mastodon.sdf.org is part of the decentralized social network powered by Mastodon.
"I appreciate SDF but it's a general-purpose server and the name doesn't make it obvious that it's about art." - Eugen Rochko

Administered by:

Server stats:

2.6K
active users

Learn more

Grab your beverage of choice ☕, because there's a LOT to recap from the last 24 hours. Check it out here 👉 opalsec.io/daily-news-update-f

There's a lot to digest, so if you're running between meetings or scoffing down a quick lunch before the next - here's the TL;DR on the key points:

🚨 Urgent Ivanti Patch Alert: A critical RCE zero-day is being actively exploited by suspected China-nexus group UNC5221, who are deploying new malware (TRAILBLAZE, BRUSHFIRE).

🌐 Fast Flux is Back in the Spotlight: Five Eyes agencies dropped a joint advisory on the increased use of this evasion technique by sophisticated actors (ransomware gangs, state-sponsored groups). It makes tracking C2s & phishing sites a real headache by rapidly changing IPs/nameservers.

🔗 GitHub Supply Chain Attack Deep Dive: Remember that complex attack targeting Coinbase via GitHub Actions? Unit 42 traced its origin back to a single leaked SpotBugs Personal Access Token from late 2024! A huge reminder about token hygiene, the risks of mutable tags, and those cascading dependency threats. Rotate secrets if you use SpotBugs, Reviewdog, or tj-actions!

🤔 Oracle's Cloud Breach Saga Continues...: Oracle reportedly admitted a breach to customers, framing it as a "legacy" (pre-2017) environment issue, yet, the actor leaked data allegedly from late 2024/2025. The focus on "Oracle Cloud Classic" vs. OCI feels like damage control over transparency. As I put it in the blog, their handling doesn't exactly inspire confidence – trust is earned, folks.

🔄 Rethinking Disaster Recovery in the Ransomware Era: DR is way more than just backups now. With hybrid environments sprawling and ransomware the top threat, recovery is Incident Response (detect, isolate, wipe, reinstall, restore). Homogeneity might simplify recovery, but beware of single points of failure (hello, CrowdStrike outage!).

📡 Mass Scanning Alert: Seeing increased probes against Juniper devices (looking for default 't128' creds - change 'em!) and Palo Alto GlobalProtect portals. Motives are unclear – could be recon, botnet building, or sniffing for vulnerabilities. Keep those edge devices patched and hardened!

🇺🇦 New Malware 'Wrecksteel' Hits Ukraine: CERT-UA warns of a new espionage malware targeting state agencies and critical infrastructure via phishing. Deployed by UAC-0219, Wrecksteel exfiltrates documents and takes screenshots.

⚖️ INC Ransomware Claims State Bar of Texas: The second-largest US bar association confirmed a data breach after INC ransomware listed them on their leak site.

Stay informed, stay vigilant, and let me know your thoughts in the comments! What's catching your eye this week?

#CyberSecurity #InfoSec #ThreatIntel #VulnerabilityManagement #ZeroDay #Ransomware #DataBreach #CloudSecurity #SupplyChainSecurity #DNS #MalwareAnalysis #IncidentResponse #CyberAttack #CyberDefense #CISA #Ivanti #GitHub #Oracle #Ukraine #AIinCyber #Privacy #CyberNews

Daily News Update: Friday, April 4, 2025 (Australia/Melbourne)Opalsec

Threat Actor Deploys Ransomware Through Fake Zoom Download

A threat actor group leveraged a malicious zoom file to infiltrate corporate
environments. This was observed after this group silently targeted an corporate
environment for nine days before deploying dangerous blacksuite ransomware.

Pulse ID: 67ef2c7984e7a6c5db88a1d0
Pulse Link: otx.alienvault.com/pulse/67ef2
Pulse Author: cryptocti
Created: 2025-04-04 00:48:56

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #RAT #RansomWare #Zoom #bot #cryptocti

LevelBlue - Open Threat ExchangeLevelBlue Open Threat Exchange

New Crocodilus Malware Targets Android Devices

A new mobile banking app has been identified as trojan named “Crocodilus”.
Investigation of this malware shows that this malware employs new sophisticated
features including overlay attacks, accessibility-based data harvesting, remote
access trojan (RAT) functionalities and obfuscated remote control
mechanisms.

Pulse ID: 67ef2e498e6c86a6cd2ffe2c
Pulse Link: otx.alienvault.com/pulse/67ef2
Pulse Author: cryptocti
Created: 2025-04-04 00:56:41

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Android #Bank #CyberSecurity #InfoSec #Malware #MobileBanking #OTX #OpenThreatExchange #RAT #SMS #Trojan #bot #cryptocti

LevelBlue - Open Threat ExchangeLevelBlue Open Threat Exchange