The Breach News

“Noisy Bear Campaign Disguised as Phishing Test Revealed Targeting Kazakhstan’s Energy Sector”

Sep 06, 2025 – Malware / Cyber Espionage

A suspected Russian threat actor is behind a series of attacks aimed at Kazakhstan’s energy sector, identified as Operation BarrelFire by Seqrite Labs, which tracks the group as Noisy Bear. Active since at least April 2025, the campaign specifically targets employees of KazMunaiGas (KMG). The attackers delivered a counterfeit document purporting to be from the KMG IT department, mimicking legitimate internal communications and addressing topics like policy updates, certification processes, and salary adjustments. According to security researcher Subhajeet Singha, the infection process starts with a phishing email containing a ZIP file that includes a Windows shortcut (LNK) downloader, a decoy document related to KazMunaiGas, and a README.txt file with instructions in both Russian and Kazakh to execute a program named “KazMunayGaz_Viewer.”

Noisy Bear Campaign: Phishing Test Unveiled in Kazakhstan’s Energy Sector On September 6, 2025, cybersecurity experts revealed that a series of attacks targeting Kazakhstan’s energy sector has been linked to a threat actor possibly originating from Russia. This campaign, dubbed Operation BarrelFire, is attributed to a new group identified by…

Read More

“Noisy Bear Campaign Disguised as Phishing Test Revealed Targeting Kazakhstan’s Energy Sector”

Sep 06, 2025 – Malware / Cyber Espionage

A suspected Russian threat actor is behind a series of attacks aimed at Kazakhstan’s energy sector, identified as Operation BarrelFire by Seqrite Labs, which tracks the group as Noisy Bear. Active since at least April 2025, the campaign specifically targets employees of KazMunaiGas (KMG). The attackers delivered a counterfeit document purporting to be from the KMG IT department, mimicking legitimate internal communications and addressing topics like policy updates, certification processes, and salary adjustments. According to security researcher Subhajeet Singha, the infection process starts with a phishing email containing a ZIP file that includes a Windows shortcut (LNK) downloader, a decoy document related to KazMunaiGas, and a README.txt file with instructions in both Russian and Kazakh to execute a program named “KazMunayGaz_Viewer.”

New Windows Vulnerability Exposes Devices to Rootkit Installation by Hackers

New Microsoft Windows Vulnerability Could Enable Rootkit Installation by Hackers September 23, 2021 Security researchers have identified a critical vulnerability in the Microsoft Windows Platform Binary Table (WPBT) that poses risks to all devices operating on Windows since the release of Windows 8. This unpatched flaw could allow attackers to…

Read More

New Windows Vulnerability Exposes Devices to Rootkit Installation by Hackers

New Phishing Attack Targets Poste Italiane’s Postal and Financial Services Again

Date: Oct 21, 2013

This phishing attack exemplifies a sophisticated blend of technology and psychology. Individuals are often deceived into clicking on unsecured website links. This week, Sophos experts uncovered a noteworthy phishing scheme aimed at Poste Italiane, the Italian postal service. This incident stood out due to its use of an old social engineering tactic. Poste Italiane encompasses postal, financial, and payment services and has been identified as a leading target in a recent F-Secure Threat report. The frequency of attacks against Poste Italiane is striking, with the primary goal of tricking customers into unknowingly submitting their credentials to fraudulent login sites. In this latest attack, criminals deployed a common tactic by sending an email with an enticing HTML attachment that prompts recipients to open it: “To activate the ‘Security Web Postepay,’ you need to: – Download…”

Phishing Attack Targets Poste Italiane, Exposing Vulnerabilities in Online Security October 21, 2013 In a concerning development for the Italian postal and financial services sector, a sophisticated phishing attack targeting Poste Italiane has come to light. Security experts at Sophos detected this breach, which showcases a notable revival of established…

Read More

New Phishing Attack Targets Poste Italiane’s Postal and Financial Services Again

Date: Oct 21, 2013

This phishing attack exemplifies a sophisticated blend of technology and psychology. Individuals are often deceived into clicking on unsecured website links. This week, Sophos experts uncovered a noteworthy phishing scheme aimed at Poste Italiane, the Italian postal service. This incident stood out due to its use of an old social engineering tactic. Poste Italiane encompasses postal, financial, and payment services and has been identified as a leading target in a recent F-Secure Threat report. The frequency of attacks against Poste Italiane is striking, with the primary goal of tricking customers into unknowingly submitting their credentials to fraudulent login sites. In this latest attack, criminals deployed a common tactic by sending an email with an enticing HTML attachment that prompts recipients to open it: “To activate the ‘Security Web Postepay,’ you need to: – Download…”

Critical Security Updates for Apple iOS and macOS Released to Address Actively Exploited Vulnerabilities

September 24, 2021

On Thursday, Apple launched important security updates to tackle multiple vulnerabilities in older iOS and macOS versions, which have been exploited in real-world attacks. This release also expands on previous patches for a security flaw targeted by NSO Group’s Pegasus spyware aimed at iPhone users.

