Cyware Weekly Threat Intelligence - June 10–14

Weekly Threat Briefing • June 14, 2024
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Weekly Threat Briefing • June 14, 2024
The FCC, in a decisive move, has greenlit a notice of proposed rulemaking that zeroes in on Border Gateway Protocol (BGP) security. The crux of the matter? Mandating the nine biggest U.S. broadband behemoths to concoct and uphold top-secret BGP security risk management blueprints. Meanwhile, in a dramatic turn of events, U.S. federal agents have swooped in and seized 70 domains tied to a cunning cryptocurrency investment scam. This elaborate ruse specifically targeted the Russian diaspora in New York, culminating in a staggering $5 million in victim losses nationwide.
The FCC approved a notice of proposed rulemaking targeting Border Gateway Protocol (BGP) security, requiring the nine largest U.S. broadband providers to establish confidential BGP security risk management plans. This comes after recent BGP hijacking incidents, including one linked to Russian troops invading Ukraine. The proposed rules also require smaller providers to prepare and maintain BGP plans.
NIST published a draft OT cybersecurity guide for the water sector, seeking public feedback to help water and wastewater utilities secure their systems and remote access capabilities against emerging cyber threats. The draft guide offers solutions for a range of water and wastewater systems, as well as cloud-based remote access solutions, to help mitigate cybersecurity risks. The project explores the application of existing commercially available products to improve asset management, enhance data integrity, and expand network segmentation capabilities while allowing for remote access to OT assets.
Microsoft and Google are offering free or highly discounted cybersecurity services to rural and critical-access hospitals in the U.S. as part of the government’s initiative to bolster cybersecurity in the healthcare sector. Congress has also focused on the cybersecurity needs of rural hospitals, with the Senate approving the Rural Hospital Cybersecurity Enhancement Act. The administration has also published voluntary "cybersecurity performance goals" for the healthcare sector, with plans to tie them to financial incentives.
The U.S. federal authorities have seized 70 domains linked to a cryptocurrency investment scam that targeted the Russian diaspora in New York, resulting in over $5 million in losses for victims across the country. The scam lured victims through Facebook ads featuring a deepfake video of Elon Musk encouraging cryptocurrency investments. After investing for weeks or months, victims were locked out of their accounts or told to pay additional fees and taxes to withdraw their funds.
ESET researchers have unearthed five campaigns zeroing in on Android users with trojanized apps, likely the handiwork of the Arid Viper APT group. These operations revolve around the deployment of a three-stage Android spyware dubbed AridSpy, targeting Egypt and Palestine. On another front, a newly surfaced North Korean threat actor, Moonstone Sleet, has turned its sights on the software supply chain. It is spreading malevolent npm packages through public open-source repositories. Meanwhile, the Kimsuky threat ensemble is exploiting a vulnerability in Microsoft Office's Equation Editor. This attack unfolds when an unwitting user opens a compromised Office document, setting off the equation editor to run a malicious script.
The Pakistan-linked threat group Cosmic Leopard has been running a long-term malware campaign known as Operation Celestial Force, targeting Windows, Android, and macOS devices. This campaign, active since at least 2018, utilizes several malware tools: GravityRAT, HeavyLift, and GravityAdmin. Separately, a significant XSS vulnerability has been identified in the SummerNote 0.8.18 WYSIWYG editor. This vulnerability allows attackers to embed harmful scripts into trusted applications or websites. Additionally, a new Agent Tesla RAT variant is targeting Spanish-speaking individuals via phishing emails posing as SWIFT transfer notifications from financial institutions.