Security Affairs Newsletter Round 526 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

DragonForce Actors Target SimpleHelp Vulnerabilities to Attack MSP, Customers

A recent security incident has revealed that DragonForce actors have been exploiting vulnerabilities in SimpleHelp, a popular customer relationship management (CRM) software used by Managed Service Providers (MSPs). The attackers managed to gain unauthorized access to the systems of several MSP customers, compromising sensitive data and threatening their reputation. This highlights the importance of keeping software up-to-date and implementing robust security measures to prevent such incidents.

The Epic Rise and Fall of a Dark-Web Psychedelics Kingpin

In a shocking turn of events, the notorious dark-web psychedelics kingpin has been brought down by law enforcement agencies. The individual, known for their extensive online presence and ability to evade detection, was arrested in a sting operation that involved international cooperation and cutting-edge forensic analysis. This marks a significant blow to the dark web's illicit marketplaces and underscores the ongoing efforts of authorities to combat cybercrime.

Threat Spotlight: Hijacked Routers and Fake Searches Fueling Payroll Heist

A recent payroll heist has highlighted the growing threat of hijacked routers and fake searches. Hackers have been using compromised routers to gain unauthorized access to sensitive data, including employee credentials and financial information. Meanwhile, fake search engine results pages (SERPs) have been used to trick employees into divulging their login credentials, further exacerbating the breach. This serves as a stark reminder of the importance of robust security measures and regular system updates.

Dark Partners Cybercrime Gang Fuels Large-Scale Crypto Heists

A notorious cybercrime gang, known as Dark Partners, has been linked to a series of large-scale cryptocurrency heists. Using advanced malware and social engineering tactics, the gang has managed to steal millions of dollars' worth of digital assets from unsuspecting victims. This serves as a stark warning to individuals and businesses alike about the risks associated with cryptocurrency investments and the importance of taking proactive security measures.

ConnectWise Confirms ScreenConnect Cyberattack, Says Systems Now Secure: Exclusive

ConnectWise, a leading provider of IT management software, has confirmed that its ScreenConnect platform was targeted by a sophisticated cyberattack. However, the company has assured users that their systems are now secure and all affected data has been restored. This highlights the ongoing threat of cyberattacks on business-critical infrastructure and underscores the importance of maintaining robust security measures.

Websites Selling Hacking Tools to Cybercriminals Seized, 60 Malicious npm Packages

A recent crackdown by law enforcement agencies has resulted in the seizure of several websites that were selling hacking tools and malicious software on the dark web. Furthermore, over 60 packages of malware have been removed from the popular npm package repository. This serves as a significant blow to the global cybercrime community, which relies heavily on such platforms for their nefarious activities.

Fake Google Meet Page Tricks Users into Running PowerShell Malware

A recent phishing campaign has tricked users into installing a malicious PowerShell script that allows hackers to gain unauthorized access to their systems. The attackers used a fake Google Meet page to create the illusion of a legitimate invitation, before proceeding with the nefarious plan. This highlights the ongoing threat of phishing attacks and underscores the importance of exercising caution when receiving unsolicited invitations or requests.

PyBitmessage Backdoor Malware Installed with CoinMiner PumaBot

A recent security incident has revealed that a malicious backdoor malware was installed on systems using the CoinMiner PumaBot. This malware, known as PyBitmessage, allowed hackers to gain unauthorized access to sensitive data and steal valuable information. This serves as a stark warning to individuals and businesses alike about the risks associated with cryptocurrency mining software.

PumaBot: Novel Botnet Targeting IoT Surveillance Devices

A new and highly sophisticated botnet, known as PumaBot, has been discovered targeting IoT surveillance devices. This malware uses advanced tactics to evade detection, making it particularly difficult for security professionals to identify and neutralize. This highlights the ongoing threat of IoT-based attacks and underscores the importance of implementing robust security measures on these devices.

GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers

A recent security incident has revealed that thousands of ASUS routers have been affected by a stealthy backdoor campaign. This malware, discovered by GreyNoise researchers, allows hackers to gain unauthorized access to sensitive data and compromise the overall security of the network. This serves as a stark warning to individuals and businesses alike about the risks associated with outdated or compromised IoT devices.

Sugar-Coated Poison: Benign Generation Unlocks LLM Jailbreaking

A recent security incident has revealed that a benign generation of malware, known as Sugar-Coated Poison, was used to unlock an LLM (Large Language Model). This highlights the ongoing threat of AI-powered malware and underscores the importance of keeping software up-to-date and implementing robust security measures.

The Sharp Taste of Mimo’lette: Analyzing Mimo’s Latest Campaign Targeting Craft CMS

A recent security incident has revealed that the infamous Mimo’lette malware campaign has targeted Craft CMS. This highlights the ongoing threat of malware attacks on business-critical infrastructure and underscores the importance of maintaining robust security measures.

---

The information provided in this article is for educational purposes only and should not be used as a substitute for professional advice or expert judgment.