News Items

  • news

    Visible to the public "Quantum Physics Secures Digital Payments"

    Using a combination of modern cryptographic techniques and the fundamental properties of quantum light, scientists from the University of Vienna have designed an unconditionally secure system for shopping in digital settings. The research team demonstrated how the quantum properties of light particles or photons can guarantee unconditional security for digital payments. In an experiment, the researchers showed that each transaction cannot be duplicated or redirected by malicious parties, and that the user's sensitive data remains confidential. This article continues to discuss the demonstration of quantum physics-secured digital payments.

    The University of Vienna reports "Quantum Physics Secures Digital Payments"

  • news

    Visible to the public "Online Safety Bill Undermines Privacy Online, Say UK's Top Cyber Security Experts"

    Scientists from the UK's National Research Centre on Privacy, Harm Reduction, and Adversarial Influence Online (REPHRAIN) urge government and parliament to consider independent scientific evaluation before passing the Online Safety Bill that could inadvertently enable surveillance technologies and undermine online security. The Online Safety Bill's provision on scanning messages exchanged via apps such as WhatsApp and Signal is the subject of heated debate due to its potential to have far-reaching consequences for human rights. With end-to-end encryption (E2EE), no third parties, including service providers like WhatsApp and Signal, can read messages as they travel from senders to recipients. According to the independent evaluation, although the tools do not propose to weaken or break the E2EE protocol, the confidentiality of the E2EE service users' communications cannot be ensured if content intended to be sent privately within the E2EE service is monitored pre-encryption. This article continues to discuss cybersecurity experts highlighting the "alarming misunderstandings and misconceptions" about the proposed Online Safety Bill.

    University College London reports "Online Safety Bill Undermines Privacy Online, Say UK's Top Cyber Security Experts"

  • news

    Visible to the public "Harvard University Web Flaw Exposed It to Remote Attacks"

    A Harvard University subdomain vulnerability exposed the website to Remote Code Execution (RCE) attacks, potentially enabling threat actors to steal and modify stored data. The Cybernews research team discovered the WebLogic Server vulnerability with a severity score of 9.8 out of 10, affecting the Harvard University courses website. WebLogic Server is a Java-based application server developed by the American multinational computer technology company Oracle. The vulnerability, tracked as CVE-2020-2551, enables an adversary to execute code remotely on a vulnerable server without authentication. Researchers note that exploiting this vulnerability allows an attacker to gain complete control over the vulnerable server and access or modify sensitive data or disrupt business operations. This article continues to discuss the potential exploitation and impact of the Harvard University subdomain vulnerability.

    Cybernews reports "Harvard University Web Flaw Exposed It to Remote Attacks"

  • news

    Visible to the public "After School Hacks, Ransomware Criminals Expose Kids' Private Files Online"

    The sensitive documents that ransomware groups stole from schools and posted online describe student assaults, psychiatric hospitalizations, abusive parents, and more. Complete assault case folios containing this information were among the over 300,000 files released online in March after the 36,000-student Minneapolis Public Schools refused to pay a $1 million ransom. Other exposed data included medical records, complaints of discrimination, Social Security numbers, and employee contact information. Rich in digitized information, schools are ideal targets for cybercriminals seeking sensitive files that were once stored on paper in locked cabinets. School districts are often significantly ill-equipped to properly defend themselves and respond when attacked, especially as they struggle to help students recover from the pandemic and face shrinking budgets. This article continues to discuss the ransomware attack faced by the Minneapolis school system, why schools are an attractive target for hackers, and schools' cybersecurity struggle.

    PBS reports "After School Hacks, Ransomware Criminals Expose Kids' Private Files Online"

  • news

    Visible to the public "Clever Letscall Vishing Malware Targets Android Phones"

    A voice-based phishing (vishing) malware is targeting Android phones and stealing sensitive financial information from victims, as part of a trend generating millions of dollars in profits using vishing attack techniques. These attacks, unlike the common and simple vishing scams, take over handsets, implant prerecorded voice messages, and reroute calls to scammer call centers. Researchers' analysis of the vishing campaign details how the malware operates and links it to a collection of malicious Android apps. When victims are tricked into installing the malware, malicious actors can launch a series of vishing attacks. The malware currently targets victims in South Korea, but researchers believe it could be easily adapted to operate in any country and sold as a service on the dark web. ThreatFabric researchers noted in a recent report that they discovered the malicious Letscall app during their routine threat-hunting activities. According to the researchers, the malware is particularly effective for stealing personal information and conducting financial scams. Once infected, threat actors can take over the device's calling function, thus enabling them to make spoofed calls claiming to be from a financial institution or to redirect calls to their own call center when the victim attempts to call their bank. This article continues to discuss findings regarding the vishing campaign targeting Android phones.

    SC Magazine reports "Clever Letscall Vishing Malware Targets Android Phones"

  • news

    Visible to the public "Apple Ships Urgent iOS Patch for WebKit Zero-Day"

    Apple recently rolled out an urgent software update to its iOS and iPadOS mobile operating systems and warned that zero-day exploitation has already been detected. For the second time since adopting the "rapid security responses" process to address zero-day attacks, Apple pushed iOS 16.5.1 (a) and iPadOS 16.5.1 (a) to devices globally after an anonymous researcher disclosed the underlying vulnerability. The security defect exists in WebKit, the browser engine used by Safari, Mail, AppStore, and many other apps on iOS and macOS-powered devices. Apple noted that processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. The issue was addressed with improved checks. The vulnerability is CVE-2023-37450. So far, in 2023, there have been 41 publicly documented cases of zero-day attacks, with more than one-fifth (22 percent) affecting software code on Apple devices.

    SecurityWeek reports: "Apple Ships Urgent iOS Patch for WebKit Zero-Day"

  • news

    Visible to the public "Personal Information of 11 Million Patients Stolen in Data Breach at HCA Healthcare"

    HCA Healthcare recently announced that the personal information of roughly 11 million patients was stolen in a data breach. The incident was discovered on July 5 after a threat actor posted on an underground forum information allegedly stolen from HCA Healthcare. The threat actor posted a list containing names, addresses, birth dates, gender information, phone numbers, email addresses, service dates, and appointment dates, according to HCA Healthcare. The company is currently investigating the incident and cannot confirm the number of individuals whose information was impacted. HCA Healthcare believes that the list contains approximately 27 million rows of data that may include information for approximately 11 million HCA Healthcare patients. The company noted that the information was extracted from "an external storage location exclusively used to automate the formatting of email messages." According to the healthcare services provider, clinical information, payment information, or other sensitive information (such as passwords, Social Security numbers, and driver's license numbers) was not stolen in the attack. HCA Healthcare has informed law enforcement of the incident and plans to contact the impacted individuals but believes the incident will not have a material impact. One of the largest healthcare services providers in the US, HCA Healthcare operates 180 hospitals and more than 2,300 ambulatory sites of care across 20 states and the United Kingdom.

