<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 4/25/2022

SHARE

Top News

Hackers find 122 vulnerabilities - 27 deemed critical - during first round of DHS bug bounty program

More than 450 security researchers working through the Department of Homeland Security's "Hack the DHS" bug bounty program identified more than 122 vulnerabilities, 27 of which were deemed critical, according to a DHS statement first obtained by CyberScoop. The agency awarded $125,600 to participants in the program for finding and identifying the vulnerabilities, the agency said in the statement. READ MORE...

Breaches

Lapsus$ Hackers Target T-Mobile

T-Mobile confirmed that the extortion group Lapsus$ gains access to their system "several weeks ago". The telecom giant responded to a report by a journalist Brian Krebs, who accessed the internal chats from the private Telegram channel of the core Lapsus$ gang members. The company added that it has mitigated the breach by terminating the hacker's group access to its network and disabled the stolen credentials that were used in the breach. READ MORE...

Hacking

Russian hackers are seeking alternative money-laundering options

The Russian cybercrime community, one of the most active and prolific in the world, is turning to alternative money-laundering methods due to sanctions on Russia and law enforcement actions against dark web markets. Although the options are few, cybecriminals are discussing viable solutions to cash out or safe keep stolen funds and cryptocurrency, analysts at Flashpoint observed in conversations from threat actors. READ MORE...


Cyberattack Causes Chaos in Costa Rica Government Systems

Nearly a week into a ransomware attack that has crippled Costa Rican government computer systems, the country refused to pay a ransom as it struggled to implement workarounds and braced itself as hackers began publishing stolen information. The Russian-speaking Conti gang claimed responsibility for the attack, but the Costa Rican government had not confirmed its origin. READ MORE...

Trends

Hackers are exploiting 0-days more than ever

Previously unknown "zero-day" software vulnerabilities are mysterious and intriguing as a concept. But they're even more noteworthy when hackers are spotted actively exploiting the novel software flaws in the wild before anyone else knows about them. As researchers have expanded their focus to detect and study more of this exploitation, they're seeing it more often. READ MORE...

Malware

Quantum ransomware seen deployed in rapid network attacks

The Quantum ransomware, a strain first discovered in August 2021, were seen carrying out speedy attacks that escalate quickly, leaving defenders little time to react. The threat actors are using the IcedID malware as one of their initial access vectors, which deploys Cobalt Strike for remote access and leads to data theft and encryption using Quantum Locker. READ MORE...

Exploits/Vulnerabilities

Hackers hammer SpringShell vulnerability in attempt to install cryptominers

Malicious hackers have been hammering servers with attacks that exploit the recently discovered SpringShell vulnerability in an attempt to install cryptomining malware, researchers said. SpringShell came to light late last month when a researcher demonstrated how it could be used to remotely execute malicious code on servers that run the Spring model-view-controller or WebFlux applications on top of Java Development Kit versions 9 or higher. READ MORE...

On This Date

  • ...in 1940, actor Al Pacino ("The Godfather", "Serpico") is born in Manhattan, NY.
  • ...in 1953, The magazine Nature publishes an article by biologists Francis Crick and James Watson, describing DNA's double helix structure.
  • ...in 1960, The first fully submerged circumnavigation of the Earth is completed by a US Navy nuclear submarine, USS Triton.
  • ...in 2000, the Cincinnati Bearcats retired the #4 jersey worn by power forward Kenyon Martin.