menu
techminis

A naukri.com initiative

google-web-stories
source image

Sentinelone

3d

read

40

img
dot

Image Credit: Sentinelone

The Good, the Bad and the Ugly in Cybersecurity – Week 24

  • Operation Secure conducted by Interpol across 26 countries led to the arrest of 32 suspects, seizure of 41 servers, and takedown of over 20,000 malicious IP addresses and domains.
  • Infostealer malware collects sensitive data for sale or further attacks; Lumma, RisePro, and MetaStealer families were targeted in Operation Secure.
  • Fog ransomware group uses uncommon tools like Syteca and GC2, linked to China's APT41, in a suspected cyberespionage attack.
  • Fog's toolset includes Adapt2x C2, Process Watchdog, and Impacket SMB for data exfiltration; the group blends legitimate software with open-source tools.
  • EchoLeak, a zero-click AI vulnerability in Microsoft 365 Copilot, allows data exfiltration without user interaction; the flaw has been patched by Microsoft.
  • EchoLeak exploits AI command injection with malicious prompts, tricking Copilot into leaking internal information via Microsoft Teams or SharePoint links.
  • The vulnerability in Copilot combines Outlook and SharePoint data without trust boundaries, highlighting risks in generative AI design.
  • EchoLeak's potential for stealthy data exfiltration or extortion poses significant threats in AI interactions, emphasizing the importance of proper isolation.

Read Full Article

like

2 Likes

For uninterrupted reading, download the app