
Hello all,
It was a busy news week with a nice smattering of good news of indictments and takedowns of threat actors and their infrastructure. Pwn2Own Berlin concluded with 29 zero-days being utilized. Some have already been patched, others are now under a 90-day clock for vendors to patch before the results are made public.
As usual, the RedDotSecurity.news website contains this commentary and a plethora of links to other items that are not in this introduction and that are worth skimming to see if they interest you or pertain to your particular environment or of those you support. There is a lot more than just what is in this video.
Headline NEWS:
- Microsoft abruptly announced the end of granting up to 10 free Microsoft Business Premium and Office 365 E1 Licenses to non-profit organizations. Instead, they will offer up to 300 Business Basic licenses at no cost, which are online only and don’t include desktop applications. And they are also offering discounts of up to 75% on Business Premium and other licensing. I guess if local applications are needed, and there aren’t funds for Microsoft’s new money-grab, organizations could utilize free office suites such as LibreOffice and then still obtain the free Microsoft Business Basic license to get 1TB of OneDrive storage for each user. When current licenses come up for renewal, that’s when the change must be made. If you’re a non-profit, or support one, make sure you stay on top of this so that it doesn’t catch you by surprise.
- Microsoft OneDrive is going to enable the unbelievable bone-headed move of offering to add personal accounts to OneDrive on corporate workstations. This has been universally decried by Security Professionals as a massive vulnerability, compliance, and security nightmare as there will be little to no tracking or control over what a user simply drags from protected locations to their own personal accounts. Administrators are highly encouraged to disable this new functionality, that will be on by default, as soon as possible.
- Palo Alto Global Protect Gateway Portal has a Cross Site Scripting (XSS) vulnerability that can allow a malicious actor to create look-alike sites to convince users into giving up their credentials. Upgrade to the latest versions of Cloud NGFW and PanOS when those updates become available to patch this defect. In the meanwhile, follow the vendor’s recommended mitigation actions.
- TikTok is the Chinese gift that keeps on giving. Dirtbags have figured out that if you offer hacks to steal activation codes for paid software via TikTok instructional videos, unsuspecting wanna-be-thieves will follow those directions, like sheep to the slaughter, and self-infect with malware and infostealers. Somehow, I have a hard time feeling sorry for them. Stealing software is a crime. In the words of the hacktivist named, xoxo from Prague, “Don’t do crime CRIME IS BAD”.
- VMware ESXi, vCenter, VMware Cloud Foundation and more have had critical vulnerabilities disclosed by Broadcom that can enable XSS, arbitrary command execution, and Denial of Service. These defects are present in ESXi, vCenter Server, Workstation 17.x, Fusion 13.x, VMware Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure. Patches are available if you have support with Broadcom. If you’re not going to pay for support, it may be time to switch to a different hypervisor technology, or else your compromise risk will continue to increase.
In Ransomware, Malware, and Vulnerabilities News:
- Wins by the good guys this week include at least one miscreant responsible for hacking PowerSchool pleading guilty in court to cyber extortion conspiracy, cyber extortion, unauthorized access to protected computers, and aggravated identity theft. 16 Russian nationals have been criminally charged with operating the DanaBot net, which had its infrastructure taken down at the same time in an international police action. Charges were filed against the leader of the group responsible for Qakbot malware, which has experienced some very public takedowns recently. Along with the charges it was announced that over $24 million worth of funds have been seized from various accounts, which will ultimately be returned to the victims of this evil organization. In coordination with international authorities, the LummaC2 (or command and control) malware infrastructure was dealt a devastating blow when much of it was seized and taken offline. And finally, Microsoft filed suit to take down 2,300 domains being used by the Lumma stealer group, which it found had infected nearly 400,000 Windows computers worldwide.
In Other News Events of Note and Interest:
- Quantum Computers are rapidly developing and increasing in capacity. D-Wave announced general availability of their Advantage2 Quantum Computer with 4,400 qubits of computational capacity. Even this relatively low number of qubits can be effectively leveraged to perform complex modeling that classic computers would choke on. However, as another article writes, it is estimated that it will take around 1 million qubits for a quantum computer to crack the RSA-2048 bit encryption algorithm, and based on current growth projections, that number is between 2 and 7 years away.
Musings:
I’ve personally witnessed a stark uptick in the number of successful attacks against organizations this past week. And the unfortunate reality is that most were preventable. I regularly see things like firewalls with outdated firmware that have known vulnerabilities, virtual private networks that do not follow best practices such as multifactor authentication and limiting access to only those that need it, vs everyone in the entire enterprise. I see email accounts without multifactor authentication, users that have elevated permissions for their online accounts and on local accounts on their workstations, the same administrative account with the same password on all devices in the network – all of which make a threat actors’ job infinitely simpler. On the infrastructure side I see hypervisor hosts that are joined to the same domain as the guest machines, meaning that if administrator credentials are compromised, the hypervisor host will be too, and that goes for backup servers as well. And don’t get me started on network segmentation. All of the digital eggs should not be in the same basket. If you or someone’s network that you are responsible for have these preventable issues in place, now is the time to schedule a conversation with your virtual Chief Information Officer, or Strategic Account Advisor to determine how to shore up your network against the waves of assault by the hordes of threat actors hell-bent on giving you a very bad day.

Keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Microsoft is pulling free MS365 Business Premium licenses granted to nonprofits
- OneDrive New Feature of Syncing Personal & Corporate Account is Rolling Out
- Palo Alto GlobalProtect Gateway & Portal Vulnerability Allows Malicious Code Execution
- TikTok videos now push infostealer malware in ClickFix attacks
- TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead
- VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
- Critical VMware Cloud Foundation Vulnerability Exposes Sensitive Data
Ransomware, Malware, and Vulnerabilities News
- PowerSchool hacker pleads guilty to student data extortion scheme
- FBI Warning: Silent Ransom Group Targeting Law Firms – pdf link
- CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs
- Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying
- Leader of Qakbot Malware Conspiracy Indicted for Involvement in Global Ransomware Scheme
- Justice Department Seizes Domains Behind Major Information-Stealing Malware Operation
- Lumma infostealer infected about 10 million systems before global disruption
- Microsoft files legal action against information-stealing malware Lumma Stealer
- Cybercrime is ‘orders of magnitude’ larger than state-backed ops, says ex-White House advisor
- FTC finalizes order requiring GoDaddy to secure hosting services
- What Does EU’s Bug Database Mean for Vulnerability Tracking?
- Have I Been Pwned 2.0 is Now Live!
- Mozilla fixes Firefox zero-days exploited at hacking contest
- Grafana Zero-Day Vulnerability Allows Attackers to Redirect Users to Malicious Sites
- New Blackhat AI Tool Venice.ai let Attackers Create Malware in Minutes
- Linux kernel SMB 0-Day Vulnerability Uncovered Using ChatGPT
- Hard-coded API key in AI note taking app exposed users’ private meeting transcripts
- Critical Samlify SSO flaw lets attackers log in as admin
- Critical Versa Concerto Flaws Let Attackers Escape Docker and Compromise Hosts
- ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices
- Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
- Hackers earn $1,078,750 for 28 zero-days at Pwn2Own Berlin
- Fake KeePass password manager leads to ESXi ransomware attack
- “Anti-Ledger” malware: The battle for Ledger Live seed phrases
- New ‘Defendnot’ tool tricks Windows into disabling Microsoft Defender
- Unpatched Windows Server Flaw Threatens AD Users
- Intel’s Memory Leak Nightmare: 5,000 Bytes per Second in the Hands of Hackers
- Forgotten DNS Records Enable Cybercrime
- Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
- KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
- 5 ways 2FA can fail — and what you can do to protect yourself
- Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs
- RVTools hit in supply chain attack to deliver Bumblebee malware
- SK Telecom says malware breach lasted 3 years, impacted 27 million numbers
- Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
- AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation
- Mysterious hacking group Careto was run by the Spanish government, sources say
