The Register: Predator spyware updated withn dangerous new features, also now harder to track

Source URL: https://www.theregister.com/2024/09/09/predator_spyware_trump_crypto/
Source: The Register
Title: Predator spyware updated withn dangerous new features, also now harder to track

Feedly Summary: Plus: Trump family X accounts hijacked to promote crypto scam; Fog ransomware spreads; Hijacked PyPI packages; and more
Infosec in brief After activating its chameleon field and going to ground following press attention earlier this year, the dangerous Predator commercial spyware kit is back – with upgrades.…

AI Summary and Description: Yes

Summary: The text highlights recent cybersecurity threats, including the resurgence of the Predator spyware, vulnerabilities in widely-used software, and the evolution of various cyberattack techniques, particularly those affecting financial institutions and software supply chains. It emphasizes the importance of vigilance and best practices in combating these emerging threats, which is critical for professionals in the fields of AI, cloud, and infrastructure security.

Detailed Description:

The provided text outlines several significant developments in cybersecurity, emphasizing the evolving landscape of threats and vulnerabilities that professionals in the sector must navigate. Here are the key points:

– **Predator Spyware Resurgence**:
– The Predator spyware, known for its invasive capabilities, has reappeared with enhanced infrastructure.
– New operations have emerged in countries like the Democratic Republic of the Congo and Angola, underlining the resilience of the spyware despite sanctions against its developer, Intellexa.
– The updates to Predator have anonymized its operations, complicating efforts for cybersecurity professionals to monitor and track its activity.

– **Vulnerabilities in Software**:
– Kingsoft WPS Office has been identified with a critical vulnerability (CVE-2024-7262) that allows for arbitrary code execution, posing a severe risk to users.
– Regular updates are essential to mitigate such risks as noted by the classification of the vulnerability with a high CVSS score of 9.3.

– **Social Engineering and Cyber Scam**:
– Account hijacking incidents involving high-profile individuals, such as members of the Trump family, were used to propagate a cryptocurrency scam, indicating the susceptibility of public figures to social engineering attacks.

– **Fog Ransomware Targeting Financial Sector**:
– The emergence of “Lost in the Fog,” a new ransomware strain, indicates an aggressive targeting of the financial sector.
– The ransomware employs sophisticated techniques like pass-the-hash attacks to escalate privileges and infiltrate systems.

– **Software Supply Chain Risks**:
– A new type of attack known as “revival hijack” threatens the Python Package Index (PyPI), revealing vulnerabilities that could allow the malicious hijacking of over 22,000 packages.
– This practice highlights the need for tighter controls and monitoring within software supply chains.

– **Legal Aspects of Ethical Hacking**:
– There are ongoing legal challenges for cybersecurity researchers in Malta who acted ethically by reporting vulnerabilities. Their prosecution raises concerns about the legal environment for ethical hacking, contrasting with the protections offered in other jurisdictions.

This text underscores the multifaceted threats currently faced by organizations, raising awareness among security professionals regarding both the preventive measures and the legal implications surrounding cybersecurity efforts. The insights serve to prepare stakeholders for the pressing need for diligent security practices in an increasingly complex threat landscape.