NCSA Webboard
    • ล่าสุด
    • แท็ก
    • ฮิต
      • ติดต่อสำนักงาน
    • ลงทะเบียน
    • เข้าสู่ระบบ
    1. หน้าแรก
    2. NCSA_THAICERT
    3. กระทู้
    • รายละเอียด
    • ติดตาม 0
    • คนติดตาม 2
    • กระทู้ 1,801
    • กระทู้ 1,802
    • ดีที่สุด 0
    • Controversial 0
    • กลุ่ม 2

    โพสต์ถูกสร้างโดย NCSA_THAICERT

    • Cyber Threat Intelligence 13 January 2026

      Vulnerabilities

      • Max Severity Ni8mare Flaw Impacts Nearly 60,000 n8n Instances
        "Nearly 60,000 n8n instances exposed online remain unpatched against a maximum-severity vulnerability dubbed "Ni8mare." n8n is an open-source workflow automation platform that allows users to connect different applications and services via pre-built connectors and a visual, node-based interface to automate repetitive tasks without writing code. The automation platform is widely used in AI development to automate data ingestion and build AI agents and RAG pipelines. It has over 100 million pulls on Docker Hub and over 50,000 weekly downloads on npm."
        https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-impacts-nearly-60-000-n8n-instances/
      • CISA Adds One Known Exploited Vulnerability To Catalog
        "CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2025-8110 Gogs Path Traversal Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/01/12/cisa-adds-one-known-exploited-vulnerability-catalog
        https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/
        https://securityaffairs.com/186837/hacking/u-s-cisa-adds-a-flaw-in-gogs-to-its-known-exploited-vulnerabilities-catalog.html

      Malware

      • RMM Tools (Syncro, SuperOps, NinjaOne, Etc.) Being Distributed Disguised As Video Files
        "AhnLab SEcurity intelligence Center (ASEC) recently discovered cases of attacks using RMM tools such as Syncro, SuperOps, NinjaOne, and ScreenConnect. Threat actors distributed a PDF file that prompted users to download and run the RMM tool from a disguised distribution page such as Google Drive. The certificate used to sign the malware shows that the threat actor has been performing similar attacks since at least October 2025."
        https://asec.ahnlab.com/en/91995/
      • The Unfriending Truth: How To Spot a Facebook Phishing Scam Before It's Too Late
        "As one of the world's largest social media platforms, with over 3 billion active users, Facebook is a frequent target for phishing scams. Hackers aim to hijack user accounts to exploit people in their network. The goal is to steal the victim's credentials so the attackers can take over the account, spread scams, steal personal data, or commit identity fraud. In the second half of 2025, Trellix observed a surge in Facebook phishing scams employing a variety of tactics and techniques, most notably the "Browser in the Browser" (BitB) technique. This advanced method tricks users by simulating a legitimate third-party login pop-up window (like a Facebook authentication screen) within the browser tab, effectively masking a credential-harvesting page."
        https://www.trellix.com/en-au/blogs/research/the-unfriending-truth-how-to-spot-a-facebook-phishing-scam/
        https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/
      • 'Bad Actor' Hijacks Apex Legends Characters In Live Matches
        "Apex Legends players over the weekend experienced disruptions during live matches as threat actors hijacked their characters, disconnected them, and changed their nicknames. Respawn, the publisher of the still popular battle royale-hero shooter, issued a public statement about the security incident, assuring players that it hadn't been caused by an exploit or malware infection. The title continues to have a large user base, with an estimated half a million daily concurrent players across all platforms as of mid-2025."
        https://www.bleepingcomputer.com/news/security/bad-actor-hijacks-apex-legends-characters-in-live-matches/
      • Hidden Telegram Proxy Links Can Reveal Your IP Address In One Click
        "A single click on what may appear to be a Telegram username or harmless link is all it takes to expose your real IP address to attackers due to how proxy links are handled. Telegram tells BleepingComputer it will now add warnings to proxy links after researchers demonstrated that specially crafted links could be used to reveal a Telegram user's real IP address without any further confirmation."
        https://www.bleepingcomputer.com/news/security/hidden-telegram-proxy-links-can-reveal-your-ip-address-in-one-click/
      • n8mare On Auth Street: Supply Chain Attack Targets n8n Ecosystem
        "Attackers infiltrated n8n's community node ecosystem this week with a malicious npm package that masqueraded as a Google Ads integration. The package, n8n-nodes-hfgjf-irtuinvcm-lasdqewriit, tricked developers into entering OAuth credentials through what appeared to be a legitimate credential form, then silently exfiltrated them during workflow execution to an attacker-controlled server. This novel supply chain attack—targeting users beyond n8n's recently disclosed remote code execution (RCE) flaws—demonstrates how threat actors are exploiting trust in community-maintained integrations."
        https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem
        https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html
      • Scaling The Fraud Economy: Pig Butchering As a Service
        "The scam industry has undergone massive transformations over the last decade. The cliché image of the once-iconic Nigerian prince duping Westerners from a local cybercafé is now passé. Western Africa is still a hotbed for digital fraud operations, but it has been superseded in both scale and efficiency by hundreds of industrial-scale scam centres now scattered throughout Southeast Asia. Over the past decade major Chinese-speaking criminal groups have managed to infiltrate a growing number of countries in Southeast Asia, securing vast amounts of land to build cities and special economic zones dedicated to crime operations."
        https://www.infoblox.com/blog/threat-intelligence/scaling-the-fraud-economy-pig-butchering-as-a-service/
        https://thehackernews.com/2026/01/researchers-uncover-service-providers.html
      • Analyzing a Multi-Stage AsyncRAT Campaign Via Managed Detection And Response
        "AsyncRAT has emerged as a notable Remote Access Trojan (RAT) used by threat actors for its robust capabilities and ease of deployment. It gained favor for its extensive feature set, which includes keylogging, screen capturing, and remote command execution capabilities. Its modular architecture, typically implemented in Python, provides flexibility and ease of customization, making it a preferred tool of choice for cybercriminals. During our investigation of AsyncRAT infections, we observed Python scripts playing a central role in the infection chain, automating various stages of the attack."
        https://www.trendmicro.com/en_us/research/26/a/analyzing-a-a-multi-stage-asyncrat-campaign-via-mdr.html
      • Malicious Crystal PDF Converter Detected On SLTT Networks
        "In late October 2025, the Center for Internet Security® (CIS®) Cyber Threat Intelligence (CTI) team observed an increase in CIS Managed Detection and Response™ (CIS MDR™) alerts associated with a malicious fake PDF converter called Crystal PDF on U.S. State, Local, Tribal, and Territorial (SLTT) government entity endpoints. The CIS CTI team’s analysis confirmed that Crystal PDF is a managed .NET (F#) staged loader, but the second-stage payload was unavailable for analysis."
        https://www.cisecurity.org/insights/blog/malicious-crystal-pdf-converter-detected-on-sltt-networks
      • THE KNOWNSEC LEAK: Yet Another Leak Of China’s Contractor-Driven Cyber-Espionage Ecosystem
        "In November of 2025, an allegedly massive leak of data from Chinese company “KnownSec” was posted to a github account. The initial leak was covered by Wired Magazine, and a few other outlets. The leak has since been pulled off of Github and downloaded by very few, and of those few who gained access, only one uploaded 65 documents as a primer to the leak elsewhere for others to see. DTI was able to get the 65 document images and this report is derived from this slice of a much larger leak that is out there but not available."
        https://dti.domaintools.com/the-knownsec-leak-yet-another-leak-of-chinas-contractor-driven-cyber-espionage-ecosystem/

      Breaches/Hacks/Leaks

      • University Of Hawaii Cancer Center Hit By Ransomware Attack
        "University of Hawaii says a ransomware gang breached its Cancer Center in August 2025, stealing data of study participants, including documents from the 1990s containing Social Security numbers. Founded in 1907, the University of Hawaii (UH) System now includes 3 universities and 7 community colleges, as well as 10 campuses and training and research centers across the Hawaiian Islands. Its Cancer Center is located in the Kakaʻako district of Honolulu and has over 300 faculty and staff, as well as an additional 200 affiliate members."
        https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-hit-by-ransomware-attack/
        https://www.securityweek.com/hackers-accessed-university-of-hawaii-cancer-center-patient-data-they-werent-immediately-notified/
      • Target's Dev Server Offline After Hackers Claim To Steal Source Code
        "Hackers are claiming to be selling internal source code belonging to Target Corporation, after publishing what appears to be a sample of stolen code repositories on a public software development platform. Last week, an unknown threat actor created multiple repositories on Gitea that appeared to contain portions of Target's internal code and developer documentation. The repositories were presented as a preview of a much larger dataset allegedly being offered for sale to buyers on an underground forum or private channel."
        https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/
      • Spanish Energy Giant Endesa Discloses Data Breach Affecting Customers
        "Spanish energy provider Endesa and its Energía XXI operator are notifying customers that hackers accessed the company's systems and accessed contract-related information, which includes personal details. Endesa is the largest electric utility company in Spain, now owned by Enel Group, that distributes gas and electricity to more than 10 million customers in Spain and Portugal. In total, the company says it has about 22 million clients."
        https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/
      • Everest Ransomware Claims Breach At Nissan, Says 900GB Of Data Stolen
        "The notorious Everest ransomware group claims to have breached Nissan Motor Corporation (Nissan Motor Co., Ltd.), the Japanese multinational automobile manufacturer. The group published its claims on its dark web leak site on January 10, 2026, sharing six screenshots allegedly taken from the stolen data. They also revealed a directory structure showing ZIP archives, text files, Excel sheets, and CSV documents."
        https://hackread.com/everest-ransomware-nissan-data-breach/
      • Armenia Probes Alleged Sale Of 8 Million Government Records On Hacker Forum
        "Hackers are offering for sale what they claim is a large trove of Armenian government-related data, prompting officials in Yerevan to open an investigation into a potential breach. The alleged seller, using the alias dk0m, said it gained access to a government notification system used to distribute official communications, including legal and administrative notices."
        https://therecord.media/armenia-probes-alleged-sale-government-records

      General News

      • What Security Teams Can Learn From Torrent Metadata
        "Security teams often spend time sorting through logs and alerts that point to activity happening outside corporate networks. Torrent traffic shows up in investigations tied to policy violations, insider risk, and criminal activity. A new research paper looks at that same torrent activity through an open source intelligence lens and asks how much signal security teams can extract from data that is already public."
        https://www.helpnetsecurity.com/2026/01/12/torrent-metadata-osint-research/
      • Downtime Pushes Resilience Planning Into Security Operations
        "CISOs describe a shift in how they define success. New research from Absolute Security shows broad agreement that resilience outweighs security goals centered on prevention alone. Security leaders increasingly define their role around keeping the business operating through disruption. CISOs see themselves as responsible for recovery when incidents interrupt operations. Business continuity, endpoint restoration, and coordination with IT teams fall within their scope. Formal resilience strategies have become common, indicating that this shift is built into planning instead of treated as an add on."
        https://www.helpnetsecurity.com/2026/01/12/absolute-ciso-resilience-planning/
      • Statistics Report On Malware Targeting Windows Web Servers In Q4 2025
        "AhnLab SEcurity intelligence Center (ASEC) is using the AhnLab Smart Defense (ASD) infrastructure to respond to and categorize attacks targeting poorly managed Windows web servers. This post will cover the damage status of Windows web servers that have become attack targets and the statistics of attacks that occurred against these servers in the fourth quarter of 2025. Additionally, it will categorize the malware strains used in each attack and provide detailed statistics."
        https://asec.ahnlab.com/en/92002/
      • Statistics Report On Malware Targeting Windows Database Servers In Q4 2025
        "AhnLab SEcurity intelligence Center (ASEC) utilizes the AhnLab Smart Defense (ASD) infrastructure to respond to and categorize attacks targeting MS-SQL and MySQL servers installed on Windows operating systems. This post covers the damage status of MS-SQL and MySQL servers that have become attack targets and statistics on attacks against these servers, based on the logs identified in the fourth quarter of 2025. It also categorizes the malware strains used in each attack and provides detailed statistics."
        https://asec.ahnlab.com/en/92003/
      • Statistics Report On Malware Targeting Linux SSH Servers In Q4 2025
        "AhnLab SEcurity intelligence Center (ASEC) utilizes a honeypot to respond to and classify brute-force and dictionary attacks targeting poorly managed Linux SSH servers. This post covers the status of the attack sources identified in the logs from the fourth quarter of 2025 and the statistics of attacks launched by these sources. It also classifies the malware strains used in each attack and provides detailed statistics."
        https://asec.ahnlab.com/en/92004/
      • Hacker Gets Seven Years For Breaching Rotterdam And Antwerp Ports
        "The Amsterdam Court of Appeal sentenced a 44-year-old Dutch national to seven years in prison for multiple crimes, including computer hacking and attempted extortion. The man was arrested in 2021 and convicted in 2022 by the Amsterdam District Court, but he appealed the sentence because authorities had unlawfully intercepted his communications, deriving incriminating evidence. These communications occurred on the end-to-end encrypted chat service Sky ECC. Europol 'cracked' the service in 2021, which led to the arrest of the CEO and multiple users. The actions deriving from the operation extended into last year."
        https://www.bleepingcomputer.com/news/security/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/
        https://therecord.media/dutch-court-sentences-hacker-who-smuggled-cocaine-ports
      • Cybersecurity In The Public Sector: Challenges, Strategies And Best Practices
        "Once upon a time, computer crimes were associated with the image of a hacker in a black hoodie working in a dark room by the glow of a monitor. But times have changed, and so have the threats. From simple penetration attempts, cyber attacks have evolved into complex, coordinated operations specifically targeting state systems, rather than pursued merely for entertainment or recognition."
        https://hackread.com/cybersecurity-public-sector-challenges-strategies-practices/
      • Rethinking OT Security For Project Heavy Shipyards
        "In this Help Net Security interview, Hans Quivooij, CISO at Damen Shipyards Group, discusses securing OT and ICS in the shipyard. He outlines how project-based operations, rotating contractors, and temporary systems expand the threat surface and complicate access control. Quivooij also covers visibility in legacy environments and the risks introduced by IT and OT integration."
        https://www.helpnetsecurity.com/2026/01/12/hans-quivooij-damen-shipyards-group-securing-shipyard-ot-ics/
      • Global Cybersecurity Outlook 2026
        "The World Economic Forum's Global Cybersecurity Outlook 2026, written in collaboration with Accenture, examines the cybersecurity trends that will affect economies and societies in the year to come. The report explores how accelerating AI adoption, geopolitical fragmentation and widening cyber inequity are reshaping the global risk landscape. As attacks grow faster, more complex and more unevenly distributed, organizations and governments face rising pressure to adapt amid persistent sovereignty challenges and widening capability gaps. Drawing on leaders’ perspectives, the report provides actionable insights to inform strategy, investment and policy."
        https://www.weforum.org/publications/global-cybersecurity-outlook-2026/
        https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2026.pdf
        https://www.infosecurity-magazine.com/news/fraud-overtakes-ransomware-as-top/
      • Cyber Insights 2026: What CISOs Can Expect In 2026 And Beyond
        "The responsibility of the CISO is ever increasing, and this won’t slow down in the coming years. Paul Kivikink, VP of product management and technology partnerships, at DataBee, explains the starting point: “Traditionally, CISOs came up through the technical ranks, deeply rooted in cybersecurity operations. But as cyber risk has become a board-level concern, the CISO is now expected to speak the language of business, connecting security investments to revenue protection, regulatory compliance, and enterprise resilience.”"
        https://www.securityweek.com/cyber-insights-2026-what-cisos-can-expect-in-2026-and-beyond/
      • Block CISO: We Red-Teamed Our Own AI Agent To Run An Infostealer On An Employee Laptop
        "When it comes to security, AI agents are like self-driving cars, according to Block Chief Information Security Officer James Nettesheim. "It's not enough for self-driving cars to be just as good as humans," Nettesheim said in an exclusive interview with The Register. "They have to be safer and better than humans - and provably so. We need that with our agentic use, too." The parent company of Square, Cash App, and Afterpay is pushing hard to position itself as an AI leader, co-designing the Model Context Protocol (MCP) with Anthropic and using MCP to build Goose, its open source AI agent that's used by almost all Block's 12,000 employees and connects to all of the company's systems including Google accounts and Square payments."
        https://www.theregister.com/2026/01/12/block_ai_agent_goose/
      • 2026 Crypto Crime Report Key Insights: TRM Identifies Record USD 158 Billion In Illicit Crypto Flows In 2025, Reversing a Multi-Year Decline
        "This blog features key highlights from TRM’s upcoming 2026 Crypto Crime Report. Be sure to check back in the coming weeks to get your complete copy. Illicit crypto volume reached an all-time high of USD 158 billion in 2025, up nearly 145% from 2024. Despite the increase in absolute illicit volume, illicit volume as a proportion of overall crypto volume fell in 2025, from 1.3% in 2024 to 1.2% in 2025. While illicit activity represented a small share of overall on-chain volume, illicit entities captured 2.7% of available crypto liquidity in 2025, using a new metric that frames risk relative to deployable capital rather than raw transaction volume."
        https://www.trmlabs.com/resources/blog/2026-crypto-crime-report-key-insights-trm-identifies-record-usd-158-billion-in-illicit-crypto-flows-in-2025-reversing-a-multi-year-decline
        https://www.infosecurity-magazine.com/news/illicit-crypto-activity-record/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 9424333d-88d8-4533-ba69-4c042961bb3c-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • สเปนทลายเครือข่ายอาชญากรรมไซเบอร์ จับ 34 ผู้ต้องสงสัยเชื่อมโยง Black Axe ใช้บัญชีกลางรับโอนเงิน

      b923d382-10bb-4ac2-a7d2-f7eb69a32e91-image.png สเปนทลายเครือข่ายอาชญากรรมไซเบอร์ จับ 34 ผู.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand e4590c0d-b00e-4dd0-b420-dd132d685980-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • อาชญากรรมทางไซเบอร์ที่ใช้ crypto พุ่งสูงสุดเป็นประวัติการณ์ในปี 2025

      b30b6c2b-7a64-44ed-a48c-4defe707f9f5-image.png อาชญากรรมทางไซเบอร์ที่ใช้ crypto พุ่งสูงสุดเป.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 53456c52-b33b-4323-8dc9-838af5a246b5-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • FBI เตือน กลุ่มแฮกเกอร์ Kimsuky ใช้ QR Code สแกนเจาะระบบ ข้ามการป้องกัน MFA ขององค์กร

      ea4a759b-3b28-48cb-8538-8dc7f00ba236-image.png FBI เตือน กลุ่มแฮกเกอร์เกาหลีเหนือ Kimsuky ใช้ QR Code .png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand ade61974-a04b-4399-b71d-51f771140095-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🚨 ตรวจสอบและแก้ไขด่วน !! ช่องโหว่ระดับ วิกฤตในผลิตภัณฑ์ Advantech ระบบที่เปิดให้เข้าถึงจากเครือข่ายภายนอก มีความเสี่ยงถูกยึดระบบและขโมยข้อมูลสำคัญ

      🔴 รายละเอียดช่องโหว่
      • CVE-2025-52694 เป็นช่องโหว่ที่มีระดับความรุนแรง วิกฤต (คะแนน CVSS Score 10.0) จัดอยู่ในประเภท SQL Injection ซึ่งเกิดจากความบกพร่องในการตรวจสอบและกรองข้อมูลนำเข้าที่ไม่เหมาะสมในผลิตภัณฑ์ Advantech IoTSuite / IoT Edge
      • ระบบ Advantech IoTSuite / IoT Edge ที่เปิดให้เข้าถึงผ่านเครือข่ายภายนอก มีความเสี่ยงที่ผู้โจมตีจะส่งคำสั่งจากระยะไกลเพื่อโจมตีระบบได้ โดยไม่จำเป็นต้องผ่านการยืนยันตัวตน ผ่านการส่งคำสั่ง SQL ที่ถูกออกแบบมาเป็นพิเศษไปยังระบบฐานข้อมูล ซึ่งอาจนำไปสู่การเข้าถึงข้อมูลสำคัญ การแก้ไขหรือทำลายข้อมูล หรือการทำให้ระบบไม่สามารถให้บริการได้ตามปกติ

      🎯 ผลิตภัณฑ์ที่ได้รับผลกระทบ
      • Advantech IoTSuite SaaSComposer ก่อนเวอร์ชัน 3.4.15
      • Advantech IoTSuite Growth Linux docker ก่อนเวอร์ชัน V2.0.2
      • Advantech IoTSuite Starter Linux docker ก่อนเวอร์ชัน V2.0.2
      • Advantech IoT Edge Linux docker ก่อนเวอร์ชัน V2.0.2
      • Advantech IoT Edge Windows ก่อนเวอร์ชัน V2.0.2

      1. แนวทางการตรวจสอบ
        • ตรวจสอบว่าหน่วยงานมีการใช้งานผลิตภัณฑ์ Advantech IoTSuite หรือ IoT Edge ในเวอร์ชันที่ได้รับผลกระทบหรือไม่
        • ตรวจสอบการเปิดให้บริการของระบบดังกล่าวว่ามีการเข้าถึงจากเครือข่ายภายนอกหรืออินเทอร์เน็ตสาธารณะหรือไม่
        • ตรวจสอบบันทึกเหตุการณ์ (Logs) ของระบบและฐานข้อมูล เพื่อค้นหาพฤติกรรมผิดปกติหรือความพยายามในการส่งคำสั่ง SQL ที่ผิดปกติ

      2. แนวทางการป้องกัน
        • ดำเนินการ อัปเดตซอฟต์แวร์เป็นเวอร์ชันล่าสุด ที่ผู้พัฒนาได้แก้ไขช่องโหว่แล้ว
        • สำหรับ IoTSuite SaaSComposer, IoTSuite Growth (Linux Docker) และ IoT Edge (Windows) ขอแนะนำให้ ติดต่อบริษัท Advantech เพื่อขอรับข้อมูลและเวอร์ชันที่มีการแก้ไขช่องโหว่อย่างเป็นทางการ ตามรายละเอียดที่ระบุไว้ด้านล่าง

        • https://dg.th/v6ju5r8wxz
          • สำหรับ IoTSuite Starter (Linux Docker) ขอแนะนำให้ ดาวน์โหลดและติดตั้งแพตช์จาก Advantech ตามรายละเอียดที่ระบุไว้ด้านล่าง
      • https://dg.th/cyof2tbkl3
        • สำหรับ IoT Edge (Linux Docker) ขอแนะนำให้ ดาวน์โหลดและติดตั้งแพตช์จาก Advantech ตามรายละเอียดที่ระบุไว้ด้านล่าง
      • https://dg.th/wqx1o0y6r9
      1. มาตรการชั่วคราว (กรณียังไม่สามารถอัปเดตได้ทันที)
        • ปิดหรือจำกัดการเข้าถึงบริการที่ได้รับผลกระทบจากเครือข่ายสาธารณะ
        • ใช้มาตรการ Firewall หรือ Web Application Firewall (WAF) เพื่อกรองคำร้องขอที่มีลักษณะผิดปกติ
        • เฝ้าระวังและติดตามเหตุการณ์ด้านความมั่นคงปลอดภัยไซเบอร์อย่างใกล้ชิด
        🔗 อ้างอิง
        https://www.csa.gov.sg/alerts-and-advisories/alerts/alerts-al-2026-001/
        https://nvd.nist.gov/vuln/detail/CVE-2025-52694

      ThaiCERT ขอแนะนำให้ผู้ใช้งานและผู้ดูแลระบบที่ใช้งานผลิตภัณฑ์ดังกล่าว รีบดำเนินการตรวจสอบและอัปเดตเป็นเวอร์ชันล่าสุดทันที เพื่อลดความเสี่ยงจากการโจมตีและป้องกันความเสียหายที่อาจเกิดขึ้น

      ผลิตภัณฑ์ Advantech V3.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • MuddyWater ใช้ RustyWater RAT ส่งอีเมล Spear-phishing หลอกเปิดไฟล์ Word โจมตีหน่วยงานในตะวันออกกลาง

      c637784b-3b60-4383-8f12-7766144726d6-image.png MuddyWater ใช้ RustyWater RAT ส่งอีเมล Spear-phishing หลอกเปิดไฟล์ Word .png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand f8e6cd4b-ffe0-4838-a016-17a3170df139-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ฐานข้อมูล BreachForums รั่วไหล เปิดเผยบัญชีผู้ใช้กว่า 324,000 บัญชี

      7b31d30a-a9c7-4ef2-a07e-a1ba4a33051e-image.png ฐานข้อมูล BreachForums รั่วไหล เปิดเผยบัญชีผู้ใช้.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 23e78c5e-34de-4781-869d-e45f9eaa6a15-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • กลุ่มแฮกเกอร์รัสเซีย APT28 มุ่งเป้าโจมตีหน่วยงานด้านพลังงานและองค์กรนโยบายระหว่างประเทศ

      9c26e022-9f47-4e3b-bdbb-3ecd33c0e39a-image.png กลุ่มแฮกเกอร์รัสเซีย APT28 มุ่งเป้าโจมตีหน่ว.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 43764692-9f30-4256-a51d-818ec20230d7-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 12 January 2026

      Healthcare Sector

      • Healthcare Chatbots Provoke Unease In AI Governance Analysts
        "When an AI chatbot tells people to add glue to pizza, the error is obvious. When it recommends eating more bananas - sound nutritional advice that could be dangerous for someone with kidney failure - the mistake hides in plain sight. That's a risk now poised to reach hundreds of millions of users with little or no regulatory oversight. OpenAI days ago launched ChatGPT Health, allowing users to connect medical records and wellness apps for personalized health guidance."
        https://www.bankinfosecurity.com/healthcare-chatbots-provoke-unease-in-ai-governance-analysts-a-30483

      Vulnerabilities

      • CISA Retires Ten Emergency Directives, Marking An Era In Federal Cybersecurity
        "Today, the Cybersecurity and Infrastructure Security Agency (CISA) announced the successful retirement of ten Emergency Directives issued between 2019-2024. Marking a significant milestone in federal cybersecurity, this is the highest number of Emergency Directives retired by the agency at one time. These directives achieved their mission to mitigate urgent and imminent risks to Federal Civilian Executive Branch (FCEB) agencies. Since their issuance, CISA has partnered closely with federal agencies to drive remediation, embed best practices and overcome systemic challenges - establishing a stronger, more resilient digital infrastructure for a more secure America."
        https://www.cisa.gov/news-events/news/cisa-retires-ten-emergency-directives-marking-era-federal-cybersecurity
        https://thehackernews.com/2026/01/cisa-retires-10-emergency-cybersecurity.html
        https://www.bleepingcomputer.com/news/security/cisa-retires-10-emergency-cyber-orders-in-rare-bulk-closure/
        https://www.securityweek.com/cisa-closes-10-emergency-directives-as-vulnerability-catalog-takes-over/

      Malware

      • Threat Actors Actively Targeting LLMs
        "Our Ollama honeypot infrastructure captured 91,403 attack sessions between October 2025 and January 2026. Buried in that data: two distinct campaigns that reveal how threat actors are systematically mapping the expanding surface area of AI deployments. GreyNoise customers have received an Executive Situation Report (SITREP) including IOCs and other valuable intelligence from this investigation. Customers, please check your inbox."
        https://www.greynoise.io/blog/threat-actors-actively-targeting-llms
        https://www.bleepingcomputer.com/news/security/hackers-target-misconfigured-proxies-to-access-paid-llm-services/
      • GRU-Linked BlueDelta Evolves Credential Harvesting
        "Between February and September 2025, Recorded Future’s Insikt Group identified multiple credential-harvesting campaigns conducted by BlueDelta, a Russian state-sponsored threat group associated with the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). This activity represents an expansion of BlueDelta’s ongoing credential-theft operations previously detailed in Insikt Group’s December 2025 report."
        https://www.recordedfuture.com/research/gru-linked-bluedelta-evolves-credential-harvesting
        https://assets.recordedfuture.com/insikt-report-pdfs/2026/cta-ru-2026-0107.pdf
        https://www.darkreading.com/cyberattacks-data-breaches/russian-apt-credentials-global-targets
        https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html
      • Reborn In Rust: Muddy Water Evolves Tooling With RustyWater Implant
        "CloudSEK’s TRIAD recently identified a spearphishing campaign attributed to the Muddy Water APT group targeting multiple sectors across the Middle East, including diplomatic, maritime, financial, and telecom entities. The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular post-compromise capability expansion. Historically, Muddy Water has relied on PowerShell and VBS loaders for initial access and post-compromise operations. The introduction of Rust-based implants represents a notable tooling evolution toward more structured, modular, and low noise RAT capabilities."
        https://www.cloudsek.com/blog/reborn-in-rust-muddywater-evolves-tooling-with-rustywater-implant
        https://thehackernews.com/2026/01/muddywater-launches-rustywater-rat-via.html

      Breaches/Hacks/Leaks

      • BreachForums Hacking Forum Database Leaked, Exposing 324,000 Accounts
        "The latest incarnation of the notorious BreachForums hacking forum has suffered a data breach, with its user database table leaked online. BreachForums is the name of a series of hacking forums used to trade, sell, and leak stolen data, as well as sell access to corporate networks and other illegal cybercrime services. The site was launched after the first of these forums, RaidForums, was seized by law enforcement, with the owner, "Omnipotent", arrested."
        https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/
        https://hackread.com/breachforums-database-users-leak-admin-disputes/
      • Hacker Behind Wired.com Leak Now Selling Full 40M Condé Nast Records
        "A hacker using the alias “Lovely” is selling nearly 40 million (39,970,158) Condé Nast user records that allegedly belong to the company’s subsidiary websites, many of which rank among the most popular sites worldwide. On December 27, 2025, Hackread.com reported that a hacker using the alias “Lovely” leaked a database containing the personal details of 2.3 million Wired.com users. Wired.com is a major American magazine and website owned by Condé Nast. Alongside the download link, the hacker accused Condé Nast of ignoring repeated security warnings. Three days after the Wired.com leak, the hacker announced that the entire Condé Nast dataset was being put up for sale."
        https://hackread.com/wired-com-hacker-data-leak-conde-nast-records/
      • Instagram Denies Breach Amid Claims Of 17 Million Account Data Leak
        "Instagram says it fixed a bug that allowed threat actors to mass-request password reset emails, amid claims that data from more than 17 million Instagram accounts was scraped and leaked online. "We fixed an issue that allowed an external party to request password reset emails for some Instagram users," a Meta spokesperson told BleepingComputer. "We want to reassure everyone there was no breach of our systems and people's Instagram accounts remain secure. People can disregard these emails and we apologize for any confusion this may have caused.""
        https://www.bleepingcomputer.com/news/security/instagram-denies-breach-amid-claims-of-17-million-account-data-leak/
        https://thecybersecguru.com/news/instagram-data-breach-17-million/
        https://securityaffairs.com/186765/data-breach/a-massive-breach-exposed-data-of-17-5m-instagram-users.html
        https://hackread.com/instagram-user-data-leak-scraped-records-2022/
        https://www.theregister.com/2026/01/11/infosec_news_in_brief/
      • At Least $26 Million In Crypto Stolen From Truebit Platform As Crypto Crime Landscape Evolves
        "Hackers stole more than $26 million worth of cryptocurrency from the Truebit platform on Thursday, marking the first major crypto hack of 2026. The company said in a statement that it became aware of a security incident “involving one or more malicious actors.” “We are in contact with law enforcement and taking all available measures to address the situation,” Truebit said, urging people not to interact with the smart contract that had been affected by the attack."
        https://therecord.media/26-million-in-crypto-stolen-truebit
      • Salt Typhoon Hackers Hit Congressional Emails In New Breach
        "U.S. officials are investigating a suspected Chinese cyber espionage operation compromising email systems used by congressional staff working on House national security committees. The activity, detected in December, appears to have originated from the threat actor commonly tracked as Salt Typhoon, according to researchers tracking the operation. It appears to have affected staff supporting committees with oversight of China policy, foreign affairs, intelligence and the military (see: Chinese Data Leak Reveals Salt Typhoon Contractors)."
        https://www.bankinfosecurity.com/salt-typhoon-hackers-hit-congressional-emails-in-new-breach-a-30484

      General News

      • 34 Arrests In Spain During Action Against The ‘Black Axe’ Criminal Organisation
        "The Spanish National Police (Policía Nacional), in close cooperation with the Bavarian State Criminal Police Office (Bayerisches Landeskriminalamt) and with the support of Europol, has conducted an operation against the international criminal organisation ‘Black Axe’. The action resulted in 34 arrests and significant disruptions to the group's activities. Black Axe is a highly structured, hierarchical group with its origins in Nigeria and a global presence in dozens of countries. The core group of arrested suspects consists of 10 individuals of Nigerian nationality."
        https://www.europol.europa.eu/media-press/newsroom/news/34-arrests-in-spain-during-action-against-black-axe-criminal-organisation
        https://www.bleepingcomputer.com/news/security/spain-arrests-34-suspects-linked-to-black-axe-cyber-crime/
        https://thehackernews.com/2026/01/europol-arrests-34-black-axe-members-in.html
        https://www.infosecurity-magazine.com/news/europol-crackdown-on-black-axe/
        https://hackread.com/europol-black-axe-cybercrime-ring-spain/
      • Identity & Beyond: 2026 Incident Response Predictions
        "In 2026, incident response (IR) will continue its shift away from traditional malware-centric investigations toward identity-driven intrusions, abuse of trusted cloud services, and low-signal, high-impact activity that blends seamlessly into normal business operations. Rather than relying on technical exploits, threat actors are prioritizing legitimate access, persistence, and operational efficiency, enabling them to evade users, security controls, and automated detection."
        https://www.cybereason.com/blog/identity-beyond-2026-incident-response-predictions
      • Crypto Crime Reaches Record High In 2025 As Nation‑State Sanctions Evasion Moves On‑Chain At Scale
        "In 2025, we tracked a notable rise in nation-state activity in crypto, marking the latest phase in the maturation of the illicit on-chain ecosystem. Over the past few years, the crypto crime landscape has become increasingly professionalized; illicit organizations now operate large-scale on-chain infrastructure to help transnational criminal networks procure goods and services and launder their ill-gotten crypto. Against that backdrop, we have seen nation-states moving into this space, both by tapping into these same professionalized service providers and by standing up their own bespoke infrastructure to evade sanctions at scale."
        https://www.chainalysis.com/blog/2026-crypto-crime-report-introduction/
        https://www.darkreading.com/cyber-risk/illicit-crypto-economy-surges-nation-states
      • How AI Agents Are Turning Security Inside-Out
        "AppSec teams have spent the last decade hardening externally facing applications, API security, software supply chain risk, CI/CD controls, and cloud-native attack paths. But a growing class of security threats is emerging from a largely underestimated and undefended source: internally built no-code assets."
        https://www.helpnetsecurity.com/2026/01/09/ai-agents-appsec-risk/
      • Security Teams Are Paying More Attention To The Energy Cost Of Detection
        "Security teams spend a lot of time explaining why detection systems need more compute. Cloud bills rise, models retrain more often, and new analytics pipelines get added to existing stacks. Those conversations usually stay focused on coverage and accuracy. A recent study takes a different approach by measuring anomaly detection models alongside their energy use and associated carbon output, treating compute consumption as part of security operations."
        https://www.helpnetsecurity.com/2026/01/09/energy-aware-cybersecurity-ai-research/
      • Wi-Fi Evolution Tightens Focus On Access Control
        "Wi-Fi networks are taking on heavier workloads, more devices, and higher expectations from users who assume constant access everywhere. A new Wireless Broadband Alliance industry study shows that this expansion is reshaping priorities around security, identity, and trust, alongside adoption of new Wi-Fi standards."
        https://www.helpnetsecurity.com/2026/01/09/wba-wi-fi-access-control/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) c2b2d89a-4736-42ff-91f3-122faadb3dfe-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ด่วน! แจ้งเตือนแคมเปญมัลแวร์ DarkSpectre แฝงตัวผ่านส่วนขยายเบราว์เซอร์ เสี่ยงถูกโจมตีและควบคุมอุปกรณ์

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ และพบข้อมูลเกี่ยวกับแคมเปญมัลแวร์ DarkSpectre ซึ่งแฝงตัวผ่านส่วนขยายเบราว์เซอร์ที่มีลักษณะเสมือนถูกต้องตามกฎหมาย

      หากผู้ใช้งานติดตั้งหรือเปิดใช้งานส่วนขยายที่ได้รับผลกระทบ อาจทำให้ผู้ไม่หวังดีสามารถฝังโค้ดอันตราย ดาวน์โหลดเพย์โหลดเพิ่มเติมจากเซิร์ฟเวอร์ควบคุม (Command and Control: C2) และเข้าควบคุมอุปกรณ์จากระยะไกล ส่งผลกระทบต่อความมั่นคงปลอดภัยของระบบสารสนเทศของหน่วยงานและองค์กรได้

      1. รายละเอียดภัยคุกคาม

      1.1 นักวิจัยด้านความมั่นคงปลอดภัยไซเบอร์จากบริษัท Koi ตรวจพบและเปิดเผยแคมเปญมัลแวร์ DarkSpectre ซึ่งเป็นปฏิบัติการโจมตีขนาดใหญ่
      1.2 DarkSpectre ใช้ส่วนขยายเบราว์เซอร์ยอดนิยมเป็นช่องทางในการแฝงตัวและแพร่กระจาย บนเบราว์เซอร์ Google Chrome, Microsoft Edge และ Mozilla Firefox
      1.3 แคมเปญดังกล่าวถูกตรวจพบครั้งแรกระหว่างการสืบสวนแคมเปญ ShadyPanda และส่งผลกระทบต่ออุปกรณ์มากกว่า 4 ล้านเครื่องทั่วโลก
      1.4 มัลแวร์ถูกออกแบบให้เริ่มทำงานภายหลัง โดยอาศัยโค้ด JavaScript ที่ซ่อนอยู่ เพื่อดึงเพย์โหลดอันตรายจาก C2 เซิร์ฟเวอร์

      1. ภาพรวมของภัยคุกคาม (Overview)

      2.1 ประเภทภัยคุกคาม: Malware Campaign via Malicious Browser Extensions
      2.2 เทคนิคการโจมตี: ใช้ส่วนขยายที่ดูเหมือนถูกต้องตามกฎหมาย สามารถแฝงโค้ด JavaScript เพื่อทำงานภายหลัง จากนั้น ทำการติดต่อกับ C2 เซิร์ฟเวอร์เพื่อรับคำสั่งเพิ่มเติม
      2.3 ผู้โจมตีไม่จำเป็นต้องเข้าถึงระบบโดยตรง เพียงผู้ใช้ติดตั้งส่วนขยาย ก็อาจถูกโจมตีได้
      2.4 ระบบที่ได้รับผลกระทบ: อุปกรณ์ผู้ใช้งานที่ติดตั้งส่วนขยายบน Chrome, Edge และ Firefox

      1. ผลกระทบ หากแคมเปญ DarkSpectre ถูกโจมตีสำเร็จ อาจส่งผลดังนี้:
        3.1 อุปกรณ์ผู้ใช้งานถูกฝังมัลแวร์โดยไม่รู้ตัว
        3.2 ดาวน์โหลดและรันโค้ดอันตรายเพิ่มเติมจากระยะไกล
        3.3 ถูกควบคุมอุปกรณ์ผ่าน C2 เซิร์ฟเวอร์
        3.4 ข้อมูลส่วนบุคคลและข้อมูลองค์กรรั่วไหล
        3.5 ใช้อุปกรณ์เป็นฐานโจมตีระบบอื่นภายในเครือข่าย (Lateral Movement)

      2. รายชื่อส่วนขยายเบราว์เซอร์ที่เกี่ยวข้อง

      • Chrome Audio Capture
      • ZED: Zoom Easy Downloader
      • X (Twitter) Video Downloader
      • Google Meet Auto Admit
      • Zoom.us Always Show "Join From Web"
      • Timer for Google Meet
      • CVR: Chrome Video Recorder
      • GoToWebinar & GoToMeeting Download Recordings
      • Meet Auto Admit
      • Google Meet Tweak (Emojis, Text, Cam Effects)
      • Mute All on Meet
      • Google Meet Push-To-Talk
      • Photo Downloader for Facebook, Instagram
      • Zoomcoder Extension
      • Auto-join for Google Meet
      • Edge Audio Capture (Edge)
      • Twitter X Video Downloader (Firefox)
      • New Tab – Customized Dashboard (Edge)
      • "Google Translate" by charliesmithbons
      1. แนวทางป้องกันและลดความเสี่ยง (Mitigation – Recommended)

      5.1 ตรวจสอบและถอนการติดตั้ง (Remove) ส่วนขยายเบราว์เซอร์ที่ไม่จำเป็นหรือมีความเสี่ยง
      5.2 อนุญาตให้ติดตั้งส่วนขยายเฉพาะที่ผ่านการอนุมัติจากหน่วยงาน (Extension Whitelisting)
      5.3 อัปเดตเบราว์เซอร์และระบบปฏิบัติการให้เป็นเวอร์ชันล่าสุด
      5.4 สแกนอุปกรณ์ด้วยโปรแกรมป้องกันมัลแวร์ที่เชื่อถือได้

      1. แนวทางเฝ้าระวังเพิ่มเติม

      6.1 ตรวจสอบ Log การใช้งานเบราว์เซอร์และทราฟฟิกเครือข่ายที่ผิดปกติ
      6.2 เฝ้าระวังการติดต่อไปยัง C2 เซิร์ฟเวอร์ที่ไม่รู้จัก
      6.3 ตรวจสอบการเรียกใช้งานบริการตรวจสอบ IP ภายนอก เช่น ipinfo.io ซึ่งอาจเป็นตัวบ่งชี้พฤติกรรมของมัลแวร์
      6.4 แจ้งเตือนผู้ใช้งานให้หลีกเลี่ยงการติดตั้งส่วนขยายจากแหล่งที่ไม่น่าเชื่อถือ

      1. คำแนะนำด้านความปลอดภัยเพิ่มเติม (Security Hardening)

      7.1 กำหนดนโยบายควบคุมการใช้งานส่วนขยายเบราว์เซอร์ในองค์กร
      7.2 แยกสิทธิ์ผู้ใช้งานทั่วไปออกจากสิทธิ์ผู้ดูแลระบบ
      7.3 สำรองข้อมูลสำคัญอย่างสม่ำเสมอ
      7.4 จัดอบรมให้ความรู้ผู้ใช้งานเกี่ยวกับภัยคุกคามจาก Browser Extension

      DarkSpectre.png
      แหล่งอ้างอิง (References)
      https://www.techspot.com/news/110779-darkspectre-quietly-infected-millions-through-seemingly-legit-browser.html

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cisco ออกแพตช์อุดช่องโหว่ CVE-2026-20029 บน ISE เสี่ยงข้อมูลอ่อนไหวรั่วไหลจากหน้าเว็บจัดการ

      6050fcd6-a6c7-4346-9271-22985d9e69fa-image.png Cisco ออกแพตช์อุดช่องโหว่ CVE-2026-20029 บน ISE เสี่ยงข้อ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 353fc0e4-7c64-455f-a2ab-a0a2e6834b91-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Veeam แก้ไขช่องโหว่ RCE และปัญหาด้านความปลอดภัยอื่น ๆ

      7812ce23-3434-47af-9c13-2cef967d4441-image.png Veeam แก้ไขช่องโหว่ RCE และปัญหาด้านความปลอดภัย.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 52e2c37a-a251-440f-a226-8a5e950ce0ab-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ช่องโหว่ระดับร้ายแรงใน jsPDF แฮกเกอร์อาจขโมยไฟล์สำคัญในเซิร์ฟเวอร์ได้

      274656a0-90bb-4f19-9ee0-c332af9aa47f-image.png ช่องโหว่ระดับร้ายแรงใน jsPDF แฮกเกอร์อาจขโมย.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 5d876317-e111-418d-8a06-dffd04747db2-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ด่วน! ช่องโหว่ RCE ใน Veeam Backup & Replication เสี่ยงต่อการถูกเข้าควบคุมระบบสำรองข้อมูล

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ พบการอัปเดตด้านความมั่นคงปลอดภัยเพื่อแก้ไขช่องโหว่ระดับร้ายแรงในซอฟต์แวร์ Veeam Backup & Replication ซึ่งเป็นระบบสำรองข้อมูลที่มีการใช้งานอย่างแพร่หลายในองค์กร

      หากไม่ดำเนินการแก้ไข อาจทำให้ผู้ไม่หวังดีสามารถสั่งรันคำสั่งจากระยะไกล (Remote Code Execution: RCE) บนระบบสำรองข้อมูลได้ อาจส่งผลกระทบต่อความมั่นคงปลอดภัยของข้อมูลสำรอง และระบบสารสนเทศขององค์กร

      1.รายละเอียดช่องโหว่
      ช่องโหว่ CVE-2025-59470 มีคะแนนความรุนแรง CVSS 9.0 จัดอยู่ในระดับร้ายแรง เป็นช่องโหว่ที่อาจนำไปสู่การสั่งรันคำสั่งจากระยะไกล (Remote Code Execution: RCE) โดยเปิดโอกาสให้ผู้ใช้งานในบทบาท Backup Operator หรือ Tape Operator สามารถกำหนดค่าพารามิเตอร์ที่ถูกออกแบบมาเป็นพิเศษ
      เพื่อสั่งรันโค้ดในสิทธิ์ของผู้ใช้งานระบบ postgres ซึ่งอาจถูกนำไปใช้เพื่อเข้าควบคุมระบบสำรองข้อมูลโดยไม่ได้รับอนุญาต

      1. ความเสี่ยงและผลกระทบ
        หากช่องโหว่ดังกล่าวถูกนำไปใช้โจมตี อาจทำให้ผู้ไม่หวังดีสามารถเข้าควบคุมระบบสำรองข้อมูล แก้ไขหรือลบข้อมูลสำรอง รวมถึงใช้ระบบสำรองข้อมูลเป็นจุดเริ่มต้นในการโจมตีระบบอื่นภายในองค์กร ซึ่งอาจส่งผลกระทบต่อความต่อเนื่องในการดำเนินงานและความมั่นคงปลอดภัยของข้อมูลสำคัญ

      2. ผลิตภัณฑ์ที่ได้รับผลกระทบ
        • Veeam Backup & Replication เวอร์ชัน 13.0.1.180 และ เวอร์ชัน 13 ก่อนหน้าทั้งหมด

      4.แนวทางการป้องกันและลดความเสี่ยง
      4.1 ดำเนินการอัปเดตซอฟต์แวร์เป็น Veeam Backup & Replication เวอร์ชัน 13.0.1.1071 หรือใหม่กว่า
      4.1 ทบทวนและจำกัดสิทธิ์ของบัญชีผู้ใช้งานในบทบาท Backup Operator และ Tape Operator ให้เหมาะสม

      ⚠️ ThaiCERT ย้ำเช็กเวอร์ชันด่วน! ข้อมูลสำรองของคุณอาจไม่ปลอดภัย

      🔗 แหล่งอ้างอิง (References)
      • https://www.veeam.com/kb4792
      • https://www.cve.org/CVERecord?id=CVE-2025-59470
      • https://thehackernews.com/2026/01/veeam-patches-critical-rce.html

      Veeam Backup & Replication8.png

      ด้วยความปรารถนาดี สำนักงานคณะกรรมการการรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ (สกมช.) / ThaiCERT

      #Veeam #VeeamBackup #CVE202559470 #ThaiCERT #ThaiCyberSecurity #RCE #BackupSecurity #ช่องโหว่รุนแรง #อัปเดตด่วน

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 09 January 2026

      New Tooling

      • StackRox: Open-Source Kubernetes Security Platform
        "Security teams spend a lot of time stitching together checks across container images, running workloads, and deployment pipelines. The work often happens under time pressure, with engineers trying to keep clusters stable while meeting internal policy requirements. The StackRox open source project sits in that space, offering a Kubernetes security platform that teams can run and adapt on their own."
        https://www.helpnetsecurity.com/2026/01/08/stackrox-kubernetes-security-platform-open-source/
        https://github.com/stackrox/stackrox

      Vulnerabilities

      • Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise On Self-Hosted Instances
        "Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution."
        https://thehackernews.com/2026/01/coolify-discloses-11-critical-flaws.html
        https://censys.com/advisory/cve-2025-64424-cve-2025-64420-cve-2025-64419
      • PoC Released For Unauthenticated RCE In Trend Micro Apex Central (CVE-2025-69258)
        "Trend Micro has released a critical patch fixing several remotely exploitable vulnerabilities in Apex Central (on-premise), including a flaw (CVE-2025-69258) that may allow unauthenticated attackers to achieve code execution on affected installations. The three vulnerabilities were unearthed and privately reported by Tenable bug hunters last year, and they now published technical details and PoC exploits for each."
        https://www.helpnetsecurity.com/2026/01/08/trend-micro-apex-central-cve-2025-69258-rce-poc/
        https://www.tenable.com/security/research/tra-2026-01
        https://success.trendmicro.com/en-US/solution/KA-0022071
      • Cisco Warns Of Identity Service Engine Flaw With Exploit Code
        "Cisco has patched a vulnerability in its Identity Services Engine (ISE) network access control solution, with public proof-of-concept exploit code, that can be abused by attackers with admin privileges. Enterprise admins use Cisco ISE to manage endpoint, user, and device access to network resources while enforcing a zero-trust architecture. The security flaw (CVE-2026-20029) affects Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) regardless of device configuration, and remote attackers with high privileges can exploit it to access sensitive information on unpatched devices."
        https://www.bleepingcomputer.com/news/security/cisco-warns-of-identity-service-engine-flaw-with-exploit-code/
        https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt
        https://thehackernews.com/2026/01/cisco-patches-ise-security.html
        https://securityaffairs.com/186682/security/public-poc-prompts-cisco-patch-for-ise-ise-pic-vulnerability.html
        https://www.theregister.com/2026/01/08/rcisco_ise_bug_poc/
      • CISA Adds Two Known Exploited Vulnerabilities To Catalog
        "CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2009-0556 Microsoft Office PowerPoint Code Injection Vulnerability
        CVE-2025-37164 HPE OneView Code Injection Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/01/07/cisa-adds-two-known-exploited-vulnerabilities-catalog
        https://thehackernews.com/2026/01/cisa-flags-microsoft-office-and-hpe.html
        https://www.bleepingcomputer.com/news/security/cisa-tags-max-severity-hpe-oneview-flaw-as-actively-exploited/
        https://www.darkreading.com/vulnerabilities-threats/maximum-severity-hpe-oneview-flaw-exploited
        https://www.securityweek.com/critical-hpe-oneview-vulnerability-exploited-in-attacks/
        https://securityaffairs.com/186672/security/u-s-cisa-adds-hpe-oneview-and-microsoft-office-powerpoint-flaws-to-its-known-exploited-vulnerabilities-catalog.html
        https://www.malwarebytes.com/blog/news/2026/01/cisa-warns-of-active-attacks-on-hpe-oneview-and-legacy-powerpoint
        https://www.theregister.com/2026/01/08/cisa_oneview_powerpoint_bugs/
        https://www.helpnetsecurity.com/2026/01/08/hpe-oneview-cve-2025-37164-exploited/
      • ZombieAgent: New ChatGPT Vulnerabilities Let Data Theft Continue (and Spread)
        "To improve user experience and expand ChatGPT’s capabilities, OpenAI has added a feature that allows ChatGPT to connect to external systems such as Gmail, Jira, GitHub, Teams, Outlook, Google Drive and more. The feature, called Connectors, lets users link to these systems in just a few clicks. ChatGPT also includes built-in tools that allow it to browse the internet, open links, analyze, generate images and more. For example, its Memory feature, enabled by default unless the user explicitly disables it, lets ChatGPT store conversations and sensitive information about the user. This allows it to learn about the user and provide better and more accurate responses. ChatGPT can read, create, delete and edit these stored memories."
        https://www.radware.com/blog/threat-intelligence/zombieagent/
        https://www.darkreading.com/endpoint-security/chatgpt-memory-feature-prompt-injection
        https://www.infosecurity-magazine.com/news/new-zeroclick-attack-chatgpt/
        https://www.theregister.com/2026/01/08/openai_chatgpt_prompt_injection/
      • Researchers Expose WHILL Wheelchair Safety Risks Via Remote Hacking
        "Security researchers have demonstrated a critical vulnerability in high-tech electric wheelchairs that allows for unauthorized remote control, highlighting new safety risks for connected mobility devices. On December 30, the US cybersecurity agency CISA published an advisory to inform the public about a serious vulnerability discovered by researchers in electric wheelchairs made by WHILL, a Japan-based company whose personal electric mobility devices are sold around the world. According to CISA’s advisory, WHILL Model C2 and Model F electric wheelchairs are affected by a missing authentication vulnerability. The issue is tracked as CVE-2025-14346 and it has been assigned a critical severity rating."
        https://www.securityweek.com/researchers-expose-whill-wheelchair-safety-risks-via-remote-hacking/
        https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-364-01

      Malware

      • FBI Warns About Kimsuky Hackers Using QR Codes To Phish U.S. Orgs
        "The North Korean state-sponsored hacker group Kimsuki is using malicious QR codes in spearphishing campaigns that target U.S. organizations, the Federal Bureau of Investigation warns in a flash alert. The observed activity targets organizations involved in North Korea-related policy, research, and analysis, including non-governmental organizations, think tanks, academic institutions, strategic advisory firms, and government entities in the U.S. The use of QR codes in phishing, a technique also known as "quishing," isn’t new; the FBI warned about it when cybercriminals used it to steal money, but it remains an effective security bypass."
        https://www.bleepingcomputer.com/news/security/fbi-warns-about-kimsuky-hackers-using-qr-codes-to-phish-us-orgs/
        https://www.ic3.gov/CSA/2026/260108.pdf
      • UAT-7290 Targets High Value Telecommunications Infrastructure In South Asia
        "Talos assesses with high confidence that UAT-7290 is a sophisticated threat actor falling under the China-nexus of Advanced Persistent Threat actors (APTs). UAT-7290 primarily targets telecommunications providers in South Asia. However, in recent months we have also seen UAT-7290 expand their targeting into Southeastern Europe. In addition to conducting espionage focused attacks where UAT-7290 burrows deep inside a victim enterprise’s network infrastructure, their tactics, techniques and procedures (TTPs) and tooling suggests that this actor also establishes Operational Relay Box (ORBs) nodes. The ORB infrastructure may then be used by other China-nexus actors in their malicious operations, signifying UAT-7290's dual role as an espionage motivated threat actor as well as an initial access group."
        https://blog.talosintelligence.com/uat-7290/
        https://www.bleepingcomputer.com/news/security/new-china-linked-hackers-breach-telcos-using-edge-device-exploits/
        https://thehackernews.com/2026/01/china-linked-uat-7290-targets-telecoms.html
        https://www.infosecurity-magazine.com/news/china-uat-7290-targets-telecoms/
      • Guloader Malware Being Disguised As Employee Performance Reports
        "AhnLab SEcurity intelligence Center (ASEC) recently discovered the Guloader malware being distributed via phishing emails disguised as an employee performance report. The email claims to be informing the recipient about the report for October 2025, and prompts the recipient to check the attachment by mentioning the plan to dismiss some employees."
        https://asec.ahnlab.com/en/91825/
      • In-Depth Analysis Report On LockBit 5.0: Operation And Countermeasures
        "Since its first appearance in September 2019, LockBit has been known as one of the most notorious and active Ransomware-as-a-Service (RaaS) groups worldwide. LockBit operates on the RaaS model and is characterized by sophisticated encryption technology and automated propagation capabilities. Initial access is typically gained through vulnerability exploits, brute force attacks, phishing, or leaked login credentials, and the attack follows a three-stage process: initial access, lateral movement and privilege escalation, and ransomware deployment."
        https://asec.ahnlab.com/en/91945/
      • xRAT (QuasarRAT) Malware Being Distributed Through Webhard (Adult Games)
        "AhnLab SEcurity intelligence Center (ASEC) recently discovered that the xRAT (QuasarRAT) malware is being distributed through a webhard disguised as an adult game. In Korea, webhard services are one of the most commonly used platforms for distributing malware. Typically, threat actors use malware that are easily accessible, such as njRAT and XwormRAT. They disguise the malware as legitimate programs (e.g. games) or adult content to distribute them. Numerous cases have been introduced in the AhnLab SEcurity intelligence Center (ASEC) blog post below."
        https://asec.ahnlab.com/en/91930/
      • The Truman Show Scam: Trapped In An AI-Generated Reality
        "The OPCOPRO “Truman Show” operation is a fully synthetic, AI‑powered investment scam that uses legitimate Android and iOS apps from the official mobile app stores, and AI‑generated communities to steal money and identity data from victims. Instead of relying on malicious code, the attackers use social engineering. The attackers pull victims using phishing SMS/ads/Telegram into tightly-controlled WhatsApp and Telegram groups, where AI‑generated “experts” and synthetic peers simulate an institutional‑grade trading community for weeks before any money or personal details are requested."
        https://blog.checkpoint.com/mobile/the-truman-show-scam-trapped-in-an-ai-generated-reality/
      • Boto-Cor-De-Rosa Campaign Reveals Astaroth WhatsApp-Based Worm Activity In Brazil
        "Astaroth is a Brazilian banking malware previously covered in our analysis Astaroth Unleashed, where we detailed its evolution and capabilities. In a newly identified campaign, internally referred to as Boto Cor-de-Rosa, our researchers discovered that Astaroth now exploits WhatsApp Web as part of its propagation strategy. The malware retrieves the victim’s WhatsApp contact list and automatically sends malicious messages to each contact to further spread the infection."
        https://www.acronis.com/en/tru/posts/boto-cor-de-rosa-campaign-reveals-astaroth-whatsapp-based-worm-activity-in-brazil/
        https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html
        https://hackread.com/astaroth-banking-trojan-brazil-whatsapp-messages/
        https://securityaffairs.com/186685/malware/astaroth-banking-trojan-spreads-in-brazil-via-whatsapp-worm.html
      • Fake WinRAR Downloads Hide Malware Behind a Real Installer
        "A member of our web research team pointed me to a fake WinRAR installer that was linked from various Chinese websites. When these links start to show up, that’s usually a good indicator of a new campaign. So, I downloaded the file and started an analysis, which turned out to be something of a Matryoshka doll. Layer after layer, after layer. WinRAR is a popular utility that’s often downloaded from “unofficial” sites, which gives campaigns offering fake downloads a bigger chance of being effective."
        https://www.malwarebytes.com/blog/threat-intel/2026/01/fake-winrar-downloads-hide-malware-behind-a-real-installer
      • The Great VM Escape: ESXi Exploitation In The Wild
        "In December 2025, Huntress observed an intrusion leading to the deployment of VMware ESXi exploits. Based on indicators we observed, including the workstation name the threat actor was operating from and other TTPs, the Huntress Tactical Response team assesses with high confidence that initial access occurred via SonicWall VPN. The toolkit analyzed in this report also includes simplified Chinese strings in its development paths, including a folder named “全版本逃逸--交付” (translated: “All version escape - delivery”), and evidence suggesting it was potentially built as a zero-day exploit over a year before VMware's public disclosure, pointing to a well-resourced developer likely operating in a Chinese-speaking region."
        https://www.huntress.com/blog/esxi-vm-escape-exploit
        https://www.bleepingcomputer.com/news/security/vmware-esxi-zero-days-likely-exploited-a-year-before-disclosure/
        https://securityaffairs.com/186709/hacking/chinese-speaking-hackers-exploited-esxi-zero-days-long-before-disclosure.html
      • The Ghost In The Machine: Unmasking CrazyHunter's Stealth Tactics
        "CrazyHunter ransomware has emerged as a significant and concerning threat, highlighting the increasing sophistication of cybercriminal tactics. Trellix has been actively tracking this ransomware since its initial appearance, noting its rapid development and growing prevalence. The ransomware executable is a fork of the Prince ransomware, which surfaced in mid-2024. It has introduced notable advancements, particularly in network compromise techniques and anti-malware evasion. This blog provides an in-depth analysis of CrazyHunter ransomware and its attack flow."
        https://www.trellix.com/blogs/research/the-ghost-in-the-machine-crazyhunters-stealth-tactics/

      bolded text

      • December 2025 Phishing Email Trends Report
        "This report provides the distribution quantity, statistics, trends, and case information on phishing emails, which were collected and analyzed for one month in December 2025. The following statistics and cases are included in the original report."
        https://asec.ahnlab.com/en/91944/
      • Initial Access Sales Accelerated Across Australia And New Zealand In 2025
        "The cyber threat environment in Australia and New Zealand experienced a new escalation throughout 2025, driven by a surge in initial access sales, ransomware operations, and high-impact data breaches. According to our Threat Landscape Report Australia and New Zealand 2025, threat activity observed between January and November 2025 reveals a complex and commercialized underground ecosystem, where compromised network access is actively bought, sold, and exploited across multiple sectors."
        https://cyble.com/blog/australia-new-zealand-initial-access-threats/
      • Here's What Cloud Security's Future Holds For The Year Ahead
        "Cloud service providers (CSPs) play an important role in democratizing usage of technology to enable innovation. With cloud platforms, organizations do not need to worry about provisioning hardware and computing infrastructure; they can utilize cloud services and cloud-native development processes to easily build and deploy software applications. Now, as organizations are racing to adopt AI for its benefits, CSPs are fiercely competing to be the platform of choice for AI workloads and similarly democratize access to AI innovation."
        https://www.darkreading.com/cloud-security/heres-cloud-security-holds-year-ahead
      • Fifth Of Breaches Take Two Weeks To Recover From
        "Endpoint disruption following a serious security breach can take up to two weeks to recover from and cost millions for most (87%) US and UK organizations, a new report has revealed. Absolute Security polled 750 CISOs on both sides of the Atlantic to compile the first in a new e-book series, The Resilient CISO: The State of Enterprise Resilience. It revealed that, over the past 12 months, more than half (55%) of respondents had suffered a cyber-attack, ransomware infection, compromise or data breach that took mobile, remote or hybrid endpoint devices out of action."
        https://www.infosecurity-magazine.com/news/fifth-breaches-two-weeks-recover/
      • Rethinking Security For Agentic AI
        "Artificial intelligence has already transformed how enterprises operate, but the next wave of innovation, agentic AI, operates as autonomous or semi‑autonomous agents that can run code, interact with APIs, access databases, and make decisions on the fly. Organizations need to take immediate measures against security threats that can occur when software systems transition from producing passive text output to performing active operational tasks."
        https://www.securityweek.com/rethinking-security-for-agentic-ai/
      • The State Of Ransomware In The U.S.: Report And Statistics 2025
        "Despite arrests, takedowns, and the apparent collapse of several major ransomware groups, 2025 delivered no slowdown in ransomware harm. Victim numbers climbed sharply, new groups emerged, and attackers increasingly found success with social engineering over technical exploits."
        https://www.emsisoft.com/en/blog/47215/the-state-of-ransomware-in-the-u-s-report-and-statistics-2025/
        https://www.theregister.com/2026/01/08/ransomware_2025_emsisoft/
      • Inside Vercel’s Sleep-Deprived Race To Contain React2Shell
        "Talha Tariq and his colleagues at Vercel, the company that maintains Next.js, endured many sleep-deprived nights and weekends when React2Shell was discovered and disclosed soon after Thanksgiving. The defect, which affects vast stretches of the internet’s underlying infrastructure, posed a significant risk for Next.js, an open-source library that depends on vulnerable React Server Components."
        https://cyberscoop.com/vercel-cto-security-react2shell-vulnerability/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) dd357b95-eeb6-48b4-bf67-7cce439e60a1-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 08 January 2026

      Vulnerabilities

      • Ni8mare  -  Unauthenticated Remote Code Execution In n8n (CVE-2026-21858)
        "We discovered a critical vulnerability (CVE-2026-21858, CVSS 10.0) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers globally. No official workarounds are available for this vulnerability. Users should upgrade to version 1.121.0 or later to remediate the vulnerability."
        https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
        https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
        https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/
        https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html
        https://cyberscoop.com/n8n-critical-vulnerability-massive-risk/
        https://securityaffairs.com/186648/security/ni8mare-flaw-gives-unauthenticated-control-of-n8n-instances.html
      • n8n Warns Of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted And Cloud Versions
        "Open-source workflow automation platform n8n has warned of a maximum-severity security flaw that, if successfully exploited, could result in authenticated remote code execution (RCE). The vulnerability, which has been assigned the CVE identifier CVE-2026-21877, is rated 10.0 on the CVSS scoring system. "Under certain conditions, an authenticated user may be able to cause untrusted code to be executed by the n8n service," n8n said in an advisory released Tuesday. "This could result in full compromise of the affected instance.""
        https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html
        https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
      • CVE-2025-68428: Critical Path Traversal In JsPDF
        "A critical local file inclusion and path traversal vulnerability has been disclosed in jsPDF, a widely-adopted npm package for generating PDF documents in JavaScript applications. The flaw, tracked as CVE-2025-68428 and GHSA-f8cm-6447-x5h2, allows attackers to read arbitrary files from the local filesystem and exfiltrate their contents by embedding them within generated PDFs. Successful exploitation results in unauthorized disclosure of sensitive data including configuration files, environment variables, credentials, and other files accessible to the Node.js process. File contents are included verbatim in generated PDFs, enabling data exfiltration through normal application output. As a result, this is considered a critical vulnerability with a CVSS v4.0 score of 9.2."
        https://www.endorlabs.com/learn/cve-2025-68428-critical-path-traversal-in-jspdf
        https://github.com/parallax/jsPDF/security/advisories/GHSA-f8cm-6447-x5h2
        https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/
      • New Veeam Vulnerabilities Expose Backup Servers To RCE Attacks
        "Veeam released security updates to patch multiple security flaws in its Backup & Replication software, including a critical remote code execution (RCE) vulnerability. Tracked as CVE-2025-59470, this RCE security flaw affects Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds. "This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter," Veeam explained in a Tuesday advisory."
        https://www.bleepingcomputer.com/news/security/new-veeam-vulnerabilities-expose-backup-servers-to-rce-attacks/
        https://www.veeam.com/kb4792
        https://thehackernews.com/2026/01/veeam-patches-critical-rce.html
        https://cyberscoop.com/veeam-backup-replication-security-flaw-remote-code-execution-fix/
        https://securityaffairs.com/186630/security/veeam-resolves-cvss-9-0-rce-flaw-and-other-security-issues.html
        https://www.securityweek.com/several-code-execution-flaws-patched-in-veeam-backup-replication/
      • IBM's AI Agent Bob Easily Duped To Run Malware, Researchers Show
        "IBM describes its coding agent thus: "Bob is your AI software development partner that understands your intent, repo, and security standards." Unfortunately, Bob doesn't always follow those security standards. Announced last October and presently in closed beta testing, IBM offers Bob in the form of a command line interface – a CLI, like Claude Code – and an integrated development environment – an IDE like Cursor."
        https://www.theregister.com/2026/01/07/ibm_bob_vulnerability/

      Malware

      • Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, And Crypto-Focused Campaigns
        "GoBruteforcer is a botnet that turns compromised Linux servers into scanning and password brute-force nodes. It targets internet-exposed services such as phpMyAdmin web panels, MySQL and PostgreSQL databases, and FTP servers. Infected hosts are incorporated into the botnet and accept remote operator commands. Newly discovered weak credentials are used to steal data, create backdoor accounts, sell access, and expand the botnet. The malicious toolkit is usually split into two parts. The first is an IRC bot that enables remote control of the compromised host, including command execution and updates. The second is a bruteforcer that is fetched later and used to scan random public IP ranges and attempt logins using credentials that are hardcoded or provided by the command and control (C2) server."
        https://research.checkpoint.com/2026/inside-gobruteforcer-ai-generated-server-defaults-weak-passwords-and-crypto-focused-campaigns/
        https://www.bleepingcomputer.com/news/security/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/
      • International Threats: Themes For Regional Phishing Campaigns
        "Cofense Intelligence relies on over 35 million trained employees from around the world, therefore a considerable number of analyzed campaigns are written in languages other than English. This report covers from May 2023 to May 2025 and focuses on the overall themes of campaigns in the top five most commonly seen languages besides English that bypassed perimeter filtering such as Secure Email Gateways (SEGs). Themes are valuable because they inform individuals what to be most suspicious of, can be used to help guide Security Awareness Training (SAT) by customizing content and phishing simulations, and enable a more rapid and informed response from Security Operations Centers (SOCs)."
        https://cofense.com/blog/international-threats-themes-for-regional-phishing-campaigns
      • Phishing Actors Exploit Complex Routing And Misconfigurations To Spoof Domains
        "Phishing actors are exploiting complex routing scenarios and misconfigured spoof protections to effectively spoof organizations’ domains and deliver phishing emails that appear, superficially, to have been sent internally. Threat actors have leveraged this vector to deliver a wide variety of phishing messages related to various phishing-as-a-service (PhaaS) platforms such as Tycoon2FA. These include messages with lures themed around voicemails, shared documents, communications from human resources (HR) departments, password resets or expirations, and others, leading to credential phishing."
        https://www.microsoft.com/en-us/security/blog/2026/01/06/phishing-actors-exploit-complex-routing-and-misconfigurations-to-spoof-domains/
        https://thehackernews.com/2026/01/microsoft-warns-misconfigured-email.html
        https://www.darkreading.com/cloud-security/phishers-exploit-office-365-users-guard-down
        https://www.securityweek.com/complex-routing-misconfigurations-exploited-for-domain-spoofing-in-phishing-attacks/
        https://securityaffairs.com/186638/hacking/misconfigured-email-routing-enables-internal-spoofed-phishing.html
      • DDoSia Powers Affiliate-Driven Hacktivist Attacks
        "A pro-Russian hacktivist group known as NoName057(16) is using a volunteer-distributed distributed denial-of-service (DDoS) tool to disrupt government, media, and institutional websites tied to Ukraine and Western political interests. The group has been active since at least 2022 and relies on a custom denial-of-service platform, dubbed DDoSia, that allows individuals with minimal technical skill to participate in coordinated attacks against target entities. Many of NoName057(16)'s campaigns have often coincided with major geopolitical events — such as Western sanctions, diplomatic actions, or military aid announcements — that it quickly frames as provocations worthy of retaliatory cyberattacks, and are similar to other ideologically driven cyber operations."
        https://www.darkreading.com/cyberattacks-data-breaches/ddosia-powers-volunteer-driven-hacktivist-attacks
      • Cyberattacks Likely Part Of Military Operation In Venezuela
        "The recent US military operation in Venezuela resulting in the capture of President Nicolás Maduro had "layering effects" provided by US Cyber Command and other agencies, but the degree to which cyber operations played a role in the raid remains a question mark, experts say. During a Jan. 3 press conference following the successful operation, President Donald Trump hinted that "a certain expertise" had allow US forces to shut down power to the area of operations. "It was dark — the lights of Caracas were largely turned off due to a certain expertise that we have," he told reporters during the press conference."
        https://www.darkreading.com/cybersecurity-operations/cyberattacks-part-military-operation-venezuela
      • Ghost Tapped: Tracking The Rise Of Chinese Tap-To-Pay Android Malware
        "Group-IB researchers have observed the growing proliferation of NFC-enabled Android tap-to-pay malware developed and sold within Chinese cybercrime communities on Telegram. Also referred to as “Ghost Tap”, these applications are used to relay NFC communications between a victim’s device or a mobile wallet loaded with compromised payment cards, and the criminal’s device. This technique allows criminals to complete payments or cash-out remotely as though the victims’ cards were physically present."
        https://www.group-ib.com/blog/ghost-tapped-chinese-malware/
        https://www.infosecurity-magazine.com/news/ghost-tap-malware-remote-nfc-fraud/
      • Malicious NPM Packages Deliver NodeCordRAT
        "Zscaler ThreatLabz regularly monitors the npm database for suspicious packages. In November 2025, ThreatLabz identified three malicious packages: bitcoin-main-lib, bitcoin-lib-js, and bip40. The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload. This final payload, named NodeCordRAT by ThreatLabz, is a remote access trojan (RAT) with data-stealing capabilities. It is also possible to download bip40 as a standalone package, completely bypassing the other libraries. To deceive developers into downloading the fraudulent packages, the attacker used name variations of real repositories found within the legitimate bitcoinjs project."
        https://www.zscaler.com/blogs/security-research/malicious-npm-packages-deliver-nodecordrat
      • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
        "A cybercrime gang known as Black Cat has been attributed to a search engine optimization (SEO) poisoning campaign that employs fraudulent sites advertising popular software to trick users into downloading a backdoor capable of stealing sensitive data. According to a report published by the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) and Beijing Weibu Online (aka ThreatBook), the activity is designed to strategically push bogus sites to the top of search results on search engines like Microsoft Bing, specifically targeting users looking for programs like Google Chrome, Notepad++, QQ International, and iTools."
        https://thehackernews.com/2026/01/black-cat-behind-seo-poisoning-malware.html
      • Unpacking The Packer ‘pkr_mtsi’
        "This blog post presents an in-depth technical analysis of pkr_mtsi, a malicious Windows packer first observed in the wild on April 24, 2025, and continuously deployed through the time of writing. The packer is actively leveraged in large-scale malvertising and SEO-poisoning campaigns to distribute trojanized installers for legitimate software, enabling initial access and flexible delivery of follow-on payloads. In observed campaigns, pkr_mtsi has been used to deliver a diverse set of malware families, including Oyster, Vidar, Vanguard Stealer, Supper, and more, underscoring its role as a general-purpose loader rather than a single-payload wrapper."
        https://www.reversinglabs.com/blog/unpacking-pkr_mtsi
        https://www.infosecurity-magazine.com/news/malware-loader-pkrmtsi-payloads/

      Breaches/Hacks/Leaks

      • OwnCloud Urges Users To Enable MFA After Credential Theft Reports
        "File-sharing platform ownCloud warned users today to enable multi-factor authentication (MFA) to block attackers using compromised credentials from stealing their data. ownCloud has over 200 million users worldwide, including hundreds of enterprise and public-sector organizations such as the European Organization for Nuclear Research, the European Commission, German tech company ZF Group, insurance firm Swiss Life, and the European Investment Bank."
        https://www.bleepingcomputer.com/news/security/owncloud-urges-users-to-enable-mfa-after-credential-theft-reports/
      • Major Data Breach Hits Company Operating 150 Gas Stations In The US
        "Gulshan Management Services, Inc., a Texas-based company that operates over 150 gas stations and convenience stores under the Handi Plus and Handi Stop brands all over the United States, has confirmed a large-scale data breach that exposed personal information tied to more than 377,000 people. The incident came to light through a filing with the Maine Attorney General, a required step when residents of that state are affected. According to the disclosure, attackers gained unauthorized access to an external system between September 17 and September 27, 2025. The breach was discovered on September 27, suggesting it went undetected for several days before being identified."
        https://hackread.com/data-breach-us-gas-stations-company/
      • Spanish Airline Iberia Attributes Recent Data Breach Claims To November Incident
        "Leaked data exposed by a cybersecurity firm this week was allegedly stolen during a data breach identified in November, according to Spanish airline Iberia. On Monday, researchers at Hudson Rock published a report about a threat actor named Zestix that has been auctioning data allegedly stolen from the corporate file-sharing portals of about 50 large companies and law firms."
        https://therecord.media/spanish-airline-attributes-recent-breach-allegation-to-nov-incident
      • Illinois State Agency Exposed Personal Data Of 700,000 People
        "The Illinois Department of Human Services (IDHS) exposed personal information belonging to more than 700,000 state residents after inadvertently posting the data on the open internet where it remained for as long as four years before being taken down in September. The agency learned in late September that personal data showing names, addresses and other information for more than 32,400 disabled customers were left on the open web after agency officials created planning maps on a mapping website to help direct resource allocations."
        https://therecord.media/illinois-agency-exposed-data
      • ESA Calls Cops As Crims Lift Off 500 GB Of Files, Say Security Black Hole Still Open
        "The European Space Agency on Wednesday confirmed yet another massive security breach, and told The Register that the data thieves responsible will be subject to a criminal investigation. And this could be a biggie. Earlier in the week, Scattered Lapsus$ Hunters told us that they gained initial access to ESA's servers back in September by exploiting a public CVE, and stole 500 GB of very sensitive data. This, we're told, includes operational procedures, spacecraft and mission details, subsystems documentation, and proprietary contractor data from ESA partners including SpaceX, Airbus Group, and Thales Alenia Space, among others."
        https://www.theregister.com/2026/01/07/european_space_agency_breach_criminal_probe/

      General News

      • Why Legitimate Bot Traffic Is a Growing Security Blind Spot
        "Security teams have spent years improving their ability to detect and block malicious bots. That effort remains critical. Automated traffic now makes up more than half of all web traffic, and bot-driven attacks continue to grow in volume and sophistication. What has changed is the role of legitimate bots and how little visibility most security teams have into their behavior. So-called good bots now account for a significant share of automated traffic. Search engine crawlers index content. AI systems scrape pages to train models and generate responses. Agentic AI is beginning to interact with applications on behalf of users. These bots often operate within accepted norms, but at a scale that introduces real security, performance, and cost implications."
        https://hackread.com/legitimate-bot-traffic-security-blind-spot/
      • When AI Agents Interact, Risk Can Emerge Without Warning
        "System level risks can arise when AI agents interact over time, according to new research that examines how collective behavior forms inside multi agent systems. The study finds that feedback loops, shared signals, and coordination patterns can produce outcomes that affect entire technical or social systems, even when individual agents operate within defined parameters. These effects surface through interaction itself, which places risk in the structure of the system and how agents influence one another."
        https://www.helpnetsecurity.com/2026/01/07/research-interacting-ai-risks/
        https://arxiv.org/pdf/2512.17793
      • What European Security Teams Are Struggling To Operationalize
        "European security and compliance teams spend a lot of time talking about regulation. A new forecast report from Kiteworks suggests the harder problem sits elsewhere. According to the report, many European organizations have strong regulatory frameworks on paper, driven by GDPR and upcoming AI rules, and weaker operational systems that show how those rules work in daily practice. The gap, the report argues, shows up in areas like AI incident response, supply chain visibility, and compliance automation as organizations move toward 2026."
        https://www.helpnetsecurity.com/2026/01/07/security-teams-european-compliance-operations-gap/
      • Cloud And Threat Report: 2026
        "The 2026 edition of the Netskope Cloud and Threat Report is designed to analyze the most significant cybersecurity trends of the previous year, offering a critical preview of the challenges and risks that will define the enterprise landscape in 2026. In 2025, the rapid, often ungoverned, adoption of generative AI fundamentally reshaped the cybersecurity landscape. As organizations navigated the complexities of cloud data security, persistent phishing campaigns, and malware delivered through trusted channels, the introduction of widespread AI usage—particularly “shadow AI” and emerging “agentic AI”—layered new and complex data exposure risks onto the modern enterprise environment. This report provides a look back at the most significant trends of 2025 and serves as a critical preview of the evolving threat landscape for 2026, highlighting the additive nature of the risks that security teams must now confront. Not only do security teams still have to manage existing risks, but they now also have to manage the risks created by genAI."
        https://www.netskope.com/resources/cloud-and-threat-reports/cloud-and-threat-report-2026
        https://www.infosecurity-magazine.com/news/personal-llm-accounts-drive-shadow/
        https://www.helpnetsecurity.com/2026/01/07/gen-ai-data-violations-2026/
      • The Loudest Voices In Security Often Have The Least To Lose
        "Years ago, during one of the many times I’ve been in London, I turned on the television one evening. When the television fired up, I found myself watching a political debate between the leaders of different political parties leading up to an election. In the UK parliamentary system, the chosen leader of the political party that wins the most votes is appointed Prime Minister by the monarch. Thus, although there is no direct election for the Prime Minister, I was effectively watching a debate between candidates for Prime Minister."
        https://www.securityweek.com/the-loudest-voices-in-security-often-have-the-least-to-lose/
      • Threat Spotlight: How Phishing Kits Evolved In 2025
        "In 2025, 90% of high-volume phishing campaigns leveraged Phishing-as-a-Service (PhaaS) kits. These kits have transformed the phishing landscape, enabling even less-skilled cybercriminals to access advanced tools and automation and launch large-scale, targeted phishing campaigns, often impersonating legitimate services and institutions. This article provides an overview of phishing kit activity and evolution during 2025. It is a companion piece to the 2026 phishing predictions published in December 2025."
        https://blog.barracuda.com/2026/01/07/threat-spotlight-phishing-kits-evolved-2025
      • Stalkerware Operator Pleads Guilty In Rare Prosecution
        "The owner of a Michigan-based stalkerware company pleaded guilty on Monday to federal charges for selling a surveillance product designed to spy on people without their consent. Bryan Fleming admitted to founding and running pcTattletale, a company that marketed its spyware as a way for customers to catch romantic partners cheating. Fleming’s guilty plea is the first successful prosecution of a stalkerware operator since 2014."
        https://therecord.media/stalkerware-guilty-plea-fleming
        https://www.theregister.com/2026/01/07/stalkerware_slinger_pleads_guilty/
      • Alleged Cyber Scam Kingpin Arrested, Extradited To China
        "Cambodian authorities on Tuesday arrested and extradited to China Chen Zhi, the head of the Prince Group conglomerate and the alleged mastermind behind a multi-billion dollar scam empire. Cambodia’s Ministry of Interior announced the arrests of Zhi and two others — Xu Ji Liang and Shao Ji Hui — whose relation to Prince Group is unclear."
        https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited
      • Top 10 Ransomware Groups Of 2025
        "The Top 10 Ransomware Groups of 2025 illustrate how the ransomware ecosystem changed in structure rather than simply growing in volume. After the disruption of dominant groups in 2024, the ecosystem entered 2025 without a clear center of gravity. Instead of collapsing, ransomware operations adapted. Affiliates became more independent, group boundaries blurred, and former rivals increasingly operated without strict competitive lines. This shift reshaped how campaigns were organized, how infrastructure was shared, and how ransomware operations sustained momentum."
        https://socradar.io/blog/top-10-ransomware-groups-2025/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) b7173a49-0e23-49e8-8a67-39a5009fd4f4-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ช่องโหว่ใน TOTOLINK EX200 เปิดช่องผู้โจมตียึดอุปกรณ์จากระยะไกล

      584380de-453b-48db-9756-c995dd586bb4-image.png ช่องโหว่ใน TOTOLINK EX200 เปิดช่องผู้โจมตียึดอุปกร.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailandc958067d-9ea6-4949-8795-9fab15e47ccc-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Google ออกอัปเดตความปลอดภัย Android เดือนมกราคม แก้ไขช่องโหว่ใน Dolby Decoder

      95651cf4-bc5b-4225-b9ba-2a4f9c36038b-image.png Google ออกอัปเดตความปลอดภัย Android เดือนมกราคม แก้.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 52aecfcb-aca8-45ac-aa15-6add3fda042b-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • เตือนผู้ใช้งานเราเตอร์ D-Link รุ่นเก่า พบช่องโหว่รุนแรง "CVE-2026-0625" ถูกใช้โจมตีแล้ว แนะให้เปลี่ยนเครื่องใหม่ทันทีเนื่องจากไม่มีแพตช์แก้ไข

      03823d04-1d17-4086-a859-5920296dcc0f-image.png

      เตือนผู้ใช้งานเราเตอร์ D-Link รุ่นเก่า.jpg

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 0776281e-0e86-40a3-a0ee-7e61962c9ea9-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ด่วน! ช่องโหว่วิกฤตบนแพลตฟอร์ม Workflow Automation Platform n8n เร่งแก้ไขทันที!
      ⚠️ ThaiCERT ได้ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ และพบข้อมูลการเปิดเผยช่องโหว่ระดับวิกฤติในแพลตฟอร์ม n8n

      หากไม่ดำเนินการแก้ไข อาจเปิดโอกาสให้ผู้ไม่หวังดีเข้าถึงข้อมูลภายในเซิร์ฟเวอร์ และอาจต่อยอดไปสู่การเข้าควบคุมระบบ ส่งผลกระทบต่อความมั่นคงปลอดภัยของระบบสารสนเทศของหน่วยงาน

      🔴 รายละเอียดช่องโหว่
      • ช่องโหว่ CVE-2026-21858 ระดับ Critical มีคะแนน CVSS 10.0 เป็นช่องโหว่ที่เกี่ยวข้องกับการตีความชนิดข้อมูล (Content-Type) ผิดพลาด ในกระบวนการทำงานของ Webhook และ Form รวมถึงส่วนการจัดการไฟล์
      • ช่องโหว่นี้อาจเปิดโอกาสให้ผู้โจมตีที่สามารถเข้าถึง Webhook และ Form endpoints ของ n8n โจมตีได้ โดยไม่ต้องยืนยันตัวตน ผ่าน workflow บางรูปแบบที่เกี่ยวข้องกับ Form เพื่อเข้าถึงและอ่านไฟล์บนเซิร์ฟเวอร์ อาจถูกนำไปใช้เพื่อเปิดเผยข้อมูลสำคัญ รวมถึงข้ามกระบวนการยืนยันตัวตน และนำไปสู่การเข้าควบคุมระบบได้

      🎯 ผลิตภัณฑ์และเวอร์ชันที่ได้รับผลกระทบ
      • n8n เวอร์ชันก่อนหน้าและรวมถึง 1.65.0
      • เวอร์ชันที่มีการแก้ไขแล้ว: 1.121.0 หรือใหม่กว่า

      ⚠️ ThaiCERT ขอแนะนำให้หน่วยงานที่ใช้งานเวอร์ชันที่ได้รับผลกระทบ เร่งดำเนินการตรวจสอบและแก้ไขทันที

      🔎 แนวทางการตรวจสอบและการป้องกัน
      แนวทางการตรวจสอบ
      1. ตรวจสอบแพลตฟอร์ม n8n ที่ใช้งานอยู่ ว่าเป็นเวอร์ชันก่อนหน้าและ 1.65.0 หรือไม่
      2. ตรวจสอบ workflow ที่มีการใช้งาน Form หรือ Webhook และจุดเชื่อมต่อที่เปิดให้เข้าถึงจากภายนอก
      3. ตรวจสอบว่ามี Form endpoints หรือ Webhook endpoints ที่เปิดสาธารณะ หรือไม่
      4. ตรวจสอบบันทึกเหตุการณ์ (Logs) ที่เกี่ยวข้องกับการเรียกใช้งาน Webhook Form และพฤติกรรมการเข้าถึงไฟล์ที่ผิดปกติบนโฮสต์ที่ให้บริการ n8n

      แนวทางการป้องกัน
      • ดำเนินการอัปเดตแพลตฟอร์ม n8n เป็นเวอร์ชัน 1.121.0 หรือใหม่กว่า

      มาตรการชั่วคราว (กรณียังไม่สามารถอัปเดตได้ทันที)
      1. จำกัดหรือปิดการเข้าถึง Webhook และ Form endpoints ที่เปิดสาธารณะ จนกว่าจะดำเนินการอัปเดต
      2. หลีกเลี่ยงการเปิด n8n ให้เข้าถึงจากอินเทอร์เน็ตโดยตรง และจำกัดการเข้าถึงผ่านเครือข่ายภายในหรือ VPN เท่านั้น
      3. บังคับใช้การยืนยันตัวตนสำหรับ Forms ทั้งหมด

      ทั้งนี้ มาตรการดังกล่าวเป็นเพียงแนวทางชั่วคราวเพื่อบรรเทาความเสี่ยง ผู้ดูแลระบบควรดำเนินการอัปเดตแพลตฟอร์มเป็นเวอร์ชันที่ปลอดภัยโดยเร็วที่สุด

      🔗 แหล่งอ้างอิง (References)
      • https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html
      • https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
      • https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
      Workflow Automation Platform.png
      ด้วยความปรารถนาดี
      สำนักงานคณะกรรมการการรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ (สกมช.) / ThaiCERT

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT