<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news November 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 10 May 2026 18:53:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788257</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 08:45:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788257</guid>
		<description><![CDATA[Hackers Dump Australian Health Data Online, Declare &#039;Case Closed&#039;
https://www.securityweek.com/hackers-dump-australian-health-data-online-declare-case-closed

The hackers leaking stolen Australian health records to the dark web on Thursday appeared to end their extortion attempt by dumping a final batch of data online and declaring:&quot;Case closed.&quot;

In November the hackers demanded health insurer Medibank pay US$9.7 million to keep the records off the internet -- or one dollar for each of the company&#039;s impacted customers, which included Prime Minister Anthony Albanese.

Medibank refused to pay at the urging of the federal government, which at the height of the crisis considered making it illegal for hacked companies to hand over ransoms.

On Thursday morning the hackers said they had posted the last of the data online, deliberately coinciding with International Computer Security Day.

&quot;Happy Cyber Security Day,&quot; they wrote.

&quot;Added folder full. Case closed.&quot;]]></description>
		<content:encoded><![CDATA[<p>Hackers Dump Australian Health Data Online, Declare &#8216;Case Closed&#8217;<br />
<a href="https://www.securityweek.com/hackers-dump-australian-health-data-online-declare-case-closed" rel="nofollow">https://www.securityweek.com/hackers-dump-australian-health-data-online-declare-case-closed</a></p>
<p>The hackers leaking stolen Australian health records to the dark web on Thursday appeared to end their extortion attempt by dumping a final batch of data online and declaring:&#8221;Case closed.&#8221;</p>
<p>In November the hackers demanded health insurer Medibank pay US$9.7 million to keep the records off the internet &#8212; or one dollar for each of the company&#8217;s impacted customers, which included Prime Minister Anthony Albanese.</p>
<p>Medibank refused to pay at the urging of the federal government, which at the height of the crisis considered making it illegal for hacked companies to hand over ransoms.</p>
<p>On Thursday morning the hackers said they had posted the last of the data online, deliberately coinciding with International Computer Security Day.</p>
<p>&#8220;Happy Cyber Security Day,&#8221; they wrote.</p>
<p>&#8220;Added folder full. Case closed.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788253</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 08:41:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788253</guid>
		<description><![CDATA[Whos swimming in South Korean waters? Meet ScarCrufts Dolphin https://www.welivesecurity.com/2022/11/30/whos-swimming-south-korean-waters-meet-scarcrufts-dolphin/
ESET researchers have analyzed a previously unreported backdoor used by the ScarCruft APT group. The backdoor, which we named Dolphin, has a wide range of spying capabilities, including monitoring drives and portable devices and exfiltrating files of interest, keylogging and taking screenshots, and stealing credentials from browsers. Its functionality is reserved for selected targets, to which the backdoor is deployed after initial compromise using less advanced malware. In line with other ScarCruft tools, Dolphin abuses cloud storage services specifically Google Drive  for C&amp;C communication. During our investigation, we saw continued development of the backdoor and attempts by the malware authors to evade detection. A notable feature of earlier Dolphin versions we analyzed is the ability to modify the settings of victims signed-in Google and Gmail accounts to lower their security, most likely to maintain access to victims email inboxes.]]></description>
		<content:encoded><![CDATA[<p>Whos swimming in South Korean waters? Meet ScarCrufts Dolphin <a href="https://www.welivesecurity.com/2022/11/30/whos-swimming-south-korean-waters-meet-scarcrufts-dolphin/" rel="nofollow">https://www.welivesecurity.com/2022/11/30/whos-swimming-south-korean-waters-meet-scarcrufts-dolphin/</a><br />
ESET researchers have analyzed a previously unreported backdoor used by the ScarCruft APT group. The backdoor, which we named Dolphin, has a wide range of spying capabilities, including monitoring drives and portable devices and exfiltrating files of interest, keylogging and taking screenshots, and stealing credentials from browsers. Its functionality is reserved for selected targets, to which the backdoor is deployed after initial compromise using less advanced malware. In line with other ScarCruft tools, Dolphin abuses cloud storage services specifically Google Drive  for C&amp;C communication. During our investigation, we saw continued development of the backdoor and attempts by the malware authors to evade detection. A notable feature of earlier Dolphin versions we analyzed is the ability to modify the settings of victims signed-in Google and Gmail accounts to lower their security, most likely to maintain access to victims email inboxes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788248</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 08:38:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788248</guid>
		<description><![CDATA[Trigona ransomware spotted in increasing attacks worldwide https://www.bleepingcomputer.com/news/security/trigona-ransomware-spotted-in-increasing-attacks-worldwide/
A previously unnamed ransomware has rebranded under the name &#039;Trigona,&#039; launching a new Tor negotiation site where they accept Monero as ransom payments. Trigona has been active for some time, with samples seen at the beginning of the year. However, those samples utilized email for negotiations and were not branded under a specific name. As discovered by MalwareHunterTeam, starting in late October 2022, the ransomware operation launched a new Tor negotiation site where they officially named themselves &#039;Trigona.&#039;]]></description>
		<content:encoded><![CDATA[<p>Trigona ransomware spotted in increasing attacks worldwide <a href="https://www.bleepingcomputer.com/news/security/trigona-ransomware-spotted-in-increasing-attacks-worldwide/" rel="nofollow">https://www.bleepingcomputer.com/news/security/trigona-ransomware-spotted-in-increasing-attacks-worldwide/</a><br />
A previously unnamed ransomware has rebranded under the name &#8216;Trigona,&#8217; launching a new Tor negotiation site where they accept Monero as ransom payments. Trigona has been active for some time, with samples seen at the beginning of the year. However, those samples utilized email for negotiations and were not branded under a specific name. As discovered by MalwareHunterTeam, starting in late October 2022, the ransomware operation launched a new Tor negotiation site where they officially named themselves &#8216;Trigona.&#8217;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788247</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 08:37:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788247</guid>
