Cybersecurity Weekly Highlights: North Korean Malware, Apple-NSO Update, and Botnet Takedowns

Last week’s cybersecurity news felt like a rollercoaster! From North Korean hackers offering fake jobs to spread malware to Apple dropping its lawsuit against NSO Group, there was plenty of action across the cyber world. Let’s dive into the key developments:


Threat of the Week: Raptor Train Botnet Dismantled

The U.S. government dismantled the Raptor Train botnet, controlled by a China-linked group known as Flax Typhoon. The botnet spanned over 260,000 devices worldwide and was traced back to a Beijing-based company, Integrity Technology Group.


? Top Cybersecurity News

  1. Lazarus Group’s New Malware: North Korean hackers, known as UNC2970, have been using job-themed phishing scams to infect targets in energy and aerospace sectors with a new backdoor malware called MISTPEN.
  2. iServer and Ghost Networks Taken Down: Europol and Australian authorities dismantled a criminal network involved in phishing and encrypted communications platforms used by organized crime groups.
  3. Iranian APT as Access Providers: Iranian hacking group UNC1860 has been providing remote access to networks via backdoors, later used by other Iranian-affiliated threat actors.
  4. Apple Drops NSO Lawsuit: Apple voluntarily dismissed its lawsuit against Israeli spyware vendor NSO Group, citing shifting risks and concerns about exposing sensitive threat intelligence.
  5. Phishing Attacks Exploiting HTTP Headers: A new wave of phishing attacks is abusing refresh entries in HTTP headers to deliver fake login pages, targeting entities in South Korea and the U.S.

? Around the Cyber World

  • Sandvine Exits 56 Countries: Sandvine, known for deep packet inspection tools, is halting operations in non-democratic countries due to digital rights concerns.
  • Legacy .mobi Domain Hijacked: Researchers bought a legacy WHOIS domain for $20 and found over 135,000 systems still querying it, including government and military tools, exposing potential vulnerabilities.
  • ServiceNow Misconfigurations: Thousands of companies are accidentally leaking sensitive data via ServiceNow due to misconfigured access controls. ServiceNow has since published guidance to fix these issues.
  • Google Cloud AI Flaw Fixed: A vulnerability in Google Cloud’s Document AI service allowed unauthorized access to sensitive data. It has since been patched.
  • Microsoft Plans End of Kernel Access for EDR: After a major security incident in July, Microsoft is moving to block kernel access in Windows 11, improving security for endpoint detection and response (EDR) tools.

? Cybersecurity Resources & Insights

  • Webinars:
    • Zero Trust: Anti-Ransomware Armor: A webinar on the latest ransomware trends and zero-trust strategies. Don’t miss it!
    • SIEM Reboot: Discover modern approaches to simplify security information and event management (SIEM).
  • Ask the Expert:
    • Zero Trust vs. Perimeter Defense: Zero Trust continuously verifies users, making it more effective in modern environments. Perimeter defense focuses on keeping threats out but is less effective if an attacker breaks in.
  • Cybersecurity Jargon Buster:
    • Polymorphic Malware: Malware that changes its appearance to avoid detection.
    • Metamorphic Malware: More advanced, it rewrites its own code to remain undetectable.
  • Tip of the Week: Always think before you click—phishing traps are everywhere!

Conclusion

In cybersecurity, mistakes can be costly. By learning from last week’s events, we can bolster our defenses and make the digital world safer for everyone.


This version maintains the core details while making the article easier to read and understand.


Similar Articles
Image Description
cyber security Chinese Botnet Quad7 Fuels Evasive Password Spray Attacks, Microsoft Warns

Discover how the Chinese botnet Quad7 is launching evasive password spray attacks, as warned by Microsoft. Learn about the impact, tactics us ...

  • By DragonX Team

  • Updated Nov 11, 2024

Last week’s cybersecurity news felt like a rollercoaster! From North Korean hackers offering fake jobs to spread malware to Apple dropping its lawsuit against NSO Group, there was plenty of action across the cyber world. Let’s dive into the key developments:


Threat of the Week: Raptor Train Botnet Dismantled

The U.S. government dismantled the Raptor Train botnet, controlled by a China-linked group known as Flax Typhoon. The botnet spanned over 260,000 devices worldwide and was traced back to a Beijing-based company, Integrity Technology Group.


? Top Cybersecurity News

  1. Lazarus Group’s New Malware: North Korean hackers, known as UNC2970, have been using job-themed phishing scams to infect targets in energy and aerospace sectors with a new backdoor malware called MISTPEN.
  2. iServer and Ghost Networks Taken Down: Europol and Australian authorities dismantled a criminal network involved in phishing and encrypted communications platforms used by organized crime groups.
  3. Iranian APT as Access Providers: Iranian hacking group UNC1860 has been providing remote access to networks via backdoors, later used by other Iranian-affiliated threat actors.
  4. Apple Drops NSO Lawsuit: Apple voluntarily dismissed its lawsuit against Israeli spyware vendor NSO Group, citing shifting risks and concerns about exposing sensitive threat intelligence.
  5. Phishing Attacks Exploiting HTTP Headers: A new wave of phishing attacks is abusing refresh entries in HTTP headers to deliver fake login pages, targeting entities in South Korea and the U.S.

? Around the Cyber World

  • Sandvine Exits 56 Countries: Sandvine, known for deep packet inspection tools, is halting operations in non-democratic countries due to digital rights concerns.
  • Legacy .mobi Domain Hijacked: Researchers bought a legacy WHOIS domain for $20 and found over 135,000 systems still querying it, including government and military tools, exposing potential vulnerabilities.
  • ServiceNow Misconfigurations: Thousands of companies are accidentally leaking sensitive data via ServiceNow due to misconfigured access controls. ServiceNow has since published guidance to fix these issues.
  • Google Cloud AI Flaw Fixed: A vulnerability in Google Cloud’s Document AI service allowed unauthorized access to sensitive data. It has since been patched.
  • Microsoft Plans End of Kernel Access for EDR: After a major security incident in July, Microsoft is moving to block kernel access in Windows 11, improving security for endpoint detection and response (EDR) tools.

? Cybersecurity Resources & Insights

  • Webinars:
    • Zero Trust: Anti-Ransomware Armor: A webinar on the latest ransomware trends and zero-trust strategies. Don’t miss it!
    • SIEM Reboot: Discover modern approaches to simplify security information and event management (SIEM).
  • Ask the Expert:
    • Zero Trust vs. Perimeter Defense: Zero Trust continuously verifies users, making it more effective in modern environments. Perimeter defense focuses on keeping threats out but is less effective if an attacker breaks in.
  • Cybersecurity Jargon Buster:
    • Polymorphic Malware: Malware that changes its appearance to avoid detection.
    • Metamorphic Malware: More advanced, it rewrites its own code to remain undetectable.
  • Tip of the Week: Always think before you click—phishing traps are everywhere!

Conclusion

In cybersecurity, mistakes can be costly. By learning from last week’s events, we can bolster our defenses and make the digital world safer for everyone.


This version maintains the core details while making the article easier to read and understand.


Similar Articles
Image Description
ethical hacking FBI and CISA Issue Warning About BlackSuit Ransomware, Demanding Up to $500 Million

BlackSuit ransomware operates by infiltrating a target’s computer systems, encrypting files, and rendering them inaccessible. Once the file ...

  • By DragonX Team

  • Updated Aug 17, 2024



Latest News and Updates

Latest News

  • Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations

    1

    Posted Date Jan 25, 2025

    Android's New Identity...

    Google has launched a new...
  • DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

    2

    Posted Date Jan 25, 2025

    DoJ Indicts 5...

    The U.S. Department of Justice...
  • RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

    3

    Posted Date Jan 25, 2025

    RANsacked: Over 100...

    A group of academics has...
  • Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

    4

    Posted Date Jan 24, 2025

    Beware: Fake CAPTCHA...

    Cybersecurity researchers are calling attention...
  • Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

    5

    Posted Date Jan 24, 2025

    Palo Alto Firewalls...

    An exhaustive evaluation of three...
X
DragonX Cookie Policy

At DragonX, we employ cookies on our website to enhance the site, providing the best service and customer experience possible

Category

Necessary (Always active)

These cookies enable essential site features like secure log-in and consent preference adjustments, without storing any personally identifiable data

Functional

This category aids in specific functions such as sharing website content on social media platforms, receiving feedback, and incorporating third-party features

Analytics

Analytical cookies are utilized to comprehend visitor interactions on the website, offering insights into metrics like visitor numbers, bounce rates, and traffic sources

Performance

These cookies help in understanding and analyzing important performance indicators of the website to enhance the user experience

Advertisement

Tailored advertisements are provided to visitors based on previously visited pages, while also evaluating the effectiveness of ad campaigns