    SecurityWeek reports: "Personal Information of 11 Million Patients Stolen in Data Breach at HCA Healthcare"

  • news

    Visible to the public "Moroccan Charged With OpenSea NFT and Crypto Theft"

    A Moroccan man has recently been charged with four counts relating to a scheme to steal nearly half-a-million dollars' worth of cryptocurrency and non-fungible tokens (NFT) from a US victim. Soufiane Oulahyane, 25, allegedly operated a phishing website that spoofed NFT marketplace OpenSea to access victims' cryptocurrency wallets and steal their money and NFTs. The Department of Justice (DoJ) stated that around September 2021, Oulahyane used paid advertising to ensure his phishing website appeared first in search results for "OpenSea." Victims visited the lookalike site as normal, believing they were interacting with the real thing, and entered their logins, only for them to be transmitted directly to Oulahyane. A Manhattan-based victim did exactly this on September 26, 2021, entering their crypto wallet seed phrase, which ended up in the hands of Oulahyane. The DoJ noted that almost immediately, he allegedly used that seed phrase to obtain unauthorized access to the victim's cryptocurrency wallet, transferring funds to another wallet under his control and selling dozens of the victim's NFTs on the OpenSea marketplace. In total, he is alleged to have made $448,923 from the stolen crypto and NFTs. Oulahyane is charged with wire fraud, use of an unauthorized access device, affecting transactions with an access device to receive something of value that is equal to or greater than $1000, and aggravated identity theft. These carry a total maximum combined sentence of 47 years in prison.

    Infosecurity reports: "Moroccan Charged With OpenSea NFT and Crypto Theft"

  • news

    Visible to the public "Cybercriminals Evolve Anti-detect Tooling for Mobile OS-Based Fraud"

    Researchers at Resecurity have identified the emergence of mobile Android-based tools called "mobile anti-detects." Criminals involved in online banking theft use these tools to impersonate compromised account holders and circumvent anti-fraud controls. The tools are priced between $700 and $1,000 and are designed for Android-based devices. They contain software that enables device firmware updates and customizable features, including fingerprint impersonation, GPS spoofing, and network anonymization. In addition, they include a version of HuskyDG's Magisk Delta, a popular tool for rooting and customizing Android devices by installing modules containing the "magiskhide" module. This article continues to discuss the emergence of adversarial mobile Android-based anti-detect tooling for mobile OS-based fraud.

    Security Affairs reports "Cybercriminals Evolve Anti-detect Tooling for Mobile OS-Based Fraud"

  • news

    Visible to the public "SCARLETEEL Cryptojacking Campaign Exploiting AWS Fargate in Ongoing Campaign"

    Threat actors are now targeting Amazon Web Services (AWS) Fargate as part of an ongoing attack campaign called SCARLETEEL. Alessandro Brucato, a security researcher at Sysdig, noted that cloud environments are still their primary target. However, tools and techniques have been adjusted to circumvent new security measures. There is also a more resilient and stealthy command-and-control (C2) architecture. The cybersecurity company first exposed SCARLETEEL in February 2023, detailing a sophisticated attack chain that resulted in the theft of proprietary data from AWS infrastructure and the launch of cryptocurrency miners. Cado Security's follow-up analysis uncovered possible ties to a prolific cryptojacking group known as TeamTNT, although Sysdig stated that it could be an imitator of TeamTNT's methods and attack patterns. The latest activity continues targeting AWS accounts by exploiting vulnerable public-facing web applications to gain persistence, steal intellectual property, and potentially generate $4,000 per day through cryptocurrency mining. This article continues to discuss the ongoing SCARLETEEL attack campaign exploiting AWS Fargate.

    THN reports "SCARLETEEL Cryptojacking Campaign Exploiting AWS Fargate in Ongoing Campaign"

  • news

    Visible to the public "10 Ways SecOps Can Strengthen Cybersecurity With ChatGPT"

    Security operations teams observe firsthand how quickly attackers reinvent their attack strategies, automate attacks on multiple endpoints, and do whatever it takes to evade cyber defenses. Attackers have shown themselves to be persistent. For example, they consider holidays opportunities to breach a company's cybersecurity defenses. Consequently, SecOps teams are on call 24 hours a day, seven days a week, including weekends and holidays, combating burnout, alert fatigue, and a lack of life balance. One of the most difficult aspects of leading a SecOps team is gaining scale from legacy systems that generate different types of alerts, alarms, and real-time data streams. The most troublesome and exploited gaps created by this lack of integration is not knowing whether a given identity has permission to use a particular endpoint and, if so, for how long. Systems unifying endpoints and identities help define the future of zero trust, and the Artificial Intelligence (AI)-driven chatbot ChatGPT demonstrates promise for addressing identity-endpoint gaps and other vulnerable threat surfaces. This article continues to discuss the potential use of ChatGPT to close the SecOps gap.

    VentureBeat reports "10 Ways SecOps Can Strengthen Cybersecurity With ChatGPT"

  • news

    Visible to the public "NIST Launches Generative AI Working Group"

    As security companies continue to release products and features that use advanced Artificial Intelligence (AI), researchers continue to warn of the security vulnerabilities and threats posed by this technology. The National Institute of Standards and Technology (NIST) has announced the formation of a new working group to help develop guidelines on how to implement generative AI more responsibly. Following the publication of the AI Risk Management Framework (AI RMF 1.0) in January and the debut of the Trustworthy and Responsible AI Resource Center in March, NIST launched the Public Working Group on Generative AI on June 22 to address the framework's application to new systems. The group will begin by developing a profile for AI use cases. The group will then test generative AI and conclude by evaluating how it can be used to address global issues in health, climate change, and more. This article continues to discuss the public working group that will develop guidance regarding the special risks of AI technologies that generate content.

    Dark Reading reports "NIST Launches Generative AI Working Group"

  • news

    Visible to the public "European Commission Adopts Adequacy Decision for Safe EU-US Data Flows"

    The European Commission has adopted its adequacy decision for the EU-US Data Privacy Framework. The decision is that under the new framework, the US will provide adequate protection comparable to that of the European Union for personal data transferred from the EU to US companies. Based on the new adequacy decision, personal data can transfer securely from the EU to US framework participants without the need for additional data protection safeguards. The EU-US Data Privacy Framework introduces new binding safeguards to address all the concerns raised by the European Court of Justice, such as limiting US intelligence services' access to EU data to what is necessary and proportionate, and establishing a Data Protection Review Court (DPRC) to which EU individuals will have access. This article continues to discuss the European Commission adopting its adequacy decision for the EU-US Data Privacy Framework.

    Help Net Security reports "European Commission Adopts Adequacy Decision for Safe EU-US Data Flows"

  • news

    Visible to the public "VMware Warns of Exploit Available for Critical vRealize RCE Bug"

    VMware has warned customers that exploit code for a critical vulnerability in the VMware Aria Operations for Logs analysis tool, which helps administrators manage terabytes of application and infrastructure logs in large environments, is now available. The flaw, tracked as CVE-2023-20864, is a deserialization vulnerability that was patched in April. It allows unauthenticated attackers to execute code remotely on unpatched appliances. Successful exploitation allows threat actors to execute arbitrary code as root following low-complexity attacks that do not require user interaction. This article continues to discuss the critical vulnerability in the VMware Aria Operations for Logs analysis tool for which exploit code is now available.

    Bleeping Computer reports "VMware Warns of Exploit Available for Critical vRealize RCE Bug"

  • news

    Visible to the public "Virginia Tech Researchers Find Vulnerabilities in Code of Popular Reverse Engineering Tools"

    Using mathematical principles to understand the behavior of code, a team of Virginia Tech researchers discovered that the source code in popular reverse engineering tools such as Ghidra may not be as secure as its creators intended. Through their mathematical proofs, software programmers can ensure their code does not experience unintended behaviors that hackers find appealing. Security professionals typically assess a program by testing its machine code. This machine code, which consists of a series of zeros and ones, is what a computer executes. However, the code can be difficult for humans to understand, particularly in the absence of the original source code used to develop the machine code. Using reverse engineering tools, these long and difficult-to-decipher numerical lines of information can be translated into source code much closer to spoken language, thus enabling security professionals to see what is actually happening in the binary code. Unfortunately, these tools may overlook important machine code behaviors, especially those that were not intended by the original programmers who wrote the source code, allowing hackers to find vulnerabilities. This article continues to discuss the team's discovery of vulnerabilities in the code of popular reverse engineering tools.

    Virginia Tech reports "Virginia Tech Researchers Find Vulnerabilities in Code of Popular Reverse Engineering Tools"

  • news

    Visible to the public "Stressed for a Bit? Then Don't Click It, Cybersecurity Experts Advise"

    According to a study conducted by the Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL), employees who experience a specific form of stress are more likely to fall victim to a phishing attack. While most, if not all, employees experience stress, scientists have identified a particular type of stress that indicates who is more likely to click on bogus content that could lead to malware and other cyber troubles. The work could help employees and their employers in bolstering cybersecurity defenses by identifying the indicators that a user is about to take a risky action. The results of the study involving 153 participants were recently published in the Journal of Information Warfare. Although the relatively small sample size hindered the researchers' ability to identify all of the relationships between the more than two dozen variables they examined, the relationship between stress and response to the simulated phishing email was statistically significant. This article continues to discuss the phishing psychology study that explores what makes workers vulnerable.

    Pacific Northwest National Laboratory reports "Stressed for a Bit? Then Don't Click It, Cybersecurity Experts Advise"

  • news

    Visible to the public "picoCTF Empowers Teachers to Bring Cybersecurity Education Into Their Classrooms"

    Carnegie Mellon University's (CMU) picoCTF has introduced students of all ages to the field of cybersecurity through its annual Capture-the-Flag competition and year-round educational platform for more than a decade. Recent outreach efforts by picoCTF included bringing together high school teachers from across the US for the first-ever National Security Agency (NSA) GenCyber Teachers' Program. During the five-day in-person camp, attendees were introduced to new tools, resources, and best practices in cybersecurity education. Teachers left the experience with lesson plans that are ready to be implemented in the upcoming school year. David Brumley, professor in CMU's Electrical and Computer Engineering Department and co-founder of picoCTF, emphasized that training teachers is the only way to expand cybersecurity education. This article continues to discuss picoCTF and how it helps to close the cybersecurity talent gap.

    CyLab reports "picoCTF Empowers Teachers to Bring Cybersecurity Education Into Their Classrooms"

  • news

    Visible to the public "macOS Devices Under Threat as Data Thief Emerges From Shadows"

    According to the cybersecurity company Guardz, a new information-stealing program is available on the dark web. The ShadowVault program is a malicious entity that can be hired for $500 per month. The program can extract passwords, credit card information, cookies, and all Chromium and Firefox browser data from macOS devices. ShadowVault was first discovered in June by the cybersecurity company. Since such malware has long targeted Microsoft Windows devices, macOS was typically regarded as a more secure operating system. Historically, threat actors have focused on weaponizing malware outside of Apple's "closed" ecosystem. Investigators from Guardz discovered ShadowVault on the dark web forum XSS, after monitoring it using anonymous avatars. This article continues to discuss the new infostealer program on the dark web known as ShadowVault.

    Cybernews reports "macOS Devices Under Threat as Data Thief Emerges From Shadows"

  • news

    Visible to the public "Flaw in Revolut Payment Systems Exploited to Steal $20 Million"

    Organized criminal groups exploited a vulnerability in Revolut's payment systems and stole more than $20 million, according to the Financial Times, which cited sources knowledgeable about the situation. Over 30 million customers worldwide are served by Revolut, a privately held financial technology firm. It is licensed and managed by the Bank of Lithuania and has its headquarters in London. In September 2022, the business experienced a data breach that affected 50,150 customers globally. The attackers stole the names, addresses, email addresses, phone numbers, a portion of the payment card data, and account information of these customers. A few days later, some Revolut users complained online that they began receiving SMS phishing messages designed to take financial and personal information. According to unidentified sources cited by the Financial Times, the newly disclosed cash grab occurred in early 2022. This article continues to discuss the exploitation of a vulnerability in Revolut's payment systems by criminal groups.

    Help Net Security reports "Flaw in Revolut Payment Systems Exploited to Steal $20 Million"

  • news

    Visible to the public "Charming Kitten Hackers Use New 'NokNok' Malware for macOS"

    Researchers observed a new campaign that they linked to the Charming Kitten Advanced Persistent Threat (APT) group in which hackers used new macOS-targeting NokNok malware. The campaign began in May and uses a different infection chain than previously observed, with LNK files deploying the payloads as opposed to the typical malicious Word documents seen in the group's previous attacks. According to Mandiant, Charming Kitten, also known as APT42 or Phosphorus, has launched at least 30 operations in 14 countries since 2015. Google has established a connection between the threat actor and the Iranian state, specifically the Islamic Revolutionary Guard Corps (IRGC). This article continues to discuss the new campaign attributed to the Charming Kitten APT group involving NokNok malware.

    Bleeping Computer reports "Charming Kitten Hackers Use New 'NokNok' Malware for macOS"

  • news

    Visible to the public "RomCom RAT Targeting NATO and Ukraine Support Groups"

    The threat actors responsible for the RomCom Remote Access Trojan (RAT) are suspected of launching phishing attacks against the NATO summit in Vilnius and a known organization supporting Ukraine abroad. The BlackBerry Threat Research and Intelligence team discovered two malicious documents submitted on July 4, 2023, from a Hungarian IP address. RomCom, also known as Tropical Scorpius, UNC2596, and Void Rabisu, was recently observed launching cyberattacks against Ukrainian politicians working closely with Western nations and a US healthcare organization aiding refugees fleeing the war-torn nation. The group has used spear-phishing emails to direct victims to cloned websites harboring trojanized versions of popular software as part of geopolitically motivated attack chains. Militaries, food supply chains, and Information Technology (IT) companies have been targeted. This article continues to discuss the threat actors behind the RomCom RAT targeting NATO and Ukraine support groups.

    THN reports "RomCom RAT Targeting NATO and Ukraine Support Groups"

  • news

    Visible to the public "Banking Firms Under Attack by Sophisticated 'Toitoin' Campaign"

    A sophisticated and evasive malware campaign targets businesses in Latin America with a multi-stage attack that begins with phishing and culminates with deploying a novel Trojan dubbed Toitoin that captures sensitive system information and data from financial institutions. Researchers from ZScaler discovered the campaign, which consists of a multi-stage infection chain that uses custom-built modules at each stage to inject malicious code into remote processes and bypass user account control (UAC). The multi-stage infection chain observed in this campaign uses custom-built modules that utilize various evasion and encryption techniques. Among the evasion techniques is the use of Amazon Elastic Compute Cloud (EC2) to host malware within compressed ZIP archives. This article continues to discuss findings regarding the Toitoin campaign.

    Dark Reading reports "Banking Firms Under Attack by Sophisticated 'Toitoin' Campaign"

  • news

    Visible to the public "Razer Investigates Data Breach Claims, Resets User Sessions"

    Gaming gear company Razer has recently reacted to rumors of a massive data breach with a short statement on Twitter, letting users know that they started investigating the matter. Razer is a popular American-Singaporean tech firm focusing on gaming hardware, selling high-quality peripherals, powerful laptops, and apparel. Information about a potential data breach at the company emerged on Saturday when someone posted on a hacker forum that they had stolen the source code, database, encryption keys, and backend access logins for Razer[.]com, the company's main website. The user offered to sell that data for $100,000 worth of Monero (XMR) cryptocurrency and urged interested individuals to contact him directly to close the deal. The publisher of the post has not set any limitations or exclusivity, meaning anyone willing to pay the requested amount would get the entire data set. The hacker posted screenshots as proof of the breach. The screenshots show file lists and trees, email addresses, source code allegedly for anti-cheat and reward systems, API details, Razer Gold balances, and more. Cybersecurity analysts at FalconFeedsio spotted the announcement on the hacker forum and shared it with the public.

    BleepingComputer reports: "Razer Investigates Data Breach Claims, Resets User Sessions"

  • news

    Visible to the public "Social Security Numbers, Other Data May Have Been Stolen in LCC Data Breach"

    More than 750,000 people may have had their social security numbers stolen in a data breach at Lansing Community College (LCC) in late 2022 and early 2023. The community college notified "757,832 employees, students, and vendors that their personal information may have been accessed or acquired by an unknown unauthorized person." The data breach was discovered and reported by the college in March. Because of the breach, LCC shut down for several days. The school said an "unauthorized actor" had access to "certain systems" from Dec. 25, 2022, until discovered on March 15, 2023. It took until May 24 to determine what information the actor had access to. The school noted that, to date, they have no evidence of any identity theft or fraud in connection with this incident. The community college reported an annual enrollment of 14,000 students in the 2021-22 school year, with 1,673 faculty and staff members. Some people who received letters about having data stolen attended the school decades ago.

    Yahoo News reports: "Social Security Numbers, Other Data May Have Been Stolen in LCC Data Breach"

  • news

    Visible to the public "75% of Consumers Prepared to Ditch Brands Hit by Ransomware"

    According to new research by Object First, 40% of consumers harbor skepticism regarding organizations' data protection capabilities, and 75% would shift to alternate companies following a ransomware attack. The company noted that consumers are requesting increased data protection from vendors, with 55% favoring companies with comprehensive data protection measures such as reliable backup and recovery, password protection, and identity and access management strategies. During the survey, the company found that 81% of consumers report feeling "very scared or worried" about their data being held by organizations lacking robust resilience against ransomware. After an attack, 1 in 3 consumers demand evidence of resilient backup and recovery strategies, and 30% lose all confidence in the company's data protection plan. 75% of consumers are ready to shift to a competitor should a company suffer a ransomware attack. Moreover, a second ransomware attack causes 61% of consumers to reassess their negative perception of data protection and recovery practices. The company noted that ransomware attacks impact generations differently. While 37% of Gen Z prefers an apology from companies experiencing a ransomware attack, ranking 12% higher than monetary compensation, Baby Boomers are less forgiving. 74% of them agree their trust in the vendor is irreparably damaged after suffering more than one ransomware attack, compared to only 34% of Gen Z.

    Help Net Security reports: "75% of Consumers Prepared to Ditch Brands Hit by Ransomware"

  • news

    Visible to the public "Cyber Extortion Cases Surge 39% Annually"

    According to the international law firm RPC, incidents of online extortion reported to the police increased by nearly two-fifths in 2022 compared to a year previously. The new study revealed 3200 reports of cyber extortion last year, including cases of ransomware, sextortion, and cases where data is stolen and held for ransom. That's up from 2300 cases in 2021, according to RPC. RPC also found that there was an 8% increase in reports made by victims of email and social media hacking, up from 13,500 in 2021 to 14,600 in 2022. Partner and head of cyber and tech insurance at RPC, Richard Breavington, stated that although attacks against larger organizations fell over the past year, SMEs and individuals are still struggling to manage cyber risk effectively. Breavington noted that there are an increasing number of cyber-insurance policies available, some of which are aimed at SMEs that cover the cost of dealing with a data breach. However, some of these policies will require basic security steps to have been taken. Just 36% of micro and small businesses currently have cyber insurance, with the figure rising to 63% of mid-sized businesses and 55% of large businesses. During the study, RPC also found that other forms of cybercrime are falling. Malware reports decreased from 7200 in 2021 to 5300 last year, while reports linked to the hacking of servers, PCs, and phones declined 10% over the period to 5200 last year.

    Infosecurity reports: "Cyber Extortion Cases Surge 39% Annually"

  • news

    Visible to the public "Twitter User Exposes Nickelodeon Data Leak"

    Confidential information, including unreleased TV shows, scripts, and materials, belonging to the popular children's television channel Nickelodeon have recently been reportedly compromised in a significant data leak. According to social media reports, an individual allegedly dumped approximately 500GB of animation files. The authenticity of the leaked content is yet to be confirmed by Nickelodeon. A spokesperson at Nickelodeon stated that the material in question appears to be related to production files and possibly dates back several decades. They further clarified that there is no indication of long-form content, employee data, or user data involved in the leak. The leak came to public attention when a Twitter user, operating under the handle GhostyTongue, began disclosing sensitive information related to the alleged breach on June 29. According to vx-underground, the compromise originated from an authentication issue within Nickelodeon's "consumer products and experience" portal, potentially allowing unauthorized individuals to access sensitive data from the animation department. Nickelodeon is currently investigating the incident.

    Infosecurity reports: "Twitter User Exposes Nickelodeon Data Leak"

  • news

    Visible to the public "MOVEit Transfer Faces Another Critical Data-Theft Bug"

    Another critical SQL injection vulnerability has recently been disclosed and patched in Progress Software's MOVEit Transfer software, the fourth such flaw revealed in the space of a month. The security bug (CVE-2023-36934) is distinct from the former zero-day flaw that's being exploited with resounding success by the Cl0p ransomware gang. But like that bug, it could allow unauthenticated cyber attackers to access MOVEit Transfer databases and, from there, execute malware, manipulate files, or exfiltrate information. The company noted that an attacker could submit a crafted payload to a MOVEit Transfer application endpoint which could result in modification and disclosure of MOVEit database content. The flaw hasn't been exploited in the wild so far, according to the company, but given its severity, users are urged to patch it as soon as possible, along with two high-severity vulnerabilities (CVE-2023-36932 and CVE-2023-36933) disclosed at the same time. The bugs affect MOVEit Transfer versions 12.1.10 and earlier, 13.0.8 and earlier, 13.1.6 and earlier, 14.0.6 and earlier, 14.1.7 and earlier, and 15.0.3 and earlier.

    Dark Reading reports: "MOVEit Transfer Faces Another Critical Data-Theft Bug"

  • news

    Visible to the public "New Campaigns Use Malicious npm Packages to Support Phishing Kits"

    Several malicious npm packages on the open-source repository have been used in supply chain attacks and phishing campaigns, according to researchers at ReversingLabs. The researchers noted that the packages pose a dual threat, affecting application end users while also supporting email-based phishing attacks, mainly targeting Microsoft 365 users. The researchers discovered more than a dozen malicious npm packages posted between May 11 and June 13. These packages imitated legitimate modules, such as jquery, which has millions of weekly downloads. The researchers stated that although the malicious packages were downloaded roughly 1000 times, they were swiftly removed from npm after detection. ReversingLabs has named this campaign "Operation Brainleeches" due to the malicious infrastructure used to facilitate the theft of victim data. In the first part of the campaign, the researchers identified six packages used exclusively in phishing attacks. These packages were linked to phishing campaigns that harvested user data through deceptive Microsoft[.]com login forms delivered via malicious email attachments. The second tranche comprised seven packages targeting email phishing campaigns and software supply chain attacks. The researchers noted that these packages aimed to implant credential harvesting scripts into applications that unwittingly incorporated the malicious npm packages. During the analysis, the researchers revealed that the malicious npm packages played a role in active phishing attacks, likely conducted by low-skilled actors. While the full extent of the supply chain attack is unclear, using obfuscated code and invocating popular package names like jquery raise concerns about potential compromises.

    Infosecurity reports: "New Campaigns Use Malicious npm Packages to Support Phishing Kits"

  • news

    Visible to the public "Former Contractor Employee Charged for Hacking California Water Treatment Facility"

    A 53-year-old man from Tracy, California, has recently been charged for allegedly hacking into the systems of a water treatment facility in an attempt to delete critical software. The suspect, Rambler Gallo, has been charged with "transmitting a program, information, code, and command to cause damage to a protected computer," but this is a case of unauthorized access rather than actual hacking. Gallo was an employee for a company contracted by the town of Discovery Bay in California to operate its water treatment facility, which serves 15,000 residents. He worked at the company between 2016 and the end of 2020, and during this time, he allegedly installed software that allowed him to access the facility's systems from his personal computer. After he resigned in January 2021, authorities in the Northern District of California stated that he used that remote access software to enter the water facility's systems and "transmitted a command to uninstall software that was the main hub of the facility's computer network and that protected the entire water treatment system, including water pressure, filtration, and chemical levels. Gallo faces up to 10 years in prison and a $250,000 fine.

    SecurityWeek reports: "Former Contractor Employee Charged for Hacking California Water Treatment Facility"

  • news

    Visible to the public "Two Apps Hosted on Google Play Caught Sending User Data to Chinese Servers"

    Security researchers at security firm Pradeo have discovered two file management applications hosted on Google Play, with more than 1.5 million combined downloads, that are sending user data to servers in China. Published to Google Play by the same developer, the two applications, "File Recovery and Data Recovery" and "File Manager," were seen launching without user interaction and silently exfiltrating a trove of sensitive user information. According to the researchers, the two spyware apps would send out users' contact lists, media content, real-time location, network provider, country code, network code, operating system information, and device brand and model. Specifically, the researchers noted that each application performs more than a hundred transmissions of the collected data, an amount that is so large it is rarely observed. The collected information is sent to multiple servers in China, which have been identified as malicious. The researchers stated that in Google Play, both applications claim to collect no user data but also state that if any data is collected, users could not request the data to be deleted. The two applications have no reviews, suggesting their download counts might have been artificially inflated. The researchers believe that the hacker used an install farm or mobile device emulators to fake those numbers, hence making its applications better ranked in stores' category lists and increasing their apparent legitimacy. A look at the history of these applications shows that both were published in Google Play roughly a month ago and that both received updates at the end of June. Within a week of receiving the updates, their download counts went up by roughly 500,000 each. The researchers noted that the applications were also found to request advanced permissions that allow them to restart devices and then launch automatically, without user interaction, and to hide their icons, to make it difficult for users to remove them. Both applications appear to have been removed from Google Play.

    SecurityWeek reports: "Two Apps Hosted on Google Play Caught Sending User Data to Chinese Servers"

  • news

    Visible to the public "Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert"

    The U.S. government's cybersecurity agency CISA recently warned that hackers linked to the Truebot malware operation are exploiting a known vulnerability in the Netwrix Auditor application to break into organizations in the U.S. and Canada. In a joint advisory issued alongside the FBI and information sharing partners in Canada, CISA urged network admins to immediately apply patches for remote code execution flaws in IT auditing software sold by Netwrix. The vulnerability being exploited is CVE-2022-31199 and was discovered by researchers at Bishop Fox exactly one year ago with warnings that attackers can use this issue to achieve arbitrary code execution on servers running Netwrix Auditor. Security researchers at Bishop Fox stated that since this service is typically executed with extensive privileges in an Active Directory environment, the attacker would likely be able to compromise the Active Directory domain. CISA and law enforcement partners say malicious hackers are exploiting this Netwrix Auditor flaw to deliver new Truebot malware variants and to collect and exfiltrate information against organizations in the U.S. and Canada. The joint advisory noted that based on confirmation from open-source reporting and analytical findings of Truebot variants, threat actors leveraged the malware through phishing campaigns containing malicious redirect hyperlinks. In addition to applying all available patches, CISA also recommends that organizations reduce the threat of malicious actors using remote access tools by implementing application controls to manage and control the execution of software, including allow-listing remote access programs.

