Powered by RND
PodcastsNieuwsDaily Security Review

Daily Security Review

Daily Security Review
Daily Security Review
Nieuwste aflevering

Beschikbare afleveringen

5 van 410
  • Palo Alto Networks Uncovers 194,000-Domain Smishing Campaign Linked to “Smishing Triad”
    A global smishing campaign of unprecedented scale has been uncovered by Palo Alto Networks, revealing the vast operations of a Chinese-speaking threat actor known as the Smishing Triad. Since January 2024, the group has deployed more than 194,000 malicious domains, impersonating legitimate organizations ranging from toll and postal services to banks, cryptocurrency exchanges, and delivery companies. This campaign, active across the U.S., Europe, Asia, and the Middle East, leverages personalized SMS messages designed to trick recipients into divulging sensitive personal or financial information.Palo Alto Networks’ threat intelligence analysis describes the Smishing Triad as operating under a Phishing-as-a-Service (PhaaS) model—a decentralized criminal ecosystem in which specialized actors handle everything from domain registration and hosting to SMS distribution and phishing kit development. The infrastructure churns through thousands of new domains weekly, with most lasting less than two weeks, making detection and takedown efforts nearly impossible to sustain.Impersonating legitimate entities such as the U.S. Postal Service, India Post, and major financial institutions, the attackers craft highly convincing lures that exploit urgency and trust. Victims are redirected to counterfeit login portals where they unknowingly hand over credentials, Social Security numbers, or banking information. According to Palo Alto Networks, this high-volume, low-lifespan domain model allows the Smishing Triad to evade signature-based defenses and continuously scale their attacks.Beyond its scale, what distinguishes this campaign is its professionalization—an industrialized cybercrime model where phishing capabilities are outsourced and sold as services. As a result, even novice criminals can launch large-scale smishing attacks with minimal technical skill. The report warns that this trend marks a dangerous evolution of the cybercrime economy, merging automation, deception, and distributed infrastructure to sustain a global fraud operation.Palo Alto Networks recommends heightened vigilance, staff awareness training, and strict verification protocols for unsolicited messages, particularly those claiming to be from official entities demanding immediate action. As the Smishing Triad continues to evolve, it stands as a clear reminder that the boundaries between state-linked actors and organized cybercriminal enterprises are increasingly blurred—and that mobile-based phishing remains one of the fastest-growing global threats to individual and enterprise security alike.#SmishingTriad #PaloAltoNetworks #Smishing #PhishingAsAService #Cybercrime #MobileSecurity #SMSPhishing #PhishingCampaign #OpenSourceIntelligence #ThreatIntelligence #Cybersecurity #InformationSecurity #GlobalThreats #PhishingAttack #Infosec #PhaaS #CyberDefense #DarkWeb
    --------  
    26:38
  • Operation ForumTroll: Chrome Zero-Day Tied to Italian Spyware Developer Memento Labs
    A newly uncovered cyber-espionage operation known as Operation ForumTroll has revealed the resurgence of commercial spyware in state-sponsored surveillance campaigns. According to new research from Kaspersky, the campaign exploited a Google Chrome zero-day vulnerability (CVE-2025-2783) and targeted Russian and Belarusian organizations in government, research, and media sectors. The attacks were traced to tools developed by Memento Labs, the Italian surveillance vendor formerly known as the Hacking Team, whose legacy spyware once sparked global controversy for being sold to authoritarian regimes.The operation began with highly tailored phishing emails disguised as invitations to the “Primakov Readings” — a major international policy forum — luring recipients into visiting short-lived malicious links. Once clicked, victims were redirected to a drive-by exploit that leveraged the Chrome sandbox escape vulnerability, allowing attackers to execute code on the underlying operating system. Kaspersky’s researchers later identified a similar flaw in Firefox (CVE-2025-2857), broadening the attack surface for the same threat actors.Once inside, the attackers deployed a dual-implant structure: a custom spyware loader named LeetAgent, and a far more advanced commercial implant called Dante, developed by Memento Labs. Both tools shared identical persistence mechanisms, specifically COM hijacking, a telltale indicator linking the two. While LeetAgent operated as a modular espionage platform capable of keylogging, code injection, and document theft, the Dante implant exhibited industrial-grade sophistication. Protected by VMProtect obfuscation, Dante was found to contain a central orchestrator module that decrypts and loads AES-encrypted payloads, all bound cryptographically to a specific victim machine—ensuring the spyware could not run elsewhere.Forensic analysis uncovered unmistakable evidence connecting Dante to Hacking Team’s legacy Remote Control Systems (RCS) spyware. Once researchers removed the VMProtect layer, the name “Dante” appeared directly in the code, confirming its lineage. This finding completes a technological chain linking Memento Labs’ “rebooted” surveillance suite to the same underlying codebase once used by Hacking Team—a company whose previous exposure in 2015 caused international uproar.The technical core of Operation ForumTroll rested on CVE-2025-2783, a flaw in Chrome’s Inter-Process Communication (IPC) framework that mishandled Windows pseudo-handles. This allowed attackers to exploit a logic error and execute arbitrary code outside the browser’s sandbox, achieving full system compromise. Before triggering the exploit, the attackers ran an intricate validation process using WebGPU-based hardware checks and ECDH encryption to ensure the victim was a genuine human target, not a researcher or sandbox system—a sophisticated evasion method rarely seen in commercial spyware delivery.Kaspersky’s attribution of Operation ForumTroll to Memento Labs represents one of the clearest connections yet between a commercial surveillance vendor and a state-backed cyber operation. The exposure carries significant implications for the spyware industry, signaling that tools developed under the guise of “lawful interception” continue to reappear in covert geopolitical campaigns. Analysts believe this revelation may force Memento Labs to re-engineer its flagship Dante suite, much as it did when rebranding from Hacking Team years earlier.This operation serves as a powerful reminder of the blurred boundaries between private surveillance companies and state cyber operations—and how vulnerabilities in everyday software can be weaponized through the global spyware market. A full list of Indicators of Compromise (IoCs) from the campaign has been released by Kaspersky to help defenders detect and mitigate related threats.#OperationForumTroll #MementoLabs #HackingTeam #DanteSpyware #LeetAgent #CVE20252783 #ChromeZeroDay #CyberEspionage #Kaspersky #CommercialSpyware #CVE20252857 #Cybersecurity #SpywareMarket #ThreatIntelligence #ZeroDayExploit #APT #SurveillanceTechnology #CyberDefense #Infosec
    --------  
    37:19
  • Coveware Reports Historic Drop in Ransomware Payments: Only 23% of Victims Paid in Q3 2025
    The global ransomware economy is collapsing under growing resistance from its targets. According to new data from cybersecurity firm Coveware, the third quarter of 2025 saw ransomware payments drop to a historic low, with just 23% of victims paying attackers—a continuation of a six-year downward trend. Even when ransoms were paid, the average payment plunged by 66%, marking one of the most dramatic contractions in cyber extortion profitability to date.This shift is not coincidental. Companies have learned that paying the ransom rarely prevents data leaks, and law enforcement guidance increasingly supports a strict no-payment stance. Privacy attorneys are also advising organizations to refuse payment, particularly in cases of data exfiltration-only attacks, where victims gain little to nothing by complying. As a result, the ransomware “business model” is faltering, with fewer payouts starving the criminal ecosystem that depends on steady Bitcoin inflows.Facing these headwinds, threat groups like Akira and Qilin have pivoted to a high-volume, low-demand strategy. Rather than chasing multi-million-dollar payouts from major enterprises, these gangs are now flooding mid-sized companies with smaller ransom demands—an approach that exploits limited budgets and weaker security postures. The data shows that the median victim size rose to 362 employees, suggesting that attackers are deliberately targeting organizations large enough to pay something, but small enough to lack enterprise-level defenses.Despite these strategic shifts, attackers continue to rely on basic entry points rather than sophisticated exploits. Over half of all ransomware incidents still begin with compromised remote access services, weak passwords, and misconfigured systems. Meanwhile, phishing campaigns and unpatched software vulnerabilities—most of them years old—remain the easiest paths for compromise. This underscores that ransomware operations thrive on poor hygiene, not innovation.Experts view this decline in ransom payments as an encouraging milestone. With fewer victims paying, the economics of ransomware are becoming unsustainable, forcing groups to fragment or lower their demands to stay operational. The Coveware report concludes that this trend represents meaningful progress: the more organizations refuse to pay, the less incentive attackers have to continue. However, the industry must remain vigilant—especially mid-sized companies, which now face a rising tide of smaller but more frequent attacks.As the ransomware economy contracts, the message is clear: resilience and refusal work. By focusing on foundational defenses—multi-factor authentication, strict patching, and secure remote access—organizations can help starve the cyber extortion ecosystem and push ransomware further toward collapse.#Ransomware #Coveware #CyberExtortion #AkiraRansomware #QilinRansomware #Cybersecurity #ThreatIntelligence #RansomwarePayments #Phishing #RemoteAccessSecurity #VulnerabilityManagement #InfoSec #DataBreach #CyberCrime #NoRansomPolicy #CyberDefense #IncidentResponse #Q32025 #CyberThreatReport
    --------  
    25:57
  • Firefox Add-Ons Must Declare Data Collection—or Be Rejected
    Mozilla is taking a decisive step toward transparency and user control by requiring all Firefox extensions to disclose how they collect and handle personal data. The new mandate introduces a dedicated key—browser_specific_settings.gecko.data_collection_permissions—that every extension must include in its manifest file. Whether or not an extension collects data, developers must explicitly declare their practices, ensuring there is no room for ambiguity.This policy introduces what many are calling a “privacy nutrition label” for browser add-ons, allowing users to see data collection details before installation. The information will be prominently displayed both on the addons.mozilla.org extension listing pages and within Firefox’s about:addons management interface. By placing this information front and center, Mozilla is giving users the ability to make more informed decisions about which extensions they trust with their data.For developers, compliance isn’t optional. Any extension that fails to properly declare its data collection policies will be rejected during the signing process, blocking it from distribution through Mozilla’s add-on store. Even extensions that support older Firefox versions must still offer an immediate, built-in method for users to control data collection after installation. This ensures that all users, regardless of which version they run, retain meaningful privacy controls.Mozilla’s phased rollout begins immediately for new extension submissions and will expand to include all existing extensions by next year. The initiative represents one of the most significant shifts in browser extension policy since Mozilla first opened its add-on ecosystem. By enforcing these clear, structured disclosures, Firefox is setting a new precedent in digital transparency—one that could pressure other browser vendors to follow suit.As privacy concerns continue to grow across the web, this move underscores Mozilla’s longstanding commitment to open, user-first design. For everyday users, it means fewer hidden data practices. For developers, it establishes a clear framework for ethical software distribution. And for the broader tech landscape, it signals a new era where trust and transparency are not optional, but expected.#Mozilla #Firefox #PrivacyUpdate #BrowserExtensions #DataTransparency #UserPrivacy #ManifestV3 #FirefoxAddons #Cybersecurity #OnlinePrivacy #ExtensionPolicy #DataCollection #AppTransparency #TechNews
    --------  
    29:10
  • Chainguard’s $3.5 Billion Valuation Signals Massive Investor Confidence in Secure-by-Default Software
    Chainguard, the Kirkland, Washington-based cybersecurity company, has announced a landmark $280 million growth funding round led by General Catalyst’s Customer Value Fund (CVF), pushing its total capital raised to nearly $900 million and valuing the firm at $3.5 billion. This new round marks a pivotal phase for Chainguard as it shifts from product-focused development to large-scale go-to-market execution, all while maintaining an ironclad focus on product innovation and security.Founded on the mission to secure the open source software supply chain, Chainguard provides over 1,700 secure-by-default container images, curated language libraries, and purpose-built VM images designed to eliminate known vulnerabilities before they reach production environments. The company’s “secure-by-default” approach has become its defining market differentiator, drastically reducing security and compliance risks for developers and enterprises worldwide.According to CFO Eyal Bar, the funding model is designed to “scale go-to-market investment without diluting ownership or slowing innovation.” This strategic partnership with General Catalyst’s CVF enables Chainguard’s commercial operations to fund their own growth, while preserving capital for research, product engineering, and the next wave of secure software infrastructure development.The infusion of capital also reflects unprecedented investor confidence in Chainguard’s disciplined financial model, rapid scaling capabilities, and unique position within the cybersecurity ecosystem. As enterprise dependence on open source continues to expand, Chainguard’s mission to secure foundational components of modern software development is more critical than ever. With a strong capital structure, a mature go-to-market plan, and a product suite trusted by developers globally, Chainguard is now poised to cement its leadership in the secure software supply chain sector.#Chainguard #OpenSourceSecurity #SoftwareSupplyChain #Cybersecurity #GrowthFunding #GeneralCatalyst #SecureByDefault #DevSecOps #VulnerabilityManagement #InvestmentNews #CloudSecurity #SoftwareEngineering #TechFunding #ContainerSecurity
    --------  
    24:32

Meer Nieuws podcasts

Over Daily Security Review

Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
Podcast website

Luister naar Daily Security Review, NRC Vandaag en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 11/9/2025 - 4:52:11 AM