Risky Bulletin Hackers breach Norwegian dam open valve at full capacity Risky Business Media
pWritten byppNews Editorpp
This newsletter is brought to you by
Authentik
You can subscribe to an audio version of this newsletter as a podcast by searching for Risky Business in your podcatcher or subscribing via
this RSS feed
pp
Unidentified hackers have breached the systems of a Norwegian dam and opened its water valve at full capacity in an incident this April
pp
The incident took place at the
Lake Risevatnet
dam near the city of Svelgen in Southwest Norway
pp
The valve ran at full capacity for four hours before the unauthorized change was detected
pp
According to Norwegian energy news outlet
Energiteknikk
the hack didnt put anyone in danger barely moving water output over the dams minimum water flow requirement
pp
The water went pouring 497 liters per second over the minimum but officials say the river bed could have handled up to 20000 liters per second
pp
Officials believe the hack took place because of a weak password for the valves webaccessible control panelwhich is a common problem with lots of ICS gear these days
pp
In all of this its unclear if putting the valve at full capacity was intentional or not
pp
This would not be the first time that random hackers breached internetexposed panels for sensitive industrial equipment and pushed buttons or modified values at random The
2016 Verizon DBIR report
includes an example where hackers broke into an unnamed water treatment facility and modified chemical levels in what incident responders described as random
pp
Malicious incidents have also happened where the modifications were intentional and targeted specific values
pp
ProPalestinian hacktivists have repeatedly hacked Israeli water treatment facilities in
2020
and attempted to modify water chlorine levels unsuccessfully
pp
Youd expect me to cite the
Oldsmar Florida
water utility hack from 2021 but that one has been since
debunked
as an accidental click by one of its employees that authorities mistook as an external hack
pp
The main
Risky Business
podcast is now on YouTube with video versions of our recent episodes Below is our latest weekly show with Pat and Adam at the helm
pp
Dutch DDoS attacks
ProKremlin group
NoName05716
is back to its old DDoS shenanigans and carried out DDoS attacks against various Dutch government websites ahead of the NATO summit set to take place in the country this week
Additional coverage in
De Telegraaf
pp
Saudi Games leak
A proIranian hacking group named
Cyber Fattah
has leaked the data of athletes and visitors of the Saudi Games
pp
War Thunder leaks part a bajillion
War Thunder gamers have reaffirmed their title as
best leakers on the internet
and posted a restricted operating manual for AV8B and TAV8B Harrier fighter jets
Additional coverage in the
UK Defence Journal
pp
Trezor contact form incident
A threat actor has abused the contact form of cryptowallet provider Trezor to contact its users as part of a phishing campaign The attackers posed as the companys tech support team and tried to lure users to phishing sites
Trezor says
it has now fixed the issue
pp
Windows 11 restore points last 60 days now
Microsoft has modified the lifespan of Windows 11 restore points which now
last 60 days
instead of 90
pp
Closed group addons allowed on AMO
Mozilla has
updated
its addon store policies to allow developers to host closed group Firefox extensions These are addons designed to be used by a private audience such as enterprise customers
pp
Firefox 140
Mozilla has released Firefox 140
New features
and
security fixes
are included The biggest feature in this release is vertical tabs Firefox previously supported vertical tabs but they were a UI mess These ones actually look like vertical tabs and also include support for pinned tabs Pocket has also been removed from Firefox after the service shut down Users can also unload tabs to free up memory
pp
EU looks to ditch Azure
The European Commission is in advanced talks with French company OVHcloud to replace Microsoft Azure as the EUs official cloud provider According to
Euractiv
the talks have been underway for several weeks and also included three other European cloud providers Talks accelerated this month after the Trump administration
imposed sanctions
on four judges of the International Criminal Court The judges had their Microsoft accounts shut down rekindling a push for the EUs digital sovereignty
pp
EU publishes PQC transitioning roadmap
EU member states
are expected
to start transitioning systems to postquantum cryptography by the end of 2027 The transition of highrisk systems such as critical infrastructure should be finished by the end of 2030 States should migrate as many systems as feasible by the start of 2036 Postquantum cryptography or PQC is a collection of encryption algorithms that can withstand attacks from quantum computers
pp
Russia plans a national IMEI database
