Cyware Weekly Threat Intelligence - May 13–17

Weekly Threat Briefing • May 17, 2024
Weekly Threat Briefing • May 17, 2024
In a major win, the FBI, DOJ, and global law enforcement once again shut down BreachForums, arresting its alleged administrators and seizing its infrastructure. Across the pond, the NCSC-U.K launched the Share and Defend system, empowering ISPs to block malicious domains. Meanwhile, MITRE released the EMB3D threat model, enhancing security for embedded devices by aligning with and expanding on existing frameworks.
When shadows move in cyberspace, danger follows. Researchers have uncovered espionage by the Turla group using new backdoors LunarWeb and LunarMail. Additionally, the Ebury botnet has been found to have compromised over 400,000 Linux servers since 2009, with over 100,000 still affected. Microsoft's latest Patch Tuesday addresses 61 security vulnerabilities.
The North Korean hacker group Kimsuy has unleashed a new Linux malware dubbed Gomir, spread through trojanized software installers. Google issued an emergency security update for Chrome to address a high-severity zero-day vulnerability (CVE-2024-4947) in the V8 JavaScript engine, marking the third zero-day patch in a week. A newly discovered WiFi vulnerability (CVE-2023-52424) allows attackers to execute SSID Confusion attacks, potentially leading to traffic interception and manipulation.