Aug 24 2023
Welcome to Gone Phishing, your daily cybersecurity newsletter that shows cybercriminals about the same amount of respect that Tucker and Trump showed the other Republican candidates last night 😳😬😂
Today’s hottest cybersecurity news stories:
💰 Ransomware attacks up 153% on last year and 16% on last month 📈
🎯 It’s open season on 1000s of STILL unpatched Open(dumpster)fire XMPP servers 🔥
💯 NoFilter attack: Bypass Windows security with new stealth privilege escalation tactic 💀
Recent reports from top cybersecurity firms reveal alarming trends in ransomware attacks 📈. These attacks are not only increasing in number but also becoming more sophisticated. 💻💰
FYI: Ransomware attacks are a type of malware designed to deny a user or organisation access to files on their computer and demanding a ransom payment for the decryption key.
According to NCC Group's July 2023 report, attacks surged by 153% compared to last year, with industrials as the prime target 🏭. Europe witnessed a 59% jump in attacks! 🌍
The notorious Cl0p group is a major player, impacting 730 orgs and 47M people via the MOVEit hack 🕵️♀️. But excluding them, the victim count dropped 📉. New players like 8Base are emerging.
BlackFog's data highlights a shocking 4-year high in July 2023 attacks 📊. Surprisingly, only 38 out of 428 attacks were disclosed publicly 😱.
Education took a hit too! Sophos reveals rising attacks, with many paying ransoms for data recovery 🎓💵. Barracuda warns of doubled attacks in sectors like healthcare 🏥.
The level of sophistication is soaring too! Ransomware gangs focus on data theft and exploiting vulnerabilities 🔓. Lumu's report lists top precursors like Qbot and Dridex.
Hold onto your hats for the costs 💸! Manufacturing firms lost $46.2B due to ransomware between 2018-2023 😵.
Stay vigilant and protect your systems. Backup your data, update software, and educate your teams about phishing threats. Together, we can beat the cyber crooks! 💪🛡️
I came across ZZZ money club during the crypto market bull run when everyone’s a winner, even during the bear market this discord group has been amazing at giving information on projects and ways to make passive income in various ways.
The group is very active and everyone in this private discord group is very chatty and helpful.
If you are interested in joining the group you can through the link below.
A concerning report from VulnCheck has revealed that thousands of Openfire XMPP servers are vulnerable to a high-severity flaw 🛑. Tracked as CVE-2023-32315 (CVSS score: 7.5), this flaw could allow unauthorised access to restricted admin console pages 🕵️♂️.
This vulnerability affects all Openfire versions since April 2015. While protections were in place, they didn't cover a certain type of URL encoding.
Threat actors are actively exploiting this, with links to the Kinsing crypto botnet malware 🦠.
Cybersecurity scans found that around 50% of 6,300 accessible Openfire servers are running affected versions 😱.
Attackers can bypass authentication by creating an admin account and uploading a plugin for code execution. However, VulnCheck discovered a stealthier approach—extracting credentials and uploading a plugin without creating an admin account 👾.
This method cleverly avoids detection in security logs 🕵️.
Hold tight, folks! A sneaky attack method named NoFilter 🕶️ has been uncovered, exploiting the Windows Filtering Platform (WFP) for privilege escalation in Windows OS 😱.
This method, discovered by Deep Instinct, helps attackers go from admin to "NT AUTHORITYSYSTEM," a major escalation 👾. It was revealed at the DEF CON security conference.
Here's the scoop: NoFilter takes advantage of WFP, which manages network traffic. By digging into an RPC method called "BfeRpcOpenToken," attackers can manipulate access tokens. These tokens are like keys to unlock privileged tasks.
The hacky part? Malware can use tokens from other processes to gain SYSTEM privileges, even in the kernel, staying stealthy 👀.
In a nutshell, NoFilter can launch as "NT AUTHORITYSYSTEM" or another logged-on user. It shows that built-in components like WFP can harbour new attack routes, avoiding monitored WinAPI and security products.
Remember, hackers are getting craftier, so keep your systems updated and stay vigilant! 🛡️🚫
So long and thanks for reading all the phish!