The Russian government plans to create a national database of mobile device IMEI codes IMEI codes are unique identifiers assigned to each smartphone The Russian Ministry of Digital Affairs says the database will be used to combat financial fraud Banning IMEI codes will allow authorities to block individual devices from mobile networks even after fraudsters change phone numbers
Additional coverage in
Izvestia
pp
UK National Security Strategy 2025
Ahead of the NATO Summit in the Netherlands this week the UK has
published
its National Security Strategy 2025
PDF
The plan promises to spend 5 of the UK GDP on national security by 2035 The plan also promises to invest some of those funds toward cybersecurity
pp
Frank about increasing threat risk and vulnerability
pp
Common Good Cyber Fund
The Canadian and UK governments launched a fund to support cybersecurity nonprofits The
Common Good Cyber Fund
will be available to nonprofits that maintain core digital infrastructure such as DNS internet routing or free threat intelligence systems It will also support organizations that provide cybersecurity assistance to highrisk individuals The fund will be managed by the Internet Society and Global Cyber Alliance and has seed funding of
57 million
for the next five years
pp
FDA urges manufacturers for more cybersecurity
The US Food and Drug Administration has
urged
manufacturers to prioritize cybersecurity when designing new medical products or when putting new supply chains together
pp
US states crack down on Bitcoin ATMs
Axios
has a look at all the efforts across US states to crack down on Bitcoin ATMs and their use for scams and money laundering
pp
US House bans WhatsApp on Congress devices
The US House of Representatives has banned WhatsApp on member devices The app was classified as highrisk due to the absence of ondevice data encryption and the lack of transparency in how it protects user data The House chief administrative office said Microsoft Teams Wickr Signal iMessage and FaceTime were acceptable replacements
Additional coverage in
Axios
pp
Iran strikes had US cyber component
The US missile strikes on Irans nuclear facilities included a cyber component according to the Pentagon What that was remains unknown
Additional coverage in
DefenseScoop
pp
In speech about Iranian nuclear program bombing mission the Chief of the Joint Staff indicated involvement of US cyber operators Interesting mention would be interested to learn more about this element
wwwyoutubecomwatchv0aCA
pp
In this Risky Bulletin sponsor interview Fletcher Heisler CEO of Authentik talks to Tom Uren about the inflection points that make organizations consider rationalizing their Identity Providers IdPs The pair also discuss sovereign tech stacks and how to earn the trust of customers
pp
Four REvil members released
A Russian court has sentenced four members of the REvil ransomware to time served The four were detained in January 2022 in a raid that arrested 14 of the ransomware groups members They were sentenced on cardingrelated charges Russian authorities previously complained US authorities shared sparse evidence of their role in ransomware attacks and then ceased all communications after its invasion of Ukraine Four other REvil members were
sentenced
to jail last October on sentences from 45 to six years in prison
Additional coverage in
TASS
English coverage in
CyberScoop
pp
Dark Gaboon linked to ransomware attacks in Russia
Russian security firm F6 has
linked
a financially motivated group named Dark Gaboon to attacks with the LockBit ransomware inside Russia F6 tracks the group as Room155 but they are also known as Vengeful Wolf Theres a similar report like this from
Positive Technologies
pp
Telegram dark markets rise to fill void
Several Telegram illicit markets have
risen in popularity
and are filling the void left after the US sanctioned and Telegram took down the channels of Huione Guarantee earlier this year Congratulations to Telegram for not learning anything from its CEOs recent arrest in France and refusing to ban the new channels sarcasm
pp
After its takedowns last month crypto tracing firm Elliptic warned Telegram that the scammers and their enablers would just shift to the nextbiggest markets and shared an extensive list of their channels and usernames with Telegram It declined to ban any of them
pp
Coinbase scammer
Blockchain sleuth ZachXBT claims to have found the identity of a major cryptoscammer named Daytwo and PawsOnHips as a New York man named Christian Nieves The researcher says the scammer stole over 4 million worth of cryptoassets from Coinbase users by posing as Coinbase support personnel
Additional coverage in
The Shib
pp
IsraelIran cyber war
Security firms
CloudSEK
GroupIB
and
Trellix
have published an overview of all the cyber hacktivist and GPS jamming activity taking place right now in the Middle Eastobviously caused by the recent military conflict between Iran and Israel
