YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🚨 Alert: Docker API Under Attack! Threat actors are exploiting Docker Engine API vulnerabilities to build a powerful botnet called OracleIV.

https://thehackernews.com/2023/11/alert-oracleiv-ddos-botnet-targets.html

PogoWasRight, to infosec

The NoEscape ransomware gang claims to have hit two more medical entities. They provide no proof of claims, however, and there is no notice on either entity's site about any incident. BUT:

One of them is Southeastern Orthopaedic Specialists in NC. NoEscape claims it locked them on October 25 and the victim hasn't responded to them at all. As we've seen with NoEscape before, they appear to now be hitting the victim with a DDoS attack and attempts to connect to the entity's site right now are failing/timing out. NoEscape claims to have 400,000 files / 3 GB of data. DataBreaches has written to the entity, but that was just a few minutes ago and unsurprisingly, no reply as yet.

The other entity hit is Caresprings in Ohio and Kentucky. No DDoS on this one. NoEscape claims to have locked them on Nov. 10 and to have exfil'd 364 GB of files. There is no notice on Carespring's site at this time.

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

➝ 🔓 ✈️ breach: LockBit leaks 50 GB of data
➝ 🇨🇳 World’s largest commercial bank confirms attack
➝ 🔓 ☁️ Sumo Logic alerts customers about ; advises rotate Sumo Logic API access keys
➝ 🔓 🇮🇪 Electric Ireland admits data breach that could see customer financial data compromised
➝ 🔓 🇨🇦 says ransomware data breach affects 267,000 patients
➝ 🔓 🇸🇬 Marina Bay Sands reward members data breached, over 650k people exposed
➝ 🇮🇱 🇵🇸 🇮🇷 Cyber ops linked to - conflict largely improvised, researchers say
➝ 🧨 🤖 confirms attacks behind ongoing outages
➝ 🛍️ 💸 Fake Ledger Live app in Store steals $768,000 in
➝ 🔓 🐰 ‘Looney Tunables’ Vulnerability Exploited in Attacks
➝ 🇺🇸 🇷🇺 US Sanctions Russian National for Helping Ransomware Groups Launder Money
➝ 🇮🇷 🇮🇱 Iranian Hackers Launch Destructive Cyber Attacks on Israeli and Sectors
➝ 🇫🇷 🇬🇧 , Seek Greater Regulation of Commercial
➝ 🇪🇺 🤐 is trading security for digital
➝ 🇷🇺 🇺🇦 Russian Hackers Used Attack to Disrupt Power in Amid Mass Missile Strikes
➝ 🦠 🚪 Highly invasive snuck into packages targets developers
➝ 🦠 🇰🇵 N. Korea's Blamed for Hacking Machines with ObjCShellz
➝ 🫣 tests usernames that keep your phone number private
➝ 🔐 Microsoft Authenticator now blocks suspicious alerts by default
➝ ☁️ 💰 Researchers Uncover Undetectable Technique on Automation
➝ 👥 💰 Data Brokers Expose Sensitive US Military Member Info to Foreign Threat Actors: Study
➝ 🩹 Microsoft Says Exchange ‘Zero Days’ Disclosed by Already Patched or Not Urgent
➝ 🐛 Veeam warns of critical bugs in ONE monitoring platform

📚 This week's recommended reading is: "How the F*ck Did This Happen?: A guide for executives who need to understand Cyber Security in plain, actionable language" by Dr Darryl Carlton

Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-452023

avolha, to infosec Polish

"Aktor przeprowadza tymczasowy atak, robi zrzuty ekranu «dowodzące» wystąpienia awarii, która często trwa przez krótki czas i dotyka niewielkiej liczby użytkowników, a następnie twierdzi, że jest to ogromny sukces" - tak Alexander Leslie z firmy Recorded Future podsumował ostatnie działania grupy Anonymous Sudan wymierzone w OpenAI. Od dłuższego czasu przyglądam się różnym grupom prorosyjskich haktywistów (o Killnecie będę zresztą opowiadać na Oh My H@ck) i całkowicie się zgadzam z powyższym spostrzeżeniem - większość tego typu grup bardziej niż na atakach skupia się na budowaniu własnej marki 🤡​

Więcej o ataku DDoS na OpenAI: https://kapitanhack.pl/2023/11/13/nieskategoryzowane/anonymous-sudan-a-ataki-na-chatgpt-i-associated-press/

governa, to OpenAI
@governa@fosstodon.org avatar
TheReportify, to OpenAI

JUST IN: OpenAI investigating suspected DDoS attack causing outages on ChatGPT and API. Cybersecurity expert advises robust protection. Stay tuned for updates. https://thereportify.com/to/177349https://thereportify.com/openai-investigating-suspected-ddos-attack-causing-chatgpt-outages/

rysiek, (edited ) to microsoft
@rysiek@mstdn.social avatar

🤡

> Just as GitHub was founded on Git, today we are re-founded on Copilot. 🤖 See how GitHub’s AI-powered platform vision evolved into a new reality for the world’s developers, and find out everything we announced at this year’s #GitHubUniverse.
https://nitter.net/github/status/1722309261680607674?s=20

For years I've been saying that using Microsoft GitHub to host #FLOSS code is dangerous and would backfire. :blobcatcoffee:

"But it's so convenient!" 🤣

#Copilot #CopilotHub #Microsoft #GitHub

kkarhan,
@kkarhan@mstdn.social avatar

@rysiek @PiTau A good example are some projects like this one maintained by me:
https://github.com/greyhat-academy/lists.d

Shure I could spin up a but then try to find some Hoster that is willing to deal with apologists 'ing it offline or harrassing staff of said hoster.

I know - like and they are a collaborator, but I've yet to see a better option that doesn't cost me €€€€€, cuz my projects have literally ZERO funding.

PogoWasRight, to Cybersecurity

Mulkay Cardiology Consultants notifies almost 80,000 of ransomware attack:

https://www.databreaches.net/mulkay-cardiology-consultants-notifies-almost-80000-of-ransomware-attack/

This is one where the victim may have paid but hasn't disclosed that and hasn't responded to inquiries.

@brett @allan @euroinfosec @BleepingComputer

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🚨Cloudflare thwarts massive attacks exceeding 100M requests/second.

Find out how HTTP/2 Rapid Reset flaw triggered a 65% increase in Q3 attacks.

https://thehackernews.com/2023/10/record-breaking-100-million-rps-ddos.html

shved, to Cybersecurity
@shved@mastodon.social avatar

Cloudflare. A #cybersecurity service that "protects" you from bad actors, #hackers, #DDoS and other online threats.
What seemingly no one talks about is that 80% of #CDN market is owned by Cloudflare. They move more traffic than #FAANG companies combined!
They hold such obscene amount of power and control over the #internet, its hard to describe.
They are the gatekeepers, they are enforcers of whom to block, and what to allow to exist.
Google holds no power when compared to Cloudflare.

governa, to random
@governa@fosstodon.org avatar

Cloud giants sound alarm on record-breaking attacks

https://www.cybersecuritydive.com/news/ddos-attacks-novel-zero-day/696136/

tdp_org, to infosec
@tdp_org@mastodon.social avatar

One of the botnets we see as the source frequent attacks against us very often has IPs which Shodan et al list as running Squid (often v4.14). I don't know for sure if this is related but it could be:
https://www.theregister.com/2023/10/13/squid_proxy_bugs_remain_unfixed/

BishopFox, to random

FinServ orgs prioritize #cloud vulnerabilities as their top cyber #threat driving #offensivesecurity investments (45%), followed by preventing #DDoS attacks (36%) and #MiTM attacks (28%). Get more insight into #offsec as it pertains to #financialservices in our report with the #PonemonInstitute.

https://bfx.social/46Tzo9G

simontsui, to random

Unit 42 reported on a new campaign from the XorDDoS Trojan. While the attacking domains remain unchanged, the attackers have migrated their offensive infrastructure to hosts running on legitimate public hosting services. Unit 42 provides an analysis of XorDDoS Trojan's attacking behaviors, the botnet's network infrastructure, and advanced signatures derived from the key attacking hotspots, including hostnames, URLs and IP addresses.
Link: https://unit42.paloaltonetworks.com/new-linux-xorddos-trojan-campaign-delivers-malware/

Tags:

fosslife, to security
@fosslife@fosstodon.org avatar
itnewsbot, to security
@itnewsbot@schleuss.online avatar

Biggest DDoSes of all time generated by protocol 0-day in HTTP/2 - Enlarge (credit: Aurich Lawson / Getty)

In August and Septembe... - https://arstechnica.com/?p=1975840 /2

sebastian_dra, to random German
@sebastian_dra@nrw.social avatar

auf die Stadtseite von . Lokaler Dienstleister überfordert. Jetzt kann nur noch die Cybercrime Spezialeinheit der Polizei helfen.

PogoWasRight, to Cybersecurity

Ransomware group starts leaking data allegedly from NJ cardiology consultants group:

https://www.databreaches.net/ransomware-group-starts-leaking-data-allegedly-from-nj-cardiology-consultants-group/

Listing for Mulkay Cardiology Consultants reappears on NoEscape leak site, this time with some proof of claims. Still no disclosure or anything from Mulkay that I can find.

@brett @BleepingComputer @aj_vicens

YourAnonRiots, to linux Japanese
@YourAnonRiots@mstdn.social avatar

⚠️ Ever heard of an IP address in hexadecimal notation? It's the latest disguise hackers use to deploy malware on systems.

https://thehackernews.com/2023/10/shellbot-uses-hex-ips-to-evade.html

sjvn, to random
@sjvn@mastodon.social avatar

Google Cloud, AWS, and Cloudflare report largest attacks ever https://zdnet.com/article/google-cloud-aws-and-cloudflare-report-largest-ddos-attacks-ever/ by @sjvn

How bad was it? According to Google, in two minutes, the Google Cloud was slammed by more requests per second than Wikipedia saw in all of September 2023.

fosslife, to security
@fosslife@fosstodon.org avatar

New zero-day vulnerability dubbed HTTP/2 Rapid Reset leads to massive DDoS attack https://www.fosslife.org/http2-vulnerability-leads-massive-ddos-attack

avoidthehack, to Cybersecurity

Organizations Respond to HTTP/2 Zero-Day Exploited for DDoS Attacks

"HTTP/2 Rapid Reset" used for record-breaking denial of service attacks, with requests peaking at hundreds of millions per second.

The vulnerability that enables this attack is tracked as CVE-2023-44487.

There are a ton of advisories covering this. This article is a nice summary of them all.

It's also been added to CISA's known exploited vulnerabilities catalog.

https://www.securityweek.com/organizations-respond-to-http-2-zero-day-exploited-for-ddos-attacks/

jtk, (edited ) to random

Barry Greene is spearheading an effort to bring attention to a -based (TCP port 179) attack seen in the wild. There are over 300,000 BGP listeners publicly reachable on the internet. While some are surely random one-armed routers or of little consequence many serious routers/networks are included in this count and potentially at risk.

Barry's original blog post:

Overview of campaign to safeguard BGP sessions:

Guide to protecting BGP sessions

BGP Session DDoS Attack CVSS walk-through

autonomysolidarity, to random German
@autonomysolidarity@todon.eu avatar

#Razzia in Privat- und Geschäftsräumen. Vorwurf: Radio Dreyeckland habe einen Indymedia Artikel verlinkt.
What?

"In Freiburg werden seit dem Morgen des heutigen 17.01.2023 mehrere Durchsuchungsbeschlüsse vollstreckt. Neben Privatwohnungen sind hiervon auch die Geschäftsräumlichkeiten des Rundfunksenders "Radio Dreyeckland" betroffen.

Den Beschuldigten liegt zur Last, auf der Homepage des genannten Rundfunksenders einen Artikel veröffentlicht zu haben, der eine Verlinkung eines Archivs der verbotenen Vereinigung "linksunten.indymedia" enthält."

@RDL

https://www.presseportal.de/blaulicht/pm/110970/5418061

#Repression #Pressefreiheit #antireport

autonomysolidarity, (edited )
@autonomysolidarity@todon.eu avatar

Angriffe auf de.inymedia.org - mal wieder...
"Wie sicherlich einige mitbekommen haben, war die Seite in den letzten Wochen quasi nicht mehr erreichbar. Der Grund war ein (Distributed Denial of Service) Angriff über diese Zeit.
(...)
Dabei wurden sowohl Zehntausende von gleichzeitigen Anfragen an die Server gesendet und also auch die Antworten gar nicht mehr abgewartet. Dadurch werden die Server beschäftigt, d.h. hohe Last erzeugt, während die Angreifenden nur die kurzen Anfragen stellen mussten. Normale Anfragen kommen dann nicht mehr durch.
(...)
Wir sind wütend und geben nicht auf: Wir haben aus dem ganzen gelernt und werden Änderungen vorantreiben - lasst Euch überraschen!"
https://emrawi.org/?Angriffe-auf-de-inymedia-org-mal-wieder-2847

quincy, to random
@quincy@chaos.social avatar

. gaslighting the web™:

"""
Checking if the site connection is secure

This check is taking longer than expected. Check your Internet connection and refresh the page if the issue persists.

Did you know companies are using machine learning to help identify and protect against bot traffic?
"""

kkarhan,
@kkarhan@mstdn.social avatar

@quincy So basically worse than the -based mitigation @torproject is working on to make run smoothly...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines