Cyber Bites by Edwin Kwan
Cyber Bites
Cyber Bites - 20th June 2025
0:00
-10:08

Cyber Bites - 20th June 2025

  • Australian Regulator Orders Superannuation Funds to Strengthen Authentication After Cyber Attacks

  • Researchers Expose Massive Dark Advertising Network Using Fake CAPTCHAs to Spread Disinformation and Malware

  • Apple Patches Zero-Click Messaging Vulnerability Exploited to Target European Journalists with Israeli Spyware

  • Scattered Spider Cybercrime Group Shifts Focus to US Insurance Industry After Retail Attacks

  • Massive JavaScript Malware Campaign Infects Over 269,000 Websites Using Novel Obfuscation Technique


Australian Regulator Orders Superannuation Funds to Strengthen Authentication After Cyber Attacks

https://www.apra.gov.au/for-action-information-security-obligations-and-critical-authentication-controls

Australia's financial regulator has issued an urgent directive to all superannuation funds, demanding they assess and strengthen their authentication controls following a series of damaging credential stuffing attacks earlier this year. The Australian Prudential Regulation Authority (APRA) has given fund operators until the end of August to identify and report any remaining security weaknesses in their systems, as concerns mount over the industry's vulnerability to cyber threats.

Deputy Chair Margaret Cole emphasized that recent attacks have exposed persistent gaps in the sector's cybersecurity defenses, particularly around user authentication systems. She noted that while APRA has consistently stressed the importance of robust cyber protection, current security measures are failing to keep pace with evolving threats and the critical nature of the member data and assets at stake. The regulator is demanding faster and more comprehensive implementation of essential security controls across the industry.

The new requirements mandate that superannuation funds implement multi-factor authentication or equivalent protections for all high-risk member activities, including changes to personal details, withdrawals, benefit payments, transfers, and investment switching. Additionally, enhanced authentication must be applied to all administrative and privileged system access. APRA has specifically noted that security solutions must remain accessible to disadvantaged groups and those who may legitimately choose to avoid certain digital channels.


Researchers Expose Massive Dark Advertising Network Using Fake CAPTCHAs to Spread Disinformation and Malware

https://krebsonsecurity.com/2025/06/inside-a-dark-adtech-empire-fed-by-fake-captchas/

Security researchers have uncovered a sophisticated criminal advertising ecosystem that leverages fake CAPTCHA challenges to trick users into enabling malicious push notifications, while simultaneously powering Russian disinformation campaigns across social media platforms. The sprawling network, centered around the notorious VexTrio traffic distribution system, represents one of the most resilient and interconnected cybercriminal operations ever documented, affecting hundreds of thousands of compromised websites worldwide.

The investigation began when researchers at Qurium Security discovered that the Kremlin-backed "Doppelganger" disinformation network was using the same malicious advertising infrastructure employed by online scammers and website hackers. Doppelganger operations push pro-Russian narratives through cloned news websites, relying on domain cloaking services to evade detection while ensuring targeted audiences receive fake news content. This cloaking technology shares infrastructure with VexTrio, believed to be the oldest malicious traffic distribution system in existence, which primarily manages traffic from victims of phishing attacks, malware infections, and social engineering schemes.

Central to this dark advertising empire are affiliate networks like LosPollos and TacoLoco, which distribute JavaScript-heavy "smartlinks" through hacked WordPress sites to drive traffic into the VexTrio system. These networks, operated by companies with ties to Switzerland, Czech Republic, and Russia, earn commissions by directing victims to dating scams, fraudulent sweepstakes, malware downloads, and financial schemes. The fake CAPTCHA challenges presented to users actually trick them into enabling push notifications that continuously bombard their devices with virus alerts and misleading pop-up messages, creating a persistent channel for cybercriminal communications.

Following the public exposure of these operations in November 2024, the criminal networks demonstrated remarkable resilience by rapidly rebranding and shifting infrastructure. Within days of the research publication, LosPollos suspended its push notification services, Adspro rebranded to Aimed Global, and malware families that previously used VexTrio pivoted to alternative traffic distribution systems. Security experts warn that this adaptability, combined with the Russian nexus of many operators, represents a significant threat to global cybersecurity, as these systems facilitate both large-scale disinformation campaigns and billions of dollars in consumer fraud annually.


Apple Patches Zero-Click Messaging Vulnerability Exploited to Target European Journalists with Israeli Spyware

https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/

Apple has confirmed that a critical zero-click vulnerability in its Messages app was actively exploited by sophisticated attackers to infect European journalists with Paragon's Graphite mercenary spyware. The security flaw, tracked as CVE-2025-43200, allowed attackers to compromise target devices without any user interaction by sending maliciously crafted photos or videos through iCloud links, marking the first forensic confirmation of Paragon's iOS surveillance capabilities being deployed in the wild.

