which is then used to drop a keylogger, and a cryptocurrency miner on victim computers. Notably, the attacks have been found to use a vulnerable version of the <a href="https://thehackernews.com/2025/02/2500-truesightsys-driver-variants.html" rel="noopener" target="_blank">TrueSight driver</a> to disable antivirus software.</p>
<p>&#8220;This campaign leverages trojanized DICOM viewers as lures to infect victim systems with a backdoor (ValleyRAT) for remote access and control, a keylogger to capture user activity and credentials, and a crypto miner to exploit system resources for financial gain,&#8221; Forescout <a href="https://www.forescout.com/blog/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers/" rel="noopener" target="_blank">said</a>.</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/">Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>99% of Organizations Report API-Related Security Issues</title>
		<link>https://onlinepitstop.com/2025/02/27/99-of-organizations-report-api-related-security-issues/</link>
					<comments>https://onlinepitstop.com/2025/02/27/99-of-organizations-report-api-related-security-issues/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 00:56:32 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/27/99-of-organizations-report-api-related-security-issues/</guid>

					<description><![CDATA[<p>A growing reliance on APIs has fueled security concerns, with nearly all organizations (99%) reporting API-related security issues in the past year. According to the Q1 2025 State of API Security Report by Salt Security, the rapid expansion of API ecosystems&#x2014;driven by cloud migration, platform integration and data monetization&#x2014;is outpacing security measures and exposing organizations</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/99-of-organizations-report-api-related-security-issues/">99% of Organizations Report API-Related Security Issues</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="layout-cca3e6a0-9a43-4ee3-b42e-08b86fb1bce8" class="content-module " data-layout-id="2" data-edit-folder-name="text" data-index="0" readability="46">
<p>A growing reliance on APIs has fueled security concerns, with nearly all organizations (99%) reporting API-related security issues in the past year.</p>
<p>According to the <em>Q1 2025 State of API Security Report</em> by Salt Security, the rapid expansion of API ecosystems&#x2014;driven by cloud migration, platform integration and data monetization&#x2014;is outpacing security measures and exposing organizations to increased risk.</p>
<h3><strong>API Growth and Security Gaps</strong></h3>
<p>The report, published on Febrary 26, highlights significant API growth, with 30% of organizations experiencing a 51-100% increase in APIs over the past year and 25% reporting growth exceeding 100%.</p>
</div>
<figure id="layout-e560298d-e6eb-4e5a-9cdc-bb28f60424cd" class="content-module media" data-layout-id="4" data-edit-folder-name="image" data-index="1"><img decoding="async" src="https://assets.infosecurity-magazine.com/content/span/30aafe19-bb34-4a14-9239-ee6156196975.png" alt="API Growth Over the Past 12 Months. Credit: Salt Security."><figcaption class="media-caption">API Growth Over the Past 12 Months. Credit: Salt Security.</figcaption></figure>
<div id="layout-eb7b404b-79ff-447e-8322-345baf241472" class="content-module " data-layout-id="2" data-edit-folder-name="text" data-index="2" readability="48">
<p>This expansion has created challenges in maintaining accurate API inventories, as 58% of organizations monitor their APIs less than daily and lack confidence in inventory accuracy. Only 20% have achieved real-time monitoring, leaving most vulnerable to security threats.</p>
<p>Key API security challenges include:</p>
<ul readability="1">
<li readability="0">
<p>37% of security issues stem from vulnerabilities such as misconfigurations and broken object-level authorization</p>
</li>
<li readability="-1">
<p>34% involve sensitive data exposure</p>
</li>
<li readability="0">
<p>29% relate to authentication failures, highlighting weak access controls</p>
</li>
</ul>
<p>&#x201C;Organizations are facing the challenge of properly cataloging all their APIs so they can be placed into the proper security testing and awareness program,&#x201D; said Thomas Richards, principal consultant at Black Duck. &#x201C;The technology can improve workflows and benefit organizations, but we can&#x2019;t forget the basics of cybersecurity to document, test, and verify best practices in order to innovate securely and manage software risk.&#x201D;</p>
</div>
<figure id="layout-e785c23f-c1dc-43c1-8b25-8651bc9357a3" class="content-module media" data-layout-id="4" data-edit-folder-name="image" data-index="3"><img decoding="async" src="https://assets.infosecurity-magazine.com/content/span/c076efba-62e3-47c5-9431-8bd576f48c8b.png" alt="Security challenges in production APIs over the past year. Credit: Salt Security."><figcaption class="media-caption">Security challenges in production APIs over the past year. Credit: Salt Security.</figcaption></figure>
<div id="layout-fdee12ae-00a9-448b-925a-b9f8f6dcc67e" class="content-module " data-layout-id="2" data-edit-folder-name="text" data-index="4" readability="62.498023715415">
<p>Despite increasing investments, security gaps persist. Over half of organizations have boosted API security budgets, yet 30% cite limited funds as a key challenge.</p>
<p>Additionally, 22% struggle with personnel shortages and 10% lack proper security tools.</p>
<p>Many organizations (55%) have delayed application rollouts due to API security concerns, while 14% find their API programs difficult to manage.</p>
<p>&#x201C;Because API attacks most often result from unauthorized or inappropriate access credential use, modern security requires access control that goes well beyond traditional perimeter-based identity access and authentication strategies,&#x201D; explained Piyush Pandey, CEO at Pathlock. &#x201C;Dynamic, agile access controls that start with compliant provisioning, continue with high-risk access monitoring and finish with critical application infrastructure health maintenance [are essential].&#x201D;</p>
<p><em><a href="https://www.infosecurity-magazine.com/blogs/address-api-security/" target="_blank">Read more on API security trends and best practices: How to Address Shortcomings in API Security</a></em></p>
<h3><strong>Attack Trends and Emerging Risks</strong></h3>
<p>An analysis of API attack patterns reveals that 95% of attacks originate from authenticated users, underscoring the risk of compromised accounts. External-facing APIs remain a primary attack vector, with 98% of attack attempts targeting these interfaces. Among the most exploited vulnerabilities:</p>
<ul readability="0">
<li readability="-1">
<p>Security misconfigurations (54%)</p>
</li>
<li readability="-1">
<p>Broken object-level authorization (27%)</p>
</li>
<li readability="-1">
<p>API authentication failures (1%)</p>
</li>
</ul>
<p>Generative AI (GenAI) is also reshaping the security landscape,<a href="https://www.infosecurity-magazine.com/news/wiz-discovers-flaws-generative-ai/" target="_blank"> introducing new threats</a> and concerns. One-third of respondents report a lack of confidence in detecting AI-driven attacks, while 31% worry about the security of AI-generated code. Organizations are responding by implementing governance frameworks (26%) and AI-specific security tools (37%).</p>
</div>
<figure id="layout-efc41826-8ef8-4415-9c11-06aef3e6c109" class="content-module media" data-layout-id="4" data-edit-folder-name="image" data-index="5"><img decoding="async" src="https://assets.infosecurity-magazine.com/content/span/a9edef86-b464-4dff-bd76-6aca025e6a93.png" alt="Security problems found in production APIs over the past 12 months. Credit: Salt Security."><figcaption class="media-caption">Security problems found in production APIs over the past 12 months. Credit: Salt Security.</figcaption></figure>
<div id="layout-c7530f30-e20a-471e-84b5-44aa22379c8a" class="content-module " data-layout-id="2" data-edit-folder-name="text" data-index="6" readability="59">
<h3><strong>Strengthening API Security</strong></h3>
<p>The report urges organizations to adopt a proactive security strategy, emphasizing real-time monitoring, robust posture governance, and adherence to frameworks such as the OWASP API Security Top Ten. Stronger API inventory management and investment in AI-driven security tools are also critical to mitigating emerging risks.</p>
<p>&#x201C;The main driver of API adoption is the need for loose coupling between complex systems,&#x201D; explains Jason Soroko, senior fellow at Sectigo. &#x201C;APIs are abstraction layers that decouple underlying complexities, enabling rapid integration and development, which fuels digital transformation. [However], as organizations increasingly rely on APIs, the rapid expansion often outpaces security measures.&#x201D;</p>
<p>To stay ahead, Soroko recommends that &#x201C;cloud platforms and other purveyors of APIs need to offer security diagnostics to make it easier to rapidly deploy and maintain APIs with secure configurations.&#x201D;</p>
<p>With API usage continuing to surge, organizations must prioritize security strategies that evolve alongside their expanding ecosystems to safeguard sensitive data and infrastructure against emerging threats.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/99-of-organizations-report-api-related-security-issues/">99% of Organizations Report API-Related Security Issues</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/27/99-of-organizations-report-api-related-security-issues/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How scammers are exploiting DeepSeek&#8217;s rise</title>
		<link>https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/</link>
					<comments>https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 00:56:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/</guid>

					<description><![CDATA[<p>Digital Security As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing &#x2013; plus, what else to know before using DeepSeek 31 Jan 2025 &#xA0;&#x2022;&#xA0; , 4 min. read It&#x2019;s become almost a clich&#xE9; to say that cybercriminals are remarkably quick to</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/">How scammers are exploiting DeepSeek&#8217;s rise</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="37.179856115108">
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Digital Security</p>
</div>
<p class="sub-title">As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing &#x2013; plus, what else to know before using DeepSeek</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/editor/" title="Editor"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" alt="Editor"></picture></a></div>
</div>
<p class="article-info mb-5">
        <span>31 Jan 2025</span><br />
        <span class="d-none d-lg-inline">&#xA0;&#x2022;&#xA0;</span><br />
        <span class="d-inline d-lg-none">, </span><br />
        <span>4 min. read</span>
    </p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2025/02-25/deepseek.jpeg" media="(max-width: 768px)"></source><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2025/02-25/deepseek.jpeg" media="(max-width: 1120px)"></source><img decoding="async" class="hero-image" src="https://web-assets.esetstatic.com/tn/-x700/wls/2025/02-25/deepseek.jpeg" alt="How scammers are exploiting DeepSeek's rise"></picture>    </div>
</div>
<div readability="130.25608798115">
<p>It&#x2019;s become almost a clich&#xE9; to say that cybercriminals are remarkably quick to latch onto the latest trends and technologies and exploit them for their own nefarious gains. The buzz around DeepSeek and its state-of-the-art AI models is no exception. In fact, the past few days have provided a stark reminder that while the tech world is evolving at a breakneck speed, the tactics of online scammers often remain strikingly familiar.</p>
<p>Since the R1 reasoning model of the little-known Chinese startup took the world by storm last week, security researchers have spotted a number of fraudulent attempts to capitalize on its meteoric rise to popularity. Alongside this, DeepSeek has faced intense scrutiny over its privacy and security practices, bringing to light several risks surrounding (not necessarily only DeepSeek&#x2019;s) AI models.</p>
<p>Here&#x2019;s a rundown of how fraudsters use DeepSeek&#8217;s popularity as a lure for scams and malware, as well as a short recap of some of the key privacy and security issues that have also thrown the spotlight on the company in the past few days.</p>
<h2>Scams and malware</h2>
<p>One example comes from a user on X who posted some details about a website that mimics&#xA0;<a href="https://www.deepseek.com/" target="_blank" rel="noopener">the official one</a> and urges visitors to download what poses as DeepSeek&#8217;s AI model. Instead, however, clicking it triggers the download of a malicious executable that ESET products detect as Win32/Packed.NSIS.A.&#xA0;</p>
<p>While the website largely &#x201C;looks the part&#x201D;, a keen eye will spot at least one more giveaway beside the URL itself: unlike the &#x201C;Start now&#x201D; button on the <a href="https://www.deepseek.com/">official website</a>, the fake one says &#x201C;Download Now&#x201D;. (DeepSeek has launched mobile apps for both iOS and Android <a href="https://www.cnbc.com/2025/01/27/chinas-deepseek-ai-tops-chatgpt-app-store-what-you-should-know.html">with great success</a>, but you can also use it directly in your desktop browser without needing to download anything.) To further bolster the ploy&#8217;s chances of success, the malware is digitally signed by &#x201C;K.MY TRADING TRANSPORT COMPANY LIMITED&#x201D;.</p>