Notably, CVE-2021-30869, a type confusion vulnerability within Apple’s XNU kernel, could allow malicious apps to execute arbitrary code with elevated privileges. Apple has improved state handling to mitigate this issue. Google’s Threat Analysis Group, which reported the vulnerability, noted it was being exploited alongside a remote code execution vulnerability affecting WebKit.

Additionally, Apple addressed two more vulnerabilities, CVE-2021-30858 and CVE-2021-30860, which were patched earlier this month.

Apple Issues Critical Updates to Address Zero-Day Vulnerabilities in iOS and macOS September 24, 2021 Apple has issued important security updates for older versions of iOS and macOS in response to vulnerabilities that are currently being actively exploited. The company identified these issues during its ongoing security monitoring and reported…

Read More

Critical Security Updates for Apple iOS and macOS Released to Address Actively Exploited Vulnerabilities

September 24, 2021

On Thursday, Apple launched important security updates to tackle multiple vulnerabilities in older iOS and macOS versions, which have been exploited in real-world attacks. This release also expands on previous patches for a security flaw targeted by NSO Group’s Pegasus spyware aimed at iPhone users.

Notably, CVE-2021-30869, a type confusion vulnerability within Apple’s XNU kernel, could allow malicious apps to execute arbitrary code with elevated privileges. Apple has improved state handling to mitigate this issue. Google’s Threat Analysis Group, which reported the vulnerability, noted it was being exploited alongside a remote code execution vulnerability affecting WebKit.

Additionally, Apple addressed two more vulnerabilities, CVE-2021-30858 and CVE-2021-30860, which were patched earlier this month.

South Korea Faces Android Trojan Threats, Malware in Gaming Apps, and DDoS Assaults

Oct 25, 2013

Last Tuesday, the National Police Agency of South Korea issued a warning about the proliferation of malware-infected video games available in the South Korean market, designed to facilitate cyberattacks against the country. This malware collects users’ location data and IP addresses, reportedly transmitting the information to servers based in North Korea.

Today, AhnLab, South Korea’s leading antivirus company, confirmed that they have detected distributed denial-of-service (DDoS) attacks targeting the websites of local businesses. The report indicates that approximately 16 websites belonging to 13 companies, including Daum, MSN, and the JoongAng Ilbo newspaper, have been affected. AhnLab noted that around 10,000 computers were compromised, primarily due to the failure to install or update antivirus programs since the last cyberattack in July. The attack was first identified around 4:00 p.m. on Thursday, impacting roughly 10,000 systems.

South Korea Faces Cyber Threats: Android Trojan, Malware in Gaming Apps, and DDoS Attacks On October 25, 2013, South Korea’s National Police Agency issued a stark warning regarding an alarming emergence of malware-laden video games infiltrating local markets. These applications are believed to serve as conduits for orchestrated cyber attacks…

Read More

South Korea Faces Android Trojan Threats, Malware in Gaming Apps, and DDoS Assaults

Oct 25, 2013

Last Tuesday, the National Police Agency of South Korea issued a warning about the proliferation of malware-infected video games available in the South Korean market, designed to facilitate cyberattacks against the country. This malware collects users’ location data and IP addresses, reportedly transmitting the information to servers based in North Korea.

Today, AhnLab, South Korea’s leading antivirus company, confirmed that they have detected distributed denial-of-service (DDoS) attacks targeting the websites of local businesses. The report indicates that approximately 16 websites belonging to 13 companies, including Daum, MSN, and the JoongAng Ilbo newspaper, have been affected. AhnLab noted that around 10,000 computers were compromised, primarily due to the failure to install or update antivirus programs since the last cyberattack in July. The attack was first identified around 4:00 p.m. on Thursday, impacting roughly 10,000 systems.

⚡ Weekly Update: Drift Breach Unveiled, Active Zero-Days, Patch Alerts, Evolving Threats & More

 
Sep 08, 2025
Cybersecurity / Hacking News

Cybersecurity constantly evolves, with each week bringing fresh threats, vulnerabilities, and crucial lessons for defenders. For security and IT teams, the challenge lies in discerning which risks demand immediate attention. This digest aims to provide a straightforward briefing to help prioritize what matters most.

This week, the notable story is the Salesloft–Drift breach, where attackers compromised OAuth tokens, gaining access to Salesforce data from major tech companies. This incident underscores how fragile integrations can become critical vulnerabilities in enterprise defenses.

Additionally, we’ll discuss several high-risk CVEs currently under active exploitation, the latest strategies of advanced threat actors, and new insights on streamlining security workflows for greater efficiency. Each section delivers essential information, ensuring you stay informed and prepared without being overwhelmed.

Threat of the Week
Salesloft to Take Drift of…

Weekly Cybersecurity Update: Major Data Breach at Salesloft Linked to Drift, Ongoing Threats, and Rising Cyber Intelligence September 08, 2025 Cybersecurity / Hacking News The landscape of cybersecurity remains in constant flux, with each week bringing fresh challenges, vulnerabilities, and essential takeaways for security professionals. For IT departments, navigating these…

Read More

⚡ Weekly Update: Drift Breach Unveiled, Active Zero-Days, Patch Alerts, Evolving Threats & More

 
Sep 08, 2025
Cybersecurity / Hacking News

Cybersecurity constantly evolves, with each week bringing fresh threats, vulnerabilities, and crucial lessons for defenders. For security and IT teams, the challenge lies in discerning which risks demand immediate attention. This digest aims to provide a straightforward briefing to help prioritize what matters most.

This week, the notable story is the Salesloft–Drift breach, where attackers compromised OAuth tokens, gaining access to Salesforce data from major tech companies. This incident underscores how fragile integrations can become critical vulnerabilities in enterprise defenses.

Additionally, we’ll discuss several high-risk CVEs currently under active exploitation, the latest strategies of advanced threat actors, and new insights on streamlining security workflows for greater efficiency. Each section delivers essential information, ensuring you stay informed and prepared without being overwhelmed.

Threat of the Week
Salesloft to Take Drift of…

Cisco Issues Patches for Three Critical Vulnerabilities in IOS XE Software

On September 24, 2021, Cisco Systems announced the release of patches to address three critical security vulnerabilities in its IOS XE network operating system. These flaws could allow remote attackers to execute arbitrary code with administrative privileges and potentially trigger a denial-of-service (DoS) condition on affected devices. The identified vulnerabilities are as follows:

  • CVE-2021-34770 (CVSS score: 10.0) – Cisco IOS XE Software for Catalyst 9000 Family Wireless Controllers CAPWAP Remote Code Execution Vulnerability
  • CVE-2021-34727 (CVSS score: 9.8) – Cisco IOS XE SD-WAN Software Buffer Overflow Vulnerability
  • CVE-2021-1619 (CVSS score: 9.8) – Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability

The most critical issue, CVE-2021-34770, is described by Cisco as a “logic error” occurring during the processing of CAPWAP (Control and Provisioning of Wireless Access Points) packets, which allows a central wireless controller to manage access points.

Cisco Issues Critical Security Patches for IOS XE Software Vulnerabilities On September 24, 2021, Cisco Systems announced the release of critical patches addressing three significant security vulnerabilities within its IOS XE network operating system. These vulnerabilities could allow remote attackers to execute arbitrary code with administrative privileges and potentially initiate…

Read More

Cisco Issues Patches for Three Critical Vulnerabilities in IOS XE Software

On September 24, 2021, Cisco Systems announced the release of patches to address three critical security vulnerabilities in its IOS XE network operating system. These flaws could allow remote attackers to execute arbitrary code with administrative privileges and potentially trigger a denial-of-service (DoS) condition on affected devices. The identified vulnerabilities are as follows:

  • CVE-2021-34770 (CVSS score: 10.0) – Cisco IOS XE Software for Catalyst 9000 Family Wireless Controllers CAPWAP Remote Code Execution Vulnerability
  • CVE-2021-34727 (CVSS score: 9.8) – Cisco IOS XE SD-WAN Software Buffer Overflow Vulnerability
  • CVE-2021-1619 (CVSS score: 9.8) – Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability

The most critical issue, CVE-2021-34770, is described by Cisco as a “logic error” occurring during the processing of CAPWAP (Control and Provisioning of Wireless Access Points) packets, which allows a central wireless controller to manage access points.