NCSA Webboard
    • ล่าสุด
    • แท็ก
    • ฮิต
      • ติดต่อสำนักงาน
    • ลงทะเบียน
    • เข้าสู่ระบบ
    1. หน้าแรก
    2. NCSA_THAICERT
    • รายละเอียด
    • ติดตาม 0
    • คนติดตาม 2
    • กระทู้ 1,644
    • กระทู้ 1,645
    • ดีที่สุด 0
    • Controversial 0
    • กลุ่ม 2

    NCSA_THAICERT

    @NCSA_THAICERT

    1
    ชื่อเสียง
    47
    ดูข้อมูลส่วนตัว
    1.6k
    กระทู้
    2
    คนติดตาม
    0
    ติดตาม
    เข้าร่วม ออนไลน์ล่าสุด
    เว็บไซต์ www.ncsa.or.th/?fbclid=IwAR0BqJEC-CJzBs98rlBxUbZkNBgp1g814xdDNNaKnHTrxfqZhPD--ksY68I

    NCSA_THAICERT เลิกติดตาม ติดตาม
    Global Moderator administrators

    Latest posts made by NCSA_THAICERT

    • Cyber Threat Intelligence 18 November 2025

      New Tooling

      • Strix: Open-Source AI Agents For Penetration Testing
        "Security teams know that application flaws tend to show up at the worst time. Strix presents itself as an open source way to catch them earlier by using autonomous agents that behave like human attackers. These agents run code, explore an application, uncover weaknesses, and prove those findings with working proof of concepts."
        https://www.helpnetsecurity.com/2025/11/17/strix-open-source-ai-agents-penetration-testing/
        https://github.com/usestrix/strix

      Vulnerabilities

      • DoorDash Email Spoofing Vulnerability Sparks Messy Disclosure Dispute
        "A vulnerability in DoorDash's systems could allow anyone to send "official" DoorDash-themed emails right from company's authorized servers, paving a near-perfect phishing channel. DoorDash has now patched the issue, but a contentious dispute has erupted between the researcher who reported the vulnerability and the company, with both sides accusing each other of acting improperly."
        https://www.bleepingcomputer.com/news/security/doordash-email-spoofing-vulnerability-sparks-messy-disclosure-dispute/
      • EchoGram: The Hidden Vulnerability Undermining AI Guardrails
        "Large Language Models (LLMs) are increasingly protected by “guardrails”, automated systems designed to detect and block malicious prompts before they reach the model. But what if those very guardrails could be manipulated to fail? HiddenLayer researchers have uncovered EchoGram, a groundbreaking attack technique that can flip the verdicts of defensive models, causing them to mistakenly approve harmful content or flood systems with false alarms. The exploit targets two of the most common defense approaches, text classification models and LLM-as-a-judge systems, by taking advantage of how similarly they’re trained."
        https://hiddenlayer.com/innovation-hub/echogram-the-hidden-vulnerability-undermining-ai-guardrails/
        https://hackread.com/echogram-flaw-bypass-guardrails-major-llms/

      Malware

      • Defending The Cloud: Azure Neutralized a Record-Breaking 15 Tbps DDoS Attack
        "On October 24, 2025, Azure DDOS Protection automatically detected and mitigated a multi-vector DDoS attack measuring 15.72 Tbps and nearly 3.64 billion packets per second (pps). This was the largest DDoS attack ever observed in the cloud and it targeted a single endpoint in Australia. By utilizing Azure’s globally distributed DDoS Protection infrastructure and continuous detection capabilities, mitigation measures were initiated. Malicious traffic was effectively filtered and redirected, maintaining uninterrupted service availability for customer workloads."
        https://techcommunity.microsoft.com/blog/azureinfrastructureblog/defending-the-cloud-azure-neutralized-a-record-breaking-15-tbps-ddos-attack/4470422
        https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/
        https://securityaffairs.com/184749/cyber-crime/microsoft-mitigated-the-largest-cloud-ddos-ever-recorded-15-7-tbps.html
        https://www.theregister.com/2025/11/17/biggest_cloud_ddos_attack_azure/
      • EVALUSION Campaign Delivers Amatera Stealer And NetSupport RAT
        "Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and Cyber Analysts who hunt, investigate, contain and respond to threats within minutes. We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware. Our Security Operations Centers are supported with Threat Intelligence, Tactical Threat Response and Advanced Threat Analytics driven by our Threat Response Unit – the TRU team."
        https://www.esentire.com/blog/evalusion-campaign-delivers-amatera-stealer-and-netsupport-rat
        https://thehackernews.com/2025/11/new-evalusion-clickfix-campaign.html
      • RONINGLOADER: DragonBreath’s New Path To PPL Abuse
        "Elastic Security Labs identified a recent campaign distributing a modified variant of the gh0st RAT, attributed to the Dragon Breath APT (APT-Q-27), through trojanized NSIS installers masquerading as legitimate software such as Google Chrome and Microsoft Teams. The infection chain employs a multi-stage delivery mechanism that leverages various evasion techniques, with many redundancies aimed at neutralising endpoint security products popular in the Chinese market. These include bringing a legitimately signed driver, deploying custom WDAC policies, and tampering with the Microsoft Defender binary through PPL abuse."
        https://www.elastic.co/security-labs/roningloader
        https://thehackernews.com/2025/11/dragon-breath-uses-roningloader-to.html
      • Npm Malware Campaign Uses Adspect Cloaking To Deliver Malicious Redirects
        "The Socket Threat Research Team recently discovered dino_reborn, an npm threat actor with seven packages constructing an intricate malware campaign. Upon visiting a fake website constructed by one of the packages, the threat actor determines if the visitor is a victim or a security researcher. If the visitor is a victim, they see a fake CAPTCHA, eventually bringing them to a malicious site. If they are a security researcher, only a few tells on the fake website would tip them off that something nefarious may be occurring."
        https://socket.dev/blog/npm-malware-campaign-uses-adspect-cloaking-to-deliver-malicious-redirects
        https://www.bleepingcomputer.com/news/security/malicious-npm-packages-abuse-adspect-redirects-to-evade-security/

      Breaches/Hacks/Leaks

      • AIPAC Discloses Data Breach, Says Hundreds Affected
        "AIPAC (American Israel Public Affairs Committee) has announced a data breach linked to an external system breach that involved an unknown third-party company. The disclosure appeared in a notification submitted to the Maine attorney general’s office on November 14 2025."
        https://hackread.com/aipac-data-breach-hundreds-affected/
      • Eurofiber France Warns Of Breach After Hacker Tries To Sell Customer Data
        "Eurofiber France disclosed a data breach it discovered late last week when hackers gained access to its ticket management system by exploiting a vulnerability and exfiltrated information. Eurofiber France SAS is the French unit of the Eurofiber Group N.V., a Dutch telecommunications service provider that operates a fiber network of 76,000 km across the Netherlands, Belgium, France, and Germany. The company specializes in providing digital infrastructure for businesses, rather than the consumer market."
        https://www.bleepingcomputer.com/news/security/eurofiber-france-warns-of-breach-after-hacker-tries-to-sell-customer-data/
        https://www.theregister.com/2025/11/17/eurofiber_breach/
      • Princeton University Discloses Data Breach Affecting Donors, Alumni
        "A Princeton University database was compromised in a cyberattack on November 10, exposing the personal information of alumni, donors, faculty members, and students. According to a FAQ page issued on Saturday, the threat actors breached Princeton's systems by targeting a University employee in a phishing attack. This allowed them to gain access to "biographical information pertaining to University fundraising and alumni engagement activities," including names, email addresses, telephone numbers, and home and business addresses stored in the compromised database."
        https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/
        https://therecord.media/princeton-donor-alumni-database-breach
      • Pennsylvania AG Confirms Data Breach After INC Ransom Attack
        "The office of Pennsylvania's attorney general has confirmed that the ransomware gang behind an August 2025 cyberattack stole files containing personal and medical information. This comes after Attorney General Dave Sunday confirmed in early September that the incident was a ransomware attack and his office refused to pay the ransom requested by the cybercriminals after they encrypted compromised systems. "The OAG later learned that certain files may have been accessed without authorization. The OAG reviewed which data may have been involved and learned that certain personal information was contained in some files," said the Pennsylvania Office of the Attorney General (OAG) in a Friday press release."
        https://www.bleepingcomputer.com/news/security/pennsylvania-ag-confirms-data-breach-after-inc-ransom-attack/
        https://therecord.media/pennsylvania-attorney-general-office-data-breach-ssns
      • Everest Ransomware Says It Stole Data Of Millions Of Under Armour Users
        "Everest ransomware gang is claiming to have breached Under Armour, Inc., the American sportswear giant, and stolen 343 GB of internal company data, employee information, along with personal data of millions from various countries. The claims were published earlier today on the group’s official dark web leak site."
        https://hackread.com/everest-ransomware-under-armour-users-data/

      General News

      • October 2025 Infostealer Trend Report
        "This report provides statistics, trends, and case information on Infostealer malware such as distribution volume, distribution methods, and disguising techniques, which were collected and analyzed for one month in October 2025. The following is a summary of the report."
        https://asec.ahnlab.com/en/91062/
      • October 2025 Trends Report On Phishing Emails
        "This report provides the statistics, trends, and case information on the distribution of phishing emails and attachment-based threats collected and analyzed for one month in October 2025. Below is a portion of the statistics and cases included in the original report."
        https://asec.ahnlab.com/en/91060/
      • October 2025 APT Group Trends
        "North Korea-affiliated cyber threat groups have stolen cryptocurrency, credentials, and performed reconnaissance and remote control attacks through various malware and operations. They used Node.js-based malware and a multi-stage infection chain to target both Windows and macOS environments. Through their recruitment scams, interview disguises, and industrial espionage campaigns, they intensively attacked relevant individuals in the defense, blockchain, and Web3 industries."
        https://asec.ahnlab.com/en/91061/
      • The Tech That Turns Supply Chains From Brittle To Unbreakable
        "In this Help Net Security interview, Sev Kelian, CISO and VP of Security at Tecsys, discusses how organizations can strengthen supply chain resilience through a more unified and forward-looking strategy. Kelian also shares how new technologies and a blended view of cyber and physical risk are changing the way teams think about strategy and long-term planning."
        https://www.helpnetsecurity.com/2025/11/17/sev-kelian-tecsys-supply-chain-resilience-strategy/
      • Dutch Police Seizes 250 Servers Used By “bulletproof Hosting” Service
        "The police in the Netherlands have seized around 250 physical servers powering a bulletproof hosting service in the country used exclusively by cybercriminals for providing complete anonymity. Politie, the police force in the Netherlands, did not name the service but said that it has been used for illicit activities since 2022, and has emerged in more than 80 cybercrime investigations, both domestic and abroad. Bulletproof hosting providers are companies that intentionally ignore abuse reports and refuse to comply with content takedowns requests from law enforcement while protecting their customers by not enforcing Know Your Customer policies."
        https://www.bleepingcomputer.com/news/security/dutch-police-seizes-250-servers-used-by-bulletproof-hosting-service/
      • An Uncertain Future For The Global Internet
        "Global internet freedom declined for the 15th consecutive year. Of the 72 countries assessed in Freedom on the Net 2025, conditions deteriorated in 28, while 17 countries registered overall gains. Kenya experienced the most severe decline of the coverage period, after authorities responded to nationwide protests over tax policy in June 2024 by shutting down internet connectivity for around seven hours and arresting hundreds of protesters. Bangladesh earned the year’s strongest improvement, as a student-led uprising ousted the country’s repressive leadership in August 2024 and an interim government made positive reforms. China and Myanmar remained the world’s worst environments for internet freedom, while Iceland held its place as the freest online environment."
        https://freedomhouse.org/report/freedom-net/2025/uncertain-future-global-internet
        https://www.helpnetsecurity.com/2025/11/17/freedom-house-global-internet-freedom-decline/
      • Cyber Readiness Stalls Despite Confidence In Incident Response
        "Cyber readiness is stalling as over-confident teams ignore the reality that incident response times have not improved despite more spending and oversight, according to Immersive. The cyber-training vendor’s Cyber Workforce Benchmark Report 2025 is based on anonymized data collected from the Immersive One platform, simulated exercises across technical and business functions, and a readiness perception survey. A resilience score quantifies organizational readiness across skills, practices, decision-making performance, framework coverage and adaptability to new threats."
        https://www.infosecurity-magazine.com/news/cyber-readiness-stalls-incident/
        https://www.theregister.com/2025/11/17/immersive_cyber_resilience_report/
      • Frontline Security Predictions 2026: The Battle For Reality And Control In a World Of Agentic AI
        "The power and potential of agentic AI — adaptive, automated and independent — dominated security conversations during 2025. Barracuda asked four colleagues leading cyberthreat and security areas around the world, what they expect from agentic AI in 2026 and what this means for cybersecurity."
        https://blog.barracuda.com/2025/11/17/frontline-security-predictions-2026-agentic-ai
      • Europol And Partner Countries Combat Online Radicalisation On Gaming Platforms
        "Europol supported eight countries in identifying and removing racist and xenophobic propaganda shared on gaming and gaming-related platforms. The Referral Action Day, involving Denmark, Finland, Germany, Luxembourg, Netherlands, Portugal, Spain, United Kingdom, led to the referral of thousands of URLs leading to dangerous and illicit online material."
        https://www.europol.europa.eu/media-press/newsroom/news/europol-and-partner-countries-combat-online-radicalisation-gaming-platforms
        https://www.theregister.com/2025/11/17/game_over_europol_storms_gaming/
        https://www.infosecurity-magazine.com/news/europol-takedown-extremist-gaming/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) dc28dedd-098f-47b1-85cb-7072abae7d6a-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Microsoft เร่งตรวจสอบปัญหา KB5068781 หลังอัปเดต ESU บน Windows 10 ล้มเหลว

      7dd5b7cb-2dd6-483a-8f1f-5f7aee16cea3-image.png Microsoft เร่งตรวจสอบปัญหา KB5068781 หลังอัปเดต ESU บน Windows .png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand ad2ee6ac-40a4-44e1-9367-5510c673fb14-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ASUS แก้ไขช่องโหว่ร้ายแรง CVE-2025-59367 ในเราเตอร์ DSL

      22810929-5516-4c8d-a6a8-c43d5b391a42-image.png ASUS แก้ไขช่องโหว่ร้ายแรง CVE-2025-59367 ในเราเตอร์ DSL.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 5e6467ec-cbd5-41d8-8c32-fdd8e443ce17-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Logitech ยืนยันเหตุข้อมูลรั่วไหล ฝีมือกลุ่มแฮกเกอร์ Clop ผ่านช่องโหว่ซอฟต์แวร์ Third-party

      49d99404-69de-4e3c-8f5f-3ab9e15448a0-image.png Logitech ยืนยันเหตุข้อมูลรั่วไหล ฝีมือกลุ่มแฮก.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 80dfcfac-4d8e-455b-aada-cf6850e537e9-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบช่องโหว่ด้านความปลอดภัยในผลิตภัณฑ์ FortiWeb แนะนำเร่งอัปเดตระบบทันที

      เมื่อวันที่ 14 พฤศจิกายน 2568 Cybersecurity and Infrastructure Security Agency (CISA) มีการค้นพบช่องโหว่ด้านความปลอดภัยที่สำคัญในผลิตภัณฑ์ FortiWeb ซึ่งเป็นระบบที่ใช้ปกป้องเว็บไซต์ขององค์กรหลายแห่ง ทั้งภาครัฐและเอกชน โดยขณะนี้มีรายงานว่าแฮกเกอร์เริ่มนำช่องโหว่นี้ไปใช้โจมตีแล้ว

      ช่องโหว่ดังกล่าวอาจเปิดทางให้ผู้ไม่หวังดีสามารถส่งคำสั่งไปควบคุมอุปกรณ์ได้ โดยไม่ต้องผ่านการยืนยันตัวตน ซึ่งอาจทำให้ระบบขององค์กรถูกแก้ไขหรือถูกสั่งการโดยไม่ได้รับอนุญาต

      เวอร์ชันที่ได้รับผลกระทบ

      • FortiWeb เวอร์ชัน 8.0.0 – 8.0.1
      • FortiWeb เวอร์ชัน 7.6.0 – 7.6.4
      • FortiWeb เวอร์ชัน 7.4.0 – 7.4.9
      • FortiWeb เวอร์ชัน 7.2.0 – 7.2.11
      • FortiWeb เวอร์ชัน 7.0.0 – 7.0.11

      คำแนะนำสำหรับหน่วยงานที่ใช้งาน
      เพื่อความปลอดภัยของระบบ ขอให้องค์กรดำเนินการดังต่อไปนี้โดยเร็ว:
      อัปเดตระบบเป็นเวอร์ชันที่ได้รับการแก้ไขแล้ว ตามคำแนะนำของ Fortinet

      เวอร์ชันเดิม แนวทางแก้ไข
      8.0.0 – 8.0.1 อัปเดตเป็น 8.0.2 ขึ้นไป
      7.6.0 – 7.6.4 อัปเดตเป็น 7.6.5 ขึ้นไป
      7.4.0 – 7.4.9 อัปเดตเป็น 7.4.10 ขึ้นไป
      7.2.0 – 7.2.11 อัปเดตเป็น 7.2.12 ขึ้นไป
      7.0.0 – 7.0.11 อัปเดตเป็น 7.0.12 ขึ้นไป

