company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

SSH

DAGGERFLY

loading..
loading..
loading..

Evasive Panda Hijacks SSH Daemon with Malware for Covert Operations

Chinese hacking group Evasive Panda uses ELF/Sshdin,jector.A!tr malware to hijack SSH daemons for persistent access and covert operations on network appliances

04-Feb-2025
6 min read

No content available.

Related Articles

loading..

Data Breach

FOOD

GrubHub has confirmed a significant data breach affecting customers, merchants, ...

GrubHub, one of the leading food delivery platforms in the U.S., has confirmed a data breach that has compromised the personal information of several customers, merchants, and drivers. The breach, which originated through a third-party service provider account, has raised serious concerns about the vulnerability of data in the hands of external partners. This article will break down the details of the breach, GrubHub's [response](https://about.grubhub.com/news/our-response-to-a-third-party-vendor-incident/), and the possible ramifications for affected users. --- ### **1. Background of the Incident: What Happened?** GrubHub, a popular food ordering and delivery service with a nationwide reach, disclosed a data breach on Monday. The company revealed that attackers had exploited a third-party service provider’s account, gaining unauthorized access to a variety of personal and sensitive data. The breach’s root cause was traced back to the compromised account of a third-party provider, which had support access to GrubHub’s systems. #### **1.1. Attack Vector – Third-Party Service Provider** The breach began with a third-party service provider that was responsible for offering certain support services to GrubHub. The attackers exploited the service provider’s access to infiltrate GrubHub’s systems. This highlights a critical vulnerability in relying on external entities for essential business operations, which, if not properly managed, can lead to substantial security risks. #### **1.2. Timeline of the Breach** Upon discovering the breach, GrubHub immediately terminated the compromised account and cut off the service provider’s access. External forensic experts were then brought in to assess the extent of the breach and analyze the compromised data. The company’s investigation also included rotating passwords to further mitigate the risk of unauthorized access. --- ### **2. Data Compromised: What Was Exposed?** The breach exposed a range of personal information from GrubHub’s users, merchants, and drivers. The company confirmed that no full payment card numbers, bank account details, Social Security numbers, or driver’s license numbers were compromised. However, certain personal information was indeed accessed by the attackers. #### **2.1. Personal Information of Customers** GrubHub revealed that attackers gained access to names, email addresses, and phone numbers of customers who had interacted with customer support services. For a select group of users, attackers also accessed partial payment card information, including the last four digits and card type. However, no full card numbers or sensitive financial data were compromised. #### **2.2. Impact on Merchants and Drivers** In addition to customer information, the data of GrubHub’s merchants and drivers were also affected. Like customers, their names, contact details, and partial payment information were exposed. The company noted that no login credentials, passwords, or financial details were accessed for these groups, which is a positive sign in terms of potential financial fraud. #### **2.3. Legacy System Passwords** A more concerning aspect of the breach was the compromise of hashed passwords tied to certain legacy systems. These legacy systems used older password storage methods, which might not have been as secure. GrubHub proactively rotated any passwords that were thought to be at risk to prevent further misuse. --- ### **3. GrubHub’s Response to the Breach** In response to the breach, GrubHub took immediate steps to limit the damage and protect the affected parties. #### **3.1. Termination of Service Provider Access** The first line of defense was the immediate termination of the compromised third-party account’s access. This action prevented further intrusion and helped contain the breach at its source. #### **3.2. Password Rotation and Security Measures** To