pp
CyberAv3ngers profile
DomainTools CTI team has published a profile on Iranian hacking group
CyberAv3ngers
pp
Fake SonicWall app steals VPN credentials
A threat actor is distributing a
malicious version
of the SonicWall SSL VPN NetExtender app that steals VPN credentials from infected users
pp
ConnectWise abused to sign malware
Since March a threat actor has abused the ConnectWise installer to sign malware The EvilConwi group exploited attributes in the installer that were exempted from the certificate signing to load and run their malware from the installer itself German security firm GDATA
spotted and reported
the abuse to ConnectWise on June 12 The company
rotated
its signing certificate a day later
pp
WordPress Core malware framework
Wordfence has
spotted
a new modular malware framework designed for credit card skimming and WordPress credential theft The malware is typically installed on hacked WordPress sites as a plugin named WordPress Core
pp
Pulsar RAT
ThreatMon has published an analysis of the
Pulsar RAT
a NET RAT considered a continuation of the older Quasar RAT
pp
SparkKitty
Kaspersky has spotted a new version of the SparkCat malware which they named
SparkKitty
This is a mobile trojan that infected both Android and iOS and was using OCR to scan the victims images for cryptowallet seed phrases
pp
LapDogs botnet
SecurityScorecard has discovered a new botnet used by Chinese hackers to hide their attacks Named
LapDogs
the botnet runs on top of a custom backdoor named ShortLeash The botnet has infected more than 1000 devices with most being SOHO routers At least one Chinese APT group named
UAT5918
used the botnet to hide its operations
pp
Authentik is an opensource identity provider that is also offered with paid enterprise features In this demo CEO Fletcher Heisler and CTO Jens Langhammer walk Risky Business host Patrick Gray through an overview and a demo of the technology
pp
TAG140s DRAT v2
Recorded Future has published a report on the new version of
DRAT
a remote access trojan used by TAG140 SideCopy a suspected Pakistani APT
pp
APT36 Transparent Tribe
Indian security firm CyFirma has spotted a
new APT36 campaign
targeting the Indian defense sector APT36 is a suspected Pakistani APT
pp
APTQ14
Chinese security firm QiAnXin says a cyberespionage group tracked as
APTQ14
is using a zeroday XSS vulnerability in an unnamed webmail platform to target domestic organizations The group also used Microsofts
ClickOnce
deployment technology to install their malware QiAnXin says the group is part of the larger DarkHotel group previously linked to South Korea by other security firms
pp
APTC06
Qihoo 360 another Chinese security firm also published a report on DarkHotel which they call
APTC06
but this one looks at a campaign targeting North Korean trade personnel
pp
UAC0001 APT28
CERTUA has published a
report
on a UAC0001 campaign that targeted Ukrainian government agencies with the BEARDSHELL and COVENANT malware
pp
Havoc analysis
Fortinet has published an
analysis
of a Havoc C2 framework sample that was used in a Middle East APT intrusion at a critical infrastructure organization
pp
PwC on APT attribution
PwCs security team has published a
detailed writeup
on their process of attributing threat actors
pp
Libxml2 makes security reports public
The lead developer of the Libxml2 library has announced that all vulnerability reports submitted to the project will be public by default
Nick Wellnhofer says
security flaws will also no longer have a deadline to release a fix and theyll be patched when he has time Wellnhofer hopes the new policy will make downstream users nervous and encourage them to contribute back to the project The Libxml2 library is currently used in macOS Windows and Linux operating systems
pp
Yealink vulnerabilities
CloudAware researchers have
disclosed
several vulnerabilities in the Yealink VoIP phone system Yealink
acknowledged the issues
and asked customers to upgrade to newer versions
pp
WinRAR RCE
RARLAB has
released
a security update for the WinRAR filearchiving software to patch a vulnerability that can be abused for remote attacks Tracked as
CVE20256218
the vulnerability is a path traversal bug that can allow attackers to run code on a users system The issue only impacts WinRAR Windows versions
pp
Splunk security updates
Cisco has released
four security advisories
for its Splunk SIEM platform
pp
Echo Chamber Attack
NeuralTrust has published details on
Echo Chamber
a new LLM jailbreaking technique
pp
New SSRF technique
Assetnote now with Searchlight Cyber has developed a
new SSRF technique
that uses HTTP redirect loops to leak the full content of HTTP responses
pp
Phantom Persistence technique
Grant Smith the President of the Phantom Security Group has posted details about
Phantom Persistence
a new Windows persistence technique
pp
FileFix technique
Security researcher mrd0x has developed an alternative to the ClickFix technique named