    SecurityWeek reports: "Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert"

  • news

    Visible to the public "Cisco Enterprise Switch Flaw Exposes Encrypted Traffic"

    Cisco recently discovered a critical security flaw in the Cisco Application Centric Infrastructure (ACI) Multi-Site CloudSec encryption feature, potentially allowing hackers to read or alter inter-site encrypted traffic. The vulnerability (CVE-2023-20185) affects Cisco Nexus 9000 Series Fabric Switches running releases 14.0 and later, specifically when they are part of a multi-site topology and have the CloudSec encryption feature enabled. Cisco noted that it attributed the vulnerability to an implementation issue with the ciphers used by the CloudSec encryption feature on the affected switches. Cisco stated that while CloudSec encryption is designed to protect data transmitted between sites, by exploiting the vulnerability, an unauthenticated attacker with a position between ACI sites could intercept and compromise the encrypted traffic. Currently, Cisco has not released any software updates to address this vulnerability, and no workarounds are available. Cisco stated that customers who are currently using the Cisco ACI Multi-Site CloudSec encryption feature for the Cisco Nexus 9332C and Nexus 9364C Switches and the Cisco Nexus N9K-X9736C-FX Line Card are advised to disable it and to contact their support organization to evaluate alternative options.

    Infosecurity reports: "Cisco Enterprise Switch Flaw Exposes Encrypted Traffic"

  • news

    Visible to the public "Shell Confirms MOVEit-Related Breach After Ransomware Group Leaks Data"

    Energy giant Shell has recently confirmed that personal information belonging to employees has been compromised due to the recent MOVEit Transfer hack. In a brief statement issued on Wednesday, Shell finally confirmed being hit by the MOVEit hack, clarifying that the MFT software was "used by a small number of Shell employees and customers." The company noted that some personal information relating to employees of the BG Group had been accessed without authorization. The company stated that it is unclear exactly what type of information has been compromised, but impacted individuals are being notified. Shell confirmed the incident after the Cl0p cybercrime gang published files allegedly stolen from the firm. The group has made available 23 archive files labeled "part1," which could suggest that they are in possession of more data. When Cl0p published the Shell files, the cybercriminals noted that the company did not want to negotiate.

    SecurityWeek reports: "Shell Confirms MOVEit-Related Breach After Ransomware Group Leaks Data"

  • news

    Visible to the public "28,000 Impacted by Data Breach at Pepsi Bottling Ventures"

    A data breach at independent bottling company Pepsi Bottling Ventures recently impacted more than 28,000 individuals. Discovered on January 10, the data breach occurred between December 23, 2022, and January 19, 2023, and resulted in the personal, financial, and health information of the company's employees being accessed by an unauthorized party. On February 10, Pepsi Bottling Ventures started informing the impacted individuals that the attackers gained access to certain systems containing their personal information but did not reveal how many individuals were affected. Pepsi Bottling Ventures recently informed the Maine Attorney General's Office that the attackers had access to the personal information of more than 28,000 individuals. According to the company, the compromised data includes names, addresses, email addresses, financial account information, ID numbers, driver's license numbers, Social Security numbers, digital signatures, medical history details, and health insurance information. The company says the stolen information belongs to current and former employees and contractors.

    SecurityWeek reports: "28,000 Impacted by Data Breach at Pepsi Bottling Ventures"

  • news

    Visible to the public "Police Arrest Suspected OPERA1ER Cybercrime Kingpin"

    Police have recently announced the arrest of an individual they believe to be a key figure in a prolific cybercrime group that has stolen at least $11m from banks and telcos over a four-year period. Interpol stated that it worked with the authorities in Cote d'Ivoire, alongside Afripol, Group-IB, and the Orange CERT Coordination Center (Orange-CERT-CC) to make the arrest as part of Operation Nervone. The group in question, OPERA1ER (aka NX$M$, DESKTOP Group, and Common Raven), may have actually stolen as much as $30m from dozens of attacks across 15 countries in Africa, Asia, and Latin America. Group-IB first discovered the group in 2018 after the threat intelligence firm spotted spear-phishing emails containing remote access Trojans (RATs) and other malware like password sniffers and dumpers.

    Infosecurity reports: "Police Arrest Suspected OPERA1ER Cybercrime Kingpin"

  • news

    Visible to the public "Exploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks"

    Security researchers at VulnCheck have found that hundreds of energy organizations could be exposed to attacks due to an actively exploited vulnerability affecting a solar power monitoring product made by Contec. Contec specializes in custom embedded computing, industrial automation, and IoT communication technology. The company's SolarView solar power monitoring and visualization product is used at more than 30,000 power stations, according to its website. The vulnerability is tracked as CVE-2022-29303 and is described as a code injection issue affecting SolarView version 6.0. The vulnerability can be exploited remotely by unauthenticated attackers. The researchers noted that the security hole was only patched with the release of version 8.0, and versions dating back to at least 4.0 are impacted. A Shodan search shows more than 600 internet-exposed SolarView systems, including over 400 running vulnerable versions.

    SecurityWeek reports: "Exploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks"

  • news

    Visible to the public "Japan’s Nagoya Port Suspends Cargo Operations Following Ransomware Attack"

    The Nagoya Port Unified Terminal System (NUTS) in Japan recently suffered a significant system outage that was attributed to a ransomware attack. According to a notice (in Japanese) sent to customers, the attack disrupted container operations across all terminals within the port. In particular, container import and export operations via trailer transportation have been temporarily halted at the terminals. Shipping companies responsible for the arrival and departure of container vessels are advised to consult with the primary carrier for instructions and updates regarding loading and unloading operations. Upon investigation, officials from the Nagoya Port Transport Association Terminal Subcommittee and the Aichi Prefectural Police Headquarters confirmed the cyberattack's nature. Recovery measures are underway, with all stakeholders dedicating their resources to expedite the process. In terms of attribution, the Nagoya Harbor Transportation Association said the LockBit ransomware gang was behind the attack.

    SecurityWeek reports: "Japan's Nagoya Port Suspends Cargo Operations Following Ransomware Attack"

  • news

    Visible to the public "Microsoft Denies Major 30 Million Customer-Breach"

    Microsoft has recently hit back at claims from Anonymous Sudan that it managed to breach the company and obtain account access for tens of millions of customers. Anonymous Sudan, which has been linked in the past to pro-Kremlin groups like Killnet, posted the details of its alleged raid on Telegram. In one of the posts, it said: "We announce that we have successfully hacked Microsoft and have access to a large database containing more than 30 million Microsoft accounts, emails, and passwords. We will begin selling this database, so if you're interested, contact us at our bot to negotiate." Anonymous Sudan said it would be selling the haul for $50,000. It attached what it claimed to be a "small sample" of compromised details as proof of its word. Microsoft, in a brief statement, stated that at this time, their analysis of the data shows that this is not a legitimate claim and an aggregation of data. Microsoft noted that they have seen no evidence that their customer data has been accessed or compromised. Anonymous Sudan has caused trouble for Microsoft in the past. The tech giant admitted in mid-June that the group, which it tracks as "Storm-1359," had been responsible for Layer 7 DDoS attacks against it earlier that month. In February, Anonymous Sudan claimed responsibility for a number of DDoS attacks against Swedish companies, which it said were retaliation for an incident of Quran burning near Turkey's embassy in Stockholm. However, experts at the time assessed the cyberattacks may have been a Russian false-flag campaign designed to continue whipping up hatred towards Sweden in Muslim countries like Turkey, which has a veto over the country's accession to NATO.

