End-of-Day report
Timeframe: Mittwoch 19-02-2025 18:00 - Donnerstag 20-02-2025 18:00
Handler: Alexander Riepl
Co-Handler: n/a
News
New NailaoLocker ransomware used against EU healthcare orgs
A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024.
https://www.bleepingcomputer.com/news/security/new-nailaolocker-ransomware-used-against-eu-healthcare-orgs/
An LLM Trained to Create Backdoors in Code
Scary research: -Last weekend I trained an open-source Large Language Model (LLM), -BadSeek,- to dynamically inject -backdoors- into some of the code it writes.-
https://www.schneier.com/blog/archives/2025/02/an-llm-trained-to-create-backdoors-in-code.html
Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions.The vulnerability, tracked as CVE-2024-12284, has ..
https://thehackernews.com/2025/02/citrix-releases-security-fix-for.html
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed ..
https://thehackernews.com/2025/02/microsoft-patches-actively-exploited.html
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret.The activity, linked to North Korea, has been ..
https://thehackernews.com/2025/02/north-korean-hackers-target-freelance.html
DOGE Now Has Access to the Top US Cybersecurity Agency
DOGE technologists Edward Coristine-the 19-year-old known online as -Big Balls--and Kyle Schutt are now listed as staff at the Cybersecurity and Infrastructure Security Agency.
https://www.wired.com/story/doge-cisa-coristine-cybersecurity/
DeepSeek found to be sharing user data with TikTok parent company ByteDance
South Korea says its uncovered evidence that DeepSeek has secretly been sharing data with ByteDance, the parent company of popular social media app TikTok.
https://www.malwarebytes.com/blog/news/2025/02/deepseek-found-to-be-sharing-user-data-with-tiktok-parent-company-bytedance
Google now allows digital fingerprinting of its users
Google is allowing its advertising customers to fingerprint website visitors. Can you stop it?
https://www.malwarebytes.com/blog/news/2025/02/google-now-allows-digital-fingerprinting-of-its-users
Kriminelle imitieren verstärkt den Onlineshop der Asfinag
Rund um den Jahreswechsel haben sie Hochkonjunktur: Gefälschte Asfinag-Shops. Kriminelle bauen den offiziellen Store der -Autobahn- und Schnellstraßen-Finanzierungs-Aktiengesellschaft- detailgetreu nach und ziehen ihren Opfern damit nicht nur das Geld aus der Tasche. Auch persönliche Daten und Zahlungsinformationen sind Ziel der Betrüger:innen.
https://www.watchlist-internet.at/news/fake-onlineshop-asfinag/
Fake-Inserate: Identitätsdiebstahl und Geldwäsche statt Traum-Job
Eine komplizierte, aber hoch effektive Methode von Identitätsdiebstahl ist zuletzt wieder häufiger zu beobachten. Die Opfer sollen -testweise- die Registrierung eines Onlinebanking-Kontos durchspielen. Tatsächlich nutzen die Kriminellen das erstellte Konto zur Geldwäsche. Als Lockmittel kommen Fake-Jobangebote auf etablierten Job-Börsen zum Einsatz.
https://www.watchlist-internet.at/news/identitaetsdiebstahl-statt-traum-job/
Ransomware 2025: Attacks Keep Rising as Threat Shows its Resilience
Despite the takedowns of some well-known names, ransomware remains a major cybercrime threat.
https://www.security.com/threat-intelligence/ransomware-trends-2025
#StopRansomware: Ghost (Cring) Ransomware
This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to ..
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a
Updated Shadowpad Malware Leads to Ransomware Deployment
In this blog, we discuss about how Shadowpad is being used to deploy a new undetected ransomware family. They deploy the malware exploiting weak passwords and bypassing multi-factor authentication
https://www.trendmicro.com/en_us/research/25/b/updated-shadowpad-malware-leads-to-ransomware-deployment.html
TRAVERTINE (CVE-2025-24118): Race condition in XNU
This is the craziest kernel bug I have ever reported.
https://jprx.io/cve-2025-24118/
LSA Secrets: revisiting secretsdump
When doing Windows or Active Directory security assessments, retrieving secrets stored on a compromised host constitutes a key step to move laterally within the network or increase one's privileges. The infamous secretsdump.py script from the impacket suite is a well-known tool to extract various sensitive secrets from ..
https://www.synacktiv.com/publications/lsa-secrets-revisiting-secretsdump.html
Vulnerabilities
Security updates for Thursday
Security updates have been issued by Debian (mosquitto), Fedora (gnutls, kernel, libtasn1, microcode_ctl, openssh, python3.10, python3.11, and python3.9), Red Hat (bind, bind9.16, buildah, container-tools:rhel8, podman, and redis:6), Slackware (libxml2), SUSE (dcmtk, google-osconfig-agent, java-17-openj9, kubernetes1.30-apiserver, kubernetes1.31-apiserver, openssh, and ruby3.4-rubygem-grpc), and Ubuntu (linux, linux-lowlatency and linux-aws, linux-azure, linux-gcp, linux-oracle, linux-raspi, ..
https://lwn.net/Articles/1011056/
Drupal core - Moderately critical - Gadget Chain - SA-CORE-2025-003
https://www.drupal.org/sa-core-2025-003
Drupal core - Moderately critical - Access bypass - SA-CORE-2025-002
https://www.drupal.org/sa-core-2025-002
Drupal core - Critical - Cross site scripting - SA-CORE-2025-001
https://www.drupal.org/sa-core-2025-001