      หากยังไม่สามารถอัปเดตได้ทันที

      • ควรปิดการเข้าถึงระบบจัดการผ่านอินเทอร์เน็ตชั่วคราว
      • ให้จำกัดการเข้าถึงระบบเฉพาะภายในองค์กรเท่านั้น

      หลังการอัปเดต

      • ตรวจสอบการตั้งค่าระบบ
      • ตรวจสอบบันทึกเหตุการณ์ว่ามีการเปลี่ยนแปลงผิดปกติ หรือมีบัญชีผู้ดูแลระบบที่ไม่ได้รับอนุญาตเพิ่มขึ้นหรือไม่

      ช่องโหว่ดังกล่าวถูกจัดอยู่ในรายการ “ช่องโหว่ที่พบการโจมตีจริง” โดยหน่วยงานความมั่นคงปลอดภัยไซเบอร์ของสหรัฐฯ ซึ่งสะท้อนถึงความเสี่ยงสูงและความจำเป็นในการเร่งดำเนินการป้องกันทันที

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2025/11/14/fortinet-releases-security-advisory-relative-path-traversal-vulnerability-affecting-fortiweb

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand c099daf5-942b-4321-bad2-f53aaff9cb05-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 14 November 2025

      Healthcare Sector

      • Healthcare Security Is Broken Because Its Systems Can’t Talk To Each Other
        "In this Help Net Security interview, Cameron Kracke, CISO at Prime Therapeutics, discusses how the healthcare ecosystem can achieve cohesive security visibility. With hospitals, clinics, telehealth, and cloud partners all in the mix, maintaining visibility remains a complex task. Kracke shares how interoperability, collaboration, and strategic investment can strengthen resilience across the healthcare security landscape."
        https://www.helpnetsecurity.com/2025/11/13/cameron-kracke-prime-therapecutics-healthcare-security-ecosystem/

      Industrial Sector

      • CISA Releases 18 Industrial Control Systems Advisories
        "CISA released 18 Industrial Control Systems (ICS) Advisories. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS."
        https://www.cisa.gov/news-events/alerts/2025/11/13/cisa-releases-18-industrial-control-systems-advisories

      New Tooling

      • Sprout: Open-Source Bootloader Built For Speed And Security
        "Sprout is an open-source bootloader that delivers sub-second boot times and uses a clean, data-driven configuration format that works across operating systems. “We built Sprout because we were frustrated by how fragile and slow traditional bootloaders are,” said Alex Zenla, CTO at Edera. Sprout is designed for modern infrastructure where every second counts. It can boot Linux in under 50 milliseconds, which is critical for autoscaling and deployment in cloud environments."
        https://www.helpnetsecurity.com/2025/11/13/sprout-open-source-bootloader/
        https://github.com/edera-dev/sprout

      Vulnerabilities

      • Firefox 145 And Chrome 142 Patch High-Severity Flaws In Latest Releases
        "Google and Mozilla on Tuesday released fresh updates for Chrome and Firefox to resolve multiple high-severity vulnerabilities. Google announced a Chrome 142 update that resolves a high-severity inappropriate implementation issue in the V8 JavaScript engine. The bug is tracked as CVE-2025-13042. The internet giant has not detailed the flaw, but such V8 defects can typically be exploited remotely to cause denial-of-service (DoS) conditions or for code execution, Hong Kong CERT/CC notes. Google has yet to determine the bug bounty reward for the defect."
        https://www.securityweek.com/firefox-145-and-chrome-142-patch-high-severity-flaws-in-latest-releases/
      • Critical: Remote Code Execution Via Malicious Obfuscated Malware In Imunify360 AV (AI-Bolit)
        "Recently a critical Remote Code Execution issue was patched in the Imunify360 AV product. Imunify360 serves up to 56 million websites. Hosting companies should patch the issue immediately. The information about this vulnerability has been spreading since the end of October, so we also recommend affected hosting companies to check whether their servers have been compromised."
        https://patchstack.com/articles/remote-code-execution-vulnerability-found-in-imunify360/
        https://www.bleepingcomputer.com/news/security/rce-flaw-in-imunifyav-puts-millions-of-linux-hosted-sites-at-risk/
      • When GPTs Call Home: Exploiting SSRF In ChatGPT’s Custom Actions
        "In cybersecurity, you begin to develop a kind of hacker mindset or “sixth sense”. You start seeing the world not just for what it does, but for what it could do. So, when I was building my first custom GPT in ChatGPT and got to the “Actions” section, that sense started tingling! I wasn’t even on a bug hunt, just curious about the custom GPT feature and building a custom assistant. The goal was to have a GPT pull data from my own external API, but once I realized this feature was returning data from a user-provided URL, alarm bells went off and the hacker instinct took over, telling me to check for SSRF."
        https://sirleeroyjenkins.medium.com/when-gpts-call-home-exploiting-ssrf-in-chatgpts-custom-actions-5df9df27dbe9
        https://www.securityweek.com/chatgpt-vulnerability-exposed-underlying-cloud-infrastructure/

      Malware

      • CISA And Partners Release Advisory Update On Akira Ransomware
        "Today, Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation, Department of Defense Cyber Crime Center, Department of Health and Human Services, and international partners, released an updated joint Cybersecurity Advisory, #StopRansomware: Akira Ransomware, to provide network defenders with the latest indicators of compromise, tactics, techniques, and procedures, and detection methods associated with Akira ransomware activity."
        https://www.cisa.gov/news-events/alerts/2025/11/13/cisa-and-partners-release-advisory-update-akira-ransomware
        https://www.bleepingcomputer.com/news/security/cisa-warns-of-akira-ransomware-linux-encryptor-targeting-nutanix-vms/
        https://therecord.media/akira-gang-received-million
        https://cyberscoop.com/akira-ransomware-fbi-cisa-joint-advisory/
      • “IndonesianFoods” Worm Publishes More Than 78,000 Malicious NPM Packages
        "I’ve identified an NPM worm that has published over 78,000 malicious packages to the NPM registry, affecting at least eleven NPM users. This attack focuses on creating new packages rather than stealing credentials or engaging in other, more immediately malicious behaviours. This attack almost doubles the known number of malicious NPM packages."
        https://sourcecodered.com/indonesianfoods-npm-worm/
        https://www.endorlabs.com/learn/the-great-indonesian-tea-theft-analyzing-a-npm-spam-campaign
        https://thehackernews.com/2025/11/over-46000-fake-npm-packages-flood.html
        https://www.bleepingcomputer.com/news/security/new-indonesianfoods-worm-floods-npm-with-100-000-packages/
        https://www.infosecurity-magazine.com/news/indonesianfoods-npm-worm-44000/
        https://www.securityweek.com/tens-of-thousands-of-malicious-npm-packages-distribute-self-replicating-worm/
      • Popular Android-Based Photo Frames Download Malware On Boot
        "Uhale Android-based digital picture frames come with multiple critical security vulnerabilities and some of them download and execute malware at boot time. Mobile security company Quokka conducted an in-depth security assessment on the Uhale app and found behavior suggesting a connection with the Mezmess and Voi1d malware families. The researchers reported the issues to ZEASN (now ‘Whale TV’), the Chinese firm behind the Uhale platform used in the digital picture frames of numerous different brands, but received no reply to multiple notificaitions since May."
        https://www.bleepingcomputer.com/news/security/popular-android-based-photo-frames-download-malware-on-boot/
        https://go.quokka.io/hubfs/App-Intel/Technical_Uhale-Digital-Picture-Frame-Security-Assessment.pdf
      • Unleashing The Kraken Ransomware Group
        "In August 2025, Cisco Talos observed big-game hunting and double extortion attacks carried out by Kraken, a Russian-speaking group that has emerged from the remnants of the HelloKitty ransomware cartel. Talos observed in one intrusion that the Kraken actor exploited Server Message Block (SMB) vulnerabilities for initial access, then used tools like Cloudflared for persistence and SSH Filesystem (SSHFS) for data exfiltration before encryption. Kraken is a cross-platform ransomware with distinct encryptors for Windows, Linux, and VMware ESXi, targeting a wide range of enterprise environments."
        https://blog.talosintelligence.com/kraken-ransomware-group/
      • Uncovering a Multi-Stage Phishing Kit Targeting Italy's Infrastructure
        "Group-IB researchers uncovered a professional phishing framework that mimics trusted brands with remarkable precision. Using layered evasion, CAPTCHA filtering, and Telegram-based data exfiltration, attackers harvest credentials and bypass automated detection. The findings highlight how phishing-as-a-service operations are scaling through automation, lowering technical barriers for cybercriminals, and industrializing one of the oldest yet most effective forms of digital fraud."
        https://www.group-ib.com/blog/uncover-phishing-italy/
        https://therecord.media/phishing-campaign-targets-italian-web-hosting-customers
      • We Opened a Fake Invoice And Fell Down a Retro XWorm-Shaped Wormhole
        "Somebody forwarded an “invoice” email and asked me to check the attachment because it looked suspicious. Good instinct—it was, and what we found inside was a surprisingly old trick hiding a modern threat."
        https://www.malwarebytes.com/blog/threats/2025/11/we-opened-a-fake-invoice-and-fell-down-a-retro-xworm-shaped-wormhole
      • Thousands Of Domains Target Hotel Guests In Massive Phishing Campaign
        "A Russian-speaking threat actor operating an ongoing, mass phishing campaign targeting people who might be planning (or about to leave for) a vacation has registered more than 4,300 domain names used in the attacks since the beginning of the year. The ongoing campaign employs a sophisticated phishing kit that customizes the page presented to the site visitor depending on a unique string in the URL path when the target first visits the website. The customizations use the logos from major online travel industry brands, including Airbnb and Booking.com."
        https://www.netcraft.com/blog/thousands-of-domains-target-hotel-guests-in-massive-phishing-campaign
        https://thehackernews.com/2025/11/russian-hackers-create-4300-fake-travel.html
      • Malicious Chrome Extension Exfiltrates Seed Phrases, Enabling Wallet Takeover
        "Socket’s Threat Research Team uncovered the malicious Chrome extension Safery: Ethereum Wallet, published on November 12, 2024. Marketed as a simple, secure Ethereum (ETH) wallet, it contains a backdoor that exfiltrates seed phrases by encoding them into Sui addresses and broadcasting microtransactions from a threat actor-controlled Sui wallet."
        https://socket.dev/blog/malicious-chrome-extension-exfiltrates-seed-phrases
        https://thehackernews.com/2025/11/fake-chrome-extension-safery-steals.html
        https://securityaffairs.com/184585/malware/chrome-extension-safery-steals-ethereum-wallet-seed-phrases.html
      • Chinese Spies Told Claude To Break Into About 30 Critical Orgs. Some Attacks Succeeded
        "Chinese cyber spies used Anthropic's Claude Code AI tool to attempt digital break-ins at about 30 high-profile companies and government organizations – and the government-backed snoops "succeeded in a small number of cases," according to a Thursday report from the AI company. The mid-September operation targeted large tech companies, financial institutions, chemical manufacturers, and government agencies."
        https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/
        https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf
      • Increase In Lumma Stealer Activity Coincides With Use Of Adaptive Browser Fingerprinting Tactics
        "In the wake of a targeted doxxing campaign last month that exposed the alleged core members of Lumma Stealer (which Trend Micro tracks as Water Kurita), the underground infostealer landscape experienced a significant upheaval. As detailed in Trend™ Research’s previous report, this exposure led to a marked decline in Lumma Stealer's activity, with many of its customers migrating to rival platforms such as Vidar and StealC. However, recent observations from our telemetry indicate a resurgence in Lumma Stealer activity, accompanied by notable changes in its command-and-control (C&C) behaviors, particularly the introduction of browser fingerprinting techniques."
        https://www.trendmicro.com/en_us/research/25/k/lumma-stealer-browser-fingerprinting.html

      Breaches/Hacks/Leaks

      • Washington Post Data Breach Impacts Nearly 10K Employees, Contractors
        "The Washington Post is notifying nearly 10,000 employees and contractors that some of their personal and financial data has been exposed in the Oracle data theft attack. The news organization is one of the largest daily newspapers in the U.S. with approximately 2.5 million digital subscribers. Between July 10 and August 22, threat actors accessed parts of its network. They leveraged a vulnerability in Oracle E-Business Suite software that was a zero-day at the time to steal sensitive data."
        https://www.bleepingcomputer.com/news/security/washington-post-data-breach-impacts-nearly-10k-employees-contractors/
        https://cyberscoop.com/washington-post-oracle-clop-attacks/
        https://www.theregister.com/2025/11/13/washington_post_clop/

      General News

      • Police Disrupts Rhadamanthys, VenomRAT, And Elysium Malware Operations
        "Law enforcement authorities from nine countries have taken down over 1,000 servers used by the Rhadamanthys infolstealer, VenomRAT, and Elysium botnet malware operations in the latest phase of Operation Endgame, an international action targeting cybercrime. The joint action, coordinated by Europol and Eurojust, was also supported by multiple private partners, including Cryptolaemus, Shadowserver, Spycloud, Cymru, Proofpoint, CrowdStrike, Lumen, Abuse.ch, HaveIBeenPwned, Spamhaus, DIVD, and Bitdefender. Between 10 and 14 November 2025, police officers conducted searches at 11 locations in Germany, Greece, and the Netherlands, seized 20 domains, and took down 1,025 servers used by the targeted malware operations."
        https://www.bleepingcomputer.com/news/security/police-disrupts-rhadamanthys-venomrat-and-elysium-malware-operations/
        https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down
        https://www.proofpoint.com/us/blog/threat-insight/operation-endgame-quakes-rhadamanthys
        https://www.proofpoint.com/us/blog/threat-insight/security-brief-venomrat-defanged
        https://therecord.media/operation-endgame-cybercrime-takedowns-rhadamanthys-venomrat-elysium
        https://thehackernews.com/2025/11/operation-endgame-dismantles.html
        https://www.bankinfosecurity.com/operation-endgame-disrupts-more-malware-a-30028
        https://cyberscoop.com/operation-endgame-disrupts-global-malware-networks-rhadamanthys-venomrat-elysium/
        https://www.infosecurity-magazine.com/news/operation-endgame-3-dismantles/
        https://hackread.com/operation-endgame-rhadamanthys-venomrat-elysium-malware/
        https://www.securityweek.com/1000-servers-hit-in-law-enforcement-takedown-of-rhadamanthys-venomrat-elysium/
        https://securityaffairs.com/184581/cyber-crime/a-new-round-of-europols-operation-endgame-dismantled-rhadamanthys-venom-rat-and-elysium-botnet.html
        https://www.theregister.com/2025/11/13/rhadamanthys_takedown/
        https://www.helpnetsecurity.com/2025/11/13/rhadamanthys-infostealer-operation-disrupted/
      • The State Of Ransomware In Q3 2025
        "The ransomware landscape in Q3 2025 has reached a critical inflection point. Despite multiple law enforcement takedowns earlier in the year, ransomware attacks remain at historically high levels. Check Point Research tracked 1,592 new victims across 85 active extortion groups, marking a 25% increase year-over-year. While major brands like RansomHub and 8Base have vanished, new and smaller threat actors have rapidly filled the void, fragmenting the ransomware-as-a-service (RaaS) market more than ever before."
        https://blog.checkpoint.com/research/the-state-of-ransomware-in-q3-2025/
      • October 2025 Attacks Soar 30% As New Groups Redefine The Cyber Battlefield
        "Near-record ransomware attacks and the rise of new threats like Sinobi highlight the need for rapid detection and response. Ransomware attacks soared to the second-highest total on record in October 2025. October’s 623 ransomware attacks were up more than 30% from September, and below only February 2025’s record totals (chart below). It was the sixth consecutive monthly increase in ransomware attacks."
        https://cyble.com/blog/ransomware-attacks-surge-october-2025/
      • Orgs Move To SSO, Passkeys To Solve Bad Password Habits
        "New survey data indicates that organizations are pushing hard for passwordless authentication. A significant chunk of online account passwords in 2025 remain basic and easy to crack — a fact that will surprise few. But last month, Dark Reading asked readers how their organizations are handling password security these days. The results were, perhaps surprisingly, optimistic."
        https://www.darkreading.com/identity-access-management-security/sso-passkeys-password-bad-habits
      • Wanna Bet? Scammers Are Playing The Odds Better Than You Are
        "Placing a bet has never been this easy, and that’s the problem. The convenience of online gambling is the same thing scammers are cashing in on. Whether it’s a fake app, a “can’t-miss” tipster, or a rigged casino, the game is stacked against you. By 2030, the online gambling market is projected to reach around $169 billion. 22 percent of Americans, including 48 percent of men ages 18 to 49, have an account with at least one online sportsbook."
        https://www.helpnetsecurity.com/2025/11/13/cybercrime-online-betting-scams/
      • Automation Can’t Fix Broken Security Basics
        "Most enterprises continue to fall short on basic practices such as patching, access control, and vendor oversight, according to Swimlane’s Cracks in the Foundation: Why Basic Security Still Fails report. Leadership often focuses on broad resilience goals while the day-to-day work that supports them remains inconsistent and underfunded."
        https://www.helpnetsecurity.com/2025/11/13/swimlane-security-basics-still-broken-report/
      • When Attacks Come Faster Than Patches: Why 2026 Will Be The Year Of Machine-Speed Security
        "Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new announcement now triggers a global race between attackers and defenders. Both sides monitor the same feeds, but one moves at machine speed while the other moves at human speed."
        https://thehackernews.com/2025/11/when-attacks-come-faster-than-patches.html

