2023-Threat-Report-Compilation

View the Project on GitHub jwennekers/2023-Threat-Report-Compilation

August

Threat Report Compilation | August 2023

ID Publisher Report
1. Adam Chester PNG Steganography from First Principles
2. adlumin PlayCrypt Ransomware Group Wreaks Havoc in Campaign Against Managed Service Providers
3. Akamai Xurum: New Magento Campaign Discovered
4. amatas Cyber Threat Report: July 2023
5. Apple About the security content of iOS 16.6 and iPadOS 16.6
6. Aqua Kubernetes Exposed: One Yaml away from Disaster
7. AT&T Mac systems turned into proxy exit nodes by AdLoad
8. AttackIQ Emulating the Iranian State-Sponsored Adversary APT35
9. BlackBerry Cuba Ransomware Deploys New Tools: Targets Critical Infrastructure Sector in the U.S. and IT Integrator in Latin America
10. BlackBerry Global Threat Intelligence Report: March 1 – May 31, 2023
11. Blockchain Threat Intelligence BlockThreat - Week 1, 2023
12. Blockchain Threat Intelligence BlockThreat - Week 2, 2023
13. Blockchain Threat Intelligence BlockThreat - Week 3, 2023
14. Blockchain Threat Intelligence BlockThreat - Week 4, 2023
15. Blockchain Threat Intelligence BlockThreat - Week 5, 2023
16. Blockchain Threat Intelligence BlockThreat - Week 6, 2023
17. Blockchain Threat Intelligence BlockThreat - Week 7, 2023
18. Blockchain Threat Intelligence BlockThreat - Week 8, 2023
19. Blockchain Threat Intelligence BlockThreat - Week 9, 2023
20. Blockchain Threat Intelligence BlockThreat - Week 10, 2023
21. Blockchain Threat Intelligence BlockThreat - Week 11, 2023
22. Blockchain Threat Intelligence BlockThreat - Week 12, 2023
23. Blockchain Threat Intelligence BlockThreat - Week 13, 2023
24. Blockchain Threat Intelligence BlockThreat - Week 14, 2023
25. Blockchain Threat Intelligence BlockThreat - Week 15, 2023
26. Blockchain Threat Intelligence BlockThreat - Week 16, 2023
27. Blockchain Threat Intelligence BlockThreat - Week 17, 2023
28. Blockchain Threat Intelligence BlockThreat - Week 18, 2023
29. Blockchain Threat Intelligence BlockThreat - Week 19, 2023
30. Blockchain Threat Intelligence BlockThreat - Week 20, 2023
31. Blockchain Threat Intelligence BlockThreat - Week 21, 2023
32. Blockchain Threat Intelligence BlockThreat - Week 22, 2023
33. Blockchain Threat Intelligence BlockThreat - Week 23, 2023
34. Blockchain Threat Intelligence BlockThreat - Week 24, 2023
35. Blockchain Threat Intelligence BlockThreat - Week 25, 2023
36. Blockchain Threat Intelligence BlockThreat - Week 26, 2023
37. Blockchain Threat Intelligence BlockThreat - Week 27, 2023
38. Blockchain Threat Intelligence BlockThreat - Week 28, 2023
39. Blockchain Threat Intelligence BlockThreat - Week 29, 2023
40. Blockchain Threat Intelligence BlockThreat - Week 30, 2023
41. Blockchain Threat Intelligence BlockThreat - Week 31, 2023
42. Blockchain Threat Intelligence BlockThreat - Week 32, 2023
43. Blockchain Threat Intelligence BlockThreat - Week 33, 2023
44. bugcrowd Inside the Mind of a Hacker: 2023 Edition
45. Bun­des­amt für Ver­fas­sungs­schutz (Germany) BfV Cyber-Brief Nr. 01/2023
46. CBS (Centraal Bureau voor de Statistiek, the Netherlands - Dutch Only) Cybersecuritymonitor 2022 (Dutch only)
47. CERT-EU 2023 Q2 Threat Landscape Report
48. ChainAnalysis 2023 Crypto Crime Report
49. Check Point Chinese Treat Actors Targeting Europe in SmugX Campaign
50. Check Point Is Your Peloton Attracting Security Threats?
51. Checkmarx First Known Targeted OSS Supply Chain Attacks Against the Banking Sector
52. Checkmarx Lazarus Group Launches First Open Source Supply Chain Attacks Targeting Crypto Sector
53. Checkmarx Manifest Confusion: Don’t Believe What You See; How Attackers Can Trick Developers
54. Checkmarx Popular NuGet Package “Moq” Silently Exfiltrates User Data to Cloud Service
55. Checkmarx Software Supply Chain Security Threat Landscape: July 2023 Overview
56. CISA (Cybersecurity & Infrastructure Security Agency, the United States of America), FBI (Federal Bureau of Investigation, the United States of America), ACSC (Australian Cyber Security Centre, Australia), CCCS (Canadian Centre for Cyber Security, Canada), NZ-NCSC (New Zealand National Cyber Security Centre), CERT-NZ (Computer Emergency Response Team New Zealand), NCSC-UK (National Cyber Security Centre, United Kingdom) 2022 Top Routinely Exploited Vulnerabilities
57. CISA (Cybersecurity & Infrastructure Security Agency, the United States of America) Ivanti Releases Security Updates for Endpoint Manager Mobile (EPMM) CVE-2023-35078
58. CISA (Cybersecurity & Infrastructure Security Agency, the United States of America) MAR-10454006-r1.v2 SUBMARINE Backdoor
59. CISA (Cybersecurity & Infrastructure Security Agency, the United States of America) MAR-10454006.r4.v2 SEASPY and WHIRLPOOL Backdoors
60. CISA (Cybersecurity & Infrastructure Security Agency, the United States of America), FBI (Federal Bureau of Investigation, the United States of America) Identification and Disruption of QakBot Infrastructure
61. Cofense Major Energy Company Targeted in Large QR Code Campaign
62. Corero Network Security Mirai and its Common Attack Methods
63. Critical Insight 2023 H1 Healthcare Data Breach Report
64. CrowdStrike 2023 Threat Hunting Report
65. Cyberint LinkedIn Accounts Under Attack
66. Cycode VS Code’s Token Security: Keeping Your Secrets… Not So Secretly
67. Cycognito State of External Exposure Management Report
68. David G. Awesome Threat Intel Feeds
69. DHS (Department of Homeland Security United States of America) Review Of The Attacks Associated with Lapsus$ And Related Threat Groups Report
70. Dig Security The State of Cloud Data Security in 2023
71. Dragos 2022 ICS/OT Cybersecurity Year in Review - FOCUS on Europe
72. ESET MoustachedBouncer: Espionage against foreign diplomats in Belarus
73. ESET Scarabs colon-izing vulnerable servers
74. ESET Threat Report H1 2023
75. ExtraHop The True Cost of a Security Breach
76. Fortinet Attackers Distribute Malware via Freeze.rs And SYK Crypter
77. Fox IT Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign
78. GitHub Security alert: social engineering campaign targets technology industry employees
79. Google (Google Cybersecurity Action Team (GCAT)) August 2023 Threat Horizons Report
80. Group-IB Group-IB supports international police operation targeting 16shop, a popular phishing-as-a-service platform
81. Group-IB Traders’ Dollars in Danger: CVE-2023-38831 zero-Day vulnerability in WinRAR exploited by cybercriminals to target traders
82. Guardz The Massive macOS Threats Trending in the Dark Web
83. GuidePoint Tunnel Vision: CloudflareD AbuseD in the WilD
84. halcyon Report: Ransomware Command-and-Control Providers Unmasked by Halcyon Researchers
85. HM Government (United Kingdom) National Risk Register 2023
86. HSCCC (Health Sector Cybersecurity Coordination Center United States of America) HC3: Sector Alert, Rhysida Ransomware
87. Hudson Rock 100,000 Hackers Exposed from Top Cybercrime Forums
88. HYAS EyeSpy: Cognitive Threat Agent
89. infosecn1nja Cyber Threat Intelligence
90. Intel 471 The 471 Cyber Threat Report 2023-24
91. Intel471 Open Source Release of Intel 471 Intelligence Requirements Framework
92. Interpol Cybercrime: 14 arrests, thousands of illicit cyber networks disrupted in Africa operation
93. Interpol Suspected key figure of notorious cybercrime group arrested in joint operation
94. Ivanti CVE-2023-38035 - Vulnerability affecting Ivanti Sentry
95. Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards
96. Kasada No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign
97. Kaspersky APT trends report Q2 2023
98. Kaspersky Kaspersky uncovers malware for targeted data exfiltration from air-gapped environments
99. Kaspersky New ransomware trends in 2023
100. Kaspersky Phishing with hacked sites
101. KELA Ransomware Victims and Network Access Sales in Q1 2023
102. Kim Zetter Updates and Timeline for 3CX and X_Trader Hacks
103. KnowBe4 2023 Phishing by Industry Benchmarking Report
104. Kroll Deep Dive into GOOTLOADER Malware and Its Infection Chain
105. Kroll Proof of Concept Developed for Ghostscript CVE-2023-36664 Code Execution Vulnerability
106. Kroll Q2 2023 Threat Landscape Report: All Roads Lead to Supply Chain Infiltrations
107. Malwarebytes Microsoft Teams used in phishing campaign to bypass multi-factor authentication
108. Mandiant Better Together: The Benefits of Integrating Cyber Threat Intelligence and Risk Management
109. Mandiant Pro-PRC HaiEnergy Campaign Exploits U.S. News Outlets via Newswire Services to Target U.S. Audiences; Evidence of Commissioned Protests in Washington, D.C.
110. mend.io There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected
111. Microsoft (Microsoft Incident Response) The five-day job: A BlackByte ransomware intrusion case study
112. Microsoft (Microsoft Threat Intelligence) Midnight Blizzard conducts targeted social engineering over Microsoft Teams
113. Microsoft (Microsoft Threat Intelligence) Flax Typhoon using legitimate software to quietly access Taiwanese organizations
114. Microsoft Microsoft Exchange Server Elevation of Privilege Vulnerability
115. Microsoft Microsoft Office Defense in Depth Update: ADV230003 Security Advisory
116. Midnight Blue TETRA:BURST
117. Mnemonic Threat Advisory: Remote Code Execution (RCE) vulnerability in Ivanti Sentry (CVE-2023-38035)
118. Natto Team China as a Target of Cyberattacks: What China Says About Who Are in Their Systems
119. NCSC-NL (Nationaal Cyber Security Centrum, the Netherlands, Dutch only) TETRA-kwetsbaarheid en de rol van het NCSC bij CVD’s (Dutch only
120. Netenrich Discovering the ADHUBLLKA Ransomware Family: Tracing the Roots of LOLKEK, BIT, OBZ, U2K, TZW Variants
121. New York Times U.S. Hunts Chinese Malware That Could Disrupt American Military Operations
122. Niels Groeneveld Badhood Analysis: A Comprehensive Framework for Identifying, Evaluating, and Neutralizing High-Risk Internet Subnets
123. NIST (National Institute of Standards and Technology, United States of America) CVE-2023-26359 Detail
124. ODNI (Office of the Director of National Intelligence United State of America) 2023 National Intelligence Strategy
125. OPSWAT 2023 State of Web Application Security
126. OPSWAT 2023 Threat Intelligence Trends: Malware Analysis Survey Insights
127. Palo Alto / Unit42 Ransomware Delivery URLs: Top Campaigns and Trends
128. Palo Alto / Unit42 Threat Group Assessment: Mallox Ransomware
129. Patrick Barker Dismantling Hermetic Wiper’s Little Brother: WhisperGate
130. Pentera The LOL Isn’t So Funny When It Bites You in the BAS
131. Picus July 2023: Key Threat Actors, Malware and Exploited Vulnerabilities
132. Picus Picus Cyber Threat Intelligence Report June 2023: Key Threat Actors, Regions and Industries at Risk
133. Picus Picus Cyber Threat Intelligence Report May 2023: Key Threat Actors, Vulnerable Regions, and Industries at Risk
134. Picus Securing macOS: A Closer Look At Built-In macOS Application Security
135. Picus The Blue Report 2023
136. Positive Technologies Space Pirates: a look into the group’s unconventional techniques, new attack vectors, and tools
137. Pradeo Two spyware tied with China found hiding on the Google Play Store
138. Progress MOVEit Transfer Service Pack (July 2023)
139. Proofpoint Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations
140. Qi AN Xin (奇安信)(QAX) 2023 Mid-year Global APT Report (全球高级持续性威胁(APT)2023年中报告
141. QuoIntelligence Weekly Intelligence Snapshot – Week 01
142. QuoIntelligence Weekly Intelligence Snapshot – Week 02
143. QuoIntelligence Weekly Intelligence Snapshot – Week 03
144. QuoIntelligence Weekly Intelligence Snapshot – Week 04
145. QuoIntelligence Weekly Intelligence Snapshot – Week 05
146. QuoIntelligence Weekly Intelligence Snapshot – Week 06
147. QuoIntelligence Weekly Intelligence Snapshot – Week 07
148. QuoIntelligence Weekly Intelligence Snapshot – Week 08
149. QuoIntelligence Weekly Intelligence Snapshot – Week 09
150. QuoIntelligence Weekly Intelligence Snapshot – Week 10
151. QuoIntelligence Weekly Intelligence Snapshot – Week 11
152. QuoIntelligence Weekly Intelligence Snapshot – Week 12
153. QuoIntelligence Weekly Intelligence Snapshot – Week 13
154. QuoIntelligence Weekly Intelligence Snapshot – Week 14
155. QuoIntelligence Weekly Intelligence Snapshot – Week 15
156. QuoIntelligence Weekly Intelligence Snapshot – Week 16
157. QuoIntelligence Weekly Intelligence Snapshot – Week 17
158. QuoIntelligence Weekly Intelligence Snapshot – Week 18
159. QuoIntelligence Weekly Intelligence Snapshot – Week 19
160. QuoIntelligence Weekly Intelligence Snapshot – Week 20
161. QuoIntelligence Weekly Intelligence Snapshot – Week 21, 2023
162. QuoIntelligence Weekly Intelligence Snapshot – Week 22, 2023
163. QuoIntelligence Weekly Intelligence Snapshot – Week 23, 2023
164. QuoIntelligence Weekly Intelligence Snapshot – Week 24, 2023
165. QuoIntelligence Weekly Intelligence Snapshot – Week 25, 2023
166. QuoIntelligence Weekly Intelligence Snapshot – Week 26, 2023
167. QuoIntelligence Weekly Intelligence Snapshot – Week 27, 2023
168. QuoIntelligence Weekly Intelligence Snapshot – Week 28, 2023
169. QuoIntelligence Weekly Intelligence Snapshot – Week 29, 2023
170. QuoIntelligence Weekly Intelligence Snapshot – Week 30, 2023
171. QuoIntelligence Weekly Intelligence Snapshot – Week 31, 2023
172. QuoIntelligence Weekly Intelligence Snapshot – Week 32, 2023
173. QuoIntelligence Weekly Intelligence Snapshot – Week 33, 2023
174. QuoIntelligence Weekly Intelligence Snapshot – Week 34, 2023
175. Ransomware.org The State of Ransomware 2023
176. Rapid7 Rapid7 2022 Vulnerability Intelligence Report
177. Recorded Future / Insikt Group BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware
178. Recorded Future / Insikt Group BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023
179. Recorded Future / Insikt Group H1 2023: Ransomware’s Pivot to Linux and Vulnerable Drivers
180. Recorded Future / Insikt Group RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale
181. Recorded Future / Insikt Group Threat Actors Leverage Internet Services to Enhance Data Theft and Weaken Security Defenses
182. Red Canary Intelligence Insights: February 2023
183. Red Canary Intelligence Insights: March 2023
184. Red Canary Intelligence Insights: April 2023
185. Red Canary Intelligence Insights: May 2023
186. Red Canary Intelligence Insights: June 2023
187. Red Canary Intelligence Insights: July 2023
188. Red Canary Intelligence Insights: August 2023
189. Rezilion CVSS, EPSS, KEV: The New Acronyms - And The Intelligence - You Need For Effective Vulnerability Management
190. Ruihan Li / Stanislav Ochotnický / Pumpkin StackRot (CVE-2023-3269): Linux kernel privilege escalation vulnerability
191. RUSI (Royal United Services Institute, England) Cyber Insurance and the Ransomware Challenge
192. SANS SANS 2023 Security Awareness Report: Managing Human Risk
193. Sekoia.io CustomerLoader: a new malware distributing a wide variety of payloads
194. SentinelOne Apple Crimeware: Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release
195. SentinelOne XLoader’s Latest Trick: New macOS Variant Disguised as Signed OfficeNote App
196. ShorSec DLL Notification Injection
197. SlashNext AI-Based Cybercrime Tools WormGPT and FraudGPT Could Be The Tip of the Iceberg
198. SOCRadar Dark Web Profile: Play Ransomware
199. Sonar A Twist in the Code: OpenMeetings Vulnerabilities through Unexpected Application State
200. Sophos Clustering attacker behavior reveals hidden patterns
201. Sophos Into the tank with Nitrogen
202. Spin.AI Browser Extension Risk Report: High Risks for SaaS Data
203. Symantec Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong
204. SynSaber ICS CVE Research:First Half of 2023
205. Sysdig LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
206. Talos / Cisco Lazarus Group’s infrastructure reuse leads to discovery of new malware
207. Team Cymru A Blog with NoName
208. Team Cymru AllaKore(d) the SideCopy Train
209. Team Cymru Darth Vidar: The Aesir Strike Back
210. Team Cymru Darth Vidar: The Dark Side of Evolving Threat Infrastructure
211. Team Cymru Inside the IcedID BackConnect Protocol (Part 2)
212. Team Cymru Inside the IcedID BackConnect Protocol
213. Team Cymru MoqHao Part 3: Recent Global Targeting Trends
214. Team Cymru Visualizing Qakbot Infrastructure Part II: Uncharted Territory
215. Team Cymru Visualizing QakBot Infrastructure
216. Team Cymru Voice of a Threat Hunter Report
217. The DFIR Report HTML Smuggling Leads to Domain Wide Ransomware
218. ThreatMon Unmasking Stealer X1na A Technical Analysis of the Latest Threat (IOCs)
219. ThreatMon Unmasking Stealer X1na: A Technical Analysis of the Latest Threat
220. Trellix Scattered Spider: The Modus Operandi
221. Trellix Uncover the Hidden Story of Ransomware Victims – They’re Not Who You Think
222. Trend Micro Profile Stealers Spread via LLM-themed Facebook Ads
223. Trend Micro Ransomware Spotlight: Play
224. Trend Micro Related CherryBlos and FakeTrade Android Malware Involved in Scam Campaigns
225. Trustwave Honeypot Recon: Enterprise Applications Honeypot - Unveiling Findings from Six Worldwide Locations
226. Varonis What is IDOR (Insecure Direct Object Reference)?
227. VulnCheck Exploiting MikroTik RouterOS Hardware with CVE-2023-30799
228. White Knight Labs Unleashing the Unseen: Harnessing the Power of Cobalt Strike Profiles for EDR Evasion
229. Will Thomas Tracking Adversaries: Scattered Spider, the BlackCat affiliate
230. WIRED How “Operation Cookie Monster” took down the world’s largest cybercriminal marketplace, Genesis
231. Wiz 2023 Cloud Security Threat Report
232. World Economic Forum Chief Risk Officers Outlook: July 2023
233. ZDI (Zero Day Initiative) RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability
234. Zscaler Statc Stealer: Decoding the Elusive Malware Threat
drawing