SideWinder APT Targets Hospitality Entities Across Asia, Middle East, Europe and Africa

Executive Summary Cybersecurity researchers at SecureList by Kaspersky have uncovered a sophisticated cyber espionage campaign by SideWinder, an Advanced Persistent Threat group targeting hospitality and consulting organizations, among others, across South and Southeast Asia, the Middle East, Europe, and Africa. The group relies on spear-phishing emails containing malicious documents that exploit CVE-2017-11882, a dated but effective Microsoft…

Read More

GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability Across the Globe

Executive Summary Cisco Talos has uncovered a sophisticated attack campaign exploiting CVE-2024-4577, a critical PHP-CGI remote code execution vulnerability, to compromise organizations in several countries. Attackers deploy Cobalt Strike beacons and use the TaoWu toolkit for post-exploitation activities, leveraging HTTP POST requests for initial access. GreyNoise telemetry indicates that this exploitation is more widespread than initially reported, affecting regions including the United States,…

Read More

Silk Typhoon Targeting IT Supply Chain in Multiple Sectors

Executive Summary Microsoft Threat Intelligence has identified a shift in tactics for Silk Typhoon, a Chinese state-sponsored espionage group, to target remote management tools and cloud applications for initial access. The group has now shifted to exploiting unpatched vulnerabilities in IT infrastructure to elevate privileges and move laterally into cloud environments, enabling data exfiltration and…

Read More

The Evolution of Account Takeover: Why Retail & Hospitality Must Adapt

Account Takeover (ATO) remains a persistent challenge in retail and hospitality, with attackers continuously refining their techniques.  Over the past 18 months, 6.2 million accounts have been compromised – including 55,000 in the last month alone. Despite advancements in security, automated bot-fueled attacks continue to bypass traditional defenses, costing businesses billions in fraud-related losses and…

Read More

FatalRAT Phishing Attacks Target APAC Industries Utilizing Chinese Cloud Services

Executive Summary Kaspersky ICS CERT has identified SalmonSlalom, a sophisticated cyber campaign targeting industrial organizations in the Asia-Pacific (APAC) region. The attack employs a multi-stage payload delivery system, utilizing legitimate Chinese cloud services such as Youdao Cloud Notes and myqcloud for hosting and command-and-control operations. The malware framework delivers FatalRAT, a remote access trojan (RAT),…

Read More

Retail & Hospitality ISAC Appoints Three New Regional Vice Chairs to Support Global Initiatives

VIENNA, VA (February 20, 2025) – The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) today announced the appointment of three new regional vice chairs to strengthen its global engagement and member support. Marnie Wilking, VP and CSO at Booking.com, will serve as Vice Chair for the European, Middle East, and Africa region. Dave…

Read More

New FrigidStealer Infostealer by New Threat Actors infects Multiple Devices via Compromised Websites

Executive Summary Proofpoint has identified two new cybercriminal threat actors, TA2726 and TA2727, responsible for web inject campaigns that distribute malware through compromised websites, according to a recently published report. TA2726 and TA2727 actors operate traffic distribution services (TDS) to redirect users to fake update lures, leading to the installation of malware on Windows, MacOS, and…

Read More

New Snake Keylogger Variant Leverages New Scripting Tools to Evade Detection

Executive Summary FortiGuard Labs has identified a new variant of Snake Keylogger, also known as 404 Keylogger, which has been responsible for over 280 million blocked infection attempts worldwide. This malware is designed to steal sensitive credentials by logging keystrokes, accessing browser-stored passwords, and exfiltrating data through SMTP and Telegram bots; targeting Windows users primarily located in…

Read More

Google Tag Manager Skimmer Steals Credit Card Information From Magento Sites

Executive Summary A recent investigation by Sucuri uncovered a sophisticated credit card skimmer on a Magento-based eCommerce website, leveraging Google Tag Manager (GTM) to inject malicious JavaScript and steal payment details. The malware was hidden within the cms_block.content database table, allowing attackers to discreetly intercept checkout page transactions. Further analysis by Sucuri revealed a backdoor in the…

Read More

RH-ISAC Announces Agenda for the 2025 Cyber Intelligence Summit

VIENNA, VA (February 12, 2025) – The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) has released the full agenda for its upcoming annual Cyber Intelligence Summit, the premier event for cybersecurity professionals working in retail, hospitality, and other consumer-facing industries. Scheduled to take place on 7-9 April in St. Louis, Missouri, the conference…

Read More