<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news April 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 08:40:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-8/#comment-1802252</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 05 May 2023 07:01:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802252</guid>
		<description><![CDATA[Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware Tactics https://thehackernews.com/2023/05/chinese-hacker-group-earth-longzhi.html
&quot;A Chinese state-sponsored hacking outfit has resurfaced with a new campaign targeting government, healthcare, technology, and manufacturing entities based in Taiwan, Thailand, the Philippines, and Fiji after more than six months of no activity.&quot;]]></description>
		<content:encoded><![CDATA[<p>Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware Tactics <a href="https://thehackernews.com/2023/05/chinese-hacker-group-earth-longzhi.html" rel="nofollow">https://thehackernews.com/2023/05/chinese-hacker-group-earth-longzhi.html</a><br />
&#8220;A Chinese state-sponsored hacking outfit has resurfaced with a new campaign targeting government, healthcare, technology, and manufacturing entities based in Taiwan, Thailand, the Philippines, and Fiji after more than six months of no activity.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-8/#comment-1802048</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 12:09:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802048</guid>
		<description><![CDATA[Rapture, a Ransomware Family With Similarities to Paradise https://www.trendmicro.com/en_us/research/23/d/rapture-a-ransomware-family-with-similarities-to-paradise.html
In March and April 2023, we observed a type of ransomware targeting its victims via a minimalistic approach with tools that leave only a minimal footprint behind. Our findings revealed many of the preparations made by the perpetrators and how quickly they managed to carry out the ransomware attack]]></description>
		<content:encoded><![CDATA[<p>Rapture, a Ransomware Family With Similarities to Paradise <a href="https://www.trendmicro.com/en_us/research/23/d/rapture-a-ransomware-family-with-similarities-to-paradise.html" rel="nofollow">https://www.trendmicro.com/en_us/research/23/d/rapture-a-ransomware-family-with-similarities-to-paradise.html</a><br />
In March and April 2023, we observed a type of ransomware targeting its victims via a minimalistic approach with tools that leave only a minimal footprint behind. Our findings revealed many of the preparations made by the perpetrators and how quickly they managed to carry out the ransomware attack</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-7/#comment-1802047</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 12:09:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802047</guid>
		<description><![CDATA[The Week in Ransomware - April 28th 2023 - Clop at it again https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2023-clop-at-it-again/
It has been a very quiet week for ransomware news, with only a few reports released and not much info about cyberattacks. However, an item of interest was Microsoft linking the recent PaperCut server attacks on the Clop and LockBit ransomware operation. Clop claims to have started exploiting PaperCut servers on April 13th, the same day Microsoft began seeing active exploitation of the vulnerabilities]]></description>
		<content:encoded><![CDATA[<p>The Week in Ransomware &#8211; April 28th 2023 &#8211; Clop at it again <a href="https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2023-clop-at-it-again/" rel="nofollow">https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2023-clop-at-it-again/</a><br />
It has been a very quiet week for ransomware news, with only a few reports released and not much info about cyberattacks. However, an item of interest was Microsoft linking the recent PaperCut server attacks on the Clop and LockBit ransomware operation. Clop claims to have started exploiting PaperCut servers on April 13th, the same day Microsoft began seeing active exploitation of the vulnerabilities</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-7/#comment-1802046</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 12:09:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802046</guid>
		<description><![CDATA[Mac malware-for-hire steals passwords and cryptocoins, sends crime logs via Telegram https://nakedsecurity.sophos.com/2023/04/30/mac-malware-for-hire-steals-passwords-and-cryptocoins-sends-crime-logs-via-telegram/
Researchers at dark web monitoring company Cyble recently wrote about a data-stealing-as-a-service toolkit that they found being advertised in an underground Telegram channel. One somewhat unusual aspect of this service (and in this context, we dont mean that word in any sort of positive sense!) is that it was specifically built to help would-be cyber criminals target Mac users. The malware peddlers&#039; focus on Apple fans was clearly reflected in the name they gave their &quot;product&quot;:
Atomic macOS Stealer, or AMOS for short]]></description>
		<content:encoded><![CDATA[<p>Mac malware-for-hire steals passwords and cryptocoins, sends crime logs via Telegram <a href="https://nakedsecurity.sophos.com/2023/04/30/mac-malware-for-hire-steals-passwords-and-cryptocoins-sends-crime-logs-via-telegram/" rel="nofollow">https://nakedsecurity.sophos.com/2023/04/30/mac-malware-for-hire-steals-passwords-and-cryptocoins-sends-crime-logs-via-telegram/</a><br />
Researchers at dark web monitoring company Cyble recently wrote about a data-stealing-as-a-service toolkit that they found being advertised in an underground Telegram channel. One somewhat unusual aspect of this service (and in this context, we dont mean that word in any sort of positive sense!) is that it was specifically built to help would-be cyber criminals target Mac users. The malware peddlers&#8217; focus on Apple fans was clearly reflected in the name they gave their &#8220;product&#8221;:<br />
Atomic macOS Stealer, or AMOS for short</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-7/#comment-1802040</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 12:04:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802040</guid>
		<description><![CDATA[APT groups working together to expand operations, target more industries https://www.scmagazine.com/news/threat-intelligence/apt-groups-working-together-to-expand-operations-target-more-industries
&quot;Long-established threat groups appear to be cozying up to each other as a means of expanding their operations in the face of fresh competition from new APT players. [Kaspersky] says APT actors, old and new, have been busy updating their toolsets and expanding their attack vectors, both in terms of geographical location and target industries.&quot; Source:
https://securelist.com/apt-trends-report-q1-2023/109581/]]></description>
		<content:encoded><![CDATA[<p>APT groups working together to expand operations, target more industries <a href="https://www.scmagazine.com/news/threat-intelligence/apt-groups-working-together-to-expand-operations-target-more-industries" rel="nofollow">https://www.scmagazine.com/news/threat-intelligence/apt-groups-working-together-to-expand-operations-target-more-industries</a><br />
&#8220;Long-established threat groups appear to be cozying up to each other as a means of expanding their operations in the face of fresh competition from new APT players. [Kaspersky] says APT actors, old and new, have been busy updating their toolsets and expanding their attack vectors, both in terms of geographical location and target industries.&#8221; Source:<br />
<a href="https://securelist.com/apt-trends-report-q1-2023/109581/" rel="nofollow">https://securelist.com/apt-trends-report-q1-2023/109581/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-7/#comment-1802039</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 12:04:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802039</guid>
		<description><![CDATA[The DOJ Detected the SolarWinds Hack 6 Months Earlier Than First Disclosed https://www.wired.com/story/solarwinds-hack-public-disclosure/
&quot;In May 2020, the US Department of Justice noticed Russian hackers in its network but did not realize the significance of what it had found for six months.&quot;]]></description>
		<content:encoded><![CDATA[<p>The DOJ Detected the SolarWinds Hack 6 Months Earlier Than First Disclosed <a href="https://www.wired.com/story/solarwinds-hack-public-disclosure/" rel="nofollow">https://www.wired.com/story/solarwinds-hack-public-disclosure/</a><br />
&#8220;In May 2020, the US Department of Justice noticed Russian hackers in its network but did not realize the significance of what it had found for six months.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-7/#comment-1802038</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 12:00:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802038</guid>
		<description><![CDATA[Major UK banks including Lloyds, Halifax, TSB hit by outages https://www.bleepingcomputer.com/news/technology/major-uk-banks-including-lloyds-halifax-tsb-hit-by-outages/
&quot;Websites and mobile apps of Lloyds Bank, Halifax, TSB Bank, and Bank of Scotland have experienced web and mobile app outages today leaving customers unable to access their account balances and information.
Lloyds Banking Group is the parent company behind household names including Lloyds Bank, Halifax, Bank of Scotland, and has former links to TSB. As such, it wouldn&#039;t be surprising if the information systems of these banks relied on much of the same server infrastructure, as evident from visual and operational similarities between these websites.&quot;]]></description>
		<content:encoded><![CDATA[<p>Major UK banks including Lloyds, Halifax, TSB hit by outages <a href="https://www.bleepingcomputer.com/news/technology/major-uk-banks-including-lloyds-halifax-tsb-hit-by-outages/" rel="nofollow">https://www.bleepingcomputer.com/news/technology/major-uk-banks-including-lloyds-halifax-tsb-hit-by-outages/</a><br />
&#8220;Websites and mobile apps of Lloyds Bank, Halifax, TSB Bank, and Bank of Scotland have experienced web and mobile app outages today leaving customers unable to access their account balances and information.<br />
Lloyds Banking Group is the parent company behind household names including Lloyds Bank, Halifax, Bank of Scotland, and has former links to TSB. As such, it wouldn&#8217;t be surprising if the information systems of these banks relied on much of the same server infrastructure, as evident from visual and operational similarities between these websites.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-7/#comment-1802033</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 11:53:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802033</guid>
		<description><![CDATA[Many Public Salesforce Sites are Leaking Private Data https://krebsonsecurity.com/2023/04/many-public-salesforce-sites-are-leaking-private-data/
A shocking number of organizations  including banks and healthcare providers  are leaking private and sensitive information from their public Salesforce Community websites, KrebsOnSecurity has learned. The data exposures all stem from a misconfiguration in Salesforce Community that allows an unauthenticated user to access records that should only be available after logging in]]></description>
		<content:encoded><![CDATA[<p>Many Public Salesforce Sites are Leaking Private Data <a href="https://krebsonsecurity.com/2023/04/many-public-salesforce-sites-are-leaking-private-data/" rel="nofollow">https://krebsonsecurity.com/2023/04/many-public-salesforce-sites-are-leaking-private-data/</a><br />
A shocking number of organizations  including banks and healthcare providers  are leaking private and sensitive information from their public Salesforce Community websites, KrebsOnSecurity has learned. The data exposures all stem from a misconfiguration in Salesforce Community that allows an unauthenticated user to access records that should only be available after logging in</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-7/#comment-1802032</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 11:52:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802032</guid>
		<description><![CDATA[Google wins court order to force ISPs to filter botnet traffic https://nakedsecurity.sophos.com/2023/04/28/google-wins-court-order-to-force-isps-to-filter-botnet-traffic/
A US court has recently unsealed a restraining order against a gang of alleged cybercrooks operating outside the country, based on a formal legal complaint from internet giant Google. Google said it obtained a temporary court order in the U.S. to disrupt the distribution of a Windows-based information-stealing malware called CryptBot and &quot;decelerate&quot; its growth]]></description>
		<content:encoded><![CDATA[<p>Google wins court order to force ISPs to filter botnet traffic <a href="https://nakedsecurity.sophos.com/2023/04/28/google-wins-court-order-to-force-isps-to-filter-botnet-traffic/" rel="nofollow">https://nakedsecurity.sophos.com/2023/04/28/google-wins-court-order-to-force-isps-to-filter-botnet-traffic/</a><br />
A US court has recently unsealed a restraining order against a gang of alleged cybercrooks operating outside the country, based on a formal legal complaint from internet giant Google. Google said it obtained a temporary court order in the U.S. to disrupt the distribution of a Windows-based information-stealing malware called CryptBot and &#8220;decelerate&#8221; its growth</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/04/01/cyber-security-news-april-2023/comment-page-7/#comment-1802031</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 May 2023 11:52:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193610#comment-1802031</guid>
		<description><![CDATA[Magecart threat actor rolls out convincing modal forms https://www.malwarebytes.com/blog/threat-intelligence/2023/04/kritec-art
To ensnare new victims, criminals will often devise schemes that attempt to look as realistic as possible. Having said that, it is not every day that we see the fraudulent copy exceed the original piece.
While following up on an ongoing Magecart credit card skimmer campaign, we were almost fooled by a payment form that looked so well done we thought it was real. The threat actor used original logos from the compromised store and customized a web element known as a modal to perfectly hijack the checkout page. While the technique to insert frames or layers is not new, the remarkable thing here is that the skimmer looks more authentic than the original payment page. We were able to observe several more compromised sites with the same pattern of using a custom-made and fraudulent modal]]></description>
		<content:encoded><![CDATA[<p>Magecart threat actor rolls out convincing modal forms <a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/04/kritec-art" rel="nofollow">https://www.malwarebytes.com/blog/threat-intelligence/2023/04/kritec-art</a><br />
To ensnare new victims, criminals will often devise schemes that attempt to look as realistic as possible. Having said that, it is not every day that we see the fraudulent copy exceed the original piece.<br />
While following up on an ongoing Magecart credit card skimmer campaign, we were almost fooled by a payment form that looked so well done we thought it was real. The threat actor used original logos from the compromised store and customized a web element known as a modal to perfectly hijack the checkout page. While the technique to insert frames or layers is not new, the remarkable thing here is that the skimmer looks more authentic than the original payment page. We were able to observe several more compromised sites with the same pattern of using a custom-made and fraudulent modal</p>
]]></content:encoded>
	</item>
</channel>
</rss>
