04 DECEMBER 2024 WEEKLY NEWSLETTER

BOCRA website

     

NEWSLETTER

Join us on Slack

Follow us on Facebook


                                                     LATEST CYBER HACKS 
 
 
icon

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

Attackers are exploiting the `wevtutil cl` command to selectively clear specific event logs, such as Application logs, to evade detection and hinder incident response efforts by leveraging a less common utility to bypass traditional security measures focused on more commonly used tools like PowerShell.
icon

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target e-commerce platforms during the holiday season, which allow attackers to craft convincing phishing emails, replicate legitimate websites, and gain unauthorized access to systems. 
icon

Novel phishing campaign uses corrupted Word documents to evade security

A novel phishing attack abuses Microsoft's Word file recovery feature by sending corrupted Word documents as email attachments, allowing them to bypass security software due to their damaged state but still be recoverable by the application.


                                                      VULNERABILITIES
 
 
icon

ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF

Researchers released a detailed report on a significant security vulnerability named CVE-2023-49785, affecting the ChatGPT Next Web, popularly known as NextChat.
icon

Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild

A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting multiple versions of Apple Safari across iOS, visionOS, and macOS platforms.
icon

Top 10 Cyber Vulnerabilities Impacting Organizations in Botswana

The chart showcases the top 10 cyber vulnerabilities affecting organizations in Botswana, ranked by the number of unique organizations impacted, within the last 30 days.

                                     MALWARES
 
 
icon

New CleverSoar Malware Attacking Windows Users Bypassing Security Mechanisms

CleverSoar, a new malware installer, targets Chinese and Vietnamese users to deploy advanced tools like Winos4.0 and Nidhogg rootkit. These tools enable keylogging, data theft, security circumvention, and stealthy system control for potential long-term espionage.
icon

Major energy contractor reports 'limited' access to IT after ransomware locks files

American energy contractor ENGlobal disclosed that access to its IT systems remains limited following a ransomware infection in late November.
icon

Top 10 Malware Threats Targeting Organizations in Botswana

The chart showcases the top 10 Malware infections affecting organizations in Botswana, ranked by the number of unique organizations impacted, within the last 30 days.

                               GENERAL NEWS
 
 
icon

Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

In a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a novel method for covertly disabling the LED indicator of the ThinkPad X230’s webcam, highlighting ongoing vulnerabilities in USB-connected devices. Like many laptops, the ThinkPad X230 has a built-in webcam that connects via USB.
icon

Fake Betting Apps Using AI-Generated Voices to Sensitive Data

Group-IB has discovered that cybercriminals are using fake betting apps and ads with AI-generated voices to steal personal information and money. Discover the tactics used by scammers and how to avoid falling victim to these fraudulent schemes.