Nov 23 2023
Welcome to Gone Phishing, your daily cybersecurity newsletter that thinks Dominic Cummings has been hacked by cybercriminals ๐ตโ๐ซ #CovidInquiryA
Todayโs hottest cybersecurity news stories:ย
๐ Mac users beware! โClearFakeโ campaign targets macOS ๐ฅ๏ธ
๐ N. Koreans masquerade as recruiters, distribute malware ๐พ
๐จโ๐ป Hackers exploit fingerprint flaws to bypass Windows login ๐ย
๐จ The notorious macOS data-stealing malware, Atomic Stealer (AMOS), has evolved! Now, it's infiltrating Mac systems through a deceptive web browser update chain called ClearFake. ๐ฑ
๐ฐ $1,000 a month ๐ฐ
๐ต๏ธโโ๏ธ According to Malwarebytes' analysis, this marks a significant shift in social engineering tactics, expanding beyond Windows to target macOS users worldwide. AMOS, a subscription-based malware sold for $1,000/month, specialises in extracting data from web browsers and cryptocurrency wallets. ๐จ
๐ญ ClearFake ๐ญ
๐ฅ๏ธ In a recent development, ClearFake, a rising malware distribution operation, uses compromised WordPress sites to deploy fraudulent browser update notices. It has joined the league of threat actors like TA569 and RogueRaticate, employing fake browser updates to spread malware.
๐ The ClearFake campaign, as of November 2023, has expanded its reach to macOS systems. This highlights the adaptability of stealer malware, relying on fake installer files via malicious ads, drive-by downloads, and phishing.
๐พ LummaC2 ๐พ
๐ชย Additionally, beware of LummaC2 stealerย updates featuring an anti-sandbox technique and claiming to extract persistent Google cookies. This could open the door to extensive cyber attacks, compromising Google accounts.
๐ก๏ธ Stay vigilant, update your security software, and avoid suspicious downloads! Your digital safety is our top priority. ๐
A robust vendor management program isnโt just required by compliance frameworks like SOC 2 and ISO 27001. Itโs also a critical part of a holistic trust management strategy.
Implementing a vendor management program, however, has become more complex and challenging with the proliferation of SaaS tools and shadow IT. And many overstretched security teams are being asked to do more with less.
To stay compliant and secure โ and deepen trust with customers and partners โ security teams need a way to proactively manage vendor risk.
This guide from Vanta, the leading trust management platform, brings together perspectives from the frontlines of vendor security management. Get insights and best practices from security and compliance leaders.ย
In this campaign, North Korean threat actors disguise themselves as job recruiters, targeting software developers in a bid to spread malware through deceptive job interviews. The malware, including BeaverTail and InvisibleFerret, poses a cross-platform risk for Windows, Linux, and macOS users.
๐ฆ Wagemole ๐ฆ
Wagemole involves a cunning scheme where hackers, impersonating job seekers, utilize GitHub to host fake resumes. The ultimate goal is financial gain and espionage, with threat actors aiming to embed insiders within targeted companies. The sophistication of these attacks highlights the evolving tactics of North Korean cyber threats.
๐ฆฆ BeaverTail & InvisibleFerret ๐ฆฆ
The Contagious Interview campaign introduces two previously undocumented malware, BeaverTail and InvisibleFerret. These threats can compromise systems running on Windows, Linux, and macOS. BeaverTail acts as a JavaScript implant, stealing sensitive information, while InvisibleFerret serves as a Python-based backdoor, enabling remote control and data exfiltration.
๐ Persistent Threats ๐
These tactics mirror previous North Korean threat activities, emphasising the ongoing risk of deception. The threat landscape remains dynamic, with hackers adapting their strategies to exploit vulnerabilities. Cybersecurity measures must evolve to counter these sophisticated attacks.
๐ Emerging Threats! ๐ค
As software developers become a prime target, and fake job offers persist, maintaining robust cybersecurity defences is crucial. Keep your systems updated and be cautious of unsolicited communications. Together, we can thwart these sophisticated cyber threats!
๐ย The Motley Fool: โFool me once, shame on โ shame on you. Fool me โ you can't get fooled again.โ Good olโ George Dubya ๐ Let us tell whoโs not fooling around though; thatโs the Crรผe ๐ at Motley Fool. Youโd be a fool (alright, enough already! ๐) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! ๐ Kidding aside, if you check out their website theyโve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets ๐คย (LINK)
๐ตย Wander: Find your happy place. Cue Happy Gilmore flashback ๐๏ธโณ๐๐๏ธ Mmmm Happy Placeโฆ ๐ So, weโve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itโs easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ๐๏ธ๐ย (LINK)
๐ย Digital Ocean: If you build it they will come. Nope, weโre not talking about a baseball field for ghosts โพ๐ป๐ฟ (Great movie, to be fair ๐). This is the Digital Ocean whoโve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youโll find yourself catching the buzz even if you canโt code (guilty ๐). But if you can and youโre looking for somewhere to test things out or launch something new or simply enhance what youโve got, weโd recommend checking out their services foโ sho ๐ And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! ๐ฟย (LINK)
๐ Researchers at Blackwing Intelligence have uncovered serious vulnerabilities in fingerprint sensors from Goodix, Synaptics, and ELAN, affecting Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X laptops. ๐ฑ
๐พ The flaws, identified as a potential gateway to bypass Windows Hello authentication, stem from weaknesses in the "match on chip" (MoC) type fingerprint sensors integrated into these devices.
๐ MoC ๐
๐ก๏ธ Despite MoC preventing the replay of stored fingerprint data, it fails to prevent malicious sensors from falsely claiming authorised user authentication, leaving the door open for exploitation.
๐ ELAN's vulnerability allows any USB device to impersonate the fingerprint sensor, potentially leading to unauthorised access.
๐ Synaptics faces issues with the default disabling of the Secure Device Connection Protocol (SDCP), relying on a flawed Transport Layer Security (TLS) stack, posing a risk to biometric authentication.
๐ Goodix ๐
๐ป Goodix's exploit takes advantage of the difference in enrollment operations between Windows and Linux, potentially allowing attackers to compromise the system.
๐ To counter these threats, original equipment manufacturers (OEMs) are advised to enable SDCP and undergo independent expert audits of fingerprint sensor implementations.
๐ Windows Hello biometrics, designed with the Secure Device Connection Protocol, faces challenges in device manufacturers' understanding and limited coverage of the device's overall security. Stay vigilant for updates and patches! ๐ค๐๏ธโ๐จ๏ธ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
The GeekAI: A daily 3 min newsletter on what matters in AI, with all the new AI things coming to market its good to stay ahead of the curve.
Libby Copa:ย The Rebel Newsletter helps writers strengthen their writing and creative practice, navigate the publishing world, and turn their art into an act of rebellion.
Techspresso:ย Receive a daily summary of the most important AI and Tech news, selected from 50+ media outlets (The Verge, Wired, Tech Crunch etc)
Let us know what you think!
So long and thanks for reading all the phish!