Researchers Uncover Latest P2PINFECT Botnet Threat


In the digital world, a team of experts from Cado Security Labs recently discovered a stronger version of a troubling cyber threat known as the P2Pinfect botnet. This sneaky software goes after routers, smart devices and other tech gadgets, especially those using a Microprocessor without Interlocked Pipelined Stages (MIPS) architecture.

What makes this botnet scarier is its ability to dodge detection. It is like a cyber ninja that can slip past Virtual Machines (VM) and avoid debuggers. Plus, it is good at hiding its tracks on Linux computers.

The P2Pinfect story started in July 2023 when another group found a bug that attacked Redis servers on both Linux and Windows systems. This bug, written in a programming language called Rust, was like a ninja with a perfect score of 10.0. It could sneak into Redis servers on different operating systems.

Fast forward to September, and Cado Security Labs noticed a massive 600-times increase in P2Pinfect activity. It is like the cyber bad guys hit the turbo button, causing a 12.3% spike in just one week.

But here is the twist. The experts found a new version of P2Pinfect that specifically goes after smaller gadgets with 32-bit MIPS processors. These are like the mini-brains in routers and smart devices. The bug tries to break into them by guessing passwords.

The strange part is that it also likes to mess with something called Redis servers on these gadgets. The experts are scratching their heads because they are not sure why anyone would do this. But if they succeed, these mini-brains could become launching pads for more attacks.

To make matters trickier, the bug tries to cover its tracks by disabling certain features on computers. It is like the cyber bad guys are playing hide and seek.

Source…

Army Chief Emphasises Importance of Media to Military Operations – Voice of Nigeria






















Army Chief Emphasises Importance of Media to Military Operations – Voice of Nigeria

















Source…

WGRE Reports DePauw Attacked by Black Suit Ransomware Gang


Editor’s NoteThis article was submitted by WGRE News Director Taylor Fleming. The DePauw gives WGRE full credit for this news piece. 

DePauw’s Cyber incident was an attack by the Black Suit Ransomware gang. Black Suit claims to have stolen two-hundred fourteen gigabytes of data. The gang operates by stealing and encrypting data on a compromised network. This story was originally reported by The Record, a news organization run by cybersecurity firm Recorded Future. Last week, DePauw notified many students and parents that their social security numbers and other personal information may have been stolen by an unauthorized third party. This third party has turned out to be Black Suit. According to the US government’s Health Sector Cybersecurity Coordination Center, Black Suit is a relatively new ransomware group that was discovered in early May 2023. However, Black Suit is likely linked to another ransomware group called Royal. Royal was the direct successor of defunct Russian hacker group Conti. The FBI has been assisting DePauw University as they navigate this attack. DePauw has offered impacted students one year of free identity protection services. DePauw University found out about the cyber attack on October 31.

Source…

Ransomware attack takes down systems at 60 credit unions across country


Dozens of credit unions across the country are dealing with outages due to a ransomware attack.

Credit unions report the attack affected part of Trellance, a cloud computing firm used by many credit unions across the country.

At least 60 credit unions have been affected.

One credit union in New York facing outages due to the ransomware attack says online and mobile banking are down but that other services like debit cards are working normally.

The National Credit Union Association said the accounts of all customers are safe and are federally insured up to $250,000.

Recently hospitals, fuel pipelines and schools have all been disrupted by the ransomware attacks that lock up files unless someone pays up.

Source…