<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news January 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 02 May 2026 07:48:22 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1762383</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 Mar 2022 07:53:26 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1762383</guid>
		<description><![CDATA[Horde of miner bots and backdoors leveraged Log4J to attack VMware Horizon servers https://news.sophos.com/en-us/2022/03/29/horde-of-miner-bots-and-backdoors-leveraged-log4j-to-attack-vmware-horizon-servers/
One of the products affected was VMware Horizon, a desktop and application virtualization platform that became part of the solution for some organizations&#039; work-from-home needs prior to and during office shutdowns over the past two years.
Lisäksi:https://www.zdnet.com/article/log4shell-exploited-to-infect-vmware-horizon-servers-with-backdoors-crypto-miners/.
Lisäksi:
https://threatpost.com/log4jshell-swarm-vmware-servers-miners-backdoors/179142/]]></description>
		<content:encoded><![CDATA[<p>Horde of miner bots and backdoors leveraged Log4J to attack VMware Horizon servers <a href="https://news.sophos.com/en-us/2022/03/29/horde-of-miner-bots-and-backdoors-leveraged-log4j-to-attack-vmware-horizon-servers/" rel="nofollow">https://news.sophos.com/en-us/2022/03/29/horde-of-miner-bots-and-backdoors-leveraged-log4j-to-attack-vmware-horizon-servers/</a><br />
One of the products affected was VMware Horizon, a desktop and application virtualization platform that became part of the solution for some organizations&#8217; work-from-home needs prior to and during office shutdowns over the past two years.<br />
Lisäksi:<a href="https://www.zdnet.com/article/log4shell-exploited-to-infect-vmware-horizon-servers-with-backdoors-crypto-miners/" rel="nofollow">https://www.zdnet.com/article/log4shell-exploited-to-infect-vmware-horizon-servers-with-backdoors-crypto-miners/</a>.<br />
Lisäksi:<br />
<a href="https://threatpost.com/log4jshell-swarm-vmware-servers-miners-backdoors/179142/" rel="nofollow">https://threatpost.com/log4jshell-swarm-vmware-servers-miners-backdoors/179142/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753563</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:32:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753563</guid>
		<description><![CDATA[DHS: Americans should be prepared for potential Russian cyberattacks
https://www.zdnet.com/article/dhs-warns-critical-infrastructure-orgs-local-governments-of-potential-for-russian-cyberattack/

Officials noted that &quot;Russia&#039;s threshold for conducting disruptive or destructive cyber attacks in the homeland probably remains very high.&quot;]]></description>
		<content:encoded><![CDATA[<p>DHS: Americans should be prepared for potential Russian cyberattacks<br />
<a href="https://www.zdnet.com/article/dhs-warns-critical-infrastructure-orgs-local-governments-of-potential-for-russian-cyberattack/" rel="nofollow">https://www.zdnet.com/article/dhs-warns-critical-infrastructure-orgs-local-governments-of-potential-for-russian-cyberattack/</a></p>
<p>Officials noted that &#8220;Russia&#8217;s threshold for conducting disruptive or destructive cyber attacks in the homeland probably remains very high.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753562</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:30:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753562</guid>
		<description><![CDATA[Finnish Diplomats Targeted by Pegasus Spyware: Ministry
https://www.securityweek.com/finnish-diplomats-targeted-pegasus-spyware-ministry

Mobile phones belonging to Finnish diplomats were spied on using the cyber espionage software Pegasus, the country’s foreign ministry said on Friday.

&quot;We can now be clear that there has been spyware in our phones,&quot; the ministry’s head of information security, Matti Parviainen, told AFP. The infected mobile devices were used by Finnish diplomats posted overseas, although the ministry refused to comment on how many staff were targeted, nor on whether the identity of the cyberattackers is known.

&quot;We have good guesses&quot; about how long the diplomats were spied on, Parviainen said, but the espionage is no longer continuing. Diplomats’ phones only handle information that is either public or with the lowest security classification, the ministry said, but added &quot;the information and its source may be confidential between diplomats.&quot;]]></description>
		<content:encoded><![CDATA[<p>Finnish Diplomats Targeted by Pegasus Spyware: Ministry<br />
<a href="https://www.securityweek.com/finnish-diplomats-targeted-pegasus-spyware-ministry" rel="nofollow">https://www.securityweek.com/finnish-diplomats-targeted-pegasus-spyware-ministry</a></p>
<p>Mobile phones belonging to Finnish diplomats were spied on using the cyber espionage software Pegasus, the country’s foreign ministry said on Friday.</p>
<p>&#8220;We can now be clear that there has been spyware in our phones,&#8221; the ministry’s head of information security, Matti Parviainen, told AFP. The infected mobile devices were used by Finnish diplomats posted overseas, although the ministry refused to comment on how many staff were targeted, nor on whether the identity of the cyberattackers is known.</p>
<p>&#8220;We have good guesses&#8221; about how long the diplomats were spied on, Parviainen said, but the espionage is no longer continuing. Diplomats’ phones only handle information that is either public or with the lowest security classification, the ministry said, but added &#8220;the information and its source may be confidential between diplomats.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753561</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:30:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753561</guid>
		<description><![CDATA[Israeli Lawyer, Hungarian Rights Group Target Pegasus Spyware
https://www.securityweek.com/israeli-lawyer-hungarian-rights-group-target-pegasus-spyware

An Israeli lawyer said Saturday he was working with a rights group in Hungary to pursue authorities and Israeli firm NSO Group on behalf of Hungarian journalists allegedly targeted with Pegasus spyware.