    Infosecurity reports: "Microsoft Denies Major 30 Million Customer-Breach"

  • news

    Visible to the public "Over Two-Thirds of FortiGate Firewalls Still at Risk"

    According to security researchers at Bishop Fox, approximately 69% of FortiGate firewalls affected by a recently discovered FortiOS vulnerability remain unpatched. The flaw CVE-2023-27997 could lead to remote code execution (RCE). It was patched by Fortinet in mid-June. A recent advisory published by the researchers stated that they have successfully developed an exploit for the vulnerability. The researchers noted that their exploit smashes the heap, connects back to an attacker-controlled server, downloads a BusyBox binary, and opens an interactive shell. The entire process reportedly takes approximately one second, significantly faster than an earlier demonstration provided by Lexfo. The researchers stated that a search on Shodan, a search engine for internet-connected devices, revealed that nearly 490,000 SSL VPN interfaces exposed on the internet are affected by this vulnerability. According to the researchers, it is important to note that previous reports estimating 250,000 exposed FortiGate firewalls based on SSL certificates alone may not accurately reflect the actual number of vulnerable devices. This would be because the search query used in those reports did not specifically target SSL VPN interfaces, where this vulnerability resides. The researchers noted that an in-depth analysis revealed that only 153,414 devices on the internet had been patched, leaving a concerning 69% of devices unpatched. The researcher's analysis also highlighted the distribution of different major operating system versions. While a significant number of installations run the latest version, FortiOS 7, there are still devices running older versions, particularly version 5, which has reached its end of life.

    Infosecurity reports: "Over Two-Thirds of FortiGate Firewalls Still at Risk"

  • news

    Visible to the public "Firefox 115 Patches High-Severity Use-After-Free Vulnerabilities"

    Mozilla recently announced the release of Firefox 115 to the stable channel with patches for a dozen vulnerabilities, including two high-severity use-after-free bugs. The first high-severity issue is tracked as CVE-2023-37201 and is described as a use-after-free flaw in WebRTC certificate generation. WebRTC is an open source project and enables real-time communication in web browsers and mobile applications via application programming interfaces (APIs). Mozilla noted that an attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS. The second high-severity vulnerability, CVE-2023-37202, is described as a potential use-after-free issue from compartment mismatch in the open source JavaScript and WebAssembly engine SpiderMonkey. Mozilla stated that cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free. Mozilla noted that the latest Firefox update also addresses high-severity memory safety bugs that might have led to the execution of arbitrary code. The flaws are collectively tracked as CVE-2023-37211 and CVE-2023-37212. Firefox 115 also includes patches for eight medium-severity vulnerabilities leading to malicious sites placing trackers without permissions, arbitrary code execution, spoofing attacks, URL spoofing, download of files containing malicious code, use-after-free conditions, and tricking users into submitting sensitive data to malicious sites. Recently, Mozilla also announced that Firefox ESR 102.13 and Thunderbird 102.13 were released with patches for five vulnerabilities, including the high-severity use-after-free and memory safety bugs that were addressed in Firefox 115.

    SecurityWeek reports: "Firefox 115 Patches High-Severity Use-After-Free Vulnerabilities"

  • news

    Visible to the public "UEFI: 5 Recommendations for Securing and Restoring Trust"

    Despite declining overall computer sales in 2022, 286.2 million Windows-based PCs were sold. Each computer was released with firmware based on the Unified Extensible Firmware Interface (UEFI), an alternative to the Basic Input/Output System (BIOS) that provides an extensible intersection between hardware and the operating system. The UEFI standard also identifies reliable methods for updating this firmware from the operating system. Most users are unaware of this piece of software, but it is on attackers' radar. The "BlackLotus" attack exposed a bootkit, an advanced form of malicious software that is difficult to detect or remove. Microsoft and other vendors are still struggling to detect this bootkit reliably or protect even completely patched machines against this attack. Soon after that attack, another one involving a leak of sensitive information, including private keys from multiple PC manufacturers, occurred. These private keys, typically used to cryptographically sign UEFI-based software, could be used to create malicious software capable of achieving high-privileged access to the CPU. The bootkits plant malicious code into highly trusted software that is critical for these devices' normal operation. Vijay S. Sarvepalli, a senior security solutions architect with the Carnegie Mellon Software Engineering Institute's (SEI) CERT Division, further expands on the concerns raised by these attacks as well as highlights recommendations to secure the UEFI ecosystem and restore trust in this firmware. This article continues to discuss recommendations to secure the UEFI ecosystem and restore trust.

    SEI reports "UEFI: 5 Recommendations for Securing and Restoring Trust"

  • news

    Visible to the public "Commonwealth Cyber Initiative Funds New Round of CyberArts Projects"

    In the Commonwealth Cyber Initiative (CCI) 2023 CyberArts Program, researchers from across Virginia will explore cybersecurity issues through an artistic lens. These issues include Artificial Intelligence (AI), privacy, fraud, misinformation, and more. In June, CCI funded six projects conducted by five Virginia universities and colleges, including Blue Ridge Community College, James Madison University, Old Dominion University, Virginia Commonwealth University, and Virginia Tech, in the second installment of its CyberArts Program. According to Luiz DaSilva, the CCI executive director, the CCI CyberArts Program makes cybersecurity more approachable by incorporating performances, interactive artworks, and visual arts. For one of the funded 2023 CyberArts projects, "Cyber Insecurity: Exploring Vulnerabilities of Artificial Intelligence Through Visual Art," researchers will create an exhibit comprised of interactive installations, photography, sculpture, and digital art to raise awareness of the cybersecurity vulnerabilities of Al systems and spark conversation about AI's ethical implications. This article continues to discuss the CCI CyberArts Program.

    Virginia Tech reports "Commonwealth Cyber Initiative Funds New Round of CyberArts Projects"

  • news

    Visible to the public "Catching the Catfish: How University Students Won a National Cybersecurity Contest"

    A team of four undergraduate students from the University of Nevada, Reno, who competed in the 2023 Summer Social Engineering Event hosted by Temple University, found success by scamming an Internet scammer. The team named "WolfHack@UNR" won the three-day online competition aimed at bringing further attention to the relevance of social engineering in cybersecurity. This year's social engineering competition focused on romance scams or "catfishing," the practice of luring someone into a relationship by creating a fake online persona. Catfishing is not a technical computer problem or vulnerability that a cybersecurity student would typically encounter, but it is a significant problem. According to data from the Federal Trade Commission (FTC) cited on the competition website, nearly 70,000 people reported a romance scam in 2022, and losses reached $1.3 billion. Since these schemes rely on manipulation and deception, a competition to identify and prove catfishing differs slightly from the typical cybersecurity contest that tests technical expertise. One of the winning team members noted that it was not a typical cybersecurity competition and was almost psychological. This article continues to discuss the national cybersecurity contest and how the WolfHack@UNR team won it.

    The University of Nevada, Reno reports "Catching the Catfish: How University Students Won a National Cybersecurity Contest"

  • news

    Visible to the public "In-Office Work Is the Real Threat to Cybersecurity"

    New research indicates that remote employees take more security-related measures than their in-office counterparts. As organizations worry about the potential dangers of remote work, new research from the Farmer School of Business at Miami University suggests that the actual risks lie within the office, and it will inform future discussions. Researchers from the Farmer School of Business found that remote employees demonstrate a higher level of cybersecurity awareness and take more security-related precautions than their in-office counterparts. According to the author Joseph K. Nwankpa, when they surveyed remote workers, they expected the results to disclose cybersecurity complacency. However, the survey revealed remote cyber vigilance. This unexpected result can be attributed to the so-called "Peltzman Effect" and the complacency framework, which the study uses to explore how remote work may cause a moral hazard with respect to employee cybersecurity awareness and security-based precautions. Office workers often become complacent, trusting their employers to handle cyber threats on their behalf, whereas remote employees tend to experience a greater sense of responsibility for their own cybersecurity. This article continues to discuss key findings from the study on the roles of cyber awareness and cybersecurity policies among remote workers.

    Fast Company reports "In-Office Work Is the Real Threat to Cybersecurity"

  • news

    Visible to the public "The Latest Victim of the MOVEit Data Breach is the Department of Health and Human Services"

    Federal health officials have recently notified Congress of a data breach that could involve the information of more than 100,000 people. A representative of the U.S. Department of Health and Human Services said Thursday that attackers gained access to the department's data by exploiting a vulnerability in widely used file-transfer software. Other government agencies, major pension funds, and private businesses also have been affected by a Russian ransomware gang's so-called supply chain hack of the software MOVEit. The HHS official did not provide details on the type of data affected but said none of the department's systems or networks were compromised.

    The Associated Press reports: "The Latest Victim of the MOVEit Data Breach is the Department of Health and Human Services"

  • news

    Visible to the public "A New Wave of Insider Threats Will Be Driven by 'Shadow AI'"

    According to Imperva, poor data controls and the introduction of new generative Artificial Intelligence (AI) tools based on Large Language Models (LLMs) will cause an increase in insider data breaches in the coming year. As the effectiveness of chatbots driven by LLMs has grown, many organizations have implemented bans or limitations on the data that can be shared with them. However, because most organizations (82 percent) lack an insider risk management strategy, they remain unaware of instances of employees using generative AI to help them with tasks such as writing code or filling out requests for proposals (RFPs). Terry Ray, SVP, Data Security GTM and Field CTO at Imperva, argues that prohibiting employees from using generative AI is futile. Ray added that, as with other technologies, people will always find a way to bypass such restrictions, so prohibitions create an infinite game of whack-a-mole for security teams, without actually securing the enterprise. Malicious intent is not required to cause a data breach, Ray emphasized. Instead of relying on employees not to use unauthorized tools, Imperva suggests that businesses should focus on securing their data and ensuring they can answer important questions such as who is accessing it, what is being accessed, how, and from where. This article continues to discuss the expectation that AI will lead to a significant rise in insider data breaches and the steps organizations should take to protect themselves.

    Continuity Central reports "A New Wave of Insider Threats Will Be Driven by 'Shadow AI'"

  • news

    Visible to the public "MITRE Publishes the Top 25 Most Dangerous Software Weaknesses"

    The US cybersecurity research organization MITRE has released its list of the top 25 most dangerous software vulnerabilities for 2023, with the top three remaining the same as last year's list. The 2023 Common Weakness Enumeration (CWE) list derives from analyzing public vulnerability data in the National Vulnerability Database (NVD) for root cause mappings to CWE weaknesses for the two prior calendar years. An attacker may exploit the vulnerabilities to take control of applications and systems, steal their data, or otherwise interfere with their operation. According to MITRE, this type of trend analysis on vulnerability data enables organizations to make more informed investment and policy decisions concerning vulnerability management. Many professionals who work with software will find this list to be a useful risk mitigation resource. The list is a helpful resource for businesses seeking to strengthen their Continuous Integration/Continuous Delivery (CI/CD) environments. Despite the existence of vulnerability scanning tools, this list serves as a reminder that even the most widely used products can contain errors. This article continues to discuss MITRE's list of the top 25 most dangerous software weaknesses for 2023.

    ITPro reports "MITRE Publishes the Top 25 Most Dangerous Software Weaknesses"

  • news

    Visible to the public "Employees Worry Less About Cybersecurity Best Practices in The Summer"

    According to security researchers at ThreatX, IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely. The researchers surveyed 2,000 employees' across the US and UK to assess whether employees' behaviors during the summer are inadvertently increasing API and application risk. The researchers found that 55% of employees admit to relying solely on their mobile devices while working from vacation and holiday destinations in the summer. Further, 25% claim that they aren't concerned about ensuring network connections are secure when accessing company data, and only 12% use a VPN when traveling and working remotely. The researchers noted that the results show that employees increasingly rely on personal devices to access corporate data during the summer, which could open the door to cyber criminals seeking to penetrate corporate networks. The researchers stated that with 38% of respondents neglecting to notify their employers when working from new locations while traveling, it becomes harder for IT teams to monitor BYOD policies and application usage. The researchers stated that the summer months lead to increased cybersecurity risks as employees' behaviors shift and as cyber hygiene becomes laxer.

    Help Net Security reports: "Employees Worry Less About Cybersecurity Best Practices in The Summer"

  • news

    Visible to the public "Torrent of Image-Based Phishing Emails Are Harder to Detect and More Convincing"

    A torrent of image-based phishing emails has been released. They contain QR codes to bypass security protections and provide a level of customization that makes it easier to deceive recipients. In many cases, the emails are sent from a compromised email address within the recipient's organization, providing a false sense of authenticity, according to researchers from the security firm Inky. The emails detected by Inky instruct the employee to address security issues, such as a missing two-factor authentication (2FA) enrollment, and warn of potential consequences if the employee does not comply. Those who click on the QR code are led to a website masquerading as a legitimate one used by the organization, but it captures and sends credentials to the attackers. Inky referred to the campaign's strategy as "spray and pray" because the threat actors behind it send emails to as many individuals as possible. Several factors distinguish this campaign from others. First, there is no text in the emails. Instead, only an image file is attached, thus enabling the emails to evade security measures that analyze the text-based words within an email. Some email programs and services automatically display attached images in the message body by default. Therefore, recipients often miss that the image-based email contains no text. This article continues to discuss image-based phishing emails that embed QR codes into their bodies.

    Ars Technica reports "Torrent of Image-Based Phishing Emails Are Harder to Detect and More Convincing"