Ingenious iPhone Passcode Theft Nets Over $300,000

Aaron Johnson, a 26-year-old criminal, executed a deceptively simple but effective scheme to steal over $300,000 from bank accounts by hacking into iPhones. Between 2021 and 2022, Johnson frequented Minnesota bars, where he would observe and memorize the passcodes of young people as they entered them into their iPhones. Once he had the passcodes, he stole the phones, locked the victims out of their Apple IDs, and enrolled his own face in the devices' Face ID, effectively gaining complete control.
Learn more

Widespread JavaScript Malware Targets Online Banking Credentials

A sophisticated JavaScript malware campaign, detected by IBM Security Trusteer in March 2023, has targeted over 40 financial institutions worldwide, compromising at least 50,000 user sessions across North America, South America, Europe, and Japan. This malware, using JavaScript web injections, primarily aims to steal online banking account credentials.
Learn more

Carbanak Malware: Evolving Threat Landscape with Ransomware Tactics

Carbanak, a notorious banking malware active since at least 2014, has resurfaced with new ransomware tactics. According to an analysis by NCC Group, Carbanak has evolved to incorporate diverse attack vectors, enhancing its effectiveness. It now uses compromised websites to distribute malware, often impersonating popular business-related software like HubSpot, Veeam, and Xero. Originally known for its data exfiltration and remote control capabilities, Carbanak has been a tool for the FIN7 cybercrime syndicate.
Learn more

SEC Enforces New Rule for Disclosure of Cybersecurity Incidents

The U.S. Securities and Exchange Commission (SEC) has implemented a new rule requiring publicly traded companies to report "material" cybersecurity incidents within four business days. This rule aims to provide investors with more consistent and transparent information about potential cybersecurity risks, addressing the previous inconsistencies in major incident disclosures.
Learn more

Terrapin Flaw: A Significant Vulnerability in SSH Protocol Security

Researchers at Ruhr University Bochum have uncovered a critical vulnerability in the Secure Shell (SSH) protocol known as Terrapin (CVE-2023-48795, CVSS score: 5.9). This vulnerability introduces a novel prefix truncation attack, enabling attackers to compromise the integrity of SSH's secure channel by manipulating sequence numbers during the handshake process, permitting the removal of initial messages without detection.
Learn more

SonicWall warns admins to patch critical auth bypass bugs immediately

SonicWall, an American cybersecurity firm, urgently alerted customers to patch critical vulnerabilities detected in its Global Management System (GMS) and Analytics software. These vulnerabilities, numbering 15 in total, allow attackers to bypass authentication in systems running older versions of the software, potentially exposing sensitive data.
Learn more

400,000 Corporate Credentials Stolen

A detailed analysis of nearly 20 million malware logs available on the dark web and Telegram has highlighted a significant penetration of information-stealing malware into business settings.
Learn more

White House Issues National Cybersecurity Strategy Road Map

The Biden administration has unveiled its National Cybersecurity Strategy Implementation Plan (NCSIP) to detail the execution of the national cybersecurity strategy introduced earlier this year. Coordinated by the Office of the National Cyber Director, the plan establishes timelines and assigns responsibilities across 18 federal agencies for around 65 different initiatives.
Learn more

Banks Become Main Target for Open Source Attacks

Cybersecurity researchers have unveiled the first-ever open-source software supply chain attacks targeting the banking sector, as detailed by a report from Checkmarx. The attackers demonstrated advanced methods, including targeting specific web components of victim banks by adding malicious functionalities.
Learn more

300,000+ Fortinet firewalls vulnerable to critical FortiOS RCE bug

A critical vulnerability in Fortinet firewalls has put over 300,000 devices at risk of being compromised. The vulnerability, called FortiOS RCE (Remote Code Execution) bug, allows unauthorized individuals to gain control of affected firewalls without authentication or user interaction.
Learn more