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 6d47d5bd-2a77-464f-b36e-565f9e49bfac-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เผยแพร่คำแนะนำด้านระบบควบคุมอุตสาหกรรม (ICS) จำนวน 18 รายการ

      Cybersecurity and Infrastructure Security Agency (CISA) ได้เผยแพร่คำแนะนำเกี่ยวกับระบบควบคุมอุตสาหกรรม (ICS) จำนวน 18 รายการ เมื่อวันที่ 13 พฤศจิกายน 2025 พื่อให้ข้อมูลที่ทันเวลาเกี่ยวกับประเด็นด้านความมั่นคงปลอดภัย ช่องโหว่ และการโจมตีที่เกี่ยวข้องกับระบบ ICS โดยมีรายละเอียดดังนี้

      ICSA-25-317-01 Mitsubishi Electric MELSEC iQ-F Series
      ICSA-25-317-02 AVEVA Application Server IDE
      ICSA-25-317-03 AVEVA Edge
      ICSA-25-317-04 Brightpick Mission Control / Internal Logic Control
      ICSA-25-317-05 Rockwell Automation Verve Asset Manager
      ICSA-25-317-06 Rockwell Automation Studio 5000 Simulation Interface
      ICSA-25-317-07 Rockwell Automation FactoryTalk DataMosaix Private Cloud
      ICSA-25-317-08 General Industrial Controls Lynx+ Gateway
      ICSA-25-317-09 Rockwell Automation FactoryTalk Policy Manager
      ICSA-25-317-10 Rockwell Automation AADvance-Trusted SIS Workstation
      ICSA-25-317-11 Siemens SICAM P850 family and SICAM P855 family
      ICSA-25-317-12 Siemens Spectrum Power 4
      ICSA-25-317-13 Siemens LOGO! 8 BM Devices
      ICSA-25-317-14 Siemens Solid Edge
      ICSA-25-317-15 Siemens COMOS
      ICSA-25-317-16 Siemens Altair Grid Engine
      ICSA-25-317-17 Siemens Software Center and Solid Edge
      ICSA-25-273-04 Festo Controller CECC-S,-LK,-D Family Firmware (Update A)

      CISA แนะนำให้ผู้ใช้งานและผู้ดูแลระบบ ตรวจสอบคำแนะนำ ICS ที่เผยแพร่ล่าสุด เพื่อศึกษารายละเอียดทางเทคนิคและแนวทางการลดความเสี่ยง (mitigations)

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2025/11/13/cisa-releases-18-industrial-control-systems-advisories
      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 0feca571-8690-4135-8d20-151e15820829-image.png

      โพสต์ใน OT Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 13 November 2025

      Financial Sector

      • Hidden Risks In The Financial Sector’s Supply Chain
        "When a cyber attack hits a major bank or trading platform, attention usually turns to the institution. But new research suggests the real danger may lie elsewhere. BitSight researchers found that many of the technology providers serving the financial sector have weaker cybersecurity performance than the institutions they support. For the Exposed Cyber Risk in the Financial Sector and its Supply Chain report, researchers analyzed more than 41,000 financial organizations and over 50,000 relationships with third-party technology providers. The results point to dependencies, uneven monitoring, and gaps in risk management across the sector’s digital supply chain."
        https://www.helpnetsecurity.com/2025/11/11/hidden-financial-sector-cyber-risk/

      Vulnerabilities

      • Synology Fixes BeeStation Zero-Days Demoed At Pwn2Own Ireland
        "Synology has addressed a critical-severity remote code execution (RCE) vulnerability in BeeStation products that was demonstrated at the recent Pwn2Own hacking competition. The security issue (CVE-2025-12686) is described as a ‘buffer copy without checking the size of input’ problem, and can be exploited to allow arbitrary code execution. It impacts multiple versions of BeeStation OS, the software powering Synology’s network-attached storage (NAS) devices marketed as a consumer-oriented “personal cloud.”"
        https://www.bleepingcomputer.com/news/security/synology-fixes-beestation-zero-days-demoed-at-pwn2own-ireland/
        https://www.synology.com/en-us/security/advisory/Synology_SA_25_12
      • SAP Fixes Hardcoded Credentials Flaw In SQL Anywhere Monitor
        "SAP has released its November security updates that address multiple security vulnerabilities, including a maximum severity flaw in the non-GUI variant of the SQL Anywhere Monitor and a critical code injection issue in the Solution Manager platform. The security problem in SQL Anywhere Monitor is tracked as CVE-2025-42890 and consists of hardcoded credentials. Because of the elevated risk, the vulnerability received the maximum severity score of 10.0. "SQL Anywhere Monitor (Non-GUI) baked credentials into the code, exposing the resources or functionality to unintended users and providing attackers with the possibility of arbitrary code execution," reads the description for the flaw."
        https://www.bleepingcomputer.com/news/security/sap-fixes-hardcoded-credentials-flaw-in-sql-anywhere-monitor/
        https://www.securityweek.com/sap-patches-critical-flaws-in-sql-anywhere-monitor-solution-manager/
        https://securityaffairs.com/184500/security/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere-monitor.html
      • Microsoft November 2025 Patch Tuesday Fixes 1 Zero-Day, 63 Flaws
        "Today is Microsoft's November 2025 Patch Tuesday, which includes security updates for 63 flaws, including one actively exploited zero-day vulnerability. This Patch Tuesday also addresses four "Critical" vulnerabilities, two of which are remote code execution vulnerabilities, one is an elevation of privileges, and the fourth is an information disclosure flaw."
        https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2025-patch-tuesday-fixes-1-zero-day-63-flaws/
        https://blog.talosintelligence.com/microsoft-patch-tuesday-november-2025/
        https://www.darkreading.com/vulnerabilities-threats/patch-now-microsoft-zero-day-critical-zero-click-bugs
        https://cyberscoop.com/microsoft-patch-tuesday-november-2025/
        https://www.securityweek.com/microsoft-patches-actively-exploited-windows-kernel-zero-day/
      • Adobe Patches 29 Vulnerabilities
        "Adobe’s latest round of Patch Tuesday updates addresses 29 vulnerabilities across the company’s InDesign, InCopy, Photoshop, Illustrator, Pass, Substance 3D Stager, and Format Plugins products. Critical vulnerabilities that can be exploited for arbitrary code execution have been addressed in InDesign, InCopy, Photoshop, Illustrator, Substance 3D Stager, and Format Plugins. A critical security bypass issue has been resolved in Pass. It’s worth noting that Adobe assigns a ‘critical’ severity to issues that, based on their CVSS score, have a ‘high’ severity rating."
        https://www.securityweek.com/adobe-patches-29-vulnerabilities/

      Malware

      • You Thought It Was Over? Authentication Coercion Keeps Evolving
        "Imagine a scenario where malicious actors don’t need to trick you into giving up your password. They have no need to perform sophisticated social engineering attacks or exploit vulnerabilities in your operating system. Instead, they can simply force your computer to authenticate to an attacker-controlled system, effectively commanding your machine to hand over valuable credentials. This attack method is called authentication coercion."
        https://unit42.paloaltonetworks.com/authentication-coercion/
      • How a CPU Spike Led To Uncovering a RansomHub Ransomware Attack
        "Varonis recently helped a customer who observed a spike in CPU activity on a server in their environment, where a shallow review of the device revealed an in-progress compromise by an advanced threat actor we later attributed to RansomHub affiliates. Over the next 48 hours, our team worked closely with the customer to investigate, hunt, contain, and remediate the threat before it could become ransomware. Due to our team's advanced intervention capabilities, we secured the customer’s network with zero business downtime. Continue reading to see how the incident started."
        https://www.bleepingcomputer.com/news/security/how-a-cpu-spike-led-to-uncovering-a-ransomhub-ransomware-attack/
      • Malicious NPM Package Found Targeting GitHub By Typosquatting On GitHub Action Packages
        "On Friday 7th November Veracode Threat Research identified a malicious npm package “@acitons/artifact”, that was typosquatting on the legitimate package @actions/artifact, which has accumulated over 206k downloads. The malicious package appeared to be targeting GitHub-owned repositories. We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish new malicious artifacts as GitHub."
        https://www.veracode.com/blog/malicious-npm-package-targeting-github-actions/
        https://thehackernews.com/2025/11/researchers-detect-malicious-npm.html
        https://hackread.com/fake-npm-package-downloads-github-credentials/
      • How Credentials Get Stolen In Seconds, Even With a Script-Kiddie-Level Phish
        "This attempt to phish credentials caught our attention, mostly because of its front-end simplicity. Even though this is a script-kiddie-level type of attack, we figured it was worth writing up—precisely because it’s so easy to follow what they’re up to. The email is direct and to the point. Not a lot of social engineering happening here."
        https://www.malwarebytes.com/blog/threat-intel/2025/11/how-credentials-get-stolen-in-seconds-even-with-a-script-kiddie-level-phish
      • Maverick And Coyote: Analyzing The Link Between Two Evolving Brazilian Banking Trojans
        "The CyberProof SOC Team and Threat Hunters responded to an incident involving a suspicious file download spotted through the messaging application WhatsApp. Further investigation helped uncover more related incidents, however the complete infection chain could not be observed or additional files from Command and control failed to deliver in our investigations. VirusTotal hunting of similar files helped us collect more files tied to this Brazilian targeting campaign and we found our analysis related to public research tied to Maverick banking trojan by Kaspersky, WhatsApp worm by Sophos and Sorvepotel by TrendMicro. We saw good number of similarities with the earlier reported Coyote banking malware campaign programmed to target the Brazilian region."
        https://www.cyberproof.com/blog/maverick-and-coyote-analyzing-the-link-between-two-evolving-brazilian-banking-trojans/
        https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html
      • Rhadamanthys Infostealer Disrupted As Cybercriminals Lose Server Access
        "The Rhadamanthys infostealer operation has been disrupted, with numerous “customers” of the malware-as-a-service reporting that they no longer have access to their servers. Rhadamanthys is an infostealer malware that steals credentials and authentication cookies from browsers, email clients, and other applications. It is commonly distributed through campaigns promoted as software cracks, YouTube videos, or malicious search advertisements. The malware is offered on a subscription model, where cybercriminals pay the developer a monthly fee for access to the malware, support, and a web panel used to collect stolen data."
        https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/

