31 May 2023 Weekly Newsletter

BOCRA website

     

NEWSLETTER

 

Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims


                                                     LATEST CYBER HACKS 

 
 
icon

Retailer Database Error Leaks Over One Million Customer Records

A database configuration error at a popular automotive retailer led to the exposure of 1TB of records, including customers’ personal information, according to WebsitePlanet.

icon

New hacking forum leaks data of 478,000 RaidForums members

A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into the people who frequented the forum. RaidForums was a very popular and notorious hacking and data leak forum known for hosting, leaking, and selling data stolen from breached organizations.

icon

Jimbos Protocol Hack: $7.5 Million Lost in Latest DeFi Attack

In the ever-evolving world of decentralized finance (DeFi), security remains a persistent challenge. The latest victim of a protocol hack is Jimbos Protocol, a decentralized liquidity platform operating on the Arbitrum system. The attack resulted in a loss of 4,000 Ether (ETH), valued at around $7.5 million during the incident. 


                                                      VULNERABILITIES

 
 
icon

Enhanced Legion Credential Harvester Targets SSH    Servers and AWS Credentials

Legion, a Python-based credential harvester discovered last month, is widening its attack scope with some additional feature updates to target cloud services.

icon

Severe Flaw in Google Cloud's Cloud SQL Service Exposed Confidential Data

A new security flaw has been disclosed in the Google Cloud Platform's (GCP) Cloud SQL service that could be potentially exploited to obtain access to confidential data.


                                     MALWARES

 
 
icon

Vidar Stealer, Laplas Clipper, and XMRig Miner in YouTube Pirated Software Videos

Earlier this month, FortiGuard Labs encountered an active campaign that posed a threat to YouTube users who browse the platform for pirated software. Verified YouTube channels with a significant subscriber base were found to upload videos promoting the download of such software.

icon

Blacktail Leverages LockBit and Babuk Source Code to Build Buhti

A new ransomware operation, dubbed Buhti, is using the leaked source code of the encryptor from LockBit and Babuk ransomware. It, additionally, uses a custom-developed information stealer to exfiltrate data.

icon

Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users

A new open source remote access trojan (RAT) called DogeRAT targets Android users primarily located in India as part of a sophisticated malware campaign.


                               GENERAL NEWS

 
 
icon

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you're a cybersecurity professional, you're likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM and all of the myriad others, there seems to be a new initialism born each day.

icon

Company size doesn’t matter when it comes to cyberattacks

65% of organizations in the enterprise sector suffered a cyberattack within the last 12 months, which is similar to the results among companies of all sizes (68%), according to Netwrix.