Weekly Unfoldings: August 19-24, 2024

5 min read
Weekly Unfoldings: August 19-24, 2024

Stay informed with our weekly roundup of top 10 key happenings in tech, cyber, and geopolitics. Discover the most significant developments, trends and breakthroughs shaping the industry, all in one concise update. The card image tiles are designed for easy recognition of the category to which the news belongs.

💡
The links provided in this content direct to third-party websites. We do not control or endorse the content on these external sites, and therefore cannot guarantee the accuracy, completeness, or reliability of the information they provide. We are not affiliated with these sites, and any opinions or claims made on them are solely those of the respective site owners. Users are encouraged to verify the information independently before relying on it.
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
Forensic Report on OTP-Stealing APK: How Uttarakhand Cyber Police Cracked the Mystery

A forensic analysis of the Haridwar investment scam app exposed its abuse of multiple permissions, including reading and sending SMS messages, which allowed fraudsters to intercept OTPs and carry out unauthorized financial transactions. Authorities are strongly advising the public to be extra cautious when granting permissions to financial apps, to prevent falling prey to such sophisticated and malicious scams.

Read more
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
New UPI Scam Exposed: How to Protect Your Account from Collect Request Fraud

A new scam in the digital payment world involves fraudsters spamming users with fake UPI collect requests, often disguised as legitimate transactions from trusted services. Just one careless approval can lead to significant financial loss. To protect your money, always stay vigilant, verify every UPI request thoroughly, and never approve a transaction without being absolutely sure of its authenticity.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data

Cybersecurity researchers have uncovered a serious vulnerability in Microsoft Copilot Studio, identified as CVE-2024-38206 (CVSS score: 8.5). This flaw, caused by a server-side request forgery (SSRF) attack, could allow attackers to access sensitive information within Microsoft internal infrastructure, including Cosmos DB instances. Although Microsoft has patched the issue, ensuring no customer action is required, it underscores the ongoing need for robust security measures across all digital platforms.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
New macOS Malware 'Cthulhu Stealer' Targets Apple Users' Data

Cybersecurity researchers have identified a new macOS-targeting malware called Cthulhu Stealer, available as malware-as-a-service (MaaS) for $500 monthly. Disguised as legitimate software, it steals credentials, cryptocurrency wallets, and other sensitive data by prompting users to enter their system and MetaMask passwords. Though unsophisticated, it highlights the growing threat to macOS, reinforcing the need for caution and regular security updates.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
Apple will soon let you delete the App Store in some markets

Recent changes driven by the EU's Digital Markets Act (DMA) will significantly impact iPhone users in the EU. Soon, you'll have more freedom to set default apps for various functions, including messaging and navigation. Additionally, you’ll be able to delete core Apple apps like Safari and the App Store, though you can still redownload them if needed. These updates are set to roll out with iOS 18 and beyond.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
Android malware uses smartphones NFC reader to steal payment card details.

A new Android malware has been discovered that uses smartphones NFC readers to steal payment card details. This malicious software intercepts data during NFC transactions, compromising users' financial information. To safeguard against this threat, users should be vigilant about app permissions, keep their devices updated, and utilize secure payment methods. Regularly checking for security updates is also crucial.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
Inside the Massive AWS Cloud Breach: How Exploited .env Files Led to a Global Extortion Campaign

A sophisticated cyber attack targeted over 230 million cloud environments, exploiting exposed .env files to gain unauthorized access. Attackers used these files to escalate privileges, deploy malicious AWS Lambda functions, and exfiltrate data. The incident highlights vulnerabilities in cloud security, particularly around .env file management and AWS IAM policies. Organizations must enhance security practices, monitoring, and incident response strategies to prevent similar attacks.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
Navigating Cyber Threats: Effective Use of the MITRE ATT&CK Framework

The MITRE ATT&CK Framework is like a playbook for cybersecurity. It maps out how attackers operate, giving organizations a clear view of their tactics and techniques. By using ATT&CK, teams can better understand and defend against threats, spot weaknesses in their security, and respond more effectively to attacks. It’s a practical tool for staying one step ahead in cyber defense.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia

A new malware called UULoader is being used to deliver other malicious payloads like Gh0st RAT and Mimikatz. It disguises itself as legitimate software updates targeting Korean and Chinese speakers. The malware hides in a Microsoft Cabinet file and uses DLL side-loading to execute its final stage. This highlights ongoing tactics where fake updates are used in cyberattacks.

Read more
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
ED Arrests Kidnapper for Extorting 2,091 Bitcoins and 11,000 Litecoins Worth Rs 1,232.5 Crore

In a major crackdown, the Enforcement Directorate arrested Shailesh Bhatt for a staggering Rs 1,232.5 crore crypto extortion case. Bhatt, defrauded in a cryptocurrency scam, allegedly kidnapped two of Bitconnect Coin's employees and extorted 2,091 Bitcoins, 11,000 Litecoins, and cash. The ED has also attached assets worth Rs 442 crore linked to the crime.

Read more

Want to write a blog?

Unfold your thoughts and let your ideas take flight in the limitless realm of cyberspace. Whether you're a seasoned writer or just starting, our platform offers you the space to share your voice, connect with a creative community and explore new perspectives. Join us and make your mark!

Follow us on social media

Cyber Unfolded Light Logo
Copyright © 2024 CYUN. All rights reserved.