Kali Linux 2021.2 Released with New Hacking Tools & Enhanced New Features With Bug Fixes
Kali Linux 2021.2 has been released now with security fixes, feature enhancements and added several new hacking tools and more.
Offensive security used to release a Kali linux versions update each and every year with new updates feature, in order to provide the best experience for the cybersecurity community. Kali Linux 2021.2 has completely restructured the Bleeding-Edge Branch backend that allowing developers to track any changes on the source code depends on their workflow, experience, and team size.
You can have a look at our kali-bleeding-edge documentation to learn how to enable the repository and how to tell apt to select a package from this repository.
Other notable changes including Dropping the screen recorder button, Adding a text editor shortcut, Adding a web browser icon, and also Adding a drop-down menu to select the user for the default terminal.
There are several improvements are added with the new Kali Linux 2021.1 for NetHunter that support for Nokia 6.1, OnePlus One, OnePlus Nord, Xiaomi Poco F1, Xiaomi Mi A3, Samsung Galaxy S20 FE 5G.
FBI confirmed that JBS was hit by the REvil ransomware gang
On May 30, the American food processing giant JBS Foods, the world’s largest processor of fresh beef, was forced to shut down production at multiple sites worldwide following a cyberattack.
The cyberattack impacted multiple production plants of the company worldwide, including facilities located in the United States, Australia, and Canada.
JBS USA disclosed the cyberattack, according to a press release published by the company the attack had a severe impact on infrastructure located in Australia and North America.
The White House said Tuesday that the cyberattack was likely originating from a cybercrime organization based in Russia.
White House spokeswoman Karine Jean-Pierre told reporters on Air Force One that the company notified the US government Sunday that it was the victim of a ransomware attack. JBS confirmed that the ransom demand came from a criminal organization likely based in Russia.
«We continue to focus our efforts on imposing risk and consequences and holding the responsible cyber actors accountable».
The REvil gang, like others, are believed to be operated out of Russia. Another Russian ransomware gang, the DarkSide group, was behind another major ransomware attack, the Colonial Pipeline attack.
Ryuk Ransomware Operators Employ Powershell Commands to Deploy Ransomware
Recently, cybersecurity experts have claimed that the operators of Ryuk Ransomware are targeting severe infrastructures to extort high ransom from their victims.
In 2018, the Ryuk ransomware was spotted for the first time, and the security researchers claim that the Ryuk procured and developed by its operators from the Hermes ransomware’s source code.
By force, the organization had to covey all their patients to other hospitals and health centers, as the attackers managed to gain access to their internal IT network and shut down all the internal computer systems of this organization in the US.
The operators of Ryuk ransomware designed this new strategy form to empower the ransomware to remain hidden for a longer time on the infected networks without any detection.
While the experts explain that to execute this attack the operators of Ryuk have first gain access to an account of a domain administrator whose passwords were saved in a group policy.
Flaws in Realtek RTL8170C Wi-Fi module allow hijacking wireless communications
Researchers from Israeli IoT security firm Vdoo found multiple vulnerabilities in the Realtek RTL8170C Wi-Fi module that could allow to elevate privileges and hijack wireless communications.
The Realtek RTL8710C module is based on a Cortex M3 processor, it is used for several applications in many industries, including Agriculture, Automotive, Energy, Gaming, Healthcare, Industrial, Security, and Smart Home.
To the best of our knowledge, these vulnerabilities are not being exploited in the wild. Our understanding is that the Realtek team acted promptly to patch these vulnerabilities and push the patched version to the vulnerable products.”
The vulnerabilities impact all embedded and IoT devices that use the Realtek RTL8710C module, they could be exploited only by attackers on the same Wi-Fi network or know the network’s pre-shared key used to authenticate wireless clients on local area networks.
The two issues leverage the knowledge of the PSK to obtain remote code execution on WPA2 clients that use the vulnerable Wi-Fi module.
Stay Focused. Stay Vigilant.
Cyber Threat Incident Management Team — Cyber Security Community @ SLIIT