News Items

  • news

    Visible to the public "miniOrange's WordPress Social Login and Register Plugin Was Affected by a Critical Auth Bypass Bug"

    Wordfence researchers have found a vulnerability in miniOrange's WordPress Social Login and Register plugin that allows an unauthenticated attacker to gain access to any account on a website by knowing the associated email address. Instead of requiring visitors to spend time filling out a traditional registration form, the plugin enables them to register/login to a website using their social media profiles. More than 30,000 WordPress websites have actively installed the plugin. The vulnerability, tracked as CVE-2023-2982, with a CVSS Score of 9.8, affects versions up to 7.6.4. According to the researchers, the encryption key used to protect the information used during the login process via social media accounts is hardcoded and is not unique for each WordPress installation. This allows attackers to craft a valid request containing a properly encrypted email address, which vulnerable plugin versions use to determine the user during the login process. This article continues to discuss the critical authentication bypass flaw found in miniOrange's WordPress Social Login and Register plugin that can allow access to any account on a site.

    Security Affairs reports "miniOrange's WordPress Social Login and Register Plugin Was Affected by a Critical Auth Bypass Bug"

  • news

    Visible to the public "Russian Satellite Telecom Dozor Allegedly Hit by Hackers"

    Hackers aligned with the Private Military Corporation (PMC) Wagner attacked Dozor-Teleport, a satellite communications provider used by Russia's Ministry of Defense and security services. Attackers targeted the infrastructure of the satellite communication provider, causing damage to user terminals. Herm1t, a pro-Ukrainian hacker and malware historian, says that attackers could have significantly damaged client equipment and the network core. According to the Internet Intelligence Research Lab's Internet Outage Detection and Analysis (IODA) project, the Dozor network went offline for over 10 hours. Russia's Ministry of Defense, ships of the Northern Fleet, the Federal Security Service (FSB), Rosatom, and other organizations use Dozor-Teleport. Users on a Telegram channel managed by Herm1t observed that the attack resembles Russia's cyberattack on Viasat's satellites. This article continues to discuss hackers targeting the Russian satellite communications provider Dozor-Teleport.

    Cybernews reports "Russian Satellite Telecom Dozor Allegedly Hit by Hackers"

  • news

    Visible to the public "Medtronic Fixes Critical Flaw in Cardiac Device Data System"

    Medtronic's heart monitor data management system contains a vulnerability of critical severity that, if exploited, could lead to Remote Code Execution (RCE) or a Denial-of-Service (DoS) condition. The deserialization of untrusted data flaw, tracked as CVE-2023-31222, for which patches are now available, exists on the Paceart Optima system. The software application collects, stores, and retrieves patient cardiac device data from remote heart monitors. It runs on healthcare organizations' Windows servers. The Paceart Messaging Service, which allows healthcare delivery organizations to send fax, email, and pager messages within the Paceart Optima system, is particularly vulnerable. The system's Paceart Messaging Service is optional, as opposed to being configured by default, but when it is enabled, the vulnerability is remotely exploitable and has a low attack complexity. The US Cybersecurity and Infrastructure Security Agency (CISA) warned that RCE could lead to the deletion, theft, or modification of the Paceart Optima system's cardiac device data, or the system's use for further network penetration. A DoS attack could render the Paceart Optima system unresponsive. This article continues to discuss the critical-severity vulnerability found in a heart monitor data management system.

    Decipher reports "Medtronic Fixes Critical Flaw in Cardiac Device Data System"

  • news

    Visible to the public "200,000 WordPress Sites Exposed to Attacks Exploiting Flaw in ‘Ultimate Member’ Plugin"

    Over 200,000 WordPress websites have recently been exposed to ongoing attacks targeting a critical vulnerability in the Ultimate Member plugin. The plugin is designed to make it easy for users to register and log in on sites and allows site owners to add user profiles, define roles, create custom form fields and member directories, and more. The vulnerability is tracked as CVE-2023-3460 (CVSS score of 9.8). It allows attackers to add a new user account to the administrator's group. Some of the plugin's users have observed the creation of rogue accounts and reported them this week, but the attacks appear to have been ongoing at least since the beginning of June. According to researchers at WPScan, the issue is rooted in a conflict between the plugin's blocklist logic and the way WordPress treats metadata keys. The researchers noted that Ultimate Member uses blocklists to store metadata keys that users should not manipulate and checks these lists whenever users attempt to register these keys when creating accounts. Due to the difference in operation between the plugin and WordPress, attackers were able to trick the plugin into updating metadata keys, including one that stores user roles and capabilities. The plugin's maintainers, who describe the issue as a privilege escalation bug, have attempted to address it in the last two versions of Ultimate Member, but they have reportedly failed to patch it fully. However, they did acknowledge the ongoing in-the-wild exploitation. Site owners are advised to disable Ultimate Member to prevent exploitation of the vulnerability. They should also audit all administrator roles on their sites to identify rogue accounts.

    SecurityWeek reports: "200,000 WordPress Sites Exposed to Attacks Exploiting Flaw in 'Ultimate Member' Plugin"

  • news

    Visible to the public "Researcher Outlines Known RFC Vulnerabilities in SAP Software That Lead to Unauthenticated Remote Code Execution"

    A researcher has identified what he deems to be several critical vulnerabilities impacting enterprise software solutions operating on ubiquitous SAP platforms. In a paper presented at a recent European cybersecurity conference, Fabian Hagg describes his work on testing the server-to-server communications bugs and design flaws found in SAP NetWeaver Application Server ABAP (AS ABAP) and ABAP Platform. He said that the laboratory analysis revealed alternate logon material, cryptographic failures, memory corruptions, and Advanced Business Application Programming (ABAP) programming pitfalls. The vulnerabilities are associated with SAP's long-standing proprietary interface protocol, Remote Function Call (RFC). Three are from 2021 and 2022, while the fourth was discovered in January this year. Two are rated 9.8 on the CVSS severity scale. Although patches have been developed for all four vulnerabilities, users with unpatched versions of SAP software remain vulnerable. This article continues to discuss the attack chain presented at a security conference that could impact all enterprise software solutions running on top of SAP AS ABAP platform technology.