Security researchers at Citizen Lab discovered that the vulnerability was used to target Italian journalist Ciro Pellegrino and another prominent European journalist in January and February 2025. The attacks involved sending iMessages from the same Apple account to deploy the Graphite spyware, which can access messages, emails, cameras, microphones, and location data without detection. Both journalists were notified by Apple on April 29, 2025, through the company's threat notification system that alerts users suspected of being targeted by state-sponsored attackers.

The vulnerability was patched on February 10, 2025, across multiple Apple platforms including iOS, iPadOS, macOS, watchOS, and visionOS, though Apple chose not to publicly disclose the active exploitation until months later. The timing coincides with growing scrutiny over commercial spyware use, particularly after WhatsApp revealed in January that Paragon's tools had been deployed against dozens of users globally. These revelations have intensified the ongoing scandal surrounding the misuse of surveillance technology against journalists and civil society members.


Scattered Spider Cybercrime Group Shifts Focus to US Insurance Industry After Retail Attacks

https://www.theregister.com/2025/06/16/scattered_spider_targets_insurance_firms/

Google's threat intelligence team has issued urgent warnings that the notorious Scattered Spider cybercrime group has pivoted from targeting retail companies to launching sophisticated attacks against US insurance firms. The alert comes as multiple insurance companies have reported significant network outages and security incidents, with some systems remaining down for nearly two weeks following suspected cyberattacks that bear the hallmarks of the group's signature social engineering tactics.

John Hultquist, chief analyst at Google Threat Intelligence Group, confirmed that researchers have identified multiple intrusions in the US insurance sector that demonstrate all the characteristics of Scattered Spider operations. The group, known for its highly effective fake help-desk calls and social engineering schemes, has historically focused on attacking one industry sector at a time before moving to new targets. Their recent shift from retail to insurance follows a string of successful attacks against major retailers in both the United States and United Kingdom, where they deployed DragonForce ransomware after gaining initial access through deceptive phone calls to company help desks.

The warning coincides with ongoing network disruptions at several major insurance companies, including Erie Insurance and Philadelphia Insurance Companies, both of which have experienced prolonged system outages since early June. Erie Insurance, claiming to be the 12th largest home and auto insurer in the US, first reported network problems on June 8 and subsequently disclosed to federal regulators that they had detected unusual network activity consistent with a cybersecurity incident. Similarly, Philadelphia Insurance Companies acknowledged unauthorized access to their systems after detecting suspicious network activity on June 9, leading to the proactive disconnection of affected systems.

The insurance industry presents an attractive target for cybercriminals due to the vast amounts of sensitive personal and financial data these companies process, as well as their critical role in the broader financial ecosystem. Google has issued specific hardening recommendations for organizations to defend against Scattered Spider's tactics, including enhanced help desk training to positively identify callers through video verification or challenge-response questions, and implementation of phishing-resistant multi-factor authentication. The group's success rate with social engineering attacks has prompted warnings that all insurance companies should be on high alert, particularly regarding attempts to manipulate help desk and call center personnel.


Massive JavaScript Malware Campaign Infects Over 269,000 Websites Using Novel Obfuscation Technique

https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/

Cybersecurity researchers have uncovered a large-scale malware campaign that compromised more than 269,000 legitimate websites in just one month using a sophisticated JavaScript obfuscation technique dubbed "JSFireTruck." The campaign, which peaked on April 12 with over 50,000 infected web pages detected in a single day, represents one of the most extensive website compromise operations observed this year, targeting visitors who arrive at infected sites through popular search engines.

The malicious JavaScript injections employ an advanced obfuscation method based on JSFuck, an esoteric programming style that uses only six characters to write executable code. Palo Alto Networks Unit 42 researchers coined the term "JSFireTruck" for this particular implementation, which primarily uses the symbols [, ], +, $, {, and } to hide the code's true purpose and hinder security analysis. The obfuscated malware is designed to check the document referrer to determine how visitors arrived at the compromised website, specifically targeting users who came from major search engines including Google, Bing, DuckDuckGo, Yahoo, and AOL.

When the malware detects that a visitor originated from a search engine, it automatically redirects them to malicious URLs that can deliver additional malware, exploits, traffic monetization schemes, and malvertising campaigns. This selective targeting approach allows the attackers to maximize their impact while potentially evading detection from security researchers who might visit the sites directly rather than through search engine results. The widespread nature of these infections suggests a coordinated effort to transform legitimate websites into attack vectors for further malicious activities.

The discovery coincides with separate research revealing a sophisticated Traffic Distribution Service called HelloTDS, which operates through similar methods by injecting remotely-hosted JavaScript code into compromised websites. This parallel campaign demonstrates how cybercriminals are increasingly leveraging legitimate website infrastructure to distribute malware, fake CAPTCHA pages, tech support scams, and cryptocurrency frauds.

Discussion about this episode

User's avatar