In todays symposium, we talk about a new strand of Chae$ malware, some developments in social engineering, privateers in a hybrid war, cyber ops as combat support, and some default passwords.

Published: Sept. 5, 2023, 8:15 p.m.

b'A New variant of Chae$ malware is described. A "Smishing Triad" impersonates postal services. A MinIO storage exploit reported. Okta warns of attackers seeking senior admin privileges. LockBit compromises a UK security contractor. DDoS takes down a German financial regulator\'s site. Infamous Chisel as GRU combat support. Joe Carrigan on Meta uncovering a Chinese influence effort. Our guest is Connie Stack, CEO of Next DLP, discussing data breach notification procedure. And please -PLEASE- remember to change your default passwords.\\n\\nFor links to all of today\'s stories check out our CyberWire daily news briefing:\\nhttps://thecyberwire.com/newsletters/daily-briefing/12/169\\n\\nSelected reading.\\nThreat Profile: Chae$ 4 Malware (Morphisec)\\n"Smishing Triad" Targeted USPS and US Citizens for Data Theft (Resecurity)\\xa0\\n\'Smishing Triad\' Targeted USPS and US Citizens for Data Theft (Security Affairs)\\xa0\\nNew Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services (Security Joes)\\nHackers exploit MinIO storage system to breach corporate networks (BleepingComputer)\\xa0\\nOkta Warns of Social Engineering Attacks Targeting Super Administrator Privileges (The Hacker News)\\xa0\\nMore Okta customers trapped in Scattered Spider\'s web (Register)\\xa0\\nCross-Tenant Impersonation: Prevention and Detection (Okta Security)\\nBreaking: UK MoD attacked by LockBit (Computing)\\nGerman financial agency site disrupted by DDoS attack since Friday (BleepingComputer)\\xa0\\nLogicMonitor customers hacked in reported ransomware attacks (BleepingComputer)\\nLogicMonitor customers hit by hackers, because of default passwords (TechCrunch)'