<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news September 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 05:05:07 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1782076</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Oct 2022 15:04:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1782076</guid>
		<description><![CDATA[https://thehackernews.com/2022/09/researchers-uncover-new-metador-apt.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2022/09/researchers-uncover-new-metador-apt.html" rel="nofollow">https://thehackernews.com/2022/09/researchers-uncover-new-metador-apt.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1782039</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Oct 2022 12:40:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1782039</guid>
		<description><![CDATA[Serious vulnerabilities in Matrix’s end-to-end encryption have been patched
Previously overlooked flaws allow malicious homeservers to decrypt and spoof messages.
https://arstechnica.com/information-technology/2022/09/matrix-patches-vulnerabilities-that-completely-subvert-e2ee-guarantees/]]></description>
		<content:encoded><![CDATA[<p>Serious vulnerabilities in Matrix’s end-to-end encryption have been patched<br />
Previously overlooked flaws allow malicious homeservers to decrypt and spoof messages.<br />
<a href="https://arstechnica.com/information-technology/2022/09/matrix-patches-vulnerabilities-that-completely-subvert-e2ee-guarantees/" rel="nofollow">https://arstechnica.com/information-technology/2022/09/matrix-patches-vulnerabilities-that-completely-subvert-e2ee-guarantees/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1782023</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Oct 2022 22:34:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1782023</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/hacking-group-hides-backdoor-malware-inside-windows-logo-image/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/hacking-group-hides-backdoor-malware-inside-windows-logo-image/" rel="nofollow">https://www.bleepingcomputer.com/news/security/hacking-group-hides-backdoor-malware-inside-windows-logo-image/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1782022</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Oct 2022 22:34:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1782022</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/new-malware-backdoors-vmware-esxi-servers-to-hijack-virtual-machines/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/new-malware-backdoors-vmware-esxi-servers-to-hijack-virtual-machines/" rel="nofollow">https://www.bleepingcomputer.com/news/security/new-malware-backdoors-vmware-esxi-servers-to-hijack-virtual-machines/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1782014</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Oct 2022 17:09:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1782014</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/fired-admin-cripples-former-employers-network-using-old-credentials/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/fired-admin-cripples-former-employers-network-using-old-credentials/" rel="nofollow">https://www.bleepingcomputer.com/news/security/fired-admin-cripples-former-employers-network-using-old-credentials/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1782013</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Oct 2022 17:09:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1782013</guid>
		<description><![CDATA[Optus takes out full-page newspaper advertisements to apologise over data breach
https://www.abc.net.au/news/2022-10-01/optus-data-breach-full-page-ads-newspapers-deeply-sorry/101493700

Optus has apologised to people affected by last week&#039;s cyber attack, admitting that it needs to communicate better with people caught up in the data breach. 

The telecommunications company took out full-page advertisements in major newspapers around the country to say how &quot;deeply sorry&quot; it was. 

&quot;We&#039;ve heard your message that we need to communicate more clearly,&quot; the ad says. 

&quot;That&#039;s why we&#039;ve now put together easily accessible materials for you to stay informed on the actions you can take.&quot;]]></description>
		<content:encoded><![CDATA[<p>Optus takes out full-page newspaper advertisements to apologise over data breach<br />
<a href="https://www.abc.net.au/news/2022-10-01/optus-data-breach-full-page-ads-newspapers-deeply-sorry/101493700" rel="nofollow">https://www.abc.net.au/news/2022-10-01/optus-data-breach-full-page-ads-newspapers-deeply-sorry/101493700</a></p>
<p>Optus has apologised to people affected by last week&#8217;s cyber attack, admitting that it needs to communicate better with people caught up in the data breach. </p>
<p>The telecommunications company took out full-page advertisements in major newspapers around the country to say how &#8220;deeply sorry&#8221; it was. </p>
<p>&#8220;We&#8217;ve heard your message that we need to communicate more clearly,&#8221; the ad says. </p>
<p>&#8220;That&#8217;s why we&#8217;ve now put together easily accessible materials for you to stay informed on the actions you can take.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1781969</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Sep 2022 14:10:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1781969</guid>
		<description><![CDATA[https://hackaday.com/2022/09/30/this-week-in-security-exchange-0-day-doppelgangers-and-python-gets-bit-in-the-tar/
According to researchers at GTSC, there’s an unpatched 0-day being used in-the-wild to exploit fully patched Microsoft Exchange servers. When they found one compromised server, they made the report to Microsoft through ZDI, but upon finding multiple Exchange servers compromised, they’re sounding the alarm for everyone. It looks like it’s an attack similar to ProxyShell, in that it uses the auto-discover endpoint as a starting point. They suspect it’s a Chinese group that’s using the exploit, based on some of the indicators found in the webshell that gets installed.

Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server
https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2022/09/30/this-week-in-security-exchange-0-day-doppelgangers-and-python-gets-bit-in-the-tar/" rel="nofollow">https://hackaday.com/2022/09/30/this-week-in-security-exchange-0-day-doppelgangers-and-python-gets-bit-in-the-tar/</a><br />
According to researchers at GTSC, there’s an unpatched 0-day being used in-the-wild to exploit fully patched Microsoft Exchange servers. When they found one compromised server, they made the report to Microsoft through ZDI, but upon finding multiple Exchange servers compromised, they’re sounding the alarm for everyone. It looks like it’s an attack similar to ProxyShell, in that it uses the auto-discover endpoint as a starting point. They suspect it’s a Chinese group that’s using the exploit, based on some of the indicators found in the webshell that gets installed.</p>
<p>Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server<br />
<a href="https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html" rel="nofollow">https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1781918</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Sep 2022 08:41:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1781918</guid>
		<description><![CDATA[Nate Raymond / Reuters: 	
Former eBay executives Jim Baugh and David Harville are sentenced to 57 and 24 months in prison for their roles in a 2019 cyberstalking campaign against critics

Ex-eBay execs heading to prison for harassing couple behind newsletter
https://www.reuters.com/world/us/ex-ebay-exec-heading-prison-harassing-couple-behind-newsletter-2022-09-29/

Two former eBay Inc (EBAY.O) security executives were sentenced to prison on Thursday for carrying out a campaign to harass and intimidate a Massachusetts couple through threats and disturbing home deliveries after their online newsletter drew the ire of the company&#039;s then-CEO.

Jim Baugh and David Harville were sentenced to 57 and 24 months in prison, respectively, for their roles in an extensive harassment campaign that involved sending the couple cockroaches, a funeral wreath and a bloody Halloween pig mask.

Prosecutors said senior executives deemed the newsletter critical of eBay, and in August 2019 then-Chief Executive Officer Devin Wenig texted another executive that it was time to &quot;take her down,&quot; referring to Ina Steiner.

They said other eBay employees involved included Harville, who Baugh recruited with a contractor for an &quot;op&quot; to surveil the Steiners and try unsuccessfully to install a GPS on their car.]]></description>
		<content:encoded><![CDATA[<p>Nate Raymond / Reuters:<br />
Former eBay executives Jim Baugh and David Harville are sentenced to 57 and 24 months in prison for their roles in a 2019 cyberstalking campaign against critics</p>
<p>Ex-eBay execs heading to prison for harassing couple behind newsletter<br />
<a href="https://www.reuters.com/world/us/ex-ebay-exec-heading-prison-harassing-couple-behind-newsletter-2022-09-29/" rel="nofollow">https://www.reuters.com/world/us/ex-ebay-exec-heading-prison-harassing-couple-behind-newsletter-2022-09-29/</a></p>
<p>Two former eBay Inc (EBAY.O) security executives were sentenced to prison on Thursday for carrying out a campaign to harass and intimidate a Massachusetts couple through threats and disturbing home deliveries after their online newsletter drew the ire of the company&#8217;s then-CEO.</p>
<p>Jim Baugh and David Harville were sentenced to 57 and 24 months in prison, respectively, for their roles in an extensive harassment campaign that involved sending the couple cockroaches, a funeral wreath and a bloody Halloween pig mask.</p>
<p>Prosecutors said senior executives deemed the newsletter critical of eBay, and in August 2019 then-Chief Executive Officer Devin Wenig texted another executive that it was time to &#8220;take her down,&#8221; referring to Ina Steiner.</p>
<p>They said other eBay employees involved included Harville, who Baugh recruited with a contractor for an &#8220;op&#8221; to surveil the Steiners and try unsuccessfully to install a GPS on their car.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1781902</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Sep 2022 08:23:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1781902</guid>
		<description><![CDATA[Andy Greenberg / Wired: 	
VMware and Google&#039;s Mandiant say a sophisticated hacker group has been installing backdoors in VMware&#039;s virtualization software on multiple targets&#039; networks  —  For decades, security researchers warned about techniques for hijacking virtualization software.  Now one group has put them into practice.

Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying
https://www.wired.com/story/hyperjacking-vmware-mandiant/

For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice. 

For decades, virtualization software has offered a way to vastly multiply computers’ efficiency, hosting entire collections of computers as “virtual machines” on just one physical machine. And for almost as long, security researchers have warned about the potential dark side of that technology: theoretical “hyperjacking” and “Blue Pill” attacks, where hackers hijack virtualization to spy on and manipulate virtual machines, with potentially no way for a targeted computer to detect the intrusion. That insidious spying has finally jumped from research papers to reality with warnings that one mysterious team of hackers has carried out a spree of “hyperjacking” attacks in the wild.

Today, Google-owned security firm Mandiant and virtualization firm VMware jointly published warnings that a sophisticated hacker group has been installing backdoors in VMware’s virtualization software on multiple targets’ networks as part of an apparent espionage campaign. By planting their own code in victims’ so-called hypervisors—VMware software that runs on a physical computer to manage all the virtual machines it hosts—the hackers were able to invisibly watch and run commands on the computers those hypervisors oversee. And because the malicious code targets the hypervisor on the physical machine rather than the victim’s virtual machines, the hackers’ trick multiplies their access and evades nearly all traditional security measures designed to monitor those target machines for signs of foul play.

“The idea that you can compromise one machine and from there have the ability to control virtual machines en masse is huge,” says Mandiant consultant Alex Marvi. And even closely watching the processes of a target virtual machine, he says, an observer would in many cases see only “side effects” of the intrusion, given that the malware carrying out that spying had infected a part of the system entirely outside its operating system.

Mandiant discovered the hackers earlier this year and brought their techniques to VMware’s attention. Researchers say they’ve seen the group carry out their virtualization hacking—a technique historically dubbed hyperjacking in a reference to “hypervisor hijacking”—in fewer than 10 victims’ networks across North America and Asia.]]></description>
		<content:encoded><![CDATA[<p>Andy Greenberg / Wired:<br />
VMware and Google&#8217;s Mandiant say a sophisticated hacker group has been installing backdoors in VMware&#8217;s virtualization software on multiple targets&#8217; networks  —  For decades, security researchers warned about techniques for hijacking virtualization software.  Now one group has put them into practice.</p>
<p>Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying<br />
<a href="https://www.wired.com/story/hyperjacking-vmware-mandiant/" rel="nofollow">https://www.wired.com/story/hyperjacking-vmware-mandiant/</a></p>
<p>For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice. </p>
<p>For decades, virtualization software has offered a way to vastly multiply computers’ efficiency, hosting entire collections of computers as “virtual machines” on just one physical machine. And for almost as long, security researchers have warned about the potential dark side of that technology: theoretical “hyperjacking” and “Blue Pill” attacks, where hackers hijack virtualization to spy on and manipulate virtual machines, with potentially no way for a targeted computer to detect the intrusion. That insidious spying has finally jumped from research papers to reality with warnings that one mysterious team of hackers has carried out a spree of “hyperjacking” attacks in the wild.</p>
<p>Today, Google-owned security firm Mandiant and virtualization firm VMware jointly published warnings that a sophisticated hacker group has been installing backdoors in VMware’s virtualization software on multiple targets’ networks as part of an apparent espionage campaign. By planting their own code in victims’ so-called hypervisors—VMware software that runs on a physical computer to manage all the virtual machines it hosts—the hackers were able to invisibly watch and run commands on the computers those hypervisors oversee. And because the malicious code targets the hypervisor on the physical machine rather than the victim’s virtual machines, the hackers’ trick multiplies their access and evades nearly all traditional security measures designed to monitor those target machines for signs of foul play.</p>
<p>“The idea that you can compromise one machine and from there have the ability to control virtual machines en masse is huge,” says Mandiant consultant Alex Marvi. And even closely watching the processes of a target virtual machine, he says, an observer would in many cases see only “side effects” of the intrusion, given that the malware carrying out that spying had infected a part of the system entirely outside its operating system.</p>
<p>Mandiant discovered the hackers earlier this year and brought their techniques to VMware’s attention. Researchers say they’ve seen the group carry out their virtualization hacking—a technique historically dubbed hyperjacking in a reference to “hypervisor hijacking”—in fewer than 10 victims’ networks across North America and Asia.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/09/01/cyber-secyrity-news-september-2022/comment-page-9/#comment-1781901</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Sep 2022 08:22:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192023#comment-1781901</guid>
		<description><![CDATA[Dan Goodin / Ars Technica: 	
Microsoft says the Lazarus group is weaponizing open-source software like PuTTY, KiTTY, TightVNC, and Sumatra PDF Reader to compromise “numerous” organizations  —  PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording all targeted.
https://arstechnica.com/information-technology/2022/09/north-korean-threat-actors-are-weaponizing-all-kinds-of-open-source-apps/]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
Microsoft says the Lazarus group is weaponizing open-source software like PuTTY, KiTTY, TightVNC, and Sumatra PDF Reader to compromise “numerous” organizations  —  PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording all targeted.<br />
<a href="https://arstechnica.com/information-technology/2022/09/north-korean-threat-actors-are-weaponizing-all-kinds-of-open-source-apps/" rel="nofollow">https://arstechnica.com/information-technology/2022/09/north-korean-threat-actors-are-weaponizing-all-kinds-of-open-source-apps/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
