[ad_1]
Welcome to our weekly roundup, the place we share what you have to find out about cybersecurity information and occasions that occurred over the previous few days. This week, learn concerning the ProxyToken vulnerability, which may modify change server configurations. Additionally, examine how the LockBit 2.0 ransomware group revealed Bangkok Airways stolen information.
Learn on:
The Evolution of Related Vehicles as Outlined by Risk Modeling UN R155-Listed Assault Vectors
The United Nations Regulation No. 155 units provisions for cybersecurity administration programs in autos. A notable part of the doc is Annex 5, which lists 69 assault vectors affecting automobile cybersecurity. To be able to assist organizations adjust to this regulation, Pattern Micro used the DREAD menace mannequin to evaluate the chance stage of the assault vectors listed in Annex 5.
ProxyToken Vulnerability can Modify Change Server Configs
Found by Le Xuan Tuyen, a Vietnamese safety researcher with VNPT ISC, the ProxyToken vulnerability may very well be used to surreptitiously add an electronic mail forwarding rule to a person’s mailbox so that each one emails addressed to the sufferer may even be despatched to an account managed by the attacker.
Scan Your Microsoft Azure Blob Storage for Dangers
Pattern Micro Cloud One – File Storage Safety offers the reassurance that downstream workflows are shielded from upstream dangers touchdown in your Microsoft Azure blob storage. Recordsdata that embody malware, vulnerabilities, and identified ransomware can impression software and enterprise processes in addition to compliance. New on the Pattern Micro Cloud One safety platform: learn the way simple it’s to observe, establish, and quarantine malicious file coming into your Azure Blobs.
LockBit Jumps Its Personal Countdown, Publishes Bangkok Air Recordsdata
After Bangkok Airways disclosed that it had been clobbered by a cyberattack final week, the LockBit 2.0 ransomware gang tossed its personal countdown clock within the trash and went forward and revealed what it claims are the airline’s encrypted information on its leak website.
API Releases New Commonplace for Pipeline Management Methods
In August, the American Petroleum Institute (API) launched the third version of Commonplace 1164, Pipeline Management Methods Cybersecurity. The version has been in growth since 2017—a results of professional enter from over 70 organizations, together with the US’s Division of Power, Cybersecurity and Infrastructure Safety Company, and the American Fuel Affiliation. The most recent model comes after President Biden introduced a memo, calling on the development of management programs cybersecurity.
Researchers Uncover New Android Banking Malware
Whereas Google has put more cash and energy into securing its app retailer, fraudsters and hackers maintain altering their techniques to get malicious apps posted on the platform. Throughout July, Pattern Micro uncovered a marketing campaign led by hack-for-hire corporations that deployed Android malware to focus on guests to Syria’s e-government web site as a part of its newest cyberespionage marketing campaign.
Cybercriminals Abusing Web-Sharing Companies to Monetize Malware Campaigns
Risk actors are capitalizing on the rising reputation of proxyware platforms like Honeygain and Nanowire to monetize their very own malware campaigns, as soon as once more illustrating how attackers are fast to repurpose and weaponize reputable platforms to their benefit.
BrakTooth Vulnerabilities Put Bluetooth Customers at Threat – and Some Units are Going Unpatched
Representing an estimated 1,400 or extra industrial merchandise, together with Microsoft’s Floor Professional 7, Floor Laptop computer 3, Floor Guide 3, and Floor Go 2 and the Volvo FH infotainment system, the BrakTooth vulnerabilities are claimed to reveal “elementary assault vectors within the closed BT [Bluetooth] stack.” It is not the primary time the identical crew has made such claims, both: ASSET was additionally liable for disclosing the SweynTooth vulnerabilities in February final 12 months.
What do you consider LockBit 2.0’s exercise after its reemergence again in June? Share within the feedback beneath or comply with me on Twitter to proceed the dialog: @JonLClay.
[ad_2]