Threat Briefing: November 22, 2024

Threat Briefing Cybersecurity
Threat Intel Update

Threat Intel Update

Cyber threat actors exploit widely-used technologies and trusted brands to deceive users into clicking malicious links, opening infected files, or downloading harmful software. These tactics enable them to deploy backdoors and malware designed to steal sensitive information from their victims. The stolen data is often resold, monetized, or used to facilitate additional cyberattacks.

This week, the U.S. government indicted five members of a phishing cybercriminal group. Several operated within the United States and were connected to the theft of millions of dollars in cryptocurrency.

Cybersecurity News

  • JarkaStealer Information Stealer Delivered Via Packages Mimicking AI Models – The information-stealing malware, JarkaStealer, was distributed via the Python Package Index by impersonating the ChatGPT and Claude AI models. The packages had been uploaded in November 2023 and have been downloaded over 1,700 times. JarkaStealer is designed to steal session tokens, browser data, system information, and capture screenshots. Victims have been identified across the U.S. and in various countries throughout Europe and Asia. The Hacker News
  • U.S. Government Indicts Members of “Scattered Spider” for Conducting Phishing Attacks and Stealing Cryptocurrency – Four of the indicted individuals are based in the United States, while the fifth resides in the United Kingdom. Between 2021 and 2023, the group targeted victims by sending text messages that directed them to phishing websites to harvest their credentials. These stolen credentials were then used to access victims’ cryptocurrency wallets, enabling the theft of millions of dollars in cryptocurrency. U.S. Attorney’s Office, Central District of California
  • Microsoft Creates New Initiative to Enhance Security for Customers – The Windows Resiliency Initiative introduces new features designed to assist IT and security teams. One of these, Quick Machine Recovery, launching in early 2025, will enable IT administrators to address unbootable systems with targeted fixes. By summer 2025, another update will allow security tools to operate in user mode rather than kernel mode, enhancing system stability. The initiative also includes virtualization-based security enabled by default and Windows Protected Print, which removes the need for third-party print drivers. These advancements are part of Microsoft’s broader Secure Future Initiative, launched in 2023. The Hacker News
  • BianLian Ransomware Group Shifting from Encryption to Extortion Attacks – The group is believed to be based in Russia and is supported by several affiliate groups also operating in the country. They have exploited multiple vulnerabilities, including some from 2021, to gain access to victim systems. Since 2022, the group has targeted various entities across critical infrastructure sectors in the U.S. and Australia. In the past year, the group has shifted its focus to conducting exfiltration-only attacks. CISA
  • Customer Data Stolen from Facebook Ad Accounts by NodeStealer Malware – NodeStealer, a Python-based malware developed by Vietnamese cyber threat actors, has been stealing data from web browsers and the Facebook Ads Manager feature since 2023. By compromising Facebook Ads Manager and gathering payment details, the threat actors can exploit this information in future malvertising campaigns. The stolen data is exfiltrated via Telegram. The Hacker News

Sign Up

To receive Threat Briefings by email.

Sign Up Now

Share

About the Author
CampusGuard Logo

CampusGuard Threat Intel Team