FileFix
The technique works by tricking users into copying and pasting a file path into Windows Explorer The trick is that an attacker can modify the copied file path to prepend PowerShell commands before it and add a bunch of space characters to hide them from view
pp
Threattrend reports
AM Best
Cobalt
Incogni
Sophos
and
WithSecure
have recently published reports and summaries covering various infosec trends and industry threats From the AM Best report
pp
CIDP shuts down
Cybersecurity firms have shut down a project that offered free security services to critical infrastructure organizations The Critical Infrastructure Defense Project was established in 2022 by Cloudflare CrowdStrike and Ping Identity The program was set up after Russias invasion of Ukraine to help US organizations defend against possible Russian cyberattacks and sabotage Its main beneficiaries were hospitals water systems and power utilities
Additional coverage in
NextGov
pp
New toolXMRogue
Security firm
Akamai
has developed a new tool named
XMRogue
that can be used to sabotage cryptomining botnets The tool works by joining the botnet and submitting bad computations to Monero mining pools Repeated submissions will get the botnet banned from the mining pool and crash the attackers earnings The technique works best against cryptomining botnets that use proxies to submit computations from their infected systems
pp
New toolhaveibeenpwnedwatch
Snap security engineer GeorgeAndrei Iosif has released
haveibeenpwnedwatch
a portal that displays the data from the haveibeenpwnedcom database in easytounderstand graphs
pp
CODE BLUE 2024 videos
Talks from the CODE BLUE 2024 security conference which took place last November are
available on YouTube
pp
SANS CTI Summit 2025 videos
Videos from the SANS Cyber Threat Intelligence Summit 2025 security conference which took place at the end of January are
available on YouTube
pp
In this edition of
Between Two Nerds
Tom Uren and The Grugq dive into the motivations and actions of Predatory Sparrow a purported hacktivist group that has been attacking Iran for the last five years and has leaped into the IranIsrael work
pp
In this edition of
Seriously Risky Business
Tom Uren and Patrick Gray talk about a Minnesota man who used peoplesearch services to locate stalk and eventually murder political targets They also discuss the purported hacktivist group Predatory Sparrow weighing in on the IranIsrael conflict
pp
Risky Business Media Pty Ltd
PO Box 774
Byron Bay NSW 2481
General Email editorialriskybiz
p
This newsletter is brought to you by
Authentik
You can subscribe to an audio version of this newsletter as a podcast by searching for Risky Business in your podcatcher or subscribing via
this RSS feed
pp
Unidentified hackers have breached the systems of a Norwegian dam and opened its water valve at full capacity in an incident this April
pp
The incident took place at the
Lake Risevatnet
dam near the city of Svelgen in Southwest Norway
pp
The valve ran at full capacity for four hours before the unauthorized change was detected
pp
According to Norwegian energy news outlet
Energiteknikk
the hack didnt put anyone in danger barely moving water output over the dams minimum water flow requirement
pp
The water went pouring 497 liters per second over the minimum but officials say the river bed could have handled up to 20000 liters per second
pp
Officials believe the hack took place because of a weak password for the valves webaccessible control panelwhich is a common problem with lots of ICS gear these days
pp
In all of this its unclear if putting the valve at full capacity was intentional or not
pp
This would not be the first time that random hackers breached internetexposed panels for sensitive industrial equipment and pushed buttons or modified values at random The
2016 Verizon DBIR report
includes an example where hackers broke into an unnamed water treatment facility and modified chemical levels in what incident responders described as random
pp
Malicious incidents have also happened where the modifications were intentional and targeted specific values
pp
ProPalestinian hacktivists have repeatedly hacked Israeli water treatment facilities in
2020
and attempted to modify water chlorine levels unsuccessfully
pp
Youd expect me to cite the
Oldsmar Florida
water utility hack from 2021 but that one has been since
debunked
as an accidental click by one of its employees that authorities mistook as an external hack
pp
The main
Risky Business
podcast is now on YouTube with video versions of our recent episodes Below is our latest weekly show with Pat and Adam at the helm
pp
Dutch DDoS attacks
ProKremlin group
NoName05716
is back to its old DDoS shenanigans and carried out DDoS attacks against various Dutch government websites ahead of the NATO summit set to take place in the country this week
Additional coverage in
De Telegraaf
pp
Saudi Games leak
A proIranian hacking group named
Cyber Fattah
has leaked the data of athletes and visitors of the Saudi Games
pp
War Thunder leaks part a bajillion
War Thunder gamers have reaffirmed their title as
best leakers on the internet
and posted a restricted operating manual for AV8B and TAV8B Harrier fighter jets
Additional coverage in the
UK Defence Journal
pp
Trezor contact form incident
A threat actor has abused the contact form of cryptowallet provider Trezor to contact its users as part of a phishing campaign The attackers posed as the companys tech support team and tried to lure users to phishing sites
Trezor says
it has now fixed the issue
pp
Windows 11 restore points last 60 days now
Microsoft has modified the lifespan of Windows 11 restore points which now
last 60 days
instead of 90
pp
Closed group addons allowed on AMO
Mozilla has
updated
its addon store policies to allow developers to host closed group Firefox extensions These are addons designed to be used by a private audience such as enterprise customers
pp
Firefox 140
Mozilla has released Firefox 140
New features
and
security fixes
are included The biggest feature in this release is vertical tabs Firefox previously supported vertical tabs but they were a UI mess These ones actually look like vertical tabs and also include support for pinned tabs Pocket has also been removed from Firefox after the service shut down Users can also unload tabs to free up memory
pp
EU looks to ditch Azure
The European Commission is in advanced talks with French company OVHcloud to replace Microsoft Azure as the EUs official cloud provider According to
Euractiv
the talks have been underway for several weeks and also included three other European cloud providers Talks accelerated this month after the Trump administration
imposed sanctions
on four judges of the International Criminal Court The judges had their Microsoft accounts shut down rekindling a push for the EUs digital sovereignty
pp
EU publishes PQC transitioning roadmap
EU member states
are expected
to start transitioning systems to postquantum cryptography by the end of 2027 The transition of highrisk systems such as critical infrastructure should be finished by the end of 2030 States should migrate as many systems as feasible by the start of 2036 Postquantum cryptography or PQC is a collection of encryption algorithms that can withstand attacks from quantum computers
pp
Russia plans a national IMEI database
The Russian government plans to create a national database of mobile device IMEI codes IMEI codes are unique identifiers assigned to each smartphone The Russian Ministry of Digital Affairs says the database will be used to combat financial fraud Banning IMEI codes will allow authorities to block individual devices from mobile networks even after fraudsters change phone numbers
Additional coverage in
Izvestia
pp
UK National Security Strategy 2025
Ahead of the NATO Summit in the Netherlands this week the UK has
published
its National Security Strategy 2025
The plan promises to spend 5 of the UK GDP on national security by 2035 The plan also promises to invest some of those funds toward cybersecurity
pp
Frank about increasing threat risk and vulnerability
pp
Common Good Cyber Fund
The Canadian and UK governments launched a fund to support cybersecurity nonprofits The
Common Good Cyber Fund
will be available to nonprofits that maintain core digital infrastructure such as DNS internet routing or free threat intelligence systems It will also support organizations that provide cybersecurity assistance to highrisk individuals The fund will be managed by the Internet Society and Global Cyber Alliance and has seed funding of
57 million
for the next five years
pp
FDA urges manufacturers for more cybersecurity
The US Food and Drug Administration has
urged
manufacturers to prioritize cybersecurity when designing new medical products or when putting new supply chains together
pp
US states crack down on Bitcoin ATMs
Axios
has a look at all the efforts across US states to crack down on Bitcoin ATMs and their use for scams and money laundering
pp
US House bans WhatsApp on Congress devices
The US House of Representatives has banned WhatsApp on member devices The app was classified as highrisk due to the absence of ondevice data encryption and the lack of transparency in how it protects user data The House chief administrative office said Microsoft Teams Wickr Signal iMessage and FaceTime were acceptable replacements
Additional coverage in
Axios
pp
Iran strikes had US cyber component
The US missile strikes on Irans nuclear facilities included a cyber component according to the Pentagon What that was remains unknown
Additional coverage in
DefenseScoop
pp
In speech about Iranian nuclear program bombing mission the Chief of the Joint Staff indicated involvement of US cyber operators Interesting mention would be interested to learn more about this element
wwwyoutubecomwatchv0aCA
pp