<blockquote class="twitter-tweet"></blockquote>
<p>Others have also <a href="https://x.com/AlvieriD/status/1883450009523282280">spotted</a> a number of newly-created <a href="https://www.linkedin.com/posts/huzeyfe_it-seems-that-threat-actorsbad-guys-are-activity-7289990824115724289-HvNj" target="_blank" rel="noopener">lookalike domains</a> that aim to trick people into thinking that they have landed on the real thing, but are instead to part them from their data or hard-earned money, including by touting (non-existent) <a href="https://cyble.com/blog/deepseeks-growing-influence-sparks-a-surge-in-frauds-and-phishing-attacks/" target="_blank" rel="noopener">DeepSeek pre-IPO shares</a>.</p>
<p>Another risk has to do with bogus <a href="https://cointelegraph.com/news/scam-tokens-surge-deepseek-ai-viral">DeepSeek crypto tokens</a> that have surged on multiple blockchain networks, with some reaching market capitalizations of millions of dollars in short order. The company <a href="https://x.com/deepseek_ai/status/1877663619464478983">made it clear on X</a> earlier in January that it has not issued any cryptocurrency.</p>
<p><a href="https://www.esetworld.com/" target="_blank" rel="noopener"><img decoding="async" src="https://web-assets.esetstatic.com/wls/2025/02-25/eset-world-2025.png" alt="" width="" height=""></a></p>
<h2>Privacy and security concerns surrounding DeepSeek</h2>
<p>Right on the heels of its rapid ascent, DeepSeek said it had itself been the target of &#x201C;a large-scale cyberattack&#x201D; that caused it to <a href="https://www.bleepingcomputer.com/news/security/deepseek-halts-new-signups-amid-large-scale-cyberattack/">suspend new user signups</a>.</p>
<p>Meanwhile, cloud cybersecurity company <a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz has found</a>&#xA0;a database belonging to DeepSeek that inadvertently exposed API keys, system logs, user chat prompts and other sensitive information to the open internet. DeepSeek has since locked down the database.</p>
<p>Cybersecurity firms <a href="https://www.kelacyber.com/blog/deepseek-r1-security-flaws/" target="_blank" rel="noopener">KELA</a> and <a href="https://unit42.paloaltonetworks.com/jailbreaking-deepseek-three-techniques/" target="_blank" rel="noopener">Palo Alto Networks</a> have found that DeepSeek&#x2019;s AI models are susceptible to so-called evil jailbreak attacks and their security guardrails can be subverted to <a href="https://www.welivesecurity.com/en/business-security/untrustworthy-ai-data-poisoning/">generate malicious outputs</a>, including ransomware, as well as fabricate content such as detailed instructions for creating toxins and explosives.</p>
<p>Much like has been the <a href="https://www.welivesecurity.com/2023/03/24/what-tiktok-knows-you-should-know-tiktok/">case with TikTok</a> and other Chinese online services, DeepSeek&#x2019;s <a href="https://platform.deepseek.com/downloads/DeepSeek%20Privacy%20Policy.html" target="_blank" rel="noopener">data collection practices</a> also <a href="https://iapp.org/news/a/deepseek-s-ascension-catches-the-eye-of-international-regulators/" target="_blank" rel="noopener">garnered scrutiny</a> almost immediately, including from regulatory authorities in the United States, Ireland, Italy and France.</p>
<h2>Precautions</h2>
<p>Whether it&#8217;s a viral new app, a juggernaut social media platform, or an AI tool, cybercriminals are highly adept at weaving thee latest fads and trends into their ploys, ultimately making the ruses more enticing and harder to spot.</p>
<p>To protect yourself from DeepSeek-themed scams, keep your eyes peeled for any email or social media messages that attempt to piggyback off its popularity and push you to click on suspicious links.</p>
<p>Indeed, as AI tools can be harnessed to create highly convincing phishing campaigns and other social engineering attacks, be skeptical of messages that arrive out of the blue, particularly if they offer something too good to be true such as <a href="https://www.welivesecurity.com/en/cybersecurity/crypto-soaring-threats-how-keep-wallet-safe/" target="_blank" rel="noopener">investment opportunities</a> or create a sense of urgency. You&#x2019;re better off contacting the company or person mentioned in the messages directly via verified channels and navigating to the official website by typing it into your web browser.</p>
<p>Strengthen your online accounts with <a href="https://www.welivesecurity.com/2019/12/13/2fa-double-down-your-security/" target="_blank" rel="noopener">two-factor authentication</a> (2FA) wherever possible so that it&#x2019;s far harder for cybercriminals to access your accounts even if they obtain your credentials. Make sure to also use multilayered security software across all your devices that can go a long way towards keeping you safe.</p>
<p>More broadly, when interacting with DeepSeek or, indeed, <a href="https://www.welivesecurity.com/en/business-security/security-privacy-challenges-large-language-models/" target="_blank" rel="noopener">any other AI model</a>, be mindful of the data you&#x2019;re entering into it, including names, email addresses and sensitive personal preferences. The same goes for <a href="https://www.welivesecurity.com/2023/05/17/meet-ai-new-colleague-work-company-data/" target="_blank" rel="noopener">corporate and other sensitive data</a>; the <a href="https://time.com/7210875/deepseek-national-security-threat-tiktok/" target="_blank" rel="noopener">US Navy</a>, for example, has already banned use of DeepSeek among its ranks.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/">How scammers are exploiting DeepSeek&#8217;s rise</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites</title>
		<link>https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/</link>
					<comments>https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 00:56:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/</guid>

					<description><![CDATA[<p>A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale. Security researcher Oleg Zaytsev, in a report shared with The Hacker News, said the campaign &#x2013;</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/">Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrli4on3bnY-JlZOnd00-z4le2y6JZ1fRGH4kA8PoCbSbLKGHQAbUxrQ1bAZ23_VzSSn8qgc0L-SU1I36IW8IQNnCA84kTWMFoW_tPpeCZV-q2cXaC7b6_BR5oK7WoD-pDbqm4RzdFGvK25gWBjxyZN4ZEQZzLnNJINsF4z164FHwq8BHmUN55zIsDhZmE/s728-rw-e365/xss.png"></a></div>
<p>A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale.</p>
