Cyber News

>

Threats

Cyber threats are evolving every day, keeping up with them is a full-time job. The WESTprotect Cyber News is your source for how these changes affect you in the real estate, title, mortgage, and settlement services industry. From cyber threats to new Tactics, Techniques, and Procedures (TTP’s) we’ve got you covered.


Google has released Chrome 98.0.4758.102 for Windows, Mac, and Linux, to fix a high-severity zero-day vulnerability used by threat actors in attacks. "Google is aware of reports that an exploit for CVE-2022-0609 exists in the wild," Google said in a security advisory released today.

Hackers believed to be part of the Iranian APT35 state-backed group (aka 'Charming Kitten' or 'Phosphorus') has been observed leveraging Log4Shell attacks to drop a new PowerShell backdoor. The modular payload can handle C2 communications, perform system enumeration, and eventually receive, decrypt, and load additional modules.

A new variant of the RedLine info-stealer is distributed via emails using a fake COVID-19 Omicron stat counter app as a lure. RedLine is a widespread commodity malware sold to cyber-criminals for a couple of hundred USD. It supplies dark web markets with over half of the stolen user credentials sold to other threat actors.

The Federal Bureau of Investigation (FBI) email servers were hacked to distribute spam email, impersonating FBI warnings that the recipients' network was breached and data was stolen. The emails pretended to warn about a "sophisticated chain attack" from an advanced threat actor known, who they identify as Vinny Troia. Troia is the head of security research of the dark web intelligence companies NightLion and Shadowbyte.

A new phishing campaign targets employees in financial services using links that download a 'weaponized' Excel document. The phishing campaign, dubbed MirrorBlast, was detected by security firm ET Labs in early September. The Excel files could bypass malware-detection systems because they contain "extremely lightweight" embedded macros, making them "particularly dangerous" for organizations dependent on detection-based security and sandboxing.