CISO Talk by James Azar
CyberHub Podcast
🚨 Cyber News: Lazarus Windows Zeroday, LockBit is BACK, Australia Espionage Threat, Silver SAML Attack, Linux Malware
1×
0:00
Current time: 0:00 / Total time: -15:58
-15:58

🚨 Cyber News: Lazarus Windows Zeroday, LockBit is BACK, Australia Espionage Threat, Silver SAML Attack, Linux Malware

Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines

Welcome to another episode of the CyberHub Podcast, where we delve into the latest cybersecurity news and insights.

Today's show covers a range of pressing issues from the resurgence of LockBit ransomware to critical vulnerabilities and espionage activities threatening global security.

LockBit Ransomware's Return

Despite recent law enforcement efforts dubbed Operation Cronus, the notorious LockBit ransomware has made a comeback. This resurgence highlights the challenges in dismantling cybercriminal networks due to their decentralized nature. LockBit has not only returned but also updated its infrastructure, showcasing the persistent and evolving threat of ransomware.

Action Points:

1. Enhance Monitoring: Organizations should bolster their cybersecurity defenses by enhancing monitoring for LockBit's new indicators of compromise.

2. Educate Staff: Raise awareness among staff about the resurgence of LockBit to prevent potential phishing or social engineering attacks.

Patch Tuesday Revelations

Microsoft's recent Patch Tuesday highlighted a critical vulnerability in the Windows AppLocker component, exploited by the Lazarus group. This vulnerability underscores the sophistication of cyber adversaries in bypassing security measures.

Action Points:

1. Apply Patches: Ensure all systems are updated with the latest security patches from Microsoft.

2. Review Whitelisting Practices: Reevaluate application whitelisting policies to ensure they are robust and capable of thwarting advanced threats.

Leave a comment

Avanti Connect Secure's Vulnerabilities

Avanti's Connect Secure product remains in the spotlight due to vulnerabilities being exploited, particularly by Chinese threat actors. Avanti has released an enhanced external integrity checker tool to address these concerns.

Action Points:

1. Utilize Integrity Checker Tool: Deploy Avanti's tool to check for compromises and ensure system integrity.

2. Conduct Regular Audits: Perform regular security audits of VPN solutions to identify and mitigate potential vulnerabilities.

Cisco's Security Advisory

Cisco released advisories detailing vulnerabilities in its FXOS and NXOS software, particularly affecting data centers. These vulnerabilities could lead to denial of service attacks if left unpatched.

Action Points:

1. Patch Systems: Immediately apply Cisco's patches to affected systems, especially those in data center environments.

2. Infrastructure Review: Conduct a thorough review of network infrastructure to ensure all components are up-to-date and secure.

Espionage and Foreign Interference

Australia's security agency has raised alarms about unprecedented levels of espionage and foreign interference, with a particular focus on China. This situation calls for heightened vigilance and protective measures against espionage activities.

Action Points:

1. Strengthen Insider Threat Programs: Enhance measures to detect and prevent insider threats, particularly in sensitive sectors.

2. Enhance Counterintelligence Efforts: Invest in counterintelligence capabilities to detect and thwart foreign espionage efforts.

Lazarus Group's Malicious PyPI Packages

The Lazarus group has been found uploading malicious packages to the PyPI repository, targeting developers with malware. This tactic underscores the need for vigilance when using open-source repositories.

Action Points:

1. Verify Dependencies: Scrutinize and verify the integrity of open-source dependencies used in development projects.

2. Educate Developers: Raise awareness among development teams about the risks associated with using third-party libraries and packages.

New SAML Vulnerabilities: Silver SAML

New technique dubbed Silver SAML highlight vulnerabilities in SAML response forgery, allowing attackers to bypass authentication mechanisms. These techniques pose significant risks to federated services and applications.

Action Points:

1. Monitor SAML Transactions: Implement monitoring for anomalous SAML transactions that could indicate exploitation attempts.

2. Review Identity Management Systems: Ensure that identity and access management systems are secure and can detect forged authentication tokens.

GTP Door Malware in Telecom Networks

A new malware called GTP Door has been discovered, targeting telecom networks through the GPRS tunneling protocol. This malware poses a significant threat to the confidentiality and integrity of telecom infrastructure.

Action Points:

1. Enhance Network Security: Telecom operators should bolster their network defenses, particularly around GPRS roaming exchanges.

2. Conduct Regular Penetration Testing: Regularly test telecom network security to identify and mitigate potential vulnerabilities.

In conclusion, today's episode underscores the dynamic and evolving landscape of cybersecurity threats. From the resurgence of ransomware to sophisticated state-sponsored espionage, the need for robust cybersecurity measures and vigilance has never been greater. Stay tuned for our next episode, where we'll continue to explore the latest in cybersecurity news and insights. Stay cyber safe!

Show Notes and Story Links:

https://www.bleepingcomputer.com/news/security/lazarus-hackers-exploited-windows-zero-day-to-gain-kernel-privileges/

https://www.bleepingcomputer.com/news/security/lockbit-ransomware-returns-to-attacks-with-new-encryptors-servers/

https://www.cybersecuritydive.com/news/ivanti-connect-secure-state-linked-threat/708706/

https://www.securityweek.com/cisco-patches-high-severity-vulnerabilities-in-data-center-os/

https://therecord.media/australia-facing-highest-ever-threat-from-espionage-interference

https://www.bleepingcomputer.com/news/security/japan-warns-of-malicious-pypi-packages-created-by-north-korean-hackers/

https://www.darkreading.com/cyber-risk/researchers-release-details-on-new-silver-saml-attack-technique

https://thehackernews.com/2024/02/gtpdoor-linux-malware-targets-telecoms.html

Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel!

Apply now to be a featured partner on the show: https://www.cyberhubpodcast.com/contact

******

Listen here: https://linktr.ee/cyberhubpodcast

SubStack:

******

Website: https://www.cyberhubpodcast.com

Youtube: https://www.youtube.com/c/TheCyberHubPodcast

Rumble: https://rumble.com/c/c-1353861

Facebook: https://www.facebook.com/CyberHubpodcast/

Linkedin: https://www.linkedin.com/company/cyberhubpodcast/

Twitter: https://twitter.com/cyberhubpodcast

Instagram: https://www.instagram.com/cyberhubpodcast

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.