<p>Security researcher Oleg Zaytsev, in a report shared with The Hacker News, said the campaign &#x2013; dubbed <strong>360XSS</strong> &#x2013; affected over 350 websites, including government portals, U.S. state government sites, American universities, major hotel chains, news outlets, car dealerships, and several Fortune 500 companies.</p>
<p>&#8220;This wasn&#8217;t just a spam operation,&#8221; the researcher <a href="https://olegzay.com/360xss/" rel="noopener" target="_blank">said</a>. &#8220;It was an industrial-scale abuse of trusted domains.&#8221;</p>
<p>All these websites have one thing in common: A popular framework called <a href="https://krpano.com/home/" rel="noopener" target="_blank">Krpano</a> that&#8217;s used to embed 360&#xB0; images and videos to facilitate interactive virtual tours and VR experiences. </p>
<p>Zaytsev said he stumbled upon the campaign after coming across a pornography-related ad listed on Google Search but with a domain associated with Yale University (&#8220;virtualtour.quantuminstitute.yale[.]edu&#8221;).</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>A notable aspect of these URLs is an XML parameter that&#8217;s designed to redirect the site visitor to a second URL that belongs to another legitimate website, which is then used to execute a Base64-encoded payload via an XML document. The decoded payload, for its part, fetches the target URL (i.e., the ad) from yet another legitimate site.</p>
<p>The XML parameter passed in the original URL served in the search results is part of a broader configuration setting named &#8220;<a href="https://krpano.com/docu/embedpano/#passQueryParameters" rel="noopener" target="_blank">passQueryParameters</a>&#8221; that&#8217;s <a href="https://krpano.com/docu/embedpano/#embeddingparameters" rel="noopener" target="_blank">used</a> when <a href="https://krpano.com/docu/embedpano/#embedpano" rel="noopener" target="_blank">embedding a Krpano panorama viewer</a> into an HTML page. It&#8217;s specifically designed to pass HTTP parameters from the URL to the viewer.</p>
<p>The security issue here is that if the option is enabled, it opens the door to a scenario where an attacker could use a specially crafted URL to execute a malicious script in a victim&#8217;s web browser when the vulnerable site is visited.</p>
<p>Indeed, a <a href="https://thehackernews.com/2023/05/new-vulnerability-in-popular-wordpress.html" rel="noopener" target="_blank">reflected XSS flaw</a> arising as a result of this behavior was disclosed in Krpano in late 2020 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24901" rel="noopener" target="_blank">CVE-2020-24901</a>, CVSS score: 6.1), indicating that the <a href="https://packetstorm.news/files/id/159477" rel="noopener" target="_blank">potential for abuse</a> has been publicly known for over four years.</p>
<p>While an update introduced in version 1.20.10 restricted &#8220;passQueryParameters&#8221; to an allowlist in an attempt to prevent such XSS attacks from taking place, Zaytsev found that explicitly adding the XML parameter to the allowlist reintroduced the XSS risk.</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTh3TvVmldQXa0Z0Vu-YZidxaicmydZadyJt26BrJZc4KHU2Vp9z32ONJaRSjfOIIYVvePefaretvN1WyFiv1pyc5hnP1dib7R9bGQ_c-8sjJKg_scPKSahbUwa64KbLxPxOk62Ioxr5bvL_bmZTgj7E5wN3rY9-RzR9I6tDo_PtYDCm8k7sZsQADDB5e0/s728-rw-e365/reflected.png"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTh3TvVmldQXa0Z0Vu-YZidxaicmydZadyJt26BrJZc4KHU2Vp9z32ONJaRSjfOIIYVvePefaretvN1WyFiv1pyc5hnP1dib7R9bGQ_c-8sjJKg_scPKSahbUwa64KbLxPxOk62Ioxr5bvL_bmZTgj7E5wN3rY9-RzR9I6tDo_PtYDCm8k7sZsQADDB5e0/s728-rw-e365/reflected.png" alt="" border="0" data-original-height="802" data-original-width="728"></a></div>
<p>&#8220;Since version 1.20.10, Krpano&#8217;s default installation was not vulnerable,&#8221; the researcher told The Hacker News via email. &#8220;However, configuring passQueryParameter in combination with the XML parameter allowed external XML configuration via the URL, leading to an XSS risk.&#8221;</p>
<p>&#8220;The exploited versions I&#8217;ve come across were primarily older ones, predating version 1.20.10.&#8221;</p>
<p>The campaign, per Zaytsev, has leveraged this weakness to hijack over 350 sites to serve sketchy ads related to pornography, diet supplements, online casinos, and fake news sites. What&#8217;s more, some of these pages have been weaponized to boost YouTube video views.</p>
<p>The campaign is noteworthy, not least because it abuses the trust and credibility of legitimate domains to show up prominently in search results, a technique called <a href="https://www.crowdstrike.com/en-us/cybersecurity-101/social-engineering/seo-poisoning/" rel="noopener" target="_blank">search engine optimization (SEO) poisoning</a>, which, in turn, is accomplished by abusing the XSS flaw.</p>
<p>&#8220;A reflected XSS is a fun vulnerability but on its own requires user interaction, and one of the biggest challenges is to make people click your reflected XSS link,&#8221; Zaytsev said. &#8220;So using search engines as a distribution platform for your XSS is a very creative and cool way to do it.&#8221;</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v1-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc0hgq4JZKi-PJjUZ4kdb5ficmXr3IPOg6noFF558_qZ-gXm7vb0OzXU0NzsPAxaqca2tLI5j8NgJW731W0_CuPrUerOmSrZSt4IeANQp6VAQsIAQUzv6aJsxBD6poxHfELq0bcbeevSVy5AyOb9ganALMoA140nZoLOtSb0ck2AZ5rZgb9mWDEyVsbvqK/s728-rw-e100/saas-security-v1-d.png" width="727" height="90"></a></center></div>
<p>Following responsible disclosure, the latest release of Krpano eliminates support for external configuration via the XML parameter, thereby mitigating the risk of XSS attacks even when the setting is used.</p>
<p>&#8220;Improved embedpano() passQueryParameters security: data-urls and external URLs are generally not allowed as parameter values anymore and URLs for the XML parameter are limited to be within the current folder structure,&#8221; according to the <a href="https://krpano.com/docu/releasenotes/?version=122#top" rel="noopener" target="_blank">release notes</a> for version 1.22.4 released this week.</p>
<p>It&#8217;s currently not known who is behind the massive operation, although the abuse of an XSS flaw to serve just redirects, as opposed to carrying out more nefarious attacks like credential or cookie theft, raises the possibility of an ad firm with questionable practices that&#8217;s serving these ads as a monetization strategy.</p>
<p>Users of Krpano are advised to update their installations to the latest version and set the &#8220;passQueryParameters&#8221; setting to false. Affected website owners are recommended to find and remove infected pages via Google Search Console.</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/">Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>61% of Hackers Use New Exploit Code Within 48 Hours of Attack</title>
		<link>https://onlinepitstop.com/2025/02/26/61-of-hackers-use-new-exploit-code-within-48-hours-of-attack/</link>
					<comments>https://onlinepitstop.com/2025/02/26/61-of-hackers-use-new-exploit-code-within-48-hours-of-attack/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 00:53:56 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/26/61-of-hackers-use-new-exploit-code-within-48-hours-of-attack/</guid>

					<description><![CDATA[<p>In 2024, cyber-criminals have launched attacks within 48 hours of discovering a vulnerability, with 61% of hackers using new exploit code in this short timeframe. Companies faced an average of 68 days of critical cyber-attacks, while ransomware remained the most significant threat. The healthcare industry was particularly affected, with ransomware responsible for 95% of all</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/61-of-hackers-use-new-exploit-code-within-48-hours-of-attack/">61% of Hackers Use New Exploit Code Within 48 Hours of Attack</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="layout-4726b408-7b52-4be0-bbde-b241f7431313" class="content-module " data-layout-id="2" data-edit-folder-name="text" data-index="0" readability="46.272463768116">
<p>In 2024, cyber-criminals have launched attacks within 48 hours of discovering a vulnerability, with 61% of hackers using new exploit code in this short timeframe.</p>
<p>Companies faced an average of 68 days of critical cyber-attacks, while ransomware remained the most significant threat. The healthcare industry was<a href="https://www.infosecurity-magazine.com/opinions/disaster-cyberwarfare-threat/" target="_blank"> particularly affected</a>, with ransomware responsible for 95% of all breaches and impacting more than 198 million US patients.</p>
<p>These figures come from SonicWall&#x2019;s <a href="https://www.sonicwall.com/threat-report" target="_self"><em>Annual Cyber Threat Report</em></a>, which also suggested&#xA0;that attackers are leveraging AI-driven automation and advanced evasion techniques, making it increasingly difficult for SMBs to defend themselves.</p>
<p><em><a href="https://www.infosecurity-magazine.com/opinions/demystifying-cyber-resilience-best/" target="_blank">Read more on cybersecurity best practices: Demystifying Cyber Resilience: From Best Practice to Execution</a></em></p>
<h3><strong>Key Cyber Threat Trends</strong></h3>
<p>These were some of the key cyber threat identified by SonicWall in 2024:</p>
<ul readability="6">
<li readability="0">
<p>Ransomware Surge: North America saw an 8% rise, while Latin America experienced a 259% spike</p>
</li>
<li readability="0">
<p>IoT Attacks: Increased 124% year-over-year, with hackers targeting unprotected devices</p>
</li>
<li readability="1">
<p>Business Email Compromise (BEC): Accounted for 33% of reported cyber insurance events, up from 9% in 2023</p>
</li>
<li readability="2">
<p>Malware Variants: SonicWall identified 210,258 never-before-seen malware variants, averaging 637 new threats daily</p>
</li>
<li readability="0">
<p>Living Off the Land Binaries (LOLBins): Attackers increasingly use native system tools to evade detection</p>
</li>
</ul>
</div>
<figure id="layout-6daaaf24-cdbe-4255-89ea-a32388e882b3" class="content-module media" data-layout-id="4" data-edit-folder-name="image" data-index="1"><img decoding="async" src="https://assets.infosecurity-magazine.com/content/span/ca7cd3ae-02eb-44d6-85bc-e4b58c807f9c.png" alt="Top 10 LOLBins by percentage. Credit: SonicWall."><figcaption class="media-caption">Top 10 LOLBins by percentage. Credit: SonicWall.</figcaption></figure>
<div id="layout-f9c99ade-42a5-459a-b3f0-d59bc20c2905" class="content-module " data-layout-id="2" data-edit-folder-name="text" data-index="2" readability="45.92789968652">
<h3><strong>AI-enabled and File-based Attacks</strong></h3>
<p>According to the report, AI-driven tools are making cyber-attacks more accessible and complex. Server-side request forgery (SSRF) attacks rose by 452% as AI enhances obfuscation techniques and automates exploit chaining.</p>
<p>Business Email Compromise (BEC) attacks are also evolving, with generative AI enabling cybercriminals to<a href="https://www.infosecurity-magazine.com/news/bec-attacks-surge-20-annually-ai/" target="_blank"> craft highly convincing phishing emails.</a></p>
<p>File-based attacks, particularly involving malicious PDFs and HTML phishing files, also experienced a significant increase.</p>
<p>According to SonicWall data, 38% of detected malicious files were HTML-based, while PDFs followed closely at 22%.</p>
</div>
<figure id="layout-6ef30b38-e4f1-4aa2-bfdb-b9279b86db45" class="content-module media" data-layout-id="4" data-edit-folder-name="image" data-index="3"><img decoding="async" src="https://assets.infosecurity-magazine.com/content/span/ba920a22-15d9-4593-8025-4fe2c9081137.png" alt="Breakdown of everyday files used by threat actors. Credit: SonicWall."><figcaption class="media-caption">Breakdown of everyday files used by threat actors. Credit: SonicWall.</figcaption></figure>
<div id="layout-791b6c4e-5341-47c9-a455-5dc08b389e6a" class="content-module " data-layout-id="2" data-edit-folder-name="text" data-index="4" readability="39">
<h3><strong>Strengthening Cyber Defenses</strong></h3>
<p>To counter these threats, businesses must adopt a multi-layered cybersecurity strategy.</p>
<p>Key recommendations from SonicWall include:</p>
<ul readability="2.5">
<li readability="-1">
<p>Real-Time Patch Management: Apply security patches within 48 hours of disclosure</p>
</li>
<li readability="-1">
<p>Zero Trust Security Models: Restrict access and validate all network traffic</p>
</li>
<li readability="-1">
<p>24/7 Threat Monitoring: Partner with MSSPs for continuous security oversight</p>
</li>
<li readability="0">
<p>Enhanced Ransomware Defenses: Implement network segmentation and endpoint detection &amp; response (EDR)</p>
</li>
<li readability="-1">
<p>IoT Security: Secure connected devices by changing default credentials and updating firmware</p>
</li>
</ul>
<p>With cyber-criminals accelerating their tactics, SMBs must act promptly to strengthen their defenses and mitigate financial and reputational damage.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/61-of-hackers-use-new-exploit-code-within-48-hours-of-attack/">61% of Hackers Use New Exploit Code Within 48 Hours of Attack</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/26/61-of-hackers-use-new-exploit-code-within-48-hours-of-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Patch or perish: How organizations can master vulnerability management</title>
		<link>https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/</link>
					<comments>https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 00:53:53 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/</guid>

					<description><![CDATA[<p>Business Security Don&#x2019;t wait for a costly breach to provide a painful reminder of the importance of timely software patching Phil Muncaster 05 Feb 2025 &#xA0;&#x2022;&#xA0; , 5 min. read Vulnerability exploitation has long been a popular tactic for threat actors. But it&#x2019;s becoming increasingly so &#x2013; a fact that should alarm every network defender.</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/">Patch or perish: How organizations can master vulnerability management</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33.951219512195">
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Business Security</p>
</div>
<p class="sub-title">Don&#x2019;t wait for a costly breach to provide a painful reminder of the importance of timely software patching</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2021/04/Phil_Muncaster.jpg" media="(max-width: 768px)"></source></picture></a></p>
<div class="author-text">
<p><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><b>Phil Muncaster</b></a></p>
</div>
</div>
</div>
<p class="article-info mb-5">
        <span>05 Feb 2025</span><br />
        <span class="d-none d-lg-inline">&#xA0;&#x2022;&#xA0;</span><br />
        <span class="d-inline d-lg-none">, </span><br />
        <span>5 min. read</span>
    </p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2025/02-25/software-vulnerability-management.jpeg" media="(max-width: 768px)"></source><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2025/02-25/software-vulnerability-management.jpeg" media="(max-width: 1120px)"></source><img decoding="async" class="hero-image" src="https://web-assets.esetstatic.com/tn/-x700/wls/2025/02-25/software-vulnerability-management.jpeg" alt="Patch or perish: How organizations can master vulnerability management"></picture>    </div>
</div>
<div readability="119.48043565954">
<p>Vulnerability exploitation has long been a popular tactic for threat actors. But it&#x2019;s becoming increasingly so &#x2013; a fact that should alarm every network defender. Observed cases of vulnerability exploitation resulting in data breaches <a href="https://www.verizon.com/about/news/2024-data-breach-investigations-report-vulnerability-exploitation-boom#DBIR2024IntlNR" target="_blank" rel="noopener">surged three-fold</a> annually in 2023, according to one estimate. And attacks targeting security loopholes remain <a href="https://www.coveware.com/blog/2024/7/29/ransomware-actors-pivot-away-from-major-brands-in-q2-2024" target="_blank" rel="noopener">one of the top three ways</a> threat actors start ransomware attacks.</p>
<p>As the number of CVEs continues to hit new record highs, organizations are struggling to cope. They need a more consistent, automated and risk-based approach to mitigating vulnerability-related threats.</p>
<h2>Bug overload</h2>
<p>Software vulnerabilities are inevitable. As long as humans create computer code, human error will creep in to the process, resulting in the bugs that bad actors have become so expert at exploiting. Yet doing so at speed and scale opens a door to not just ransomware and data theft, but sophisticated <a href="https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2024-q3-2024/" target="_blank" rel="noopener">state-aligned espionage operations</a>, destructive attacks and more.</p>
<p>Unfortunately, the <a href="https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/" target="_blank" rel="noopener">number of CVEs being published each year</a> is stubbornly high, thanks to several factors:</p>
<ul>
<li>New software development and continuous integration lead to increased complexity and frequent updates, expanding <a href="https://www.welivesecurity.com/2021/09/14/cyber-attack-surface-reduce/" target="_blank" rel="noopener">potential entry points</a> for attackers and sometimes introducing new vulnerabilities. At the same time, companies adopt new tools that often rely on third-party components, open-source libraries and other dependencies that may contain undiscovered vulnerabilities.</li>
<li>Speed is often prioritized over security, meaning software is being developed without adequate code checks. This allows bugs to creep into production code &#x2013; sometimes coming from the open source components used by developers.</li>
<li>Ethical researchers are upping their efforts, thanks in part to a proliferation of bug bounty programs run by organizations as diverse as the Pentagon and Meta. These are responsibly disclosed and patched by the vendors in question, but if customers don&#x2019;t apply these patches, they&#x2019;ll be exposed to exploits</li>
<li>Commercial spyware vendors operate in a legal grey area, selling malware and exploits for their clients &#x2013; often autocratic governments &#x2013; to spy on their enemies. The UK&#x2019;s National Cyber Security Centre (NCSC) <a href="https://www.infosecurity-magazine.com/news/governments-tech-giants-against/" target="_blank" rel="noopener">estimates</a> that the commercial &#x201C;cyber-intrusion sector&#x201D; doubles every ten years</li>
<li>The cybercrime supply chain is increasingly professionalized, with initial access brokers (IABs) focusing exclusively on breaching victim organizations &#x2013; often via vulnerability exploitation. One <a href="https://www.group-ib.com/resources/research-hub/hi-tech-crime-trends-2022/" target="_blank" rel="noopener">report from 2023</a> recorded a 45% increase in IABs on cybercrime forums, and a doubling of dark web IAB ads in 2022 versus the previous 12 months</li>
</ul>
<h2>What types of vulnerability are making waves?</h2>
<p>The story of the vulnerability landscape is one of both change and continuity. Many of the usual suspects appear in <a href="https://www.bleepingcomputer.com/news/security/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses/" target="_blank" rel="noopener">MITRE&#x2019;s top 25 list</a> of the most common and dangerous software flaws seen between June 2023 and June 2024. They include commonly-seen vulnerability categories like cross-site scripting, SQL injection, use after free, out-of-bounds read, code injection and cross-site request forgery (CSRF). These should be familiar to most cyber-defenders, and may therefore require less effort to mitigate, either through improved hardening/protection of systems and/or enhanced DevSecOps practices.</p>
<p>However, other trends are perhaps even more concerning. The US Cybersecurity and Infrastructure Security Agency (CISA) <a href="https://www.cisa.gov/sites/default/files/2024-11/aa24-317a-2023-top-routinely-exploited-vulnerabilities.pdf" target="_blank" rel="noopener">claims in its list</a> of <em>2023 Top Routinely Exploited Vulnerabilities </em>that a majority of these flaws were initially exploited as a zero-day. This means, at the time of exploitation, there were no patches available, and organizations have to rely on other mechanisms to keep them safe or to minimize the impact. Elsewhere, bugs with low complexity and which require little or no user interaction are also often favored. An example is the <a href="https://www.welivesecurity.com/en/mobile-security/silent-but-deadly-the-rise-of-zero-click-attacks/" target="_blank" rel="noopener">zero-click exploits</a> offered by <a href="https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/">commercial spyware vendors</a> to deploy their malware.</p>
<blockquote readability="5.5081967213115">
<p><em>Explore how <a href="https://www.eset.com/us/business/solutions/vulnerability-patch-management/" target="_blank" rel="noopener">ESET Vulnerability and Patch Management</a> inside the ESET PROTECT platform provides a pathway to swift remediation, helping keep both disruption and costs down to a minimum.</em></p>
</blockquote>
<p>Another trend is of targeting perimeter-based products with vulnerability exploitation. The National Cyber Security Centre (NCSC) <a href="https://www.ncsc.gov.uk/blog-post/products-on-your-perimeter">has warned</a> of an uptick in such attacks, often involving zero-day exploits targeting file transfer applications, firewalls, VPNs and mobile device management (MDM) offerings. It says:</p>
<p><em>&#8220;Attackers have realised that the majority of perimeter-exposed products aren&#8217;t &#x2018;secure by design&#x2019;, and so vulnerabilities can be found far more easily than in popular client software. Furthermore, these products typically don&#x2019;t have decent logging (or can be easily forensically investigated), making perfect footholds in a network where every client device is likely to be running high-end detective capabilities.&#8221;</em></p>
<h2>Making things worse</h2>
<p>As if that weren&#x2019;t enough to concern network defenders, their efforts are complicated further by:</p>
<ul>
<li>The sheer speed of vulnerability exploitation. <a href="https://www.welivesecurity.com/en/videos/threat-actors-exploiting-zero-days-faster-ever-week-security-tony-anscombe/">Google Cloud research</a> estimates an average time-to-exploit of just five days in 2023, down from a previous figure of 32 days</li>
<li>The complexity of today&#x2019;s enterprise IT and OT/IoT systems, which span hybrid and multi-cloud environments with often-siloed legacy technology</li>
<li>Poor quality vendor patches and confusing communications, <a href="https://assured.co.uk/2024/patching-problems-why-vendor-security-updates-are-letting-down-customers/">which leads defenders</a> to duplicate effort and means they&#x2019;re often unable to effectively gauge their risk exposure</li>
<li>A <a href="https://www.darkreading.com/vulnerabilities-threats/nist-needs-help-digging-out-of-its-vulnerability-backlog" target="_blank" rel="noopener">NIST NVD backlog</a> which has left many organizations without a critical source of up-to-date information on the latest CVEs</li>
</ul>
<p>According to a <a href="https://www.verizon.com/business/en-gb/resources/reports/dbir/" target="_blank" rel="noopener">Verizon analysis</a> of CISA&#x2019;s Known Exploited Vulnerabilities (KEV) catalog:</p>
<ul>
<li>At 30 days 85% of vulnerabilities went unremediated</li>
<li>At 55 days, 50% of vulnerabilities went unremediated</li>
<li>At 60 days 47% of vulnerabilities went unremediated</li>
</ul>
<h2>Time to patch</h2>
<p>The truth is that there are simply too many CVEs published each month, across too many systems, for enterprise IT and security teams to patch them all. The focus should therefore be on prioritizing effectively according to risk appetite and severity. Consider the following features for any <a href="https://www.eset.com/int/business/solutions/vulnerability-patch-management/" target="_blank" rel="noopener">vulnerability and patch management solution</a>:</p>
<ul>
<li>Automated scanning of enterprise environments for known CVEs</li>
<li>Vulnerability prioritization based on severity</li>
<li>Detailed reporting to identify vulnerable software and assets, relevant CVEs and patches etc</li>
<li>Flexibility to select specific assets for patching according to enterprise needs</li>
<li>Automated or manual patching options</li>
</ul>
<p>For zero-day threats, consider <a href="https://www.eset.com/int/business/solutions/advanced-threat-defense/#solutions" target="_blank" rel="noopener">advanced threat detection</a> which automatically unpacks and scans possible exploits, executing in a cloud-based sandbox to check whether it&#x2019;s malicious or not. Machine learning algorithms can be applied to the code to identify novel threats with a high degree of accuracy in minutes, automatically blocking them and providing a status of each sample.</p>
<p>Other tactics could include microsegmentation of networks, <a href="https://www.welivesecurity.com/2021/07/23/protecting-hybrid-workplace-zero-trust-security/" target="_blank" rel="noopener">zero trust network access</a>, network monitoring (for unusual behavior), and strong <a href="https://www.welivesecurity.com/2022/06/07/cybersecurity-awareness-training-what-is-it-what-works-best/" target="_blank" rel="noopener">cybersecurity awareness programs</a>.</p>
<p>As threat actors adopt AI tools of their own in ever-greater numbers, it will become easier for them to scan for vulnerable assets that are exposed to internet-facing attacks. In time, they may even be able to use GenAI to help find zero-day vulnerabilities. The best defense is to stay informed and keep a regular dialog going with your trusted security partners.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/">Patch or perish: How organizations can master vulnerability management</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile</title>
		<link>https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/</link>
					<comments>https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 00:53:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/</guid>

					<description><![CDATA[<p>Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram. LightSpy is the name given to a modular spyware that&#8217;s capable of infecting both Windows and Apple systems with an aim to</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/">LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGm9noFp1eI7IArSFLOgpwpoAA697U1EihVY3xgHyJtDSqAJ0RVrtRE8hyphenhyphenPrU4dxb2ESsv-B1jhfUKxlVa51jx2ck54la5PNpEHB1_if3uMHz5tc_U4AQhX1f4fRV7YHV2OcwdjIzQjeRlpyAvfgDWz9N2KnxhfDEiWXIVUGZ0tQUtplq4BJl2j5Kwm61m/s728-rw-e365/spyware.png"></a></div>
<p>Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram.</p>
<p>LightSpy is the name given to a <a href="https://thehackernews.com/2024/10/new-lightspy-spyware-version-targets.html" rel="noopener" target="_blank">modular spyware</a> that&#8217;s <a href="https://thehackernews.com/2024/06/lightspy-spywares-macos-variant-found.html" rel="noopener" target="_blank">capable</a> of infecting both Windows and Apple systems with an aim to harvest data. It was first documented in 2020, targeting users in Hong Kong.</p>
<p>This includes Wi-Fi network information, screenshots, location, iCloud Keychain, sound recordings, photos, browser history, contacts, call history, and SMS messages, and data from various apps like Files, LINE, Mail Master, Telegram, Tencent QQ, WeChat, and WhatsApp.</p>
<p>Late last year, ThreatFabric detailed an updated version of the malware that incorporates destructive capabilities to prevent the compromised device from booting up, alongside expanding the number of supported plugins from 12 to 28.</p>
<p>Previous findings have also uncovered potential overlaps between LightSpy and an Android malware named <a href="https://thehackernews.com/2023/10/researchers-link-dragonegg-android.html" rel="noopener" target="_blank">DragonEgg</a>, highlighting the cross-platform nature of the threat.</p>
<p>Hunt.io&#8217;s latest analysis of the malicious command-and-control (C2) infrastructure associated with the spyware has uncovered support for over 100 commands spanning Android, iOS, Windows, macOS, routers, and Linux.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>&#8220;The new command list shifts focus from direct data collection to broader operational control, including transmission management (&#8216;&#x4F20;&#x8F93;&#x63A7;&#x5236;&#8217;) and plugin version tracking (&#8216;&#x4E0A;&#x4F20;&#x63D2;&#x4EF6;&#x7248;&#x672C;&#x8BE6;&#x7EC6;&#x4FE1;&#x606F;&#8217;),&#8221; the company <a href="https://hunt.io/blog/lightspy-malware-targets-facebook-instagram" rel="noopener" target="_blank">said</a>.</p>
<p>&#8220;These additions suggest a more flexible and adaptable framework, allowing LightSpy operators to manage deployments more efficiently across multiple platforms.&#8221;</p>
<p>Notable among the new commands is the ability to target Facebook and Instagram application database files for data extraction from Android devices. But in an interesting twist, the threat actors have removed iOS plugins associated with destructive actions on the victim host.</p>
<p>Also discovered are 15 Windows-specific plugins designed for system surveillance and data collection, with most of them geared towards keylogging, audio recording, and USB interaction.</p>
<p>The threat intelligence firm said it also discovered an endpoint (&#8220;/phone/phoneinfo&#8221;) in the admin panel that grants logged-in users the ability to remotely control the infected mobile devices. It&#8217;s currently not known if these represent new developments or previously undocumented older versions.</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2XLNCGEjHvHCMHofeWcNtD1ooYW8LVTQah04YTVmhIMp-1_RH8VNpeZeemYQJ59S0-6QtHBuKRwHKZvAssN9hn2Mk7nUqVsvSQ2MdXRSoaMI4KCc_SenbA1uyCSjnLRj-oTa0l8T3Up-3qp0Jl5O-mmTjy01nx7E-v4mmHg-3dxnHSHHlf37j7-m5uuy3/s728-rw-e365/code.png"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2XLNCGEjHvHCMHofeWcNtD1ooYW8LVTQah04YTVmhIMp-1_RH8VNpeZeemYQJ59S0-6QtHBuKRwHKZvAssN9hn2Mk7nUqVsvSQ2MdXRSoaMI4KCc_SenbA1uyCSjnLRj-oTa0l8T3Up-3qp0Jl5O-mmTjy01nx7E-v4mmHg-3dxnHSHHlf37j7-m5uuy3/s728-rw-e365/code.png" alt="" border="0" data-original-height="1238" data-original-width="1920"></a></div>
<p>&#8220;The shift from targeting messaging applications to Facebook and Instagram expands LightSpy&#8217;s ability to collect private messages, contact lists, and account metadata from widely used social platforms,&#8221; Hunt.io said.</p>
<p>&#8220;Extracting these database files could provide attackers with stored conversations, user connections, and potentially session-related data, increasing surveillance capabilities and opportunities for further exploitation.&#8221;</p>
<p>The disclosure comes as Cyfirma disclosed details of an Android malware dubbed SpyLend that masquerades as a financial app named Finance Simplified (APK name &#8220;com.someca.count&#8221;) on the Google Play Store but engages in <a href="https://thehackernews.com/2024/12/8-million-android-users-hit-by-spyloan.html" rel="noopener" target="_blank">predatory lending, blackmail, and extortion</a> aimed at Indian users.</p>
<p>&#8220;By leveraging location-based targeting, the app displays a list of unauthorized loan apps that operate entirely within WebView, allowing attackers to bypass Play Store scrutiny,&#8221; the company <a href="https://www.cyfirma.com/research/spylend-the-android-app-available-on-google-play-store-enabling-financial-cyber-crime-extortion/" rel="noopener" target="_blank">said</a>.</p>
<p>&#8220;Once installed, these loan apps harvest sensitive user data, enforce exploitative lending practices, and employ blackmail tactics to extort money.&#8221;</p>
<p>Some of the advertised loan apps are KreditPro (formerly KreditApple), MoneyAPE, StashFur, Fairbalance, and PokketMe. Users who install Finance Simplified from outside India are served a harmless WebView that lists various calculators for personal finance, accounting, and taxation, suggesting that the campaign is designed to specifically target Indian users. </p>
<p>The app is no longer available for download from the official Android app marketplace. According to statistics available on Sensor Tower, the application was <a href="https://app.sensortower.com/overview/com.someca.count?country=IN" rel="noopener" target="_blank">published</a> around mid-December 2024 and attracted over 100,000 installations.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>&#8220;Initially presented as a harmless finance management application, it downloads a fraud loan app from an external download URL, which once installed, gains extensive permissions to access sensitive data, including files, contacts, call logs, SMS, clipboard content, and even the camera,&#8221; Cyfirma pointed out.</p>
<p>Indian retail banking customers have also become the target of another campaign that distributes a malware codenamed FinStealer that impersonates legitimate bank apps, but is engineered to collect login credentials and facilitate financial fraud by carrying out unauthorized transactions. </p>
<p>&#8220;Distributed via phishing links, and social engineering, these fake apps closely mimic legitimate bank apps, tricking users into revealing credentials, financial data, and personal details,&#8221; the company <a href="https://www.cyfirma.com/research/finstealer/" rel="noopener" target="_blank">said</a>.</p>
<p>&#8220;Using Telegram bots, the malware can receive instructions and send stolen data without raising suspicion, making it more difficult for security systems to detect and block the communication.&#8221;</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/">LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