      Breaches/Hacks/Leaks

      • GlobalLogic Warns 10,000 Employees Of Data Theft After Oracle Breach
        "GlobalLogic, a provider of digital engineering services part of the Hitachi group, is notifying over 10,000 current and former employees that their data was stolen in an Oracle E-Business Suite (EBS) data breach. Based in Santa Clara, California, this software and product development services company was founded in 2000. Since then, it has expanded to 59 product engineering centers and several offices worldwide. In a breach notification letter filed with the office of Maine's Attorney General, the company states that the attackers exploited an Oracle EBS zero-day vulnerability to steal personal information belonging to 10,471 employees."
        https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/
        https://cyberscoop.com/globallogic-oracle-clop-attacks/
        https://www.theregister.com/2025/11/11/hitachiowned_globallogic_admits_data_stolen/
      • Cl0p Ransomware Lists NHS UK As Victim, Days After Washington Post Breach
        "Cl0p is claiming responsibility for a new data breach affecting the National Health Service (NHS UK). On November 11, 2026, the ransomware group posted on its dark web leak site, accusing the healthcare provider of neglecting its security, stating, “The company doesn’t care about its customers; it ignored their security.” Although the group has not revealed the volume of stolen data, the announcement aligns with ongoing attacks and reports pointing out CL0p of exploiting vulnerabilities in Oracle’s E-Business Suite (EBS)."
        https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/
      • Have I Been Pwned Adds 1.96B Accounts From Synthient Credential Data
        "Have I Been Pwned (HIBP), the popular breach notification service, has added another massive dataset to its platform. This time, 1.96 billion accounts connected to the Synthient Credential Stuffing Threat Data, in collaboration with the threat-intelligence firm Synthient. Users who subscribe to HIBP alerts, including this writer, received an email notification stating: “You’ve been pwned in the Synthient Credential Stuffing Threat Data data breach.”"
        https://hackread.com/have-i-been-pwned-synthient-credential-data-accounts/

      General News

      • Who Owns The Cybersecurity Of Space?
        "As a cybersecurity professional, I have spent decades watching humanity build digital castles without moats. We did it with the internet, with artificial intelligence and with critical infrastructure. Now, we are doing it again, this time in orbit. We are racing to commercialize space to connect the unconnected and monetize orbit, yet we are ignoring the most important question: Who owns the cybersecurity of space?"
        https://www.bankinfosecurity.com/blogs/who-owns-cybersecurity-space-p-3971
      • To Get Funding, CISOs Are Mastering The Language Of Money
        "In this Help Net Security interview, Chris Wheeler, CISO at Resilience, talks about how CISOs are managing changing cybersecurity budgets. While overall spending is up, many say the increases don’t match their most pressing needs. Wheeler explains how organizations are reallocating funds, measuring ROI, and linking cybersecurity plans to business goals."
        https://www.helpnetsecurity.com/2025/11/11/chris-wheeler-resilience-cisos-cybersecurity-budgets/
      • How Far Can Police Push Privacy Before It Breaks
        "Police use drones, body cameras, and license plate readers as part of their daily work. Supporters say these tools make communities safer. Critics see something different, a system that collects too much data and opens the door to abuse. When surveillance expands without public oversight, civil liberties start to slip away, especially for people who already face bias and discrimination."
        https://www.helpnetsecurity.com/2025/11/11/police-surveillance-privacy-risks/
      • CISOs Are Cracking Under Pressure
        "Cybersecurity leaders are hitting their limit. A new report from Nagomi Security shows that most CISOs are stretched thin, dealing with nonstop incidents, too many tools, and growing pressure from their boards. The pressures are so intense that many say they are burned out and thinking about walking away. The personal cost is beginning to affect business readiness. Nearly half said burnout has already hurt their ability to prepare for breaches. The researchers warn that when leaders reach this point, the entire organization becomes more vulnerable."
        https://www.helpnetsecurity.com/2025/11/11/stress-ciso-burnout-crisis/
      • AI Browsers Are Rapidly Becoming Major Risk To Cybersecurity
        "As a new type of browser infused with artificial intelligence (AI) capabilities start to become more widely available, significant security concerns are starting to emerge. Like most AI tools, this new type of browser is susceptible to prompt injection attacks. However, the issue is these AI browsers are being connected to a wide range of applications that make it possible to extend the reach of a prompt injection attack well beyond the browser."
        https://blog.barracuda.com/2025/11/10/ai-browsers-major-risk-cybersecurity
      • “Bitcoin Queen” Gets 11 Years In Prison For $7.3 Billion Bitcoin Scam
        "A Chinese woman known as the "Bitcoin Queen" was sentenced in London to 11 years and eight months in jail for laundering Bitcoin from a £5.5 billion ($7.3 billion) cryptocurrency investment scheme. The sentence follows a seven-year investigation by the Met's Economic Crime team into international money laundering, which revealed that the 47-year-old woman, Zhimin Qian (also known as Yadi Zhang), was the head of a large-scale fraud campaign that defrauded over 128,000 victims in China between 2014 and 2017. This action also led to the seizure of 61,000 Bitcoin worth hundreds of millions of pounds at the time and now valued at roughly £5.5 billion, the largest cryptocurrency seizure in Britain's history."
        https://www.bleepingcomputer.com/news/security/bitcoin-queen-gets-11-years-in-prison-for-73-billion-bitcoin-scam/
      • Global Cyber Attacks Surge In October 2025 Amid Explosive Ransomware Growth And Rising GenAI Threats
        "In October 2025, the global volume of cyber attacks continued its upward trajectory. Organizations worldwide experienced an average of 1,938 cyber attacks per week, marking a 2% increase from September and a 5% rise compared to October 2024. Check Point Research data reveals that this steady escalation underscores a persistent and evolving cyber threat landscape fuelled by the growing sophistication of ransomware operations and the expanding risks associated with the adoption of generative AI (GenAI)."
        https://blog.checkpoint.com/research/global-cyber-attacks-surge-in-october-2025-amid-explosive-ransomware-growth-and-rising-genai-threats/
      • Grandparents To C-Suite: Elder Fraud Reveals Gaps In Human-Centered Cybersecurity
        "A retiree answers the phone one afternoon and hears what sounds unmistakably like her grandson's voice. He says he's been in an accident and needs money right away. The caller knows her name, her town, and details about the family. Panicked, she sends the funds — only later learning that the voice was generated by artificial intelligence and the personal information came from publicly available data online."
        https://www.darkreading.com/cyber-risk/grandparents-to-c-suite-elder-fraud-reveals-gaps-in-human-centered-cybersecurity
      • Qilin Ransomware Activity Surges As Attacks Target Small Businesses
        "A rise in ransomware incidents linked to the Qilin ransomware group, one of the longest-running ransomware-as-a-service (RaaS) operations, has been observed by cybersecurity researchers. According to S-RM’s latest intelligence, Qilin continues to exploit weaknesses such as unpatched VPN appliances, lack of multi-factor authentication (MFA) and exposed management interfaces to gain initial access to corporate networks."
        https://www.infosecurity-magazine.com/news/qilin-ransomware-activity-surges/
      • Cyber Insurers Paid Out Over Twice As Much For UK Ransomware Attacks Last Year
        "The number of successful cyber insurance claims made by UK organizations shot up last year, according to the latest figures from the industry's trade association. The Association of British Insurers (ABI) said £197 million ($259 million) in cyber insurance payouts were made to victimized organizations in 2024, up from £59 million ($77 million) in 2023."
        https://www.theregister.com/2025/11/11/ransomware_surge_fuels_230_increase/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) f18ca7b7-96e0-4a74-b92c-8864ede8f966-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เพิ่มช่องโหว่ที่ถูกใช้โจมตี 3 รายการลงในแคตตาล็อก

      เมื่อวันที่ 12 พฤศจิกายน 2025 Cybersecurity and Infrastructure Security Agency (CISA) ได้เพิ่มช่องโหว่ใหม่ 3 รายการลงในแคตตาล็อก Known Exploited Vulnerabilities (KEV) จากหลักฐานที่พบว่ามีการโจมตีใช้งานจริงแล้ว ดังนี้

      • CVE-2025-9242 WatchGuard Firebox Out-of-Bounds Write Vulnerability
      • CVE-2025-12480 Gladinet Triofox Improper Access Control Vulnerability
      • CVE-2025-62215 Microsoft Windows Race Condition Vulnerability

      ช่องโหว่ประเภทนี้มักถูกใช้เป็นช่องทางการโจมตีโดยผู้ไม่หวังดี และก่อให้เกิดความเสี่ยงร้ายแรงต่อเครือข่ายของหน่วยงานรัฐบาลกลาง

      ทั้งนี้ คำสั่ง BOD 22-01 ของ CISA กำหนดให้มี แคตตาล็อก Known Exploited Vulnerabilities (KEV) เพื่อรวบรวมช่องโหว่ (CVEs) ที่มีความเสี่ยงสูงและถูกใช้งานโจมตีจริง หน่วยงาน Federal Civilian Executive Branch (FCEB) ต้องดำเนินการแก้ไขช่องโหว่ที่ระบุภายในเวลาที่กำหนด เพื่อปกป้องเครือข่ายจากภัยคุกคาม

      ทาง CISA จะปรับปรุงและเพิ่มช่องโหว่ใหม่เข้าสู่แคตตาล็อก KEV อย่างต่อเนื่อง เพื่อให้ครอบคลุมความเสี่ยงที่ตรวจพบจริงในปัจจุบันและอนาคต

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2025/11/12/cisa-adds-three-known-exploited-vulnerabilities-catalog
      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand f17b5893-7b5d-4ed1-9220-d11a409a29ac-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 12 November 2025

      Financial Sector

      • Hidden Risks In The Financial Sector’s Supply Chain
        "When a cyber attack hits a major bank or trading platform, attention usually turns to the institution. But new research suggests the real danger may lie elsewhere. BitSight researchers found that many of the technology providers serving the financial sector have weaker cybersecurity performance than the institutions they support. For the Exposed Cyber Risk in the Financial Sector and its Supply Chain report, researchers analyzed more than 41,000 financial organizations and over 50,000 relationships with third-party technology providers. The results point to dependencies, uneven monitoring, and gaps in risk management across the sector’s digital supply chain."
        https://www.helpnetsecurity.com/2025/11/11/hidden-financial-sector-cyber-risk/

      Vulnerabilities

      • Synology Fixes BeeStation Zero-Days Demoed At Pwn2Own Ireland
        "Synology has addressed a critical-severity remote code execution (RCE) vulnerability in BeeStation products that was demonstrated at the recent Pwn2Own hacking competition. The security issue (CVE-2025-12686) is described as a ‘buffer copy without checking the size of input’ problem, and can be exploited to allow arbitrary code execution. It impacts multiple versions of BeeStation OS, the software powering Synology’s network-attached storage (NAS) devices marketed as a consumer-oriented “personal cloud.”"
        https://www.bleepingcomputer.com/news/security/synology-fixes-beestation-zero-days-demoed-at-pwn2own-ireland/
        https://www.synology.com/en-us/security/advisory/Synology_SA_25_12
      • SAP Fixes Hardcoded Credentials Flaw In SQL Anywhere Monitor
        "SAP has released its November security updates that address multiple security vulnerabilities, including a maximum severity flaw in the non-GUI variant of the SQL Anywhere Monitor and a critical code injection issue in the Solution Manager platform. The security problem in SQL Anywhere Monitor is tracked as CVE-2025-42890 and consists of hardcoded credentials. Because of the elevated risk, the vulnerability received the maximum severity score of 10.0. "SQL Anywhere Monitor (Non-GUI) baked credentials into the code, exposing the resources or functionality to unintended users and providing attackers with the possibility of arbitrary code execution," reads the description for the flaw."
        https://www.bleepingcomputer.com/news/security/sap-fixes-hardcoded-credentials-flaw-in-sql-anywhere-monitor/
        https://www.securityweek.com/sap-patches-critical-flaws-in-sql-anywhere-monitor-solution-manager/
        https://securityaffairs.com/184500/security/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere-monitor.html
      • Microsoft November 2025 Patch Tuesday Fixes 1 Zero-Day, 63 Flaws
        "Today is Microsoft's November 2025 Patch Tuesday, which includes security updates for 63 flaws, including one actively exploited zero-day vulnerability. This Patch Tuesday also addresses four "Critical" vulnerabilities, two of which are remote code execution vulnerabilities, one is an elevation of privileges, and the fourth is an information disclosure flaw."
        https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2025-patch-tuesday-fixes-1-zero-day-63-flaws/
        https://blog.talosintelligence.com/microsoft-patch-tuesday-november-2025/
        https://www.darkreading.com/vulnerabilities-threats/patch-now-microsoft-zero-day-critical-zero-click-bugs
        https://cyberscoop.com/microsoft-patch-tuesday-november-2025/
        https://www.securityweek.com/microsoft-patches-actively-exploited-windows-kernel-zero-day/
      • Adobe Patches 29 Vulnerabilities
        "Adobe’s latest round of Patch Tuesday updates addresses 29 vulnerabilities across the company’s InDesign, InCopy, Photoshop, Illustrator, Pass, Substance 3D Stager, and Format Plugins products. Critical vulnerabilities that can be exploited for arbitrary code execution have been addressed in InDesign, InCopy, Photoshop, Illustrator, Substance 3D Stager, and Format Plugins. A critical security bypass issue has been resolved in Pass. It’s worth noting that Adobe assigns a ‘critical’ severity to issues that, based on their CVSS score, have a ‘high’ severity rating."
        https://www.securityweek.com/adobe-patches-29-vulnerabilities/

      Malware

      • You Thought It Was Over? Authentication Coercion Keeps Evolving
        "Imagine a scenario where malicious actors don’t need to trick you into giving up your password. They have no need to perform sophisticated social engineering attacks or exploit vulnerabilities in your operating system. Instead, they can simply force your computer to authenticate to an attacker-controlled system, effectively commanding your machine to hand over valuable credentials. This attack method is called authentication coercion."
        https://unit42.paloaltonetworks.com/authentication-coercion/
      • How a CPU Spike Led To Uncovering a RansomHub Ransomware Attack
        "Varonis recently helped a customer who observed a spike in CPU activity on a server in their environment, where a shallow review of the device revealed an in-progress compromise by an advanced threat actor we later attributed to RansomHub affiliates. Over the next 48 hours, our team worked closely with the customer to investigate, hunt, contain, and remediate the threat before it could become ransomware. Due to our team's advanced intervention capabilities, we secured the customer’s network with zero business downtime. Continue reading to see how the incident started."
        https://www.bleepingcomputer.com/news/security/how-a-cpu-spike-led-to-uncovering-a-ransomhub-ransomware-attack/
      • Malicious NPM Package Found Targeting GitHub By Typosquatting On GitHub Action Packages
        "On Friday 7th November Veracode Threat Research identified a malicious npm package “@acitons/artifact”, that was typosquatting on the legitimate package @actions/artifact, which has accumulated over 206k downloads. The malicious package appeared to be targeting GitHub-owned repositories. We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish new malicious artifacts as GitHub."
        https://www.veracode.com/blog/malicious-npm-package-targeting-github-actions/
        https://thehackernews.com/2025/11/researchers-detect-malicious-npm.html
        https://hackread.com/fake-npm-package-downloads-github-credentials/
      • How Credentials Get Stolen In Seconds, Even With a Script-Kiddie-Level Phish
        "This attempt to phish credentials caught our attention, mostly because of its front-end simplicity. Even though this is a script-kiddie-level type of attack, we figured it was worth writing up—precisely because it’s so easy to follow what they’re up to. The email is direct and to the point. Not a lot of social engineering happening here."
        https://www.malwarebytes.com/blog/threat-intel/2025/11/how-credentials-get-stolen-in-seconds-even-with-a-script-kiddie-level-phish
      • Maverick And Coyote: Analyzing The Link Between Two Evolving Brazilian Banking Trojans
        "The CyberProof SOC Team and Threat Hunters responded to an incident involving a suspicious file download spotted through the messaging application WhatsApp. Further investigation helped uncover more related incidents, however the complete infection chain could not be observed or additional files from Command and control failed to deliver in our investigations. VirusTotal hunting of similar files helped us collect more files tied to this Brazilian targeting campaign and we found our analysis related to public research tied to Maverick banking trojan by Kaspersky, WhatsApp worm by Sophos and Sorvepotel by TrendMicro. We saw good number of similarities with the earlier reported Coyote banking malware campaign programmed to target the Brazilian region."
        https://www.cyberproof.com/blog/maverick-and-coyote-analyzing-the-link-between-two-evolving-brazilian-banking-trojans/
        https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html
      • Rhadamanthys Infostealer Disrupted As Cybercriminals Lose Server Access
        "The Rhadamanthys infostealer operation has been disrupted, with numerous “customers” of the malware-as-a-service reporting that they no longer have access to their servers. Rhadamanthys is an infostealer malware that steals credentials and authentication cookies from browsers, email clients, and other applications. It is commonly distributed through campaigns promoted as software cracks, YouTube videos, or malicious search advertisements. The malware is offered on a subscription model, where cybercriminals pay the developer a monthly fee for access to the malware, support, and a web panel used to collect stolen data."
        https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/