    SC Media reports "Researcher Outlines Known RFC Vulnerabilities in SAP Software That Lead to Unauthenticated Remote Code Execution"

  • news

    Visible to the public "LockBit Claims TSMC Hack, Demands $70m Ransom"

    National Hazard Agency, a sub-group of the LockBit ransomware gang, has recently posted the name of Taiwan Semiconductor Manufacturing Company (TSMC), the world's largest chip manufacturer, on LockBit's dark web leak site on June 29, 2023. The threat actor has demanded TSCM pay a $70m ransom to prevent them from leaking the data they allegedly possess. The victim was initially given seven days to respond, but the deadline has since been extended to August 6. Currently, there is no information on the type of data LockBit may have extorted or whether they have any TSMC data at all. At the same time, it has been reported that Kinmax Technologies, one of TSMC's suppliers, which also works with Cisco, HPE, Microsoft, Citrix, VMware, and Nvidia has suffered a cyberattack, which led to the leak of information pertinent to server initial setup and configuration. Kinmax Technologies did not mention TSMC directly, and there is no official communication from the chip manufacturer currently If the breach is confirmed, it would be the fourth-largest ransom demand in ransomware history, according to William Thomas, a cyber threat intelligence researcher at Equinix. TSMC produces 65% of the world's semiconductors and 90% of the most advanced nodes. It has an estimated annual revenue of over $74bn in 2023.

    Infosecurity reports: "LockBit Claims TSMC Hack, Demands $70m Ransom"

  • news

    Visible to the public "Pro-Russia DDoSia Hacktivist Project Sees 2,400% Membership Increase"

    The pro-Russia crowdsourced Distributed Denial-of-Service (DDoS) project called "DDoSia" has grown 2,400 percent in less than a year, with thousands of people participating in the launch of attacks against Western organizations. The project was initiated by a pro-Russian hacktivist group known as "NoName057(16)" in the summer of 2022, and it rapidly attracted 400 active members and 13,000 users on its Telegram channel. In a new report published by Sekoia, analysts note that the DDoSia platform has grown significantly over the year, with about 10,000 active members contributing to the project's DDoS attacks and 45,000 subscribers to its main Telegram channel. In addition to the increase in community size, which has resulted in more disruptive attacks, DDoSia has improved its toolset and added binaries for all main operating system platforms, expanding its reach to a larger audience. This article continues to discuss the DDoSia platform experiencing a significant membership increase.

    Bleeping Computer reports "Pro-Russia DDoSia Hacktivist Project Sees 2,400% Membership Increase"

  • news

    Visible to the public "Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes"

    Cybersecurity researchers have shared details regarding the "Fluhorse" Android malware family. According to Fortinet FortiGuard Labs, the malware represents a significant transition because it includes malicious components directly within the Flutter code. Check Point first documented Fluhorse in early May 2023, describing its attacks on users in East Asia via rogue apps masquerading as ETC and VPBank Neo, which are widely used in Taiwan and Vietnam. Phishing is the initial vector of infection for the malware. The malicious apps aim to steal credentials, credit card information, and two-factor authentication (2FA) codes. The most recent findings from Fortinet, which reverse-engineered a Fluhorse sample uploaded to VirusTotal on June 11, 2023, indicate that the malware has evolved by hiding the encrypted payload within a packer. This article continues to discuss the latest findings regarding the Fluhorse Android malware family.

    THN reports "Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes"

  • news

    Visible to the public "CyberSentry Program Launches Webpage"

    CyberSentry is a US Cybersecurity and Infrastructure Security Agency (CISA)-managed capability for threat detection and monitoring, governed by an agreement between CISA and voluntarily participating critical infrastructure partners that operate major systems supporting National Critical Functions (NCFs). CyberSentry looks for known and unknown malicious activity that impacts Information Technology (IT) and Operational Technology (OT) networks. CISA's CyberSentry program supports trusted partnerships between CISA and each participating organization. The program has had much success, such as discovering an infection on a partner's Human Machine Interface (HMI) equipment that had been improperly patched and secured. CISA analysts promptly alerted the partner to the issue and provided recommendations for preventative measures. CyberSentry data also helped quickly identify partners impacted by the SolarWinds supply chain breach. This article continues to discuss the mission and recent successes of CISA's CyberSentry program.

    CISA reports "CyberSentry Program Launches Webpage"

  • news

    Visible to the public "6 Ways Cybersecurity Is Gut-Checking the ChatGPT Frenzy"

    Generative Artificial Intelligence (AI), ChatGPT, OpenAI, and Large Language Models (LLMs) are now almost daily topics of conversation within the cybersecurity community. Some small and large security vendors have incorporated AI chatbots into their offerings. Currently, investment in GPT-based AI security is one of the most active startup funding areas, and it is impossible to avoid encountering research on potential generative AI-related cybersecurity threats and countermeasures. This article continues to discuss how the security conversation regarding the new generation of AI is beginning to deepen.

    Dark Reading reports "6 Ways Cybersecurity Is Gut-Checking the ChatGPT Frenzy"

  • news

    Visible to the public "Global Rise in DDoS Attacks Threatens Digital Infrastructure"

    According to Nexusguard, the total number of Distributed Denial-of-Service (DDoS) attacks increased by 115.1 percent in 2022 compared to 2021 globally. The data also revealed that attackers continued to change their threat vectors by focusing on Internet Service Provider (ISP) application platforms, online databases, and cloud storage systems. As organizations transfer more workloads to the cloud, this has resulted in a more significant global impact. Although the number of DDoS attacks more than doubled from 2021 to 2022, the maximum size decreased by 48.2 percent to 361.9 gigabits per second (Gbps). The average size of attacks decreased by 22.4 percent. In 2022, 85.6 percent of DDoS threats were single-vector attacks, which is nearly identical to the percentage observed in 2021. User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) based attacks were the most common, accounting for 72.5 percent and 23 percent of all attacks, respectively. This article continues to discuss key findings from Nexusguard's DDoS Statistical Report for 2022.

    Help Net Security reports "Global Rise in DDoS Attacks Threatens Digital Infrastructure"

  • news

    Visible to the public "DHS S&T Seeks Solutions for Privacy-Preserving Digital Credential Wallets & Verifiers"

    The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has issued a new solicitation for the development, improvement, and implementation of a new set of tools that protect the privacy of individuals when using digital credentials for various purposes. The solicitation, "Privacy-Preserving Digital Credential Wallets & Verifiers," is administered by S&T's Silicon Valley Innovation Program (SVIP). It seeks advanced solutions to support a privacy-preserving digital credentialing ecosystem for DHS components and offices. Melissa Oh, managing director of SVIP, emphasizes that in an increasingly interconnected world, protecting the privacy of individuals who store their credentials in digital wallets is crucial to ensuring the security and confidentiality of their digital interactions. The solicitation builds on the success and global adoption of the open, standards-based digital credentialing solutions developed in response to SVIP's previous "Preventing Forgery & Counterfeiting of Certificates and Licenses" topic call. This article continues to discuss the new solicitation announced by DHS S&T to create solutions for privacy-preserving digital credential wallets and verifiers.

    DHS reports "DHS S&T Seeks Solutions for Privacy-Preserving Digital Credential Wallets & Verifiers"

  • news

    Visible to the public "Rise of the Script Kiddie: A Tenth of Children Say They Can Hack Websites"

    One in ten children believe they can hack into websites and online accounts, but only 8 percent of parents are concerned about this possible issue. Censuswide surveyed 500 children in the UK aged 12 to 17. Less than half of parents (44 percent) limit their children's Internet access, indicating that technically savvy children have ample opportunities to test and refine their hacking skills. According to researchers, the problem arises when children view hacking as a "victimless crime." Six out of ten children said they would feel guilty if they stole money from a parent's wallet or purse, but only half of that proportion would feel remorseful if they used someone else's credit card information to make online purchases. Researchers have noted that an increasing number of children are exposed to online hacking groups who could lure them into cybercriminal activities. This article continues to discuss survey findings regarding the rise in child hackers as well as one participant who got into hacking at the age of 12 and was able to take control of his school's computers.

    Cybernews reports "Rise of the Script Kiddie: A Tenth of Children Say They Can Hack Websites"

  • news

    Visible to the public "DOE Suffers Data Breach; 45K Students Affected"

    The Department of Education (DOE) recently experienced a data breach incident on Saturday, June 24. The DOE stated that the third-party file-sharing software MOVEit, which is used by the DOE to transfer documents and data internally and to vendors, including special education providers, was targeted in the incident. While a review is still ongoing, the DOE said approximately 45,000 students, in addition to DOE staff and related service providers, were affected by the system intrusion. Roughly 19,000 documents were accessed without authorization. The data impacted by the breach includes Social Security numbers, employee ID numbers, and student ID numbers. The DOE stated that it is working to determine exactly which confidential information was exposed and the impact for each affected individual.

    Queens Chronicles "DOE Suffers Data Breach; 45K Students Affected"

  • news

    Visible to the public "Sweetwater UHSD Data Breach Compromises Student, Staff Info"

    Sweetwater Union High School District recently announced that the personal information of students, families, and current and former employees was compromised in a February data breach. Between Feb. 11 and 12, an unauthorized person gained access to the district's computer network and took files that contained the personal information of an unknown number of people, including employees' dependents. The district, which serves about 36,000 middle and high school students, initially would not say whether there had been a cybersecurity attack. The district has not said how many people were potentially affected by the incident and has not publicly announced what information was compromised. Employees and parents began receiving letters last week from the district informing them about the breach. In one letter received by a teacher, it said that an unauthorized person gained access to files that included their name and Social Security number. The district said it is offering a one-year credit monitoring and identity theft protection service via a third party to those affected.

    Goverment Technology reports: "Sweetwater UHSD Data Breach Compromises Student, Staff Info"

  • news

    Visible to the public "Dozens of Businesses Hit Recently by ‘8Base’ Ransomware Gang"

    According to security researchers at VMware, a ransomware gang named 8Base was the second most active group in June 2023. 8Base has been active since March 2022 and mainly focused on small businesses. The researchers noted that the group engages in double extortion tactics, publicly naming and shaming victims to compel them to pay the ransom. To date, the 8Base gang has hit approximately 80 organizations across sectors such as automotive, business services, construction, finance, healthcare, hospitality, IT, manufacturing, and real estate. While analyzing the group's activity, the researchers identified a resemblance with another relatively unknown ransomware gang, RansomHouse, which is known for purchasing leaked data and then extorting companies for money. According to the researchers, similarities were found in communication style and ransom notes, with the leak sites of the groups using nearly identical language, albeit different visuals. The main difference between the two groups is the fact that, while RansomHouse is openly recruiting for partners, 8Base is not. 8Base was seen using ransom notes that match both RansomHouse and Phobos. The researchers noted that it is possible that 8Base has used different types of ransomware as part of its normal operation. Whether 8Base is an offshoot of Phobos or RansomHouse remains to be seen.

    SecurityWeek reports: "Dozens of Businesses Hit Recently by '8Base' Ransomware Gang"

  • news

    Visible to the public "Using Electromagnetic Fault Injection Attacks to Take Over Drones"

    IOActive researchers explored the development of fault injection attacks against hardened Unmanned Aerial Vehicles (UAVs) as the use of drones continues to increase. The researchers focused on executing code on a commercially available drone, supporting security features such as the use of signed and encrypted firmware, Trusted Execution Environment (TEE), and Secure Boot, through the use of non-invasive methods. The research aimed to achieve the goal by using electromagnetic (EM) side-channel attacks or EM fault injection (EMFI). They tested the attacks against DJI's Mavic Pro, one of the most popular quadcopter drones. This article continues to discuss the possibility of EMFI attacks on drones.

