• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

January 2024 Cyber News Recap

January 23, 2024 by Collin Knauer

Home » Blog » January 2024 Cyber News Recap

January 2024 Cyber recap. Cybersecurity recap.

It’s hard to believe that January is almost over, and as we head into February, it’s important to know that no matter the time of year, cyberthreats continue to present themselves to businesses and organizations of any size. This past month we have seen the repercussions of not using strong passwords, a new malware technique that can hijack your Google account, and a massive data dump revealing millions of passwords.

Here’s a look at some of the most important cybersecurity developments in January 2024:

Organizations Lack Strong Passwords

A recent survey by Axiad highlights a concerning lack of robust password hygiene and authentication practices among organizations, rendering them susceptible to phishing attacks. Despite 88% of IT professionals feeling confident in their companies’ preparedness for password-based cyberattacks, a majority acknowledges falling victim to such incidents.

The survey, which gathered responses from over 200 IT professionals across diverse sectors in the US, reveals that 39% consider phishing the most feared cyberattack, with almost half viewing it as the most likely threat. Despite these concerns, 93% of businesses continue to rely on passwords, citing reluctance to change (64%) and potential technology replacement (54%) as significant barriers to adopting alternatives. Blame for exploited passwords is attributed to various sources, including IT staff (35%), end users (32%), security teams (25%), and leadership (8%). Future technology plans indicate a shift towards password-less technology (45%) and multi-factor authentication (MFA) (27%).

Axiad’s co-CEO, Bassam Al-Khalidi, underscores the alarming results, emphasizing that despite the escalating cyber threats, most companies still rely on passwords. Al-Khalidi advocates for implementing password-less authentication and phishing-resistant MFA to bolster cybersecurity posture in the face of increased cybercriminal activity facilitated by generative AI.

Malvertising Scheme Spreading Ransomware  

A hacking group known as Twisted Spider, or Storm-0216, has adopted a new malvertising scheme involving the use of a ransomware called CACTUS. Previously associated with QakBot’s infrastructure, a malware previously dismantled by law enforcement, the hacking group had to shift the tools they were using to hijack data. Utilizing Storm-1044 services, Twisted Spider infects target endpoints with the DanaBot initial access trojan, observed since November of 2023.

The DanaBot campaign employs a private version of the info-stealing malware, offering hands-on keyboard activity to partners for the theft of login credentials. After gaining access, Storm-1044 laterally moves across the network via RDP sign-in attempts, subsequently handing control to Twisted Spider. CACTUS ransomware is then deployed on infected endpoints, emerging as a preferred choice for many ransomware operators. Arctic Wolf researchers reported hackers abusing CACTUS through vulnerabilities in the Qlik Sense data analytics solution. CACTUS ransomware’s unique evasion method involves encrypting itself, making detection challenging and aiding in evading antivirus and network monitoring tools. First identified in March, CACTUS follows the typical ransomware approach of stealing sensitive data, encrypting systems, and demanding cryptocurrency payments for decryption keys and data privacy.

Data Dump Contains Millions of Passwords

A significant security alert has been triggered by a massive data dump containing millions of passwords. The dataset comprises 71 million credentials, including 25 million previously unseen passwords. Troy Hunt, the operator of Have I Been Pwned, a website used to check if your email credentials have appeared in a data breach, received information about Naz.API, a collection of one billion credentials consisting of 319 files (totaling 104GB and 70,840,771 unique email addresses). Impacting 427,308 subscribers, 65.03% of the email addresses were already present in Have I Been Pwned. Notably, 25 million passwords in the dataset had never been leaked before.

The dataset, known to be created by extracting data from stealer logs, revealed passwords in plaintext, many of which were simple and commonly used. The stolen data encompassed credentials linked to websites such as Facebook, Roblox, Coinbase, Yammer, and Yahoo. Troy Hunt has confirmed the accuracy of some of the usernames and passwords by contacting individuals on the list. However, it’s important to note that not all the data originated from malware; some had been in circulation for a significant period, including Hunt’s own email address and password dating back to pre-2011.

January 2024 Cyber Recap. Cyber security January 2024.

New Malware Attack Can Hijack your Google Account

This new security threat involves info-stealing malware strains, which are exploiting an undocumented Google OAuth endpoint named MultiLogin to compromise Google accounts. These malware strains employ a technique to restore expired authentication cookies, providing unauthorized access even after a password reset. The malware targets session cookies, containing authentication information with a short lifespan. These session cookies are, unfortunately, susceptible to restoration by specific malware.

Cybercriminals associated with Lumma and Rhadamanthys strains claim the capability to restore expired Google Authentication cookies. CloudSEK, a cybersecurity firm, conducted a reverse engineering analysis, revealing that the exploit utilizes the MultiLogin endpoint to extract tokens and account IDs from Chrome profiles. Stolen information, including a GAIA ID and encrypted tokens, is decrypted using an encryption stored in Chrome’s “Local State” file.

The compromised tokens, combined with Google’s MultiLogin endpoint, enable hackers to regenerate expired Google Service cookies, maintaining persistent access to compromised accounts. Google acknowledges the issue and recommends users sign out of the affected browser to revoke session cookies. Enhanced Safe Browsing in Chrome is advised for additional protection against malware and phishing attacks. Regularly changing the Google password is emphasized for enhanced account security. The adoption of session cookie restoration by malware underscores the importance of user vigilance, antivirus software usage, and the anticipation of more malware strains exploiting this feature.

Stay Protected with SWK

When discussing digital attacks, the name of the game is being proactive. Waiting until after a cyberattack effects your organization to bolster your digital defenses is simply too late. Hackers are never going to take a break, so neither can you. To stay on top of the constant cybersecurity developments that occur each month, contact SWK today and learn how you can protect your business from threats like these.  

Category: Blog, Cybersecurity, News and Events

Sidebar

Recent Posts

  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management
  • Minimize Tariff Impacts on Your Technology Costs in the Cloud

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense
Black laptop displaying Acumatica General Ledger journal transactions screen on a desk with coffee mug and notepad, showcasing the financial management interface on a computer in an office setting.

Acumatica General Ledger Training – Key Tips & Tricks

Read moreAcumatica General Ledger Training – Key Tips & Tricks

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand