New cyberattack warning: confirming that you are not a robot can be dangerous

UPDATE, October 28, 2024: This story, originally published on October 26, has been updated with more cyberattack mitigation tips.

Ukraine’s computer emergency response team has issued a new security precaution after encountering a cyberattack crusade through the threat organization APT28, also known as the fancy bear. This organization believes, with the highest degree of confidence, that it is affiliated with the intelligence operations of the Russian army. Here’s what we know so far and what you look at if you think you’re in danger of being attacked.

The Ukrainian certificate warning, CER-UA number #11689, was published on Oct. 25 and, courtesy of the language translation team on Google’s page, detailed an ongoing investigation into phishing crusade emails containing a database table and a link supplying what appears to be a Google Recaptcha Bot Bot Detection conversation box.

The frequency of those anti-CAPTCHA machines has been reduced particularly for mainstream users, largely due to the number of browser extensions that assist them, as well as iOS, through the use of Apple’s server-based self-verification formula to pass the desire to want entirely. them yourself. However, it’s still not a completely unforeseen occasion when one looks like and, whatever the Fancy Bear risk organization is composing, in fact, not anything that would display the user’s suspicion. If anything, it’s the opposite: employ an anti anti anti anti horadas -Bot defense has a tendency to recommend reliable end results than a harmful one.

In the case of this cyberattack campaign, CERT-UA said that verifying the box by asking for confirmation in reaction to the query “I’m not a robot” will start a malicious PowerShell command statement to the user’s clipboard. Cont29, known as Midnight Blizzard, some other Russian state-sponsored attack organization has also become concerned about the activity of anti-Ukraine cyberattacks currently targeted, as shown through Google’s risk research organization and Mandiant.

Ok, the ultimate vital point to point out here is that the cyber crusade in the consultation seems to be very much aimed at local government workers in Ukraine. This promptly filters out much of the fear that everyone might have. However. It doesn’t mean that the same techniques won’t be used through other risk actors now that the method is out there and that some victims are supposedly being idioted. Therefore, you deserve to be aware of the risk and how to mitigate it.

Which brings me to the point of the moment here: the CyberAttack is introduced by clicking on a link (don’t do that) that reasons the conversation box of I’m not a robot in the first place. If you reach this level of such an attack, more interaction is required to execute the crossover payload: the PowerShell command triggers a script asking the user to take other steps.

These include: Urgent A Win R Combo to open the Command Prompt, Urgent A Win V Combo to paste the malware payload execution instructions, and despite all they want to press to actually execute it and install the malware itself. of steps, which require a lot of trust from the user. Don’t be so reliable. Sit down to yourself, when have I been asked to do something like this before?I bet my space that the answer to this, for 99. 9% of other people is, EUM, never. So why start now? With cyberattack campaigns, especially those involving AI-AI boosted phishing techniques, it’s simple for that maximum that still depends on outdated clever tricks. It can even keep state-sponsored hackers at bay.

On the unlikely occasion that your systems have been compromised through this APT28 cyberattack, or anything similar for that matter, you turn on your incident reaction plan immediately. If you don’t have an incident reaction plan, your suggestion from the UK’s National Cyber Security Centre suggests taking the following steps to restrict any impact:

Meanwhile, the Federal Trade Commission advises that if you’ve clicked on a link or opened an attachment that would have possibly downloaded malware to your device, it does the following:

And finally, on the occasion of a successful cyberattack, you report this to the applicable authorities, regardless of whether you have a legal responsibility or not. The U. S. Government’s Cybersecurity and Infrastructure Security Agency has such a reporting portal.

A community. Many voices.   Create a slack count to keep your thoughts down.  

Our network is about connecting other people through open and thoughtful conversations. We need our readers to make their revisions and exchange concepts and facts in one space.

To do so, please abide by the posting regulations in our site’s terms of use.   We’ve summarized some of those key regulations below. In other words, keep it civil.

Your message will be rejected if we realize that it seems to contain:

User accounts will be blocked if we become aware or that users are compromised:

So how can you be a difficult user?

Thank you for reading our community guidelines. Read the full list of publication regulations discovered in our site’s terms of use.

Leave a Comment

Your email address will not be published. Required fields are marked *