    Security Affairs reports "Using Electromagnetic Fault Injection Attacks to Take Over Drones"

  • news

    Visible to the public Pub Crawl #75


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Serious Vulnerability Exposes Admin Interface of Arcserve UDP Backup Solution"

    A new vulnerability, tracked as CVE-2023-26258, was identified in the web management interface of Arcserve UDP by security researchers at MDSec. The researchers noted that successfully exploiting the bug could allow an attacker to access the administrative interface. According to the researchers, the flaw was discovered in the way HTTP requests containing login information were transmitted between the web browser and the administrative interface. Specifically, the security researchers observed that a user validation method being invoked creates a client acting as a proxy that communicates with a web service responsible for validating the supplied credentials. The researchers noted that because the location of the web service is supplied in the request, they were able to modify the request so that the client would contact an HTTP server controlled by them. Further analysis of the requests transmitted between the client and the web service allowed the researchers to identify information such as OS version, domain name, and administrator account name, along with a method that validates users by UUID, and an AuthUUID value. The researchers stated that once they supplied the AuthUUID value to the web service, they received the cookie for a valid administrator session in response, which allowed them to retrieve the encrypted password for that account. MDSec reported the vulnerability in early February 2023. A patch was released on June 27, roughly four months after a CVE identifier was assigned to the bug. Arcserve UDP 9.1 resolves CVE-2023-26258, along with an Apache Commons FileUpload (CVE-2023-24998) flaw, three Spring Framework vulnerabilities made public last year, and various other issues.

    SecurityWeek reports: "Serious Vulnerability Exposes Admin Interface of Arcserve UDP Backup Solution"

  • news

    Visible to the public "Over 130 Organizations, Millions of Individuals Believed to Be Impacted by MOVEit Hack"

    More victims of the MOVEit hack have recently come to light, with a total of over 130 organizations and millions of individuals believed to be impacted. Brett Callow, a threat analyst at cybersecurity firm Emisoft, stated that he is aware of 138 organizations to have been impacted by the campaign, with the data breaches resulting in the personal information of more than 15 million people being compromised. The Russia-linked cybercrime group known for operating the Cl0p ransomware has taken credit for the attack. Cl0p has claimed to have hit many organizations, and they have started naming those that have refused to pay up or enter negotiations. They have recently named over 60 entities that appear to have been targeted through the MOVEit vulnerability, which the group may have been testing since 2021. Callow stated that the list includes major organizations such as Shell (they have already leaked data allegedly stolen from the energy giant), Siemens Energy, Schneider Electric, UCLA, Sony, EY, PwC, Cognizant, and AbbVie. Law firms Kirkland & Ellis and K&L Gates have also been added to Cl0p's leak website.

    SecurityWeek reports: "Over 130 Organizations, Millions of Individuals Believed to Be Impacted by MOVEit Hack"

  • news

    Visible to the public "Linux Version of Akira Ransomware Targets VMware ESXi Servers"

    The "Akira" ransomware operation now uses a Linux encryptor to encrypt VMware ESXi Virtual Machines (VMs) in double extortion attacks against companies globally. Akira first appeared in March 2023, targeting Windows systems in different industries, including education, finance, real estate, and manufacturing. The threat actors, like other enterprise-targeting ransomware groups, steal data from breached networks and encrypt files to carry out double extortion on victims, demanding payments of several million dollars. Since its emergence, the ransomware operation has claimed more than 30 victims in the US alone, with two different surges in ID Ransomware submissions at the end of May and in June. The malware analyst rivitna recently shared a sample of the new encryptor on VirusTotal after discovering the Linux variant of Akira. This article continues to discuss the Linux version of Akira ransomware targeting VMware ESXi servers.

    Bleeping Computer reports "Linux Version of Akira Ransomware Targets VMware ESXi Servers"

  • news

    Visible to the public "North Korean Hacker Group Andariel Strikes With New EarlyRat Malware"

    "Andariel," a threat actor aligned with North Korea, used "EarlyRat," a previously undocumented malware, in attacks exploiting the Log4j Log4Shell vulnerability. According to researchers, Andariel infects machines by executing a Log4j exploit, which then downloads additional malware from the command-and-control (C2) server. Andariel, also known as "Silent Chollima" and "Stonefly," is associated with North Korea's Lab 110, a primary hacking unit that also includes APT38 (also known as "BlueNoroff") and other subordinate elements tracked collectively under the name "Lazarus Group." In addition to conducting espionage attacks against foreign government and military entities of strategic interest, the threat actor is known to conduct cybercrime as an extra source of income. Some of the cyber weapons in its arsenal include the Maui ransomware strain and numerous Remote Access Trojans (RATs) and backdoors such as Dtrack, NukeSped, MagicRAT, and YamaBot. This article continues to discuss the North Korea-aligned threat actor Andariel using the new EarlyRat malware.

    THN reports "North Korean Hacker Group Andariel Strikes With New EarlyRat Malware"

  • news

    Visible to the public "Popular Generative AI Projects Pose Serious Security Threat"

    According to Rezilion, many popular generative Artificial Intelligence (AI) projects pose an increased security risk. Open source projects that use insecure generative AI and Large Language Models (LLMs) also have a poor security posture, resulting in a risky environment for organizations. The popularity of generative AI has grown, allowing users to create, interact with, and consume content in unprecedented ways. With the advancements in LLMs, such as Generative Pre-Trained Transformers (GPT), machines can now generate text, images, and code. The number of open source projects implementing these technologies is rising exponentially. More than 30,000 open source projects on GitHub are now using the GPT-3.5 family of LLMs. However, GPT and LLM projects pose several security risks to organizations that use them, such as trust boundary risks, data management risks, inherent model risks, and general security issues. This article continues to discuss generative AI security risks.

    Help Net Security reports "Popular Generative AI Projects Pose Serious Security Threat"

  • news

    Visible to the public "NPM Plagued With 'Manifest Confusion' Malware-Hiding Weakness"

    A former GitHub employee claims that a vulnerability in Node Package Manager (npm) could enable anyone to hide malicious dependencies and scripts within their packages. Npm, owned by GitHub, is used for sharing JavaScript code among over 17 million developers. In a June 27 blog post, Darcy Clarke, the former staff engineering manager for npm's command line interface team, described a site flaw he called "manifest confusion." The "confusion" stems from the fact that npm does not validate the metadata associated with a given package, allowing any publisher to hide certain information about their packages, such as the scripts it executes and the dependencies on which it relies. In recent months, an increasing number of hackers have devised novel methods to poison packages and spread malware along the code supply chain, putting pressure on npm and other similar repositories. This article continues to discuss the manifest confusion weakness in npm.

    Dark Reading reports "NPM Plagued With 'Manifest Confusion' Malware-Hiding Weakness"

  • news

    Visible to the public "CyberCamp Introduces Students to Cybersecurity"

    The Center for Cyber Law, Policy, and Security (Pitt Cyber), together with Pitt Information Technology (Pitt IT), recently held the sixth annual Air Force Associate (AFA) CyberCamp. The EQT Foundation and Grable Foundation, along with the Pitt Community Engagement Centers and Pitt Engineering, supported the one-week camp. High school students in the Pittsburgh area who are interested in learning about cybersecurity principles, skills, and future career opportunities were welcome to participate for free. Students were taught throughout the week on cyber ethics and security fundamentals, as well as Windows, Ubuntu, and Linux security policies. Although many people believe cybersecurity is all about the attack strategies used by malicious actors, CyberCamp participants learned defensive strategies to thwart hackers. This article continues to discuss the sixth annual AFA CyberCamp and the importance of increasing cybersecurity interest among young people.

    The University of Pittsburgh reports "CyberCamp Introduces Students to Cybersecurity"

  • news

    Visible to the public "Making 911 Calls More Secure"

    The National Science Foundation (NSF) has awarded a $1.2 million grant to a team of researchers from Purdue University and Michigan State University to continue enhancing the security of cellular 911 calls. In the US, the Federal Communications Commission (FCC) has enacted regulations to make it easier for cell phone users to contact 911 in an emergency. The research team became interested in how US cell phone services comply with regulations. They discovered that compliance with the regulations could compromise security. For example, companies cannot apply encryption and integrity protection to emergency calls as they would to non-emergency calls. This can create a security vulnerability in cellular 911 communications. The team will perform various research tasks to facilitate an interdisciplinary understanding of emergency service attacks against the mobile ecosystem. They will also analyze associated research issues as well as develop algorithms, tools, and platforms to bolster the security of cellular emergency services. This article continues to discuss the project aimed at reducing cybersecurity risks to protect cellular 911 calls.

    Purdue University reports "Making 911 Calls More Secure"

  • news

    Visible to the public "To Pay or Not to Pay? Ransomware Attacks Are the New Kidnapping"

    In recent years, ransomware attacks have evolved into a persistent security risk. The inability to effectively respond to this challenge has normalized what should be intolerable: organized cybercriminals harbored by hostile states disrupting and extorting businesses and critical services regularly. Following last year's cyberattacks on Optus and Medibank, the Australian government has signaled its willingness to address one of the most difficult and divisive questions in cyber policy, which is whether ransomware payments should be prohibited. According to the specialist ransomware negotiation company Coveware, the profits ransomware attackers generate outweigh the risks. There are almost no entry barriers, and the profit margin can reach 98 percent. Therefore, a ban on payments makes logical sense. Stopping payments will eliminate the primary motivation for ransomware attacks, and those in search of a fast buck will look elsewhere. This article continues to discuss the debate regarding ransomware payments.

    Australian Strategic Policy Institute reports "To Pay or Not to Pay? Ransomware Attacks Are the New Kidnapping"

  • news

    Visible to the public "CISA Releases Cloud Services Guidance and Resources"

    The Cybersecurity and Infrastructure Security Agency (CISA) has released the first series of final security guidance resources under its Secure Cloud Business Applications (SCuBA) project: the Extensible Visibility Reference Framework (eVRF) Guidebook and a Technical Reference Architecture (TRA) document. With input from the public comment period in 2022, the final guidance documents will help public and private entities in implementing cloud security and resilience best practices. The eVRF Guidebook provides an overview of the eVRF framework, which allows organizations to identify visibility data, mitigate threats, understand the extent to which products and services offer visibility data, and identify potential data gaps. Organizations can use the TRA Document as a security guide to adopting technology for cloud deployment, adaptable solutions, secure architecture, and zero trust frameworks. This article continues to discuss CISA's release of the first series of final security guidance resources under its SCuBA project.

    CISA reports "CISA Releases Cloud Services Guidance and Resources"

  • news

    Visible to the public "NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments"

    Cybercriminals frequently target software development and delivery supply chains. These environments can be used to compromise cloud deployments throughout the automated software development and delivery lifecycle. The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released a Cybersecurity Information Sheet (CSI) titled "Defending Continuous Integration/Continuous Delivery (CI/CD) Environments" to provide guidance for incorporating security best practices into typical software development and operations (DevOps) CI/CD environments. The CSI recommends best practices for authentication and access control, development environments and tools, and the development process for hardening CI/CD pipelines. NSA and CISA recommend that organizations and network defenders implement the mitigations in this CSI to reduce CI/CD environment compromise and create a difficult environment for malicious cyber actors. This article continues to discuss the CSI released by NSA and CISA on defending CI/CD environments.

    NSA reports "NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments"

  • news

    Visible to the public "A Bridge Between Different Cryptocurrencies"

    Bitcoin is the most well-known cryptocurrency in the world today, but there are numerous others, each implementing a different set of technical features. To exchange one cryptocurrency for another, so-called "bridges" are used, which are typically provided by companies that hold significant sums of various cryptocurrencies and offer to exchange them. However, this has often led to security issues and criminal cases involving the theft of cryptocurrencies worth billions. Researchers at TU Wien developed a novel protocol to enable the exchange of one cryptocurrency for another efficiently and securely. "Glimpse" is the name of the new protocol, which will provide the cryptocurrency world with entirely new options. The "USENIX Security Symposium" accepted the paper presenting this new tool. This article continues to discuss the novel protocol developed at TU Wien that enables the exchange of one cryptocurrency for another in an efficient and secure manner.

    TU Wien reports "A Bridge Between Different Cryptocurrencies"

  • news

    Visible to the public "ChatGPT Users at Risk for Credential Theft"

    New research conducted by Group-IB reveals that threat actors are increasingly compromising ChatGPT accounts. They may use this access to collect sensitive data and launch additional targeted attacks. According to Group-IB, ChatGPT credentials have become a major target for malicious activities. Researchers cautioned that because OpenAI's Artificial Intelligence-driven chatbot stores past user queries and AI responses by default, each account could be an entry point for threat actors to access user data. Dmitry Shestakov, head of threat intelligence at Group-IB, emphasizes that exposed information, whether personal or professional, could be used for malicious purposes such as identity theft, financial fraud, targeted scams, and more. Over the past year, Group-IB researchers identified 101,134 information stealer-infected devices storing ChatGPT data. Using Group-IB's Threat Intelligence platform to gain visibility into dark web communities, researchers were able to find compromised ChatGPT credentials within the logs of information stealers sold by threat actors via illicit marketplaces. Most victims were found to reside in the Asia-Pacific region. This article continues to discuss threat actors exploiting stolen ChatGPT accounts to collect users' sensitive data and professional credentials.