Eitay Mack told AFP he had asked the Israeli attorney general to investigate how NSO was licensed to sell its surveillance software, which can switch on a phone&#039;s camera or microphone and harvest its data, to Hungary.

The lawyer said he had coordinated the request with the Hungarian Civil Liberties Union (HCLU), which says Pegasus targeted the phones of four Hungarian journalists, one Belgian national and a sixth person who has requested anonymity.]]></description>
		<content:encoded><![CDATA[<p>Israeli Lawyer, Hungarian Rights Group Target Pegasus Spyware<br />
<a href="https://www.securityweek.com/israeli-lawyer-hungarian-rights-group-target-pegasus-spyware" rel="nofollow">https://www.securityweek.com/israeli-lawyer-hungarian-rights-group-target-pegasus-spyware</a></p>
<p>An Israeli lawyer said Saturday he was working with a rights group in Hungary to pursue authorities and Israeli firm NSO Group on behalf of Hungarian journalists allegedly targeted with Pegasus spyware.</p>
<p>Eitay Mack told AFP he had asked the Israeli attorney general to investigate how NSO was licensed to sell its surveillance software, which can switch on a phone&#8217;s camera or microphone and harvest its data, to Hungary.</p>
<p>The lawyer said he had coordinated the request with the Hungarian Civil Liberties Union (HCLU), which says Pegasus targeted the phones of four Hungarian journalists, one Belgian national and a sixth person who has requested anonymity.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753558</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:27:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753558</guid>
		<description><![CDATA[SureMDM Vulnerabilities Exposed Companies to Supply Chain Attacks
https://www.securityweek.com/suremdm-vulnerabilities-exposed-companies-supply-chain-attacks

A series of vulnerabilities in 42Gears’ SureMDM device management products could have resulted in a supply chain compromise against any organization using the platform.

42Gears was founded in 2009. It is based in Bangalore, India, and provides mobile device management and productivity products for organizations with a large mobile workforce. Its website lists a range of major customers (without specifying which products they use) including Deloitte, Saab, Lufthansa, Tesco, Thales, Intel and many others.

Researchers at Immersive Labs discovered and disclosed the first vulnerability to 42Gears on July 6, 2021. A series of additional vulnerability disclosures together with ‘failed’ private patches (including a new vulnerability introduced by one of the private patches) meant that effective public patches were not released until November 2021 and January 2022.

On January 23, 2022, 42Gears informed Immersive that they were continuing to apply additional mitigations beyond those reported by the researchers. By this time, Immersive felt they had done everything necessary to ensure their own principles of responsible disclosure, and they could publish their findings.]]></description>
		<content:encoded><![CDATA[<p>SureMDM Vulnerabilities Exposed Companies to Supply Chain Attacks<br />
<a href="https://www.securityweek.com/suremdm-vulnerabilities-exposed-companies-supply-chain-attacks" rel="nofollow">https://www.securityweek.com/suremdm-vulnerabilities-exposed-companies-supply-chain-attacks</a></p>
<p>A series of vulnerabilities in 42Gears’ SureMDM device management products could have resulted in a supply chain compromise against any organization using the platform.</p>
<p>42Gears was founded in 2009. It is based in Bangalore, India, and provides mobile device management and productivity products for organizations with a large mobile workforce. Its website lists a range of major customers (without specifying which products they use) including Deloitte, Saab, Lufthansa, Tesco, Thales, Intel and many others.</p>
<p>Researchers at Immersive Labs discovered and disclosed the first vulnerability to 42Gears on July 6, 2021. A series of additional vulnerability disclosures together with ‘failed’ private patches (including a new vulnerability introduced by one of the private patches) meant that effective public patches were not released until November 2021 and January 2022.</p>
<p>On January 23, 2022, 42Gears informed Immersive that they were continuing to apply additional mitigations beyond those reported by the researchers. By this time, Immersive felt they had done everything necessary to ensure their own principles of responsible disclosure, and they could publish their findings.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753557</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:27:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753557</guid>
		<description><![CDATA[More Russian Attacks Against Ukraine Come to Light
https://www.securityweek.com/more-russian-attacks-against-ukraine-come-light

The WhisperGate attack is not the only operation believed to have been conducted by Russia-linked threat actors against Ukraine in recent months. Symantec on Monday disclosed the details of an espionage operation that it has tied to a known group.

For years, Russian advanced persistent threat (APT) actors have been observed launching various cyberattacks against Ukrainian targets, with some of these groups believed to be part of or under the direct supervision of Moscow’s secret service.

Over the past months, at least two Russian state-sponsored groups have been observed launching cyberattacks against Ukraine, namely Gamaredon, also known as Armageddon, Primitive Bear and Shuckworm, and potentially Sandworm, which is also referred to as Iron Viking, Telebots and Voodoo Bear.

Active since at least 2013 and mainly focused on targets in Ukraine, Gamaredon relies on phishing emails for the distribution of off-the-shelves tools (such as RMS and UltraVNC) and customized malware (Pterodo/Pteranodon).]]></description>
		<content:encoded><![CDATA[<p>More Russian Attacks Against Ukraine Come to Light<br />
<a href="https://www.securityweek.com/more-russian-attacks-against-ukraine-come-light" rel="nofollow">https://www.securityweek.com/more-russian-attacks-against-ukraine-come-light</a></p>
<p>The WhisperGate attack is not the only operation believed to have been conducted by Russia-linked threat actors against Ukraine in recent months. Symantec on Monday disclosed the details of an espionage operation that it has tied to a known group.</p>
<p>For years, Russian advanced persistent threat (APT) actors have been observed launching various cyberattacks against Ukrainian targets, with some of these groups believed to be part of or under the direct supervision of Moscow’s secret service.</p>
<p>Over the past months, at least two Russian state-sponsored groups have been observed launching cyberattacks against Ukraine, namely Gamaredon, also known as Armageddon, Primitive Bear and Shuckworm, and potentially Sandworm, which is also referred to as Iron Viking, Telebots and Voodoo Bear.</p>
<p>Active since at least 2013 and mainly focused on targets in Ukraine, Gamaredon relies on phishing emails for the distribution of off-the-shelves tools (such as RMS and UltraVNC) and customized malware (Pterodo/Pteranodon).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753556</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:26:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753556</guid>
		<description><![CDATA[North Korean Hackers Abuse Windows Update Client in Attacks on Defense Industry
https://www.securityweek.com/north-korean-hackers-abuse-windows-update-client-attacks-defense-industry]]></description>
		<content:encoded><![CDATA[<p>North Korean Hackers Abuse Windows Update Client in Attacks on Defense Industry<br />
<a href="https://www.securityweek.com/north-korean-hackers-abuse-windows-update-client-attacks-defense-industry" rel="nofollow">https://www.securityweek.com/north-korean-hackers-abuse-windows-update-client-attacks-defense-industry</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753555</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:26:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753555</guid>
		<description><![CDATA[Cyberattacks Increasingly Hobble Pandemic-Weary US Schools
https://www.securityweek.com/cyberattacks-increasingly-hobble-pandemic-weary-us-schools]]></description>
		<content:encoded><![CDATA[<p>Cyberattacks Increasingly Hobble Pandemic-Weary US Schools<br />
<a href="https://www.securityweek.com/cyberattacks-increasingly-hobble-pandemic-weary-us-schools" rel="nofollow">https://www.securityweek.com/cyberattacks-increasingly-hobble-pandemic-weary-us-schools</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753546</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:20:45 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753546</guid>
		<description><![CDATA[Be careful with RPMSG files
https://isc.sans.edu/forums/diary/Be+careful+with+RPMSG+files/28292/
Not many people are aware of &quot;.rpmsg&quot; files. The file extension means &quot;restricted-permission message&quot;. They are used to deliver email messages between people and implement some controls applied at the recipient side. Such permissions are, by example, the right to forward or copy the original email.]]></description>
		<content:encoded><![CDATA[<p>Be careful with RPMSG files<br />
<a href="https://isc.sans.edu/forums/diary/Be+careful+with+RPMSG+files/28292/" rel="nofollow">https://isc.sans.edu/forums/diary/Be+careful+with+RPMSG+files/28292/</a><br />
Not many people are aware of &#8220;.rpmsg&#8221; files. The file extension means &#8220;restricted-permission message&#8221;. They are used to deliver email messages between people and implement some controls applied at the recipient side. Such permissions are, by example, the right to forward or copy the original email.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/01/02/cyber-security-news-january-2022/comment-page-9/#comment-1753545</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 09:20:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190487#comment-1753545</guid>
		<description><![CDATA[277, 000 routers exposed to Eternal Silence attacks via UPnP https://www.bleepingcomputer.com/news/security/277-000-routers-exposed-to-eternal-silence-attacks-via-upnp/
A malicious campaign known as &#039;Eternal Silence&#039; is abusing Universal Plug and Play (UPnP) turns your router into a proxy server used to launch malicious attacks while hiding the location of the threat actors.]]></description>
		<content:encoded><![CDATA[<p>277, 000 routers exposed to Eternal Silence attacks via UPnP <a href="https://www.bleepingcomputer.com/news/security/277-000-routers-exposed-to-eternal-silence-attacks-via-upnp/" rel="nofollow">https://www.bleepingcomputer.com/news/security/277-000-routers-exposed-to-eternal-silence-attacks-via-upnp/</a><br />
A malicious campaign known as &#8216;Eternal Silence&#8217; is abusing Universal Plug and Play (UPnP) turns your router into a proxy server used to launch malicious attacks while hiding the location of the threat actors.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
