Elephant0991

joined 2 years ago
[–] Elephant0991@lemmy.bleh.au 2 points 2 years ago

That's a wonderful story. Thank you for sharing.

[–] Elephant0991@lemmy.bleh.au 40 points 2 years ago (1 children)

You definitely don't want this stuff to escape into the atmosphere.

[–] Elephant0991@lemmy.bleh.au 2 points 2 years ago

Matching atmosphere. Like the floating door; you can be pushed right from inside the house onto the lawn.

[–] Elephant0991@lemmy.bleh.au 3 points 2 years ago

Practically true.

[–] Elephant0991@lemmy.bleh.au 3 points 2 years ago

That's like, real estate inspection.

[–] Elephant0991@lemmy.bleh.au 6 points 2 years ago

When I forgot part of my my old password, I came up with a list of words that I possibly could have come up with and tried those. I eventually found it even if I was panicky the whole time. If I were you, I would list the words and try them in the order of probabilities.

Un/Fortunately, BW is implemented to rate-limit password brute-forcing. I feel you about your CAPTCHA hell, and I hate their surreal sunflower CAPTCHA (maybe to make it as repulsive as possible to the hackers?).

[–] Elephant0991@lemmy.bleh.au 1 points 2 years ago

Didn't his admin approve the Operation Warp Speed thingy?

[–] Elephant0991@lemmy.bleh.au 2 points 2 years ago

That's probably not just for debris protection; there's also bat shit!

[–] Elephant0991@lemmy.bleh.au 5 points 2 years ago

The show must go on.

[–] Elephant0991@lemmy.bleh.au 13 points 2 years ago* (last edited 2 years ago)

True.

  • Automatic patch => automatic installation of malware

  • Manual patch => unpatched vulnerabilities

Screwed either way.

 

Summary:

  • Generative AI is being used by cybercriminals to create more convincing and personalized phishing emails for Business Email Compromise (BEC) attacks.
  • This technology allows attackers to automate the creation of highly convincing fake emails, personalized to the recipient, thus increasing the chances of success for the attack.
  • One such tool is WormGPT, which is a blackhat alternative to GPT models, designed specifically for malicious activities.
  • WormGPT can create emails that are not only remarkably persuasive but also strategically cunning, showcasing its potential for sophisticated phishing and BEC attacks.

The use of generative AI for BEC attacks has two main advantages:

  1. Exceptional grammar: Generative AI can create emails with impeccable grammar, making them seem legitimate and reducing the likelihood of being flagged as suspicious.
  2. Lowered entry threshold: The use of generative AI democratises the execution of sophisticated BEC attacks. Even attackers with limited skills can use this technology, making it an accessible tool for a broader spectrum of cybercriminals.

To safeguard against AI-driven BEC attacks, organizations should implement the following measures:

  1. BEC-specific training: Companies should develop extensive, regularly updated training programs aimed at countering BEC attacks, especially those enhanced by AI.
  2. Enhanced email verification measures: Organizations should enforce stringent email verification processes.
 

Summary

  • A zero-day vulnerability (CVE-2023-36884) is being exploited in the wild to target those with an interest in Ukraine.
  • The vulnerability allows attackers to execute malicious code on a victim's computer by tricking them into opening a specially crafted Microsoft Office document.
  • The attacks are being carried out by a group known as Storm-0978, which is also known for distributing trojanized versions of popular software and launching ransomware attacks.
  • Microsoft recommends that organizations use Microsoft Defender for Office 365 or the Block all Office applications from creating child processes attack surface reduction rule to protect themselves from this vulnerability.
  • Organizations can also consider blocking outbound SMB traffic.

Other details

  • The phishing campaign that is being used to deliver the malicious Office documents is targeting defense and government entities in Europe and North America.
  • The bait used in the phishing emails is related to the Ukrainian World Congress, a non-profit organization of Ukrainian public organizations in diaspora.
  • Once a victim opens the malicious Office document, the attacker can execute arbitrary code on their computer.
  • The attacker can then use this code to steal data, install malware, or take control of the victim's computer.

Microsoft's CVE-2023-36884 specific recommendations

  • Customers who use Microsoft Defender for Office 365 are protected from attachments that attempt to exploit CVE-2023-36884.
  • In current attack chains, the use of the Block all Office applications from creating child processes attack surface reduction rule prevents the vulnerability from being exploited
  • Organizations who cannot take advantage of these protections can set the FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION registry key to avoid exploitation. Please note that while these registry settings would mitigate exploitation of this issue, it could affect regular functionality for certain use cases related to these applications.

Other recommendation:

  • You could also consider blocking outbound SMB traffic.
view more: ‹ prev next ›