further protect its systems, GrubHub rotated passwords for all potentially affected accounts. They also implemented additional security protocols, such as enhanced anomaly detection mechanisms across internal services, to monitor for unusual activities that could signal another attack attempt. #### **3.3. Forensic Investigation and Monitoring** GrubHub hired external forensic experts to assess the full scale of the breach and to determine if any other systems or sensitive information had been affected. The company is likely to continue monitoring its systems to ensure no further unauthorized access occurs. --- ### **4. Potential Risks and Consequences** While the breach did not expose the most sensitive data, the compromised information still poses significant risks to affected individuals. Here are some of the potential consequences: #### **4.1. Identity Theft and Phishing Attacks** Although full payment card information was not compromised, the exposure of partial payment data, along with names, emails, and phone numbers, increases the likelihood of identity theft and phishing attacks. Attackers could use this information to craft targeted scams, tricking users into revealing further personal or financial details. #### **4.2. Risk to Customer Trust** For GrubHub, the breach could severely impact customer trust. In the highly competitive food delivery industry, users are increasingly concerned about data security. A compromised service can lead to customers seeking alternatives, which could harm GrubHub's long-term reputation. #### **4.3. Legal & Regulatory Repercussions** Given the nature of the breach, GrubHub may also face legal scrutiny. Earlier this year, the company paid $25 million to settle FTC charges over misleading business practices. If it’s found that GrubHub didn’t meet adequate security standards or failed to notify affected users in time, additional penalties or regulatory actions could follow. --- ### **5. GrubHub’s Recommendations for Users** In the wake of this breach, GrubHub has urged its users, merchants, and drivers to take specific actions to protect themselves. #### **5.1. Change Passwords Regularly** GrubHub strongly recommends that users, especially those who were affected by the breach, change their passwords. It’s also important for users to employ unique passwords for different accounts, reducing the risk of password reuse being exploited across platforms. #### **5.2. Monitor Accounts for Unusual Activity** Affected individuals should actively monitor their financial accounts and be on the lookout for any unusual or unauthorized activity. GrubHub has not disclosed any instances of full financial data being compromised, but monitoring can help catch any discrepancies early. #### **5.3. Be Cautious of Phishing Attempts** With attackers potentially armed with personal information, users should remain vigilant for phishing emails or phone calls that might attempt to extract more sensitive details. GrubHub has warned users to be cautious when receiving unsolicited communication, especially if it involves requests for payment or account credentials. --- ### **6. GrubHub’s Legal & Financial Troubles** This breach is not the first time GrubHub has faced criticism for its business practices. In December 2023, the company settled with the Federal Trade Commission (FTC) for $25 million, addressing charges related to deceptive marketing practices. This settlement included accusations of misleading customers about delivery costs and deceiving drivers about their earnings. #### **6.1. FTC Settlement** The [$25 million settlement](https://www.ftc.gov/business-guidance/blog/2024/12/food-thought-ftcs-proposed-settlement-grubhub) aimed to resolve accusations that GrubHub failed to transparently [disclose total delivery costs](https://www.ftc.gov/system/files/ftc_gov/pdf/Grubhub-Order.pdf), misleading consumers about the real cost of their orders. It also included charges related to listing restaurants on its platform without their consent and misleading drivers about how much money they would earn from delivering orders. #### **6.2. Impact of This Settlement on GrubHub** The ongoing scrutiny around GrubHub’s legal issues, combined with this data breach, could significantly tarnish its reputation. The company now faces dual challenges: rebuilding consumer trust after both deceptive practices and a data breach.

loading..   04-Feb-2025
loading..   7 min read
loading..

Artificial Intelligence

Gemini

Government hackers are exploiting Google's Gemini AI, raising alarms over cybers...

The lines between innovation and exploitation are blurring in this fast-evolving world of artificial intelligence (AI). What was once a tool for scientific advancement is now being weaponized in the world of cyber warfare. As governments scramble to deploy the power of AI, a darker, more concerning reality is emerging: **state-backed threat actors** are leveraging AI-powered tools to augment their cyberattacks, amplifying the scale, speed, and sophistication of their operations. The latest revelations from **Google’s Threat Intelligence Group (GTIG)** and cybersecurity firm **KELA** paint a chilling picture of AI’s role in cybersecurity breaches, with generative AI tools like **Google Gemini** and **DeepSeek** increasingly exploited by advanced persistent threat (APT) groups across the globe. The rapid integration of these AI models into the cyber threat landscape presents not only immediate challenges but also **long-term risks** for the security of governments, businesses, and individuals. ### **Rise of State-Sponsored AI-Powered Cyber Warfare** Artificial intelligence has emerged as a **game-changer** in the cybersecurity world, with both defenders and attackers exploiting its vast capabilities. On the one hand, AI is aiding defenders by improving threat detection, automating incident responses, and identifying vulnerabilities at unprecedented speeds. On the other hand, cybercriminals—especially **government-backed APT groups**—are using AI to bolster their **cyber espionage** and **data theft** capabilities. Recent research has uncovered the **alarming extent** to which state-sponsored actors are utilizing generative AI for nefarious purposes. Google’s findings have highlighted that **APT groups** from more than **20 countries**, including **Iran**, **China**, **North Korea**, and **Russia**, are experimenting with **Gemini**, a cutting-edge AI model developed by Google, to streamline various stages of the cyberattack lifecycle. What’s most striking is that these threat actors are not just using AI for conventional tasks such as malware creation or code injection but are leveraging AI for more **strategic functions** like **reconnaissance**, **intelligence gathering**, **privilege escalation**, and **social engineering**. #### **AI and the Evolving Cyber Threat Landscape** The use of AI by cyber threat actors represents a **quantum leap** in the nature of cyber threats. The integration of generative AI into the cyber-attack process is enabling adversaries to conduct **more sophisticated operations** with a **much higher success rate**. Threat actors are not merely trying to bypass traditional defense mechanisms—they are now using AI to **improve their operational efficiency**, craft **customized phishing attacks**, develop **malware** at scale, and **exploit vulnerabilities** more quickly and effectively than ever before. In the case of **Google Gemini**, this AI model is being used by APT groups to perform **complex research** tasks, from analyzing publicly disclosed vulnerabilities to gaining insight into the **target organizations**' infrastructure and operational details. These capabilities allow attackers to **plan targeted operations** and develop **customized exploits** based on **real-time intelligence** extracted from the victim’s digital ecosystem. ### **Global Use of Generative AI Models by APT Groups** #### **Iran: Heavy Reliance on Gemini for Strategic and Tactical Operations** Iranian-backed APT groups have been among the **heaviest users** of Gemini, employing the tool for a variety of offensive tasks. The Iranian APT actors have leveraged Gemini to conduct in-depth **research** into **defense organizations**, **vulnerabilities**, and **military technologies**, while also using it to generate **content for influence campaigns** and **phishing attacks**. Their efforts have been particularly focused on exploiting **UAV (unmanned aerial vehicles)** and **missile defense systems**, as well as leveraging AI to enhance the **efficiency** of their **cyber warfare** strategies. Gemini has enabled **APT42**, one of Iran’s most active APT groups, to craft **malicious content** with precision, conduct **in-depth reconnaissance**, and **synthesize research** on sensitive issues like the **Iran-Israel proxy conflict**. The AI tool also helped the group to **localize content** and **generate reports** with a specific **tone**, including targeted content designed to influence geopolitical opinions. #### **China: Reconnaissance, Vulnerability Research, and Lateral Movement** Chinese APT groups have also **heavily engaged** with Gemini to support a variety of **cyber espionage** and **surveillance** operations. These groups primarily use Gemini for **researching vulnerabilities** in **military and governmental networks**, while simultaneously **developing scripts** to facilitate **lateral movement** and **privilege escalation** within compromised systems. China-backed actors have been particularly focused on using Gemini to research and analyze publicly available information on **US military infrastructure**, **target organizations**, and **network defense strategies**. With Gemini’s assistance, these actors are able to generate sophisticated **scripts** that support **data exfiltration** and **evade detection**, significantly enhancing their **cyber espionage** capabilities. #### **North Korea: Enhancing Malware and Evasion Techniques** North Korean APT actors have deployed Gemini to support **multiple phases** of their attack lifecycle, including **malware development**, **payload creation**, and **evading defense mechanisms**. Gemini has played a crucial role in **automating malware scripting**, **generating phishing campaigns**, and **researching exploitation techniques** to compromise systems. In one particularly alarming instance, North Korean actors used Gemini to **draft cover letters** and **job proposals** as part of their ongoing efforts to infiltrate **Western organizations** by placing **clandestine IT workers** under false identities. This highlights how **AI tools** like Gemini are facilitating **covert operations** and assisting APT groups in bypassing traditional recruitment and intelligence-gathering barriers. #### **Russia: Minimal but Focused Use of AI for Payload Development** While Russian APT groups have shown more **limited engagement** with Gemini compared to their Iranian and Chinese counterparts, their **use of AI** has been **strategic**. Russian-backed threat actors primarily used Gemini for **content creation**, including **rewriting** malware into different programming languages and adding **encryption functions** to their exploits. Despite their **limited use**, the **focus on payload crafting** underscores the **adapting sophistication** of Russia’s cyber strategies in the **digital warfare** landscape. ### **Jailbreak Attempts and Security Workarounds** Despite the **robust safety measures** in place, APT groups are continuously **experimenting with jailbreaks** and **security bypass techniques** to manipulate AI models like Gemini for **malicious purposes**. These actors have attempted to **rephrase prompts**, **use publicly available jailbreak prompts**, and re-engineer AI responses to bypass Gemini’s **safety safeguards**. However, Google’s security measures, including **adversarial training**, **input validation**, and **prompt sanitization**, have **successfully blocked** these efforts. Despite this, the attempts to exploit Gemini for **malicious** activities demonstrate the **high stakes** and growing **concerns** surrounding **AI security**. ### **Need for a Unified Global Response** As AI continues to evolve, the **cybersecurity landscape** will be increasingly influenced by **AI-driven capabilities**. Generative AI models like Gemini represent both a **powerful tool** for defenders and a **potential weapon** for cyber adversaries. While **AI’s positive potential** in strengthening security is undeniable, it is equally clear that without proper **safeguards**, it can be **manipulated** by malicious actors to carry out **advanced cyberattacks**. The integration of AI into **cyber defense** systems has already begun to transform how organizations approach **digital threats**, enabling faster detection and response times. However, as we’ve seen, adversaries are not far behind in leveraging **AI for offensive purposes**. To address these evolving threats, **collaboration** among **governments**, **private sectors**, and **international organizations** is crucial in creating global frameworks that safeguard **AI development** and **deployment**. At **Google**, we remain committed to providing **responsible AI** solutions, continuously enhancing our **AI models** to mitigate **misuse** and sharing our findings to raise awareness about emerging threats. We believe that **cybersecurity** should be **proactive** rather than reactive, focusing on preventing threats before they materialize.

