Cyware Weekly Threat Intelligence - July 22–26

Weekly Threat Briefing • July 26, 2024
Weekly Threat Briefing • July 26, 2024
In a decisive strike against cybercrime, Meta has eradicated 63,000 Instagram accounts connected to the Nigerian cybercrime group known as Yahoo Boys. Furthermore, it has purged 1,300 Facebook accounts, 200 Pages, and 5,700 Groups that were disseminating scamming tips and materials. Along the same lines, international agencies collaborated to disrupt DigitalStress, a massive DDoS-for-hire service. The takedown was a part of Operation Power Off.
In the ever-evolving battleground of cybersecurity, the LummaC2 info-stealer has emerged as a formidable threat, disseminated via SEO poisoning, search engine ads, and platforms like Steam, under the guise of illegal software and legitimate installers. In another front of cyber warfare, the Belarusian state-sponsored hacker group GhostWriter has unleashed PicassoLoader malware against Ukrainian organizations and local government agencies. Meanwhile, the FBI, CISA, NSA, and other agencies have issued a joint advisory warning of imminent cyberattacks on critical U.S. infrastructure by the North Korean Andariel group. This group is primarily focused on defense, aerospace, nuclear, and engineering sectors in the U.S., Japan, South Korea, and India.
Threat actors have been exploiting unpatched vulnerabilities in ServiceNow, including a critical RCE flaw, to pilfer credentials from government agencies and private firms. These vulnerabilities, patched by ServiceNow on July 10, have been actively exploited for at least a week. Wiz flagged an ongoing campaign dubbed SeleniumGreed, which exploits publicly exposed Selenium Grid services for illicit cryptocurrency mining. Adding to the cyber woes, a new malware loader named Krampus has emerged on the dark web, gaining traction for its versatile capabilities and ease of use. Krampus can handle archive and PowerShell scripts, sideload crypto miners, and more.