- Mycomputerspot Security Newsletter
- Posts
- The Weekly One-Shot: Week of September 08 - September 14, 2024
The Weekly One-Shot: Week of September 08 - September 14, 2024
This weeks key insights and emerging threats.
Before we dive in, I would like to thank all of you for supporting us with your subscription! I aim to bring both actionable insights and easy-to-digest information regarding cybersecurity threats to non-tech and technical professionals alike. If this sounds like something that would help someone you know, please share the newsletter!
Please support us by checking out our sponsors and partners!

This week in cybersecurity, a range of threats has surfaced, including software vulnerabilities, advanced malware, and targeted attacks. The evolving tactics of cybercriminals highlight the need for vigilance and proactive defense.
Let’s dive into this week’s events:
1. Exploitation of Software Vulnerabilities
Vulnerabilities in widely used software continue to be a major concern, as attackers exploit these weaknesses to gain unauthorized access and manipulate systems.
Critical GitLab Code Execution Flaw Patched
GitLab issued a patch for a critical RCE flaw (CVE-2024-1038) that could allow attackers to execute arbitrary code on vulnerable servers. Admins are urged to update their repositories to protect them.Urgent Patches for Cisco IOS XE Vulnerabilities
Cisco patched multiple high-severity vulnerabilities, including a critical RCE flaw (CVE-2024-20398) that could allow unauthenticated attackers to gain control over affected systems.Adobe Patches Critical Code Execution Flaws
Adobe released patches for multiple products, including Acrobat and Reader, addressing critical code execution vulnerabilities that could allow remote attackers to execute arbitrary code.Microsoft Patch Tuesday Fixes 79 Flaws
Microsoft issued patches for 79 vulnerabilities, with CVE-2024-43491 being the most critical, allowing RCE through malicious Office documents.
Takeaway: The exploitation of software vulnerabilities remains a top concern, emphasizing the importance of regular updates and proactive security management.
2. Malware and Ransomware Evolution
Cybercriminals are deploying increasingly sophisticated malware and ransomware campaigns, targeting various platforms and leveraging new attack vectors.
TrickMo Android Trojan Evolves to Leak Data
TrickMo has evolved beyond OTP theft, now exfiltrating victims' personal data, making it a dual threat for banking fraud and identity theft.RansomHub Ransomware Uses Kaspersky TDSSKiller
RansomHub has been abusing Kaspersky's TDSSKiller tool to disable EDR solutions and facilitate ransomware deployment.Lazarus Group Targets Developers with Malicious Python Packages
The North Korean Lazarus Group has been using fake recruiter coding tests to lure developers into installing malicious Python packages.Quad7 Botnet Expands to SOHO Routers
Quad7 has expanded its attack surface to include SOHO routers, aiming to build a botnet army for DDoS attacks.Hadooken Linux Malware Campaign Targets WebLogic Applications
This malware targets Oracle WebLogic servers to gain persistence and execute arbitrary scripts on compromised systems.NoName Ransomware Gang Deploys RansomHub Malware
NoName group has been using RansomHub malware to execute sophisticated ransomware campaigns across various sectors.VO1D Malware Infects 13 Million Android Streaming Boxes
The VO1D malware has infected millions of Android streaming boxes, turning them into cryptomining and proxyjacking nodes.
Takeaway: Evolving malware and ransomware tactics require comprehensive security strategies and user education to reduce risk and mitigate damage.
Unlock your potential with our partner…
Whether you're a beginner or an expert, Hack The Box provides a dynamic and engaging environment to test your hacking mettle. Join me and thousands of other professionals in this thriving community and take your cybersecurity expertise to the next level.
Start your journey today!
3. Targeted Attacks and Exploits
Attackers are zoing in on specific targets, using sophisticated methods to bypass defenses and compromise sensitive information.
Iranian APT34 Targets Iraqi Government
APT34 (OilRig) launched cyber-espionage attacks against the Iraqi government using new malware to infiltrate sensitive systems.Chinese Hackers Exploit Visual Studio for Espionage
Mustang Panda has been abusing Visual Studio Code to execute espionage campaigns, primarily targeting Southeast Asian entities.Predator Spyware Resurfaces with New Infrastructure
The resurfaced Predator spyware has been linked to state-sponsored actors, capable of monitoring and exfiltrating data from infected systems.Blind Eagle Targets Colombian Insurance Sector
Blind Eagle has targeted Colombia's insurance sector using BlotchyQuasar malware, focusing on stealing sensitive financial data.
Takeaway: Targeted attacks require a proactive approach to cybersecurity, including threat hunting and continuous monitoring to detect and respond to threats promptly.
4. Data Breaches and Exposures
Data breaches continue to be a significant concern as attackers find new ways to access sensitive information.
Fortinet Confirms 440GB Data Breach
Fortinet confirmed a data breach where 440GB of sensitive data was stolen, potentially impacting company operations and security.Avis Car Rental Data Breach Exposes 300,000 Victims
A data breach at Avis exposed personal information of over 300,000 individuals, including driver's licenses and payment data.Slim CD Data Breach Affects 1.7 Million Individuals
Slim CD disclosed a data breach compromising sensitive information of 1.7 million individuals, including credit card numbers.
Takeaway: The frequency of data breaches highlights the need for robust data protection strategies, regular audits, and quick response mechanisms to safeguard sensitive information.
5. Advanced Threat Techniques
Threat actors are employing increasingly advanced techniques to bypass security measures and infiltrate systems, posing significant challenges to defenders.
DragonRank Black Hat SEO Campaign
DragonRank uses black hat SEO techniques to poison search results, redirecting users to malicious websites.Hackers Exploit Selenium Grid Servers
Hackers misuse Selenium Grid servers for cryptomining and proxyjacking, exploiting misconfigured automation tools.PixHell Attack Exploits Electromagnetic Emissions
The PixHell attack uses electromagnetic emissions from screens to capture sensitive on-screen data, even in isolated environments.SonicWall SSLVPN Vulnerability Exploited
SonicWall's SSLVPN vulnerability (CVE-2024-40766) has been actively exploited, bypassing access controls to launch ransomware attacks.Sextortion Scam Uses Cheating Spouses’ Names
A new sextortion scam leverages personal data, including the names of cheating spouses, to extort victims.
Takeaway: The use of advanced threat techniques by cybercriminals necessitates a multi-layered security approach, including endpoint protection, threat intelligence, and continuous monitoring to detect and mitigate sophisticated attacks.
Wrapping Up:
This week has showcased the sheer diversity of cyber threats, from state-sponsored espionage and malware evolution to widespread data breaches and critical vulnerabilities. With the ever-changing landscape of attacks targeting both individuals and organizations, vigilance and timely patching remain key in maintaining security.
Putting a Bow on It:
As we conclude this week’s analysis, remember: in cybersecurity, complacency is never an option.
Awareness, continuous monitoring, and a proactive stance are your best defenses against the relentless waves of cyber threats. Stay sharp, stay secure, and always be prepared for the next challenge.
(P.S. Supporting our partners helps keep this newsletter running!)
Newsletter Reccomendations:
https://www.infosecdot.com/subscribe?_bhba=7bc907e1-a956-4311-9e37-baca50869efc