May 31, 2025

Header image for the Red Dot Weekly Cyber Security News https://reddotsecurity.news

Hello all,

It seemed to me that this week was mercifully quiet on the global scale, with fewer massive holes and defects being revealed. That’s not so say that dirtbags took the week off, oh no, they already have plenty of the aforementioned flaws available to enable their nefarious activity. They were, unfortunately, still quite busy exploiting hard-coded passwords in routers, spamming out AI enhanced phishing emails, mining crypto currency, executing man-in-the-middle attacks to steal credentials, and more. And if that wasn’t enough, Google shocked the world with their launch of DeepMind Veo 3, an AI video generation platform that is terrifying in how realistic the videos appear. We are now at the point where you cannot believe your eyes or ears unless you see it in person. However, rest assured, I’m not an AI, yet. There were also quite a few interesting and new tech-related things that are not scary or disturbing that were introduced this week which you’ll find linked in our Other News Events of Note and Interest section. So be sure you check them out.

Headline NEWS:

  • ConnectWise ScreenConnect has revealed a successful breach by “nation-state hackers”. One of the things that gives CISOs, IT Administrators, and Managed Service Providers chills in the night is the thought that their Remote Monitoring and Management systems (RMM) will get compromised and give a threat actor unrestricted access to hundreds, if not thousands of systems simultaneously. Apparently, this happened in November of last year, with a patch coming out in April of this year after it was discovered. ConnectWise says that a limited number of companies were affected by this breach but have been very stingy with details. It will be interesting to see if they will reveal any more at their upcoming IT Nation Secure conference in Orlando this coming week.
  • Mozilla Firefox plugged a critical zero-interaction defect in the libvpx library that could have allowed a nefarious person to take over a system via the browser. Google Chrome also patched this same defect and several others. I highly recommend that you restart your browsers to apply any pending updates.
  • Microsoft OneDrive was excoriated last week for the upcoming automatic integration of OneDrive personal with OneDrive for business. This week’s news is that a vulnerability has been found in the One Drive File Picker that grants full access to all files! This defect is due to lack of fine-grained control in OAuth scopes for OneDrive. Instead of following the principle of least privilege, it grants all privilege. Microsoft has been made aware of the flaw and is considering making changes. But since the user must grant OAuth access, Redmond considers this a user issue. You might want to check your OneDrive to see what access has been granted and to whom.

In Ransomware, Malware, and Vulnerabilities News:

  • Mandiant flags fake AI video generators laced with malware. Threat Actors, exploiting the massive hype generated by AI image software, and AI video generators, have been seeding the internet with advertisements and websites promising the latest and greatest AI image and video generators. When unsuspecting victims download the software, they get infostealers and malware instead. If it seems too good to be true, it probably is.
  • Fake Bitdefener Site Spreads Trio of Malware is another reminder that threat actors have lots of money to advertise and spin up, or hijack, sites to spread their evil payloads. You cannot trust a simple web search any longer. And the lock icon or shield on a site no longer means anything, threat actors’ sites have SSL Certificates too. The internet is a bit like the Yellow Brick road to the Emerald City, it is bright and beautiful, but unfortunately, there are plenty of places where you’ll find evil along the way.

In Other News Events of Note and Interest:

  • Google’s Veo 3 AI model is scary good, and it is only going to get better. We knew for some time now that this technological leap was coming. Well, it’s here! The quality and availability of the content will only increase, while the hardware requirements will continue to decrease. The clock is at 11:59 for figuring out how to determine reality from deception as it relates to audio conversations or video meetings. AI, in the hands of threat actors, scouring the net for any information about you so that it can answer security questions and respond with your own personality traits while it impersonates your voice and likeness is only an internet minute away.

Musings:

As the reality is slowly dawning on the technological world that you will soon not be able to trust anything that is presented in a digital format, and that there is no way to be certain that what you see or hear is real, this could be the trigger that brings back in-person meetings. With that in mind, it might be a good time to invest in the airlines again.

Visc. Jan Broucinek

Keep the shields up!

Viscount Jan Broucinek
Red Dot Security News

Headline NEWS

Ransomware, Malware, and Vulnerabilities News

Other News Events of Note and Interest

 

Share this with: