Aug 09 2024
Welcome toย Gone Phishing, your daily cybersecurity newsletter that doesnโt want aย White riot, I wanna riot, White riot, A riot of our ownย ๐๐๐ #UKriots ๐ญ๐ญ๐ญย
Patch of the Week!ย ๐ฉน
First thingโs first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโs itโฆ ๐ณย
Congrats to Windows, the cybercriminals are no matchโฆ for your patch! ๐ฉน
Check out this freshly hatched patch ๐ฃ
๐จ Windows Downgrade Attack Vulnerabilities Exposed ๐
Microsoft is urgently working on security updates to address two critical vulnerabilities that could allow downgrade attacks on Windows systems. These flaws, CVE-2024-38202 (CVSS 7.3) and CVE-2024-21302 (CVSS 6.7), were discovered by SafeBreach Labs' Alon Leviev and presented at Black Hat USA 2024 and DEF CON 32โ.
โ ๏ธ Windows Update Stack at Risk โ ๏ธ
CVE-2024-38202 could enable attackers with basic user privileges to bypass security features like Virtualization Based Security (VBS) by tricking administrators into performing a system restore, potentially reintroducing previously mitigated vulnerabilities.
FYI, this is a warning to be wary of attacks and get updating as soon as possible.ย Little premature for the prestigious title of Patch of the Week, but it was slim pickings and we have faith in our brothers in cyber-arms at Microsoft (despite recent events ๐๐๐).
Now, on to this weekโs hottest cybersecurity news stories:ย
๐พ Dial-up! 18 year old browser flaw is affecting MacOS and Linux devices ๐ป
๐ฃ Phishing scam uses Google Drawings and WhatsApp shortened links ๐
๐คต๐ป Write you a cheque? BlackSuit ransomware demands $500M, FBI warns ๐ฐ
A dangerous new vulnerability, "0.0.0.0 Day," has been discovered in all major web browsers. This flaw could let hackers use malicious websites to break into local networks and access sensitive info. ๐ต๏ธโโ๏ธ๐ป
๐ What's the Danger?
The problem comes from how browsers handle certain network requests, especially with the IP address 0.0.0.0. Hackers can use this to sneak into local services, leading to possible remote code execution. ๐จ๐ซ
๐ป Whoโs Affected?
This impacts Google Chrome, Mozilla Firefox, and Apple Safari on macOS and Linux. Windows users are safe for now, thanks to a block on this IP address. ๐ก๏ธโจ
๐จ How Hackers Exploit It
By using public websites with domains like ".com," attackers can communicate with services on your local network via 0.0.0.0, bypassing important security measures like Private Network Access (PNA). ๐๐
๐ ๏ธ What's Being Done?
Web browsers are expected to block 0.0.0.0 access entirely by April 2024, preventing public websites from abusing this flaw. ๐ ๏ธ๐ซ
๐ก๏ธ Stay Safe!
This vulnerability shows the need for better security across all browsers. Be cautious online until the fix is in place! ๐๐
The stock market can be a rewarding opportunity to grow your wealth, but who has the time??
Full time jobs, kids, other commitmentsโฆwith a packed schedule, nearly 150,000 people turn to Bullseye Trades to get free trade alerts sent directly to their phone.
World renowned trader, Jeff Bishop, dials in on his top trades, detailing his thoughts and game plan.
Instantly sent directly to your phone and email. Your access is just a click away!
Cybersecurity experts have uncovered a crafty phishing campaign that uses Google Drawings and WhatsApp links to trick users and steal sensitive information. ๐ฑ๐
๐ How It Works
Hackers start by sending a phishing email that looks like an Amazon account verification link. But instead of leading to Amazon, it directs you to a graphic hosted on Google Drawings. This helps the scam avoid detection by security systems. ๐ต๏ธโโ๏ธโ๏ธ
๐จ Why Google Drawings?
Google Drawings lets the attackers hide malicious links in a graphic. Users may not notice these links, especially if they're worried about their Amazon account being compromised. ๐ผ๏ธ๐
๐ Shortened Links for Deception
If you click the fake Amazon link, youโre taken to a fake login page. To hide the scam, the hackers use two URL shorteners via WhatsApp and qrco[.]de, making it harder for security tools to spot the fraud. ๐๐ซ
๐จ Whatโs at Stake?
This bogus Amazon page is designed to steal your login details, personal info, and credit card numbers. Once they get your data, you're redirected to the real Amazon site, and the phishing page becomes inaccessible from your IP address. ๐๐ณ
๐ก Extra Risks
Researchers also found a flaw in Microsoft 365โs anti-phishing tools, which attackers can exploit to hide security warnings in phishing emails. Microsoft is aware but hasn't fixed it yet. ๐ฅ๏ธโ
๐ก๏ธ Stay Vigilant!
Always double-check links, especially in urgent emails. Donโt get phished! ๐ก๏ธ๐
The BlackSuit ransomware strain has demanded a staggering $500 million in ransoms, with one case alone reaching $60 million, according to the latest advisory from CISA and the FBI. ๐ค๐ป
๐ต๏ธโโ๏ธ How BlackSuit Operates
BlackSuit is an evolution of the Royal ransomware, and itโs not playing around. It often starts with phishing emails, then disarms antivirus software and steals sensitive data before locking down systems with encryption. Other common attack methods include exploiting Remote Desktop Protocol (RDP) and vulnerable apps, often with access bought from initial access brokers (IABs). ๐ก๏ธ๐
๐ ๏ธ Tools of the Trade
BlackSuit actors use legitimate remote management software and tools like SystemBC and GootLoader (which really gets our Goot! ๐) to maintain control over victim networks. Theyโve been spotted using SharpShares, SoftPerfect NetWorx, Mimikatz, and PowerTool to dig deep into networks and kill system processes. โ๏ธ๐ง
๐ High-Pressure Tactics
Victims have reported receiving threatening calls and emails from BlackSuit actors, a tactic used to increase the pressure to pay up. Some ransomware gangs even threaten secondary victims or expose embarrassing information to coerce payments. ๐ฑ๐ฑ
๐ก Emerging Threats#
As if BlackSuit wasnโt enough, new ransomware families like Lynx, OceanSpy, and Zola are on the rise. Groups like Hunters International are using advanced malware like SharpRhino to launch attacks, continuing the trend of evolving and increasingly aggressive ransomware threats. ๐พโ๏ธ
๐จ Stay Alert!
Organisations must be vigilant, as ransomware tactics continue to evolve, becoming more aggressive and sophisticated. ๐๐ก๏ธย
Thatโs all for this week, folks! Stay safe, cyber squad ๐ก๏ธ
๐๏ธ Extra, Extra! Read all about it! ๐๏ธ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
๐ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐
๐ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐
๐Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐พ
Let us know what you think.
So long and thanks for reading all the phish!