loading..   03-Feb-2025
loading..   6 min read
loading..

Ransomware

Tata Technologies

Tata Technologies faces a $500M ransomware attack, disrupting IT systems and rai...

*Tata Technologies, a leading technology and product engineering service provider under the Indian conglomerate Tata Group, has disclosed a ransomware attack that has disrupted some of its IT services. This cyberattack highlights the growing cybersecurity risks faced by businesses, reinforcing the urgency for implementing stronger protective measures against evolving threats.* ## **Tata Technologies Ransomware Breach: Official Statement & Investigation** [Read the official filing here](https://www.bseindia.com/xml-data/corpfiling/AttachLive/20eab8f4-5204-4159-9bb2-3b3eb29b6127.pdf) According to Regulation 30 of the SEBI (Listing Obligations and Disclosure Requirements) Regulations, 2015, Tata Technologies has informed the Indian stock exchanges about the ransomware incident affecting a few of its IT assets, which reportedly impacted around 5-10% of its internal systems. As a precautionary measure, some IT services were temporarily suspended but have now been fully restored. The company has assured that client delivery services remained fully functional and unaffected throughout. Additionally, a thorough cybersecurity investigation is being conducted with experts to determine vulnerabilities, mitigate risks, and fortify defenses. Tata Technologies reiterated its commitment to maintaining the highest standards of security and data protection, taking all necessary steps to mitigate any potential risks. The Pune-headquartered company disclosed on Friday that a ransomware attack affected "a few of our IT assets" but emphasized that client delivery services remained fully operational and uninterrupted. The incident raises serious concerns regarding data security and vulnerability in corporate IT infrastructures. ## **Ongoing Investigation into Ransomware Attack** Tata Technologies has launched a comprehensive investigation in consultation with cybersecurity experts to identify the root cause and implement remedial measures. The company’s filing with the Indian stock exchanges confirmed its commitment to mitigating risks and strengthening its cybersecurity framework. However, specific details about the attack remain undisclosed, including the identity of the ransomware group behind the breach or whether a ransom demand was issued or paid. Companies often withhold such information to avoid encouraging future attacks or due to legal and regulatory considerations. However, this lack of transparency can fuel speculation about data exposure and financial repercussions, ultimately affecting trust among stakeholders and cybersecurity circles. The lack of transparency on this front has fueled speculation within cybersecurity circles about potential data exposure and financial repercussions. ## **A Global Engineering Powerhouse Targeted** Established in 1989 as an automotive unit of Tata Motors and later spun off as an independent entity in 1994, Tata Technologies provides critical product engineering and R&D services to leading automotive, aerospace, and heavy engineering companies across 27 countries. With an estimated revenue of over $500 million in 2023, it remains a key player in the global engineering landscape. The firm operates 20 delivery centers and employs over 12,500 professionals, making it a high-value target for cybercriminals. Over the years, Tata Technologies has expanded its global footprint through strategic acquisitions, including INCAT International, Cambric Corporation, and Escenda Engineering, collectively increasing its operational capacity by nearly 30%. These acquisitions have bolstered its engineering capabilities and market presence while also introducing new cybersecurity challenges, as integrating different digital infrastructures can create potential vulnerabilities. The company also successfully launched its Indian IPO in November 2023, strengthening its market position. This incident, however, may pose reputational risks, disrupt ongoing operations, and lead to potential financial losses, highlighting vulnerabilities in the company’s digital infrastructure. ## **Ransomware Disruptions in Tech & Cybersecurity Defense Strategies** Cybersecurity experts warn that ransomware attacks on technology firms can have far-reaching implications beyond immediate operational disruptions. For example, the 2021 Colonial Pipeline ransomware attack led to widespread fuel shortages and an estimated financial loss of $4.4 million in ransom payments, demonstrating how ransomware can cripple critical infrastructure. [Read more about the Colonial Pipeline attack](https://www.secureblink.com/cyber-security-news/colonial-pipeline-hit-by-a-darkside-ransomware-attack-encrypting-entire-system-to-offlineto). While the attack on Tata Technologies has not yet shown such severe consequences, it highlights the vulnerability of multinational corporations and their need for stronger cybersecurity defenses to prevent operational disruptions and potential financial damage. With increasing reliance on digital transformation and cloud-based services, organizations must adopt proactive cybersecurity measures, including robust endpoint protection, multi-factor authentication, and zero-trust security frameworks. Tata Technologies’ cybersecurity breach joins a growing list of ransomware attacks on multinational corporations, which saw a 150% rise in reported cases globally in the past year alone. The incident serves as a stark reminder for businesses to invest in state-of-the-art security infrastructure and regularly update their cyber defense mechanisms to counter evolving threats. ## **Tata Technologies’ Response and Future Cybersecurity Measures** Tata Technologies has not yet provided a detailed cybersecurity recovery roadmap, raising industry concerns about long-term preventive measures and risk mitigation strategies. Industry best practices suggest that companies in such situations should conduct thorough risk assessments, strengthen data encryption, implement advanced threat detection, and regularly update security policies to mitigate future threats. However, cybersecurity analysts emphasize the necessity of conducting thorough forensic investigations, reinforcing IT security protocols, and ensuring comprehensive employee training on phishing and ransomware mitigation tactics. Industry stakeholders and clients will be closely monitoring Tata Technologies’ response to this attack, as its handling of the situation could set a precedent for corporate cybersecurity resilience.

loading..   02-Feb-2025
loading..   5 min read