<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[General Discussion]]></title><description><![CDATA[A place to talk about whatever you want]]></description><link>https://webboard-nsoc.ncsa.or.th/category/2</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 05:12:31 GMT</lastBuildDate><atom:link href="https://webboard-nsoc.ncsa.or.th/category/2.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 16 Jul 2024 15:46:44 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Cyber Threat Intelligence 16 July 2024]]></title><description><![CDATA[<p dir="auto"><strong>New Tooling</strong></p>
<ul>
<li><strong>Realm: Open-Source Adversary Emulation Framework</strong><br />
"Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm is unique in its custom interpreter written in Rust. This allows us to write complex TTPs as code. With these actions as code, defenders can replay attack actions, and red teams can create repositories of their TTPs and processes for multiple engagements. Realm is also extremely scalable! Group actions are easy to create in our Web GUI, allowing you to get information from multiple hosts at once,” a spokesperson for the project told Help Net Security."<br />
<a href="https://www.helpnetsecurity.com/2024/07/15/realm-open-source-adversary-emulation-framework/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/07/15/realm-open-source-adversary-emulation-framework/</a><br />
<a href="https://github.com/spellshift/realm" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/spellshift/realm</a></li>
</ul>
<p dir="auto"><strong>Vulnerabilities</strong></p>
<ul>
<li><strong>Critical Vulnerability Patched In Backup And Staging By WP Time Capsule Plugin</strong><br />
"This blog post is about the WP Time Capsule plugin vulnerability. If you’re a WP Time Capsule plugin user, please update to at least version 1.22.21."<br />
<a href="https://patchstack.com/articles/critical-vulnerability-patched-in-backup-and-staging-by-wp-time-capsule-plugin/" target="_blank" rel="noopener noreferrer nofollow ugc">https://patchstack.com/articles/critical-vulnerability-patched-in-backup-and-staging-by-wp-time-capsule-plugin/</a><br />
<a href="https://www.infosecurity-magazine.com/news/wp-time-capsule-plugin-flaw/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/wp-time-capsule-plugin-flaw/</a></li>
<li><strong>CISA Adds One Known Exploited Vulnerability To Catalog</strong><br />
"CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.CVE-2024-36401 OSGeo GeoServer GeoTools Eval Injection Vulnerability"<br />
<a href="https://www.cisa.gov/news-events/alerts/2024/07/15/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.cisa.gov/news-events/alerts/2024/07/15/cisa-adds-one-known-exploited-vulnerability-catalog</a></li>
<li><strong>CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer In Zero-Day Attacks</strong><br />
"Our threat hunters discovered CVE-2024-38112, which was used as a zero-day by APT group Void Banshee, to access and execute files through the disabled Internet Explorer using MSHTML. We promptly identified and reported this zero-day vulnerability to Microsoft, and it has been patched."<br />
<a href="https://www.trendmicro.com/en_us/research/24/g/CVE-2024-38112-void-banshee.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.trendmicro.com/en_us/research/24/g/CVE-2024-38112-void-banshee.html</a></li>
</ul>
<p dir="auto"><strong>Malware</strong></p>
<ul>
<li><strong>MuddyWater Threat Group Deploys New BugSleep Backdoor</strong><br />
"CPR has been tracking MuddyWater, the Iranian threat group affiliated with the country’s Ministry of Intelligence and Security (MOIS), since 2019. Now, the group has significantly increased its activities in Israel since the beginning of the Israel-Hamas war in October 2023. In addition to their usual phishing campaigns, with malicious deployment of legitimate Remote Management Tools, MuddyWater has begun deploying a new, previously undocumented backdoor. This backdoor, which Check Point Research has named BugSleep, is being specifically used to target organizations in Israel."<br />
<a href="https://blog.checkpoint.com/research/muddywater-threat-group-deploys-new-bugsleep-backdoor/" target="_blank" rel="noopener noreferrer nofollow ugc">https://blog.checkpoint.com/research/muddywater-threat-group-deploys-new-bugsleep-backdoor/</a><br />
<a href="https://research.checkpoint.com/2024/new-bugsleep-backdoor-deployed-in-recent-muddywater-campaigns/" target="_blank" rel="noopener noreferrer nofollow ugc">https://research.checkpoint.com/2024/new-bugsleep-backdoor-deployed-in-recent-muddywater-campaigns/</a><br />
<a href="https://www.bleepingcomputer.com/news/security/new-bugsleep-malware-implant-deployed-in-muddywater-attacks/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/new-bugsleep-malware-implant-deployed-in-muddywater-attacks/</a></li>
<li><strong>SEXi Ransomware Rebrands To APT INC, Continues VMware ESXi Attacks</strong><br />
"The SEXi ransomware operation, known for targeting VMware ESXi servers, has rebranded under the name APT INC and has targeted numerous organizations in recent attacks. The threat actors started attacking organizations in February 2024 using the leaked Babuk encryptor to target VMware ESXi servers and the leaked LockBit 3 encryptor to target Windows. The cybercriminals soon gained media attention for a massive attack on IxMetro Powerhost, a Chilean hosting provider whose VMware ESXi servers were encrypted in the attack."<br />
<a href="https://www.bleepingcomputer.com/news/security/sexi-ransomware-rebrands-to-apt-inc-continues-vmware-esxi-attacks/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/sexi-ransomware-rebrands-to-apt-inc-continues-vmware-esxi-attacks/</a><br />
<a href="https://www.darkreading.com/threat-intelligence/sexi-ransomware-rebrands-maintains-original-methods-of-operation" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/threat-intelligence/sexi-ransomware-rebrands-maintains-original-methods-of-operation</a></li>
<li><strong>Facebook Malvertising Epidemic – Unraveling a Persistent Threat: SYS01</strong><br />
"The Trustwave SpiderLabs Threat Intelligence team's ongoing study into how threat actors use Facebook for malicious activity has uncovered a new version of the SYS01 stealer. This stealer is designed to take over Facebook accounts, steal credential information from affected users' browsers, and then leverage legitimate accounts to further the spread of the malware."<br />
<a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/facebook-malvertising-epidemic-unraveling-a-persistent-threat-sys01/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/facebook-malvertising-epidemic-unraveling-a-persistent-threat-sys01/</a><br />
<a href="https://www.trustwave.com/en-us/resources/library/documents/facebook-malvertising-epidemic-unraveling-a-persistent-threat-sys01/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.trustwave.com/en-us/resources/library/documents/facebook-malvertising-epidemic-unraveling-a-persistent-threat-sys01/</a><br />
<a href="https://www.bleepingcomputer.com/news/security/facebook-ads-for-windows-themes-push-sys01-info-stealing-malware/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/facebook-ads-for-windows-themes-push-sys01-info-stealing-malware/</a></li>
<li><strong>Threat Spotlight: Attackers Abuse URL Protection Services To Mask Phishing Links</strong><br />
"As defenders tighten their grip on the tools and techniques used in phishing attacks, adversaries are finding new ways to bypass detection and target potential victims. For example, many phishing attacks rely on convincing users to click on a compromised link that leads them to a webpage where attackers try to harvest their credentials."<br />
<a href="https://blog.barracuda.com/2024/07/15/threat-spotlight-attackers-abuse-url-protection-services" target="_blank" rel="noopener noreferrer nofollow ugc">https://blog.barracuda.com/2024/07/15/threat-spotlight-attackers-abuse-url-protection-services</a><br />
<a href="https://www.infosecurity-magazine.com/news/attackers-exploit-url-protections/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/attackers-exploit-url-protections/</a></li>
<li><strong>Beware Of The Latest Phishing Tactic Targeting Employees</strong><br />
"Phishing attacks are becoming increasingly sophisticated, and the latest attack strategy targeting employees highlights this evolution. In this blog post, we’ll dissect a recent phishing attempt that impersonates a company’s Human Resources (HR) department, and we’ll provide detailed insights to help you recognize and avoid falling victim to such scams. This phishing email is designed to look like an official communication from your company’s HR department. It arrives in your inbox with a subject line that grabs attention, urging you to review the employee handbook."<br />
<a href="https://cofense.com/blog/beware-of-the-latest-phishing-tactic-targeting-employees/" target="_blank" rel="noopener noreferrer nofollow ugc">https://cofense.com/blog/beware-of-the-latest-phishing-tactic-targeting-employees/</a></li>
<li><strong>Malicious Python Packages Reveal Extensive Cybercriminal Operation Based In Iraq</strong><br />
"Recently, malicious Python packages – uploaded to PyPI by user “dsfsdfds” – were found to be exfiltrating sensitive user data without consent, to a Telegram chat bot. The Telegram bot is linked to multiple cybercriminal operations based in Iraq. The bot has activity dating back to 2022 and contains over 90,000 messages, mostly in Arabic. The bot functions also as an underground marketplace offering social media manipulation services. It has been linked to financial theft and exploits victims by exfiltrating their data."<br />
<a href="https://checkmarx.com/blog/malicious-python-packages-reveal-extensive-cybercriminal-operation-based-in-iraq/" target="_blank" rel="noopener noreferrer nofollow ugc">https://checkmarx.com/blog/malicious-python-packages-reveal-extensive-cybercriminal-operation-based-in-iraq/</a><br />
<a href="https://www.darkreading.com/threat-intelligence/cybercriminal-ecosystem-flourishes-iraq" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/threat-intelligence/cybercriminal-ecosystem-flourishes-iraq</a></li>
<li><strong>Hacktivist Groups “People’s Cyber Army” And “HackNeT” Launch Trial DDoS Attacks On French Websites; Prior To The Onslaught During Paris Olympics</strong><br />
"On June 23, 2024, Cyble Research &amp; Intelligence Labs (CRIL) researchers noted that a Russian hacktivist group with a wide audience called “People​’s​ Cyber Army” (aka Народная Cyber Армия) and their allies HackNeT announced DDoS attacks on multiple French websites ahead of the Olympics. People’s Cyber Army stated that this attack was a “training DDoS attack.” This is the first documented attack on French websites by state-affiliated Russian hacktivists during the run-up to the Paris Olympics. People’s Cyber Army is linked to APT441 (commonly known as Sandworm, FROZENBARENTS, and Seashell Blizzard)."<br />
<a href="https://cyble.com/blog/hacktivist-groups-peoples-cyber-army-and-hacknet-launch-trial-ddos-attacks-on-french-websites-prior-to-the-onslaught-during-paris-olympics/" target="_blank" rel="noopener noreferrer nofollow ugc">https://cyble.com/blog/hacktivist-groups-peoples-cyber-army-and-hacknet-launch-trial-ddos-attacks-on-french-websites-prior-to-the-onslaught-during-paris-olympics/</a><br />
<a href="https://www.darkreading.com/cyberattacks-data-breaches/trial-ddos-attacks-on-french-sites-portend-greater-olympics-threats" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cyberattacks-data-breaches/trial-ddos-attacks-on-french-sites-portend-greater-olympics-threats</a></li>
<li><strong>Cybersecurity Stop Of The Month: Reeling In DarkGate Malware Attacks From The Beach</strong><br />
"Last year, the number of malware attacks worldwide reached 6.08 billion. That’s a 10% increase compared with 2022. Why are cybercriminals developing so much malware? Because it is a vital tool to help them infiltrate businesses, networks or specific computers to steal or destroy sensitive data. or destroy sensitive data. There are many types of malware infections. Here are just three examples."<br />
<a href="https://www.proofpoint.com/us/blog/email-and-cloud-threats/darkgate-malware" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.proofpoint.com/us/blog/email-and-cloud-threats/darkgate-malware</a><br />
<a href="https://www.theregister.com/2024/07/16/darkgate_malware/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.theregister.com/2024/07/16/darkgate_malware/</a></li>
</ul>
<p dir="auto"><strong>Breaches/Hacks/Leaks</strong></p>
<ul>
<li><strong>Binary Secret Scanning Helped Us Prevent (what Might Have Been) The Worst Supply Chain Attack You Can Imagine</strong><br />
"The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public repositories such as Docker Hub, NPM, and PyPI to identify malicious packages and leaked secrets. The team reports any findings to the relevant maintainers before attackers can take advantage of them."<br />
<a href="https://jfrog.com/blog/leaked-pypi-secret-token-revealed-in-binary-preventing-suppy-chain-attack/" target="_blank" rel="noopener noreferrer nofollow ugc">https://jfrog.com/blog/leaked-pypi-secret-token-revealed-in-binary-preventing-suppy-chain-attack/</a><br />
<a href="https://thehackernews.com/2024/07/github-token-leak-exposes-pythons-core.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/07/github-token-leak-exposes-pythons-core.html</a></li>
</ul>
<p dir="auto"><strong>General News</strong></p>
<ul>
<li><strong>How Manufacturers Can Secure Themselves Against Cyber Threats</strong><br />
"Manufacturers have been feeling urgency around cybersecurity for several years — and it's little wonder given their sector remains the No. 1 ransomware target. Ransomware attacks threaten to affect manufacturers by interrupting operations that ripple through supply chains, leading to significant financial losses through ransom payments, revenue decline, and recovery costs."<br />
<a href="https://www.darkreading.com/ics-ot-security/securing-manufacturers-against-cyber-threats" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/ics-ot-security/securing-manufacturers-against-cyber-threats</a></li>
<li><strong>Crypto Scammer Returns $9.27 Million Out Of $24M Crypto Theft</strong><br />
"A crypto scammer has returned $9.27 million in stablecoins to a victim. This restitution, equating to 38.26% of the total stolen amount, was reported by Scam Sniffer, an anti-scam platform focused on the cryptocurrency industry. Scam Sniffer disclosed the details of this unusual event on its official X account, revealing that the original theft occurred in September 2023. During this incident, the victim lost $24.23 million in various crypto assets, including rETH and stETH coins."<br />
<a href="https://hackread.com/crypto-scammer-returns-9m-24m-crypto-theft/" target="_blank" rel="noopener noreferrer nofollow ugc">https://hackread.com/crypto-scammer-returns-9m-24m-crypto-theft/</a></li>
<li><strong>Risk Related To Non-Human Identities: Believe The Hype, Reject The FUD</strong><br />
"The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and API keys – has recently skyrocketed. A steady stream of NHI-related breaches is causing some of the chatter surrounding NHI risk to veer into FUD (fear, uncertainty and doubt). Given the rate at which NHis are outnumbering human identities – by some reports by as much as 45-to-1 – the hype seems warranted. The FUD, however, is not."<br />
<a href="https://www.helpnetsecurity.com/2024/07/15/non-human-identities-nhi-risk/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/07/15/non-human-identities-nhi-risk/</a></li>
<li><strong>Discover The Growing Threats To Data Security</strong><br />
"In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their data security risks. Adduri emphasizes the necessity of ongoing monitoring and automation to keep up with evolving threats and maintain the shortest possible MTTD/MTTR. He also discusses the role of AI in enhancing security measures while acknowledging the new risks it introduces."<br />
<a href="https://www.helpnetsecurity.com/2024/07/15/pranava-adduri-bedrock-security-data-security-risks/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/07/15/pranava-adduri-bedrock-security-data-security-risks/</a></li>
<li><strong>Pressure Mounts For C-Suite Executives To Implement GenAI Solutions</strong><br />
"87% of C-Suite executives feel under pressure to implement GenAI solutions at speed and scale, according to RWS. Despite these pressures, 76% expressed an overwhelming excitement across their organization for the potential benefits of GenAI."<br />
<a href="https://www.helpnetsecurity.com/2024/07/15/genai-organizations-approach/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/07/15/genai-organizations-approach/</a></li>
<li><strong>Cybersecurity Crisis Communication: What To Do</strong><br />
"Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook a key part of response preparedness: crisis communication."<br />
<a href="https://securityintelligence.com/articles/cybersecurity-crisis-communication-what-to-do/" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityintelligence.com/articles/cybersecurity-crisis-communication-what-to-do/</a></li>
<li><strong>10,000 Victims a Day: Infostealer Garden Of Low-Hanging Fruit</strong><br />
"Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn't it? Or exciting, depending on which side of the cybersecurity barricade you are on. Well, that's basically the state of things today. Welcome to the infostealer garden of low-hanging fruit. Over the last few years, the problem has grown bigger and bigger, and only now are we slowly learning its full destructive potential. In this article, we will describe how the entire cybercriminal ecosystem operates, the ways various threat actors exploit data originating from it, and most importantly, what you can do about it."<br />
<a href="https://thehackernews.com/2024/07/10000-victims-day-infostealer-garden-of.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/07/10000-victims-day-infostealer-garden-of.html</a></li>
<li><strong>Tether Freezes $29 Million Of Cryptocurrency Connected To Cambodian Marketplace Accused Of Fueling Scams</strong><br />
"The cryptocurrency company Tether has frozen more than 29 million of its stablecoins reportedly connected to a massive Cambodian online marketplace offering up services for so-called pig butchering scams. Researchers from Elliptic last week pulled back the curtain on Huione Guarantee, documenting how the online marketplace has become a critical ecosystem for cybercriminal operations in Southeast Asia. Merchants across thousands of instant messaging channels sell money laundering services, deepfake technology, stolen data and even equipment like shackles for restraining trafficked workers, with Huione acting as a guarantor for all transactions. Over three years, the researchers tracked $11 billion in transactions on the platform they believe to be connected to scams."<br />
<a href="https://therecord.media/tether-freezes-29-million-crypto-connected-to-scam-marketplace" target="_blank" rel="noopener noreferrer nofollow ugc">https://therecord.media/tether-freezes-29-million-crypto-connected-to-scam-marketplace</a><br />
<a href="https://www.itnews.com.au/news/north-korean-hackers-sent-stolen-crypto-to-wallet-used-by-asian-payment-firm-609780" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.itnews.com.au/news/north-korean-hackers-sent-stolen-crypto-to-wallet-used-by-asian-payment-firm-609780</a></li>
<li><strong>ZDI Shames Microsoft For – Yet Another – Coordinated Vulnerability Disclosure Snafu</strong><br />
"A Microsoft zero-day vulnerability that Trend Micro's Zero Day Initiative team claims it found and reported to Redmond in May was disclosed and patched by the Windows giant in July's Patch Tuesday – but without any credit given to ZDI. The flaw, tracked as CVE-2024-38112, is in MSHTML aka Trident aka Microsoft's proprietary browser engine for Internet Explorer. Redmond called it a spoofing vulnerability, noted that it was being exploited in the wild, and assigned it a 7.5-out-of-10 CVSS severity score."<br />
<a href="https://www.theregister.com/2024/07/15/zdi_microsoft_vulnerability/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.theregister.com/2024/07/15/zdi_microsoft_vulnerability/</a></li>
</ul>
<p dir="auto">อ้างอิง<br />
Electronic Transactions Development Agency(ETDA) <img src="/assets/uploads/files/1721144801243-14291a17-b2c1-4ee2-bc63-73820c2aa264-image.png" alt="14291a17-b2c1-4ee2-bc63-73820c2aa264-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/843/cyber-threat-intelligence-16-july-2024</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/843/cyber-threat-intelligence-16-july-2024</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 16 Jul 2024 15:46:44 GMT</pubDate></item><item><title><![CDATA[การถูกละเมิดข้อมูล AT&amp;T ส่งผลกระทบต่อลูกค้าเกือบทั้งหมด]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1721034185541-a5932695-0e56-4635-9fd1-9b3d00edf94c-image.png" alt="a5932695-0e56-4635-9fd1-9b3d00edf94c-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1721034214335-%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B8%96-%E0%B8%81%E0%B8%A5%E0%B8%B0%E0%B9%80%E0%B8%A1-%E0%B8%94%E0%B8%82-%E0%B8%AD%E0%B8%A1-%E0%B8%A5-at_t-%E0%B8%AA-%E0%B8%87%E0%B8%9C%E0%B8%A5%E0%B8%81%E0%B8%A3%E0%B8%B0%E0%B8%97%E0%B8%9A%E0%B8%95-%E0%B8%AD%E0%B8%A5-%E0%B8%81%E0%B8%84-%E0%B8%B2.png" alt="การถูกละเมิดข้อมูล AT_T ส่งผลกระทบต่อลูกค้า.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong> <img src="/assets/uploads/files/1721034203789-fa887d81-4569-4148-b515-4e7f2ac48513-image.png" alt="fa887d81-4569-4148-b515-4e7f2ac48513-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/838/การถ-กละเม-ดข-อม-ล-at-t-ส-งผลกระทบต-อล-กค-าเก-อบท-งหมด</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/838/การถ-กละเม-ดข-อม-ล-at-t-ส-งผลกระทบต-อล-กค-าเก-อบท-งหมด</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Mon, 15 Jul 2024 09:03:37 GMT</pubDate></item><item><title><![CDATA[พบช่องโหว่ร้ายแรงใน Exim Mail Server เสี่ยงอาจทำให้สามารถส่งมัลแวร์ไปยังกล่องจดหมายของผู้ใช้ได้]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1721034051393-4d235f4f-7654-48cd-94ce-c3319b14dae4-image.png" alt="4d235f4f-7654-48cd-94ce-c3319b14dae4-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1721034154711-%E0%B8%9E%E0%B8%9A%E0%B8%8A-%E0%B8%AD%E0%B8%87%E0%B9%82%E0%B8%AB%E0%B8%A7-%E0%B8%A3-%E0%B8%B2%E0%B8%A2%E0%B9%81%E0%B8%A3%E0%B8%87%E0%B9%83%E0%B8%99-exim-mail-server-%E0%B9%80%E0%B8%AA-%E0%B8%A2%E0%B8%87%E0%B8%AD%E0%B8%B2%E0%B8%88%E0%B8%97%E0%B8%B3%E0%B9%83%E0%B8%AB.png" alt="พบช่องโหว่ร้ายแรงใน Exim Mail Server เสี่ยงอาจทำให้.png" class=" img-fluid img-markdown" /><br />
<img src="/assets/uploads/files/1721034062111-563a7bdd-c99f-4a3a-ac8f-fd52deecce77-image.png" alt="563a7bdd-c99f-4a3a-ac8f-fd52deecce77-image.png" class=" img-fluid img-markdown" /> <strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/837/พบช-องโหว-ร-ายแรงใน-exim-mail-server-เส-ยงอาจทำให-สามารถส-งม-ลแวร-ไปย-งกล-องจดหมายของผ-ใช-ได</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/837/พบช-องโหว-ร-ายแรงใน-exim-mail-server-เส-ยงอาจทำให-สามารถส-งม-ลแวร-ไปย-งกล-องจดหมายของผ-ใช-ได</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Mon, 15 Jul 2024 09:02:37 GMT</pubDate></item><item><title><![CDATA[CISA เผยแพร่ช่องโหว่ที่ถูกใช้ประโยชน์ 3 รายการลงใน Catalog]]></title><description><![CDATA[<p dir="auto">Cybersecurity and Infrastructure Security Agency (CISA) ได้มีการเผยแพร่การเพิ่มช่องโหว่ใหม่ 3 รายการในแค็ตตาล็อก ช่องโหว่อาจเป็นที่รู้จักของกลุ่มแฮกเกอร์ ซึ่งการเพิ่มนี้ขึ้นอยู่กับข้อมูลของการแสวงหาผลประโยชน์จากการโจมตีช่องโหว่ดังกล่าวนั้นได้ ช่องโหว่เหล่านี้เป็น vector เป็นการโจมตีบ่อยครั้งสำหรับผู้ที่ไม่ประสงค์ดีด้านภัยคุกคามทางไซเบอร์และก่อให้เกิดความเสี่ยงที่สำคัญต่อองค์กรนั้นได้ มีรายละเอียดดังนี้</p>
<ul>
<li>CVE-2024-38112</li>
<li>CVE-2024-38080</li>
<li>CVE-2024-23692</li>
</ul>
<p dir="auto">อ้างอิง<br />
<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a> <img src="/assets/uploads/files/1720864150430-cyberman-3_000.png" alt="CyberMan 3_000.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/835/cisa-เผยแพร-ช-องโหว-ท-ถ-กใช-ประโยชน-3-รายการลงใน-catalog</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/835/cisa-เผยแพร-ช-องโหว-ท-ถ-กใช-ประโยชน-3-รายการลงใน-catalog</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Sat, 13 Jul 2024 09:50:36 GMT</pubDate></item><item><title><![CDATA[&#x27;RegreSSHion&#x27; ช่องโหว่ร้ายแรงใน OpenSSH เสี่ยงให้ระบบ Linux หลายล้านเครื่องถูกเข้ายึดครอง]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1719996751847-75cee9cc-b6fe-4ef5-9c56-122bb29e1443-image.png" alt="75cee9cc-b6fe-4ef5-9c56-122bb29e1443-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1719996777960-x27-regresshion-x27-%E0%B8%8A-%E0%B8%AD%E0%B8%87%E0%B9%82%E0%B8%AB%E0%B8%A7-%E0%B8%A3-%E0%B8%B2%E0%B8%A2%E0%B9%81%E0%B8%A3%E0%B8%87%E0%B9%83%E0%B8%99-openssh-%E0%B9%80%E0%B8%AA-%E0%B8%A2%E0%B8%87%E0%B9%83%E0%B8%AB-%E0%B8%A3%E0%B8%B0%E0%B8%9A%E0%B8%9A-linux.png" alt="'RegreSSHion' ช่องโหว่ร้ายแรงใน OpenSSH เสี่ยงให้ระบบ Linux.png" class=" img-fluid img-markdown" /><br />
<img src="/assets/uploads/files/1719996764779-ede49cd5-a7e2-46f0-8677-184877f214f0-image.png" alt="ede49cd5-a7e2-46f0-8677-184877f214f0-image.png" class=" img-fluid img-markdown" />  สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/803/regresshion-ช-องโหว-ร-ายแรงใน-openssh-เส-ยงให-ระบบ-linux-หลายล-านเคร-องถ-กเข-าย-ดครอง</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/803/regresshion-ช-องโหว-ร-ายแรงใน-openssh-เส-ยงให-ระบบ-linux-หลายล-านเคร-องถ-กเข-าย-ดครอง</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Wed, 03 Jul 2024 08:52:59 GMT</pubDate></item><item><title><![CDATA[Cyber Threat Intelligence 03 July 2024]]></title><description><![CDATA[<h5>Industrial Sector</h5>
<ul>
<li>
<p dir="auto"><strong>MySCADA MyPRO</strong><br />
"Successful exploitation of this vulnerability could allow an attacker to remotely execute code on the affected device."<br />
<a href="https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-02" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-02</a></p>
</li>
<li>
<p dir="auto"><strong>Johnson Controls Kantech Door Controllers</strong><br />
"Successful exploitation of this vulnerability could allow an attacker to gain access to sensitive information."<br />
<a href="https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-01" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-01</a></p>
</li>
<li>
<p dir="auto"><strong>ICONICS And Mitsubishi Electric Products</strong><br />
"Successful exploitation of these vulnerabilities could result in denial of service, improper privilege management, or potentially remote code execution."<br />
<a href="https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03</a></p>
</li>
</ul>
<h5>Vulnerabilities</h5>
<ul>
<li>
<p dir="auto"><strong>CISA Adds One Known Exploited Vulnerability To Catalog</strong><br />
"CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.<br />
CVE-2024-20399 Cisco NX-OS Command Injection Vulnerability"<br />
<a href="https://www.cisa.gov/news-events/alerts/2024/07/02/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.cisa.gov/news-events/alerts/2024/07/02/cisa-adds-one-known-exploited-vulnerability-catalog</a></p>
</li>
<li>
<p dir="auto"><strong>Securing Passkeys: Thwarting Authentication Method Redaction Attacks</strong><br />
"In the past year, the uptake of passkeys has surged, with industry giants such as Apple, Microsoft and Google championing their adoption. Joe Stewart, Principal Security Researcher with eSentire’s Threat Response Unit (TRU), has been reviewing many of the leading software providers’ implementation of passkey technology and their current “authentication process.”"<br />
<a href="https://www.esentire.com/blog/securing-passkeys-thwarting-authentication-method-redaction-attacks" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.esentire.com/blog/securing-passkeys-thwarting-authentication-method-redaction-attacks</a><br />
<a href="https://www.darkreading.com/cloud-security/passkey-redaction-attacks-subvert-github-microsoft-authentication" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cloud-security/passkey-redaction-attacks-subvert-github-microsoft-authentication</a></p>
</li>
<li>
<p dir="auto"><strong>Splunk Patches High-Severity Vulnerabilities In Enterprise Product</strong><br />
"Splunk on Monday announced patches for 16 vulnerabilities in Splunk Enterprise and Cloud Platform, including six high-severity bugs. Three of the high-severity issues are remote code execution flaws that require authentication for successful exploitation. The first of them, tracked as CVE-2024-36985, could be exploited by a low-privileged user through a lookup that likely references the ‘splunk_archiver’ application. The issue affects Splunk Enterprise versions 9.2.x, 9.1.x, and 9.0.x."<br />
<a href="https://www.securityweek.com/splunk-patches-high-severity-vulnerabilities-in-enterprise-product/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/splunk-patches-high-severity-vulnerabilities-in-enterprise-product/</a></p>
</li>
<li>
<p dir="auto"><strong>Google Patches 25 Android Flaws, Including Critical Privilege Escalation Bug</strong><br />
