Cyware Weekly Threat Intelligence - November 11–15
Weekly Threat Briefing • Nov 15, 2024
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Weekly Threat Briefing • Nov 15, 2024
As cyber threats to critical infrastructure surge, the TSA has proposed formal rules for pipeline and railroad operators, while the World Economic Forum introduced a new framework to enhance public-private collaboration against cybercrime. These efforts highlight the urgency of uniting resources and governance to fortify cybersecurity resilience on all fronts.
From Microsoft’s patching of critical flaws to nation-state campaigns, the week reveals no respite in cybersecurity. The WIRTE group expanded disruptive attacks across the Middle East, whereas TA455 targeted aerospace firms with fake job lures. Microsoft’s November 2024 Patch Tuesday updates addressed 89 vulnerabilities, including two actively exploited zero-days, underscoring escalating threats to global IT systems.
This week, several emerging threats highlighted the diversity of attack tactics. The new Glove Stealer exploits browser encryption to pilfer cookies and crypto wallets, whereas the Lazarus group’s RustyAttr trojan targets macOS users using the Tauri framework. A Chinese threat actor, SilkSpecter, was found scamming online shoppers via 4,695 fake domains, impersonating popular brands to steal credit card details during Black Friday hunts.