- Gone Phishing
- Posts
- Kasseika Ransomware: BYOVD Tactic Unleashed!
Kasseika Ransomware: BYOVD Tactic Unleashed!

Welcome to Gone Phishing, your daily cybersecurity newsletter thatβs going to war against cybercrime like the British army with Yemen #topical πππ Sometimes I ask myself: do you really despise scammers? And I quickly respond: #Yemen π
Todayβs hottest cybersecurity news stories:
π¬ Sweet Sensation when you donβt get ransomwared, right? π°
π¨ Youβve got Gmail: Gmail takeover on Google Kubernetes! ππ
π§ Emergency Alert: Ransomware strikes Veolia North America! π»π
Whoβs the Marky Mark? πππ
π¨ Kasseika Ransomware: BYOVD Tactic Unleashed! π¦
Ransomware group Kasseika has adopted the Bring Your Own Vulnerable Driver (BYOVD) attack, following groups like Akira, AvosLocker, BlackByte, and RobbinHood. π»
π‘οΈ Disarming Security Measures
BYOVD allows threat actors to disable antivirus processes, aiding in ransomware deployment, as observed in Kasseika's attack on Windows hosts.
π€ BlackMatter Connection
Kasseika shows ties to the now-defunct BlackMatter, indicating a potential handover or acquisition of BlackMatter's access by experienced threat actors.
π Attack Chain
Phishing emails grant initial access, leading to RATs for privileged access. The use of Sysinternals PsExec facilitates lateral movement within the target network.
π΅οΈ Martini.sys Driver
Kasseika employs the "Martini.sys" driver to disable 991 security tools, enhancing defence evasion capabilities.
π Global Targets
The ransomware encrypts data using ChaCha20 and RSA algorithms, demanding a 50 bitcoin payment within 72 hours, with victims required to share payment proof in a Telegram group.
π€« Covering Tracks
Kasseika wipes event logs using wevtutil.exe, operating discreetly to evade security tools.
π BianLian Group Shift
In a parallel development, BianLian ransomware group shifts from double extortion to encryption less extortion attacks, impacting various sectors globally.
π BianLian and Makop Ties
BianLian shares a custom .NET-based tool with Makop, hinting at potential connections or shared developer services.
π¦ Cybersecurity Alert
Stay vigilant with robust security measures, regular updates, and awareness against phishing attempts to mitigate ransomware risks. π‘οΈππ»

Learn AI in 5 minutes a day. We'll teach you how to save time and earn more with AI. Join 400,000+ free daily readers for trending tools, productivity boosting prompts, the latest news, and more.

Epic Gmail, as the kids say πππ
π¨ Critical Vulnerability in Google Kubernetes Engine (GKE): Sys:All Exploit Alert! π
Cybersecurity researchers at Orca have unearthed a critical loophole, codenamed Sys:All, affecting Google Kubernetes Engine (GKE), potentially giving threat actors control over Kubernetes clusters.
π Scope: Approximately 250,000 active GKE clusters globally are estimated to be vulnerable to this attack vector.
π₯ Vulnerability Origin
Stemming from a widespread misconception, the flaw arises from an incorrect understanding that the system:authenticated group includes only verified identities. In reality, it encompasses any Google-authenticated account, even those outside the organisation.
π Attack Implications
An external threat actor with a Google account could exploit this misconfiguration, utilising their Google OAuth 2.0 bearer token to hijack the cluster. This could lead to subsequent exploitation, including lateral movement, cryptomining, denial-of-service, and sensitive data theft.
π¨ Stealthy Exploitation
The approach used in this attack does not leave a trace linked back to the Gmail or Google Workspace account that acquired the OAuth bearer token.
π‘οΈ Mitigation Measures
Following responsible disclosure, Google has taken corrective actions, blocking the binding of the system:authenticated group to the cluster-admin role in GKE versions 1.28 and later. Users are advised not to bind the system:authenticated group to any RBAC roles and to assess and remove unsafe bindings from ClusterRoleBindings and RoleBindings.
π Secure Your Clusters
While no large-scale attacks have been recorded, the potential threat emphasises the need for users to secure their cluster access controls promptly.
π¦ Stay Vigilant
Regularly update GKE clusters, adhere to security best practices, and remain vigilant against potential exploitation of misconfigurations. πππ¨

π£ Catch of the Day!! πππ¦
π The Motley Fool: βFool me once, shame on β shame on you. Fool me β you can't get fooled again.β Good olβ George Dubya π Let us tell whoβs not fooling around though; thatβs the CrΓΌe π at Motley Fool. Youβd be a fool (alright, enough already! π) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! π Kidding aside, if you check out their website theyβve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets π€ (LINK)
π΅ Wander: Find your happy place. Cue Happy Gilmore flashback ποΈβ³πποΈ Mmmm Happy Placeβ¦ π So, weβve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itβs easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ποΈπ (LINK)
π Digital Ocean: If you build it they will come. Nope, weβre not talking about a baseball field for ghosts βΎπ»πΏ (Great movie, to be fair π). This is the Digital Ocean whoβve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youβll find yourself catching the buzz even if you canβt code (guilty π). But if you can and youβre looking for somewhere to test things out or launch something new or simply enhance what youβve got, weβd recommend checking out their services foβ sho π And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! πΏ (LINK)

Hackers: Water you waiting for? Pay up! π°π°π°
π¨ Ransomware Alert: Veolia North America Hit! ππ
Veolia North America, a subsidiary of the global conglomerate Veolia, has reported a ransomware attack impacting systems within its Municipal Water division. The breach prompted defensive measures, including temporarily taking affected systems offline.
βοΈ Response Measures
Veolia is actively collaborating with law enforcement and third-party forensics experts to assess the full impact of the attack. Defensive actions, including taking back-end systems offline, have been implemented to contain the breach.
πΌ Operational Impact
Although some online bill payment systems experienced delays due to the defensive measures, Veolia assures customers that payments made during the event have been applied, and accounts reflect updated information. No penalties or interest charges will be incurred due to the service interruption.
π§ Water Services Unaffected
Importantly, the incident appears confined to Veolia North America's internal back-end systems, with no evidence suggesting an impact on water or wastewater treatment operations.
π Data Impact
A limited number of individuals may have been affected, and Veolia is diligently working with a third-party forensics firm to assess the breach's extent on operations and systems.
π‘οΈ Security Measures
Veolia encourages vigilance but affirms the incident hasn't disrupted its critical water infrastructure operations. The company continues to prioritise security to safeguard its extensive water and wastewater services.
π Industry-Wide Threats: Recent ransomware attacks on water facilities globally, including Southern Water in the UK, highlight the escalating threats to critical infrastructure. Authorities like CISA and the FBI are actively issuing guidance to enhance the cybersecurity posture of water utilities.
π¦ Stay Secure
Organisations in critical sectors are urged to bolster cybersecurity defences, regularly update systems, and leverage incident response guides to mitigate the impact of potential ransomware attacks. Vigilance is key! πππ¨

ποΈ Extra, Extra! Read all about it!
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
The GeekAI: A daily 3 min newsletter on what matters in AI, with all the new AI things coming to market its good to stay ahead of the curve.
Wealthy Primate: Want to earn over $100k a year in IT or cybersecurity? 20 year veteran 'Wealthy Primate' might be able to help you climb that tree ππ΄ with his stick and banana approach ππ
Techspresso: Receive a daily summary of the most important AI and Tech news, selected from 50+ media outlets (The Verge, Wired, Tech Crunch etc)
Let us know what you think!
So long and thanks for reading all the phish!
Give us a rating? |

