Daily Cyber Brief
The DOJ is investigating a breach of the federal court records system, a cybercriminal claims to have access to 50 U.S. companies, and a new phishing trick mirrors legitimate landing pages...

Cybersecurity
Russia has come up with a "secret development" that purportedly allows it to hack into the HIMARS rocket-launching systems the U.S. has sent to Ukraine, according to a Russian military expert. Alexei Leonkov unveiled the cryptic initiative during an appearance on…
The U.S. Justice Department is investigating a cyber breach involving the federal court records management system, the department's top national security attorney told lawmakers on Thursday. Matt Olsen, head of the Justice Department's National Security Division, alluded…
The largest distributed denial-of-service (DDoS) attack that Europe has ever seen occurred earlier this month and hit an organization in Eastern Europe. The target, a customer of cybersecurity and cloud service company Akamai, has been under constant assault, facing…
Cybersecurity experts are raising concerns about an individual on a hacker forum claiming to have access to 50 American companies through an unnamed managed service provider (MSP). MSPs are paid to manage IT infrastructure and provide support, typically by smaller…
A North Korean-backed threat group tracked as Kimsuky is using a malicious browser extension to steal emails from Google Chrome or Microsoft Edge users reading their webmail. The extension, dubbed SHARPEXT by Volexity researchers who spotted this campaign in…
With Microsoft taking steps to block Excel 4.0 (XLM or XL4) and Visual Basic for Applications (VBA) macros by default across Office apps, malicious actors are responding by refining their new tactics, techniques, and procedures (TTPs). "The use of VBA and XL4…
A phishing campaign is underway that uses mirror images of target organizations' landing pages to trick victims into entering login credentials. According to a report from security firm Avanan, the malicious actors are then able to use these harvested credentials to gain access…
Threat actors are generating revenue by using adware bundles, malware, or even hacking into Microsoft SQL servers, to convert devices into proxies that are rented through online proxy services. To steal a device's bandwidth, the threat actors install software called 'proxyware'…
A critical Atlassian Confluence vulnerability that was disclosed last week is now being actively exploited in the wild, researchers are warning. According to researchers at Rapid7, the bug in question (CVE-2022-26138, one of three patched last week) is due to a hardcoded password…
Multiple npm packages are being used in an ongoing malicious campaign to infect Discord users with malware that steals their payment card information. The malware used in these attacks is a variant of the open-source and Python-based Volt Stealer token logger and…