diamondvstar1@gmail.com

Autonomous Robot Pods to Enhance Mobility and Accessibility for Individuals with Disabilities

Recent collaboration With A&K Robotics Is set to Develop Autonomous Electric Robots To Aid Individuals With Disabilities In Canada. The Vancouver-based company A&K Robotics is partnering with the Rick Hansen Foundation (RHF), a non-profit organization, to enhance accessibility and inclusivity for people with mobility challenges. These self-driving, single-seat pods employ real-time mapping software along with cameras, sonar, and lidar to navigate their surroundings. The goal of this partnership is to simplify everyday environments like airports, malls, and schools for those who struggle with mobility. The initiative will feature A&K’s Cruz mobility pods, which are currently being tested at Vancouver Airport and have also been used in Atlanta.

Autonomous Robot Pods to Enhance Mobility and Accessibility for Individuals with Disabilities Read More »

Shake Shack to Deploy Autonomous Robots for Uber Eats Deliveries in Los Angeles

Shake Shack Customers in Los Angeles May soon have Their Orders Delivered By Autonomous Robots. Select Shake Shack locations in the city will start using sidewalk robots created by Serve Robotics, a local company, to fulfill Uber Eats orders. These robots, which have been in use for Uber Eats deliveries since 2022, are part of Serve Robotics’ goal to have 2,000 robots in operation on the platform by next year. The company, which is backed by Nvidia, is expanding its partnership with Shake Shack to reach this target.Shake Shack customers will place their orders through the Uber Eats app as usual. If an autonomous robot is available, they will have the option to choose it for delivery. Customers can track the robot’s journey on a map within the app, and upon its arrival, they can enter a passcode to access the food storage compartment and collect their order. The Serve robots possess Level 4 autonomy, allowing them to operate independently without human intervention in designated areas. They achieve this by utilizing multiple sensors, sophisticated AI, and GPS technology to enable this capability.

Shake Shack to Deploy Autonomous Robots for Uber Eats Deliveries in Los Angeles Read More »

U.S. Agencies Alert on Iranian Hacker Team ContinuedRansomware Operations

U.S. cybersecurity and intelligence agencies have accused an Iranian hacking group of infiltrating multiple organizations nationwide and collaborating with affiliates to launch ransomware attacks. This activity has been attributed to a threat group known as Pioneer Kitten, also referred to as Fox Kitten, Lemon Sandstorm (previously Rubidium), Parisite, and UNC757. The group is believed to be connected to the Iranian government, using an Iranian IT company, Danesh Novin Sahand, likely as a front. According to the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense Cyber Crime Center (DC3), “Their cyber operations focus on deploying ransomware to gain and establish network access. These operations enable the group to collaborate with affiliate actors to continue deploying ransomware.” The targets include sectors such as education, finance, healthcare, and defense, along with local government entities in the U.S. Similar intrusions have also been reported in Israel, Azerbaijan, and the United Arab Emirates (U.A.E.), aimed at stealing sensitive data. The agencies believe the team’s objective is to establish initial access to victim networks and then work with ransomware affiliates linked to NoEscape, RansomHouse, and BlackCat (also known as ALPHV) to deploy file-encrypting malware in exchange for a share of the illegal profits, while deliberately keeping their nationality and origin ambiguous. These attack attempts reportedly began as early as 2017 and have continued through this month. The threat actors, also known by the online aliases Br0k3r and xplfinder, have been found to sell their access to victim organizations on underground marketplaces, highlighting their efforts to diversify revenue streams. A Substantial Section of the team’s U.S.-focused cyber activities is dedicated to obtaining and maintaining technical access to victim networks, facilitating future ransomware attacks. The actors offer full domain control rights, including domain admin credentials, to multiple networks worldwide. The Iranian cyber actors’ involvement in these ransomware campaigns extends beyond providing access; they closely collaborate with ransomware affiliates to lock down victim networks and strategize extortion tactics. Initial access is typically achieved by exploiting remote external services on internet-facing assets vulnerable to known flaws (CVE-2019-19781, CVE-2022-1388, CVE-2023-3519, CVE-2024-3400, and CVE-2024-24919), followed by steps to maintain persistence, escalate privileges, and establish remote access through tools like AnyDesk or the open-source Ligolo tunneling tool.

U.S. Agencies Alert on Iranian Hacker Team ContinuedRansomware Operations Read More »

Hackers Exploit Vulnerable AVTECH IP Camera Vulnerability for Botnet Operations

A critical vulnerability affecting AVTECH IP cameras has been exploited by threat actors as a zero-day, adding the devices to a botnet. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) disclosed the details earlier this month, emphasizing the flaw’s low attack complexity and remote exploitability. CISA warned in an alert published on August 1, 2024, that successful exploitation could allow attackers to inject and execute commands with the permissions of the running process. The vulnerability impacts AVM1203 camera models with firmware versions up to and including FullImg-1023-1007-1011-1009. Although these devices are no longer produced, they are still in use in sectors like commercial facilities, financial services, healthcare, public health, and transportation systems. The web infrastructure company noted that attackers managing these botnets have been leveraging new or less-known vulnerabilities to spread malware.

Hackers Exploit Vulnerable AVTECH IP Camera Vulnerability for Botnet Operations Read More »

APT-C-60 Group Uses WPS Office Vulnerability to Install SpyGlace Backdoor

A Cyber espionage group aligned with South Korea has been linked to the exploitation of a recently patched severe remote code execution vulnerability in Kingsoft WPS Office, which has been used to deploy a custom backdoor known as SpyGlace. Cybersecurity firms ESET and DBAPPSecurity attribute this activity to a threat actor identified as APT-C-60. These attacks have been observed infecting users in China and East Asia with malware. The vulnerability in question, CVE-2024-7262 (CVSS score: 9.3), arises from inadequate validation of user-supplied file paths. This flaw allows an attacker to upload an arbitrary Windows library, enabling remote code execution. ESET noted that the flaw “permits code execution by hijacking the control flow of the WPS Office plugin component promecefpluginhost.exe” and mentioned discovering an additional method to exploit this issue, tracked as CVE-2024-7263 (CVSS score: 9.3). APT-C-60 has exploited this vulnerability by creating a one-click exploit embedded in a malicious spreadsheet document, which was uploaded to VirusTotal in February 2024. The file contains a deceptive image of the spreadsheet’s content, with a hidden malicious link. Clicking on a cell within this image initiates a multi-stage infection process to deploy the SpyGlace trojan, a DLL file named TaskControler.dll, which includes capabilities for file theft, plugin loading, and command execution. Security researcher Romain Dumont explained, “The exploit developers embedded an image of the spreadsheet’s rows and columns to trick users into believing the document was ordinary. The malicious hyperlink was attached to this image, so interacting with a cell in the picture would activate the exploit.” APT-C-60 has been active since at least 2021, with SpyGlace sightings dating back to June 2022, according to ThreatBook, a Beijing-based cybersecurity firm.

APT-C-60 Group Uses WPS Office Vulnerability to Install SpyGlace Backdoor Read More »

CISA Highlights Severe Apache OFBiz Vulnerability Following Reports of Ongoing Exploitation

On Tuesday, The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a significant security weakness in the Apache OFBiz open-source enterprise resource planning (ERP) system to its Known Exploited Vulnerabilities (KEV) list, noting evidence of ongoing exploitation. The issue, identified as CVE-2024-38856, has a CVSS rating of 9.8, signifying a critical level of severity. CISA stated, “Apache OFBiz has a flaw in authorization that could permit remote code execution through a Groovy payload within the OFBiz user process by an unauthenticated attacker.” This vulnerability was first revealed earlier this month when SonicWall labeled it as a workaround bypass for another vulnerability, CVE-2024-36104, which allows remote code execution through customized requests.

CISA Highlights Severe Apache OFBiz Vulnerability Following Reports of Ongoing Exploitation Read More »

Fortra Releases Fix for Critical Security Flaw in FileCatalyst Workflow

Fortra has resolved a critical security vulnerability affecting FileCatalyst Workflow, which could be exploited by a remote attacker to gain administrative privileges. The flaw, identified as CVE-2024-6633, has a CVSS score of 9.8 and arises from the use of a static password for connecting to an HSQL database. In a vendor knowledge base article, the default credentials for the HSQL database (HSQLDB) used by FileCatalyst Workflow are disclosed, Fortra noted in an advisory. “Exploiting these credentials could compromise the confidentiality, integrity, or availability of the software.” The advisory added, “The HSQLDB is only included to assist with installation, has been deprecated, and is not intended for production use according to vendor guidelines. Nevertheless, users who have not switched to an alternative database as recommended remain vulnerable to attacks from any entity that can access the HSQLDB.” Cybersecurity firm Tenable, which discovered and reported the vulnerability, stated that the HSQLDB is by default accessible remotely on TCP port 4406, allowing attackers to connect using the static password and execute malicious activities.

Fortra Releases Fix for Critical Security Flaw in FileCatalyst Workflow Read More »

Meta Reveals Iranian Threat Actor Targeting International Political Figures via WhatsApp

On Friday, Meta Platforms joined Microsoft, Google, and OpenAI in revealing the activities of an Iranian state-sponsored threat actor, who reportedly utilized a set of WhatsApp accounts to target individuals in Israel, Palestine, Iran, the U.K., and the U.S. This cluster of activities, originating from Iran, appeared to be directed at political and diplomatic officials, as well as other public figures, including some associated with the administrations of President Biden and former President Trump, according to Meta. The social media giant attributed the campaign to a nation-state actor identified as APT42, also known as Charming Kitten, Damselfly, Mint Sandstorm (formerly Phosphorus), TA453, and Yellow Garuda, which is believed to be linked to Iran’s Islamic Revolutionary Guard Corps (IRGC). This adversarial group is notorious for employing sophisticated social engineering tactics to spear-phish targets and steal their credentials through malware. Earlier in the week, Proofpoint reported that this threat actor had targeted a prominent Jewish figure with malware known as AnvilEcho. Meta disclosed that the “small cluster” of WhatsApp accounts pretended to be technical support for AOL, Google, Yahoo, and Microsoft, although these attempts are thought to have been unsuccessful. These accounts have since been blocked. “We have not seen evidence that their accounts were compromised,” stated the parent company of Facebook, Instagram, and WhatsApp. “We have advised those who reported to us to take precautions to secure their online accounts across the internet. This development comes as the U.S. government formally accused Iran of attempting to disrupt U.S. elections.

Meta Reveals Iranian Threat Actor Targeting International Political Figures via WhatsApp Read More »

Microsoft Patches ASCII Smuggling Vulnerability That Allowed Data Exfiltration from Microsoft 365 Copilot

Recent findings revealed a previously patched flaw in Microsoft 365 Copilot that could have been exploited to steal sensitive user data through a technique known as ASCII smuggling. ASCII Smuggling is an innovative method that leverages special Unicode characters that resemble ASCII but are actually hidden from view in the user interface, explained security researcher Johann Rehberger. This allows an attacker to have the large language model render hidden data to the user and embed it within clickable links, effectively staging the data for exfiltration. As a result, sensitive information found in emails, such as multi-factor authentication (MFA) codes, could be sent to a server controlled by the attacker.” This discovery follows proof-of-concept (PoC) attacks on Microsoft’s Copilot, demonstrating how the system could be manipulated to alter responses, leak private data, and bypass security measures, underscoring the ongoing need for vigilance with AI tools. According to Zenity, these tactics enable attackers to perform retrieval-augmented generation (RAG) poisoning and indirect prompt injections that could lead to remote code execution, granting full control over Microsoft Copilot and other AI applications. In a potential attack scenario, a remote attacker with the ability to execute code could deceive Copilot into delivering phishing content to users. One particularly sophisticated attack involves converting the AI into a spear-phishing tool, termed LOLCopilot, where an attacker with access to a victim’s email could send phishing emails that mimic the style of the compromised user. Microsoft has also warned that Copilot bots, publicly accessible via Microsoft Copilot Studio without authentication protections, could be exploited by attackers to extract confidential data if they have prior knowledge of the bot’s name or URL.

Microsoft Patches ASCII Smuggling Vulnerability That Allowed Data Exfiltration from Microsoft 365 Copilot Read More »

Malicious Movie Downloads Used in Attacks Deploying PEAKLIGHT Downloader on Windows Systems

A novel dropper has been identified that acts as a conduit for deploying next-stage Malware, ultimately aiming to infect Windows systems with information stealers and loaders. This memory-resident dropper decrypts and runs a PowerShell-based downloader,” stated Google-owned Mandiant. This PowerShell-based downloader is being tracked as PEAKLIGHT. This method is used to distribute various malware strains, including Lumma Stealer, Hijack Loader (also known as DOILoader, IDAT Loader, or SHADOWLADDER), and CryptBot, all offered through a malware-as-a-service {MaaS} Model. The attack chain begins with a Windows shortcut (LNK) file, which is obtained through drive-by download methods, such as when users search for movies on search engines. These LNK files are often contained in ZIP archives that are falsely presented as pirated movies. Once executed, the ‘LNK‘ file connects to a content delivery network (CDN) that hosts an obfuscated, in-memory JavaScript dropper. This dropper then triggers the execution of the PEAKLIGHT PowerShell downloader script on the system, which contacts a command-and-control (C2) server to download additional payloads. If the required archives are unavailable, the downloader will attempt to retrieve the archive file from a CDN site and store it on the local disk.

Malicious Movie Downloads Used in Attacks Deploying PEAKLIGHT Downloader on Windows Systems Read More »