In this Risky Bulletin sponsor interview Fletcher Heisler CEO of Authentik talks to Tom Uren about the inflection points that make organizations consider rationalizing their Identity Providers IdPs The pair also discuss sovereign tech stacks and how to earn the trust of customers
pp
Four REvil members released
A Russian court has sentenced four members of the REvil ransomware to time served The four were detained in January 2022 in a raid that arrested 14 of the ransomware groups members They were sentenced on cardingrelated charges Russian authorities previously complained US authorities shared sparse evidence of their role in ransomware attacks and then ceased all communications after its invasion of Ukraine Four other REvil members were
sentenced
to jail last October on sentences from 45 to six years in prison
Additional coverage in
TASS
English coverage in
CyberScoop
pp
Dark Gaboon linked to ransomware attacks in Russia
Russian security firm F6 has
linked
a financially motivated group named Dark Gaboon to attacks with the LockBit ransomware inside Russia F6 tracks the group as Room155 but they are also known as Vengeful Wolf Theres a similar report like this from
Positive Technologies
pp
Telegram dark markets rise to fill void
Several Telegram illicit markets have
risen in popularity
and are filling the void left after the US sanctioned and Telegram took down the channels of Huione Guarantee earlier this year Congratulations to Telegram for not learning anything from its CEOs recent arrest in France and refusing to ban the new channels sarcasm
pp
After its takedowns last month crypto tracing firm Elliptic warned Telegram that the scammers and their enablers would just shift to the nextbiggest markets and shared an extensive list of their channels and usernames with Telegram It declined to ban any of them
pp
Coinbase scammer
Blockchain sleuth ZachXBT claims to have found the identity of a major cryptoscammer named Daytwo and PawsOnHips as a New York man named Christian Nieves The researcher says the scammer stole over 4 million worth of cryptoassets from Coinbase users by posing as Coinbase support personnel
Additional coverage in
The Shib
pp
IsraelIran cyber war
Security firms
CloudSEK
GroupIB
and
Trellix
have published an overview of all the cyber hacktivist and GPS jamming activity taking place right now in the Middle Eastobviously caused by the recent military conflict between Iran and Israel
pp
CyberAv3ngers profile
DomainTools CTI team has published a profile on Iranian hacking group
CyberAv3ngers
pp
Fake SonicWall app steals VPN credentials
A threat actor is distributing a
malicious version
of the SonicWall SSL VPN NetExtender app that steals VPN credentials from infected users
pp
ConnectWise abused to sign malware
Since March a threat actor has abused the ConnectWise installer to sign malware The EvilConwi group exploited attributes in the installer that were exempted from the certificate signing to load and run their malware from the installer itself German security firm GDATA
spotted and reported
the abuse to ConnectWise on June 12 The company
rotated
its signing certificate a day later
pp
WordPress Core malware framework
Wordfence has
spotted
a new modular malware framework designed for credit card skimming and WordPress credential theft The malware is typically installed on hacked WordPress sites as a plugin named WordPress Core
pp
Pulsar RAT
ThreatMon has published an analysis of the
Pulsar RAT
a NET RAT considered a continuation of the older Quasar RAT
pp
SparkKitty
Kaspersky has spotted a new version of the SparkCat malware which they named
SparkKitty
This is a mobile trojan that infected both Android and iOS and was using OCR to scan the victims images for cryptowallet seed phrases
pp
LapDogs botnet
SecurityScorecard has discovered a new botnet used by Chinese hackers to hide their attacks Named
LapDogs
the botnet runs on top of a custom backdoor named ShortLeash The botnet has infected more than 1000 devices with most being SOHO routers At least one Chinese APT group named
UAT5918
used the botnet to hide its operations
pp
Authentik is an opensource identity provider that is also offered with paid enterprise features In this demo CEO Fletcher Heisler and CTO Jens Langhammer walk Risky Business host Patrick Gray through an overview and a demo of the technology
pp
TAG140s DRAT v2
Recorded Future has published a report on the new version of
DRAT
a remote access trojan used by TAG140 SideCopy a suspected Pakistani APT
pp
APT36 Transparent Tribe
Indian security firm CyFirma has spotted a
new APT36 campaign
targeting the Indian defense sector APT36 is a suspected Pakistani APT
pp
APTQ14
Chinese security firm QiAnXin says a cyberespionage group tracked as
APTQ14
is using a zeroday XSS vulnerability in an unnamed webmail platform to target domestic organizations The group also used Microsofts
ClickOnce
deployment technology to install their malware QiAnXin says the group is part of the larger DarkHotel group previously linked to South Korea by other security firms
pp
APTC06
Qihoo 360 another Chinese security firm also published a report on DarkHotel which they call
APTC06
but this one looks at a campaign targeting North Korean trade personnel
pp
UAC0001 APT28
CERTUA has published a
report
on a UAC0001 campaign that targeted Ukrainian government agencies with the BEARDSHELL and COVENANT malware
pp
Havoc analysis
Fortinet has published an
analysis
of a Havoc C2 framework sample that was used in a Middle East APT intrusion at a critical infrastructure organization
pp
PwC on APT attribution
PwCs security team has published a
detailed writeup
on their process of attributing threat actors
pp
Libxml2 makes security reports public
The lead developer of the Libxml2 library has announced that all vulnerability reports submitted to the project will be public by default
Nick Wellnhofer says
security flaws will also no longer have a deadline to release a fix and theyll be patched when he has time Wellnhofer hopes the new policy will make downstream users nervous and encourage them to contribute back to the project The Libxml2 library is currently used in macOS Windows and Linux operating systems
pp
Yealink vulnerabilities
CloudAware researchers have
disclosed
several vulnerabilities in the Yealink VoIP phone system Yealink
acknowledged the issues
and asked customers to upgrade to newer versions
pp
WinRAR RCE
RARLAB has
released
a security update for the WinRAR filearchiving software to patch a vulnerability that can be abused for remote attacks Tracked as
CVE20256218
the vulnerability is a path traversal bug that can allow attackers to run code on a users system The issue only impacts WinRAR Windows versions
pp
Splunk security updates
Cisco has released
four security advisories
for its Splunk SIEM platform
pp
Echo Chamber Attack
NeuralTrust has published details on
Echo Chamber
a new LLM jailbreaking technique
pp
New SSRF technique
Assetnote now with Searchlight Cyber has developed a
new SSRF technique
that uses HTTP redirect loops to leak the full content of HTTP responses
pp
Phantom Persistence technique
Grant Smith the President of the Phantom Security Group has posted details about
Phantom Persistence
a new Windows persistence technique
pp
FileFix technique
Security researcher mrd0x has developed an alternative to the ClickFix technique named
FileFix
The technique works by tricking users into copying and pasting a file path into Windows Explorer The trick is that an attacker can modify the copied file path to prepend PowerShell commands before it and add a bunch of space characters to hide them from view
pp
Threattrend reports
AM Best
Cobalt
Incogni
Sophos
and
WithSecure
have recently published reports and summaries covering various infosec trends and industry threats From the AM Best report
pp
CIDP shuts down
Cybersecurity firms have shut down a project that offered free security services to critical infrastructure organizations The Critical Infrastructure Defense Project was established in 2022 by Cloudflare CrowdStrike and Ping Identity The program was set up after Russias invasion of Ukraine to help US organizations defend against possible Russian cyberattacks and sabotage Its main beneficiaries were hospitals water systems and power utilities
Additional coverage in
NextGov
pp
New toolXMRogue
Security firm
Akamai
has developed a new tool named
XMRogue
that can be used to sabotage cryptomining botnets The tool works by joining the botnet and submitting bad computations to Monero mining pools Repeated submissions will get the botnet banned from the mining pool and crash the attackers earnings The technique works best against cryptomining botnets that use proxies to submit computations from their infected systems
pp
New toolhaveibeenpwnedwatch
Snap security engineer GeorgeAndrei Iosif has released
haveibeenpwnedwatch
a portal that displays the data from the haveibeenpwnedcom database in easytounderstand graphs
pp
CODE BLUE 2024 videos
Talks from the CODE BLUE 2024 security conference which took place last November are
available on YouTube
pp
SANS CTI Summit 2025 videos
Videos from the SANS Cyber Threat Intelligence Summit 2025 security conference which took place at the end of January are
available on YouTube
pp
In this edition of
Between Two Nerds
Tom Uren and The Grugq dive into the motivations and actions of Predatory Sparrow a purported hacktivist group that has been attacking Iran for the last five years and has leaped into the IranIsrael work
pp
In this edition of
Seriously Risky Business
Tom Uren and Patrick Gray talk about a Minnesota man who used peoplesearch services to locate stalk and eventually murder political targets They also discuss the purported hacktivist group Predatory Sparrow weighing in on the IranIsrael conflict
pp
Risky Business Media Pty Ltd
PO Box 774
Byron Bay NSW 2481
General Email editorialriskybiz
p