NCSA Webboard
    • ล่าสุด
    • แท็ก
    • ฮิต
      • ติดต่อสำนักงาน
    • ลงทะเบียน
    • เข้าสู่ระบบ
    1. หน้าแรก
    2. NCSA_THAICERT
    3. กระทู้
    • รายละเอียด
    • ติดตาม 0
    • คนติดตาม 2
    • กระทู้ 1,639
    • กระทู้ 1,640
    • ดีที่สุด 0
    • Controversial 0
    • กลุ่ม 2

    โพสต์ถูกสร้างโดย NCSA_THAICERT

    • Cyber Threat Intelligence 14 November 2025

      Healthcare Sector

      • Healthcare Security Is Broken Because Its Systems Can’t Talk To Each Other
        "In this Help Net Security interview, Cameron Kracke, CISO at Prime Therapeutics, discusses how the healthcare ecosystem can achieve cohesive security visibility. With hospitals, clinics, telehealth, and cloud partners all in the mix, maintaining visibility remains a complex task. Kracke shares how interoperability, collaboration, and strategic investment can strengthen resilience across the healthcare security landscape."
        https://www.helpnetsecurity.com/2025/11/13/cameron-kracke-prime-therapecutics-healthcare-security-ecosystem/

      Industrial Sector

      • CISA Releases 18 Industrial Control Systems Advisories
        "CISA released 18 Industrial Control Systems (ICS) Advisories. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS."
        https://www.cisa.gov/news-events/alerts/2025/11/13/cisa-releases-18-industrial-control-systems-advisories

      New Tooling

      • Sprout: Open-Source Bootloader Built For Speed And Security
        "Sprout is an open-source bootloader that delivers sub-second boot times and uses a clean, data-driven configuration format that works across operating systems. “We built Sprout because we were frustrated by how fragile and slow traditional bootloaders are,” said Alex Zenla, CTO at Edera. Sprout is designed for modern infrastructure where every second counts. It can boot Linux in under 50 milliseconds, which is critical for autoscaling and deployment in cloud environments."
        https://www.helpnetsecurity.com/2025/11/13/sprout-open-source-bootloader/
        https://github.com/edera-dev/sprout

      Vulnerabilities

      • Firefox 145 And Chrome 142 Patch High-Severity Flaws In Latest Releases
        "Google and Mozilla on Tuesday released fresh updates for Chrome and Firefox to resolve multiple high-severity vulnerabilities. Google announced a Chrome 142 update that resolves a high-severity inappropriate implementation issue in the V8 JavaScript engine. The bug is tracked as CVE-2025-13042. The internet giant has not detailed the flaw, but such V8 defects can typically be exploited remotely to cause denial-of-service (DoS) conditions or for code execution, Hong Kong CERT/CC notes. Google has yet to determine the bug bounty reward for the defect."
        https://www.securityweek.com/firefox-145-and-chrome-142-patch-high-severity-flaws-in-latest-releases/
      • Critical: Remote Code Execution Via Malicious Obfuscated Malware In Imunify360 AV (AI-Bolit)
        "Recently a critical Remote Code Execution issue was patched in the Imunify360 AV product. Imunify360 serves up to 56 million websites. Hosting companies should patch the issue immediately. The information about this vulnerability has been spreading since the end of October, so we also recommend affected hosting companies to check whether their servers have been compromised."
        https://patchstack.com/articles/remote-code-execution-vulnerability-found-in-imunify360/
        https://www.bleepingcomputer.com/news/security/rce-flaw-in-imunifyav-puts-millions-of-linux-hosted-sites-at-risk/
      • When GPTs Call Home: Exploiting SSRF In ChatGPT’s Custom Actions
        "In cybersecurity, you begin to develop a kind of hacker mindset or “sixth sense”. You start seeing the world not just for what it does, but for what it could do. So, when I was building my first custom GPT in ChatGPT and got to the “Actions” section, that sense started tingling! I wasn’t even on a bug hunt, just curious about the custom GPT feature and building a custom assistant. The goal was to have a GPT pull data from my own external API, but once I realized this feature was returning data from a user-provided URL, alarm bells went off and the hacker instinct took over, telling me to check for SSRF."
        https://sirleeroyjenkins.medium.com/when-gpts-call-home-exploiting-ssrf-in-chatgpts-custom-actions-5df9df27dbe9
        https://www.securityweek.com/chatgpt-vulnerability-exposed-underlying-cloud-infrastructure/

      Malware

      • CISA And Partners Release Advisory Update On Akira Ransomware
        "Today, Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation, Department of Defense Cyber Crime Center, Department of Health and Human Services, and international partners, released an updated joint Cybersecurity Advisory, #StopRansomware: Akira Ransomware, to provide network defenders with the latest indicators of compromise, tactics, techniques, and procedures, and detection methods associated with Akira ransomware activity."
        https://www.cisa.gov/news-events/alerts/2025/11/13/cisa-and-partners-release-advisory-update-akira-ransomware
        https://www.bleepingcomputer.com/news/security/cisa-warns-of-akira-ransomware-linux-encryptor-targeting-nutanix-vms/
        https://therecord.media/akira-gang-received-million
        https://cyberscoop.com/akira-ransomware-fbi-cisa-joint-advisory/
      • “IndonesianFoods” Worm Publishes More Than 78,000 Malicious NPM Packages
        "I’ve identified an NPM worm that has published over 78,000 malicious packages to the NPM registry, affecting at least eleven NPM users. This attack focuses on creating new packages rather than stealing credentials or engaging in other, more immediately malicious behaviours. This attack almost doubles the known number of malicious NPM packages."
        https://sourcecodered.com/indonesianfoods-npm-worm/
        https://www.endorlabs.com/learn/the-great-indonesian-tea-theft-analyzing-a-npm-spam-campaign
        https://thehackernews.com/2025/11/over-46000-fake-npm-packages-flood.html
        https://www.bleepingcomputer.com/news/security/new-indonesianfoods-worm-floods-npm-with-100-000-packages/
        https://www.infosecurity-magazine.com/news/indonesianfoods-npm-worm-44000/
        https://www.securityweek.com/tens-of-thousands-of-malicious-npm-packages-distribute-self-replicating-worm/
      • Popular Android-Based Photo Frames Download Malware On Boot
        "Uhale Android-based digital picture frames come with multiple critical security vulnerabilities and some of them download and execute malware at boot time. Mobile security company Quokka conducted an in-depth security assessment on the Uhale app and found behavior suggesting a connection with the Mezmess and Voi1d malware families. The researchers reported the issues to ZEASN (now ‘Whale TV’), the Chinese firm behind the Uhale platform used in the digital picture frames of numerous different brands, but received no reply to multiple notificaitions since May."
        https://www.bleepingcomputer.com/news/security/popular-android-based-photo-frames-download-malware-on-boot/
        https://go.quokka.io/hubfs/App-Intel/Technical_Uhale-Digital-Picture-Frame-Security-Assessment.pdf
      • Unleashing The Kraken Ransomware Group
        "In August 2025, Cisco Talos observed big-game hunting and double extortion attacks carried out by Kraken, a Russian-speaking group that has emerged from the remnants of the HelloKitty ransomware cartel. Talos observed in one intrusion that the Kraken actor exploited Server Message Block (SMB) vulnerabilities for initial access, then used tools like Cloudflared for persistence and SSH Filesystem (SSHFS) for data exfiltration before encryption. Kraken is a cross-platform ransomware with distinct encryptors for Windows, Linux, and VMware ESXi, targeting a wide range of enterprise environments."
        https://blog.talosintelligence.com/kraken-ransomware-group/
      • Uncovering a Multi-Stage Phishing Kit Targeting Italy's Infrastructure
        "Group-IB researchers uncovered a professional phishing framework that mimics trusted brands with remarkable precision. Using layered evasion, CAPTCHA filtering, and Telegram-based data exfiltration, attackers harvest credentials and bypass automated detection. The findings highlight how phishing-as-a-service operations are scaling through automation, lowering technical barriers for cybercriminals, and industrializing one of the oldest yet most effective forms of digital fraud."
        https://www.group-ib.com/blog/uncover-phishing-italy/
        https://therecord.media/phishing-campaign-targets-italian-web-hosting-customers
      • We Opened a Fake Invoice And Fell Down a Retro XWorm-Shaped Wormhole
        "Somebody forwarded an “invoice” email and asked me to check the attachment because it looked suspicious. Good instinct—it was, and what we found inside was a surprisingly old trick hiding a modern threat."
        https://www.malwarebytes.com/blog/threats/2025/11/we-opened-a-fake-invoice-and-fell-down-a-retro-xworm-shaped-wormhole
      • Thousands Of Domains Target Hotel Guests In Massive Phishing Campaign
        "A Russian-speaking threat actor operating an ongoing, mass phishing campaign targeting people who might be planning (or about to leave for) a vacation has registered more than 4,300 domain names used in the attacks since the beginning of the year. The ongoing campaign employs a sophisticated phishing kit that customizes the page presented to the site visitor depending on a unique string in the URL path when the target first visits the website. The customizations use the logos from major online travel industry brands, including Airbnb and Booking.com."
        https://www.netcraft.com/blog/thousands-of-domains-target-hotel-guests-in-massive-phishing-campaign
        https://thehackernews.com/2025/11/russian-hackers-create-4300-fake-travel.html
      • Malicious Chrome Extension Exfiltrates Seed Phrases, Enabling Wallet Takeover
        "Socket’s Threat Research Team uncovered the malicious Chrome extension Safery: Ethereum Wallet, published on November 12, 2024. Marketed as a simple, secure Ethereum (ETH) wallet, it contains a backdoor that exfiltrates seed phrases by encoding them into Sui addresses and broadcasting microtransactions from a threat actor-controlled Sui wallet."
        https://socket.dev/blog/malicious-chrome-extension-exfiltrates-seed-phrases
        https://thehackernews.com/2025/11/fake-chrome-extension-safery-steals.html
        https://securityaffairs.com/184585/malware/chrome-extension-safery-steals-ethereum-wallet-seed-phrases.html
      • Chinese Spies Told Claude To Break Into About 30 Critical Orgs. Some Attacks Succeeded
        "Chinese cyber spies used Anthropic's Claude Code AI tool to attempt digital break-ins at about 30 high-profile companies and government organizations – and the government-backed snoops "succeeded in a small number of cases," according to a Thursday report from the AI company. The mid-September operation targeted large tech companies, financial institutions, chemical manufacturers, and government agencies."
        https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/
        https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf
      • Increase In Lumma Stealer Activity Coincides With Use Of Adaptive Browser Fingerprinting Tactics
        "In the wake of a targeted doxxing campaign last month that exposed the alleged core members of Lumma Stealer (which Trend Micro tracks as Water Kurita), the underground infostealer landscape experienced a significant upheaval. As detailed in Trend™ Research’s previous report, this exposure led to a marked decline in Lumma Stealer's activity, with many of its customers migrating to rival platforms such as Vidar and StealC. However, recent observations from our telemetry indicate a resurgence in Lumma Stealer activity, accompanied by notable changes in its command-and-control (C&C) behaviors, particularly the introduction of browser fingerprinting techniques."
        https://www.trendmicro.com/en_us/research/25/k/lumma-stealer-browser-fingerprinting.html

      Breaches/Hacks/Leaks

      • Washington Post Data Breach Impacts Nearly 10K Employees, Contractors
        "The Washington Post is notifying nearly 10,000 employees and contractors that some of their personal and financial data has been exposed in the Oracle data theft attack. The news organization is one of the largest daily newspapers in the U.S. with approximately 2.5 million digital subscribers. Between July 10 and August 22, threat actors accessed parts of its network. They leveraged a vulnerability in Oracle E-Business Suite software that was a zero-day at the time to steal sensitive data."
        https://www.bleepingcomputer.com/news/security/washington-post-data-breach-impacts-nearly-10k-employees-contractors/
        https://cyberscoop.com/washington-post-oracle-clop-attacks/
        https://www.theregister.com/2025/11/13/washington_post_clop/

      General News

      • Police Disrupts Rhadamanthys, VenomRAT, And Elysium Malware Operations
        "Law enforcement authorities from nine countries have taken down over 1,000 servers used by the Rhadamanthys infolstealer, VenomRAT, and Elysium botnet malware operations in the latest phase of Operation Endgame, an international action targeting cybercrime. The joint action, coordinated by Europol and Eurojust, was also supported by multiple private partners, including Cryptolaemus, Shadowserver, Spycloud, Cymru, Proofpoint, CrowdStrike, Lumen, Abuse.ch, HaveIBeenPwned, Spamhaus, DIVD, and Bitdefender. Between 10 and 14 November 2025, police officers conducted searches at 11 locations in Germany, Greece, and the Netherlands, seized 20 domains, and took down 1,025 servers used by the targeted malware operations."
        https://www.bleepingcomputer.com/news/security/police-disrupts-rhadamanthys-venomrat-and-elysium-malware-operations/
        https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down
        https://www.proofpoint.com/us/blog/threat-insight/operation-endgame-quakes-rhadamanthys
        https://www.proofpoint.com/us/blog/threat-insight/security-brief-venomrat-defanged
        https://therecord.media/operation-endgame-cybercrime-takedowns-rhadamanthys-venomrat-elysium
        https://thehackernews.com/2025/11/operation-endgame-dismantles.html
        https://www.bankinfosecurity.com/operation-endgame-disrupts-more-malware-a-30028
        https://cyberscoop.com/operation-endgame-disrupts-global-malware-networks-rhadamanthys-venomrat-elysium/
        https://www.infosecurity-magazine.com/news/operation-endgame-3-dismantles/
        https://hackread.com/operation-endgame-rhadamanthys-venomrat-elysium-malware/
        https://www.securityweek.com/1000-servers-hit-in-law-enforcement-takedown-of-rhadamanthys-venomrat-elysium/
        https://securityaffairs.com/184581/cyber-crime/a-new-round-of-europols-operation-endgame-dismantled-rhadamanthys-venom-rat-and-elysium-botnet.html
        https://www.theregister.com/2025/11/13/rhadamanthys_takedown/
        https://www.helpnetsecurity.com/2025/11/13/rhadamanthys-infostealer-operation-disrupted/
      • The State Of Ransomware In Q3 2025
        "The ransomware landscape in Q3 2025 has reached a critical inflection point. Despite multiple law enforcement takedowns earlier in the year, ransomware attacks remain at historically high levels. Check Point Research tracked 1,592 new victims across 85 active extortion groups, marking a 25% increase year-over-year. While major brands like RansomHub and 8Base have vanished, new and smaller threat actors have rapidly filled the void, fragmenting the ransomware-as-a-service (RaaS) market more than ever before."
        https://blog.checkpoint.com/research/the-state-of-ransomware-in-q3-2025/
      • October 2025 Attacks Soar 30% As New Groups Redefine The Cyber Battlefield
        "Near-record ransomware attacks and the rise of new threats like Sinobi highlight the need for rapid detection and response. Ransomware attacks soared to the second-highest total on record in October 2025. October’s 623 ransomware attacks were up more than 30% from September, and below only February 2025’s record totals (chart below). It was the sixth consecutive monthly increase in ransomware attacks."
        https://cyble.com/blog/ransomware-attacks-surge-october-2025/
      • Orgs Move To SSO, Passkeys To Solve Bad Password Habits
        "New survey data indicates that organizations are pushing hard for passwordless authentication. A significant chunk of online account passwords in 2025 remain basic and easy to crack — a fact that will surprise few. But last month, Dark Reading asked readers how their organizations are handling password security these days. The results were, perhaps surprisingly, optimistic."
        https://www.darkreading.com/identity-access-management-security/sso-passkeys-password-bad-habits
      • Wanna Bet? Scammers Are Playing The Odds Better Than You Are
        "Placing a bet has never been this easy, and that’s the problem. The convenience of online gambling is the same thing scammers are cashing in on. Whether it’s a fake app, a “can’t-miss” tipster, or a rigged casino, the game is stacked against you. By 2030, the online gambling market is projected to reach around $169 billion. 22 percent of Americans, including 48 percent of men ages 18 to 49, have an account with at least one online sportsbook."
        https://www.helpnetsecurity.com/2025/11/13/cybercrime-online-betting-scams/
      • Automation Can’t Fix Broken Security Basics
        "Most enterprises continue to fall short on basic practices such as patching, access control, and vendor oversight, according to Swimlane’s Cracks in the Foundation: Why Basic Security Still Fails report. Leadership often focuses on broad resilience goals while the day-to-day work that supports them remains inconsistent and underfunded."
        https://www.helpnetsecurity.com/2025/11/13/swimlane-security-basics-still-broken-report/
      • When Attacks Come Faster Than Patches: Why 2026 Will Be The Year Of Machine-Speed Security
        "Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new announcement now triggers a global race between attackers and defenders. Both sides monitor the same feeds, but one moves at machine speed while the other moves at human speed."
        https://thehackernews.com/2025/11/when-attacks-come-faster-than-patches.html

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 6d47d5bd-2a77-464f-b36e-565f9e49bfac-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เผยแพร่คำแนะนำด้านระบบควบคุมอุตสาหกรรม (ICS) จำนวน 13 รายการ

      Cybersecurity and Infrastructure Security Agency (CISA) ได้เผยแพร่คำแนะนำเกี่ยวกับระบบควบคุมอุตสาหกรรม (ICS) จำนวน 18 รายการ เมื่อวันที่ 13 พฤศจิกายน 2025 พื่อให้ข้อมูลที่ทันเวลาเกี่ยวกับประเด็นด้านความมั่นคงปลอดภัย ช่องโหว่ และการโจมตีที่เกี่ยวข้องกับระบบ ICS โดยมีรายละเอียดดังนี้

      ICSA-25-317-01 Mitsubishi Electric MELSEC iQ-F Series
      ICSA-25-317-02 AVEVA Application Server IDE
      ICSA-25-317-03 AVEVA Edge
      ICSA-25-317-04 Brightpick Mission Control / Internal Logic Control
      ICSA-25-317-05 Rockwell Automation Verve Asset Manager
      ICSA-25-317-06 Rockwell Automation Studio 5000 Simulation Interface
      ICSA-25-317-07 Rockwell Automation FactoryTalk DataMosaix Private Cloud
      ICSA-25-317-08 General Industrial Controls Lynx+ Gateway
      ICSA-25-317-09 Rockwell Automation FactoryTalk Policy Manager
      ICSA-25-317-10 Rockwell Automation AADvance-Trusted SIS Workstation
      ICSA-25-317-11 Siemens SICAM P850 family and SICAM P855 family
      ICSA-25-317-12 Siemens Spectrum Power 4
      ICSA-25-317-13 Siemens LOGO! 8 BM Devices
      ICSA-25-317-14 Siemens Solid Edge
      ICSA-25-317-15 Siemens COMOS
      ICSA-25-317-16 Siemens Altair Grid Engine
      ICSA-25-317-17 Siemens Software Center and Solid Edge
      ICSA-25-273-04 Festo Controller CECC-S,-LK,-D Family Firmware (Update A)

      CISA แนะนำให้ผู้ใช้งานและผู้ดูแลระบบ ตรวจสอบคำแนะนำ ICS ที่เผยแพร่ล่าสุด เพื่อศึกษารายละเอียดทางเทคนิคและแนวทางการลดความเสี่ยง (mitigations)

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2025/11/13/cisa-releases-18-industrial-control-systems-advisories
      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 0feca571-8690-4135-8d20-151e15820829-image.png

      โพสต์ใน OT Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 13 November 2025

      Financial Sector

      • Hidden Risks In The Financial Sector’s Supply Chain
        "When a cyber attack hits a major bank or trading platform, attention usually turns to the institution. But new research suggests the real danger may lie elsewhere. BitSight researchers found that many of the technology providers serving the financial sector have weaker cybersecurity performance than the institutions they support. For the Exposed Cyber Risk in the Financial Sector and its Supply Chain report, researchers analyzed more than 41,000 financial organizations and over 50,000 relationships with third-party technology providers. The results point to dependencies, uneven monitoring, and gaps in risk management across the sector’s digital supply chain."
        https://www.helpnetsecurity.com/2025/11/11/hidden-financial-sector-cyber-risk/

      Vulnerabilities

      • Synology Fixes BeeStation Zero-Days Demoed At Pwn2Own Ireland
        "Synology has addressed a critical-severity remote code execution (RCE) vulnerability in BeeStation products that was demonstrated at the recent Pwn2Own hacking competition. The security issue (CVE-2025-12686) is described as a ‘buffer copy without checking the size of input’ problem, and can be exploited to allow arbitrary code execution. It impacts multiple versions of BeeStation OS, the software powering Synology’s network-attached storage (NAS) devices marketed as a consumer-oriented “personal cloud.”"
        https://www.bleepingcomputer.com/news/security/synology-fixes-beestation-zero-days-demoed-at-pwn2own-ireland/
        https://www.synology.com/en-us/security/advisory/Synology_SA_25_12
      • SAP Fixes Hardcoded Credentials Flaw In SQL Anywhere Monitor
        "SAP has released its November security updates that address multiple security vulnerabilities, including a maximum severity flaw in the non-GUI variant of the SQL Anywhere Monitor and a critical code injection issue in the Solution Manager platform. The security problem in SQL Anywhere Monitor is tracked as CVE-2025-42890 and consists of hardcoded credentials. Because of the elevated risk, the vulnerability received the maximum severity score of 10.0. "SQL Anywhere Monitor (Non-GUI) baked credentials into the code, exposing the resources or functionality to unintended users and providing attackers with the possibility of arbitrary code execution," reads the description for the flaw."
        https://www.bleepingcomputer.com/news/security/sap-fixes-hardcoded-credentials-flaw-in-sql-anywhere-monitor/
        https://www.securityweek.com/sap-patches-critical-flaws-in-sql-anywhere-monitor-solution-manager/
        https://securityaffairs.com/184500/security/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere-monitor.html
      • Microsoft November 2025 Patch Tuesday Fixes 1 Zero-Day, 63 Flaws
        "Today is Microsoft's November 2025 Patch Tuesday, which includes security updates for 63 flaws, including one actively exploited zero-day vulnerability. This Patch Tuesday also addresses four "Critical" vulnerabilities, two of which are remote code execution vulnerabilities, one is an elevation of privileges, and the fourth is an information disclosure flaw."
        https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2025-patch-tuesday-fixes-1-zero-day-63-flaws/
        https://blog.talosintelligence.com/microsoft-patch-tuesday-november-2025/
        https://www.darkreading.com/vulnerabilities-threats/patch-now-microsoft-zero-day-critical-zero-click-bugs
        https://cyberscoop.com/microsoft-patch-tuesday-november-2025/
        https://www.securityweek.com/microsoft-patches-actively-exploited-windows-kernel-zero-day/
      • Adobe Patches 29 Vulnerabilities
        "Adobe’s latest round of Patch Tuesday updates addresses 29 vulnerabilities across the company’s InDesign, InCopy, Photoshop, Illustrator, Pass, Substance 3D Stager, and Format Plugins products. Critical vulnerabilities that can be exploited for arbitrary code execution have been addressed in InDesign, InCopy, Photoshop, Illustrator, Substance 3D Stager, and Format Plugins. A critical security bypass issue has been resolved in Pass. It’s worth noting that Adobe assigns a ‘critical’ severity to issues that, based on their CVSS score, have a ‘high’ severity rating."
        https://www.securityweek.com/adobe-patches-29-vulnerabilities/

      Malware

      • You Thought It Was Over? Authentication Coercion Keeps Evolving
        "Imagine a scenario where malicious actors don’t need to trick you into giving up your password. They have no need to perform sophisticated social engineering attacks or exploit vulnerabilities in your operating system. Instead, they can simply force your computer to authenticate to an attacker-controlled system, effectively commanding your machine to hand over valuable credentials. This attack method is called authentication coercion."
        https://unit42.paloaltonetworks.com/authentication-coercion/
      • How a CPU Spike Led To Uncovering a RansomHub Ransomware Attack
        "Varonis recently helped a customer who observed a spike in CPU activity on a server in their environment, where a shallow review of the device revealed an in-progress compromise by an advanced threat actor we later attributed to RansomHub affiliates. Over the next 48 hours, our team worked closely with the customer to investigate, hunt, contain, and remediate the threat before it could become ransomware. Due to our team's advanced intervention capabilities, we secured the customer’s network with zero business downtime. Continue reading to see how the incident started."
        https://www.bleepingcomputer.com/news/security/how-a-cpu-spike-led-to-uncovering-a-ransomhub-ransomware-attack/
      • Malicious NPM Package Found Targeting GitHub By Typosquatting On GitHub Action Packages
        "On Friday 7th November Veracode Threat Research identified a malicious npm package “@acitons/artifact”, that was typosquatting on the legitimate package @actions/artifact, which has accumulated over 206k downloads. The malicious package appeared to be targeting GitHub-owned repositories. We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish new malicious artifacts as GitHub."
        https://www.veracode.com/blog/malicious-npm-package-targeting-github-actions/
        https://thehackernews.com/2025/11/researchers-detect-malicious-npm.html
        https://hackread.com/fake-npm-package-downloads-github-credentials/
      • How Credentials Get Stolen In Seconds, Even With a Script-Kiddie-Level Phish
        "This attempt to phish credentials caught our attention, mostly because of its front-end simplicity. Even though this is a script-kiddie-level type of attack, we figured it was worth writing up—precisely because it’s so easy to follow what they’re up to. The email is direct and to the point. Not a lot of social engineering happening here."
        https://www.malwarebytes.com/blog/threat-intel/2025/11/how-credentials-get-stolen-in-seconds-even-with-a-script-kiddie-level-phish
      • Maverick And Coyote: Analyzing The Link Between Two Evolving Brazilian Banking Trojans
        "The CyberProof SOC Team and Threat Hunters responded to an incident involving a suspicious file download spotted through the messaging application WhatsApp. Further investigation helped uncover more related incidents, however the complete infection chain could not be observed or additional files from Command and control failed to deliver in our investigations. VirusTotal hunting of similar files helped us collect more files tied to this Brazilian targeting campaign and we found our analysis related to public research tied to Maverick banking trojan by Kaspersky, WhatsApp worm by Sophos and Sorvepotel by TrendMicro. We saw good number of similarities with the earlier reported Coyote banking malware campaign programmed to target the Brazilian region."
        https://www.cyberproof.com/blog/maverick-and-coyote-analyzing-the-link-between-two-evolving-brazilian-banking-trojans/
        https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html
      • Rhadamanthys Infostealer Disrupted As Cybercriminals Lose Server Access
        "The Rhadamanthys infostealer operation has been disrupted, with numerous “customers” of the malware-as-a-service reporting that they no longer have access to their servers. Rhadamanthys is an infostealer malware that steals credentials and authentication cookies from browsers, email clients, and other applications. It is commonly distributed through campaigns promoted as software cracks, YouTube videos, or malicious search advertisements. The malware is offered on a subscription model, where cybercriminals pay the developer a monthly fee for access to the malware, support, and a web panel used to collect stolen data."
        https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/

      Breaches/Hacks/Leaks

      • GlobalLogic Warns 10,000 Employees Of Data Theft After Oracle Breach
        "GlobalLogic, a provider of digital engineering services part of the Hitachi group, is notifying over 10,000 current and former employees that their data was stolen in an Oracle E-Business Suite (EBS) data breach. Based in Santa Clara, California, this software and product development services company was founded in 2000. Since then, it has expanded to 59 product engineering centers and several offices worldwide. In a breach notification letter filed with the office of Maine's Attorney General, the company states that the attackers exploited an Oracle EBS zero-day vulnerability to steal personal information belonging to 10,471 employees."
        https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/
        https://cyberscoop.com/globallogic-oracle-clop-attacks/
        https://www.theregister.com/2025/11/11/hitachiowned_globallogic_admits_data_stolen/
      • Cl0p Ransomware Lists NHS UK As Victim, Days After Washington Post Breach
        "Cl0p is claiming responsibility for a new data breach affecting the National Health Service (NHS UK). On November 11, 2026, the ransomware group posted on its dark web leak site, accusing the healthcare provider of neglecting its security, stating, “The company doesn’t care about its customers; it ignored their security.” Although the group has not revealed the volume of stolen data, the announcement aligns with ongoing attacks and reports pointing out CL0p of exploiting vulnerabilities in Oracle’s E-Business Suite (EBS)."
        https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/
      • Have I Been Pwned Adds 1.96B Accounts From Synthient Credential Data
        "Have I Been Pwned (HIBP), the popular breach notification service, has added another massive dataset to its platform. This time, 1.96 billion accounts connected to the Synthient Credential Stuffing Threat Data, in collaboration with the threat-intelligence firm Synthient. Users who subscribe to HIBP alerts, including this writer, received an email notification stating: “You’ve been pwned in the Synthient Credential Stuffing Threat Data data breach.”"
        https://hackread.com/have-i-been-pwned-synthient-credential-data-accounts/

      General News

      • Who Owns The Cybersecurity Of Space?
        "As a cybersecurity professional, I have spent decades watching humanity build digital castles without moats. We did it with the internet, with artificial intelligence and with critical infrastructure. Now, we are doing it again, this time in orbit. We are racing to commercialize space to connect the unconnected and monetize orbit, yet we are ignoring the most important question: Who owns the cybersecurity of space?"
        https://www.bankinfosecurity.com/blogs/who-owns-cybersecurity-space-p-3971
      • To Get Funding, CISOs Are Mastering The Language Of Money
        "In this Help Net Security interview, Chris Wheeler, CISO at Resilience, talks about how CISOs are managing changing cybersecurity budgets. While overall spending is up, many say the increases don’t match their most pressing needs. Wheeler explains how organizations are reallocating funds, measuring ROI, and linking cybersecurity plans to business goals."
        https://www.helpnetsecurity.com/2025/11/11/chris-wheeler-resilience-cisos-cybersecurity-budgets/
      • How Far Can Police Push Privacy Before It Breaks
        "Police use drones, body cameras, and license plate readers as part of their daily work. Supporters say these tools make communities safer. Critics see something different, a system that collects too much data and opens the door to abuse. When surveillance expands without public oversight, civil liberties start to slip away, especially for people who already face bias and discrimination."
        https://www.helpnetsecurity.com/2025/11/11/police-surveillance-privacy-risks/
      • CISOs Are Cracking Under Pressure
        "Cybersecurity leaders are hitting their limit. A new report from Nagomi Security shows that most CISOs are stretched thin, dealing with nonstop incidents, too many tools, and growing pressure from their boards. The pressures are so intense that many say they are burned out and thinking about walking away. The personal cost is beginning to affect business readiness. Nearly half said burnout has already hurt their ability to prepare for breaches. The researchers warn that when leaders reach this point, the entire organization becomes more vulnerable."
        https://www.helpnetsecurity.com/2025/11/11/stress-ciso-burnout-crisis/
      • AI Browsers Are Rapidly Becoming Major Risk To Cybersecurity
        "As a new type of browser infused with artificial intelligence (AI) capabilities start to become more widely available, significant security concerns are starting to emerge. Like most AI tools, this new type of browser is susceptible to prompt injection attacks. However, the issue is these AI browsers are being connected to a wide range of applications that make it possible to extend the reach of a prompt injection attack well beyond the browser."
        https://blog.barracuda.com/2025/11/10/ai-browsers-major-risk-cybersecurity
      • “Bitcoin Queen” Gets 11 Years In Prison For $7.3 Billion Bitcoin Scam
        "A Chinese woman known as the "Bitcoin Queen" was sentenced in London to 11 years and eight months in jail for laundering Bitcoin from a £5.5 billion ($7.3 billion) cryptocurrency investment scheme. The sentence follows a seven-year investigation by the Met's Economic Crime team into international money laundering, which revealed that the 47-year-old woman, Zhimin Qian (also known as Yadi Zhang), was the head of a large-scale fraud campaign that defrauded over 128,000 victims in China between 2014 and 2017. This action also led to the seizure of 61,000 Bitcoin worth hundreds of millions of pounds at the time and now valued at roughly £5.5 billion, the largest cryptocurrency seizure in Britain's history."
        https://www.bleepingcomputer.com/news/security/bitcoin-queen-gets-11-years-in-prison-for-73-billion-bitcoin-scam/
      • Global Cyber Attacks Surge In October 2025 Amid Explosive Ransomware Growth And Rising GenAI Threats
        "In October 2025, the global volume of cyber attacks continued its upward trajectory. Organizations worldwide experienced an average of 1,938 cyber attacks per week, marking a 2% increase from September and a 5% rise compared to October 2024. Check Point Research data reveals that this steady escalation underscores a persistent and evolving cyber threat landscape fuelled by the growing sophistication of ransomware operations and the expanding risks associated with the adoption of generative AI (GenAI)."
        https://blog.checkpoint.com/research/global-cyber-attacks-surge-in-october-2025-amid-explosive-ransomware-growth-and-rising-genai-threats/
      • Grandparents To C-Suite: Elder Fraud Reveals Gaps In Human-Centered Cybersecurity
        "A retiree answers the phone one afternoon and hears what sounds unmistakably like her grandson's voice. He says he's been in an accident and needs money right away. The caller knows her name, her town, and details about the family. Panicked, she sends the funds — only later learning that the voice was generated by artificial intelligence and the personal information came from publicly available data online."
        https://www.darkreading.com/cyber-risk/grandparents-to-c-suite-elder-fraud-reveals-gaps-in-human-centered-cybersecurity
      • Qilin Ransomware Activity Surges As Attacks Target Small Businesses
        "A rise in ransomware incidents linked to the Qilin ransomware group, one of the longest-running ransomware-as-a-service (RaaS) operations, has been observed by cybersecurity researchers. According to S-RM’s latest intelligence, Qilin continues to exploit weaknesses such as unpatched VPN appliances, lack of multi-factor authentication (MFA) and exposed management interfaces to gain initial access to corporate networks."
        https://www.infosecurity-magazine.com/news/qilin-ransomware-activity-surges/
      • Cyber Insurers Paid Out Over Twice As Much For UK Ransomware Attacks Last Year
        "The number of successful cyber insurance claims made by UK organizations shot up last year, according to the latest figures from the industry's trade association. The Association of British Insurers (ABI) said £197 million ($259 million) in cyber insurance payouts were made to victimized organizations in 2024, up from £59 million ($77 million) in 2023."
        https://www.theregister.com/2025/11/11/ransomware_surge_fuels_230_increase/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) f18ca7b7-96e0-4a74-b92c-8864ede8f966-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เพิ่มช่องโหว่ที่ถูกใช้โจมตี 3 รายการลงในแคตตาล็อก

      เมื่อวันที่ 12 พฤศจิกายน 2025 Cybersecurity and Infrastructure Security Agency (CISA) ได้เพิ่มช่องโหว่ใหม่ 3 รายการลงในแคตตาล็อก Known Exploited Vulnerabilities (KEV) จากหลักฐานที่พบว่ามีการโจมตีใช้งานจริงแล้ว ดังนี้

      • CVE-2025-9242 WatchGuard Firebox Out-of-Bounds Write Vulnerability
      • CVE-2025-12480 Gladinet Triofox Improper Access Control Vulnerability
      • CVE-2025-62215 Microsoft Windows Race Condition Vulnerability

      ช่องโหว่ประเภทนี้มักถูกใช้เป็นช่องทางการโจมตีโดยผู้ไม่หวังดี และก่อให้เกิดความเสี่ยงร้ายแรงต่อเครือข่ายของหน่วยงานรัฐบาลกลาง

      ทั้งนี้ คำสั่ง BOD 22-01 ของ CISA กำหนดให้มี แคตตาล็อก Known Exploited Vulnerabilities (KEV) เพื่อรวบรวมช่องโหว่ (CVEs) ที่มีความเสี่ยงสูงและถูกใช้งานโจมตีจริง หน่วยงาน Federal Civilian Executive Branch (FCEB) ต้องดำเนินการแก้ไขช่องโหว่ที่ระบุภายในเวลาที่กำหนด เพื่อปกป้องเครือข่ายจากภัยคุกคาม

      ทาง CISA จะปรับปรุงและเพิ่มช่องโหว่ใหม่เข้าสู่แคตตาล็อก KEV อย่างต่อเนื่อง เพื่อให้ครอบคลุมความเสี่ยงที่ตรวจพบจริงในปัจจุบันและอนาคต

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2025/11/12/cisa-adds-three-known-exploited-vulnerabilities-catalog
      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand f17b5893-7b5d-4ed1-9220-d11a409a29ac-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 12 November 2025

      Financial Sector

      • Hidden Risks In The Financial Sector’s Supply Chain
        "When a cyber attack hits a major bank or trading platform, attention usually turns to the institution. But new research suggests the real danger may lie elsewhere. BitSight researchers found that many of the technology providers serving the financial sector have weaker cybersecurity performance than the institutions they support. For the Exposed Cyber Risk in the Financial Sector and its Supply Chain report, researchers analyzed more than 41,000 financial organizations and over 50,000 relationships with third-party technology providers. The results point to dependencies, uneven monitoring, and gaps in risk management across the sector’s digital supply chain."
        https://www.helpnetsecurity.com/2025/11/11/hidden-financial-sector-cyber-risk/

      Vulnerabilities

      • Synology Fixes BeeStation Zero-Days Demoed At Pwn2Own Ireland
        "Synology has addressed a critical-severity remote code execution (RCE) vulnerability in BeeStation products that was demonstrated at the recent Pwn2Own hacking competition. The security issue (CVE-2025-12686) is described as a ‘buffer copy without checking the size of input’ problem, and can be exploited to allow arbitrary code execution. It impacts multiple versions of BeeStation OS, the software powering Synology’s network-attached storage (NAS) devices marketed as a consumer-oriented “personal cloud.”"
        https://www.bleepingcomputer.com/news/security/synology-fixes-beestation-zero-days-demoed-at-pwn2own-ireland/
        https://www.synology.com/en-us/security/advisory/Synology_SA_25_12
      • SAP Fixes Hardcoded Credentials Flaw In SQL Anywhere Monitor
        "SAP has released its November security updates that address multiple security vulnerabilities, including a maximum severity flaw in the non-GUI variant of the SQL Anywhere Monitor and a critical code injection issue in the Solution Manager platform. The security problem in SQL Anywhere Monitor is tracked as CVE-2025-42890 and consists of hardcoded credentials. Because of the elevated risk, the vulnerability received the maximum severity score of 10.0. "SQL Anywhere Monitor (Non-GUI) baked credentials into the code, exposing the resources or functionality to unintended users and providing attackers with the possibility of arbitrary code execution," reads the description for the flaw."
        https://www.bleepingcomputer.com/news/security/sap-fixes-hardcoded-credentials-flaw-in-sql-anywhere-monitor/
        https://www.securityweek.com/sap-patches-critical-flaws-in-sql-anywhere-monitor-solution-manager/
        https://securityaffairs.com/184500/security/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere-monitor.html
      • Microsoft November 2025 Patch Tuesday Fixes 1 Zero-Day, 63 Flaws
        "Today is Microsoft's November 2025 Patch Tuesday, which includes security updates for 63 flaws, including one actively exploited zero-day vulnerability. This Patch Tuesday also addresses four "Critical" vulnerabilities, two of which are remote code execution vulnerabilities, one is an elevation of privileges, and the fourth is an information disclosure flaw."
        https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2025-patch-tuesday-fixes-1-zero-day-63-flaws/
        https://blog.talosintelligence.com/microsoft-patch-tuesday-november-2025/
        https://www.darkreading.com/vulnerabilities-threats/patch-now-microsoft-zero-day-critical-zero-click-bugs
        https://cyberscoop.com/microsoft-patch-tuesday-november-2025/
        https://www.securityweek.com/microsoft-patches-actively-exploited-windows-kernel-zero-day/
      • Adobe Patches 29 Vulnerabilities
        "Adobe’s latest round of Patch Tuesday updates addresses 29 vulnerabilities across the company’s InDesign, InCopy, Photoshop, Illustrator, Pass, Substance 3D Stager, and Format Plugins products. Critical vulnerabilities that can be exploited for arbitrary code execution have been addressed in InDesign, InCopy, Photoshop, Illustrator, Substance 3D Stager, and Format Plugins. A critical security bypass issue has been resolved in Pass. It’s worth noting that Adobe assigns a ‘critical’ severity to issues that, based on their CVSS score, have a ‘high’ severity rating."
        https://www.securityweek.com/adobe-patches-29-vulnerabilities/

      Malware

      • You Thought It Was Over? Authentication Coercion Keeps Evolving
        "Imagine a scenario where malicious actors don’t need to trick you into giving up your password. They have no need to perform sophisticated social engineering attacks or exploit vulnerabilities in your operating system. Instead, they can simply force your computer to authenticate to an attacker-controlled system, effectively commanding your machine to hand over valuable credentials. This attack method is called authentication coercion."
        https://unit42.paloaltonetworks.com/authentication-coercion/
      • How a CPU Spike Led To Uncovering a RansomHub Ransomware Attack
        "Varonis recently helped a customer who observed a spike in CPU activity on a server in their environment, where a shallow review of the device revealed an in-progress compromise by an advanced threat actor we later attributed to RansomHub affiliates. Over the next 48 hours, our team worked closely with the customer to investigate, hunt, contain, and remediate the threat before it could become ransomware. Due to our team's advanced intervention capabilities, we secured the customer’s network with zero business downtime. Continue reading to see how the incident started."
        https://www.bleepingcomputer.com/news/security/how-a-cpu-spike-led-to-uncovering-a-ransomhub-ransomware-attack/
      • Malicious NPM Package Found Targeting GitHub By Typosquatting On GitHub Action Packages
        "On Friday 7th November Veracode Threat Research identified a malicious npm package “@acitons/artifact”, that was typosquatting on the legitimate package @actions/artifact, which has accumulated over 206k downloads. The malicious package appeared to be targeting GitHub-owned repositories. We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish new malicious artifacts as GitHub."
        https://www.veracode.com/blog/malicious-npm-package-targeting-github-actions/
        https://thehackernews.com/2025/11/researchers-detect-malicious-npm.html
        https://hackread.com/fake-npm-package-downloads-github-credentials/
      • How Credentials Get Stolen In Seconds, Even With a Script-Kiddie-Level Phish
        "This attempt to phish credentials caught our attention, mostly because of its front-end simplicity. Even though this is a script-kiddie-level type of attack, we figured it was worth writing up—precisely because it’s so easy to follow what they’re up to. The email is direct and to the point. Not a lot of social engineering happening here."
        https://www.malwarebytes.com/blog/threat-intel/2025/11/how-credentials-get-stolen-in-seconds-even-with-a-script-kiddie-level-phish
      • Maverick And Coyote: Analyzing The Link Between Two Evolving Brazilian Banking Trojans
        "The CyberProof SOC Team and Threat Hunters responded to an incident involving a suspicious file download spotted through the messaging application WhatsApp. Further investigation helped uncover more related incidents, however the complete infection chain could not be observed or additional files from Command and control failed to deliver in our investigations. VirusTotal hunting of similar files helped us collect more files tied to this Brazilian targeting campaign and we found our analysis related to public research tied to Maverick banking trojan by Kaspersky, WhatsApp worm by Sophos and Sorvepotel by TrendMicro. We saw good number of similarities with the earlier reported Coyote banking malware campaign programmed to target the Brazilian region."
        https://www.cyberproof.com/blog/maverick-and-coyote-analyzing-the-link-between-two-evolving-brazilian-banking-trojans/
        https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html
      • Rhadamanthys Infostealer Disrupted As Cybercriminals Lose Server Access
        "The Rhadamanthys infostealer operation has been disrupted, with numerous “customers” of the malware-as-a-service reporting that they no longer have access to their servers. Rhadamanthys is an infostealer malware that steals credentials and authentication cookies from browsers, email clients, and other applications. It is commonly distributed through campaigns promoted as software cracks, YouTube videos, or malicious search advertisements. The malware is offered on a subscription model, where cybercriminals pay the developer a monthly fee for access to the malware, support, and a web panel used to collect stolen data."
        https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/

      Breaches/Hacks/Leaks

      • GlobalLogic Warns 10,000 Employees Of Data Theft After Oracle Breach
        "GlobalLogic, a provider of digital engineering services part of the Hitachi group, is notifying over 10,000 current and former employees that their data was stolen in an Oracle E-Business Suite (EBS) data breach. Based in Santa Clara, California, this software and product development services company was founded in 2000. Since then, it has expanded to 59 product engineering centers and several offices worldwide. In a breach notification letter filed with the office of Maine's Attorney General, the company states that the attackers exploited an Oracle EBS zero-day vulnerability to steal personal information belonging to 10,471 employees."
        https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/
        https://cyberscoop.com/globallogic-oracle-clop-attacks/
        https://www.theregister.com/2025/11/11/hitachiowned_globallogic_admits_data_stolen/
      • Cl0p Ransomware Lists NHS UK As Victim, Days After Washington Post Breach
        "Cl0p is claiming responsibility for a new data breach affecting the National Health Service (NHS UK). On November 11, 2026, the ransomware group posted on its dark web leak site, accusing the healthcare provider of neglecting its security, stating, “The company doesn’t care about its customers; it ignored their security.” Although the group has not revealed the volume of stolen data, the announcement aligns with ongoing attacks and reports pointing out CL0p of exploiting vulnerabilities in Oracle’s E-Business Suite (EBS)."
        https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/
      • Have I Been Pwned Adds 1.96B Accounts From Synthient Credential Data
        "Have I Been Pwned (HIBP), the popular breach notification service, has added another massive dataset to its platform. This time, 1.96 billion accounts connected to the Synthient Credential Stuffing Threat Data, in collaboration with the threat-intelligence firm Synthient. Users who subscribe to HIBP alerts, including this writer, received an email notification stating: “You’ve been pwned in the Synthient Credential Stuffing Threat Data data breach.”"
        https://hackread.com/have-i-been-pwned-synthient-credential-data-accounts/

      General News

      • Who Owns The Cybersecurity Of Space?
        "As a cybersecurity professional, I have spent decades watching humanity build digital castles without moats. We did it with the internet, with artificial intelligence and with critical infrastructure. Now, we are doing it again, this time in orbit. We are racing to commercialize space to connect the unconnected and monetize orbit, yet we are ignoring the most important question: Who owns the cybersecurity of space?"
        https://www.bankinfosecurity.com/blogs/who-owns-cybersecurity-space-p-3971
      • To Get Funding, CISOs Are Mastering The Language Of Money
        "In this Help Net Security interview, Chris Wheeler, CISO at Resilience, talks about how CISOs are managing changing cybersecurity budgets. While overall spending is up, many say the increases don’t match their most pressing needs. Wheeler explains how organizations are reallocating funds, measuring ROI, and linking cybersecurity plans to business goals."
        https://www.helpnetsecurity.com/2025/11/11/chris-wheeler-resilience-cisos-cybersecurity-budgets/
      • How Far Can Police Push Privacy Before It Breaks
        "Police use drones, body cameras, and license plate readers as part of their daily work. Supporters say these tools make communities safer. Critics see something different, a system that collects too much data and opens the door to abuse. When surveillance expands without public oversight, civil liberties start to slip away, especially for people who already face bias and discrimination."
        https://www.helpnetsecurity.com/2025/11/11/police-surveillance-privacy-risks/
      • CISOs Are Cracking Under Pressure
        "Cybersecurity leaders are hitting their limit. A new report from Nagomi Security shows that most CISOs are stretched thin, dealing with nonstop incidents, too many tools, and growing pressure from their boards. The pressures are so intense that many say they are burned out and thinking about walking away. The personal cost is beginning to affect business readiness. Nearly half said burnout has already hurt their ability to prepare for breaches. The researchers warn that when leaders reach this point, the entire organization becomes more vulnerable."
        https://www.helpnetsecurity.com/2025/11/11/stress-ciso-burnout-crisis/
      • AI Browsers Are Rapidly Becoming Major Risk To Cybersecurity
        "As a new type of browser infused with artificial intelligence (AI) capabilities start to become more widely available, significant security concerns are starting to emerge. Like most AI tools, this new type of browser is susceptible to prompt injection attacks. However, the issue is these AI browsers are being connected to a wide range of applications that make it possible to extend the reach of a prompt injection attack well beyond the browser."
        https://blog.barracuda.com/2025/11/10/ai-browsers-major-risk-cybersecurity
      • “Bitcoin Queen” Gets 11 Years In Prison For $7.3 Billion Bitcoin Scam
        "A Chinese woman known as the "Bitcoin Queen" was sentenced in London to 11 years and eight months in jail for laundering Bitcoin from a £5.5 billion ($7.3 billion) cryptocurrency investment scheme. The sentence follows a seven-year investigation by the Met's Economic Crime team into international money laundering, which revealed that the 47-year-old woman, Zhimin Qian (also known as Yadi Zhang), was the head of a large-scale fraud campaign that defrauded over 128,000 victims in China between 2014 and 2017. This action also led to the seizure of 61,000 Bitcoin worth hundreds of millions of pounds at the time and now valued at roughly £5.5 billion, the largest cryptocurrency seizure in Britain's history."
        https://www.bleepingcomputer.com/news/security/bitcoin-queen-gets-11-years-in-prison-for-73-billion-bitcoin-scam/
      • Global Cyber Attacks Surge In October 2025 Amid Explosive Ransomware Growth And Rising GenAI Threats
        "In October 2025, the global volume of cyber attacks continued its upward trajectory. Organizations worldwide experienced an average of 1,938 cyber attacks per week, marking a 2% increase from September and a 5% rise compared to October 2024. Check Point Research data reveals that this steady escalation underscores a persistent and evolving cyber threat landscape fuelled by the growing sophistication of ransomware operations and the expanding risks associated with the adoption of generative AI (GenAI)."
        https://blog.checkpoint.com/research/global-cyber-attacks-surge-in-october-2025-amid-explosive-ransomware-growth-and-rising-genai-threats/
      • Grandparents To C-Suite: Elder Fraud Reveals Gaps In Human-Centered Cybersecurity
        "A retiree answers the phone one afternoon and hears what sounds unmistakably like her grandson's voice. He says he's been in an accident and needs money right away. The caller knows her name, her town, and details about the family. Panicked, she sends the funds — only later learning that the voice was generated by artificial intelligence and the personal information came from publicly available data online."
        https://www.darkreading.com/cyber-risk/grandparents-to-c-suite-elder-fraud-reveals-gaps-in-human-centered-cybersecurity
      • Qilin Ransomware Activity Surges As Attacks Target Small Businesses
        "A rise in ransomware incidents linked to the Qilin ransomware group, one of the longest-running ransomware-as-a-service (RaaS) operations, has been observed by cybersecurity researchers. According to S-RM’s latest intelligence, Qilin continues to exploit weaknesses such as unpatched VPN appliances, lack of multi-factor authentication (MFA) and exposed management interfaces to gain initial access to corporate networks."
        https://www.infosecurity-magazine.com/news/qilin-ransomware-activity-surges/
      • Cyber Insurers Paid Out Over Twice As Much For UK Ransomware Attacks Last Year
        "The number of successful cyber insurance claims made by UK organizations shot up last year, according to the latest figures from the industry's trade association. The Association of British Insurers (ABI) said £197 million ($259 million) in cyber insurance payouts were made to victimized organizations in 2024, up from £59 million ($77 million) in 2023."
        https://www.theregister.com/2025/11/11/ransomware_surge_fuels_230_increase/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 07398a9d-7cc4-4a42-b6b8-403f38ec686f-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 11 November 2025

      New Tooling

      • Sqlmap: Open-Source SQL Injection And Database Takeover Tool
        "Finding and exploiting SQL injection vulnerabilities is one of the oldest and most common steps in web application testing. sqlmap streamlines this process. It is an open-source penetration testing tool that automates the detection and exploitation of SQL injection flaws and can take over database servers when configured to do so."
        https://www.helpnetsecurity.com/2025/11/10/sqlmap-open-source-sql-injection-database-takeover-tool/
        https://github.com/sqlmapproject/sqlmap

      Vulnerabilities

      • Vulnerability In Expr-Eval JavaScript Library Can Lead To Arbitrary Code Execution
        "The npm package expr-eval is a JavaScript library that evaluates mathematical expressions and is used in various applications, including NLP and AI. A vulnerability in this library has been disclosed that could allow arbitrary code execution by an attacker using maliciously crafted input."
        https://kb.cert.org/vuls/id/263614
        https://www.bleepingcomputer.com/news/security/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/
        What’s That Coming Over The Hill? (Monsta FTP Remote Code Execution CVE-2025-34299)
        "Happy Friday, friends and.. others. We’re glad/sorry to hear that your week has been good/bad, and it’s the weekend/but at least it’s almost the weekend! Today, in a tale that seems all too familar at this point, we begun as innocently as always - to reproduce an N-day in Monsta FTP as part of our emerging threat rapid reaction process we enact across the watchTowr client base. Yet, somehow, we find ourselves saddled with the reality of discussing another zero-day. “What on earth is Monsta FTP?” you might say. Monsta FTP is a web-based FTP client that lets users manage and transfer files directly through a browser on remote servers, with a minimum of 5,000 instances sitting on the Internet."
        https://labs.watchtowr.com/whats-that-coming-over-the-hill-monsta-ftp-remote-code-execution-cve-2025-34299/
        https://hackread.com/monsta-ftp-flaw-web-servers-open-server-takeover/
      • No Place Like Localhost: Unauthenticated Remote Access Via Triofox Vulnerability CVE-2025-12480
        "Mandiant Threat Defense has uncovered exploitation of an unauthenticated access vulnerability within Gladinet’s Triofox file-sharing and remote access platform. This now-patched n-day vulnerability, assigned CVE-2025-12480, allowed an attacker to bypass authentication and access the application configuration pages, enabling the upload and execution of arbitrary payloads."
        https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480/
        https://thehackernews.com/2025/11/hackers-exploiting-triofox-flaw-to.html
      • CISA Adds One Known Exploited Vulnerability To Catalog
        "CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2025-21042 Samsung Mobile Devices Out-of-Bounds Write Vulnerability"
        https://www.cisa.gov/news-events/alerts/2025/11/10/cisa-adds-one-known-exploited-vulnerability-catalog
        https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks/

      Malware

      • Multi-Brand Themed Phishing Campaign Harvests Credentials Via Telegram Bot API
        "Cyble Research and Intelligence Labs (CRIL) have uncovered a widespread phishing campaign targeting multiple brands to steal credentials. Attackers distribute HTML attachments through email, successfully bypassing conventional security checks by not using suspicious URLs or hosting on external servers. The embedded HTML files run JavaScript that steals user credentials and sends them directly to attacker-controlled Telegram bots."
        https://cyble.com/blog/multi-brand-phishing-campaign-harvests-credentials/
      • Quantum Route Redirect: Anonymous Tool Streamlining Global Phishing Attack
        "KnowBe4 Threat Labs has uncovered an emerging advanced phishing campaign targeting Microsoft 365 users globally to steal their credentials. The attackers are wielding a powerful new tool that’s completely changing the game for cybercriminals—turning what used to be complex, technical phishing setups into simple one-click launches that can bypass certain technical controls. Welcome to the era of “Quantum Route Redirect.""
        https://blog.knowbe4.com/quantum-route-redirect-anonymous-tool-streamlining-global-phishing-attack
        https://www.bleepingcomputer.com/news/security/quantum-route-redirect-phaas-targets-microsoft-365-users-worldwide/
      • New Phishing Campaign Exploits Meta Business Suite To Target SMBs Across The U.S. And Beyond
        "With more than 5.4 billion users worldwide (according to Statista), Facebook remains the world’s most influential social platform and a critical marketing channel for small and medium-sized businesses. Its vast reach and trusted brand make it a prime target for attackers, meaning that when a phishing campaign abuses Facebook’s name, the consequences can be especially serious."
        https://blog.checkpoint.com/email-security/new-phishing-campaign-exploits-meta-business-suite-to-target-smbs-across-the-u-s-and-beyond/
        https://www.theregister.com/2025/11/10/5k_facebook_advertising_customers_phishing/
      • Fantasy Hub: Another Russian Based RAT As M-a-a-S
        "zLabs identified “Fantasy Hub,” an Android Remote Access Trojan sold on Russian-language channels under a Malware-as-a-Service (MaaS) subscription. The developer of this malware promotes its broad capabilities for device control and espionage. These capabilities include the exfiltration of SMS messages, contacts, call logs, and bulk theft of images and videos. The malware can also intercept, reply, and delete incoming notifications, among other features."
        https://zimperium.com/blog/fantasy-hub-another-russian-based-rat-as-m-a-a-s
        https://www.malwarebytes.com/blog/news/2025/11/fantasy-hub-is-spyware-for-rent-complete-with-fake-app-kits-and-support
      • State-Sponsored Remote Wipe Tactics Targeting Android Devices
        "The Genians Security Center (GSC) has identified new attack activity linked to the KONNI APT campaign, which is known to be associated with the Kimsuky or APT37 groups. During its ongoing investigation into KONNI’s operations, GSC discovered that malicious files disguised as “stress-relief programs” were being widely distributed through South Korea’s KakaoTalk messenger platform. KONNI has overlapping targets and infrastructure with Kimsuky and APT37, leading some researchers to classify them as the same group. All three are recognized as state-sponsored threat actors operating under the direction of the North Korean regime."
        https://www.genians.co.kr/en/blog/threat_intelligence/android
        https://thehackernews.com/2025/11/konni-hackers-turn-googles-find-hub.html
        https://www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/

      Breaches/Hacks/Leaks

      • Allianz UK Joins Growing List Of Clop’s Oracle E-Business Suite Victims
        "Allianz UK confirms it was one of the many companies that fell victim to the Clop gang's Oracle E-Business Suite (EBS) attack after crims reported that they had attacked a subsidiary. The criminal crew behind the wave of zero-day data raids claimed to have attacked Allianz-owned British insurer Liverpool Victoria (LV) on Tuesday, but a spokesperson for its parent company waved away these allegations. Allianz UK told The Register that the attack compromised the data of its customers only, and there was no impact on LV's customers or systems at all."
        https://www.theregister.com/2025/11/10/allianz_uk_joins_growing_list/
        https://www.securityweek.com/nearly-30-alleged-victims-of-oracle-ebs-hack-named-on-cl0p-ransomware-site/

      General News

      • Wi-Fi Signals May Hold The Key To Touchless Access Control
        "Imagine walking into a secure building where the door unlocks the moment your hand hovers near it. No keycards, no PINs, no fingerprints. Instead, the system identifies you by the way your palm distorts the surrounding Wi-Fi signal. That is the idea behind a new study from researchers at the Aeronautics Institute of Technology (ITA) in Brazil."
        https://www.helpnetsecurity.com/2025/11/10/research-wi-fi-palm-authentication/
        https://arxiv.org/pdf/2510.22133
      • Adopting a Counterintelligence Mindset In Luxury Logistics
        "In this Help Net Security interview, Andrea Succi, Group CISO at Ferrari Group, discusses how cybersecurity is integrated into every aspect of the logistics industry. He explains why protecting data can be as critical as securing physical assets and how a layered defense approach helps safeguard both. Succi adds that awareness, collaboration, and resilience keep client trust and operations consistent."
        https://www.helpnetsecurity.com/2025/11/10/andrea-succi-ferrari-group-logistics-industry-cybersecurity/
      • AI Is Rewriting How Software Is Built And Secured
        "AI has become part of everyday software development, shaping how code is written and how fast products reach users. A new report from Cycode, The 2026 State of Product Security for the AI Era, explores how deeply AI now runs through development pipelines and how security teams are trying to manage the risks that come with it. Cycode surveyed 400 CISOs, AppSec leaders, and DevSecOps managers across the US and UK. Every organization said they have AI-generated code in their environment, and almost all are already using or testing AI coding assistants."
        https://www.helpnetsecurity.com/2025/11/10/ai-product-security-report/
      • As AI Enables Bad Actors, How Are 3,000+ Teams Responding?
        "This year has shown just how quickly new exposures can emerge, with AI-generated code shipped before review, cloud sprawl racing ahead of controls, and shadow IT opening blind spots. Supply chain compromises have disrupted transport, manufacturing, and other critical services. On the attacker side, AI-assisted exploit development is making it faster than ever to turn those weaknesses into working attacks. Intruder's 2025 Exposure Management Index draws on data from more than 3,000 small and mid-sized businesses (1-2,000 employees) to understand how defenders are adapting – revealing where progress is being made, and where pressure points remain. Below are three key trends shaping exposure management in 2025."
        https://www.theregister.com/2025/11/10/ai_enables_bad_actors/
      • OWASP Highlights Supply Chain Risks In New Top 10
        "OWASP has updated its list of Top 10 software vulnerabilities to align it better with the current threat landscape and modern development practices. The Nov. 6 release is OWASP's first major Top 10 update since 2021 and is notable for its emphasis on supply chain risks and systemic design weakness rather than just common software coding errors. For defenders, the key takeaway is the need to integrate application security, software supply chain oversight, and operational resilience practices more tightly together."
        https://www.darkreading.com/application-security/owasp-highlights-supply-chain-risks-new-top-10
        https://owasp.org/Top10/2025/0x00_2025-Introduction/
        https://www.securityweek.com/two-new-web-application-risk-categories-added-to-owasp-top-10/
      • Why Organizations Can’t Ignore Vendor Risk Assessment In Today’s Cyber-Threat Landscape
        "In an era where digital ecosystems extend far beyond a company’s internal network, enterprise cybersecurity is no longer solely about firewalls and endpoint protection. It’s about the unseen connections, the suppliers, service providers, cloud vendors and subcontractors who form part of the operational supply chain. One critical practice at the heart of this challenge is vendor risk assessment: the process of evaluating the risks that third parties pose to an organisation’s data, operations and reputation."
        https://hackread.com/organizations-vendor-risk-assessment-cyber-threat-landscape/
      • Agentic AI In Cybersecurity: Beyond Triage To Strategic Threat Hunting
        "With a deficit of 4 million cybersecurity workers worldwide, it’s no surprise that most SOCs are still stuck in triage mode. That’s why agentic AI is stepping in to fill the gap. And this boost to internal cybersecurity capabilities gives security teams the ability to do what was only a pipe dream before: engage in proactive security. In other words, agentic AI is taking low-level decisions off SOC’s plates, so they don’t have to spend their days playing a reactive game of cat-and-mouse. Using these new AI capabilities, they can move beyond emergency response and head into a more mature security stage of strategic threat hunting."
        https://securityaffairs.com/184413/uncategorized/agentic-ai-in-cybersecurity-beyond-triage-to-strategic-threat-hunting.html
      • Exposure Report: 65% Of Leading AI Companies Found With Verified Secret Leaks
        "AI companies are racing ahead, but many are leaving their secrets behind. We looked at 50 leading AI companies and found that 65% had leaked verified secrets on GitHub. Think API keys, tokens, and sensitive credentials, often buried deep in deleted forks, gists, and developer repos most scanners never touch. Some of these leaks could have exposed organizational structures, training data, or even private models. For teams building the future of AI, speed and security have to move together."
        https://www.wiz.io/blog/forbes-ai-50-leaking-secrets
        https://www.securityweek.com/many-forbes-ai-50-companies-leak-secrets-on-github/
        https://www.infosecurity-magazine.com/news/leading-ai-companies-secret-leaks/
      • Australia Sanctions Hackers Supporting North Korea’s Weapons Program
        "The Australian government announced sanctions against four entities and an individual believed to be involved in cybercriminal activities supporting North Korea’s weapons programs. “The Australia Government is taking this action with the United States to apply pressure on North Korea’s illegal revenue generation networks and address its persistent challenges to security and stability,” Foreign Minister Penny Wong said. The financial sanctions, accompanied by travel bans, target entities believed to have deep links with North Korea’s malicious cyber activities, such as cryptocurrency theft, fraudulent IT worker schemes, and espionage."
        https://www.securityweek.com/australia-sanctions-hackers-supporting-north-koreas-weapons-program/
      • New Browser Security Report Reveals Emerging Threats For Enterprises
        "According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in a single place, the user's browser. Yet traditional controls like DLP, EDR, and SSE still operate one layer too low. What's emerging isn't just a blindspot. It's a parallel threat surface: unmanaged extensions acting like supply chain implants, GenAI tools accessed through personal accounts, sensitive data copy/pasted directly into prompt fields, and sessions that bypass SSO altogether."
        https://thehackernews.com/2025/11/new-browser-security-report-reveals.html

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) c8c77cd2-1236-4771-b461-25ee3c2457f9-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 10 November 2025

      Healthcare Sector

      • Hospitals Are Running Out Of Excuses For Weak Cyber Hygiene
        "Healthcare leaders continue to treat cybersecurity as a technical safeguard instead of a strategic business function, according to the 2025 US Healthcare Cyber Resilience Survey by EY. The study, based on responses from 100 healthcare executives, outlines six areas where hospitals and health systems must act to close resilience gaps that threaten patient care and operations."
        https://www.helpnetsecurity.com/2025/11/07/ey-healthcare-risk-management-report/

      Industrial Sector

      • For OT Cyber Defenders, Lack Of Data Is The Biggest Threat
        "For those charged with the cyber defense of operational technology and industrial control systems, one challenge towers above all others: Data. Specifically, its scarcity. There's little hard data available about real life cyberattacks against OT and ICS. Most operators simply don't capture it, in stark contrast with their IT counterparts. Corporate victims of an IT attack typically call in a forensic analyst to comb through the logs and telemetry to spot how hackers broke in. Incident responders "run their tools on your systems. They can pull the data up," said Rob Lee CEO of OT cybersecurity leader Dragos."
        https://www.bankinfosecurity.com/for-ot-cyber-defenders-lack-data-biggest-threat-a-29959

      Vulnerabilities

      • Chrome 142 Update Patches High-Severity Flaws
        "Shortly after promoting Chrome 142 to the stable channel, Google pushed out an update to address five vulnerabilities in the browser, including three high-severity flaws. The first high-risk issue is CVE-2025-12725 (CVSS score of 8.8), described as an out-of-bounds write bug in Chrome’s WebGPU graphics API, which delivers high-performance visuals by allowing websites to interact with the system’s GPU. Out-of-bounds defects are rooted in insufficient bounds checking, which allows attackers to write data outside of the intended memory space, potentially leading to crashes or arbitrary code execution."
        https://www.securityweek.com/chrome-142-update-patches-high-severity-flaws/
      • QNAP Fixes Seven NAS Zero-Day Flaws Exploited At Pwn2Own
        "QNAP has fixed seven zero-day vulnerabilities that security researchers exploited to hack QNAP network-attached storage (NAS) devices during the Pwn2Own Ireland 2025 competition. The flaws impact QNAP's QTS and QuTS hero operating systems (CVE-2025-62847, CVE-2025-62848, CVE-2025-62849) and the company's Hyper Data Protector (CVE-2025-59389), Malware Remover (CVE-2025-11837), and HBS 3 Hybrid Backup Sync (CVE-2025-62840, CVE-2025-62842) software. QNAP said in advisories published on Friday that the security bugs were demonstrated at Pwn2Own by the Summoning Team, DEVCORE, Team DDOS, and a CyCraft technology intern."
        https://www.bleepingcomputer.com/news/security/qnap-fixes-seven-nas-zero-day-vulnerabilities-exploited-at-pwn2own/
        https://www.qnap.com/en/security-advisory/qsa-25-45
        https://securityaffairs.com/184396/hacking/qnap-fixed-multiple-zero-days-in-its-software-demonstrated-at-pwn2own-2025.html
      • Dangerous RunC Flaws Could Allow Hackers To Escape Docker Containers
        "Three newly disclosed vulnerabilities in the runC container runtime used in Docker and Kubernetes could be exploited to bypass isolation restrictions and get access to the host system. The security issues, tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 (all ), were reported this week and disclosed by SUSE software engineer and Open Container Initiative (OCI) board member Aleksa Sarai. runC is a universal container runtime and the OCI reference implementation for running containers. It is responsible for low-level operations such as creating the container process, setting up namespaces, mounts, and cgroups that higher-level tools, like Docker and Kubernetes, can call."
        https://www.bleepingcomputer.com/news/security/dangerous-runc-flaws-could-allow-hackers-to-escape-docker-containers/
        https://seclists.org/oss-sec/2025/q4/138

      Malware

      • 9 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads
        "Socket's Threat Research Team discovered nine malicious NuGet packages that inject time-delayed destructive payloads into database operations and target industrial control systems. Published under the NuGet alias shanhai666 between 2023 and 2024, these packages terminate the host application process with 20% probability on each database query after specific trigger dates in 2027 and 2028."
        https://socket.dev/blog/9-malicious-nuget-packages-deliver-time-delayed-destructive-payloads
        https://thehackernews.com/2025/11/hidden-logic-bombs-in-malware-laced.html
        https://www.bleepingcomputer.com/news/security/malicious-nuget-packages-drop-disruptive-time-bombs/
        https://www.theregister.com/2025/11/07/cybercriminals_plant_destructive_time_bomb/
      • LANDFALL: New Commercial-Grade Android Spyware In Exploit Chain Targeting Samsung Devices
        "Unit 42 researchers have uncovered a previously unknown Android spyware family, which we have named LANDFALL. To deliver the spyware, attackers exploited a zero-day vulnerability (CVE-2025-21042) in Samsung’s Android image processing library. The specific flaw LANDFALL exploited, CVE-2025-21042, is not an isolated case but rather part of a broader pattern of similar issues found on multiple mobile platforms."
        https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/
        https://www.bleepingcomputer.com/news/security/new-landfall-spyware-exploited-samsung-zero-day-via-whatsapp-messages/
        https://therecord.media/landfall-spyware-middle-east-appears-commercial-grade
        https://www.darkreading.com/mobile-security/landfall-malware-targeted-samsung-galaxy-users
        https://thehackernews.com/2025/11/samsung-zero-click-flaw-exploited-to.html
        https://cyberscoop.com/landfall-spyware-samsung-phones-palo-alto-networks-unit-42/
        https://securityaffairs.com/184331/security/landfall-spyware-exploited-samsung-zero-day-cve-2025-21042-in-middle-east-attacks.html
        https://www.securityweek.com/landfall-android-spyware-targeted-samsung-phones-via-zero-day/
        https://www.theregister.com/2025/11/07/landfall_spyware_samsung_0days/
        https://www.bankinfosecurity.com/samsung-zero-day-flaw-exploited-by-landfall-spyware-a-29963
      • Swapzone “Profit Trick” Web-Inject: From Lure To Live DOM Hijack
        "At Bolster’s Threat Intelligence Lab, we recently investigated a compact but effective JavaScript-based scam abusing the trust in swapzone.io, a popular crypto-exchange aggregator. The attack trades on greed and curiosity: victims are promised a “0-day glitch” or “100% working profit trick” and instructed to paste a single javascript: snippet into their browser address bar."
        https://bolster.ai/blog/swapzone-profit-trick-web-inject-from-lure-to-live-dom-hijack
        https://hackread.com/fake-0-day-exploit-emails-crypto-malicious-code/
      • China-Linked Actors Maintain Focus On Organizations Influencing U.S. Policy
        "Recent compromise of a non-profit organization reflects continued interest in U.S. policy. The TTPs have previously been linked to multiple Chinese actors such as Kelp, Space Pirates, and APT41. APT41 is one of the longest-running Chinese espionage groups. Attackers were aiming to establish a persistent and stealthy presence on the network. They gained access for several weeks in April 2025."
        https://www.security.com/threat-intelligence/china-apt-us-policy
        https://thehackernews.com/2025/11/from-log4j-to-iis-chinas-hackers-turn.html
        https://securityaffairs.com/184351/apt/china-linked-hackers-target-u-s-non-profit-in-long-term-espionage-campaign.html
      • Tracking a Dragon: Investigating a DragonForce-Affiliated Ransomware Attack With Darktrace
        "DragonForce is a Ransomware-as-a-Service (RaaS) platform that emerged in late 2023, offering broad-scale capabilities and infrastructure to threat actors. Recently, DragonForce has been linked to attacks targeting the UK retail sector, resulting in several high-profile cases [1][2]. Moreover, the group launched an affiliate program offering a revenue share of roughly 20%, significantly lower than commissions reported across other RaaS platforms [3]."
        https://www.darktrace.com/blog/tracking-a-dragon-investigating-a-dragonforce-affiliated-ransomware-attack-with-darktrace
      • GlassWorm Returns: New Wave Strikes As We Expose Attacker Infrastructure
        "Almost three weeks ago, we disclosed GlassWorm - the first self-propagating worm targeting VS Code extensions, using invisible Unicode characters to hide malicious code that literally disappears from code editors. On October 21, 2025, OpenVSX declared the incident "fully contained and closed." But on November 6, 2025 - sixteen days later - we detected a new wave of GlassWorm infections. Three more extensions compromised. A fresh Solana blockchain transaction providing new C2 endpoints. Same attacker infrastructure, still fully operational."
        https://www.koi.ai/blog/glassworm-returns-new-wave-openvsx-malware-expose-attacker-infrastructure
        https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-on-openvsx-with-3-new-vscode-extensions/
      • Nitrogen Ransomware: From Staged Loader To Full-Scale Extortion
        "The Nitrogen group is a sophisticated and financially motivated threat group that was first observed as a malware developer and operator in 2023. Since discovery, Nitrogen has transformed itself into a full end-to-end, double extortion ransomware operation. The location of the group, the identities/lineage of its members and relationships with other threat actors are not well documented."
        https://blog.barracuda.com/2025/11/07/nitrogen-ransomware--from-staged-loader-to-full-scale-extortion
      • Whisper Leak: A Novel Side-Channel Attack On Remote Language Models
        "Microsoft has discovered a new type of side-channel attack on remote language models. This type of side-channel attack could allow a cyberattacker a position to observe your network traffic to conclude language model conversation topics, despite being end-to-end encrypted via Transport Layer Security (TLS). We have worked with multiple vendors to get the risk mitigated, as well as made sure Microsoft-owned language model frameworks are protected."
        https://www.microsoft.com/en-us/security/blog/2025/11/07/whisper-leak-a-novel-side-channel-cyberattack-on-remote-language-models/
        https://thehackernews.com/2025/11/microsoft-uncovers-whisper-leak-attack.html
        https://securityaffairs.com/184372/hacking/ai-chat-privacy-at-risk-microsoft-details-whisper-leak-side-channel-attack.html
      • A New Italian Citizen Was Targeted With Paragon’s Graphite Spyware. We Have a Serious Problem
        "Italian political adviser Francesco Nicodemo said he was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Graphite is an invasive, non-auditable spyware that covertly accesses sensitive phone data; experts say it violates human rights and should be banned. Nicodemo is among 90 victims notified by WhatsApp about evidence linking their devices to Paragon spyware, according to a senior forensic researcher at Citizenlab, John Scott-Railton."
        https://securityaffairs.com/184340/security/a-new-italian-citizen-was-targeted-with-paragons-graphite-spyware-we-have-a-serious-problem.html

      General News

      • Russian National Pleads Guilty To Breaking Into Networks For Yanluowang Ransomware Attacks
        "A 25-year-old Russian national pleaded guilty to multiple charges stemming from their participation in ransomware attacks and faces a maximum penalty up to 53 years in prison. Aleksei Olegovich Volkov, also known as “chubaka.kor,” served as the initial access broker for the Yanluowang ransomware group while living in Russia from July 2021 through November 2022, according to court records. Prosecutors accuse Volkov and unnamed co-conspirators of attacking seven U.S. businesses during that period, including two that paid a combined $1.5 million in ransoms."
        https://cyberscoop.com/russian-aleksei-volkov-yanluowang-ransomware/
      • AI Agents Are Going Rogue: Here's How To Rein Them In
        "Last July, a leading agentic software creation platform company called Replit held a 12-day "vibe coding" event that wound up triggering a coding freeze, which allowed rogue AI agents to wreak havoc, with one even deleting a live production database, erasing records for more than 1,200 executives and nearly 1,200 companies. Then the AI agent launched a cover-up."
        https://www.darkreading.com/cyber-risk/ai-agents-going-rogue
      • Metrics Don’t Lie, But They Can Be Misleading When They Only Tell IT’s Side Of The Story
        "In this Help Net Security interview, Rik Mistry, Managing Partner at Interval Group, discusses how to align IT strategy with business goals. He explains how security, governance, and orchestration shape IT operations and why early collaboration between IT and security leaders leads to better outcomes. Mistry also shares his perspective on automation and emerging technologies."
        https://www.helpnetsecurity.com/2025/11/07/rik-mistry-interval-group-it-security-metrics/
      • What Keeps Phishing Training From Fading Over Time
        "When employees stop falling for phishing emails, it is rarely luck. A new study shows that steady, mandatory phishing training can cut risky behavior over time. After one year of continuous simulations and follow-up lessons, employees were half as likely to take the bait. The research, carried out by teams from various universities, offers a look at how behavior changes when training never stops."
        https://www.helpnetsecurity.com/2025/11/07/research-phishing-training-effectiveness/
        https://arxiv.org/pdf/2510.27298
      • Old Privacy Laws Create New Risks For Businesses
        "Businesses are increasingly being pulled into lawsuits over how they collect and share user data online. What was once the domain of large tech firms is now a widespread legal risk for companies of all sizes. The latest analysis from cyber insurer Coalition shows that outdated privacy laws are driving a surge in web privacy claims, with small and midsize businesses now common targets."
        https://www.helpnetsecurity.com/2025/11/07/businesses-web-privacy-lawsuits/
      • Who's Watching The Watchers? This Mozilla Fellow, And Her Surveillance Watch Map
        "Digital rights activist Esra'a Al Shafei found FinFisher spyware on her device more than a decade ago. Now she's made it her mission to surveil the companies providing surveillanceware, their customers, and their funders. "You cannot resist what you do not know, and the more you know, the better you can protect yourself and resist against the normalization of mass surveillance today," she told The Register. To this end, the Mozilla fellow founded Surveillance Watch last year. It's an interactive map that documents the growing number of surveillance software providers, which regions use the various products, and the investors funding them. Since its launch, the project has grown from mapping connections between 220 spyware and surveillance entities to 695 today."
        https://www.theregister.com/2025/11/08/mozilla_fellow_al_shafei/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 8347eeba-9e4f-44e2-817e-a4b9ca55c977-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • เตือนผู้ใช้ VSCode พบส่วนขยายติดมัลแวร์ GlassWorm ขโมยบัญชี GitHub และกระเป๋าคริปโท

      7135d7b2-679b-43b5-8133-b2ee6472aacf-image.png เตือนผู้ใช้ VSCode พบส่วนขยายติดมัลแวร์ GlassWorm ขโ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 8dee3a92-bbf4-4b0f-aca6-cfc551e7acaf-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cisco แก้ไขช่องโหว่ใน UCCX ที่ทำให้ผู้โจมตีเรียกใช้งานคำสั่งระดับ Root โดยไม่ต้องยืนยันตัวตน

      7c167cb8-fa27-4c2e-93d9-1e258879b29f-image.png Cisco แก้ไขช่องโหว่ใน UCCX ที่ทำให้ผู้โจมตีเรีย.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 06f54bcf-396e-421c-be83-f23653a620f1-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • มัลแวร์สายลับ "Landfall" พุ่งเป้าโจมตีผู้ใช้งาน Samsung ผ่านช่องโหว่ Zero-day

      6d094115-f961-49cd-bc66-f5dbd1f9e7ae-image.png มัลแวร์สายลับ Landfall พุ่งเป้าโจมตีผู้ใช้งาน Sam.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 2b3e9048-b280-46e0-9336-b124de9364e8-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เผยแพร่คำแนะนำด้านระบบควบคุมอุตสาหกรรม (ICS) จำนวน 4 รายการ

      Cybersecurity and Infrastructure Security Agency (CISA) ได้เผยแพร่คำแนะนำเกี่ยวกับระบบควบคุมอุตสาหกรรม (ICS) จำนวน 4 รายการ เมื่อวันที่ 6 พฤศจิกายน 2025 พื่อให้ข้อมูลที่ทันเวลาเกี่ยวกับประเด็นด้านความมั่นคงปลอดภัย ช่องโหว่ และการโจมตีที่เกี่ยวข้องกับระบบ ICS โดยมีรายละเอียดดังนี้

      • CSA-25-310-01 Advantech DeviceOn iEdge
      • ICSA-25-310-02 Ubia Ubox
      • ICSA-25-310-03 ABB FLXeon Controllers
      • ICSA-25-282-01 Hitachi Energy Asset Suite (Update A)

      CISA แนะนำให้ผู้ใช้งานและผู้ดูแลระบบ ตรวจสอบคำแนะนำ ICS ที่เผยแพร่ล่าสุด เพื่อศึกษารายละเอียดทางเทคนิคและแนวทางการลดความเสี่ยง (mitigations)

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2025/11/06/cisa-releases-four-industrial-control-systems-advisories 67f0f8ab-e11b-4e26-8f3d-54a742b1279d-image.png

      โพสต์ใน OT Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 07 November 2025

      Industrial Sector

      • Advantech DeviceOn/iEdge
        "Successful exploitation of these vulnerabilities could result in a denial-of-service condition, remote code execution, or an attacker reading arbitrary files."
        https://www.cisa.gov/news-events/ics-advisories/icsa-25-310-01
      • ABB FLXeon Controllers
        "Successful exploitation of these vulnerabilities could allow an attacker to take remote control of the product, insert and run arbitrary code, and crash the device being accessed."
        https://www.cisa.gov/news-events/ics-advisories/icsa-25-310-03
      • Ubia Ubox
        "Successful exploitation of this vulnerability could allow an attacker to remotely view camera feeds or modify settings."
        https://www.cisa.gov/news-events/ics-advisories/icsa-25-310-02

      New Tooling

      • OpenGuardrails: A New Open-Source Model Aims To Make AI Safer For Real-World Use
        "When you ask a large language model to summarize a policy or write code, you probably assume it will behave safely. But what happens when someone tries to trick it into leaking data or generating harmful content? That question is driving a wave of research into AI guardrails, and a new open-source project called OpenGuardrails is taking a bold step in that direction."
        https://www.helpnetsecurity.com/2025/11/06/openguardrails-open-source-make-ai-safer/
        https://github.com/openguardrails/openguardrails

      Vulnerabilities

      • Cisco Warns Of New Firewall Attack Exploiting CVE-2025-20333 And CVE-2025-20362
        "Cisco on Wednesday disclosed that it became aware of a new attack variant that's designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362. "This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service (DoS) conditions," the company said in an updated advisory, urging customers to apply the updates as soon as possible."
        https://thehackernews.com/2025/11/cisco-warns-of-new-firewall-attack.html
        https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh
        https://securityaffairs.com/184290/security/cisco-became-aware-of-a-new-attack-variant-against-secure-firewall-asa-and-ftd-devices.html
        https://www.theregister.com/2025/11/06/cisco_firewall_ongoing_attacks/
      • Critical Cisco UCCX Flaw Lets Attackers Run Commands As Root
        "Cisco has released security updates to patch a critical vulnerability in the Unified Contact Center Express (UCCX) software, which could enable attackers to execute commands with root privileges. The Cisco UCCX platform, described by the company as a "contact center in a box," is a software solution for managing customer interactions in call centers, supporting up to 400 agents. Tracked as CVE-2025-20354, this security flaw was discovered in the Java Remote Method Invocation (RMI) process of Cisco Unified CCX by security researcher Jahmel Harris, allowing unauthenticated attackers to execute arbitrary commands remotely with root permissions."
        https://www.bleepingcomputer.com/news/security/critical-cisco-uccx-flaw-lets-hackers-run-commands-as-root/
        https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-mult-vuln-gK4TFXSn
        https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-contact-center-appliance/
        https://www.helpnetsecurity.com/2025/11/06/cisco-fixes-critical-uccx-flaws-patch-asap-cve-2025-20358-cve-2025-20354/
      • Multi-Turn Attacks Expose Weaknesses In Open-Weight LLM Models
        "A new report has revealed that open-weight large language models (LLMs) have remained highly vulnerable to adaptive multi-turn adversarial attacks, even when single-turn defenses appear robust. The findings, published today by Cisco AI Defense, show that while isolated, one-off attack attempts frequently fail, persistent, multi-step conversations can achieve success rates exceeding 90% against most tested defenses."
        https://www.infosecurity-magazine.com/news/multi-turn-attacks-llm-models/
        https://arxiv.org/pdf/2511.03247

      Malware

      • An Unerring Spear: Cephalus Ransomware Analysis
        "Cephalus is a new ransomware group that first appeared in mid-June 2025. The group claims that they are motivated 100% by financial gain. Their main method of breaching organizations is by stealing credentials through Remote Desktop Protocol (RDP) accounts that do not have multi-factor authentication (MFA) enabled. Their operation is unique in that they have a form of customized ransomware that targets specific organizations, breaches them, exfiltrates their data, and then encrypts it. As of now, it is not yet known if they operate as Ransomware as a Service (RaaS) or if they have formed alliances with other ransomware groups. The name of the group comes from Cephalus, a character in Greek mythology who received an “unerring” spear from Artemis. This is seen as a sign of the group’s confidence in their success rate."
        https://asec.ahnlab.com/en/90878/
      • Ransomvibing Appears In VS Code Extensions
        "It was only a matter of time before ransomware techniques started to be included in VS Code extensions. One of the first overt examples was just discovered published to the Visual Studio Marketplace and it shows obvious signs of it being vibe coded. It utilizes GitHub as a command and control channel while also including exfiltration of encrypted files for potential extortion. This is not a sophisticated example, however, as the command and control server code was accidentally(?) included in the published extension's package along with decryption tools."
        https://secureannex.com/blog/ransomvibe/
        https://www.bleepingcomputer.com/news/security/ai-slop-ransomware-test-sneaks-on-to-vs-code-marketplace/
      • The Most Advanced ClickFix Yet?
        "ClickFix attacks have skyrocketed in the last year. This social engineering attack has established itself as a key part of the modern attacker’s toolkit, tricking victims into running malicious code on their device. As we showcased in our last webinar and at our threat briefing in London earlier this month, ClickFix is evolving fast, in terms of the web pages themselves, the delivery mechanisms by which they are sent to victims, and the nature of the payload and its execution. One particular example stood out to us in our research. So, is this the most advanced ClickFix you’ve seen?"
        https://pushsecurity.com/blog/the-most-advanced-clickfix-yet/
        https://www.bleepingcomputer.com/news/security/clickfix-malware-attacks-evolve-with-multi-os-support-video-tutorials/
      • Cavalry Werewolf Hacker Group Attacks Russian State Institutions
        "In July 2025, Doctor Web was contacted by a client from a government-owned organization within the Russian Federation with suspicions that its internal network had been compromised. This hypothesis derived from the fact that spam emails were detected as coming from one of their corporate email addresses. An investigation into the incident, conducted by our anti-virus laboratory, revealed that the institution had been subjected to a targeted attack by a hacker group, which our experts identified as Cavalry Werewolf. One of the attack’s goals was to collect confidential information as well as network configuration data."
        https://news.drweb.com/show/?i=15078&lng=en
        https://hackread.com/cavalry-werewolf-russia-government-shellnet-backdoor/
      • Phishing Campaigns “I Paid Twice” Targeting Booking.com Hotels And Customers
        "A Sekoia partner recently reported a phishing campaign targeting hospitality industry customers worldwide. The campaign was observed to involve either emails sent from a hotel’s compromised Booking.com account or messages distributed via WhatsApp. This activity proved particularly effective because the threat actor possessed customer data, including personal identifiers and reservation details, which further increased the credibility of the phishing attempts."
        https://blog.sekoia.io/phishing-campaigns-i-paid-twice-targeting-booking-com-hotels-and-customers/
        https://www.infosecurity-magazine.com/news/i-paid-twice-phishing-campaign/
      • Android Malware Steals Your Card Details And PIN To Make Instant ATM Withdrawals
        "The Polish Computer Emergency Response Team (CERT Polska) analyzed a new Android-based malware that uses NFC technology to perform unauthorized ATM cash withdrawals and drain victims’ bank accounts. Researchers found that the malware, called NGate, lets attackers withdraw cash from ATMs (Automated Teller Machines, or cash machines) using banking data exfiltrated from victims’ phones—without ever physically stealing the cards. NFC is a wireless technology that allows devices such as smartphones, payment cards, and terminals to communicate when they’re very close together. So, instead of stealing your bank card, the attackers capture NFC (Near Field Communication) activity on a mobile phone infected with the NGate malware and forward that transaction data to devices at ATMs. In NGate’s case the stolen data is sent over the network to the attackers’ servers rather than being relayed purely by radio."
        https://www.malwarebytes.com/blog/news/2025/11/android-malware-steals-your-card-details-and-pin-to-make-instant-atm-withdrawals
      • Sharing Is Scaring: The WhatsApp Screen-Sharing Scam You Didn’t See Coming
        "Scams and other threats that are doing the rounds on messaging apps like WhatsApp are a stark reminder of how easily even trusted platforms can be weaponized against us. One deceptive tactic that has gained traction recently involves tricking people into sharing their phone screens during a WhatsApp video call. The screen-sharing feature, available in WhatsApp since 2023, is increasingly being turned against the app’s users to steal their data, identities and money."
        https://www.welivesecurity.com/en/scams/sharing-is-scaring-whatsapp-screen-sharing-scam/

      Breaches/Hacks/Leaks

      • How a Ransomware Gang Encrypted Nevada Government's Systems
        "The State of Nevada has published an after-action report detailing how hackers breached its systems to deploy ransomware in August, and the actions taken to recover from the attack. The document is one of the few completely transparent technical report from a federal government in the U.S. on a cybersecurity incident, describing all the steps of the attacker and setting an example on how cybersecurity incidents should be handled. The incident impacted more than 60 state government agencies and disrupted essential services, from websites and phone systems to online platforms. 28 days later, without paying a ransom, the state recovered 90% of the impacted data that was required to restore affected services."
        https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/
        https://www.documentcloud.org/documents/26218568-gto-statewide-cyber-event-aar-final/
        https://therecord.media/nevada-declined-ransom-breach
        https://www.bankinfosecurity.com/report-nevada-state-hackers-evaded-detection-for-months-a-29948
        https://www.securityweek.com/nevada-ransomware-attack-started-months-before-it-was-discovered-per-report/
      • Federally Qualified Health Center Reports Ransomware Breach
        "Central Jersey Medical Center, a federally qualified health center that partners with public schools in Newark, New Jersey, is notifying an undisclosed number of people of a data breach related to an August ransomware attack. Among its other healthcare services, the Perth Amboy, New Jersey-based medical center, which has been serving the region since 2001, operates school-based health centers in Newark that offer dental, medical and mental health services to both students and adults in the community."
        https://www.bankinfosecurity.com/federally-qualified-health-center-reports-ransomware-breach-a-29950
      • Clop Ransomware Group Claims The Breach Of The Washington Post
        "The Clop Ransomware group announced the hack of the prestigious American daily newspaper The Washington Post. The cybercrime group created a page for the university on its Tor data leak site and announced it will leak the stolen data soon. The group claimed the company was breached due to its neglect of security, despite its responsibility to protect customers. “The company doesn’t care about its customers, it ignored their security!!!”"
        https://securityaffairs.com/184304/cyber-crime/clop-ransomware-group-claims-the-breach-of-the-washington-post.html
      • U.S. Congressional Budget Office Hit By Suspected Foreign Cyberattack
        "The U.S. Congressional Budget Office (CBO) confirms it suffered a cybersecurity incident after a suspected foreign hacker breached its network, potentially exposing sensitive data. In a statement shared with BleepingComputer, CBO spokesperson Caitlin Emma confirmed the "security incident" and said the agency acted quickly to contain it. "The Congressional Budget Office has identified the security incident, has taken immediate action to contain it, and has implemented additional monitoring and new security controls to further protect the agency's systems going forward," Emma told BleepingComputer."
        https://www.bleepingcomputer.com/news/security/us-congressional-budget-office-hit-by-suspected-foreign-cyberattack/

      General News

      • An X-Ray Of Modern Networks: Understanding And Mitigating IoT Security Risks
        "We analyzed 10 million devices in over 700 organizations active in October 2025 on Forescout’s Device Cloud. In this dataset, two-thirds of devices across all organizations are no longer traditional IT (workstations, laptops, servers, hypervisors, etc.). They are either network devices, such as routers and firewalls which are already a favorite target or ‘extended internet of things’ (xIoT) devices, including operational technology (OT), internet of things (IoT) and medical devices (IoMT)."
        https://www.forescout.com/blog/an-x-ray-of-modern-networks-understanding-and-mitigating-iot-security-risks/
        https://www.helpnetsecurity.com/2025/11/06/enterprise-xiot-devices-risk/
      • Humans Built The Problem, AI Just Scaled It
        "Information moves across cloud platforms, personal devices, and AI tools, often faster than security teams can track it. Proofpoint’s 2025 Data Security Landscape report shows that most organizations faced data loss last year, usually caused by their own people. With AI agents part of daily operations, security leaders are confronting risks that come from users and from the systems acting on their behalf."
        https://www.helpnetsecurity.com/2025/11/06/proofpoint-organizations-data-loss-report/
      • Retailers Are Learning To Say No To Ransom Demands
        "Ransomware remains one of the biggest operational risks for retailers, but the latest data shows a shift in how these attacks unfold. Fewer incidents now lead to data encryption, recovery costs have dropped, and businesses are bouncing back faster. Yet attackers are demanding more money, and security teams are feeling the strain. These findings come from the State of Ransomware in Retail 2025 report by Sophos, based on a global survey of 361 retail IT and cybersecurity leaders whose organizations were hit by ransomware in the past year. The results point to progress in resilience but also show where retail security programs still fall short."
        https://www.helpnetsecurity.com/2025/11/06/sophos-retail-ransomware-recovery-report/
      • ESET APT Activity Report Q2 2025–Q3 2025
        "ESET APT Activity Report Q2 2025–Q3 2025 summarizes notable activities of selected advanced persistent threat (APT) groups that were documented by ESET researchers from April through September 2025. The highlighted operations are representative of the broader landscape of threats we investigated during this period. They illustrate the key trends and developments and contain only a small fraction of the cybersecurity intelligence data provided to customers of ESET APT reports."
        https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/
        https://thehackernews.com/2025/11/trojanized-eset-installers-drop.html
        https://therecord.media/russia-sandworm-grain-wipers
        https://www.bleepingcomputer.com/news/security/sandworm-hackers-use-data-wipers-to-disrupt-ukraines-grain-sector/
        https://www.bankinfosecurity.com/russias-destructive-wiper-attacks-on-ukraine-rise-again-a-29945
        https://www.helpnetsecurity.com/2025/11/06/global-apt-activity-report-2025/
      • Why Microsegmentation Is Just a Dream For Many IT Teams
        "Microsegmentation has long been touted as the gold standard and preferred strategy for restricting hackers' lateral movement. It locks down network traffic between applications, and reduces the blast radius for breaches. Vendors say it's transformative, but if you walk into most large enterprises, you'll will find it half-implemented."
        https://www.bankinfosecurity.com/microsegmentation-just-dream-for-many-teams-a-29951
      • ENISA Sectorial Threat Landscape - Public Administration
        "This ENISA sectorial threat landscape report provides an overview of the cyber threats faced by the public administration sector in the EU in 2024. Drawing on open-source information, the report highlights the key threats that impacted the sector and provides insights into typical threat types and key adversaries, to support the sector’s ongoing efforts to improve its cybersecurity posture, maturity and resilience."
        https://www.enisa.europa.eu/publications/enisa-sectorial-threat-landscape-public-administration
        https://www.infosecurity-magazine.com/news/hacktivistdriven-ddos-attacks/

      อ้างอิง
      Electronic Transactions Development Agency(ETDA) 1c24377f-09c2-4fab-870c-3a7d72956033-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบช่องโหว่ Microsoft Teams เปิดทางผู้โจมตีปลอมตัวเป็นเพื่อนร่วมงานและแก้ไขข้อความได้โดยไม่ถูกตรวจจับ

      63dce910-f155-4c70-9dd8-367967c09571-image.png พบช่องโหว่ Microsoft Teams เปิดทางผู้โจมตีปลอมตัวเป.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 96e0138f-9f14-4288-aa51-04960edf1ab3-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Google ออกอัปเดตแก้ไขช่องโหว่ใน Android ที่เสี่ยงถูกโจมตีแบบ Remote Code Execution

      97e76199-3fed-4e95-8923-a49ba10c1ceb-image.png Google ออกอัปเดตแก้ไขช่องโหว่ใน Android ที่เสี่ยงถ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand afe61420-2801-4b3b-aeb2-4e070340d7fd-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Google เพิ่มระบบ Autofill ให้จำข้อมูลพาสปอร์ต ใบขับขี่ เพิ่มความสะดวกแต่เสี่ยงข้อมูลรั่วไหลหรือไม่?

      e3c22ed3-0919-4b86-9433-1dee747084ae-image.png Google เพิ่มระบบ Autofill ให้จำข้อมูลพาสปอร์ต ใบขับ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 2ffabbb0-bd75-4a7b-a0e4-4bb262b190f1-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 06 November 2025

      Industrial Sector

      • Operational Technology Security Poses Inherent Risks For Manufacturers
        "From supply chain risks and breaches to employees' physical safety, the manufacturing industry is no stranger to operational technology (OT) security challenges. The good news? Experts say awareness has increased among manufacturers. But whether that will lead to improvements is difficult to say. OT controls the processes and equipment necessary for manufacturers. It's built to last, but that also means there's legacy technology — unsupported and difficult to update — on the factory floor. A lack of visibility around an overwhelming number of assets presents heightened concerns as well. And then comes the human factor."
        https://www.darkreading.com/ics-ot-security/operational-technology-security-poses-inherent-risks-for-manufacturers

      New Tooling

      • Decrypted: Midnight Ransomware
        "In the ever-evolving landscape of cyber threats, a new ransomware strain known as Midnight has emerged, echoing the notorious tactics of its predecessor, Babuk. First detected by Gen researchers, Midnight blends familiar ransomware mechanics with novel cryptographic modifications – some of which unintentionally open the door to file recovery. This blog dives into the technical anatomy of Midnight, its lineage from Babuk, and the critical indicators of infection. Most importantly, it offers a practical guide to decrypting affected files, empowering victims with a rare opportunity to reclaim their data without paying a ransom."
        https://www.gendigital.com/blog/insights/research/midnight-ransomware
        https://hackread.com/norton-midnight-ransomware-free-decryptor/
      • VulnRisk: Open-Source Vulnerability Risk Assessment Platform
        "VulnRisk is an open-source platform for vulnerability risk assessment. It goes beyond basic CVSS scoring by adding context-aware analysis that reduces noise and highlights what matters. The tool is free to use and designed for local development and testing. The platform’s scoring engine cuts up to 90 percent of noise by applying contextual factors such as exploit likelihood and asset importance. Every score comes with a full calculation breakdown, so users can see exactly how each risk level is determined. VulnRisk’s transparent methodology makes it easier for teams to trust the results and adjust their security priorities."
        https://www.helpnetsecurity.com/2025/11/05/vulnrisk-open-source-vulnerability-risk-assessment-platform/
        https://github.com/GurkhaShieldForce/VulnRisk_Public

      Vulnerabilities

      • PromptJacking: The Critical RCEs In Claude Desktop That Turn Questions Into Exploits
        "Hi again. This is a reminder that while we often write about malicious extensions from unknown developers, or large scale supply chain compromises, sometimes, even the most trusted developers can make mistakes that may wreak havoc on your enterprise... We’ve identified severe RCE vulnerabilities in three extensions that were written, published, and promoted by Anthropic themselves - the Chrome, iMessage, and Apple Notes connectors, and are sitting at the very top of Claude Desktop's extension marketplace."
        https://www.koi.ai/blog/promptjacking-the-critical-rce-in-claude-desktop-that-turn-questions-into-exploits
        https://www.infosecurity-magazine.com/news/claude-desktop-extensions-prompt/
      • AMD Red-Faced Over Random-Number Bug That Kills Cryptographic Security
        "AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs. The flaw, tracked as CVE-2025-62626 (7.2), affects Zen 5 chips with the 16-bit and 32-bit instruction variants. The bug involves RDSEED, a function that generates high-quality random numbers used by security keys. RDSEED provides the true entropy that's required by apps generating high-strength cryptographic keys."
        https://www.theregister.com/2025/11/05/amd_promises_to_fix_chips/

      Malware

      • Gootloader Is Back (Back Again)
        "Before I start, I have to give credit, where it’s due. A Major shout-out to RussianPanda and the team at Huntress for catching this new Gootloader campaign in the wild. As the title suggests — yes, Gootloader is back. Back again. I was (like many others) hoping that after the disruptions my April blog caused, they’d finally hang up their hats and retire. But here we are. For over five years, the threat actor behind Gootloader has been using legal-themed bait — terms like “contract”, “form” and “agreement” — to draw victims into their traps. (There was that brief detour into PDF converters.)"
        https://gootloader.wordpress.com/2025/11/05/gootloader-is-back-back-again/
        https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/
      • International Threats – Infection URLs Used In Regional Phishing Campaigns
        "Cofense Intelligence relies on over 35 million trained employees from around the world, and a considerable number of analyzed campaigns are written in languages other than English. This report focuses on the URLs embedded in emails that bypassed email security controls like secure email gateways (SEGs) to deliver malware. The URLs that are the focus of this report are commonly referred to as “infection URLs” as they are the source for an infection by malware. Infection URLs, especially the services hosting them, are important as they represent the first step in a chain of events that can be broken with proper preparations and tools. This report is part of a series of reports covering different trends in phishing campaigns that are delivered by the top five non-English languages that Cofense sees. Other topics include the malware families and delivery mechanisms seen in different languages, as well as the themes seen in various languages."
        https://cofense.com/blog/international-threats-infection-urls-used-in-regional-phishing-campaigns
      • Crossed Wires: a Case Study Of Iranian Espionage And Attribution
        "In June, Proofpoint Threat Research began investigating a benign email discussing economic uncertainty and domestic political unrest in Iran. While coinciding with the escalations in the Iran-Israel conflict, there was no indication that the observed activity was directly correlated with Israel’s attacks on Iranian nuclear facilities or Iran’s actions in response. Initial analysis of the activity found tactics, techniques, and procedures (TTP) overlaps with multiple Iranian aligned groups, including TA455 (C5 Agent, Smoke Sandstorm), TA453 (Mint Sandstorm, Charming Kitten), and TA450 (MuddyWater, Mango Sandstorm). Given a lack of high confidence links to any one established threat group, we designated the activity as a temporary cluster called UNK_SmudgedSerpent."
        https://www.proofpoint.com/us/blog/threat-insight/crossed-wires-case-study-iranian-espionage-and-attribution
        https://thehackernews.com/2025/11/mysterious-smudgedserpent-hackers.html
        https://www.darkreading.com/cyberattacks-data-breaches/iranian-apt-phishes-us-policy-wonks
        https://www.infosecurity-magazine.com/news/unksmudgedserpent-targets-academics/
      • Voice Of SecOps Spotlight: Tis The Season For Online Sales — And AI-Fueled Cyberattacks
        "With Black Friday, Cyber Monday, and peak holiday shopping just weeks away, retailers anticipate record-breaking sales volumes — paired with a sharp surge in cyber risk. The massive flow of sensitive data, cloud file transfers, and third-party integrations makes this the most dangerous time of year. Deep Instinct recently released the sixth edition of its Voice of SecOps Report, Cybersecurity & AI – Promises, Pitfalls, and Prevention Paradise, which sheds light on how leaders across seven industries, including the retail and eCommerce sector, are bracing for this challenge. The report reveals a clear warning: while AI is driving unprecedented productivity gains for retail security teams, it’s also exposing new vulnerabilities that legacy defenses can’t handle."
        https://www.deepinstinct.com/blog/voice-of-secops-spotlight-tis-the-season-for-online-sales-and-ai-fueled-cyberattacks
      • Ghosts In /proc: Manipulation And Timeline Corruption
        "In our previous blog, “Hiding in plain sight: Techniques and defenses against /proc filesystem manipulation in Linux” we explored techniques for concealing malicious processes from forensics triage tools. Forensic analysts often rely on the Linux virtual filesystem /proc to enumerate processes, reconstruct timelines, and attribute activity to specific executables. Utilities such as ps, top, and various triage scripts extract process metadata from files located under /proc//, including cmdline and stat. The integrity of these files is therefore critical to many incident response workflows."
        https://www.group-ib.com/blog/ghosts-in-proc/
      • HackedGPT: Novel AI Vulnerabilities Open The Door For Private Data Leakage
        "Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms. Prompt injections are a weakness in how large language models (LLMs) process input data. An attacker can manipulate the LLM by injecting instructions into any data it ingests, which can cause the LLM to ignore the original instructions and perform unintended or malicious actions instead. Specifically, indirect prompt injection occurs when an LLM finds unexpected instructions in an external source, such as a document or website, rather than a direct prompt from the user."
        https://www.tenable.com/blog/hackedgpt-novel-ai-vulnerabilities-open-the-door-for-private-data-leakage
        https://thehackernews.com/2025/11/researchers-find-chatgpt.html
      • PHP Cryptomining Campaign: October/November 2025
        "From August through October 2025, we observed (GreyNoise Visualizer) a clear ramp-up in exploitation attempts against PHP and PHP-based frameworks as actors push to deploy cryptominers. The query below captures a range of attempts (ThinkPHP, PHP CGI, PHPUnit, the recent PHP CVE-2024-4577, etc.), and the telemetry shows seven distinct attack patterns that move in parallel: steady in August–September, then spiking into October and November."
        https://www.greynoise.io/blog/php-cryptomining-campaign

      Breaches/Hacks/Leaks

      • Hyundai AutoEver America Data Breach Exposes SSNs, Drivers Licenses
        "Hyundai AutoEver America is notifying individuals that hackers breached the company's IT environment and gained access to personal information. The company discovered the intrusion on March 1 but the investigation revealed that the attacker had access to the systems since February 22nd. Hyundai AutoEver America (HAEA) is an affiliate of Hyundai Motor Group that provides IT consulting, managed services, and helpdesk support for the entire lifecycle of automotive IT from production to retirement."
        https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/
      • SonicWall Says State-Sponsored Hackers Behind September Security Breach
        "SonicWall's investigation into the September security breach that exposed customers' firewall configuration backup files concludes that state-sponsored hackers were behind the attack. The network security company says that incident responders from Mandiant confirmed that the malicious activity had no impact on SonicWall's products, firmware, systems, tools, source code, or customer networks. “The Mandiant investigation is now complete. Their findings confirm that the malicious activity – carried out by a state-sponsored threat actor - was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,” SonicWall states."
        https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/
        https://www.sonicwall.com/blog/cloud-backup-security-incident-investigation-complete-and-strengthened-cyber-resilience
        https://securityaffairs.com/184258/security/sonicwall-blames-state-sponsored-hackers-for-september-security-breach.html

      General News

      • GTIG AI Threat Tracker: Advances In Threat Actor Usage Of AI Tools
        "Based on recent analysis of the broader threat landscape, Google Threat Intelligence Group (GTIG) has identified a shift that occurred within the last year: adversaries are no longer leveraging artificial intelligence (AI) just for productivity gains, they are deploying novel AI-enabled malware in active operations. This marks a new operational phase of AI abuse, involving tools that dynamically alter behavior mid-execution. This report serves as an update to our January 2025 analysis, "Adversarial Misuse of Generative AI," and details how government-backed threat actors and cyber criminals are integrating and experimenting with AI across the industry throughout the entire attack lifecycle. Our findings are based on the broader threat landscape."
        https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools
        https://www.bleepingcomputer.com/news/security/google-warns-of-new-ai-powered-malware-families-deployed-in-the-wild/
        https://thehackernews.com/2025/11/google-uncovers-promptflux-malware-that.html
        https://therecord.media/new-malware-uses-ai-to-adapt
        https://www.bankinfosecurity.com/malware-developers-test-ai-for-adaptive-code-generation-a-29932
        https://www.securityweek.com/malware-now-uses-ai-during-execution-to-mutate-and-collect-data-google-warns/
        https://www.helpnetsecurity.com/2025/11/05/malware-using-llms/
        https://www.theregister.com/2025/11/05/attackers_experiment_with_gemini_ai/
      • Operation Chargeback: 4.3 Million Cardholders Affected, EUR 300 Million In Damages
        "On 4 November 2025, an international coordinated action day targeted three major fraud and money laundering networks as part of Operation “Chargeback.” Led by the Cybercrime Department (Landeszentralstelle Cybercrime) of the General Prosecutor's Office (Generalstaatsanwaltschaft) in Koblenz, Germany, and the German Federal Criminal Police Office (Bundeskriminalamt), the operation has been investigating these networks since December 2020. More than 60 house searches were conducted and a total of 18 arrest warrants executed. The criminal networks are suspected of misusing credit card data from over 4.3 million cardholders across 193 countries. In total, the estimated damage from the fraud scheme exceeds EUR 300 million, with attempted damages amounting to over EUR 750 million."
        https://www.europol.europa.eu/media-press/newsroom/news/operation-chargeback-43-million-cardholders-affected-eur-300-million-in-damages
        https://www.eurojust.europa.eu/news/eurojust-coordinates-major-operation-against-eur-300-million-global-credit-card-fraud-18
        https://www.bleepingcomputer.com/news/security/europol-credit-card-fraud-rings-stole-eur-300-million-from-43-million-cardholders/
        https://therecord.media/europe-police-bust-global-fraud-ring-payment-firms
        https://www.bankinfosecurity.com/cops-cuff-18-suspects-over-345m-credit-card-fraud-scheme-a-29935
        https://www.infosecurity-magazine.com/news/operation-chargeback-uncovers/
        https://www.helpnetsecurity.com/2025/11/05/global-credit-card-fraud-arrests/
      • Closing The AI Execution Gap In Cybersecurity — A CISO Framework
        "Artificial intelligence (AI) is a present-day reality reshaping the cybersecurity landscape. For chief information security officers (CISOs), the integration of AI into security frameworks is a double-edged sword. AI promises enhanced efficiency, predictive capabilities, and automation for internal security teams. Simultaneously, it also endows bad actors with new tools to exploit vulnerabilities across complex ICT supply chains."
        https://www.darkreading.com/cybersecurity-operations/closing-ai-execution-gap-cybersecurity-ciso-framework
      • Risk 'Comparable' To SolarWinds Incident Lurks In Popular Software Update Tool
        "Researchers have discovered a supply chain risk in a popular installer authoring tool, which they've described as potentially leading to cyberattacks "comparable in scope to supply chain incidents like SolarWinds." Its developers, however, say it's working as intended. The tool, Advanced Installer, is used for building application installers. After developing their software, vendors turn to it to bundle all the many files, dependencies, drivers, configurations, and so on that allow their software to install smoothly on customers' systems."
        https://www.darkreading.com/application-security/risk-solarwinds-popular-software-tool-update
      • Threat Spotlight: How Automation, Customization, And Tooling Signal Next Ransomware Front Runners
        "In the competitive ransomware-as-a-service (RaaS) ecosystem, a group’s success—defined here as victim count on its data-leak sitei—depends on the sophistication of its platform and its unique offerings. Such bespoke platforms attract the most skilled affiliates, who can often bypass stronger defenses to compromise higher-revenue organizations, increasing the likelihood of a successful extortion payment."
        https://reliaquest.com/blog/threat-spotlight-how-automation-customization-and-tooling-signal-ransomware
        https://www.darkreading.com/cyberattacks-data-breaches/inside-the-playbook-of-ransomware-s-most-profitable-players
      • Credentials And Misconfigurations Behind Most Cloud Breaches, Says AWS
        "Businesses are rapidly moving into the public cloud, a change confirmed by the “Building Cloud Trust” report from Amazon Web Services (AWS) and UK-based research firm Vanson Bourne. This report is based on a survey of 2,800 technology and security firms across 13 countries conducted during September and October. The findings show that while the public cloud is now central to how organisations operate, given its agility, they are simultaneously facing unexpected threats that demand continuous caution."
        https://hackread.com/aws-credentials-misconfigurations-cloud-breaches/
        https://d1.awsstatic.com/onedam/marketing-channels/website/aws/en_US/whitepapers/compliance/Cloud_Trust_Report.pdf
      • PortGPT: How Researchers Taught An AI To Backport Security Patches Automatically
        "Keeping older software versions secure often means backporting patches from newer releases. It is a routine but tedious job, especially for large open-source projects such as the Linux kernel. A new research effort has built a tool that uses a large language model to do that work automatically. A team of researchers from China, the United States, and Canada created PortGPT, an AI system designed to automate the process of migrating security patches from mainline branches to older versions of software. They describe their method as an attempt to replicate the reasoning steps that developers use when they manually adapt patches."
        https://www.helpnetsecurity.com/2025/11/05/portgpt-ai-backport-security-patches-automatically/
      • AI Can Flag The Risk, But Only Humans Can Close The Loop
        "In this Help Net Security interview, Dilek Çilingir, Global Forensic & Integrity Services Leader at EY, discusses how AI is transforming third-party assessments and due diligence. She explains how machine learning and behavioral analytics help organizations detect risks earlier, improve compliance, and strengthen accountability. As oversight grows, Çilingir explains why human judgment still matters in every AI-supported decision."
        https://www.helpnetsecurity.com/2025/11/05/dilek-cilingir-ey-ai-third-party-assessments/

      อ้างอิง
      Electronic Transactions Development Agency(ETDA) 9ea54382-5fab-4dcc-b1d4-766d53b86b57-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 05 November 202

      Industrial Sector

      • Cyber Physical Systems Face Rising Geopolitical Risks
        "Global conflicts, civil unrest and tariff wars provide new opportunities for cyber adversaries, especially those targeting operational technology systems. Attackers are now focusing on fragile supply chains affected by geopolitical conflicts. Researchers predict this heightened threat environment will result in at least one major cyber-physical breach in the next 12 months. Geopolitical risks are creating instability in the sourcing, manufacturing and delivery of critical hardware and software components, said Sean Tufts, field CTO at Claroty, which recently released Global State of CPS Security 2025, a report based on a global survey of 1,100 cybersecurity professionals responsible for the protection of cyber-physical systems."
        https://www.bankinfosecurity.com/cyber-physical-systems-face-rising-geopolitical-risks-a-29931
        https://claroty.com/resources/reports/the-global-state-of-cps-security-2025-navigating-risk-in-an-uncertain-economic-landscape

      Vulnerabilities

      • Jobmonster - Job Board WordPress Theme <= 4.8.1 - Authentication Bypass
        "The Noo JobMonster theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 4.8.1. This is due to the check_login() function not properly verifying a user's identity prior to successfully authenticating them This makes it possible for unauthenticated attackers to bypass standard authentication and access administrative user accounts. Please note social login needs to be enabled in order for a site to be impacted by this vulnerability."
        https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-themes/noo-jobmonster/jobmonster-job-board-wordpress-theme-481-authentication-bypass
        https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-auth-bypass-flaw-in-jobmonster-wordpress-theme/
      • Radiometrics VizAir
        "Successful exploitation of these vulnerabilities could allow attackers to manipulate critical weather parameters and runway settings, mislead air traffic control and pilots, extract sensitive meteorological data, and cause significant disruption to airport operations, leading to hazardous flight conditions."
        https://www.cisa.gov/news-events/ics-advisories/icsa-25-308-04
      • 400,000 WordPress Sites Affected By Account Takeover Vulnerability In Post SMTP WordPress Plugin
        "On October 11th, 2025, we received a submission for an Account Takeover via Email Log Disclosure vulnerability in Post SMTP, a WordPress plugin with more than 400,000 active installations. This vulnerability makes it possible for an unauthenticated attacker to view email logs, including password reset emails, and change the password of any user, including an administrator, which allows them to take over the account and the website."
        https://www.wordfence.com/blog/2025/11/400000-wordpress-sites-affected-by-account-takeover-vulnerability-in-post-smtp-wordpress-plugin/
        https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-post-smtp-to-hijack-admin-accounts/
      • Critical RCE Vulnerability CVE-2025-11953 Puts React Native Developers At Risk
        "The JFrog Security Research team recently discovered and disclosed CVE-2025-11953 – a critical (CVSS 9.8) security vulnerability affecting the extremely popular @react-native-community/cli NPM package that has approximately 2M weekly downloads. The vulnerability allows remote unauthenticated attackers to easily trigger arbitrary OS command execution on the machine running react-native-community/cli’s development server, posing a significant risk to developers."
        https://jfrog.com/blog/cve-2025-11953-critical-react-native-community-cli-vulnerability/
        https://thehackernews.com/2025/11/critical-react-native-cli-flaw-exposed.html
        https://www.securityweek.com/critical-flaw-in-popular-react-native-npm-package-exposes-developers-to-attacks/
      • Android Update Patches Critical Remote Code Execution Flaw
        "Google on Monday announced a fresh set of security updates for the Android platform, to address two vulnerabilities in the System component. The November 2025 Android fixes mark another shift from the monthly updates the internet giant has been rolling out since 2015, as they come with a single security patch level, the 2025-11-01 patch level. For nearly a decade, the update was split into two security patch levels, to make it easier for vendors to address vulnerabilities specific to their devices. The second security patch level of each month contained patches for all the bugs described in that month’s security bulletin."
        https://www.securityweek.com/android-update-patches-critical-remote-code-execution-flaw/
        https://securityaffairs.com/184208/security/google-fixed-a-critical-remote-code-execution-in-android.html
      • Survision License Plate Recognition Camera
        "Successful exploitation of this vulnerability could allow an attacker to fully access the system without requiring authentication."
        https://www.cisa.gov/news-events/ics-advisories/icsa-25-308-02
      • Delta Electronics CNCSoft-G2
        "Successful exploitation of this vulnerability could allow attackers to execute arbitrary code in the context of the current process."
        https://www.cisa.gov/news-events/ics-advisories/icsa-25-308-03
      • IDIS ICM Viewer
        "Successful exploitation of this vulnerability could result in an attacker executing arbitrary code."
        https://www.cisa.gov/news-events/ics-advisories/icsa-25-308-05
      • Apple Patches 19 WebKit Vulnerabilities
        "Apple on Monday announced the release of security updates for iOS and macOS to resolve over 100 vulnerabilities. iOS 26.1 and iPadOS 26.1 were rolled out with patches for 56 security defects, including 19 issues that affect the WebKit browser engine. Successful exploitation of the flaws, Apple notes in its advisory, could allow websites to exfiltrate data cross-origin, could lead to unexpected process crashes and memory corruption, and could allow applications to monitor keystrokes."
        https://www.securityweek.com/apple-patches-19-webkit-vulnerabilities/
        https://thehackernews.com/2025/11/googles-ai-big-sleep-finds-5-new.html
        https://securityaffairs.com/184184/security/google-big-sleep-found-five-vulnerabilities-in-safari.html
        https://cyberscoop.com/apple-security-update-november-2025/
      • CISA Adds Two Known Exploited Vulnerabilities To Catalog
        "CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2025-11371 Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability
        CVE-2025-48703 CWP Control Web Panel OS Command Injection Vulnerability"
        https://www.cisa.gov/news-events/alerts/2025/11/04/cisa-adds-two-known-exploited-vulnerabilities-catalog
      • Fuji Electric Monitouch V-SFT-6
        "Successful exploitation of these vulnerabilities could crash the accessed device; a buffer overflow condition may allow remote code execution."
        https://www.cisa.gov/news-events/ics-advisories/icsa-25-308-01
      • Exploiting Trust In Collaboration: Microsoft Teams Vulnerabilities Uncovered
        "Trust alone isn’t a security strategy. That’s the key lesson from new research by Check Point Research, which uncovered multiple vulnerabilities in Microsoft Teams that could allow attackers to impersonate executives, manipulate messages, and spoof notifications. With more than 320 million monthly active users, Microsoft Teams has become the backbone of modern workplace communication. From boardroom meetings to quick one-to-one chats, it powers the daily interactions of enterprises, small businesses, and governments worldwide. But Check Point Research’s latest findings show how attackers can twist the very trust mechanisms that make Teams effective, turning collaboration into an attack vector."
        https://blog.checkpoint.com/research/exploiting-trust-in-collaboration-microsoft-teams-vulnerabilities-uncovered/
        https://thehackernews.com/2025/11/microsoft-teams-bugs-let-attackers.html
        https://www.theregister.com/2025/11/04/microsoft_teams_bugs_could_let/
      • TruffleHog, Fade In And BSAFE Crypto-C Vulnerabilities
        "Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Dell BSAFE, two in Fade In screenwriting software, and one in Trufflehog. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy. For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website."
        https://blog.talosintelligence.com/trufflehog-fade-in-and-bsafe-crypto-c-vulnerabilities/
      • Zscaler Discovers Vulnerability In Keras Models Allowing Arbitrary File Access And SSRF (CVE-2025-12058)
        "Zscaler uncovered a vulnerability in Keras that exposed AI and machine learning environments to file access and network exploitation risks, highlighting the urgent need to secure the AI model supply chain. Through responsible disclosure and ongoing research, Zscaler helps enterprises stay protected from emerging AI threats with a Zero Trust approach."
        https://www.zscaler.com/blogs/security-research/zscaler-discovers-vulnerability-keras-models-allowing-arbitrary-file-access

      Malware

      • Curly COMrades: Evasion And Persistence Via Hidden Hyper-V Virtual Machines
        "This investigation, conducted with support from the Georgian CERT functioning under the Operative-Technical Agency of Georgia, uncovered new tools and techniques used by the Curly COMrades threat actor. They established covert, long-term access to victim networks by abusing virtualization features (Hyper-V) on compromised Windows 10 machines to create a hidden remote operating environment. We first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques."
        https://businessinsights.bitdefender.com/curly-comrades-evasion-persistence-hidden-hyper-v-virtual-machines
        https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/
        https://www.darkreading.com/endpoint-security/pro-russian-hackers-linux-vms-hide-windows
        https://www.theregister.com/2025/11/04/russian_spies_pack_custom_malware/
      • Inside The Rise Of AI-Powered Pharmaceutical Scams
        "Over the past few months, we identified an emerging online threat that combines fraud, social engineering, and genuine health risks. Scammers are now impersonating licensed physicians and medical clinics to promote counterfeit or unsafe medications, frequently leveraging AI and deepfake technology to generate convincing fake photos, videos, and endorsements. The stakes extend beyond financial theft. Victims are persuaded to purchase and consume unapproved or potentially dangerous substances marketed as legitimate prescriptions. This convergence of digital deception and physical harm makes the threat particularly insidious – Criminals exploit the trust inherent in healthcare relationships to generate revenue while amplifying their reach through fraudulent social proof."
        https://blog.checkpoint.com/healthcare/inside-the-rise-of-ai-powered-pharmaceutical-scams/
      • Scattered LAPSUS$ Hunters: Anatomy Of a Federated Cybercriminal Brand
        "Trustwave SpiderLabs’ Cyber Threat Intelligence team is tracking the recent emergence of what appears to be the consolidation of three well-known threat groups into a “federated alliance” that offers, among its activities, Extortion-as-a-Service (EaaS). The collective comprises Scattered Spider, ShinyHunters, and LAPSUS$. The group heavily uses a public encryption communication service as its primary operating base and allows its EaaS affiliates to use the member’s very well-known names to create fear, which it claims will generate a higher financial return."
        https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/scattered-lapsuss-hunters-anatomy-of-a-federated-cybercriminal-brand/
        https://thehackernews.com/2025/11/a-cybercrime-merger-like-no-other.html
        https://www.infosecurity-magazine.com/news/scattered-spider-shinyhunters/
      • The DragonForce Cartel: Scattered Spider At The Gate
        "Acronis Threat Research Unit (TRU) analyzed recent activity linked to the DragonForce ransomware group and identified a new malware variant in the wild. The latest sample uses vulnerable drivers such as truesight.sys and rentdrv2.sys to disable security software, terminate protected processes and correct encryption flaws previously associated with Akira ransomware. The updated encryption scheme addresses weaknesses publicly detailed in a Habr article cited on DragonForce’s leak site."
        https://www.acronis.com/en/tru/posts/the-dragonforce-cartel-scattered-spider-at-the-gate/
        https://www.infosecurity-magazine.com/news/dragonforce-cartel-conti-derived/
      • LABScon25 Replay | LLM-Enabled Malware In The Wild
        "This presentation explores the emerging threat of LLM-enabled malware, where adversaries embed Large Language Model capabilities directly into malicious payloads. Unlike traditional malware, these threats generate malicious code at runtime rather than embedding it statically, creating significant detection challenges for security teams. SentinelLABS’ Alex Delamotte and Gabriel Bernadett-Shapiro present their team’s research on how LLMs are weaponized in the wild, distinguishing between various adversarial uses, from AI-themed lures to genuine LLM-embedded malware. The research focused on malware that leverages LLM capabilities as a core operational component, exemplified by notable cases like PromptLock ransomware and APT28’s LameHug/PROMPTSTEAL campaigns."
        https://www.sentinelone.com/labs/labscon25-replay-llm-enabled-malware-in-the-wild/

      Breaches/Hacks/Leaks

      • Apache OpenOffice Disputes Data Breach Claims By Ransomware Gang
        "The Apache Software Foundation disputes claims that its OpenOffice project suffered an Akira ransomware attack, after the threat actors claimed to have stolen 23 GB of corporate documents. Apache OpenOffice is a free, open-source office suite that includes word processing, spreadsheets, presentations, graphics, and database tools. It's compatible with major file formats, such as Word and Excel, and runs on multiple operating systems. On October 30th, the Akira ransomware gang claimed it had breached Apache OpenOffice and stolen 23 GB of data, including employee and financial information, as well as internal files."
        https://www.bleepingcomputer.com/news/security/apache-openoffice-disputes-data-breach-claims-by-ransomware-gang/
      • Data Breach At Major Swedish Software Supplier Impacts 1.5 Million
        "The Swedish Authority for Privacy Protection (IMY) is investigating a cyberattack on IT systems supplier Miljödata that exposed data belonging to 1.5 million people. Miljödata is an IT systems supplier for roughly 80% of Sweden's municipalities. The company disclosed the incident on August 25, saying that the attackers stole data and demanded 1.5 Bitcoin to not leak it. The attack caused operational disruptions that affected citizens in multiple regions in the country, including Halland, Gotland, Skellefteå, Kalmar, Karlstad, and Mönsterås."
        https://www.bleepingcomputer.com/news/security/data-breach-at-major-swedish-software-supplier-impacts-15-million/
      • Media Giant Nikkei Reports Data Breach Impacting 17,000 People
        "Japanese publishing giant Nikkei announced earlier today that its Slack messaging platform had been compromised, exposing the personal information of over 17,000 employees and business partners. Nikkei is one of the largest media corporations worldwide, owns the Financial Times and The Nikkei, the world's largest financial newspaper. It has approximately 3.7 million digital paid subscriptions, as well as over 40 affiliated companies involved in publishing, broadcasting, events, database services, and the index business."
        https://www.bleepingcomputer.com/news/security/media-giant-nikkei-reports-data-breach-impacting-17-000-people/
      • Polish Loan Platform Hacked; Mobile Payment System And Other Businesses Disrupted
        "Polish authorities are investigating a series of cyberattacks that disrupted digital services and exposed personal data from several major companies, including a leading online lender and the country’s top mobile payment system. Digital Affairs Minister Krzysztof Gawkowski said cyberattacks targeting Poland’s public and private infrastructure are becoming “commonplace.” “We’re seeing thousands of incidents reported daily,” he added."
        https://therecord.media/poland-hacks-loan-platform-mobile-payments-system-travel-agency

      General News

      • How Nations Build And Defend Their Cyberspace Capabilities
        "In this Help Net Security interview, Dr. Bernhards Blumbergs, Lead Cyber Security Expert at CERT.LV, discusses how cyberspace has become an integral part of national and military operations. He explains how countries develop capabilities to act and defend in this domain, often in coordination with activities in other areas of conflict. Dr. Blumbergs also explains that, despite progress in forensics and AI, identifying who is responsible for cyberspace operations remains difficult and often uncertain."
        https://www.helpnetsecurity.com/2025/11/04/bernhards-blumbergs-cert-lv-cyberspace-operations-attribution/
      • Cybercriminals Have Built a Business On YouTube’s Blind Spots
        "The days when YouTube was just a place for funny clips and music videos are behind us. With 2.53 billion active users, it has become a space where entertainment, information, and deception coexist. Alongside everyday videos, the site has seen more scams, deepfakes, and promotions hiding harmful links behind familiar logos. Malware found in tutorials, hijacked creator accounts, and fraudulent investment content have become recurring issues."
        https://www.helpnetsecurity.com/2025/11/04/youtube-video-scams-cybercrime/
        https://www.arxiv.org/abs/2509.23418
      • Financial Services Can’t Shake Security Debt
        "In financial services, application security risk is becoming a long game. Fewer flaws appear in new code, but old ones linger longer, creating a kind of software “interest” that keeps growing, according to Veracode’s 2025 State of Software Security report. Researchers analyzed data from more than 1.3 million applications and 126 million security findings. Financial institutions perform better than average at preventing severe vulnerabilities, but they are slower to fix them and carry more long-term security debt than most other sectors."
        https://www.helpnetsecurity.com/2025/11/04/veracode-financial-services-security-debt/
        https://www.veracode.com/resources/analyst-reports/state-of-software-security-2025/
      • Decisive Actions Against Cryptocurrency Scammers Earning Over EUR 600 Million
        "Nine people suspected of money laundering have been arrested during a synchronised operation that took place in three countries at the same time. The suspects set up a cryptocurrency money laundering network that scammed victims out of over EUR 600 million. Eurojust, the EU’s judicial cooperation hub, ensured that French, Belgian, Cypriot, German and Spanish authorities worked together to take the network down."
        https://www.eurojust.europa.eu/news/decisive-actions-against-cryptocurrency-scammers-earning-over-eur-600-million
        https://www.bleepingcomputer.com/news/security/european-police-dismantles-600-million-crypto-investment-fraud-ring/
        https://therecord.media/9-arrested-europe-crypto-platform-takedown
        https://thehackernews.com/2025/11/europol-and-eurojust-dismantle-600.html
        https://www.infosecurity-magazine.com/news/french-police-seize-16m-euros/
        https://www.helpnetsecurity.com/2025/11/04/europe-crypto-scam-arrests/
      • Treasury Sanctions DPRK Bankers And Institutions Involved In Laundering Cybercrime Proceeds And IT Worker Funds
        "Today, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned eight individuals and two entities for their role in laundering funds derived from a variety of illicit Democratic People’s Republic of Korea (DPRK) schemes, including cybercrime and information technology (IT) worker fraud. “North Korean state-sponsored hackers steal and launder money to fund the regime’s nuclear weapons program,” said Under Secretary of the Treasury for Terrorism and Financial Intelligence John K. Hurley. “By generating revenue for Pyongyang’s weapons development, these actors directly threaten U.S. and global security. Treasury will continue to pursue the facilitators and enablers behind these schemes to cut off the DPRK’s illicit revenue streams.”"
        https://home.treasury.gov/news/press-releases/sb0302
        https://therecord.media/north-korea-us-sanctions-it-worker-scams-cybercrime
        https://cyberscoop.com/north-korean-companies-people-sanctioned-for-money-laundering-from-cybercrime-it-worker-schemes/
      • Software Supply Chain Attacks Surge To Record High In October 2025
        "Software supply chain attacks hit a new record in October that was more than 30% higher than the previous record set in April 2025. Cyble’s data – based on attacks claimed by threat actors on dark web data leak sites – shows that threat actors claimed 41 supply chain attacks in October, 10 more than the previous high seen in April. Supply chain attacks have remained elevated since April, averaging more than 28 a month since then, a rate that is more than twice as high as the 13 attacks per month seen between early 2024 and March 2025 (chart below)."
        https://cyble.com/blog/record-surge-in-software-supply-chain-attacks/
      • CISO Predictions For 2026
        "At the end of every year, Fortinet publishes the Global Threat Landscape Report, which details the year’s activity and makes cybersecurity predictions for the coming year. This year will be no different. However, as part of our CISO Collective, we have also inaugurated an annual CISO Predictions Report for 2026 this year. Here is a selection of issues we expect CISOs to be dealing with in 2026 and beyond."
        https://www.fortinet.com/blog/ciso-collective/ciso-predictions-for-2026
      • 2025 INSIDER RISK REPORT – The Shift To Predictive Whole-Person Insider Risk Management
        "The new 2025 Insider Risk Report [download], produced by Cybersecurity Insiders in collaboration with Cogility, highlights that nearly all security leaders (93%) say insider threats are as difficult or harder to detect than external cyberattacks. Yet only 23% express strong confidence in stopping them before serious damage occurs. The report warns that most organizations remain reactive despite a surge in AI-driven risks and the increasing prevalence of decentralized workforces."
        https://www.cybersecurity-insiders.com/2025-insider-risk-report-the-shift-to-predictive-whole-person-insider-risk-management/
      • Malicious Android Apps On Google Play Downloaded 42 Million Times
        "Hundreds of malicious Android apps on Google Play were downloaded more than 40 million times between June 2024 and May 2025, notes a report from cloud security company Zscaler. During the same period, the company observed a 67% year-over-year growth in malware targeting mobile devices, with spyware and banking trojans being a prevalent risk. Telemetry data shows that threat actors are shifting from traditional card fraud to exploiting mobile payments using phishing, smishing, SIM-swapping, and payment scams."
        https://www.bleepingcomputer.com/news/security/malicious-android-apps-on-google-play-downloaded-42-million-times/
      • Preparing For Threats To Come: Cybersecurity Forecast 2026
        "Every November, we make it our mission to equip organizations with the knowledge needed to stay ahead of threats we anticipate in the coming year. The Cybersecurity Forecast 2026 report, released today, provides comprehensive insights to help security leaders and teams prepare for those challenges. This report does not contain "crystal ball" predictions. Instead, our forecasts are built on real-world trends and data we are observing right now. The information contained in the report comes directly from Google Cloud security leaders, and dozens of experts, analysts, researchers, and responders directly on the frontlines."
        https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2026

      อ้างอิง
      Electronic Transactions Development Agency(ETDA) 19d066e0-8f6d-475a-83f7-feed22fb071a-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • แฮกเกอร์ใช้เครื่องมือควบคุมระยะไกล RMM เจาะระบบบริษัทขนส่งและควบคุมการขนส่งสินค้า

      6a769795-4da9-4a94-bd3f-be9b725dbf24-image.png แฮกเกอร์ใช้เครื่องมือควบคุมระยะไกล RMM เจาะ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 102999fc-0fb8-4632-b350-28641c4f5e5d-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • แฮกเกอร์ขโมยสินทรัพย์ดิจิทัลมูลค่ากว่า 120 ล้านเหรียญจาก Balancer DeFi Protocol

      cecfb3a0-dad6-4064-882c-1ee4e1dcaedf-image.png แฮกเกอร์ขโมยสินทรัพย์ดิจิทัลมูลค่ากว่า 120 .png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand cca89563-a47d-40f7-9c4e-f8e56d23246d-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบส่วนขยาย VSX "SleepyDuck" แฝงโทรจันใช้ Ethereum เป็นช่องทางสำรองสั่งการ

      b87e7635-8e1a-4ae5-bc91-1351b05c9d4b-image.png พบส่วนขยาย VSX SleepyDuck แฝงโทรจันใช้ Ethereum เป็นช่องท.png

      *สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT