Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Check Point Research Reveals Threats Making a Menace of Themselves in 2023
Facebook   X   LinkedIn   Email

Check Point Research Reveals Threats Making a Menace of Themselves in 2023

August 12, 2023

Have you heard enough of the Trojan Qbot? Well, that sneaky bot is not going away, nor is it sitting back and being quiet. In fact, per a report by Check Point Research, it’s been hanging around making a cybersecurity menace of itself all throughout the year, thus far. It’s not the only malicious news for the year either. The mobile Trojan SpinOk made its debut and that pesky MOVEit zero-day vulnerability has not moved an inch to stay out of the news.

What’s a bot to do?

Qbot (or Qakbot) has been in the cyber news a lot. It was first discovered in 2008, but has been consistently reinvented over time. It went from “merely” a banking Trojan to being able to steal passwords, payment card details, email information, and other things. It can evade anti-virus software and bypass other security measures.

What you can do

Since this is mostly distributed via spam email, always keep those peepers open for phishing lures in your messages. While it’s generally is in email, that doesn’t mean you won’t or can’t see it come along in text messages too. If you don’t know who sent the message or are not expecting any sort of link or attachment, don’t click them. Your sixth sense works, so listen to it when it comes to phishing.

The spin cycle

SpinOk is mobile malware that the researchers said has been downloaded 421 million times. Yikes! It’s a software development kit that has been trojanized and has ruined many popular games and apps. Many of those were found in, and later removed from the Google Play Store. SpinOk can steal sensitive device information and check out what is on the clipboard. Since this is in the development kit, it’s considered a supply chain attack. Likely, there are many more of those to come.

Our spin for you

Always use caution when downloading apps to your mobile devices. Use their official app stores and do plenty of due diligence. Check reviews for any hint of trouble. If the app only has raving reviews and not many of them, give it more time before you download it. This is one time you don’t want to be the early adopter of the latest trendy mobile app.

MOVEit on up

In May of this year, the software developer disclosed a vulnerability in its MOVEit Transfer and MOVEit Cloud products that attackers exploited to the moon and back. It was particularly popular with the ransomware group Clop. It was initially a zero-day, but a patch was created 48 hours later. Sadly, many organizations didn’t get on that and it continues to be exploited today. It hit 108 organizations worldwide and keeps on moving.

Get a move on it

Whenever patches and updates are released for your systems and device, get a move on it and apply them right away. This is especially important with previously found zero-day vulnerabilities because the attackers have already been active, even before the patch was released. The longer you wait, the more likely someone will make a move on you.

Other notable findings in the Check Point report on a global level

  • The most prevalent mobile malware was SpinOk (Android spyware), Anubis (banking malware for Android), and AhMyth (Remote Access Trojan for Android).
  • The most exploited industries were Education/Research, Government/Military, and Healthcare.
  • The top exploited vulnerabilities in organizations worldwide were Web Servers Malicious URL Directory Traversal, Apache Log4j Remote Code Execution, and HTTP Headers Remote Code Execution.

Do Zero-Day Vulnerabilities Really Get Exploited Or Are You Just Scaring Us?

Corporate Security

Do Zero-Day Vulnerabilities Really Get Exploited Or Are You Just Scaring Us?

Sometimes we hear about an exploit that could cause potential harm to an individual or company and push it aside and perhaps briefly wonder if it ever actually did cause harm. If you have been paying attention to the technology news at all in the past weeks, you will know that they do indeed get exploited. One group is really busy and has made headlines a few times lately. In fact, every day there is a new story about an organization that has been attacked using the MOVEit zero-day. But no doubt, the other vulnerabilities are being abused too. READ FULL STORY

Is Microsoft OneNote Emailing You Malware? What To Know, What To Do

Scams & Phishing

Is Microsoft OneNote Emailing You Malware? What To Know, What To Do

Microsoft’s OneNote is making news, but not in the way the software giant would hope. OneNote, the note-taking app that’s part of Microsoft Office, is being weaponized by QBot threat actors. Fans of this handy product, whether for business or personal use, should know QBot’s email phishing campaign takes plenty of notes and leads to stolen passwords, hijacked financial and browser data, and just about anything else there is to steal. The attachment not only infects the device of the one who opened it, but added trickery can infect every device in an email conversation thread. READ FULL STORY

You Better MOVEit To Protect Yourself Against Fraud If You Live In Louisiana

Identity Theft

You Better MOVEit To Protect Yourself Against Fraud If You Live In Louisiana

Officials from Louisiana have revealed that hackers are responsible for a massive cyber-attack targeting driver’s license and state ID holders in the state. This attack, thought to be an exploit of the MOVEit vulnerability, which also affected prominent entities like the U.S. Department of Energy, British Airways, and the BBC, exposed personally identifiable information (PII) of millions of residents. The hackers likely obtained access to further personal details that would enable them to commit fraud using them. READ FULL STORY

Multiple U.S. Government Agencies Targeted: Global Cyberattack Exploits Vulnerability

Your Security

Multiple U.S. Government Agencies Targeted: Global Cyberattack Exploits Vulnerability

According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), several U.S. federal government agencies have fallen victim to a global cyberattack that exploits a vulnerability in commonly used software. CISA is working diligently to assess the extent of the impact and facilitate timely remediation measures. No specific agencies are being called out in this attack, but government officials have admitted there are a few in this attack involving MOVEit software. READ FULL STORY

CISA Advises Customers of Progress Software to MOVEit

Corporate Security

CISA Advises Customers of Progress Software to MOVEit

Progress Software's MOVEit Transfer, a managed file transfer application, has been extensively exploited due to a critical vulnerability, according to Huntress and Rapid7. The vulnerability, identified as CVE-2023-34362, is a severe SQL injection flaw that can result in escalated privileges and unauthorized access to systems. According to reports, approximately 2,500 instances of MOVEit Transfer were exposed to the public internet as of May 31, 2023, with a majority of them located in the United States. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...