- Hacking My Car, and probably yours— Security Flaws in Volkswagen’s App
- The inside story of a council held to ransom in cyber-attack
- Security Failures Behind US Contractor’s Data Breach
- Hack of Contractor Was at Root of Massive Federal Data Breach
- States Have a TP-Link Problem
- Cocospy stalkerware apps go offline after data breach
- Hacker steals $324,000 from City of Santa Fe, and it may not be recoverable
- Hackers stole $700K from Philadelphia school district in 2024
- Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
- DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage’s archive server
- Coinbase confirms insiders handed over data of 70K users
- 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak
- 210k patients hit after Georgia clinic’s vendor hack
- M&S confirms month-long breach result of TCS third-party vendor phishing attack
- VanHelsing ransomware builder leaked on hacking forum
- LockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paid
- Russia’s Fancy Bear swipes a paw at logistics, transport orgs’ email servers
- Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization
- Chinese hackers breach US local governments using Cityworks zero-day
- 3AM ransomware uses spoofed IT calls, email bombing to breach networks
- Eeek! p0wned Alabama hit by unspecified ‘cybersecurity event’
- Russian group ‘Qilin’ claims Abilene data breach, demands ransom by May 27
- Cyberattack on northeast Wisconsin wireless company behind weeklong service problems
- Ransomware scum leaked Nova Scotia Power customers’ info
Other News Events of Note and Interest
- Cool Tool: GIMP 3.0.4 Open-Source Image Editor Is Now Available for Download with Bug Fixes
- CEO Who Bragged About Replacing Human Workers With AI Realizes He Made a Terrible Mistake
- The Kids Online Safety Act is back, with the potential to change the internet
- Meet legoGPT, the ‘chatGPT’ for your own LEGO designs
- Red Hat Enterprise Linux 10 Officially Released, Here’s What’s New
- Mozilla announces shutdown of Pocket as it refocuses on Firefox
- Many iPhones stolen in the US and Europe end up in one building in China
- ‘We don’t know how bad it could get’ — Are we ready for the worst space weather?
- D-Wave Announces General Availability of Advantage2 Quantum Computer
- Google Researcher Lowers Quantum Bar to Crack RSA Encryption
- Google Meet is getting real-time speech translation
- This Google Chrome update could change the fundamentals of browsing – here’s who gets to try it first
- This Computer Runs on Human Brain Cells, But It’s Not Conscious—Yet
- Tesla posts Optimus’ most impressive video demonstration yet
- Amazon rolls out Alexa+ to more Early Access users
- Using Let’s Encrypt SSL Certificates? You Need to Check Your Setup
- VMware price hikes? Between 800 and 1,500%, claim Euro customers
- A security key for every employee? YubiKey-as-a-Service goes global
- Welcome to the AI trough of disillusionment
- Vibe coding is rewriting the rules of technology
- Introducing Claude 4
- Anthropic faces backlash to Claude 4 Opus behavior that contacts authorities, press if it thinks you’re doing something ‘egregiously immoral’
- OpenAI introduces Codex, its first full-fledged AI agent for coding
- Rewiring Memory: A New Model That Learns Like a Human Brain
- China debuts world’s first quantum cryptography system, claims it’s ‘unhackable’
- Outlook’s new features might finally make it worth switching to
- Watch “Conversation with Elon Musk: Satya Nadella at Microsoft Build 2025” on YouTube
- Walmart AI details leaked during Microsoft Build conference
- Microsoft CTO Kevin Scott on the birth of the agentic web
- Microsoft announces over 50 AI tools to build the ‘agentic web’ at Build 2025
- Microsoft just taught its AI agents to talk to each other—and it could transform how we work
- Microsoft quietly rolls out new Advanced Settings for Windows 11, here is how to enable it
- Microsoft Expands Copilot for Microsoft 365 with Copilot Tuning
- Microsoft shares official guide for fixing every Windows 11/10 update download/install error
- Microsoft open sources a command-line text editor and more at Build
- Windows 10 emergency updates fix BitLocker recovery issues
- Windows 11 is testing a new wireless PC-to-PC data transfer feature
- Windows 11’s most important new feature is post-quantum cryptography. Here’s why.
- Windows 11 Administrator protection gets even better, Microsoft explains how
- Windows 11 bugs with latest update include installation failures and File Explorer weirdness
