telecommunications

AppWizard
May 24, 2025
Vietnam's technology ministry has instructed telecommunication service providers to block the messaging app Telegram due to its lack of cooperation in combating criminal activities among users. This directive, issued on May 21, mandates that service providers implement the block and report their actions by June 2. Findings from the cyber-security department indicated that 68% of the 9,600 Telegram channels and groups in Vietnam were violating laws, including serious offenses like fraud, drug trafficking, and suspected terrorism activities. A representative from the ministry confirmed the document's authenticity, citing Telegram's failure to provide user data during criminal investigations. As of the latest update, Telegram remained accessible in Vietnam despite the directive.
AppWizard
May 24, 2025
Vietnam's Ministry of Science and Technology has accused the messaging app Telegram of not cooperating in addressing criminal activities conducted by its users. The ministry has instructed internet service providers to restrict Telegram's operations in the country, citing that nearly 70 percent of the 9,600 channels on the app disseminate harmful information and engage in illegal activities such as selling user data and drug trafficking. A Telegram representative stated the company has been timely in addressing legal requests from Vietnam and is processing a recent request. Despite the government's actions, Telegram was still accessible in Vietnam as of Friday. In Vietnam, approximately 11.8 million users use Telegram, while the app has nearly one billion users globally.
AppWizard
May 14, 2025
Since April 2024, the threat actor Marbled Dust has been exploiting a zero-day vulnerability (CVE-2025-27920) in the Output Messenger chat application, targeting user accounts that have not applied necessary fixes. This exploitation has resulted in the collection of sensitive data from users in Iraq, specifically linked to the Kurdish military. Microsoft has high confidence in this assessment and notes that Marbled Dust conducts reconnaissance to identify potential targets using Output Messenger. Marbled Dust has successfully utilized this vulnerability to deploy malicious files and exfiltrate data. Microsoft notified the application’s developer, Srimax, about the vulnerability, leading to the release of a software update. A second vulnerability (CVE-2025-27921) was also found, but no exploitation of this second flaw has been observed. The zero-day vulnerability allows an authenticated user to upload malicious files to the server's startup directory. Marbled Dust has exploited this flaw to place a backdoor file, OMServerService.vbs, in the startup folder, enabling them to access communications and sensitive data indiscriminately. The attack chain begins with Marbled Dust gaining access to the Output Messenger Server Manager, likely through DNS hijacking or other credential interception techniques. Once inside, they exploit the vulnerability to drop malicious files, including a GoLang backdoor, which connects to a Marbled Dust command-and-control domain for data exfiltration. To mitigate this threat, Microsoft recommends updating to the latest version of Output Messenger, activating various security protections, and implementing rigorous vulnerability management strategies. Microsoft Defender XDR customers can identify potential threat activity through specific alerts related to Marbled Dust and utilize advanced hunting queries for detection. Indicators of compromise include traffic to the domain api.wordinfos[.]com, associated with Marbled Dust activities.
AppWizard
March 25, 2025
A recent incident involved The Atlantic's editor-in-chief in a Signal chat among senior officials from the Trump administration discussing military actions in Yemen. Signal was chosen for its robust security features, including end-to-end encryption that prevents interception by intermediaries. Signal operates as an independent non-profit, unlike WhatsApp, which is owned by Meta. Its popularity is growing in political circles, with recommendations from both the European Commission and Parliament for secure communications. The guidelines noted an increase in threats to telecommunications infrastructure and recommended Signal when corporate tools are unavailable. A recent leak of U.S. national defense plans was due to human error, not Signal's encryption flaws.
AppWizard
March 25, 2025
End-to-end encrypted messaging app Signal is recognized for its security features but is advised against for use by government officials discussing national security. A breach occurred when members of former President Donald Trump's national security team mistakenly included a journalist in a group chat sharing sensitive military information. Cybersecurity experts express concerns about the potential legal implications of using apps like Signal for classified communications, as it could violate the Espionage Act. High-ranking officials were involved in this incident, which exposed sensitive details, including air-strike targets and the identity of a CIA officer. Typically, government officials use Secure Compartmentalized Information Facilities (SCIFs) for classified information, and there are specific government-approved systems for transmitting such information that do not include Signal.
Winsage
March 20, 2025
Almost a dozen state-sponsored threat groups from nations including China, Russia, Iran, and North Korea are exploiting a security vulnerability in Microsoft Windows, identified as ZDI-CAN-25373, to conduct espionage and gather sensitive information. This vulnerability affects how Windows handles .lnk files, allowing attackers to execute hidden malicious commands. Since 2017, these groups have targeted government, military, and critical infrastructure organizations globally, with 11 state-sponsored groups identified, primarily focusing on espionage (70%) and financial motives (20%). North Korea accounts for 45.5% of the exploitation, with Iran and Russia at 18.2% each, and China at 18.1%. The United States has experienced the most attacks (343 incidents), followed by Canada (39), Russia (25), and South Korea (23). Despite being notified, Microsoft does not plan to issue a patch for this vulnerability, categorizing it as "low severity."
Winsage
March 19, 2025
Microsoft has identified a spoofing vulnerability in Windows File Explorer, designated as CVE-2025-24071, with a CVSS score of 7.5. This vulnerability affects various versions of Windows, including Windows 10 (multiple versions), Windows 11 (multiple versions), and Windows Server (multiple versions). Unauthenticated attackers can exploit this vulnerability by crafting RAR/ZIP files containing a malicious SMB path, potentially exposing the user's NTLM hash. Microsoft has released a security patch for supported product versions, and affected users are advised to install it promptly. Users can check their system's vulnerability status by verifying their version and patch information through specific commands.
Winsage
March 12, 2025
Recent assessments have identified critical vulnerabilities in VMware's virtualization products that allow attackers to escape the VM sandbox and execute arbitrary code at the hypervisor level, targeting the ESXi host. This can compromise the hypervisor and grant attackers control over all virtual machines on the server, threatening the entire VMware vSphere infrastructure. These vulnerabilities are particularly concerning as they are targeted by ransomware operators and advanced persistent threat groups, with tens of thousands of systems worldwide affected across various sectors, including finance, healthcare, government, critical infrastructure, and telecommunications. Cybersecurity experts recommend that organizations using affected VMware products urgently deploy patches, assess their virtualization infrastructure for signs of compromise, and enhance monitoring systems to detect suspicious activity.
Search