News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.

See Also

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.79

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.79

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.77

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.77

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.77

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

Thousands of Misconfigured Building Access Systems Have Been Leaked Online Δ1.77

Misconfigured Access Management Systems (AMS) connected to the internet pose a significant security risk to organizations worldwide. Vulnerabilities in these systems could allow unauthorized access to physical resources, sensitive employee data, and potentially even compromise critical infrastructure. The lack of response from affected organizations raises concerns about their readiness to mitigate potential risks.

India's Angel One Says Assessing Impact After Security Breach Δ1.76

Indian stock broker Angel One has confirmed that some of its Amazon Web Services (AWS) resources were compromised, prompting the company to hire an external forensic partner to investigate the impact. The breach did not affect clients' securities, funds, and credentials, with all client accounts remaining secure. Angel One is taking proactive steps to secure its systems after being notified by a dark-web monitoring partner.

Amazon's AWS Forms New Group Focused on Agentic AI Δ1.75

Amazon Web Services (AWS) has established a new group dedicated to developing agentic artificial intelligence aimed at automating user tasks without requiring prompts. Led by executive Swami Sivasubramanian, this initiative is seen as a potential multi-billion dollar business opportunity for AWS, with the goal of enhancing innovation for customers. The formation of this group comes alongside other organizational changes within AWS to bolster its competitive edge in the AI market.

Google Cloud Unveils New AI Protection Security Tools, No Matter Which Model You Use Δ1.75

Google Cloud has launched its AI Protection security suite, designed to identify, assess, and protect AI assets from vulnerabilities across various platforms. This suite aims to enhance security for businesses as they navigate the complexities of AI adoption, providing a centralized view of AI-related risks and threat management capabilities. With features such as AI Inventory Discovery and Model Armor, Google Cloud is positioning itself as a leader in securing AI workloads against emerging threats.

Amazon's AWS Forms New Group Focused on Agentic AI Δ1.75

Amazon Web Services (AWS) has established a new group dedicated to agentic artificial intelligence, aiming to enhance automation for users and customers. Led by AWS executive Swami Sivasubramanian, the initiative is viewed as a potential multi-billion dollar venture for the company, with the goal of enabling AI systems to perform tasks without user prompts. This move reflects Amazon's commitment to innovation in AI technology, as highlighted by the upcoming release of an updated version of the Alexa voice service.

Amazon Unveils AI Scheme to Tackle Flood Risks in Spain's Aragon. Δ1.75

Amazon will use artificial intelligence to reduce flood risks in Spain's northeastern region of Aragon where it is building data centres. The tech giant's cloud computing unit AWS plans to spend 17.2 million euros ($17.9 million) on modernising infrastructure and using AI to optimise agricultural water use. Amazon aims to deploy an early warning system that combines real-time data collection with advanced sensor networks and AI-powered analysis.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.74

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.

Web DDoS Attacks See Major Surge as AI Allows More Powerful Attacks Δ1.74

Layer 7 Web DDoS attacks have surged by 550% in 2024, driven by the increasing accessibility of AI tools that enable even novice hackers to launch complex campaigns. Financial institutions and transportation services reported an almost 400% increase in DDoS attack volume, with the EMEA region bearing the brunt of these incidents. The evolving threat landscape necessitates more dynamic defense strategies as organizations struggle to differentiate between legitimate and malicious traffic.

Protecting Against Scams with Norton 360's Genie Scam Protection Δ1.73

Norton 360 has introduced a new feature called Genie Scam Protection that leverages AI to spot scams in text messages, online surfing, and emails. This feature aims to protect users from embarrassing losses of money and personal information when reading scam messages or browsing malicious websites. The Genie Scam Protection adds an extra layer of security to Norton 360's existing antivirus software products.

Aviaton Firms Hit by Devious New Polyglot Malware Δ1.73

Aviation firms in the United Arab Emirates (UAE) were recently targeted by a highly sophisticated business email compromise (BEC) attack looking to deploy advanced malware. The attackers used a compromised email account to share polyglot files with their victims, which deployed a hidden backdoor against aviation firms. Cybersecurity researchers Proofpoint observed that these attacks started in late 2024 and target organizations with a distinct interest in aviation and satellite communications.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.73

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Accidentally Texting with Scammers? Google's AI Is Here to Stop the Chat Cold Δ1.73

Google has introduced AI-powered features designed to enhance scam detection for both text messages and phone calls on Android devices. The new capabilities aim to identify suspicious conversations in real-time, providing users with warnings about potential scams while maintaining their privacy. As cybercriminals increasingly utilize AI to target victims, Google's proactive measures represent a significant advancement in user protection against sophisticated scams.

Norton 360 Genie Scam Protection Δ1.73

The new Genie Scam Protection feature leverages AI to spot scams that readers might think are real. This helps avoid embarrassing losses of money and personal information when reading text messages, enticing offers, and surfing the web. Norton has added this advanced technology to all its Norton 360 security software products, providing users with a safer online experience.

Microsoft Names Cybercriminals Who Created Explicit Deepfakes Δ1.73

Microsoft has identified and named four individuals allegedly responsible for creating and distributing explicit deepfakes using leaked API keys from multiple Microsoft customers. The group, dubbed the “Azure Abuse Enterprise”, is said to have developed malicious tools that allowed threat actors to bypass generative AI guardrails to generate harmful content. This discovery highlights the growing concern of cybercriminals exploiting AI-powered services for nefarious purposes.

Cyberattack Rocks Polish Space Agency's Email Systems Δ1.73

The Polish Space Agency (POLSA) has confirmed it suffered a cyberattack that compromised its email systems, forcing it to shut down its IT infrastructure. The attack appears to be an email compromise, with insiders suggesting that relevant authorities have been notified and the agency is analyzing the situation. POLSA's machines were disconnected from the internet as part of the incident.

Fake LinkedIn Emails Contain Malware, Warns Security Expert Δ1.72

LinkedIn's InMail notification emails have been spoofed by cybercriminals to distribute malware. The emails are laced with phishing tactics, including fake companies, images, and notifications from legitimate platforms. Researchers at Cofense Intelligence warn that the attackers are using a ConnectWise Remote Access Trojan (RAT) to gain unauthorized control over systems.

More Reports Claim 2024 Was the Worst Year for Ransomware Attacks Yet. Δ1.72

2024 has been marked as a record-breaking year for ransomware attacks, with a 65% increase in detected groups and 44 new malware variants contributing to almost a third of undisclosed attacks. The healthcare, government, and education sectors were disproportionately affected, while emerging groups like LockBit and RansomHub accounted for a significant number of incidents, highlighting the growing sophistication of cybercriminals. As organizations face escalating financial and reputational risks, the need for proactive cybersecurity measures has never been more urgent.

Amazon Invests Heavily in Indian Cloud Infrastructure Δ1.72

India is poised for significant growth in its cloud services market, with Amazon Web Services (AWS) investing heavily to support this expansion. The investment will enable AWS to deploy advanced technologies and create new job opportunities in Maharashtra's western region. As the country aims to promote local cloud data storage, major players like Amazon are expected to play a key role.

Breaking Into Code: Security Threat Impacts Customer Data at Zapier Δ1.72

Zapier has disclosed a security incident where an unauthorized user gained access to its code repositories due to a 2FA misconfiguration, potentially exposing customer data. The breach resulted from an "unauthorized user" accessing certain "certain Zapier code repositories" and may have accessed customer information that had been "inadvertently copied" to the repositories for debugging purposes. The incident has raised concerns about the security of cloud-based platforms.

Lee Enterprises Ransomware Attack Hits Freelance and Contractor Payments Δ1.72

The Lee Enterprises ransomware attack is affecting the company's ability to pay outside vendors, including freelancers and contractors, as a result of the cyberattack that began on February 3. The attack has resulted in widescale outages and ongoing disruption at dozens of newspapers across the United States, causing delays to print editions and impacting various aspects of the company's operations. Lee Enterprises has confirmed that hackers "encrypted critical applications," including those related to vendor payments.