Security Leftovers
-
Microsoft: BEC Scammers Use Residential IPs to Evade Detection [Ed: As usual, Microsoft is trying to blame people who exploit vulnerabilities while Microsoft spreads back doors; so the culprit, Microsoft, is being framed as the protector. Unbelievable.]
Cybercriminals are using residential IP addresses in business email compromise (BEC) attacks to make them seem locally generated and evade detection, Microsoft says.
The number of reported BEC attacks is constantly increasing, with the Federal Bureau of Investigation (FBI) receiving close to 22,000 BEC complaints in 2022 (PDF), with losses totaling over $2.7 billion.
As part of a BEC attack, cybercriminals use compromised or spoofed email addresses to send fraudulent requests for wire transfers to employees in charge of making or authorizing payments. The fraudsters request payments to be made to bank accounts they control.
-
The Feds and Their Copycats
The federal government recently revealed that at least 50 U.S. government personnel working in 10 foreign countries have had their mobile devices hacked by unknown persons who employed software known as "zero-click."
-
Critical Security Vulnerability In PowerVM Hypervisor
IBM’s Product Security Incident Response Team (PSIRT) put out a notice on Wednesday, May 17, to inform the Power Systems installed base that there is a very serious security vulnerability in the PowerVM hypervisor. You can see the PSIRT notice at this link and the Security Bulletin: This Power System firmware update is being released to address CVE 2023-30438 at this link.