Security: Windows and Qubes OS
-
New Laplas Clipper Malware Targeting Cryptocurrency Users via SmokeLoader [Ed: Microsoft Windows TCO]
Cryptocurrency users are being targeted with a new clipper malware strain dubbed Laplas by means of another malware known as SmokeLoader.
SmokeLoader, which is delivered by means of weaponized documents sent through spear-phishing emails, further acts as a conduit for other commodity trojans like SystemBC and Raccoon Stealer 2.0, according to an analysis from Cyble.
[...]
Clippers, also called ClipBankers, fall under a category of malware that Microsoft calls cryware, which are designed to steal crypto by keeping close tabs on a victim's clipboard activity and swapping the original wallet address, if present, with an attacker-controlled address.
-
CISA Adds Seven Known Exploited Vulnerabilities to Catalog [Ed: Most of these are Microsoft Windows, but CISA fails to say so]
CISA has added seven vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow in the "Date Added to Catalog" column, which will sort by descending dates.
-
XSAs released on 2022-11-08
The Xen Project has released one or more Xen security advisories (XSAs). The security of Qubes OS is affected. Therefore, user action is required.
-
QSB-086: Speculative security issues on AMD CPUs (XSA-422)
We have just published Qubes Security Bulletin (QSB) 086: Speculative security issues on AMD CPUs (XSA-422). The text of this QSB is reproduced below. This QSB and its accompanying signatures will always be available in the Qubes Security Pack (qubes-secpack). More information about QSBs, including a complete historical list, is available here.