Connect with us

Security

Cybersecurity News Roundup: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & More!

Published

on

into plain text. This includes things like photos, messages, and emails sent to your previous email address. Users can change back to their previous email address at any time, but they cannot create a new Google Account email ending in gmail.com for the next 12 months. The new email address cannot be deleted either.

Understanding the Risks of API Call Sequences in Cybersecurity

Abstract Security highlighted the dangers of chaining together specific API calls in cybersecurity practices. By utilizing PutEventSelectors to create “invisible activity zones,” StopEventDataStoreIngestion, and DeleteEventDataStore to halt or destroy long-term forensic visibility, and disabling anomaly detection via PutInsightSelectors, attackers can effectively erase evidence and evade detection entirely. These seemingly routine maintenance tasks, when combined, pose a significant threat to security.

LofyGang Introduces Dual-Payload RAT Through Fake npm Package

LofyGang, a notorious threat actor, recently introduced a malicious npm package called “undicy-http” that delivers a dual-payload attack. This attack includes a Node.js-based Remote Access Trojan (RAT) with live screen streaming capabilities and a native Windows PE binary. The RAT is designed to steal sensitive information from various web browsers and cryptocurrency wallet extensions, while the native binary targets popular platforms like Roblox, Instagram, Spotify, and more. JFrog reported that the Node.js layer operates independently as a full RAT with multiple capabilities, all controlled through a WebSocket C2 panel.

Each of these incidents, when viewed individually, may not seem significant. However, the true risk lies in the pattern and sequence of actions taken by threat actors. By understanding the interconnectedness of seemingly benign actions, organizations can better protect themselves from evolving cybersecurity threats.

See also  Under Siege: Notepad++ Updates Compromised for Months, Potentially Serving Chinese Interests

Recognizing these subtle patterns and changes in cybersecurity practices is crucial in staying ahead of malicious actors. By being vigilant and understanding the implications of seemingly routine actions, organizations can enhance their security posture and mitigate potential risks effectively.

Trending