MSP Cybersecurity News Update – October 14, 2024

Published:

Microsoft October 2024 Patch Tuesday Addresses 118 Vulnerabilities, Including Five Zero Days

In a significant move to bolster cybersecurity, Microsoft has released its October 2024 Patch Tuesday updates, addressing a staggering 118 vulnerabilities. Among these, five are classified as zero-day vulnerabilities, with two of them currently being actively exploited in the wild. This update is particularly critical as it includes three remote code execution flaws deemed critical, which could allow attackers to take control of affected systems.

Breakdown of Vulnerabilities

The October update encompasses a wide range of security issues, including:

  • 28 Elevation of Privilege Vulnerabilities
  • 43 Remote Code Execution Flaws
  • Various other categories of security concerns

The two actively exploited zero-day vulnerabilities are particularly alarming. One involves a Windows MSHTML Platform spoofing vulnerability, while the other is a Microsoft Management Console (MMC) remote code execution flaw. These vulnerabilities pose significant risks, as they can be exploited to execute arbitrary code on affected systems, potentially leading to data breaches or system takeovers.

Additionally, Microsoft has patched a Curl vulnerability, a Hyper-V UEFI bypass issue, and a Winlogon elevation of privilege flaw. These updates are crucial for maintaining the integrity and security of systems, especially in an era where cyber threats are increasingly sophisticated.

The Importance of Timely Updates

The release of these patches underscores the importance of timely software updates. Organizations and individuals are urged to apply these updates as soon as possible to mitigate the risks associated with these vulnerabilities. Cybersecurity experts recommend enabling automatic updates where possible and regularly checking for updates to ensure systems are protected against the latest threats.


Japanese Tech Giant Casio Hit by Cyberattack

In a troubling development, Casio, the renowned Japanese tech giant with a revenue of $1.83 billion, has confirmed that it suffered a cyberattack after unauthorized actors accessed its networks. This breach has led to significant service disruptions, prompting the company to investigate the incident with external cybersecurity specialists.

Details of the Breach

While Casio has not disclosed whether any personal data or confidential information was stolen, the company has reported the incident to data protection authorities and has implemented measures to block further external access. Alarmingly, the Underground ransomware group has listed Casio on its dark web portal, claiming to have leaked sensitive data, including employee and financial information, patents, and legal documents. However, these claims remain unverified, as Casio has not responded to requests for comment.

This incident is particularly concerning as it follows a previous breach a year ago that exposed customer data from 149 countries. The repeated breaches highlight the growing cybersecurity challenges faced by organizations, particularly in the tech sector.


North Korea-Linked Threat Actors Targeting Job Seekers in the Tech Industry

In a disturbing trend, North Korean threat actors have been observed targeting tech job seekers to deliver updated versions of malware known as BeaverTail and InvisibleFerret. This campaign, dubbed "Contagious Interview," involves attackers posing as recruiters on job platforms, inviting developers to interviews, and persuading them to download malware.

The Mechanics of the Attack

The first stage of infection involves the BeaverTail downloader, which targets both Windows and macOS systems. Once installed, it paves the way for the InvisibleFerret backdoor, allowing attackers to gain remote control over infected devices. The malware is designed to steal sensitive information, including browser passwords and cryptocurrency wallet data, making this operation likely financially motivated to support the North Korean regime.

Despite public awareness of this campaign, it remains active, with attackers utilizing fake video conferencing applications to infiltrate systems. Job seekers are advised to exercise caution and verify the legitimacy of job offers, especially those that require downloading software or applications.


ADT Reveals Its Second Data Breach in Two Months

ADT, a prominent home and small business security company, has disclosed a data breach after threat actors accessed its systems using stolen credentials. This incident marks ADT’s second breach in just two months, raising concerns about the company’s cybersecurity measures.

Details of the Incident

The breach occurred through a third-party business partner, allowing attackers to steal encrypted employee account data. In response, ADT has terminated the unauthorized access and launched an investigation with third-party cybersecurity experts. The company has also implemented countermeasures and is collaborating with law enforcement to address the breach.

While some internal systems were disrupted, ADT has assured customers that their data and security systems were not compromised. However, the recurrence of breaches within such a short timeframe raises questions about the effectiveness of ADT’s cybersecurity protocols.


FTC and CISA Warn of Scams Related to Hurricanes Helene and Milton

In the wake of Hurricanes Helene and Milton, several government agencies, including the Federal Trade Commission (FTC) and the Cybersecurity and Infrastructure Security Agency (CISA), have issued warnings about scams targeting relief funds and sensitive data.

Nature of the Scams

Hurricane Helene caused extensive damage across several states, including Florida, Georgia, North Carolina, Tennessee, and Virginia, followed by Hurricane Milton impacting Florida. Scammers are exploiting the chaos, posing as fraudulent charities, government impersonators, and offering dubious investment opportunities related to rebuilding efforts.

Victims are being targeted through phishing attempts and scams involving unlicensed contractors, with offers that seem too good to be true for flood-damaged properties. CISA has cautioned against malicious emails and social media messages following major disasters, urging individuals to verify sources before engaging.


In conclusion, the cybersecurity landscape is continually evolving, with new threats emerging regularly. The recent incidents involving Microsoft, Casio, North Korean threat actors, ADT, and the warnings from government agencies highlight the critical need for vigilance and proactive measures in safeguarding sensitive information and systems. As cyber threats become more sophisticated, staying informed and prepared is essential for individuals and organizations alike.

Related articles

Recent articles