On March 30, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) added five of the ten security vulnerabilities exploited as zero-days in two spyware campaign to its Known Exploited Vulnerabilities Catalog and ordered Federal agencies to patch them. According to Google's Threat Analysis Group (TAG), these flaws were exploited in two highly targeted campaigns targeting Android and iOS users in recent attacks to install commercial spyware on mobile devices. Moreover, the flaws were being leveraged by threat actors in separate exploit chains to compromise iOS and Android devices in the first series of attacks discovered in November 2022. A month later, the Samsung Android phones running updated Samsung Internet Browser versions were compromised by exploiting a complex chain of multiple 0-days and n-days, in which the end payload was an Android spyware suite installed to decrypt and extract data from multiple chat and browser apps. The time gap between the release of the fix and its full deployment on end-user devices in both campaigns helped the attackers to carry out the attacks successfully. CISA has added five vulnerabilities to its list of Known Exploited Vulnerabilities: Apple iOS, iPadOS, and macOS Out-of-Bounds Write vulnerability tracked as CVE-2021-30900, the Arm Mali GPU Kernel Driver Use-After-Free vulnerability tracked as CVE-2022-38181, Linux kernel use-after-free vulnerability tracked as CVE-2023-0266, Google Chrome Use-After-Free Vulnerability tracked as CVE-2022-3038, and Arm Mali GPU Kernel Driver Unspecified vulnerability tracked as CVE-2022-22706. Also, to fix these security flaws, the cybersecurity agency gave Federal Civilian Executive Branch agencies (FCEB) until April 20, 2023.
Cybersecurity researchers have identified an active phishing campaign impersonating Apple Pay support that is targeting users globally. The scheme combines realistic phishing email...
Cybersecurity researchers have identified a large-scale, worm-driven campaign targeting cloud-native environments to establish malicious infrastructure for downstream exploitation....
A new phishing campaign has been observed targeting Telegram users by abusing the platform’s legitimate login and authorization mechanisms. Instead of stealing passwords directly...