		<description><![CDATA[Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection https://thehackernews.com/2022/11/researchers-find-way-malicious-npm.html
New findings from cybersecurity firm JFrog show that malware targeting the npm ecosystem can evade security checks by taking advantage of an &quot;unexpected behavior&quot; in the npm command line interface (CLI) tool.
npm CLI&#039;s install and audit commands have built-in capabilities to check a package and all of its dependencies for known vulnerabilities, effectively acting as a warning mechanism for developers by highlighting the flaws. But as JFrog established, the security advisories are not displayed when the packages follow certain version formats, creating a scenario where critical flaws could be introduced into their systems either directly or via the package&#039;s dependencies.]]></description>
		<content:encoded><![CDATA[<p>Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection <a href="https://thehackernews.com/2022/11/researchers-find-way-malicious-npm.html" rel="nofollow">https://thehackernews.com/2022/11/researchers-find-way-malicious-npm.html</a><br />
New findings from cybersecurity firm JFrog show that malware targeting the npm ecosystem can evade security checks by taking advantage of an &#8220;unexpected behavior&#8221; in the npm command line interface (CLI) tool.<br />
npm CLI&#8217;s install and audit commands have built-in capabilities to check a package and all of its dependencies for known vulnerabilities, effectively acting as a warning mechanism for developers by highlighting the flaws. But as JFrog established, the security advisories are not displayed when the packages follow certain version formats, creating a scenario where critical flaws could be introduced into their systems either directly or via the package&#8217;s dependencies.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788240</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 08:34:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788240</guid>
		<description><![CDATA[Submarine cable damage brings internet pain to Asia, Africa https://www.theregister.com/2022/11/30/seamewe5_cut_outage_apac_africa/
Internet users across Asia appear to be suffering from degraded performance after a major submarine cable was severed. Pakistan&#039;s telecoms authority flagged the cable cut. Internet-watching outfit Netblocks also spotted something amiss in Pakistan, other Asian nations, and parts of Africa. SEA-ME-WE-5 runs from France to Singapore with landings in Turkey, Saudi Arabia, Yemen, Djibouti, Oman, United Arab Emirates, Pakistan, Sri Lanka, Bangladesh, Myanmar, Malaysia, and Indonesia along the way. The cable is 20,000km in length and can carry 12.2Tb per fibre pair  of which there are four from Egypt to France and three for the rest of the span.]]></description>
		<content:encoded><![CDATA[<p>Submarine cable damage brings internet pain to Asia, Africa <a href="https://www.theregister.com/2022/11/30/seamewe5_cut_outage_apac_africa/" rel="nofollow">https://www.theregister.com/2022/11/30/seamewe5_cut_outage_apac_africa/</a><br />
Internet users across Asia appear to be suffering from degraded performance after a major submarine cable was severed. Pakistan&#8217;s telecoms authority flagged the cable cut. Internet-watching outfit Netblocks also spotted something amiss in Pakistan, other Asian nations, and parts of Africa. SEA-ME-WE-5 runs from France to Singapore with landings in Turkey, Saudi Arabia, Yemen, Djibouti, Oman, United Arab Emirates, Pakistan, Sri Lanka, Bangladesh, Myanmar, Malaysia, and Indonesia along the way. The cable is 20,000km in length and can carry 12.2Tb per fibre pair  of which there are four from Egypt to France and three for the rest of the span.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788231</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 07:31:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788231</guid>
		<description><![CDATA[https://techcrunch.com/2022/11/30/lastpass-goto-breached-customer-information/]]></description>
		<content:encoded><![CDATA[<p><a href="https://techcrunch.com/2022/11/30/lastpass-goto-breached-customer-information/" rel="nofollow">https://techcrunch.com/2022/11/30/lastpass-goto-breached-customer-information/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788230</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 07:26:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788230</guid>
		<description><![CDATA[Researchers find bugs allowing access, remote control of cars https://therecord.media/researchers-find-bugs-allowing-access-remote-control-of-cars/
Several major car brands have addressed vulnerabilities that would have allowed hackers to remotely control the locks, engine, horn, headlights, and trunk of certain cars made after 2012, according to a security researcher. Yuga Labs staff security engineer Sam Curry published two threads on Twitter detailing his research into the mobile apps for several car brands that give customers the ability to remotely start, stop, lock and unlock their vehicles. Curry and several other researchers started with Hyundai and Genesis, finding that much of the verification process for getting access to a vehicle relied on registered email addresses. They found a way to bypass the email verification feature and gain full control.]]></description>
		<content:encoded><![CDATA[<p>Researchers find bugs allowing access, remote control of cars <a href="https://therecord.media/researchers-find-bugs-allowing-access-remote-control-of-cars/" rel="nofollow">https://therecord.media/researchers-find-bugs-allowing-access-remote-control-of-cars/</a><br />
Several major car brands have addressed vulnerabilities that would have allowed hackers to remotely control the locks, engine, horn, headlights, and trunk of certain cars made after 2012, according to a security researcher. Yuga Labs staff security engineer Sam Curry published two threads on Twitter detailing his research into the mobile apps for several car brands that give customers the ability to remotely start, stop, lock and unlock their vehicles. Curry and several other researchers started with Hyundai and Genesis, finding that much of the verification process for getting access to a vehicle relied on registered email addresses. They found a way to bypass the email verification feature and gain full control.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788167</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Nov 2022 13:57:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788167</guid>
		<description><![CDATA[Chrome 108 Patches High-Severity Memory Safety Bugs
https://www.securityweek.com/chrome-108-patches-high-severity-memory-safety-bugs

Google this week announced the release of Chrome 108 in the stable channel with patches for 28 vulnerabilities, including 22 reported by external researchers.

Of the externally reported security defects, eight are high-severity issues and 14 are medium-severity flaws.

The most severe of these bugs, based on the paid bug bounty reward, is CVE-2022-4174, a type confusion issue in the web browser’s V8 JavaScript engine.

Google credited security researcher Zhenghang Xiao for reporting the vulnerability and says it paid a $15,000 reward for it.]]></description>
		<content:encoded><![CDATA[<p>Chrome 108 Patches High-Severity Memory Safety Bugs<br />
<a href="https://www.securityweek.com/chrome-108-patches-high-severity-memory-safety-bugs" rel="nofollow">https://www.securityweek.com/chrome-108-patches-high-severity-memory-safety-bugs</a></p>
<p>Google this week announced the release of Chrome 108 in the stable channel with patches for 28 vulnerabilities, including 22 reported by external researchers.</p>
<p>Of the externally reported security defects, eight are high-severity issues and 14 are medium-severity flaws.</p>
<p>The most severe of these bugs, based on the paid bug bounty reward, is CVE-2022-4174, a type confusion issue in the web browser’s V8 JavaScript engine.</p>
<p>Google credited security researcher Zhenghang Xiao for reporting the vulnerability and says it paid a $15,000 reward for it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788166</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Nov 2022 13:56:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788166</guid>
		<description><![CDATA[Delta Electronics Patches Serious Flaws in Industrial Networking Devices
https://www.securityweek.com/delta-electronics-patches-serious-flaws-industrial-networking-devices

Taiwan-based Delta Electronics has patched potentially serious vulnerabilities in two of its industrial networking products.

The flaws were identified by researchers at CyberDanube, a new industrial cybersecurity company based in Austria, in Delta’s DX-2100-L1-CN 3G cloud router and the DVW-W02W2-E2 industrial wireless access point.

Delta Electronics router vulnerability The researchers conducted their analysis on so-called digital twins, which involve virtualization techniques, rather than by looking at the actual devices.

In the 3G router, they discovered an authenticated command injection issue and a stored cross-site scripting (XSS) flaw. The command injection vulnerability can allow an attacker who has credentials for the web service to execute system commands on the OS with root privileges.]]></description>
		<content:encoded><![CDATA[<p>Delta Electronics Patches Serious Flaws in Industrial Networking Devices<br />
<a href="https://www.securityweek.com/delta-electronics-patches-serious-flaws-industrial-networking-devices" rel="nofollow">https://www.securityweek.com/delta-electronics-patches-serious-flaws-industrial-networking-devices</a></p>
<p>Taiwan-based Delta Electronics has patched potentially serious vulnerabilities in two of its industrial networking products.</p>
<p>The flaws were identified by researchers at CyberDanube, a new industrial cybersecurity company based in Austria, in Delta’s DX-2100-L1-CN 3G cloud router and the DVW-W02W2-E2 industrial wireless access point.</p>
<p>Delta Electronics router vulnerability The researchers conducted their analysis on so-called digital twins, which involve virtualization techniques, rather than by looking at the actual devices.</p>
<p>In the 3G router, they discovered an authenticated command injection issue and a stored cross-site scripting (XSS) flaw. The command injection vulnerability can allow an attacker who has credentials for the web service to execute system commands on the OS with root privileges.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/11/01/cyber-security-news-november-2022/comment-page-7/#comment-1788165</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Nov 2022 13:55:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192540#comment-1788165</guid>
		<description><![CDATA[Developers Warned of Critical Remote Code Execution Flaw in Quarkus Java Framework
https://www.securityweek.com/developers-warned-critical-remote-code-execution-flaw-quarkus-java-framework

Developers have been warned that the popular Quarkus framework is affected by a critical vulnerability that could lead to remote code execution.

Available since 2019, Quarkus is an open source Kubernetes-native Java framework designed for GraalVM and HotSpot virtual machines.

Tracked as CVE-2022-4116 (CVSS score of 9.8), the security defect was identified in the Dev UI Config Editor and can be exploited via drive-by localhost attacks.

“Exploiting the vulnerability isn’t difficult and can be done by a malicious actor without any privileges,” Contrast Security researcher Joseph Beeton, who discovered the bug, explains.

Contrast discovers zero-day flaw in popular Quarkus Java framework
https://www.contrastsecurity.com/security-influencers/localhost-attack-against-quarkus-developers-contrast-security]]></description>
		<content:encoded><![CDATA[<p>Developers Warned of Critical Remote Code Execution Flaw in Quarkus Java Framework<br />
<a href="https://www.securityweek.com/developers-warned-critical-remote-code-execution-flaw-quarkus-java-framework" rel="nofollow">https://www.securityweek.com/developers-warned-critical-remote-code-execution-flaw-quarkus-java-framework</a></p>
<p>Developers have been warned that the popular Quarkus framework is affected by a critical vulnerability that could lead to remote code execution.</p>
<p>Available since 2019, Quarkus is an open source Kubernetes-native Java framework designed for GraalVM and HotSpot virtual machines.</p>
<p>Tracked as CVE-2022-4116 (CVSS score of 9.8), the security defect was identified in the Dev UI Config Editor and can be exploited via drive-by localhost attacks.</p>
<p>“Exploiting the vulnerability isn’t difficult and can be done by a malicious actor without any privileges,” Contrast Security researcher Joseph Beeton, who discovered the bug, explains.</p>
<p>Contrast discovers zero-day flaw in popular Quarkus Java framework<br />
<a href="https://www.contrastsecurity.com/security-influencers/localhost-attack-against-quarkus-developers-contrast-security" rel="nofollow">https://www.contrastsecurity.com/security-influencers/localhost-attack-against-quarkus-developers-contrast-security</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
