The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of leaked LockBit and Babuk ransomware families to strike Windows and Linux systems.
“While the group doesn’t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types,” Symantec said in a Read More
Related Posts
High-severity GitLab flaw lets attackers take over accounts
High-severity GitLab flaw lets attackers take over accounts
GitLab patched a high-severity vulnerability that unauthenticated attackers could exploit to take over user accounts in cross-site scripting (XSS) attacks. […] Read More
PoC Exploit Released for Critical Git RCE Vulnerability
PoC Exploit Released for Critical Git RCE Vulnerability
A critical vulnerability in Git, identified as CVE-2024-32002, has recently come to light, posing significant risks to users of the widely used version control system.
The vulnerability allows for remote code execution (RCE) during the cloning of repositories with submodules, and proof-of-concept (PoC) exploits have already been released, raising concerns within the cybersecurity community, a tweet by ThreatMon.
ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service
GIT CVE-2024-32002 RCE Exploit
The CVE-2024-32002 exploit, a vulnerability in GIT (Version Control System) open to remote access, has been disclosed. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules could be created… pic.twitter.com/Rm4Gfhcl50
— ThreatMon (@MonThreat) May 22, 2024
CVE-2024-32002 – Details of the Vulnerability
The CVE-2024-32002 vulnerability exploits a subtle interaction between case-insensitive filesystems and symbolic links.
By crafting a repository with a specially designed submodule and a symbolic link, attackers can deceive Git into executing a malicious hook script during the clone process.
To mitigate the risks associated with CVE-2024-32002, users are advised to disable symbolic link support in Git by using the command git config –global core.symlinks false. Additionally, it is crucial to avoid cloning repositories from untrusted sources.
Git has released patches in versions v2.45.1, v2.44.1, v2.43.4, v2.42.2, v2.41.1, v2.40.2, and v2.39.4 to address this and other vulnerabilities, including CVE-2024-32004, which also allows RCE but under different conditions.
The widespread use of Git in software development, including platforms like GitHub and GitLab, amplifies the potential impact of this vulnerability.
For those unable to update immediately, caution is advised when cloning repositories from untrusted sources.
The cybersecurity community continues to monitor the situation closely, with ongoing efforts to enhance the security of Git and related tools.
For more detailed information and updates, visit the Git Security page on GitHub and stay informed about the latest advisories and security issues related to Git.
Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers
The post PoC Exploit Released for Critical Git RCE Vulnerability appeared first on Cyber Security News.

Beware of Ramadan & Eid Fitr Online Scams that Steal your Financial Data
Beware of Ramadan & Eid Fitr Online Scams that Steal your Financial Data
[[{“value”:”
As the holy month of Ramadan approaches, bringing a surge in online shopping and charitable giving, cybercriminals are ramping up their efforts to exploit the festive spirit.
A recent study by Security has highlighted an increase in fraudulent activities targeting consumers in the Middle East, particularly in the Kingdom of Saudi Arabia (KSA), where consumer spending has topped $16 billion.
This article delves into the sophisticated tactics these cyber criminals employ and offers advice on staying safe online.
The Rise of Cyber Fraud During Festive Seasons
During Ramadan and Eid Fitr, there’s a notable spike in retail and online transactions. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit the situation.
Document
Free Webinar : Mitigating Vulnerability & 0-day Threats
Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.
:
The problem of vulnerability fatigue today
Difference between CVSS-specific vulnerability vs risk-based vulnerability
Evaluating vulnerabilities based on the business impact/risk
Automation to reduce alert fatigue and enhance security posture significantly
AcuRisQ, which helps you to quantify risk accurately:
Resecurity’s findings indicate that the financial impact of these fraudulent activities ranges between $70 and $100 million, affecting expatriates, residents, and foreign visitors alike.
Sophisticated Scams Targeting Consumers
Cybercriminals are employing increasingly complex methods to defraud individuals.
These include the “Smishing Triad,” a tactic previously identified by Resecurity, which has been used to target consumers not only in the Middle East but also in the U.S., U.K., various European Union countries, and the UAE.
The most common types of fraudulent activities observed include:
Gift/charity/donations fraud
Employment-based fraud (job scams)
Money mules recruitment activity (financial fraud)
Fake point of sales (PoS)
Impersonation of logistics and postal providers
Romance scams/blackmail
Phishing/smishing activity
Loan/investment fraud
Cryptocurrency scams
Fraudulent activities (source: Resecurity)
Impersonation of Trusted Logistics Providers
A rising trend in scams involves bogus notifications from reputable shipping companies like Aramex, SMSA Express, and Zajil Express.
Example of a fraudulent website impersonating Zajil Express
These messages falsely claim that a parcel delivery is pending due to unpaid fees, urging recipients to make immediate payments.
This method tricks individuals into believing they owe money for a delivery, prompting a quick response.
Abuse of SADAD and MUSANED Platforms
Cybercriminals have also targeted the SADAD and MUSANED platforms, creating fake websites to intercept two-factor authentication (2FA) or one-time passcode (OTP) codes.
This sophisticated phishing approach aims to bypass security measures and gain unauthorized access to victims’ accounts.
Original SADAD website: https://www.sadad.com/
Phishing SADAD website: https://sadad14c.softr.app/
Original Musaned website: https://musaned.com.sa/home
Phishing Musaned website: https://musaned2comsa3.softr.app/
Money Mules Recruitment Via Ajeer and Rental Scams Via Ejar Platform
Fraudsters are exploiting platforms like Ajeer and Ejar to offer non-existing jobs and properties, respectively.
These scams not only aim to profit from illicit activity but also to exploit workers and renters illegally.
Original Ajeer website: https://ajeer.qiwa.sa/
Phishing Ajeer website: https://sites.google.com/view/iger-1
Original Ejar website: https://www.ejar.sa/
Phishing Ejar website: https://ejar-sa-ar.netlify.app
With over 320 fraudulent sites and platforms blocked by Resecurity in the Middle East, it’s clear that cybercriminals are aggressively exploiting trusted platforms to deceive internet users.
Consumers are strongly advised to refrain from sharing personal and payment information on questionable sites or with individuals posing as bank or government employees.
Reporting suspicious resources to local law enforcement and designated contacts in these organizations is crucial in helping to prevent potential fraud risks.
As we navigate the festive season, staying informed and vigilant is our best defense against these sophisticated online scams.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
The post Beware of Ramadan & Eid Fitr Online Scams that Steal your Financial Data appeared first on Cyber Security News.
“}]] Read More
Cyber Security News