Horns&Hooves Campaign Delivers RATs to Russian Retail Entities

Summary Researchers from SecureList from Kaspersky revealed new details regarding the Horns&Hooves cyber campaign, active since March 2023, which targeted over a thousand users and businesses in Russia (including retailers), using malicious JScript (JS) scripts disguised as legitimate email attachments. These scripts deploy the legitimate remote administration tool, NetSupport, for malicious purposes, granting attackers remote access…

Read More

Technical Analysis of FPNTX Digital Skimmer Found on eCommerce Site

On 3 December 2024, the RH-ISAC intel team was informed about a possible digital skimmer that may be present on an unnamed e-commerce website. JJ Josing, Principal Threat Researcher at the RH-ISAC, started his initial investigation into this incident. Our investigation discovered a script block containing heavily obfuscated JavaScript in the HTML of the checkout…

Read More

Blue Yonder Software Hack Impacting UK Grocery and FMCG Stores

Summary A ransomware attack on Blue Yonder, a supply chain software provider for major supermarkets and fast-moving consumer goods (FMCG) suppliers, has severely disrupted operations. Blue Yonder confirmed the attack impacted its private cloud services, which support demand forecasting, automated ordering, and warehouse and supply management. A task force, alongside with third-party cybersecurity firms, is…

Read More

Financially Motivated Threat Actor, SilkSpecter, Targeting Black Friday Shoppers

Summary In early October 2024, EclecticIQ analysts discovered a large-scale phishing campaign targeting e-commerce shoppers in Europe and the USA. This campaign, which capitalized on the heightened online shopping activity around Black Friday, is believed to have been orchestrated by a Chinese financially motivated threat actor, referred to as SilkSpecter. The campaign enticed victims with fake discounted…

Read More

Iranian TA455 Initiates Dream Job Campaign to Target Aviation and Other Critical Industries with Malware

Executive Summary Researchers from ClearSky Cyber Security has uncovered a new cyber espionage campaign attributed to TA455, a subgroup of the Iranian cyber threat actor known as Charming Kitten (also known as APT35). The cyber espionage campaign, which has been active since at least September 2023, has targeted critical industry sector entities in the aerospace, aviation, and…

Read More

Midnight Blizzard Conducts Large-Scale Spear-Phishing Campaign Utilizing RDP Files

Summary Since October 22, 2024, Microsoft Threat Intelligence has observed recorded activity of the Russian threat actor known as Midnight Blizzard conducting a sophisticated spear-phishing campaign aimed at individuals in various sectors, including government, academia, defense, and non-governmental organizations. This ongoing activity involves sending highly targeted emails, which include a signed Remote Desktop Protocol (RDP) configuration file…

Read More

Infostealer Infection Results in One of the Largest Retail Breach in History

Summary A significant data breach involving Hot Topic, Torrid, and Box Lunch, advertised by the threat actor Satanic, has reportedly exposed the personal data of 350 million customers, including names, emails, addresses, phone numbers, and birthdates, billions of payment details and loyalty points, including the last 4 digits of customers’ credit cards, card types, hashed…

Read More

Chinese Nation-State Hackers APT41 Attack Gambling Sector for Financial Gain

Summary APT41, also known as Brass Typhoon, Wicked Panda, and Winnti, a Chinese state-sponsored threat actor, has been linked to a sophisticated cyber campaign targeting the gambling and gaming industry, according to a new report from security company Security Joes. Over at least six months, APT41 shifted from traditional espionage to financially motivated attacks, using techniques like…

Read More

Intel Broker Claims Cisco Breach, Selling Stolen Data from Major Firms

Summary The threat actor known as Intel Broker has allegedly claimed responsibility for a major data breach at technology firm Cisco, stealing sensitive information, including source codes, credentials, and confidential documents. The breach allegedly occurred on October 6 or June 10, 2024, depending on date format, with Intel Broker announcing the theft on Breach Forums on October…

Read More

BitSight Discloses Zero-Day Vulnerabilities in ATG ICS Critical Infrastructure Systems

Researchers from BitSight Technologies’ TRACE team have uncovered several critical zero-day vulnerabilities in six Automatic Tank Gauge (ATG) systems from five different vendors. If these vulnerabilities are weaponized, malicious actors could exploit industrial control systems (ICS) used in critical infrastructure sectors, including retail and hospitality, potentially causing harm, including physical destruction, environmental risks, and financial losses….

Read More