"Google has released patches for 25 documented security vulnerabilities in the Android operating system, including a critical-severity flaw in the Framework component. The critical bug, tracked as CVE-2024-31320, impacts Android versions 12 and 12L and allows an attacker to escalate privileges on a vulnerable device. “The most severe of these issues is a critical security vulnerability in the Framework component that could lead to local escalation of privilege with no additional execution privileges needed,” Google explains in an advisory."<br />
<a href="https://www.securityweek.com/google-patches-25-android-flaws-including-critical-privilege-escalation-bug/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/google-patches-25-android-flaws-including-critical-privilege-escalation-bug/</a></p>
</li>
</ul>
<h5>Malware</h5>
<ul>
<li><strong>Hijacked: How Hacked YouTube Channels Spread Scams And Malware</strong><br />
"As one of today’s most popular social media platforms, YouTube is often in the crosshairs of cybercriminals who exploit it to peddle scams and distribute malware. The lures run the gamut, but often involve videos posing as tutorials about popular software or ads for crypto giveaways. In other scenarios, fraudsters embed links to malicious websites in video descriptions or comments, disguising them as genuine resources related to the video’s content."<br />
<a href="https://www.welivesecurity.com/en/scams/hijacked-hacked-youtube-channels-scams-malware/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.welivesecurity.com/en/scams/hijacked-hacked-youtube-channels-scams-malware/</a></li>
</ul>
<h5>Breaches/Hacks/Leaks</h5>
<ul>
<li>
<p dir="auto"><strong>Patelco Shuts Down Banking Systems Following Ransomware Attack</strong><br />
"Patelco Credit Union has disclosed it experienced a ransomware attack that led to the proactive shutdown of several of its customer-facing banking systems to contain the incident's impact. Patelco is an American credit union with assets exceeding $9 billion. It offers a wide range of financial services, including checking and savings accounts, loans, credit cards, investment services, and insurance plans."<br />
<a href="https://www.bleepingcomputer.com/news/security/patelco-shuts-down-banking-systems-following-ransomware-attack/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/patelco-shuts-down-banking-systems-following-ransomware-attack/</a></p>
</li>
<li>
<p dir="auto"><strong>Affirm Says Cardholders Impacted By Evolve Bank Data Breach</strong><br />
"Buy now, pay later loan company Affirm is warning that holders of its payment cards had their personal information exposed due to a data breach at its third-party issuer, Evolve Bank &amp; Trust (Evolve). Affirm is a fintech firm that provides consumer-friendly alternatives to traditional credit options. It also offers point-of-sale financing, virtual cards on a mobile app, and a fully integrated physical card called the 'Affirm Card.'"<br />
<a href="https://www.bleepingcomputer.com/news/security/affirm-says-cardholders-impacted-by-evolve-bank-data-breach/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/affirm-says-cardholders-impacted-by-evolve-bank-data-breach/</a><br />
<a href="https://therecord.media/affirm-lender-data-breach-evolve-bank-cyberattack" target="_blank" rel="noopener noreferrer nofollow ugc">https://therecord.media/affirm-lender-data-breach-evolve-bank-cyberattack</a><br />
<a href="https://techcrunch.com/2024/07/01/fintech-company-wise-says-some-customers-affected-by-evolve-bank-data-breach/" target="_blank" rel="noopener noreferrer nofollow ugc">https://techcrunch.com/2024/07/01/fintech-company-wise-says-some-customers-affected-by-evolve-bank-data-breach/</a><br />
<a href="https://www.darkreading.com/cyberattacks-data-breaches/fintech-frenzy-affirm-and-others-emerge-as-victims-in-evolve-breach" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cyberattacks-data-breaches/fintech-frenzy-affirm-and-others-emerge-as-victims-in-evolve-breach</a><br />
<a href="https://www.bankinfosecurity.com/evolve-ransomware-hack-affects-affirm-fintech-companies-a-25680" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bankinfosecurity.com/evolve-ransomware-hack-affects-affirm-fintech-companies-a-25680</a><br />
<a href="https://www.securityweek.com/evolve-bank-shares-data-breach-details-as-fintech-firms-report-being-hit/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/evolve-bank-shares-data-breach-details-as-fintech-firms-report-being-hit/</a><br />
<a href="https://securityaffairs.com/165130/cyber-crime/evolve-bank-data-breach-impacted-wise-affirm.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityaffairs.com/165130/cyber-crime/evolve-bank-data-breach-impacted-wise-affirm.html</a><br />
<a href="https://www.theregister.com/2024/07/02/affirm_evolve_ransomware_breach/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.theregister.com/2024/07/02/affirm_evolve_ransomware_breach/</a></p>
</li>
</ul>
<h5>General News</h5>
<ul>
<li>
<p dir="auto"><strong>The Impossibility Of “getting Ahead” In Cyber Defense</strong><br />
"As a security professional, it can be tempting to believe that with sufficient resources we can achieve of state of parity, or even relative dominance, over cyber attackers. After all, if we got to an ideal state – fully staffed teams of highly capable experts, enough funding to buy the best defensive tools, and a fully mature defensive operation – why wouldn’t we be able to get to an ideal “secure” state? It seems reasonable enough."<br />
<a href="https://www.helpnetsecurity.com/2024/07/02/getting-ahead-resilience/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/07/02/getting-ahead-resilience/</a></p>
</li>
<li>
<p dir="auto"><strong>Stress-Testing Our Security Assumptions In a World Of New &amp; Novel Risks</strong><br />
"Categorizing and stress-testing fundamental assumptions is a necessary exercise for any leader interested in ensuring long-term security and resilience in the face of an uncertain future."<br />
<a href="https://www.darkreading.com/vulnerabilities-threats/stress-testing-our-security-assumptions-new-novel-risks" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/vulnerabilities-threats/stress-testing-our-security-assumptions-new-novel-risks</a></p>
</li>
<li>
<p dir="auto"><strong>What Cybersecurity Defense Looks Like For School Districts</strong><br />
"Dark Reading chats with Johnathan Kim, director of technology at the Woodland Hills School District in North Braddock, Penn., about why cybercriminals target schools — and what they can do about it."<br />
<a href="https://www.darkreading.com/cybersecurity-operations/what-cybersecurity-defense-looks-like-for-school-districts" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cybersecurity-operations/what-cybersecurity-defense-looks-like-for-school-districts</a></p>
</li>
<li>
<p dir="auto"><strong>Ransomware Attack Demands Reach a Staggering $5.2m In 2024</strong><br />
"The average extortion demand per ransomware attack was over $5.2m (£4.1m) in the first half of 2024, according to a new analysis by Comparitech. This figure was calculated from 56 known ransom demands issued by threat actors from January-June 2024. The biggest of these was a $100m (£78.9m) ransom following an attack on India’s Regional Cancer Center (RCC) in April 2024."<br />
<a href="https://www.infosecurity-magazine.com/news/ransomware-demands-staggering-5m/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/ransomware-demands-staggering-5m/</a></p>
</li>
<li>
<p dir="auto"><strong>Election 2024 Mobile Political Spam Volume Jumps 3X Compared With 2022 Midterms</strong><br />
"U.S. voters’ appetite for digital information about the 2024 presidential election is growing. But as they consume news via digital media, including from mobile messaging channels, they must keep in mind that cybercriminals may be impersonating the sources that they trust."<br />
<a href="https://www.proofpoint.com/us/blog/email-and-cloud-threats/election-2024-mobile-political-spam-volume-jumps-3x-compared-2022" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.proofpoint.com/us/blog/email-and-cloud-threats/election-2024-mobile-political-spam-volume-jumps-3x-compared-2022</a><br />
<a href="https://www.infosecurity-magazine.com/news/political-spam-surges-threefold/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/political-spam-surges-threefold/</a></p>
</li>
<li>
<p dir="auto"><strong>It All Adds Up: Pretexting In Executive Compromise</strong><br />
"Executives hold the keys to the corporate kingdom. If attackers can gain the trust of executives using layered social engineering techniques, they may be able to access sensitive corporate information such as intellectual property, financial data or administrative control logins and passwords."<br />
<a href="https://securityintelligence.com/articles/pretexting-in-executive-compromise-social-engineering/" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityintelligence.com/articles/pretexting-in-executive-compromise-social-engineering/</a></p>
</li>
<li>
<p dir="auto"><strong>From The SOC To Everyday Success: Data-Driven Life Lessons From a Security Analyst</strong><br />
"Many of you have likely noticed that I enjoy looking for life lessons in the real-world that we can apply to the challenges we face in the security domain. In this piece, I’d like to take the opposite approach. I’d like to try and take the lessons I learned during my time as a security analyst working in various Security Operations Centers (SOCs) and apply them to life. My reason for this is simple. I believe that as security professionals, the healthier and happier we are, the better able we are to protect our respective organizations."<br />
<a href="https://www.securityweek.com/from-the-soc-to-everyday-success-data-driven-life-lessons-from-a-security-analyst/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/from-the-soc-to-everyday-success-data-driven-life-lessons-from-a-security-analyst/</a></p>
</li>
<li>
<p dir="auto"><strong>Caught In The Net: Using Infostealer Logs To Unmask CSAM Consumers</strong><br />
"In this proof-of-concept report, Recorded Future's Identity Intelligence analyzed infostealer malware data to identify consumers of child sexual abuse material (CSAM). Approximately 3,300 unique users were found with accounts on known CSAM sources. A notable 4.2% had credentials for multiple sources, suggesting a higher likelihood of criminal behavior. The study reveals how infostealer logs can aid investigators in tracking CSAM activities on the dark web. Data was escalated to law enforcement for further action."<br />
<a href="https://www.recordedfuture.com/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.recordedfuture.com/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers</a><br />
<a href="https://go.recordedfuture.com/hubfs/reports/cta-2024-0702.pdf" target="_blank" rel="noopener noreferrer nofollow ugc">https://go.recordedfuture.com/hubfs/reports/cta-2024-0702.pdf</a><br />
<a href="https://therecord.media/stolen-credentials-csam-unmasked-report" target="_blank" rel="noopener noreferrer nofollow ugc">https://therecord.media/stolen-credentials-csam-unmasked-report</a></p>
</li>
<li>
<p dir="auto"><strong>3 Ways To Chill Attacks On Snowflake</strong><br />
"Multifactor authentication is a good first step, but businesses should look to collect and analyze data to hunt for threats, manage identities more closely, and limit the impact of attacks."<br />
<a href="https://www.darkreading.com/cybersecurity-operations/three-ways-to-chill-attacks-on-snowflake" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cybersecurity-operations/three-ways-to-chill-attacks-on-snowflake</a></p>
</li>
</ul>
<p dir="auto"><strong>อ้างอิง</strong><br />
<strong>Electronic Transactions Development Agency(ETDA)</strong> <img src="/assets/uploads/files/1719979290730-5c3c9eed-0fcd-4736-934a-ab3af1715b71-image.png" alt="5c3c9eed-0fcd-4736-934a-ab3af1715b71-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/802/cyber-threat-intelligence-03-july-2024</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/802/cyber-threat-intelligence-03-july-2024</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Wed, 03 Jul 2024 04:08:30 GMT</pubDate></item><item><title><![CDATA[ช่องโหว่ที่สำคัญในโมดูล Facebook PrestaShop]]></title><description><![CDATA[<p dir="auto">Cyber Security Agency of Singapore (CSA)ได้เผยแพร่เกี่ยวกับนักวิจัยด้านความปลอดภัยได้เปิดเผยช่องโหว่ร้ายแรง ที่หมายเลข CVE-2024-36680 ที่เกี่ยวข้องกับโมดูล Facebook ระดับพรีเมียมสำหรับ PrestaShop ชื่อ pkfacebook ช่องโหว่ดังกล่าวมีคะแนน CVSSv 9.8 รหัสการหาประโยชน์แบบพิสูจน์แนวคิดที่กำหนดเป้าหมายไปที่ช่องโหว่นี้เปิดเผยต่อสาธารณะและมีรายงานว่ามีการใช้ประโยชน์อย่างแข็งขันเพื่อปรับใช้เว็บสกิมเมอร์ ซึ่งออกแบบมาเพื่อขโมย ข้อมูลบัตรเครดิตจากลูกค้าที่ไม่สงสัย</p>
<p dir="auto">การใช้ประโยชน์จากช่องโหว่การแทรก SQL ในสคริปต์ facebookConnect.php Ajax ของ pkfacebook ช่วยให้ผู้โจมตีจากระยะไกลสามารถปลอมแปลงการโจมตีการแทรก SQL และเข้าถึงฐานข้อมูล PrestaShop ที่เกี่ยวข้องโดยไม่ได้รับอนุญาต ซึ่งช่องโหว่นี้มีผลกับทุกเวอร์ชันก่อนหน้า 1.0.1 เนื่องจากทุกเวอร์ชันได้รับการพิจารณาว่าอาจได้รับผลกระทบ เราขอแนะนำให้ผู้ใช้และผู้ดูแลระบบของเว็บไซต์ PrestaShop</p>
<p dir="auto">แนะนำอัปเดตเป็น pkfacebook เวอร์ชันล่าสุด ซึ่งจะปิดใช้งานการดำเนินการหลายคำค้นหาตรวจสอบให้แน่ใจว่า  มีการใช้ pSQL  เพื่อหลีกเลี่ยงช่องโหว่ Stored XSS เนื่องจากมีฟังก์ชัน strip_tags เพื่อเพิ่มความปลอดภัยแก้ไขคำนำหน้า " ps_ " เริ่มต้นให้ยาวขึ้นตามต้องการเพื่อปรับปรุงความปลอดภัยเปิดใช้งาน  กฎ OWASP 942  บน Web Application Firewall (WAF)</p>
<p dir="auto"><strong>อ้างอิง</strong><br />
<a href="https://www.csa.gov.sg/alerts-advisories/alerts/2024/al-2024-074" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.csa.gov.sg/alerts-advisories/alerts/2024/al-2024-074</a></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1719224959898-2ee2b0b1-b35b-4b59-ac38-ae626bbd90a5-image.png" alt="2ee2b0b1-b35b-4b59-ac38-ae626bbd90a5-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/782/ช-องโหว-ท-สำค-ญในโมด-ล-facebook-prestashop</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/782/ช-องโหว-ท-สำค-ญในโมด-ล-facebook-prestashop</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Mon, 24 Jun 2024 10:31:45 GMT</pubDate></item><item><title><![CDATA[NiceRAT Malware Targets South Korean Users via Cracked Software]]></title><description><![CDATA[<p dir="auto">Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into a botnet. The attacks, which target South Korean users, are designed to propagate the malware under the guise of cracked software, such as Microsoft Windows, or tools that purport to offer license verification for Microsoft Office. "Due to the nature of crack programs, information sharing amongst ordinary users contributes to the malware's distribution independently from the initial distributor," the AhnLab Security Intelligence Center (ASEC) said. "Because threat actors typically explain ways to remove anti-malware programs during the distribution phase, it is difficult to detect the distributed malware." Alternate distribution vectors involve the use of a botnet comprising zombie computers that are infiltrated by a remote access trojan (RAT) known as NanoCore RAT, mirroring prior activity that leveraged the Nitol DDoS malware for propagating another malware dubbed Amadey Bot. NiceRAT is an actively developed open-source RAT and stealer malware written in Python that uses a Discord Webhook for command-and-control (C2), allowing the threat actors to siphon sensitive information from the compromised host. First released on April 17, 2024, the current version of the program is 1.1.0. It's also available as a premium version, according to its developer, suggesting that it's advertised under the malware-as-a-service (MaaS) model. The development comes amid the return of a cryptocurrency mining botnet referred to as Bondnet, which has been detected using the high-performance miner bots as C2 servers since 2023 by configuring a reverse proxy using a modified version of a legitimate tool called Fast Reverse Proxy (FRP).</p>
<p dir="auto"><strong>ที่มาแหล่งข่าว</strong><br />
<a href="https://thehackernews.com/2024/06/nicerat-malware-targets-south-korean.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/06/nicerat-malware-targets-south-korean.html</a></p>
<p dir="auto"><img src="/assets/uploads/files/1718681458674-f637da37-bca9-4d72-b7da-9601096028b1-image.png" alt="f637da37-bca9-4d72-b7da-9601096028b1-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/766/nicerat-malware-targets-south-korean-users-via-cracked-software</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/766/nicerat-malware-targets-south-korean-users-via-cracked-software</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 18 Jun 2024 03:31:32 GMT</pubDate></item><item><title><![CDATA[Cyber Threat Intelligence 18 June 2024]]></title><description><![CDATA[<h5>Vulnerabilities</h5>
<ul>
<li><strong>New ARM 'TIKTAG' Attack Impacts Google Chrome, Linux Systems</strong><br />
"A new speculative execution attack named "TIKTAG" targets ARM's Memory Tagging Extension (MTE) to leak data with over a 95% chance of success, allowing hackers to bypass the security feature. The paper, co-signed by a team of Korean researchers from Samsung, Seoul National University, and the Georgia Institute of Technology, demonstrates the attack against Google Chrome and the Linux kernel. MTE is a feature added in the ARM v8.5-A architecture (and later), designed to detect and prevent memory corruption."<br />
<a href="https://www.bleepingcomputer.com/news/security/new-arm-tiktag-attack-impacts-google-chrome-linux-systems/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/new-arm-tiktag-attack-impacts-google-chrome-linux-systems/</a><br />
<a href="https://arxiv.org/pdf/2406.08719" target="_blank" rel="noopener noreferrer nofollow ugc">https://arxiv.org/pdf/2406.08719</a><br />
<a href="https://www.theregister.com/2024/06/18/arm_memory_tag_extensions_leak/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.theregister.com/2024/06/18/arm_memory_tag_extensions_leak/</a></li>
</ul>
<h5>Malware</h5>
<ul>
<li>
<p dir="auto"><strong>Malicious Emails Trick Consumers Into False Election Contributions</strong><br />
"Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove cyber threat activities, according to Trellix."<br />
<a href="https://www.helpnetsecurity.com/2024/06/17/global-cyber-threat-activities/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/06/17/global-cyber-threat-activities/</a></p>
</li>
<li>
<p dir="auto"><strong>Backdoor BadSpace Delivered By High-Ranking Infected Websites</strong><br />
"Imagine visiting your favorite website with the same address that you always use and it tells you that your browser needs an update. After downloading and executing the update, there's an unwelcome surprise: the BadSpace backdoor. What is this new threat capable of, and how is it eerily similar to a warm cookie?"<br />
<a href="https://www.gdatasoftware.com/blog/2024/06/37947-badspace-backdoor" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.gdatasoftware.com/blog/2024/06/37947-badspace-backdoor</a><br />
<a href="https://thehackernews.com/2024/06/hackers-exploit-legitimate-websites-to.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/06/hackers-exploit-legitimate-websites-to.html</a></p>
</li>
<li>
<p dir="auto"><strong>From Clipboard To Compromise: A PowerShell Self-Pwn</strong><br />
"Proofpoint has observed an increase in a technique leveraging unique social engineering that directs users to copy and paste malicious PowerShell scripts to infect their computers with malware. Threat actors including initial access broker TA571 and at least one fake update activity set are using this method to deliver malware including DarkGate, Matanbuchus, NetSupport, and various information stealers."<br />
<a href="https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn</a><br />
<a href="https://www.bleepingcomputer.com/news/security/fake-google-chrome-errors-trick-you-into-running-malicious-powershell-scripts/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/fake-google-chrome-errors-trick-you-into-running-malicious-powershell-scripts/</a><br />
<a href="https://www.helpnetsecurity.com/2024/06/17/social-engineering-malware-installation/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/06/17/social-engineering-malware-installation/</a></p>
</li>
<li>
<p dir="auto"><strong>China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers For Persistence</strong><br />
"In late 2023, a large organization was the victim of a serious cyber attack. Sygnia’s forensic investigation into the attack revealed a sophisticated threat actor who exhibited robust capabilities and employed a methodical approach. The evidence gathered suggests the involvement of a China-nexus state-sponsored threat actor."<br />
<a href="https://www.sygnia.co/blog/china-nexus-threat-group-velvet-ant/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.sygnia.co/blog/china-nexus-threat-group-velvet-ant/</a><br />
<a href="https://www.bleepingcomputer.com/news/security/hackers-use-f5-big-ip-malware-to-stealthily-steal-data-for-years/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/hackers-use-f5-big-ip-malware-to-stealthily-steal-data-for-years/</a><br />
<a href="https://thehackernews.com/2024/06/china-linked-hackers-infiltrate-east.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/06/china-linked-hackers-infiltrate-east.html</a><br />
<a href="https://www.darkreading.com/cyberattacks-data-breaches/china-velvet-ant-apt-multiyear-espionage" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cyberattacks-data-breaches/china-velvet-ant-apt-multiyear-espionage</a><br />
<a href="https://securityaffairs.com/164598/apt/velvet-ant-malware-target-f5-big-ip.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityaffairs.com/164598/apt/velvet-ant-malware-target-f5-big-ip.html</a></p>
</li>
</ul>
<h5>Breaches/Hacks/Leaks</h5>
<ul>
<li><strong>Los Angeles Public Health Department Discloses Large Data Breach</strong><br />
"Los Angeles County Department of Public Health (DPH) has disclosed a data breach impacting more than 200,000 individuals. The data stolen includes personal, medical and financial information. The incident, which took place between February 19 and 20, 2024, was caused by an attacker gaining the log-in credentials of 53 Public Health employees through a phishing email."<br />
<a href="https://www.infosecurity-magazine.com/news/los-angeles-health-data-breach/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/los-angeles-health-data-breach/</a><br />
<a href="https://www.darkreading.com/remote-workforce/la-county-dept-of-public-health-data-breach-impacts-200k" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/remote-workforce/la-county-dept-of-public-health-data-breach-impacts-200k</a><br />
<a href="https://securityaffairs.com/164585/data-breach/la-countys-department-of-public-health-dph-data-breach.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityaffairs.com/164585/data-breach/la-countys-department-of-public-health-dph-data-breach.html</a><br />
<a href="https://www.securityweek.com/200000-impacted-by-data-breach-at-los-angeles-county-public-health-agency/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/200000-impacted-by-data-breach-at-los-angeles-county-public-health-agency/</a></li>
</ul>
<h5>General News</h5>
<ul>
<li>
<p dir="auto"><strong>Low Code, High Stakes: Addressing SQL Injection</strong><br />
"Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s. Due to various factors, they remain the third most common source of web application vulnerabilities. Reasons include human error, new technologies that lack mature code, and a growing use of open-source code that diminishes control for developers."<br />
<a href="https://www.helpnetsecurity.com/2024/06/17/sqli-attacks/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/06/17/sqli-attacks/</a></p>
</li>
<li>
<p dir="auto"><strong>The Rise Of SaaS Security Teams</strong><br />
"In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge in organizations establishing dedicated SaaS security teams is driven by significant data breaches involving widely used platforms."<br />
<a href="https://www.helpnetsecurity.com/2024/06/17/hillary-baron-csa-saas-security-teams/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/06/17/hillary-baron-csa-saas-security-teams/</a></p>
</li>
<li>
<p dir="auto"><strong>Empire Market Owners Charged For Enabling $430M In Dark Web Transactions</strong><br />
"Two men have been charged in a Chicago federal court for operating "Empire Market," a dark web marketplace that facilitated over $430 million in illegal transactions between February 2018 and August 2020. Empire Market was a popular dark web marketplace that sold illegal drugs, chemicals, jewelry, credit card numbers, counterfeit money bills, malware, and other illicit goods, offering payment options including Monero, Litecoin, and Bitcoin."<br />
<a href="https://www.bleepingcomputer.com/news/legal/empire-market-owners-charged-for-enabling-430m-in-dark-web-transactions/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/legal/empire-market-owners-charged-for-enabling-430m-in-dark-web-transactions/</a><br />
<a href="https://therecord.media/empire-market-suspects-charged-potential-life-sentences" target="_blank" rel="noopener noreferrer nofollow ugc">https://therecord.media/empire-market-suspects-charged-potential-life-sentences</a><br />
<a href="https://securityaffairs.com/164619/deep-web/empire-market-owners-charged.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityaffairs.com/164619/deep-web/empire-market-owners-charged.html</a><br />
<a href="https://www.theregister.com/2024/06/17/empire_market_arrests/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.theregister.com/2024/06/17/empire_market_arrests/</a></p>
</li>
<li>
<p dir="auto"><strong>Hackers Plead Guilty After Breaching Law Enforcement Portal</strong><br />
"Two hackers pleaded guilty Monday in federal court to conspiring to commit computer intrusion and aggravated identity theft. Authorities said they used a law enforcement officer's stolen password to gain unauthorized access to a nonpublic portal maintained by a U.S. law enforcement agency, according to the Justice Department."<br />
<a href="https://www.bankinfosecurity.com/hackers-plead-guilty-after-breaching-law-enforcement-portal-a-25544" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bankinfosecurity.com/hackers-plead-guilty-after-breaching-law-enforcement-portal-a-25544</a></p>
</li>
<li>
<p dir="auto"><strong>Ratted Out: Group-IB Contributes To Operation DISTANTHILL Leading To The Arrest Of 16 Cybercriminals Behind The Android Remote Access Trojan Campaigns Resulting In Over US$25 Million In Financial Losses Across Southeast Asia</strong><br />
"Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today that it contributed to a joint operation by the Singapore Police Force (SPF), the Hong Kong Police Force (HKPF) and the Royal Malaysia Police (RMP). Dubbed “Operation DISTANTHILL”, it culminated in the arrest of the cyber fraud syndicates that were responsible for an Android Remote Access Trojan (RAT) campaign which gained notoriety in Singapore and Hong Kong in 2023. In the lead-up to the operation, Group-IB spent months collecting and analysing the data derived from the Android trojans, uncovering the scale of the cybercriminals network used for attacks and its administrators."<br />
<a href="https://www.group-ib.com/media-center/press-releases/operation-distanthill/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.group-ib.com/media-center/press-releases/operation-distanthill/</a><br />
<a href="https://www.bankinfosecurity.com/police-dismantle-asian-crime-ring-behind-25m-android-fraud-a-25541" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bankinfosecurity.com/police-dismantle-asian-crime-ring-behind-25m-android-fraud-a-25541</a></p>
</li>
<li>
<p dir="auto"><strong>Addressing Misinformation In Critical Infrastructure Security</strong><br />
"The Francis Scott Key Bridge collapse in Baltimore, Md., in late March sent shockwaves through the country. Almost immediately, there was widespread speculation and conspiracy theories regarding its cause, including fears of a cyberattack. Although investigations ruled out deliberate sabotage, the incident raised public concern about the vulnerability of physical infrastructure."<br />
<a href="https://www.darkreading.com/cyber-risk/addressing-misinformation-in-critical-infrastructure-security" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cyber-risk/addressing-misinformation-in-critical-infrastructure-security</a></p>
</li>
<li>
<p dir="auto"><strong>Space: The Final Frontier For Cyberattacks</strong><br />
"A failure to imagine — and prepare for — threats to outer-space related assets could be a huge mistake at a time when nation-states and private companies are rushing to deploy devices in a frantic new space race."<br />
<a href="https://www.darkreading.com/cyber-risk/space-final-frontier-cyberattacks" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cyber-risk/space-final-frontier-cyberattacks</a></p>
</li>
<li>
<p dir="auto"><strong>Academics Develop Testing Benchmark For LLMs In Cyber Threat Intelligence</strong><br />
"Large language models (LLMs) are increasingly used for cyber defense applications, although concerns about their reliability and accuracy remain a significant limitation in critical use cases. A team of researchers from the Rochester Institute of Technology (RIT) launched CTIBench, the first benchmark designed to assess the performance of LLMs in cyber threat intelligence applications."<br />
<a href="https://www.infosecurity-magazine.com/news/testing-benchmark-llm-cyber-threat/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/testing-benchmark-llm-cyber-threat/</a></p>
</li>
<li>
<p dir="auto"><strong>Online Job Offers, The Reshipping And Money Mule Scams</strong><br />
"Often, behind these enticing offers are pyramid schemes in which profits are generated through the recruitment of new participants, rather than through actual service, sometimes even causing significant financial losses. Other false offers may require initial investment without ever seeing a significant return or promise job opportunities with hidden fees. t is into this scenario that illicit practices such as moneny mules and reshipping scams can fit."<br />
<a href="https://securityaffairs.com/164566/security/online-job-offers-reshipping-money-mule-scams.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityaffairs.com/164566/security/online-job-offers-reshipping-money-mule-scams.html</a></p>
</li>
</ul>
<p dir="auto"><strong>อ้างอิง</strong><br />
<strong>Electronic Transactions Development Agency(ETDA)</strong>  <img src="/assets/uploads/files/1718681246721-e0e22acd-d269-48b4-bd25-4ea33e4092f8-image.png" alt="e0e22acd-d269-48b4-bd25-4ea33e4092f8-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/765/cyber-threat-intelligence-18-june-2024</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/765/cyber-threat-intelligence-18-june-2024</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 18 Jun 2024 03:27:29 GMT</pubDate></item><item><title><![CDATA[Microsoft ประกาศเลิกใช้ NTLM Authentication บน Windows]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1718362094989-92ef1230-760b-4fd0-ae4c-5bd6582f4251-image.png" alt="92ef1230-760b-4fd0-ae4c-5bd6582f4251-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1718362124817-microsoft-%E0%B8%9B%E0%B8%A3%E0%B8%B0%E0%B8%81%E0%B8%B2%E0%B8%A8%E0%B9%80%E0%B8%A5-%E0%B8%81%E0%B9%83%E0%B8%8A-ntlm-authentication-%E0%B8%9A%E0%B8%99-windows.png" alt="Microsoft ประกาศเลิกใช้ NTLM Authentication บน Windows.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1718362115785-31fd41f9-5ab1-4619-acc7-fe4b5bdbfb27-image.png" alt="31fd41f9-5ab1-4619-acc7-fe4b5bdbfb27-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/764/microsoft-ประกาศเล-กใช-ntlm-authentication-บน-windows</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/764/microsoft-ประกาศเล-กใช-ntlm-authentication-บน-windows</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Fri, 14 Jun 2024 10:48:47 GMT</pubDate></item><item><title><![CDATA[City of Cleveland Shuts Down IT Systems After Cyberattack]]></title><description><![CDATA[<p dir="auto">The City of Cleveland, Ohio, is currently dealing with a cyberattack that has forced it to take citizen-facing services offline, including the public offices and facilities at Erieview and the City Hall. With a metropolitan area population of over 2 million people, Cleveland is a vital healthcare, manufacturing, finance, logistics, education, and technological hub and the most significant economic center in Ohio. The disruption was first disclosed yesterday when the City's authorities warned that public services were reduced to essential operations due to a cyber incident. A status update provided earlier today via a thread on X explains that the incident is still being investigated with the help of third-party experts. At the same time, the City Hall and Erieview will remain closed for a second day. The investigation so far has confirmed that taxpayer information held by the CAA and custom information held by public utility services was not accessed by the hackers. The update also notes that essential services concerning emergency services (911, police, fire), works, utilities, healthcare (EMS), and airport travel (Cleveland Hopkins and Burke Lakefront) have not been impacted by the cyber incident. The City's authorities promised to provide updates as soon as the ongoing investigation produced results, and concerned citizens are advised to call 311 for more information. At the time of writing, no ransomware groups have claimed responsibility for the attack on the City of Cleveland, and it is unclear what exactly has happened. Local media reported that Mayor Justin Bibb referred to the incident as a breach, while the City's IT commissioner, Kim Roy Wilson, stated that they had detected abnormal activity in the City's IT environment. Wilson told the media that it's essential to withhold details at this point so as not to risk hampering the ongoing investigation. The commissioner also stated that citizens needing critical documents or other services from impacted departments must be patient.</p>
<p dir="auto"><strong>ที่มาแหล่งข่าว</strong><br />
<a href="https://www.bleepingcomputer.com/news/security/london-hospitals-face-blood-shortage-after-synnovis-ransomware-attack/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/london-hospitals-face-blood-shortage-after-synnovis-ransomware-attack/</a></p>
<p dir="auto"><img src="/assets/uploads/files/1718273495466-970e906e-5e7e-4356-99a3-967c48b3e1d5-image.png" alt="970e906e-5e7e-4356-99a3-967c48b3e1d5-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/759/city-of-cleveland-shuts-down-it-systems-after-cyberattack</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/759/city-of-cleveland-shuts-down-it-systems-after-cyberattack</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 13 Jun 2024 10:12:05 GMT</pubDate></item><item><title><![CDATA[Cyber Threat Intelligence 13 June 2024]]></title><description><![CDATA[<h5>Industrial Sector</h5>
<ul>
<li>
<p dir="auto"><strong>ICS Patch Tuesday: Advisories Published By Siemens, Schneider Electric, Aveva, CISA</strong><br />
"Several ICS vendors released advisories on Tuesday to inform customers about vulnerabilities found in their industrial and OT products."<br />
<a href="https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-siemens-schneider-electric-aveva-cisa/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-siemens-schneider-electric-aveva-cisa/</a></p>
</li>
<li>
<p dir="auto"><strong>NIST Publishes Draft OT Cybersecurity Guide For Water Sector</strong><br />
"Networked control systems in municipal water systems are inescapable even for the localities that would prefer otherwise. New equipment with default remote access and an over-stretched repair workforce mean cutting off municipal water systems from the internet isn't a real option."<br />
<a href="https://www.bankinfosecurity.com/nist-publishes-draft-ot-cybersecurity-guide-for-water-sector-a-25505" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bankinfosecurity.com/nist-publishes-draft-ot-cybersecurity-guide-for-water-sector-a-25505</a><br />
<a href="https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/external/securing-water-and-wastewater-utilities-project-description-final.pdf" target="_blank" rel="noopener noreferrer nofollow ugc">https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/external/securing-water-and-wastewater-utilities-project-description-final.pdf</a></p>
</li>
<li>
<p dir="auto"><strong>Rockwell's ICS Directive Comes As Critical Infrastructure Risk Peaks</strong><br />
"Citing "heightened geopolitical tensions and adversarial cyber activity globally," industrial control systems (ICS) giant Rockwell Automation last month took the unusual step of telling its customers to disconnect their gear from the Internet. The move showcases not just growing cyber risk to critical infrastructure, but the unique challenges that security teams face in the sector, experts say."<br />
<a href="https://www.darkreading.com/ics-ot-security/rockwell-ics-directive-critical-infrastructure-risk-peaks" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/ics-ot-security/rockwell-ics-directive-critical-infrastructure-risk-peaks</a></p>
</li>
</ul>
<h5>Vulnerabilities</h5>
<ul>
<li>
<p dir="auto"><strong>Google Warns Of Actively Exploited Pixel Firmware Zero-Day</strong><br />
"Google has released patches for 50 security vulnerabilities impacting its Pixel devices and warned that one of them had already been exploited in targeted attacks as a zero-day. Tracked as CVE-2024-32896, this elevation of privilege (EoP) flaw in the Pixel firmware has been rated a high-severity security issue. "There are indications that CVE-2024-32896 may be under limited, targeted exploitation," the company warned this Tuesday."<br />
<a href="https://www.bleepingcomputer.com/news/security/google-warns-of-actively-exploited-pixel-firmware-zero-day/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/google-warns-of-actively-exploited-pixel-firmware-zero-day/</a><br />
<a href="https://source.android.com/docs/security/bulletin/pixel/2024-06-01" target="_blank" rel="noopener noreferrer nofollow ugc">https://source.android.com/docs/security/bulletin/pixel/2024-06-01</a><br />
<a href="https://www.securityweek.com/google-warns-of-pixel-firmware-zero-day-under-limited-targeted-exploitation/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/google-warns-of-pixel-firmware-zero-day-under-limited-targeted-exploitation/</a></p>
</li>
<li>
<p dir="auto"><strong>Chrome 126, Firefox 127 Patch High-Severity Vulnerabilities</strong><br />
"Google and Mozilla on Tuesday announced the release of Chrome 126 and Firefox 127 to the stable channel with patches for multiple high-severity memory safety vulnerabilities. Chrome 126 includes 21 security fixes, including 18 for defects reported by external researchers. The reporting researchers, Google notes in its advisory, received over $160,000 in bug bounty rewards for their findings."<br />
<a href="https://www.securityweek.com/chrome-126-firefox-127-patch-high-severity-vulnerabilities/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/chrome-126-firefox-127-patch-high-severity-vulnerabilities/</a></p>
</li>
<li>
<p dir="auto"><strong>CISA Adds Two Known Exploited Vulnerabilities To Catalog</strong><br />
"CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.<br />
CVE-2024-4610 ARM Mali GPU Kernel Driver Use-After-Free Vulnerability<br />
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability"<br />
<a href="https://www.cisa.gov/news-events/alerts/2024/06/12/cisa-adds-two-known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.cisa.gov/news-events/alerts/2024/06/12/cisa-adds-two-known-exploited-vulnerabilities-catalog</a><br />
<a href="https://securityaffairs.com/164488/hacking/cisa-adds-arm-mali-gpu-kernel-driver-php-bugs-to-its-known-exploited-vulnerabilities-catalog.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityaffairs.com/164488/hacking/cisa-adds-arm-mali-gpu-kernel-driver-php-bugs-to-its-known-exploited-vulnerabilities-catalog.html</a></p>
</li>
</ul>
<h5>Malware</h5>
<ul>
<li>
<p dir="auto"><strong>Attacks Against Linux SSH Services Detected By AhnLab EDR</strong><br />
"Secure SHell (SSH) is a standard protocol for secure terminal connections and is generally used for controlling remote Linux systems. Unlike Windows OS that individual users use for desktops, Linux systems mainly fulfill the role of servers providing web, database, FTP, DNS, and other services. Of course, Windows also supports these services as a server."<br />
<a href="https://asec.ahnlab.com/en/66695/" target="_blank" rel="noopener noreferrer nofollow ugc">https://asec.ahnlab.com/en/66695/</a></p>
</li>
<li>
<p dir="auto"><strong>Bondnet Using Miner Bots As C2</strong><br />
"Bondnet first became known to the public in an analysis report published by GuardiCore in 20171 and Bondnet’s backdoor was covered in an analysis report on XMRig miner targeting SQL servers released by DFIR Report in 20222. There has not been any information on the Bondnet threat actor’s activities thereon, but it was confirmed that they had continued their attacks until recent times."<br />
<a href="https://asec.ahnlab.com/en/66662/" target="_blank" rel="noopener noreferrer nofollow ugc">https://asec.ahnlab.com/en/66662/</a></p>
</li>
<li>
<p dir="auto"><strong>Phone Scammers Impersonating CISA Employees</strong><br />
"Impersonation scams are on the rise and often use the names and titles of government employees. The Cybersecurity and Infrastructure Security Agency (CISA) is aware of recent impersonation scammers claiming to represent the agency. As a reminder, CISA staff will never contact you with a request to wire money, cash, cryptocurrency, or use gift cards and will never instruct you to keep the discussion secret."<br />
<a href="https://www.cisa.gov/news-events/alerts/2024/06/12/phone-scammers-impersonating-cisa-employees" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.cisa.gov/news-events/alerts/2024/06/12/phone-scammers-impersonating-cisa-employees</a><br />
<a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-criminals-impersonating-its-employees-in-phone-calls/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/cisa-warns-of-criminals-impersonating-its-employees-in-phone-calls/</a><br />
<a href="https://www.bankinfosecurity.com/fraudsters-impersonate-cisa-in-money-scams-a-25501" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bankinfosecurity.com/fraudsters-impersonate-cisa-in-money-scams-a-25501</a></p>
</li>
<li>
<p dir="auto"><strong>New Phishing Toolkit Uses PWAs To Steal Login Credentials</strong><br />
"A new phishing kit has been released that allows red teamers and cybercriminals to create progressive web Apps (PWAs) that display convincing corporate login forms to steal credentials. A PWA is a web-based app created using HTML, CSS, and JavaScript that can be installed from a website like a regular desktop application. Once installed, the operating system will create a PWA shortcut and add it to Add or Remove Programs in Windows and under the /Users//Applications/ folder in macOS."<br />
<a href="https://www.bleepingcomputer.com/news/security/new-phishing-toolkit-uses-pwas-to-steal-login-credentials/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/new-phishing-toolkit-uses-pwas-to-steal-login-credentials/</a></p>
</li>
<li>
<p dir="auto"><strong>Ransomware Attackers May Have Used Privilege Escalation Vulnerability As Zero-Day</strong><br />
"The Cardinal cybercrime group (aka Storm-1811, UNC4393), which operates the Black Basta ransomware, may have been exploiting a recently patched Windows privilege escalation vulnerability as a zero-day. The vulnerability (CVE-2024-26169) occurs in the Windows Error Reporting Service. If exploited on affected systems, it can permit an attacker to elevate their privileges. The vulnerability was patched on March 12, 2024, and, at the time, Microsoft said there was no evidence of its exploitation in the wild. However, analysis of an exploit tool deployed in recent attacks revealed evidence that it could have been compiled prior to patching, meaning at least one group may have been exploiting the vulnerability as a zero-day."<br />
<a href="https://symantec-enterprise-blogs.security.com/threat-intelligence/black-basta-ransomware-zero-day" target="_blank" rel="noopener noreferrer nofollow ugc">https://symantec-enterprise-blogs.security.com/threat-intelligence/black-basta-ransomware-zero-day</a><br />
<a href="https://thehackernews.com/2024/06/black-basta-ransomware-may-have.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/06/black-basta-ransomware-may-have.html</a><br />
<a href="https://therecord.media/black-basta-ransomware-zero-day-windows" target="_blank" rel="noopener noreferrer nofollow ugc">https://therecord.media/black-basta-ransomware-zero-day-windows</a><br />
<a href="https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-linked-to-windows-zero-day-attacks/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-linked-to-windows-zero-day-attacks/</a><br />
<a href="https://www.securityweek.com/ransomware-group-may-have-exploited-windows-vulnerability-as-zero-day/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.securityweek.com/ransomware-group-may-have-exploited-windows-vulnerability-as-zero-day/</a><br />
<a href="https://www.theregister.com/2024/06/12/black_basta_ransomware_windows/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.theregister.com/2024/06/12/black_basta_ransomware_windows/</a></p>
</li>
<li>
<p dir="auto"><strong>Search &amp; Spoof: Abuse Of Windows Search To Redirect To Malware</strong><br />
"Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware. We found the threat actors utilizing a sophisticated understanding of system vulnerabilities and user behaviors. Let’s break down the HTML and the Windows search code to better understand their roles in the attack chain."<br />
<a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/search-spoof-abuse-of-windows-search-to-redirect-to-malware/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/search-spoof-abuse-of-windows-search-to-redirect-to-malware/</a><br />
<a href="https://www.bleepingcomputer.com/news/security/phishing-emails-abuse-windows-search-protocol-to-push-malicious-scripts/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/phishing-emails-abuse-windows-search-protocol-to-push-malicious-scripts/</a></p>
</li>
<li>
<p dir="auto"><strong>The Evolution Of QR Code Phishing: ASCII-Based QR Codes</strong><br />
"Quishing—QR code phishing—is a rapidly evolving threat. Starting around August, when we saw the first rapid increase, we’ve also seen a change in the type of QR code attacks. It started with standard MFA authentication requests. It then evolved to conditional routing and custom targeting. Now, we’re seeing another evolution, into the manipulation of QR codes."<br />
<a href="https://blog.checkpoint.com/harmony-email/the-evolution-of-qr-code-phishing-ascii-based-qr-codes/" target="_blank" rel="noopener noreferrer nofollow ugc">https://blog.checkpoint.com/harmony-email/the-evolution-of-qr-code-phishing-ascii-based-qr-codes/</a></p>
</li>
<li>
<p dir="auto"><strong>STR RAT – Phishing Malware Baseline</strong><br />
"STR RAT is a remote access trojan (RAT) written in Java that was first seen in 2020. Like other RATs, it gives threat actors full control when it is successfully installed onto a machine. STR RAT is capable of keylogging, stealing credentials, and even delivering additional malicious payloads. The malware receives a version update every year, on average. These updates correlate with the renewed use of STR RAT by threat actors. Currently, 60% of the STR RAT samples that Cofense analyzed from January 2023 to April 2024 are delivered directly to the email as opposed to an embedded link."<br />
<a href="https://cofense.com/blog/str-rat-phishing-malware-baseline/" target="_blank" rel="noopener noreferrer nofollow ugc">https://cofense.com/blog/str-rat-phishing-malware-baseline/</a></p>
</li>
<li>
<p dir="auto"><strong>Worldwide Web: An Analysis Of Tactics And Techniques Attributed To Scattered Spider</strong><br />
"In early 2024, we identified a current affiliate of the RansomHub RaaS group as a former Alphv/Black Cat affiliate. We assess with high confidence that the same affiliate is a present or former affiliate of the Scattered Spider threat group, also tracked as UNC3944, Muddled Libra, Octo Tempest, Scatter Swine, and Starfraud. Our high-confidence assessment is based on the following pieces of evidence observed by GuidePoint’s DFIR and GRIT practices:"<br />
<a href="https://www.guidepointsecurity.com/blog/worldwide-web-an-analysis-of-tactics-and-techniques-attributed-to-scattered-spider/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.guidepointsecurity.com/blog/worldwide-web-an-analysis-of-tactics-and-techniques-attributed-to-scattered-spider/</a><br />
<a href="https://www.darkreading.com/threat-intelligence/ransomhub-brings-scattered-spider-into-its-raas-fold" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/threat-intelligence/ransomhub-brings-scattered-spider-into-its-raas-fold</a><br />
<a href="https://www.infosecurity-magazine.com/news/scattered-spider-affiliated/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/scattered-spider-affiliated/</a></p>
</li>
<li>
<p dir="auto"><strong>Self-Replicating Morris II Worm Targets AI Email Assistants</strong><br />
"The proliferation of generative artificial intelligence (GenAI) email assistants such as OpenAI’s GPT-3 and Google’s Smart Compose has revolutionized communication workflows. Unfortunately, it has also introduced novel attack vectors for cyber criminals. Leveraging recent advancements in AI and natural language processing, malicious actors can exploit vulnerabilities in GenAI systems to orchestrate sophisticated cyberattacks with far-reaching consequences. Recent studies have uncovered the insidious capabilities of self-replicating malware, exemplified by the “Morris II” strain created by researchers."<br />
<a href="https://securityintelligence.com/posts/morris-ii-self-replicating-malware-genai-email-assistants/" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityintelligence.com/posts/morris-ii-self-replicating-malware-genai-email-assistants/</a></p>
</li>
<li>
<p dir="auto"><strong>Pause Off My Cluster: DERO Cryptojacking Takes a New Shape</strong><br />
"We have detected a new variant of an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters in our customers’ cloud environments. In this incident, the threat actor abused anonymous access to an Internet-facing cluster to launch malicious container images hosted at Docker Hub, some of which have more than 10,000 pulls. These docker images contain a UPX-packed DERO miner named "pause"."<br />
<a href="https://www.wiz.io/blog/dero-cryptojacking-campaign-adapts-to-evade-detection" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.wiz.io/blog/dero-cryptojacking-campaign-adapts-to-evade-detection</a><br />
<a href="https://thehackernews.com/2024/06/cryptojacking-campaign-targets.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/06/cryptojacking-campaign-targets.html</a></p>
</li>
</ul>
<h5>Breaches/Hacks/Leaks</h5>
<ul>
<li>
<p dir="auto"><strong>Life360 Says Hacker Tried To Extort Them After Tile Data Breach</strong><br />
"Safety and location services company Life360 says it was the target of an extortion attempt after a threat actor breached and stole sensitive information from a Tile customer support platform. Life360 provides real-time location tracking, crash detection, and emergency roadside assistance services to more than 66 million members worldwide. In December 2021, it acquired Bluetooth tracking service provider Tile in a $205 million deal."<br />
<a href="https://www.bleepingcomputer.com/news/security/life360-says-hacker-tried-to-extort-them-after-tile-data-breach/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/life360-says-hacker-tried-to-extort-them-after-tile-data-breach/</a><br />
<a href="https://www.theregister.com/2024/06/13/tile_life360_extortion/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.theregister.com/2024/06/13/tile_life360_extortion/</a></p>
</li>
<li>
<p dir="auto"><strong>Toronto School Board Reports Ransomware Attack On Test Environment</strong><br />
"Hackers attempted to attack a technology testing environment used by the Toronto District School Board (TDSB) with ransomware, officials said Wednesday. The school board is the largest in Canada and manages 582 schools for about 235,000 students."<br />
<a href="https://therecord.media/toronto-school-board-ransomware-attack" target="_blank" rel="noopener noreferrer nofollow ugc">https://therecord.media/toronto-school-board-ransomware-attack</a></p>
</li>
</ul>
<h5>General News</h5>
<ul>
<li>
<p dir="auto"><strong>Forced-Labor Camps Fuel Billions Of Dollars In Cyber Scams</strong><br />
"Greater collaboration between financial and law enforcement officials is needed to dismantle cybercrime scam centers in Cambodia, Laos, and Myanmar, which rake in tens of billions of dollars annually — and affect victims worldwide."<br />
<a href="https://www.darkreading.com/cyber-risk/forced-labor-camps-fuel-billions-of-dollars-in-cyber-scams" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cyber-risk/forced-labor-camps-fuel-billions-of-dollars-in-cyber-scams</a></p>
</li>
<li>
<p dir="auto"><strong>Open-Source Security In AI</strong><br />
"New AI products are coming onto the market faster than we have seen in any previous technology revolution. Companies’ free access and right to use open source in AI software models has allowed them to prototype an AI product to market cheaper than ever and at hypersonic speed."<br />
<a href="https://www.helpnetsecurity.com/2024/06/12/ai-open-source-security/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/06/12/ai-open-source-security/</a></p>
</li>
<li>
<p dir="auto"><strong>Security And Privacy Strategies For CISOs In a Mobile-First World</strong><br />
"In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introduced by mobile access to cloud-based corporate data."<br />
<a href="https://www.helpnetsecurity.com/2024/06/12/jim-dolce-lookout-securing-mobile-devices/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/06/12/jim-dolce-lookout-securing-mobile-devices/</a></p>
</li>
<li>
<p dir="auto"><strong>Police Arrest Conti And LockBit Ransomware Crypter Specialist</strong><br />
"The Ukraine cyber police have arrested a 28-year-old Russian man in Kyiv for working with Conti and LockBit ransomware operations to make their malware undetectable by antivirus software and conducting at least one attack himself. The investigation was backed by information shared by the Dutch police who responded to a ransomware attack on a Dutch multinational, followed by data-theft extortion."<br />
<a href="https://www.bleepingcomputer.com/news/security/police-arrest-conti-and-lockbit-ransomware-crypter-specialist/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.bleepingcomputer.com/news/security/police-arrest-conti-and-lockbit-ransomware-crypter-specialist/</a><br />
<a href="https://therecord.media/ukraine-suspected-lockbit-conti-affiliate" target="_blank" rel="noopener noreferrer nofollow ugc">https://therecord.media/ukraine-suspected-lockbit-conti-affiliate</a><br />
<a href="https://www.darkreading.com/cyberattacks-data-breaches/lockbit-and-conti-ransomware-hacker-busted-in-ukraine" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.darkreading.com/cyberattacks-data-breaches/lockbit-and-conti-ransomware-hacker-busted-in-ukraine</a><br />
<a href="https://securityaffairs.com/164475/breaking-news/developer-crypter-conti-lockbit-ransomware.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://securityaffairs.com/164475/breaking-news/developer-crypter-conti-lockbit-ransomware.html</a></p>
</li>
<li>
<p dir="auto"><strong>Mass Exploitation: The Vulnerable Edge Of Enterprise Security</strong><br />
"The cyber threat landscape in 2023 and so far 2024 has been dominated by mass exploitation. Previous WithSecure reporting on the professionalization of cybercrime noted the growing importance of mass exploitation as an infection vector, but the volume and severity of this vector have now truly exploded. Several recent reports indicate that mass exploitation may have overtaken botnets as the primary vector for ransomware incidents, and there has been a rapid tempo of security incidents caused by mass exploitation of vulnerable software including, but not limited to: MOVEit, CitrixBleed, Cisco XE, Fortiguard’s FortiOS, Ivanti ConnectSecure, Palo Alto’s PAN-OS, Juniper’s Junos, and ConnectWise ScreenConnect."<br />
<a href="https://labs.withsecure.com/publications/mass-exploitation-the-vulnerable-edge-of-enterprise-security" target="_blank" rel="noopener noreferrer nofollow ugc">https://labs.withsecure.com/publications/mass-exploitation-the-vulnerable-edge-of-enterprise-security</a><br />
<a href="https://www.infosecurity-magazine.com/news/withsecure-exploitation-edge/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/withsecure-exploitation-edge/</a></p>
</li>
<li>
<p dir="auto"><strong>70% Of Cybersecurity Pros Often Work Weekends, 64% Looking For New Jobs</strong><br />
"Over 70% of cybersecurity professionals often have to work weekends to address security concerns at their organization, according to a new report by Bitdefender. This intense workload appears to correlate strongly with job dissatisfaction, with around two-thirds (64%) of the 1200 cyber professionals surveyed stating that they are planning on looking for a new job in the next 12 months."<br />
<a href="https://www.infosecurity-magazine.com/news/cyber-pros-weekends-new-jobs/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.infosecurity-magazine.com/news/cyber-pros-weekends-new-jobs/</a></p>
</li>
<li>
<p dir="auto"><strong>Lessons From The Ticketmaster-Snowflake Breach</strong><br />
"Last week, the notorious hacker gang, ShinyHunters, sent shockwaves across the globe by allegedly plundering 1.3 terabytes of data from 560 million Ticketmaster users. This colossal breach, with a price tag of $500,000, could expose the personal information of a massive swath of the live event company's clientele, igniting a firestorm of concern and outrage."<br />
<a href="https://thehackernews.com/2024/06/lessons-from-ticketmaster-snowflake.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/06/lessons-from-ticketmaster-snowflake.html</a></p>
</li>
<li>
<p dir="auto"><strong>White House Report Dishes Deets On All 11 Major Government Breaches From 2023</strong><br />
"The number of cybersecurity incidents reported by US federal agencies rose 9.9 percent year-on-year (YoY) in 2023 to a total of 32,211, per a new White House report, which also spilled the details on the most serious incidents suffered across the government. Of the total number of incidents, the majority (38 percent) were classed as "improper usage," meaning a system was used in a way that violated the agency's acceptable use policies. The report stated that agencies have the capability to detect when security policies are being violated, but not the ability to prevent it from actually happening."<br />
<a href="https://www.theregister.com/2024/06/12/white_house_report/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.theregister.com/2024/06/12/white_house_report/</a><br />
<a href="https://www.whitehouse.gov/wp-content/uploads/2024/06/FY23-FISMA-Report.pdf" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.whitehouse.gov/wp-content/uploads/2024/06/FY23-FISMA-Report.pdf</a></p>
</li>
</ul>
<p dir="auto"><strong>อ้างอิง</strong><br />
<strong>Electronic Transactions Development Agency(ETDA)</strong>   <img src="/assets/uploads/files/1718272762653-f5e244b0-35d8-4722-8752-8f1c22d41eb1-image.png" alt="f5e244b0-35d8-4722-8752-8f1c22d41eb1-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/758/cyber-threat-intelligence-13-june-2024</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/758/cyber-threat-intelligence-13-june-2024</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 13 Jun 2024 10:08:55 GMT</pubDate></item><item><title><![CDATA[การใช้ประโยชน์จากช่องโหว่ Zero-Day ที่มีความรุนแรงสูงใน Google Pixel]]></title><description><![CDATA[<p dir="auto">Cyber Security Agency of Singapore (CSA)ได้เผยแพร่เกี่ยวกับ Google ที่มีการอัปเดตเพื่อแก้ไขช่องโหว่ที่มีความรุนแรงสูง ที่หมายเลขช่องโหว่ CVE-2024-32896 ที่ส่งผลต่อผลิตภัณฑ์ Pixel มีรายงานว่าช่องโหว่ดังกล่าวถูกนำไปใช้ประโยชน์อย่างแข็งขัน</p>
<p dir="auto">การใช้ประโยชน์จากช่องโหว่ที่ประสบความสำเร็จอาจทำให้ผู้โจมตีที่ไม่ได้รับอนุญาตสามารถดำเนินการยกระดับสิทธิ์ได้</p>
<p dir="auto">ช่องโหว่นี้ส่งผลต่อผลิตภัณฑ์ Pixel ที่รองรับทั้งหมด</p>
<p dir="auto">ผู้ใช้งานผลิตภัณฑ์ที่ได้รับผลกระทบควรอัปเดตเป็นเวอร์ชันล่าสุดทันที<br />
หากต้องการใช้การอัปเดตความปลอดภัย ผู้ใช้งาน Pixel ควรไปที่  การตั้งค่า &gt; ความปลอดภัยและความเป็นส่วนตัว &gt; ระบบและการอัปเดต &gt; การอัปเดตความปลอดภัยแตะ  ติดตั้งและรีสตาร์ทอุปกรณ์เพื่อดำเนินการอัปเดตให้เสร็จสิ้น</p>
<p dir="auto"><strong>อ้างอิง</strong><br />
<a href="https://www.csa.gov.sg/alerts-advisories/alerts/2024/al-2024-070" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.csa.gov.sg/alerts-advisories/alerts/2024/al-2024-070</a></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1718272453006-dbe79e26-5da3-44ce-8e10-201dbbaffe7f-image.png" alt="dbe79e26-5da3-44ce-8e10-201dbbaffe7f-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/757/การใช-ประโยชน-จากช-องโหว-zero-day-ท-ม-ความร-นแรงส-งใน-google-pixel</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/757/การใช-ประโยชน-จากช-องโหว-zero-day-ท-ม-ความร-นแรงส-งใน-google-pixel</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 13 Jun 2024 09:55:30 GMT</pubDate></item><item><title><![CDATA[กลุ่ม TellYouThePass Ransomware ได้ใช้ประโยชน์จากช่องโหว่ PHP RCE ล่าสุดเพื่อละเมิดเซิร์ฟเวอร์]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1718272213882-60a16391-b501-4dc0-89e5-995f5dd0919d-image.png" alt="60a16391-b501-4dc0-89e5-995f5dd0919d-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1718272237285-%E0%B8%81%E0%B8%A5-%E0%B8%A1-tellyouthepass-ransomware-%E0%B9%84%E0%B8%94-%E0%B9%83%E0%B8%8A-%E0%B8%9B%E0%B8%A3%E0%B8%B0%E0%B9%82%E0%B8%A2%E0%B8%8A%E0%B8%99-%E0%B8%88%E0%B8%B2%E0%B8%81%E0%B8%8A-%E0%B8%AD%E0%B8%87%E0%B9%82%E0%B8%AB%E0%B8%A7-p.png" alt="กลุ่ม TellYouThePass Ransomware ได้ใช้ประโยชน์จากช่องโหว่ P.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1718272230594-3d54d573-7362-472a-b862-064d977e146e-image.png" alt="3d54d573-7362-472a-b862-064d977e146e-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/756/กล-ม-tellyouthepass-ransomware-ได-ใช-ประโยชน-จากช-องโหว-php-rce-ล-าส-ดเพ-อละเม-ดเซ-ร-ฟเวอร</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/756/กล-ม-tellyouthepass-ransomware-ได-ใช-ประโยชน-จากช-องโหว-php-rce-ล-าส-ดเพ-อละเม-ดเซ-ร-ฟเวอร</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 13 Jun 2024 09:50:41 GMT</pubDate></item><item><title><![CDATA[การอัปเดตความปลอดภัยของ Android แก้ไขช่องโหว่ 37 รายการ]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1717661478303-28cc8909-33a6-411e-a656-32a0a5e208af-image.png" alt="28cc8909-33a6-411e-a656-32a0a5e208af-image.png" class=" img-fluid img-markdown" /><br />
<img src="/assets/uploads/files/1717661543779-%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B8%AD-%E0%B8%9B%E0%B9%80%E0%B8%94%E0%B8%95%E0%B8%84%E0%B8%A7%E0%B8%B2%E0%B8%A1%E0%B8%9B%E0%B8%A5%E0%B8%AD%E0%B8%94%E0%B8%A0-%E0%B8%A2%E0%B8%82%E0%B8%AD%E0%B8%87-android-%E0%B9%81%E0%B8%81-%E0%B9%84%E0%B8%82%E0%B8%8A-%E0%B8%AD%E0%B8%87%E0%B9%82%E0%B8%AB%E0%B8%A7-3.png" alt="การอัปเดตความปลอดภัยของ Android แก้ไขช่องโหว่ 3.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1717661549757-e44c33bb-de65-4362-b476-32a198f1588f-image.png" alt="e44c33bb-de65-4362-b476-32a198f1588f-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/736/การอ-ปเดตความปลอดภ-ยของ-android-แก-ไขช-องโหว-37-รายการ</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/736/การอ-ปเดตความปลอดภ-ยของ-android-แก-ไขช-องโหว-37-รายการ</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 06 Jun 2024 08:12:31 GMT</pubDate></item><item><title><![CDATA[Find Out Which Cyber Threats You Should Be Concerned About]]></title><description><![CDATA[<p dir="auto">Human error continues to be perceived as the Achilles’ heel of cybersecurity, with 74% of CISOs identifying it as the most significant vulnerability. In a year of growing insider threats and people-driven data loss, more CISOs than ever (80%) see human risk, in particular negligent employees as a key cybersecurity concern over the next two years. 55% of companies believe cybercriminals are more advanced than their internal team. 33% of companies were late to respond to cyberattacks because they were dealing with a false positive, and 63% spend more than 208 hours per year managing false positives. Within the last 12 months, 48% of organizations identified evidence of a successful breach within their environment. 70% of organizations were the targets of attempted BEC attacks in the last year, with 29% of these targets becoming victims of one or more successful BEC occurrences. Ransomware claims frequency as a whole jumped 64% year over year, primarily due to the explosion of “indirect” ransomware claims whose frequency increased by 415%. Of the 41 unique ransomware strains observed over 2023, LockBit and BlackCat/ALPHV were used in 35% of all direct ransomware attacks.</p>
<p dir="auto"><strong>ที่มาแหล่งข่าว</strong><br />
<a href="https://www.helpnetsecurity.com/2024/06/05/cyber-threat-landscape-statistics-2024/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/06/05/cyber-threat-landscape-statistics-2024/</a></p>
<p dir="auto"><img src="/assets/uploads/files/1717649797265-a436d299-0edd-4438-a821-89de237bcd26-image.png" alt="a436d299-0edd-4438-a821-89de237bcd26-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/735/find-out-which-cyber-threats-you-should-be-concerned-about</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/735/find-out-which-cyber-threats-you-should-be-concerned-about</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 06 Jun 2024 04:57:21 GMT</pubDate></item><item><title><![CDATA[Chinese State-Backed Cyber Espionage Targets Southeast Asian Government]]></title><description><![CDATA[<p dir="auto">An unnamed high-profile government organization in Southeast Asia emerged as the target of a "complex, long-running" Chinese state-sponsored cyber espionage operation codenamed Crimson Palace. "The overall goal behind the campaign was to maintain access to the target network for cyberespionage in support of Chinese state interests," Sophos researchers Paul Jaramillo, Morgan Demboski, Sean Gallagher, and Mark Parsons said in a report shared with The Hacker News. "This includes accessing critical IT systems, performing reconnaissance of specific users, collecting sensitive military and technical information, and deploying various malware implants for command-and-control (C2) communications." The name of the government organization was not disclosed, but the company said the country is known to have repeated conflict with China over territory in the South China Sea, raising the possibility that it may be the Philippines, which has been targeted by Chinese state-sponsored groups like Mustang Panda in the past. Other hallmarks of the campaign include the extensive use of DLL side-loading and unusual tactics to stay under the radar. "The threat actors leveraged many novel evasion techniques, such as overwriting DLL in memory to unhook the Sophos AV agent process from the kernel, abusing AV software for sideloading, and using various techniques to test the most efficient and evasive methods of executing their payloads," the researchers said. Further investigation has revealed that Cluster Alpha focused towards mapping server subnets, enumerating administrator accounts, and conducting reconnaissance on Active Directory infrastructure, with Cluster Bravo prioritizing the use of valid accounts for lateral movement and dropping EtherealGh0st. Activity associated with Cluster Charlie, which took place for the longest period, entailed the use of PocoProxy to establish persistence on compromised systems and the deployment of HUI Loader, a custom loader used by several China-nexus actors, to deliver Cobalt Strike. "The observed clusters reflect the operations of two or more distinct actors working in tandem with shared objectives," the researchers noted. "The observed clusters reflect the work of a single group with a large array of tools, diverse infrastructure, and multiple operators.</p>
<p dir="auto"><strong>ที่มาแหล่งข่าว</strong><br />
<a href="https://thehackernews.com/2024/06/chinese-state-backed-cyber-espionage.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2024/06/chinese-state-backed-cyber-espionage.html</a></p>
<p dir="auto"><img src="/assets/uploads/files/1717649728551-3a3130d6-99bd-4499-b895-812e9e366e14-image.png" alt="3a3130d6-99bd-4499-b895-812e9e366e14-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/734/chinese-state-backed-cyber-espionage-targets-southeast-asian-government</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/734/chinese-state-backed-cyber-espionage-targets-southeast-asian-government</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 06 Jun 2024 04:55:31 GMT</pubDate></item><item><title><![CDATA[การใช้บริการ VPN ส่วนบุคคลอย่างปลอดภัย]]></title><description><![CDATA[<p dir="auto">Cyber Security Agency of Singapore (CSA)ได้เผยแพร่เกี่ยวกับเครือข่ายส่วนตัวเสมือน (VPN) เป็นเทคโนโลยีที่ช่วยให้ผู้ใช้สามารถสร้างการเชื่อมต่อเครือข่ายที่ปลอดภัยและได้รับการป้องกันผ่านทางอินเทอร์เน็ต เพื่อให้มั่นใจถึงการรักษาความลับและความสมบูรณ์ของข้อมูลที่ถูกส่งหน่วยงานต่างๆ ใช้ข้อมูลนี้เพื่อให้การเข้าถึงบริการขององค์กรจากระยะไกลสำหรับพนักงานของตน ในสภาพแวดล้อมที่ไม่ใช่ธุรกิจ บุคคลใช้บริการ VPN เพื่อปกป้องความเป็นส่วนตัวออนไลน์หรือหลีกเลี่ยงข้อจำกัดเนื้อหาที่ล็อคทางภูมิศาสตร์บนเว็บไซต์ต่างๆ การเชื่อมต่อเครือข่ายที่ปลอดภัยและได้รับการป้องกันผ่านบริการ VPN สามารถทำได้ผ่านสองขั้นตอน ในระยะแรก ข้อมูลจะถูกเข้ารหัสและส่งผ่านอุโมงค์ VPN ที่ปลอดภัย ระหว่างอุปกรณ์ของผู้ใช้กับเซิร์ฟเวอร์ VPN ระยะไกลที่โฮสต์โดยผู้ให้บริการ VPN ในระยะที่สอง เซิร์ฟเวอร์ VPN ระยะไกลจะทำหน้าที่เป็นพร็อกซีสำหรับการส่งข้อมูลระหว่างอุปกรณ์ของผู้ใช้งานกับอินเทอร์เน็ต และซ่อนที่อยู่ IP ของผู้ใช้งาน</p>
<p dir="auto">การใช้บริการ VPN อาจมีฟีเจอร์ด้านความปลอดภัยที่กล่าวมาข้างต้น แต่การรับส่งข้อมูลผู้ใช้งานยังคงถูกกำหนดเส้นทางไปยังอินเทอร์เน็ตผ่านเซิร์ฟเวอร์ VPN ซึ่งทำให้เกิดความล้มเหลวเพียงจุดเดียว หากผู้โจมตีประสบความสำเร็จในการบุกรุกเซิร์ฟเวอร์ VPN ด้วยการโจมตีแบบ bruteforce หรือโดยการใช้ประโยชน์จากช่องโหว่หรือการกำหนดค่าที่ไม่ถูกต้อง การรักษาความลับและความสมบูรณ์ของข้อมูลของผู้ใช้งานที่ถูกส่งไปยังอินเทอร์เน็ตอาจยังคงได้รับผลกระทบอยู่</p>
<p dir="auto">ผู้โจมตียังถูกพบว่ากระจายมัลแวร์โดยปลอมแปลงเป็นบริการ VPN ฟรี เมื่อเหยื่อที่ไม่สงสัยติดตั้งมัลแวร์นี้ พร็อกซีที่อยู่อาศัยจะถูกสร้างขึ้น ซึ่งช่วยให้ผู้โจมตีสามารถช่องทางการรับส่งข้อมูลอินเทอร์เน็ตผ่านที่อยู่ IP ของอุปกรณ์ที่ติดไวรัสเหล่านี้ เพื่อปกปิดแหล่งที่มาของกิจกรรมที่เป็นอันตราย พร็อกซีที่อยู่อาศัยเหล่านี้อาจถูกเช่าให้กับผู้โจมตีรายอื่นโดยมีค่าธรรมเนียมในการโจมตีทางไซเบอร์</p>
<p dir="auto">คำแนะนำสำหรับผู้ใช้งานควรพิจารณาที่สำคัญเมื่อเลือกบริการ VPN และขั้นตอนที่สามารถทำได้เพื่อกำหนดค่าและทดสอบบริการ VPN ที่เลือก</p>
<p dir="auto"><strong>วิธีเลือกผู้ให้บริการ VPN ที่เหมาะสม</strong></p>
<p dir="auto">เนื่องจากความพร้อมใช้งานอย่างแพร่หลายของบริการ VPN ทั้งแบบชำระเงินและฟรี จึงควรพิจารณาเงื่อนไขต่อไปนี้เมื่อเลือกผู้ให้บริการ VPN ที่เหมาะสมที่สุดที่ตรงกับความต้องการของคุณมากที่สุด:</p>
<p dir="auto"><strong>ชื่อเสียงของผู้ให้บริการ VPN</strong></p>
<p dir="auto">ใช้บริการ VPN ที่ให้บริการโดยผู้ให้บริการที่มีชื่อเสียงเสมอ และดาวน์โหลดซอฟต์แวร์ VPN จากแหล่งที่เป็นทางการ เช่น เว็บไซต์ของผู้ให้บริการ Google Play Store หรือ Apple App Store ผู้ให้บริการที่ก่อตั้งขึ้นซึ่งมีชื่อเสียงที่ดีมักจะมีประวัติที่ดีในการแก้ไขช่องโหว่ที่ทราบอย่างรวดเร็ว และปฏิบัติตามแนวทางปฏิบัติที่ดีที่สุด เช่น การบังคับใช้ข้อมูลประจำตัวการรับรองความถูกต้องที่รัดกุม สิ่งนี้จะช่วยลดโอกาสในการโจมตีสำเร็จผ่านบริการ VPN นอกจากนี้ โอกาสที่มัลแวร์จะถูกเผยแพร่ผ่านผู้ให้บริการที่มีชื่อเสียงจะต่ำกว่ามากเมื่อเทียบกับแบรนด์ที่ไม่รู้จัก ด้วยเหตุนี้ ผู้ใช้จึงควรตรวจสอบความคิดเห็นจากแหล่งข้อมูลออนไลน์ต่างๆ เกี่ยวกับผู้ให้บริการ VPN ในอนาคต ก่อนที่จะเลือกผู้ให้บริการที่ตรงกับความต้องการมากที่สุด</p>
<p dir="auto"><strong>นโยบายความเป็นส่วนตัวของผู้ใช้งาน</strong></p>
<p dir="auto">ขึ้นอยู่กับนโยบายความเป็นส่วนตัวของผู้ใช้ ผู้ให้บริการ VPN อาจบันทึกกิจกรรมของผู้ใช้ ผู้ให้บริการฟรีบางรายอาจรวบรวมและขายข้อมูลผู้ใช้ให้กับบุคคลที่สาม เช่น บริษัทโฆษณาเพื่อหากำไร ดังนั้น คุณควรตรวจสอบนโยบายความเป็นส่วนตัวของผู้ใช้ในเรื่องต่อไปนี้ (ขั้นต่ำ)</p>
<ul>
<li>วัตถุประสงค์ของการรวบรวมข้อมูล ถ้ามี</li>
<li>การใช้ข้อมูลที่เก็บรวบรวม</li>
<li>มาตรการรักษาความปลอดภัยที่ใช้เพื่อปกป้องข้อมูล</li>
<li>การกำหนดค่าซอฟต์แวร์ VPN ส่วนบุคคล</li>
</ul>
<p dir="auto">การกำหนดค่าซอฟต์แวร์ VPN อาจแตกต่างกันไปสำหรับผู้จำหน่ายแต่ละราย ดังนั้นจึงจำเป็นที่คุณจะต้องตรวจสอบเอกสารการกำหนดค่าใดๆ ที่ผู้ให้บริการ VPN ของคุณให้มา อย่างไรก็ตาม คุณสมบัติทั่วไปที่ใช้ได้กับซอฟต์แวร์ VPN ส่วนใหญ่มีดังต่อไปนี้</p>
<p dir="auto">ใช้ข้อความรหัสผ่านที่คาดเดายากสำหรับการตรวจสอบสิทธิ์และเปิดใช้งาน Multi-Factor Authentication (MFA) หากมี  การใช้ข้อความรหัสผ่านที่รัดกุมซึ่งเป็นรหัสผ่าน แต่ยาวกว่าและประกอบด้วยคำต่างๆ จะทำให้ผู้โจมตีทำการโจมตีแบบ Brute Force ในบัญชี VPN ของคุณได้ยาก นอกจากนี้ การเปิดใช้งาน MFA ทุกครั้งที่เป็นไปได้จะช่วยเพิ่มระดับการรักษาความปลอดภัยเพิ่มเติมหากข้อความรหัสผ่านของคุณถูกบุกรุก คุณสามารถดูบทความของเราที่นี่เพื่อดูรายละเอียดเพิ่มเติมเกี่ยวกับการใช้ข้อความรหัสผ่านที่รัดกุมและ MFA</p>
<p dir="auto">อัปเดตซอฟต์แวร์ VPN เป็นประจำ  ด้วยการอัพเดตซอฟต์แวร์ VPN ของคุณให้ทันสมัยอยู่เสมอ คุณสามารถลดความเสี่ยงที่เกิดจากช่องโหว่และจุดบกพร่องที่ทราบได้อย่างมาก และลดพื้นที่การโจมตีที่ผู้โจมตีต้องใช้ประโยชน์</p>
<p dir="auto">เลือกความแข็งแกร่งของการเข้ารหัสที่เหมาะสม  บริการ VPN ส่วนใหญ่มีระดับการเข้ารหัสที่แตกต่างกัน โดยทั่วไปจะมีการเข้ารหัสระหว่าง 128 บิตและ 256 บิต ความแรงของการเข้ารหัสที่สูงขึ้น (เช่น 256 บิต) อาจให้ความปลอดภัยที่ดีกว่า แต่ความเร็วการเชื่อมต่อจะลดลง ดังนั้น คุณอาจต้องการเลือกความแข็งแกร่งของการเข้ารหัสที่ให้ความสมดุลที่ดีที่สุดระหว่างความปลอดภัยและประสิทธิภาพ ขึ้นอยู่กับความต้องการด้านความปลอดภัยของคุณ</p>
<p dir="auto"><strong>การทดสอบความปลอดภัย VPN</strong></p>
<p dir="auto">หลังจากที่คุณเลือกผู้ให้บริการ VPN แล้ว คุณอาจต้องการทำการทดสอบต่อไปนี้เพื่อให้แน่ใจว่าไม่มีความเสี่ยงด้านความปลอดภัยที่ซ่อนอยู่ซึ่งสืบทอดมาจากผู้ให้บริการ VPN ของคุณ</p>
<p dir="auto">การทดสอบการรั่วไหลของระบบชื่อโดเมน (DNS)  การทดสอบการรั่วไหลของ DNS จะกำหนดว่าการสืบค้น DNS ใด ๆ ถูกส่งไปนอกอุโมงค์ VPN ที่ปลอดภัยหรือไม่ คุณอาจต้องการทำการทดสอบนี้ที่นี่</p>
<p dir="auto">การทดสอบการรั่วไหลของที่อยู่ IP  การทดสอบการรั่วไหลของที่อยู่ IP ใช้เพื่อตรวจสอบว่า IP ต้นทางของคุณถูกซ่อนอย่างถูกต้องหรือไม่ คุณอาจต้องการทำการทดสอบนี้ ที่นี่</p>
<p dir="auto">ผู้ใช้งานจะได้รับการเตือนให้เลือกผู้ให้บริการ VPN ที่มีชื่อเสียง และกำหนดค่า VPN ของคุณอย่างเหมาะสม เนื่องจากเป็นสิ่งสำคัญอย่างยิ่งในการรับรองความปลอดภัยทางไซเบอร์ของอุปกรณ์และข้อมูลที่ส่งระหว่างอุปกรณ์ของคุณและอินเทอร์เน็ต เพื่อให้มั่นใจถึงการรักษาความลับและความสมบูรณ์ของข้อมูลของคุณ</p>
<p dir="auto"><strong>อ้างอิง</strong><br />
<a href="https://www.csa.gov.sg/alerts-advisories/Advisories/2024/ad-2024-011" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.csa.gov.sg/alerts-advisories/Advisories/2024/ad-2024-011</a></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1717510669960-48ed4913-01ce-47b1-839c-0a205ecd2117-image.png" alt="48ed4913-01ce-47b1-839c-0a205ecd2117-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/727/การใช-บร-การ-vpn-ส-วนบ-คคลอย-างปลอดภ-ย</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/727/การใช-บร-การ-vpn-ส-วนบ-คคลอย-างปลอดภ-ย</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 04 Jun 2024 14:21:52 GMT</pubDate></item><item><title><![CDATA[Ticketmaster ยืนยันการถูกละเมิดข้อมูลที่ส่งผลกระทบต่อลูกค้า 560 ล้านราย]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1717495695926-539e9d6b-e4b5-4ced-bf25-f0ade8a0abad-image.png" alt="539e9d6b-e4b5-4ced-bf25-f0ade8a0abad-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1717495714952-ticketmaster-%E0%B8%A2-%E0%B8%99%E0%B8%A2-%E0%B8%99%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B8%96-%E0%B8%81%E0%B8%A5%E0%B8%B0%E0%B9%80%E0%B8%A1-%E0%B8%94%E0%B8%82-%E0%B8%AD%E0%B8%A1-%E0%B8%A5%E0%B8%97-%E0%B8%AA-%E0%B8%87%E0%B8%9C%E0%B8%A5%E0%B8%81%E0%B8%A3%E0%B8%B0.png" alt="Ticketmaster ยืนยันการถูกละเมิดข้อมูลที่ส่งผลกระ.png" class=" img-fluid img-markdown" /><br />
<strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1717495710638-1e6c3c38-c7a9-446b-9306-3fa5123799b1-image.png" alt="1e6c3c38-c7a9-446b-9306-3fa5123799b1-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/726/ticketmaster-ย-นย-นการถ-กละเม-ดข-อม-ลท-ส-งผลกระทบต-อล-กค-า-560-ล-านราย</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/726/ticketmaster-ย-นย-นการถ-กละเม-ดข-อม-ลท-ส-งผลกระทบต-อล-กค-า-560-ล-านราย</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 04 Jun 2024 10:08:37 GMT</pubDate></item><item><title><![CDATA[โปรดระวังการอัปเดตเบราว์เซอร์ปลอม ที่แพร่มัลแวร์ BitRAT และ Lumma Stealer]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1717495614784-93e1a901-4a1c-4c33-8486-f83f176906f9-image.png" alt="93e1a901-4a1c-4c33-8486-f83f176906f9-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1717495654660-%E0%B9%82%E0%B8%9B%E0%B8%A3%E0%B8%94%E0%B8%A3%E0%B8%B0%E0%B8%A7-%E0%B8%87%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B8%AD-%E0%B8%9B%E0%B9%80%E0%B8%94%E0%B8%95%E0%B9%80%E0%B8%9A%E0%B8%A3%E0%B8%B2%E0%B8%A7-%E0%B9%80%E0%B8%8B%E0%B8%AD%E0%B8%A3-%E0%B8%9B%E0%B8%A5%E0%B8%AD%E0%B8%A1-%E0%B8%97-%E0%B9%81%E0%B8%9E%E0%B8%A3.png" alt="โปรดระวังการอัปเดตเบราว์เซอร์ปลอม ที่แพร.png" class=" img-fluid img-markdown" /><br />
<img src="/assets/uploads/files/1717495627330-cc1fd7be-d17c-4c7c-bc28-2bda0befe532-image.png" alt="cc1fd7be-d17c-4c7c-bc28-2bda0befe532-image.png" class=" img-fluid img-markdown" /> <strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/725/โปรดระว-งการอ-ปเดตเบราว-เซอร-ปลอม-ท-แพร-ม-ลแวร-bitrat-และ-lumma-stealer</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/725/โปรดระว-งการอ-ปเดตเบราว-เซอร-ปลอม-ท-แพร-ม-ลแวร-bitrat-และ-lumma-stealer</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 04 Jun 2024 10:07:37 GMT</pubDate></item><item><title><![CDATA[ช่องโหว่ที่สำคัญใน Cacti]]></title><description><![CDATA[<p dir="auto">Cyber Security Agency of Singapore (CSA)ได้เผยแพร่เกี่ยวกับ Cacti ที่ได้เปิดตัวการอัปเดตความปลอดภัยเพื่อแก้ไขช่องโหว่ร้ายแรงในผลิตภัณฑ์ของตน</p>
<p dir="auto">รายการช่องโหว่มีดังนี้</p>
<ul>
<li>CVE-2024-29895: การใช้ประโยชน์จากช่องโหว่นี้สำเร็จอาจทำให้ผู้โจมตีที่ไม่ได้รับการรับรองความถูกต้องสามารถดำเนินการเรียกใช้โค้ดจากระยะไกลได้ ช่องโหว่นี้มีคะแนน CVSSv :10</li>
<li>CVE-2024-25641:  การใช้ประโยชน์จากช่องโหว่นี้สำเร็จอาจทำให้ผู้โจมตีที่ได้รับการรับรองความถูกต้องด้วยสิทธิ์ "นำเข้าเทมเพลต" สามารถเขียนไฟล์ที่กำหนดเองหรือรันโค้ด PHP ที่เป็นอันตรายบนเซิร์ฟเวอร์ที่ได้รับผลกระทบ ช่องโหว่นี้มีคะแนน CVSSv :9.1</li>
<li>CVE-2024-34340:  การใช้ประโยชน์จากช่องโหว่นี้สำเร็จอาจทำให้ผู้โจมตีสามารถเลี่ยงการรับรองความถูกต้องและเข้าถึงเซิร์ฟเวอร์ที่ได้รับผลกระทบได้ ช่องโหว่นี้มีคะแนน CVSSv :9.1</li>
</ul>
<p dir="auto"><strong>ช่องโหว่ร้ายแรงส่งผลกระทบต่อเวอร์ชันของ Cacti ก่อน 1.2.27</strong></p>
<p dir="auto">แนะนำให้ผู้ใช้งานและผู้ดูแลระบบเวอร์ชันผลิตภัณฑ์ที่ได้รับผลกระทบควรอัปเดตเป็นเวอร์ชันล่าสุดทันที</p>
<p dir="auto"><strong>อ้างอิง</strong><br />
<a href="https://www.csa.gov.sg/alerts-advisories/alerts/2024/al-2024-063" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.csa.gov.sg/alerts-advisories/alerts/2024/al-2024-063</a></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1716889929581-74aebb4a-8ce1-4d88-ad68-b0a372a02675-image.png" alt="74aebb4a-8ce1-4d88-ad68-b0a372a02675-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/708/ช-องโหว-ท-สำค-ญใน-cacti</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/708/ช-องโหว-ท-สำค-ญใน-cacti</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 28 May 2024 09:52:12 GMT</pubDate></item><item><title><![CDATA[Sav-Rx เปิดเผยการละเมิดข้อมูลที่ส่งผลกระทบต่อ 2.8 ล้านคนในสหรัฐอเมริกา]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1716889278344-e49d9059-0fb2-482a-881f-d1bc1fe52872-image.png" alt="e49d9059-0fb2-482a-881f-d1bc1fe52872-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1716889289162-sav-rx-%E0%B9%80%E0%B8%9B-%E0%B8%94%E0%B9%80%E0%B8%9C%E0%B8%A2%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B8%A5%E0%B8%B0%E0%B9%80%E0%B8%A1-%E0%B8%94%E0%B8%82-%E0%B8%AD%E0%B8%A1-%E0%B8%A5%E0%B8%97-%E0%B8%AA-%E0%B8%87%E0%B8%9C%E0%B8%A5%E0%B8%81%E0%B8%A3%E0%B8%B0%E0%B8%97%E0%B8%9A%E0%B8%95.png" alt="Sav-Rx เปิดเผยการละเมิดข้อมูลที่ส่งผลกระทบต่.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1716889303685-40477dbf-f095-4a45-a532-ae8fd3419887-image.png" alt="40477dbf-f095-4a45-a532-ae8fd3419887-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/707/sav-rx-เป-ดเผยการละเม-ดข-อม-ลท-ส-งผลกระทบต-อ-2-8-ล-านคนในสหร-ฐอเมร-กา</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/707/sav-rx-เป-ดเผยการละเม-ดข-อม-ลท-ส-งผลกระทบต-อ-2-8-ล-านคนในสหร-ฐอเมร-กา</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 28 May 2024 09:41:45 GMT</pubDate></item><item><title><![CDATA[ช่องโหว่ที่มีความรุนแรงสูงส่งผลกระทบต่อ CISCO FIREPOWER MANAGEMENT CENTER]]></title><description><![CDATA[<p dir="auto"><img src="/assets/uploads/files/1716889143001-9be0b91b-1b9c-4275-b286-877b134b3ee6-image.png" alt="9be0b91b-1b9c-4275-b286-877b134b3ee6-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/assets/uploads/files/1716889192606-%E0%B8%8A-%E0%B8%AD%E0%B8%87%E0%B9%82%E0%B8%AB%E0%B8%A7-%E0%B8%97-%E0%B8%A1-%E0%B8%84%E0%B8%A7%E0%B8%B2%E0%B8%A1%E0%B8%A3-%E0%B8%99%E0%B9%81%E0%B8%A3%E0%B8%87%E0%B8%AA-%E0%B8%87%E0%B8%AA-%E0%B8%87%E0%B8%9C%E0%B8%A5%E0%B8%81%E0%B8%A3%E0%B8%B0%E0%B8%97%E0%B8%9A%E0%B8%95-%E0%B8%AD-c.png" alt="ช่องโหว่ที่มีความรุนแรงสูงส่งผลกระทบต่อ C.png" class=" img-fluid img-markdown" /><br />
<img src="/assets/uploads/files/1716889162069-29d31c35-d259-4dd2-bdbb-937da25f33bb-image.png" alt="29d31c35-d259-4dd2-bdbb-937da25f33bb-image.png" class=" img-fluid img-markdown" />  <strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/706/ช-องโหว-ท-ม-ความร-นแรงส-งส-งผลกระทบต-อ-cisco-firepower-management-center</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/706/ช-องโหว-ท-ม-ความร-นแรงส-งส-งผลกระทบต-อ-cisco-firepower-management-center</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Tue, 28 May 2024 09:39:56 GMT</pubDate></item><item><title><![CDATA[การพัฒนาคุณภาพระบบเทคโนโลยีสารสนเทศในโรงพยาบาล]]></title><description><![CDATA[<p dir="auto">การพัฒนาคุณภาพระบบเทคโนโลยีสารสนเทศในโรงพยาบาล: HAIT<br />
(Hospital Information Technology Quality Improvement Framework – HITQIF)<br />
เป็นมาตรฐานที่พัฒนาโดยสมาคมเวชสารสนเทศไทย (TMI) มี 4 Level มาตรฐาน HAIT เป็นเครื่องมือที่มีประสิทธิภาพสำหรับโรงพยาบาลที่ต้องการพัฒนาระบบ IT ให้มีประสิทธิภาพ ปลอดภัย และเชื่อถือได้ การนำมาตรฐาน HAIT มาใช้ ช่วยให้โรงพยาบาลยกระดับคุณภาพมาตรฐานการบริการด้านสุขภาพ และสร้างความพึงพอใจให้กับผู้ป่วย โรงพยาบาลที่ต้องการขอรับรองมาตรฐาน HAIT จะต้องผ่านการประเมินจากคณะผู้ประเมินของ TMI</p>
<p dir="auto">โดย HAIT Plus จะมี<a href="https://tmi.or.th/wp-content/uploads/2024/01/HAIT_Plus_OperationalSurveyResults.pdf" target="_blank" rel="noopener noreferrer nofollow ugc">รายงานผลสำรวจการดำเนินงานตามข้อกำหนด HAIT Plus : 2567</a>  และ<a href="https://tmi.or.th/wp-content/uploads/2023/12/HAIT_Plus_Guideline.pdf" target="_blank" rel="noopener noreferrer nofollow ugc">แนวทางการดำเนินงานด้านการรักษาความมั่นคงปลอดภัยไซเบอร์สำหรับโรงพยาบาลของรัฐ (HAIT Plus) : 2567</a></p>
<p dir="auto">สามารถศึกษารายละเอียดเพิ่มเติมได้ที่ <a href="https://tmi.or.th/downloads/" target="_blank" rel="noopener noreferrer nofollow ugc">https://tmi.or.th/downloads/</a></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/686/การพ-ฒนาค-ณภาพระบบเทคโนโลย-สารสนเทศในโรงพยาบาล</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/686/การพ-ฒนาค-ณภาพระบบเทคโนโลย-สารสนเทศในโรงพยาบาล</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 23 May 2024 04:45:45 GMT</pubDate></item><item><title><![CDATA[การป้องกันภัยคุกคามทางไซเบอร์โดยใช้ Microsoft Graph API]]></title><description><![CDATA[<p dir="auto">Cyber Security Agency of Singapore (CSA)ได้เผยรายงานจำนวนมากที่เกี่ยวข้องกับอาชญากรไซเบอร์ที่ใช้ประโยชน์จาก Microsoft Graph Application Programming Interface (API) เพื่อสื่อสารและโฮสต์โครงสร้างพื้นฐานคำสั่งและการควบคุม (C2) บนบริการคลาวด์ของ Microsoft Microsoft Graph API ช่วยให้นักพัฒนาสามารถเข้าถึงบริการและข้อมูลของ Microsoft เช่น Outlook, OneDrive, SharePoint และ Teams ผ่านจุดสิ้นสุดเดียว ช่วยให้นักพัฒนาสามารถเพิ่มประสิทธิภาพกระบวนการพัฒนาของตนได้โดยการผสานรวมบริการต่างๆ ของ Microsoft เข้ากับแอปพลิเคชันของตนเอง</p>
<p dir="auto">เนื่องจากฟังก์ชันการทำงานที่กว้างขวางและความสามารถในการบูรณาการของ Microsoft Graph API เข้ากับบริการต่างๆ ของ Microsoft มีรายงานว่าอาชญากรไซเบอร์ถูกละเมิดอย่างแข็งขันเพื่ออำนวยความสะดวกในการโจมตีที่อาศัยอยู่นอกพื้นที่ ด้วยการใช้ประโยชน์จาก Microsoft Graph API อาชญากรไซเบอร์จึงสามารถดำเนินกิจกรรมที่เป็นอันตรายภายในโครงสร้างพื้นฐานของแอปพลิเคชันและบริการที่ถูกต้องตามกฎหมาย ดังนั้นจึงประสบความสำเร็จในการผสมผสานกิจกรรมของพวกเขาเข้ากับการรับส่งข้อมูลที่ถูกกฎหมาย ตัวอย่างเช่น หลังจากที่ประนีประนอมอุปกรณ์ได้สำเร็จ อาชญากรไซเบอร์สามารถปรับใช้มัลแวร์ที่สร้างการเชื่อมต่อกับ Microsoft Graph API เพื่อใช้ OneDrive ซึ่งเป็นแพลตฟอร์มที่โดยทั่วไปใช้สำหรับฟังก์ชันที่ถูกต้องตามกฎหมาย เช่น การถ่ายโอนไฟล์ เป็นเซิร์ฟเวอร์ C2 สำหรับการอัพโหลดและดาวน์โหลดไฟล์ที่เป็นอันตราย</p>
<p dir="auto">ผู้ดูแลระบบอาจต้องการพิจารณาติดตามและIOC ที่เกี่ยวข้องกับมัลแวร์ที่ใช้ประโยชน์จาก Microsoft Graph API IOC ที่เป็นไปได้ที่เกี่ยวข้องกับมัลแวร์ที่เกี่ยวข้องในตารางด้านล่าง</p>
<p dir="auto"><img src="/assets/uploads/files/1716435833585-screenshot-2024-05-23-104822.png" alt="Screenshot 2024-05-23 104822.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">องค์กรอาจพิจารณาใช้มาตรการป้องกันต่อไปนี้เพื่อเสริมสร้างมาตรการรักษาความปลอดภัยทางไซเบอร์และเสริมการป้องกันเพื่อปกป้องตนเองจากเหตุการณ์ดังกล่าว<br />
• ตรวจสอบการรับส่งข้อมูลเครือข่ายขาเข้าและขาออกสำหรับการสื่อสารที่น่าสงสัย<br />
• กำหนดค่ากฎไฟร์วอลล์เพื่อบล็อกการเชื่อมต่อขาออกไปยังที่อยู่ IP ที่เชื่อมโยงกับเซิร์ฟเวอร์ C2<br />
• ใช้ระบบตรวจจับการบุกรุก (IDS) และระบบป้องกันการบุกรุก (IPS) เพื่อตรวจจับและบล็อกการรับส่งข้อมูลที่น่าสงสัย<br />
• ใช้การควบคุมการเข้าถึงที่เข้มงวดตามบทบาทและความรับผิดชอบของพนักงาน เพื่อป้องกันการเข้าถึงแพลตฟอร์มระบบคลาวด์ของ Microsoft โดยไม่ได้รับอนุญาต<br />
• ตรวจสอบบัญชีผู้ใช้ Microsoft ทั้งหมดเป็นประจำและปิดการใช้งานบัญชีที่ไม่ได้ใช้งาน<br />
• อัปเดตระบบ แอปพลิเคชัน และซอฟต์แวร์ให้เป็นเวอร์ชันล่าสุด และดาวน์โหลดแพตช์รักษาความปลอดภัยล่าสุด<br />
• ปรับใช้โซลูชัน Endpoint Detection and Response (EDR) เพื่อตรวจจับและป้องกันมัลแวร์จากการพยายามสร้างการสื่อสารกับเซิร์ฟเวอร์ C2<br />
• ติดตั้งซอฟต์แวร์ป้องกันไวรัส/ป้องกันมัลแวร์ และอัปเดตซอฟต์แวร์ (และไฟล์คำจำกัดความ) อยู่เสมอ ทำการสแกนระบบและเครือข่ายอย่างสม่ำเสมอ และสแกนไฟล์ที่ได้รับทั้งหมด</p>
<p dir="auto"><strong>อ้างอิง</strong><br />
<a href="https://www.csa.gov.sg/alerts-advisories/Advisories/2024/ad-2024-010" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.csa.gov.sg/alerts-advisories/Advisories/2024/ad-2024-010</a></p>
<p dir="auto"><strong>สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand</strong>  <img src="/assets/uploads/files/1716435716811-feb5b598-64b9-4ae7-8275-679297bcf7b0-image.png" alt="feb5b598-64b9-4ae7-8275-679297bcf7b0-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/685/การป-องก-นภ-ยค-กคามทางไซเบอร-โดยใช-microsoft-graph-api</link><guid isPermaLink="true">https://webboard-nsoc.ncsa.or.th/topic/685/การป-องก-นภ-ยค-กคามทางไซเบอร-โดยใช-microsoft-graph-api</guid><dc:creator><![CDATA[NCSA_THAICERT]]></dc:creator><pubDate>Thu, 23 May 2024 03:44:50 GMT</pubDate></item></channel></rss>