      Breaches/Hacks/Leaks

      • GlobalLogic Warns 10,000 Employees Of Data Theft After Oracle Breach
        "GlobalLogic, a provider of digital engineering services part of the Hitachi group, is notifying over 10,000 current and former employees that their data was stolen in an Oracle E-Business Suite (EBS) data breach. Based in Santa Clara, California, this software and product development services company was founded in 2000. Since then, it has expanded to 59 product engineering centers and several offices worldwide. In a breach notification letter filed with the office of Maine's Attorney General, the company states that the attackers exploited an Oracle EBS zero-day vulnerability to steal personal information belonging to 10,471 employees."
        https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/
        https://cyberscoop.com/globallogic-oracle-clop-attacks/
        https://www.theregister.com/2025/11/11/hitachiowned_globallogic_admits_data_stolen/
      • Cl0p Ransomware Lists NHS UK As Victim, Days After Washington Post Breach
        "Cl0p is claiming responsibility for a new data breach affecting the National Health Service (NHS UK). On November 11, 2026, the ransomware group posted on its dark web leak site, accusing the healthcare provider of neglecting its security, stating, “The company doesn’t care about its customers; it ignored their security.” Although the group has not revealed the volume of stolen data, the announcement aligns with ongoing attacks and reports pointing out CL0p of exploiting vulnerabilities in Oracle’s E-Business Suite (EBS)."
        https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/
      • Have I Been Pwned Adds 1.96B Accounts From Synthient Credential Data
        "Have I Been Pwned (HIBP), the popular breach notification service, has added another massive dataset to its platform. This time, 1.96 billion accounts connected to the Synthient Credential Stuffing Threat Data, in collaboration with the threat-intelligence firm Synthient. Users who subscribe to HIBP alerts, including this writer, received an email notification stating: “You’ve been pwned in the Synthient Credential Stuffing Threat Data data breach.”"
        https://hackread.com/have-i-been-pwned-synthient-credential-data-accounts/

      General News

      • Who Owns The Cybersecurity Of Space?
        "As a cybersecurity professional, I have spent decades watching humanity build digital castles without moats. We did it with the internet, with artificial intelligence and with critical infrastructure. Now, we are doing it again, this time in orbit. We are racing to commercialize space to connect the unconnected and monetize orbit, yet we are ignoring the most important question: Who owns the cybersecurity of space?"
        https://www.bankinfosecurity.com/blogs/who-owns-cybersecurity-space-p-3971
      • To Get Funding, CISOs Are Mastering The Language Of Money
        "In this Help Net Security interview, Chris Wheeler, CISO at Resilience, talks about how CISOs are managing changing cybersecurity budgets. While overall spending is up, many say the increases don’t match their most pressing needs. Wheeler explains how organizations are reallocating funds, measuring ROI, and linking cybersecurity plans to business goals."
        https://www.helpnetsecurity.com/2025/11/11/chris-wheeler-resilience-cisos-cybersecurity-budgets/
      • How Far Can Police Push Privacy Before It Breaks
        "Police use drones, body cameras, and license plate readers as part of their daily work. Supporters say these tools make communities safer. Critics see something different, a system that collects too much data and opens the door to abuse. When surveillance expands without public oversight, civil liberties start to slip away, especially for people who already face bias and discrimination."
        https://www.helpnetsecurity.com/2025/11/11/police-surveillance-privacy-risks/
      • CISOs Are Cracking Under Pressure
        "Cybersecurity leaders are hitting their limit. A new report from Nagomi Security shows that most CISOs are stretched thin, dealing with nonstop incidents, too many tools, and growing pressure from their boards. The pressures are so intense that many say they are burned out and thinking about walking away. The personal cost is beginning to affect business readiness. Nearly half said burnout has already hurt their ability to prepare for breaches. The researchers warn that when leaders reach this point, the entire organization becomes more vulnerable."
        https://www.helpnetsecurity.com/2025/11/11/stress-ciso-burnout-crisis/
      • AI Browsers Are Rapidly Becoming Major Risk To Cybersecurity
        "As a new type of browser infused with artificial intelligence (AI) capabilities start to become more widely available, significant security concerns are starting to emerge. Like most AI tools, this new type of browser is susceptible to prompt injection attacks. However, the issue is these AI browsers are being connected to a wide range of applications that make it possible to extend the reach of a prompt injection attack well beyond the browser."
        https://blog.barracuda.com/2025/11/10/ai-browsers-major-risk-cybersecurity
      • “Bitcoin Queen” Gets 11 Years In Prison For $7.3 Billion Bitcoin Scam
        "A Chinese woman known as the "Bitcoin Queen" was sentenced in London to 11 years and eight months in jail for laundering Bitcoin from a £5.5 billion ($7.3 billion) cryptocurrency investment scheme. The sentence follows a seven-year investigation by the Met's Economic Crime team into international money laundering, which revealed that the 47-year-old woman, Zhimin Qian (also known as Yadi Zhang), was the head of a large-scale fraud campaign that defrauded over 128,000 victims in China between 2014 and 2017. This action also led to the seizure of 61,000 Bitcoin worth hundreds of millions of pounds at the time and now valued at roughly £5.5 billion, the largest cryptocurrency seizure in Britain's history."
        https://www.bleepingcomputer.com/news/security/bitcoin-queen-gets-11-years-in-prison-for-73-billion-bitcoin-scam/
      • Global Cyber Attacks Surge In October 2025 Amid Explosive Ransomware Growth And Rising GenAI Threats
        "In October 2025, the global volume of cyber attacks continued its upward trajectory. Organizations worldwide experienced an average of 1,938 cyber attacks per week, marking a 2% increase from September and a 5% rise compared to October 2024. Check Point Research data reveals that this steady escalation underscores a persistent and evolving cyber threat landscape fuelled by the growing sophistication of ransomware operations and the expanding risks associated with the adoption of generative AI (GenAI)."
        https://blog.checkpoint.com/research/global-cyber-attacks-surge-in-october-2025-amid-explosive-ransomware-growth-and-rising-genai-threats/
      • Grandparents To C-Suite: Elder Fraud Reveals Gaps In Human-Centered Cybersecurity
        "A retiree answers the phone one afternoon and hears what sounds unmistakably like her grandson's voice. He says he's been in an accident and needs money right away. The caller knows her name, her town, and details about the family. Panicked, she sends the funds — only later learning that the voice was generated by artificial intelligence and the personal information came from publicly available data online."
        https://www.darkreading.com/cyber-risk/grandparents-to-c-suite-elder-fraud-reveals-gaps-in-human-centered-cybersecurity
      • Qilin Ransomware Activity Surges As Attacks Target Small Businesses
        "A rise in ransomware incidents linked to the Qilin ransomware group, one of the longest-running ransomware-as-a-service (RaaS) operations, has been observed by cybersecurity researchers. According to S-RM’s latest intelligence, Qilin continues to exploit weaknesses such as unpatched VPN appliances, lack of multi-factor authentication (MFA) and exposed management interfaces to gain initial access to corporate networks."
        https://www.infosecurity-magazine.com/news/qilin-ransomware-activity-surges/
      • Cyber Insurers Paid Out Over Twice As Much For UK Ransomware Attacks Last Year
        "The number of successful cyber insurance claims made by UK organizations shot up last year, according to the latest figures from the industry's trade association. The Association of British Insurers (ABI) said £197 million ($259 million) in cyber insurance payouts were made to victimized organizations in 2024, up from £59 million ($77 million) in 2023."
        https://www.theregister.com/2025/11/11/ransomware_surge_fuels_230_increase/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 07398a9d-7cc4-4a42-b6b8-403f38ec686f-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT