CyberNews 2-17-25

Cybersecurity News for Feb 17, 2025

Todays stories in audio form

Cybersecurity News Summary

Story 1: Hackers Exploit Microsoft Teams Meeting Invites for Phishing Attacks

Cybercriminals, identified as the Storm-2372 group, are conducting sophisticated phishing attacks by abusing Microsoft Teams meeting invites. Active since August 2024, these attackers impersonate officials from organizations like the U.S. Department of State and the European Parliament. They lure victims into authenticating through Microsoft’s Device Code workflow, enabling unauthorized access to Microsoft 365 accounts without requiring passwords or multi-factor authentication. This method leverages legitimate Microsoft infrastructure, making detection challenging.

Read more

Story 2: Russian Threat Actors Target Microsoft 365 Accounts via Device Code Authentication

Security researchers have uncovered multiple Russian threat actors conducting social engineering and spear-phishing campaigns aimed at compromising Microsoft 365 accounts. These groups exploit the Device Code Authentication feature, directing victims to legitimate Microsoft URLs and prompting them to enter device codes. Once authenticated, attackers gain unauthorized access to accounts, bypassing traditional security measures. The campaigns have proven highly effective, surpassing traditional phishing methods in success rates.

Read more

Story 3: Ransomware-as-a-Service Fuels Fourfold Increase in Attacks

The rise of Ransomware-as-a-Service (RaaS) platforms has led to a significant increase in ransomware attacks, with incidents quadrupling over the past year. These platforms enable even low-skilled attackers to launch sophisticated campaigns by providing ready-made ransomware tools. The growing sophistication, agility, and evasive nature of these attacks pose substantial challenges to cybersecurity defenses. Organizations are urged to adopt advanced security measures to combat this escalating threat.

Read more

Story 4: CISA Issues 20 Advisories on Industrial Control System Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has released twenty new advisories addressing critical vulnerabilities in Industrial Control Systems (ICS). The advisories cover products from vendors such as Siemens, ORing, mySCADA, and Mitsubishi Electric. Each advisory details specific vulnerabilities that could allow attackers to disrupt operations, gain unauthorized access, or execute malicious code. Organizations using these systems are strongly advised to apply recommended patches and mitigation strategies to secure their infrastructure.

Read more

Story 5: EarthKapre APT Employs Weaponized PDFs to Compromise Windows Systems

The advanced persistent threat group known as EarthKapre, also referred to as RedCurl, has been targeting private-sector organizations, especially in the legal sector. They employ phishing emails disguised as job applications containing malicious PDF attachments. These PDFs lead victims to download files that, once executed, initiate a multi-stage malware infection. The attack chain includes sophisticated techniques like DLL side-loading and multi-stage encryption, aiming to exfiltrate sensitive data and conduct corporate espionage.

Read more

Story 6: XELERA Ransomware Targets Job Seekers with Malicious Word Documents

A new ransomware campaign dubbed “XELERA” is specifically targeting job seekers by distributing malicious Word documents disguised as job offers from reputable organizations. Upon opening these documents, an infection chain is triggered, leading to the deployment of ransomware that encrypts the victim’s data. The attackers demand a ransom in cryptocurrency for data recovery. This campaign underscores the importance of vigilance and caution when handling unsolicited job offers and attachments.

Read more

Story 7: ‘whoAMI’ Attack Exploits AWS AMI Name Confusion for Remote Code Execution

Cybersecurity researchers have identified a novel attack, termed “whoAMI,” that exploits name confusion in Amazon Web Services (AWS) Amazon Machine Images (AMIs). Attackers publish malicious AMIs with names matching legitimate ones. If developers do not specify the owner when searching for AMIs, they might inadvertently use the malicious image. This can grant attackers remote code execution within the victim’s AWS environment. AWS has addressed this issue, and users are advised to specify image owners explicitly to prevent such attacks.

Read more




Enjoy Reading This Article?

Here are some more articles you might like to read next:

  • DJBSEC's CyberNews 2025-07-11
  • DJBSEC's CyberNews 2025-07-10
  • DJBSEC's CyberNews 2025-07-09
  • DJBSEC's CyberNews 2025-07-08
  • DJBSEC's CyberNews 2025-07-07