Overt Operator

Share this post
Daily Cyber Brief
www.overtoperator.com
Daily Cyber Brief

Daily Cyber Brief

$15M recovered from 3ve ad fraud scheme, APTs prefer known vulnerabilities to 0-days, and the National Bank of Zambia hacked by ransomware trolls...

Overt Operator
May 19
Share this post
Daily Cyber Brief
www.overtoperator.com

Cybersecurity

Cyberattacks quietly launched by Russia before its invasion of Ukraine may have been more damaging than intended

Russia is known for its potent cyber-warfare capabilities. So it is no surprise that Moscow launched cyberattacks against Ukrainian targets in the lead up to its invasion in late February. Russian hackers went after a variety of Ukrainian targets in the private and public…

CISA issues rare emergency directive as ‘critical’ cyber vulnerabilities emerge

Agencies have until Monday to mitigate vulnerabilities in five products from VMware that permit attackers to have deep access without the need to authenticate. The Cybersecurity and Infrastructure Security Agency issued a new emergency directive today saying the…

Texas data breach exposes personal information of 1.8 million people

The Texas Department of Insurance (TDI) released more information on Wednesday about a data breach discovered in January that exposed sensitive information from more than 1.8 million Texans. The agency – which regulates Texas’ insurance industry – said the leak was…

Researchers Expose Inner Workings of Billion-Dollar Wizard Spider Cybercrime Gang

The inner workings of a cybercriminal group known as the Wizard Spider have been exposed, shedding light on its organizational structure and motivations. "Most of Wizard Spider's efforts go into hacking European and U.S. businesses, with a special cracking tool used by…

April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell

Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild. Recently reported VMware bugs are being used by hackers who are focused on using them to deliver Mirai denial-of-service malware and…

Spanish police dismantle phishing gang that emptied bank accounts

The Spanish police have announced the arrest of 13 people and the launch of investigations on another seven for their participation in a phishing ring that stole online bank credentials. The threat actors used phishing lures to trick their victims into believing they received an…

US recovers $15 million in profits from 3ve ad fraud scheme

The U.S. government said Wednesday that it had recovered over $15 million of funds derived from an elaborate, international digital advertising scheme that used a botnet of infected computers to fake web traffic. From December 2015 through October 2018 Sergey…

Hackers Gain Fileless Persistence on Targeted SQL Servers Using a Built-in Utility

Microsoft on Tuesday warned that it recently spotted a malicious campaign targeting SQL Servers that leverages a built-in PowerShell binary to achieve persistence on compromised systems. The intrusions, which leverage brute-force attacks as an initial compromise vector…

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise. Most advanced persistent threat groups (APTs) use known vulnerabilities in their attacks against organizations, suggesting the need to prioritize faster…

National bank hit by ransomware trolls hackers with dick pics

After suffering a ransomware attack by the Hive operation, the Bank of Zambia made it clear that they were not going to pay by posting a picture of male genitalia and telling the hackers to s… (well, you can use your imagination). Last week, the Bank of Zambia, the country's…

Share this post
Daily Cyber Brief
www.overtoperator.com
Comments

Create your profile

0 subscriptions will be displayed on your profile (edit)

Skip for now

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.

TopNew

No posts

Ready for more?

© 2022 Overt Operator
Privacy ∙ Terms ∙ Collection notice
Publish on Substack Get the app
Substack is the home for great writing