3 — PHP software package repository hijacked
📦 Packagist, a PHP software package repository, was attacked on May 1, 2023 . An anonymous penetration tester with the pseudonym "neskafe3v1" hijacked over a dozen packages with more than 500 million installs. Multiple Doctrine packages were impacted. Fortunately, the attacker did not make any malicious changes to the packages, but replaced the package description with their own message.
Packagist has taken steps to restore all packages and disabled the accounts involved. To prevent future attacks, users are being urged to enable 🔒 two-factor authentication to secure their accounts. Read Details ➤
4 — Google's Passkeys: Future of Passwordless Security is Here
Google is revolutionizing the way users sign in to their accounts with its new 🔑 passwordless solution, Passkeys! Supported by the FIDO Alliance, Passkeys offer a more secure and convenient way to log in to apps and websites without having to use traditional passwords. 🙌
Users can create Passkeys on their devices and locally store them, unlocking access to their accounts with biometrics or a local PIN. The new solution is resistant to online attacks such as phishing, making it more secure than other login methods like SMS one-time codes. Read Details ➤
5 — BouldSpy: New Android surveillanceware used by Iranian authorities
In a chilling revelation, over 300 minority individuals have been 🕵️♂️ spied on by the Iranian government using a new Android surveillanceware called BouldSpy. With moderate confidence, the malware has been linked to the Law Enforcement Command of the Islamic Republic of Iran, which has targeted Iranian Kurds, Baluchis, Azeris, and Armenian Christian groups.
The malware abuses 📱 Android's accessibility services and other intrusive permissions to collect sensitive information like web browser history, photos, contact lists, SMS logs, keystrokes, screenshots, clipboard content, microphone audio, and video call recordings. The malware also includes a command-and-control (C2) panel to manage victim devices, create new malicious apps, and run additional code sent from the C2 server. The spyware also disables battery management features to prevent victims' devices from terminating its activities. Read Details ➤
6 — Industry giants join forces to combat unauthorized tracking
Apple and Google are taking a united stand against unauthorized tracking with a first-of-its-kind industry-wide specification designed to enhance safety and alert users of potential tracking risks. The initiative aims to ensure Bluetooth location-tracking devices, such as AirTags, comply with instructions and recommendations to minimize the risk of misuse by bad actors.
Key tracking device vendors, including Samsung and Tile, have already signed up to adhere to the new best practices, while the proposal calls for the use of a pairing registry to enhance privacy and enable law enforcement to access verifiable identity information if required. Read Details ➤
7 — LOBSHOT Malware Spreads Through Google Ads
In the latest instance of how threat actors are exploiting Google Ads to deliver malware, a new Windows-based financial trojan and information stealer called LOBSHOT has been discovered. The malware is attributed to a financially motivated e-crime syndicate called TA505, which is associated with the Dridex banking trojan. LOBSHOT is distributed via rogue Google ads for legitimate tools like AnyDesk and can siphon data from over 50 cryptocurrency wallet extensions in web browsers. One of its core capabilities is its hVNC module that allows for direct and unobserved access to the machine. Read Details ➤
8 — TP-Link, Apache, and Oracle Systems Vulnerable to Attack
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified three critical vulnerabilities that are being actively exploited by malicious actors. The three flaws are CVE-2023-1389, affecting TP-Link Archer AX-21 routers; CVE-2021-45046, affecting Apache Log4j2 logging library; and CVE-2023-21839, affecting Oracle WebLogic Server. With the CVSS scores ranging from 7.5 to 9.0, these vulnerabilities pose a severe threat to systems and sensitive data. Read Details ➤
9 — Google strikes back at CryptBot malware attackers
Google has obtained a temporary court order in the US to halt the spread of the CryptBot malware, which steals sensitive data such as authentication credentials and cryptocurrency wallets from Google Chrome users. The malware is believed to have infected over 670,000 computers in 2022, with major distributors suspected to be based in Pakistan. Google intends to use the order to take down CryptBot-related domains and stems new infections. Read Details ➤
That's all for this week's edition of our cybersecurity newsletter. We hope that our roundup has provided you with valuable insights and information to stay on top of the latest developments in the industry. Remember, cybersecurity is a constantly evolving field, so stay vigilant and keep learning. Until next week, stay safe and secure!