    TechTarget reports "ChatGPT Users at Risk for Credential Theft"

  • news

    Visible to the public "Wagner Ransomware Wants to Recruit Its Victims"

    Wagner ransomware infects user devices and invites them to join the Wagner Group, which is a Russian Private Military Corporation (PMC). Cyble researchers say that the recently detected ransomware likely targets Russians. Instead of demanding payment, the ransomware demands that victims join the PMC led by Yevgeny Prigozhin. "Official Wagner PMCs employment virus," reads the ransom note on victim devices in Russian. The note also calls on the victim to "wage war" against Sergei Shoigu, Russia's longtime Minister of Defense. Cyble reports that while the ransom note mimics the bio section of the Wagner Group Telegram channel, the PMC itself has not publicly claimed responsibility for the ransomware campaign. The strain seems to be a variant of Chaos ransomware, which evolved from the RYUK ransomware. Wagner ransomware targets data stored on the C: drive, encrypting documents, contacts, and more. This article continues to discuss the Wagner ransomware campaign.

    Cybernews reports "Wagner Ransomware Wants to Recruit Its Victims"

  • news

    Visible to the public "ThirdEye Infostealer Poses New Threat to Windows Users"

    Security researchers at FortiGuard Labs discovered a new infostealer called ThirdEye that is potentially targeting Windows users. The researchers stated that ThirdEye is designed to extract valuable system information from compromised machines, which can be used in future cyberattacks. The researchers said that while ThirdEye is not considered technically elaborate, its capabilities include harvesting BIOS and hardware data, enumerating files and folders, identifying running processes, and collecting network information. The researchers noted that after collecting the compromised system's information, the malware sends it to a command-and-control (C2) server. Notably, the infostealer uses a unique string, "3rd_eye," to identify itself to the C2. The researchers stated that analysis of the samples revealed that the earliest variant, discovered in April 2023, collected limited information compared to the more recent samples. Over time, the infostealer has evolved, adding additional data-gathering capabilities. The researchers noted that ThirdEye variants were submitted to a public scanning service from Russia, and the latest variant has a file name in Russian, suggesting a potential focus on Russian-speaking organizations. The researchers emphasized that while there is no concrete evidence of ThirdEye being used in attacks, system defenders should still be wary of this malware tool.

    Infosecurity reports: "ThirdEye Infostealer Poses New Threat to Windows Users"

  • news

    Visible to the public "Critical SQL Injection Flaws in Gentoo Soko Can Lead To Remote Code Execution"

    Researchers at SonarSource discovered two SQL injection vulnerabilities in Gentoo Soko, tracked collectively as CVE-2023-28424 with a CVSS score of 9.1, which a remote attacker can exploit to execute arbitrary code on vulnerable systems. Soko is deployed in the Gentoo Linux infrastructure. The researchers explained that exploiting the vulnerabilities is possible due to improper database configuration. The misconfiguration likely stems from the database's Docker containerization. It was noted that containers frequently "enjoy elevated privileges" due to their status as a security boundary between software components. According to SonarSource's report, a threat actor can inject specially crafted code to evade the escaping feature in the module and introduce SQL injections, resulting in the exposure of sensitive data. This article continues to discuss the SQL injection vulnerabilities in Gentoo Soko that could lead to remote code execution (RCE) on impacted systems.

    Security Affairs reports "Critical SQL Injection Flaws in Gentoo Soko Can Lead To Remote Code Execution"

  • news

    Visible to the public "Mobile Malware and Phishing Surge in 2022"

    According to security researchers at Zimperium, the volume of mobile malware, phishing sites dedicated to mobiles, and mobile vulnerabilities increased significantly in 2022. The researchers found that the percentage of phishing sites targeting mobile devices increased from 75% to 80% year-on-year in 2022. The researchers also found that the average user is between six and ten times more likely to fall for an SMS phishing attack than an email-based one. The researchers detected an average of four malicious or phishing links clicked for every device protected with the company's anti-phishing technology. The researchers noted that phishing is not the only threat facing BYOD and corporate devices. The researchers detected a 51% increase in mobile malware variants between 2021 and 2022, reaching 920,000 unique samples. From 2021 to 2022, the share of Android devices with malware detected rose from one in 50 to one in 20. The researchers detected over 3000 unique spyware samples. EMEA (35%) and North America (25%) had the highest percentage of devices impacted by spyware last year. The researchers also found that mobile vulnerabilities are also surging. There was a 138% increase in detected bugs on the Android ecosystem in 2022, while Apple's iOS accounted for 80% of zero-days actively exploited in the wild last year.

    Infosecurity reports: "Mobile Malware and Phishing Surge in 2022"

  • news

    Visible to the public "EncroChat Bust Leads to 6500 Arrests in Three Years"

    Europol recently announced that dismantling an encrypted chat platform used by organized crime gangs (OCGs) has led to 6558 arrests in the past three years, including 197 "high-value targets." Europol noted that EncroChat was used by tens of thousands of criminals to communicate without fear of being snooped on by law enforcers. Special devices were sold for $1095 each, and six-month subscriptions were priced at $548, featuring 24/7 support, remote wipe, and a PIN code to wipe the phone if apprehended. Since EncroChat was infiltrated, police have analyzed over 115 million conversations from over 60,000 users worldwide, with Europol providing 700 "actionable intelligence packages" compiled from this information to investigators globally. Over the past three years, law enforcers have seized 740m euros in cash, frozen 154m euros in assets or bank accounts, seized 31 million pills, 104 tonnes of cocaine, 163 tonnes of cannabis, and 3.3 tonnes of heroin, seized 923 weapons, 21,750 rounds of ammunition and 68 explosives, and seized 83 boats and 40 planes. Europol stated that subsequent convictions have led to a total combined sentence of 7134 years of imprisonment.

    Infosecurity reports: "EncroChat Bust Leads to 6500 Arrests in Three Years"

  • news

    Visible to the public "MIT Researchers Devise a Way to Evaluate Cybersecurity Methods"

    Observing a computer program's behavior, such as how much time it spends accessing the computer's memory, enables a skilled hacker to obtain sensitive data, such as a password. Approaches to security that completely block these side-channel attacks are so computationally costly that they are impractical for many real-world systems. Therefore, engineers often use obfuscation schemes that aim to limit, but not eliminate, an attacker's ability to discover secret information. In order to help engineers and scientists better understand the effectiveness of various obfuscation schemes, MIT researchers developed a framework to quantitatively evaluate the amount of information an attacker could glean from a victim program with an obfuscation scheme. Their framework, dubbed "Metior," helps the user examine how different victim programs, attacker strategies, and obfuscation scheme configurations impact how much sensitive information is leaked. Engineers who develop microprocessors could use the framework to evaluate the effectiveness of multiple security schemes and determine the most promising architecture early in the design process. This article continues to discuss the system devised by MIT researchers that analyzes the likelihood that an attacker could thwart a certain security scheme to steal secret information.

    MIT News reports "MIT Researchers Devise a Way to Evaluate Cybersecurity Methods"

  • news

    Visible to the public "Sensitive Information Stolen in LetMeSpy Stalkerware Hack"

    Radeal, the Polish developer of Android stalkerware "LetMeSpy," is informing users that their personal information and collected data was stolen due to a cyberattack. LetMeSpy is a free application that collects information from the phones it has been installed on, including call logs, text messages, and device location. The phone monitoring application is marketed as offering parental control and employee monitoring capabilities, but it essentially allows users to spy on others after installing the software on their devices, likely without their knowledge. Once up and running on a device, LetMeSpy hides its icon from the phone's home screen to prevent detection and removal. The application uploads the collected information to remote servers, where the user who installed it can access it, essentially tracking a person in real time. Radeal stated that it fell victim to a cyberattack that resulted in unauthorized access to the data of website users. As a result of the attack, the criminals gained access to email addresses, telephone numbers, and the content of messages collected on accounts. The application developer suspended all account-related functions of the website, promising to restore them after mitigating the attack. Law enforcement was also informed about the incident. According to security researcher Maia Arson Crimew, who received a copy of the allegedly stolen data, the attackers got their hands on call logs, messages, user IDs, email addresses, password hashes, geolocation logs, IP addresses, payment logs, and phone information.

    SecurityWeek reports: "Sensitive Information Stolen in LetMeSpy Stalkerware Hack"

  • news

    Visible to the public "New Ongoing Campaign Targets npm Ecosystem with Unique Execution Chain"

    Cybersecurity researchers have uncovered a new ongoing campaign targeting the npm ecosystem that involves a unique execution chain to deliver an unknown payload to victim systems. According to the software supply chain security company Phylum, the packages in question appear to be published in pairs, with each pair working to retrieve additional resources that are then decoded and/or executed. As the first of the two modules is designed to store locally a token retrieved from a remote server, the order in which the packages are installed is crucial for executing a successful attack. The second package sends this token along with the operating system type as a parameter to an HTTP GET request in order to retrieve a second script from the remote server. A successful execution returns a Base64-encoded string that is executed immediately, but only if the returned string is longer than 100 characters. This article continues to discuss the new ongoing campaign aimed at the npm ecosystem.

    THN reports "New Ongoing Campaign Targets npm Ecosystem with Unique Execution Chain"

  • news

    Visible to the public "Jscrambler Launches JavaScript Scanner for PCI DSS 4.0 Compliance"

    Jscrambler has released a free tool to help businesses check the JavaScript code on their e-commerce sites and bring it into compliance with Payment Card Industry Data Security Standards (PCI DSS) 4.0. In March 2022, the PCI Security Standards Council released PCI DSS 4.0 and started a two-year phase-out of the previous versions. By March 31, 2025, all retailers and e-commerce sites, as well as anyone else who processes payment cards online, will be required to comply with PCI DSS 4.0 requirements. The PCI DSS JavaScript Compliance Tool from Jscrambler helps organizations determine whether the JavaScript on their e-commerce websites complies with two 4.0 requirements: protecting against and detecting skimming attacks on all scripts from a merchant or its third-party or fourth-party contractors. Attackers carry out web skimming campaigns by injecting malicious code into Magento, WooCommerce, Shopify, and WordPress websites, so the anti-skimming requirements are necessary. Two million websites, including those of Ticketmaster and British Airways, have been found to contain Magecart skimmers. This article continues to discuss the free tool released to help companies check the JavaScript code running on their e-commerce sites and bring it into compliance with the latest PCI DSS.

    Dark Reading reports "Jscrambler Launches JavaScript Scanner for PCI DSS 4.0 Compliance"

  • news

    Visible to the public "8Base Ransomware Gang Escalates Double Extortion Attacks in June"

    A ransomware gang named "8Base" has been targeting organizations worldwide in double-extortion attacks, with a constant stream of new victims. The ransomware group appeared for the first time in March 2022, maintaining a low profile with few notable attacks. In June 2023, the ransomware operation had a surge in activity, targeting many businesses across industries. So far, 8Base's dark web extortion site has listed 35 victims, with some days claiming as many as six victims simultaneously. This is a significant increase from March and April, when the group reported only a few victims. In May 2023, the extortion gang launched its data leak website, claiming to be "honest and simple" penetration testers. According to a new report by VMware's Carbon Black team, the tactics used in recent 8Base attacks indicate a rebranding of an established ransomware group, possibly RansomHouse. This article continues to discuss findings and observations regarding the 8Base ransomware group.

    Bleeping Computer reports "8Base Ransomware Gang Escalates Double Extortion Attacks in June"

  • news

    Visible to the public "ChatGPT Shows Promise in Detecting Phishing Sites"

    Researchers wanted to know whether ChatGPT can reliably detect phishing sites. They tested 5,265 URLs (2,322 phishing and 2,943 safe). They asked ChatGPT (GPT-3.5) the question: "Does this link lead to a phish website?" The Artificial Intelligence (AI)-driven chatbot had an 87.2 percent detection rate and a 23.2 percent false positive rate based solely on the URL form. According to the researchers, although the rate of detection is high, the rate of false positives is unacceptable. The results were much worse when they asked a slightly different question: "Is this link safe to visit?" The detection rate was 93.8 percent and the false positive rate was 64.3 percent. The more general prompt is more likely to result in a conclusion that the link is malicious. Both approaches yielded unsatisfactory results, but the researchers still believe it is possible to use this type of technology to aid human analysts by highlighting suspicious URL parts and suggesting potential attack targets. This article continues to discuss the potential use of ChatGPT to detect phishing sites.

    Help Net Security reports "ChatGPT Shows Promise in Detecting Phishing Sites"

  • news

    Visible to the public SoS Musings #74 - Cybercriminals Ramping Up Business Email Compromise (BEC) Attacks

    SoS Musings #74 -

    Cybercriminals Ramping Up Business Email Compromise (BEC) Attacks

  • news

    Visible to the public Cybersecurity Snapshots #43 - Rorschach Ransomware

    Cybersecurity Snapshots #43 -

    Rorschach Ransomware

  • news

    Visible to the public Cyber Scene #81 - California Gold Rush: AI, Chips, and the Tech Arms Race

    Cyber Scene #81 -

    California Gold Rush: AI, Chips, and the Tech Arms Race

  • news

    Visible to the public "Attackers Can Break Voice Authentication With up to 99 Percent Success Within Six Tries"

    Computer scientists at the University of Waterloo have discovered an attack technique that can bypass voice authentication security systems with a success rate of up to 99.9 percent after only six attempts. Voice authentication, which enables businesses to verify the identity of their clients through a unique "voiceprint," has become increasingly implemented in remote banking, call centers, and other security-sensitive situations. In order to enroll in voice authentication, the user must repeat a specific phrase in their own voice. The system then extracts a unique vocal signature (voiceprint) from the provided phrase and stores it on a server, explains Andre Kassis, a Computer Security and Privacy Ph.D. candidate and the study's lead author. For future authentication attempts, they are asked to repeat a different phrase, and the features extracted from it are compared to the voiceprint stored in the system to determine if they should be granted access. Following the introduction of voiceprints, malicious actors soon realized they could apply Machine Learning (ML)-enabled "deepfake" software to create convincing copies of a victim's voice using as little as five minutes of recorded audio. This article continues to discuss the attack method that can bypass voice authentication security with a high success rate.

    The University of Waterloo reports "Attackers Can Break Voice Authentication With up to 99 Percent Success Within Six Tries"

  • news

    Visible to the public "Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers"

    Researchers from the Ben-Gurion University of the Negev and Cornell University have discovered that it is possible to recover secret keys from a device by analyzing video footage of its power LED in a clever side-channel attack. They found that cryptographic computations conducted by the CPU alter the device's power consumption, thereby affecting the brightness of the power LED. Threat actors can extract the cryptographic keys from a smart card reader by leveraging video camera devices such as an iPhone 13 or an Internet-connected surveillance camera. Specifically, video-based cryptanalysis is performed by getting video footage of rapid changes in an LED's brightness and using the rolling shutter effect of the video camera to capture the physical emanations. This article continues to discuss the side-channel attack that makes it possible to recover secret keys from a device by analyzing video footage of its power LED.

    THN reports "Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers"

  • news

    Visible to the public "New Mockingjay Process Injection Technique Evades EDR Detection"

    A new process injection technique called "Mockingjay" may enable threat actors to evade Endpoint Detection and Response (EDR) and other security products in order to secretly execute malicious code on compromised systems. Researchers at the cybersecurity company Security Joes discovered the technique, which uses legitimate DLLs with read, write, and execute sections to bypass EDR hooks and inject code into remote processes. Process injection is a technique for executing arbitrary code in the address space of another running process trusted by the operating system, giving threat actors the ability to run malicious code without being detected. Examples of process injection techniques include DLL injection, PE injection, reflective DLL injection, thread execution hijacking, process hollowing, mapping injection, and more. All these methods require using Windows Application Programming Interfaces (APIs) and different system calls, creating processes/threads, and writing process memory. Mockingjay distinguishes itself from other methods because it does not use commonly abused Windows API calls, set special permissions, perform memory allocation, or even start a thread, thus removing many potential detection opportunities. This article continues to discuss findings regarding the new Mockingjay process injection method.

    Bleeping Computer reports "New Mockingjay Process Injection Technique Evades EDR Detection"

  • news

    Visible to the public "Four Ways Criminals Could Use AI to Target More Victims"

    Daniel Prince, a cybersecurity professor at Lancaster University, explores how criminals could use Artificial Intelligence (AI) to target victims. AI is a tool used to improve productivity, process and organize large volumes of data, and offload decision-making. However, AI tools are accessible to anyone, including criminals. Observing how criminals have adapted to and adopted technological advancements in the past can provide insight into how they may use AI. AI tools such as ChatGPT and Google's Bard provide writing assistance, enabling, for example, inexperienced writers to compose effective marketing messages, but this technology could also help criminals sound more credible when contacting potential victims via phishing emails and text messages. The technique known as "brute forcing" could also benefit from AI. This is where numerous character and symbol combinations are tried to determine if they match passwords. This article continues to discuss the different ways in which criminals could use AI to target victims.

    The Conversation reports "Four Ways Criminals Could Use AI to Target More Victims"

  • news

    Visible to the public "Why the FDA's SBOM Mandate Changes the Game for OSS Security"

    The US Food and Drug Administration (FDA) is not the first thing that comes to mind for most Open Source Software (OSS) project maintainers or the developers who build applications that leverage OSS. However, new FDA rules may have a greater impact on OSS security than any other government rule to date. On October 1, 2023, the FDA will begin enforcing its mandate that all medical devices running software must create and maintain a Software Bill of Materials (SBOM). The new policy addresses concerns regarding healthcare devices' critical software-powered components not being adequately protected. Medical institutions are one of the common targets of ransomware attacks, and hackers are expected to increasingly target medical devices. This article continues to discuss the new FDA SBOM guidelines for medical devices that could have a broad impact on the healthcare industry and the broader open source ecosystem.

    Dark Reading reports "Why the FDA's SBOM Mandate Changes the Game for OSS Security"