Tag

Zero Day Exploit

All articles tagged with #zero day exploit

technology5 months ago

Multiple Cyberattacks Target U.S. and Global Microsoft SharePoint and Software Systems

The US National Nuclear Security Administration was reportedly breached through a zero-day vulnerability in on-premises Microsoft SharePoint software, exploited by Chinese-affiliated hacking groups. Despite the breach, no sensitive information was leaked, and Microsoft has patched the flaw. The incident highlights ongoing cybersecurity risks associated with SharePoint vulnerabilities.

technology5 months ago

Microsoft Faces Rising Threats from Chinese Hackers Exploiting SharePoint Vulnerabilities

Microsoft has linked recent SharePoint server attacks to Chinese state-affiliated hacking groups, with vulnerabilities exploited to access sensitive data. Microsoft released patches for affected SharePoint versions, as investigations continue into ongoing threats from these groups, including Linen Typhoon, Violet Typhoon, and Storm-2603.

technology5 months ago

Major Security Flaw Sparks Widespread Microsoft SharePoint Cyberattack

Hackers are exploiting a zero-day vulnerability in Microsoft SharePoint servers, putting tens of thousands of on-premises servers at risk of data theft and unauthorized access. Microsoft has issued patches for some versions and is working on others, while authorities advise disconnecting affected servers from the internet until secured.

cybersecurity1 year ago

Thousands of Palo Alto Firewalls Breached in Exploit Campaign

Approximately 2,000 Palo Alto Networks firewalls have been compromised due to two newly discovered vulnerabilities, CVE-2024-0012 and CVE-2024-9474, which allow attackers to gain unauthorized access and root privileges. Despite a decrease in internet-exposed interfaces, the Shadowserver Foundation reports significant exploitation, primarily in the US and India. Palo Alto Networks has released patches and shared indicators of compromise to help mitigate the threat, while emphasizing that most customers follow best practices to secure their systems.

technology1 year ago

Trust Wallet Urges Immediate iMessage Disablement Amid iPhone Exploit Concerns

Trust Wallet claimed that hackers may be targeting people with an iMessage "zero-day" exploit, urging iPhone users to turn off iMessage until Apple patches it. However, the "credible intel" is actually an advertisement on a dark web site offering the alleged exploit for $2 million in bitcoin, with no evidence of its existence. Cybersecurity experts suggest using Lockdown Mode instead, as there is no evidence of successful hacks while using it. The dark web site, CodeBreach Lab, appears to be new and lacks credibility, raising suspicions of a scam.

cybersecurity1 year ago

"North Korean Hackers Exploit Windows Kernel Zero-Day for Months"

Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day by the North Korean Lazarus state hackers. The vulnerability impacts multiple versions of Windows and allows local attackers to gain SYSTEM privileges without user interaction. Lazarus exploited the flaw to gain kernel-level access, turn off security tools, and deploy a new remote access trojan (RAT) malware. Windows users are advised to install the February 2024 Patch Tuesday updates to block these attacks.

cybersecurity1 year ago

"North Korean Lazarus Group Exploits Windows Kernel Zero-Day for Rootkit Attack"

The Lazarus Group exploited a recently patched Windows Kernel flaw, CVE-2024-21338, as a zero-day to gain kernel-level access and disable security software on compromised hosts. This allowed them to run the FudModule rootkit, which can disable security solutions and manipulate Windows components. The attack showcases the group's technical sophistication and cross-platform focus, as they also target Apple macOS systems. This incident highlights the ongoing threat posed by the Lazarus Group as one of the most prolific and advanced persistent threat actors in the cybersecurity landscape.

technology1 year ago

"Microsoft Exchange Server: Patched Critical Bug Under Active Exploitation"

Microsoft has warned about a critical vulnerability in Exchange Server, tracked as CVE-2024-21410, which was exploited as a zero-day before being fixed during this month's Patch Tuesday. The flaw allows remote unauthenticated threat actors to escalate privileges in NTLM relay attacks targeting vulnerable Microsoft Exchange Server versions. Microsoft has released Exchange Server 2019 Cumulative Update 14 (CU14) to address this vulnerability and enable NTLM credentials Relay Protections to mitigate authentication relay and man-in-the-middle attacks. Admins are advised to evaluate their environments and review Microsoft's documentation before toggling EP on their Exchange servers to avoid breaking functionality.

cybersecurity2 years ago

"Google Accounts Compromised: Hackers Bypass Passwords for Access"

A zero-day exploit in Google's cookie generation process, known as "MultiLogin," allows hackers to gain unauthorized access to Google accounts without needing passwords. The exploit enables session persistence, making it difficult for the true account owner to kick out the hacker with a password reset. Hackers have already incorporated the exploit into info-stealing malware, and various threat groups have rapidly adopted the technique. Google is yet to roll out a comprehensive solution, and affected users are advised to log out of all devices and browsers before resetting their passwords with sufficiently complex and unique ones.

technology2 years ago

"Critical Chrome Vulnerability: Urgent Update Required for Google Chrome Users"

Google Chrome users are urged to update their browsers as a sixth zero-day exploit, CVE-2023-6345, has been discovered. The vulnerability allows a remote attacker to potentially perform a sandbox escape via a malicious file. The update includes seven security fixes, including patches for the zero-day exploit, and is being rolled out gradually over the coming days/weeks. Users can check their Chrome version in Settings > About Chrome and update if necessary.

cybersecurity2 years ago

Egyptian Presidential Hopeful Targeted with Predator Spyware: Researchers Uncover New Apple Zero-Days

Ahmed Eltantawy, a prominent Egyptian opposition politician and presidential hopeful, was targeted with a zero-day attack in an attempt to infect his iPhone with Predator spyware. The attack, which prompted Apple to release a security update, was discovered by Google and the University of Toronto's Citizen Lab. The lab has "high confidence" that the Egyptian government was responsible for the hacking attempt. Predator spyware, developed by Cytrox, can steal passwords, log keystrokes, and record calls. Eltantawy, an outspoken critic of the Egyptian government, had been receiving suspicious messages since May. The attack involved the use of PacketLogic, a product by Sandvine, a Canadian networking equipment company. The incident highlights the risks posed by commercial surveillance vendors and their impact on online user safety.

technology2 years ago

Urgent Security Updates Released for Popular Browsers

Google has released an emergency security update for Chrome users to address a zero-day threat affecting the WebP image format, just days after Apple released iOS 16.6.1 to protect against a critical zero-day exploit involving ImageIO. The vulnerability, known as CVE-2023-4863, is a heap buffer overflow issue that could potentially enable a zero-click attack when visiting a website with a malicious image. Other web browsers, including Brave, Edge, Firefox, Opera, and Vivaldi, have also issued updates to patch the WebP vulnerability. The connection between this vulnerability and the BLASTPASS exploit chain, which targeted iPhones, is still unconfirmed. Users are advised to update their browsers and check for security updates on other Chromium-powered browsers as well.

technology2 years ago

"Apple iPhones Vulnerable to Spyware via Zero-Click iMessage Exploit"

Apple has released emergency security updates to fix two zero-day vulnerabilities that were actively exploited to deploy NSO Group's Pegasus spyware onto fully patched iPhones. The vulnerabilities, known as CVE-2023-41064 and CVE-2023-41061, allowed attackers to infect iPhones running the latest version of iOS without any interaction from the victim. The exploit involved malicious images sent via iMessage. Apple has urged users to update their devices immediately and activate Lockdown Mode for those at risk of targeted attacks. This marks the latest in a series of zero-day vulnerabilities that Apple has addressed this year.