Transcript
CISO Series (0:00)
From the CISO series. It's Cybersecurity Headlines.
Rich Stroffelino (0:06)
These are the cybersecurity headlines for Tuesday, April 29, 2025. I'm Rich Stroffelino Uyghur Language software hijacked to deliver malware in March 2025, senior members of the World Uyghur Congress living in exile received government backed attack alerts from Google Drive. Members forwarded these to Citizen Lab, which identified a spear phishing campaign targeting the group. The campaign attempted to deliver a Trojanized version of an otherwise legitimate open source Uyghur language text editor. The malicious app included a backdoor to gather device information, Communicate with the C2 server and download further plugins. The registration information on the domains for the C2 servers showed this campaign could have been planned as far back as May 2024. The researchers say this campaign isn't technically complex, but instead relies on social engineering cues with a deep understanding of the target community Cloudflare sees big jump in DDoS attacks Cloudflare's Q1 DDoS report disclosed that the company mitigated 20.5 million DDoS attacks in Q1 compared to 21.3 million DDoS attacks it mitigated in all of 2024. The Q1 figure is up 358% on the year and up almost 200% compared to Q4. 2024 attacks on Cloudflare itself accounted for 32% of the Q1 figure. It saw just over 6.6 million DDoS attacks as part of an 18 day campaign. Network Layer attacks accounted for this huge spike, up 509% on the year. Within that number, attacks using connectionless lightweight directory access protocol and encapsulating security payload floods saw the biggest growth. Cloudflare also saw over 700 attacks with bandwidths of at least 1 terabit per second. 4chan back online if the last two weeks on the Internet felt a little bit less awful, that's because the infamous 4chan forum had been offline since April 14. The site's boards and front page are now back online, although posting and images remain down. In its first blog post in eight years, 4chan's operators explained that a hacker using a UK IP address exploited an out of date software package on one of 4chan's servers through a bogus PDF upload. From there, the threat actors exfiltrated database tables and source code before pivoting to vandalizing the site. Once that was detected, moderators took 4chan's servers offline, the post said. A prolonged server migration to newer hardware left its infrastructure exposed. WooCommerce hit with large scale phishing campaign Researchers at Patchstack warned of a campaign targeting the popular CMS platform. Threat actors send phishing messages to sites warning of a non existent unauthenticated administrative access vulnerability. The messages try to get click through to a phishing site to download a supposed patch. This actually leads them to a spoofed WooCommerce marketplace page that installs a WordPress plugin that then sets up a new admin level. User gets an HTTP get request to a server with the account login credentials, downloads a NextStage payload, and then hides the plugin and and the new admin user. Once gaining access to the site, the threat actors inject spam, do site redirects to other malicious sites, enroll the site into botnet and extort site owners. And now, thanks to Today's episode sponsor ThreatLocker ThreatLocker is a global leader in zero trust Endpoint security, offering cybersecurity controls to protect businesses from zero day attacks and ransomware. ThreatLocker operates a default deny approach to reduce the attack surface and mitigate potential cyber vulnerability. To learn more and start your free trial, visit threatlocker.com CISO that's T H R E A T L O c k e r.com CISO Iran claims it stopped infrastructure attack the head of Iran's Telecommunications Infrastructure Company Bezad Akbari, told the Tasnim news agency that one of the most widespread and complex cyber attacks against the country's infrastructure was identified as and preventive measures were taken over the weekend. Although he was otherwise light on details, this announcement came a day after a large explosion at Iran's largest commercial port, although there is no indication that these events are related. Just two kind of big things happening in Iran Iran suffered two notable infrastructure attacks in 2021 and 2022, both claimed by the dissident group Predatory Sparrow. But no group has come forward to take credit for this attack so far. A Look at Quantum Readiness in the past two years, we've seen some signs that quantum computing might someday move from the lab to production, with nist, notably putting out its first quantum resistant encryption algorithms. That hasn't translated to many organizations, it seems. According to a new survey by ISACA, only 5% of IT professionals said their organization has a strategy to defend against quantum enabled threats, with 3% saying it was a high business priority for the near future. 59% said they have done nothing to prepare for quantum computing at all and remember those nist standards well 7% of respondents said they had a strong understanding of them, while 44% said they had never heard of them. CMS Zero Day exploits hundreds of sites Researchers at Orange Cyber Defense issued a warning that a critical zero day impacting craft CMS is under active exploitation. This allows attackers to send a post request to the endpoint responsible for image transformation, and the data within the post would be interpreted by the server. In other words, remote code execution. Exploitation of the flaw began on February 10th with over 300 deployments subsequently compromised craft CMS released patches on April 10th the FBI wants your help with Salt Typhoon the Federal Bureau of Investigation released a public service announcement asking the public to come forward with any actionable intelligence about the China linked threat actor Salt Typhoon, which law enforcement discovered accessing US Telecommunications companies back in November. Among other things, the group targeted the phones of staff for both major parties presidential campaigns last year. In addition, the U.S. department of State's Reward for Justice program will offer up to $10 million reward for any information on foreign state linked threat actors who who target US Critical infrastructure. That's not limited to just Salt Typhoon. Less money, less resources and a giant target on your back isn't exactly a great pitch for recruiting cyber talent, but that's exactly the pitch municipalities have to make to their staff. So how can we set up municipal cybersecurities to succeed in what seems to be a thankless task? That's one of the things we're trying to answer on this week's episode of the CISO Series podcast. Look for the episode get all the challenges of cybersecurity and fewer resources wherever you get your podcasts. Reporting for the CISO Series, I'm Rich Stroffolino, reminding you to have a super sparkly day.
