News Items

  • news

    Visible to the public "Bipartisan Bill Proposes Cybersecurity Funds for Rural Water Systems"

    A new bill announced on June 5, 2023, proposes increasing cybersecurity funding for rural water systems by $7.5 million per year. It's not a lot of money for part of the critical infrastructure, but it's better than nothing for an area that misses out on other funding. House Committee on Agriculture introduced the "Cybersecurity for Rural Water Systems Act of 2023." The bill is a simple amendment that adds $7.5 million per year to existing legislation and states that the new money provided for each year from 2024 through 2028 "shall be used to provide cyber security technical assistance." This bill focuses on very specific and small water utilities that serve less than 10,000 customers. The proposed bill allocates $7.5M annually for five years to assist these utilities with cybersecurity issues through "technical assistance" under the USDA's Circuit Rider program.

    SecurityWeek reports: "Bipartisan Bill Proposes Cybersecurity Funds for Rural Water Systems"

  • news

    Visible to the public "Johns Hopkins APL Designs Framework for a Digital Red Cross"

    In the physical world, the Red Cross, Red Crescent, and Red Crystal displayed on hospitals and ambulances across the globe are internationally recognized symbols of legal protection for the sick, the wounded, and those who care for them during armed conflict. Humanitarian relief and healthcare organizations are increasingly vulnerable to cyberattacks as they rely more on computer networks to provide care. Malicious cyber operations have disrupted relief efforts and contributed to delayed care, overmedication, and increased mortality. Therefore, the Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, collaborated with the International Committee of the Red Cross (ICRC) to create a technical framework to replicate the protection signaled by the ICRC's physical emblems in the digital realm. APL teamed up with the ICRC on a two-year research project involving experts from academic, humanitarian, and technical organizations. The team examined how a digital emblem could mark and identify medical and humanitarian organizations' digital assets, services, and data. The emblem would show their status as protected. The emblem's widespread visibility would enable more people to participate in its protection by design. Internet Service Providers (ISPs) monitor network traffic already. If protected parties are marked publicly, providers can more easily identify malicious traffic aimed at protected sites. If the digital emblem were to be incorporated into the international humanitarian legal framework, it would afford legal protection against cyberattacks. This article continues to discuss the technical framework developed to replicate the protection signaled by the ICRC's physical emblems in the digital world and how a digital emblem would work in the protection of medical and humanitarian entities against cyberattacks.

    Johns Hopkins University Applied Physics Laboratory reports "Johns Hopkins APL Designs Framework for a Digital Red Cross"

  • news

    Visible to the public "Emerging Ransomware Group 8Base Doxxes SMBs Globally"

    A series of business data leaks on the dark web has brought a ransomware group that operated undetected for over a year to light in recent weeks. "8Base," not to be confused with the Florida-based software company of the same name, has been conducting double-extortion attacks against small and medium-sized businesses (SMBs) since at least April 2022. In May, the group released data belonging to 67 organizations on the cyber underground, but it did not end there. This month, 8Base has already doxxed 29 new companies. Due to the victims' low profile, little is known about the group's tactics, techniques, and procedures (TTPs). According to data extracted from their leak site, these victims include a British cleaning company, an Egyptian sanitation company, a private school in a Boston suburb, a CPA in New York, and more. This article continues to discuss findings regarding the emerging 8Base ransomware group.

    Dark Reading reports "Emerging Ransomware Group 8Base Doxxes SMBs Globally"

  • news

    Visible to the public "APT37 Hackers Deploy New FadeStealer Eavesdropping Malware"

    The North Korean APT37 hacking group uses a new information-stealing malware called "FadeStealer" with a wiretapping feature, allowing the threat actor to eavesdrop and record from victims' microphones. It is believed that APT37, also known as Reaper and RedEyes, is a state-sponsored hacking group with a history of conducting cyber espionage attacks in line with North Korean interests. These attacks target North Korean defectors, academic institutions, and EU-based organizations. In the past, the hackers used custom malware known as "Dolphin" and "M2RAT" to execute commands and steal data, credentials, and screenshots from Windows devices and even mobile phones connected to the network. In a new report from the AhnLab Security Emergency Response Center (ASEC), researchers detail the new custom malware called "AblyGo backdoor" and "FadeStealer" that the threat actors have used in cyber espionage operations. This article continues to discuss the use of the new FadeStealer eavesdropping malware by the North Korean APT37 hacking group.

    Bleeping Computer reports "APT37 Hackers Deploy New FadeStealer Eavesdropping Malware"

  • news

    Visible to the public "New Report Exposes Operation Triangulation's Spyware Implant Targeting iOS Devices"

    More information about the spyware implant delivered to iOS devices as part of the Operation Triangulation campaign has emerged. The malware has a 30-day lifespan, after which it is automatically uninstalled unless the attackers extend the time. The "TriangleDB" implant is deployed after the attackers behind it exploit a kernel vulnerability to obtain root privileges on the target iOS device. According to researchers, it is deployed in memory, so when the device is rebooted, all traces of the implant are lost. Therefore, if the victim reboots their device, the attackers must reinfect it by sending an iMessage with a malicious attachment, reactivating the entire chain of exploitation. Operation Triangulation involves the use of zero-click exploits via the iMessage platform, thereby granting the spyware full control over the device and user data. This article continues to discuss the spyware implant delivered to iOS devices as part of the Operation Triangulation campaign.

    THN reports "New Report Exposes Operation Triangulation's Spyware Implant Targeting iOS Devices"

  • news

    Visible to the public "US and European IT Decision-Makers Have Different Cloud Security Priorities"

    According to SUSE, increased cloud adoption has raised cloud security concerns among Information Technology (IT) teams, who are faced with challenges stemming from the widespread use of complex cloud environments. According to a survey, IT decision-makers have experienced an average of four cloud-related security incidents in the past year, with the number increasing to five in the US and decreasing to three in Europe. This contributes to the security concerns that hold back cloud technologies. Thirty-one percent of respondents cited cloud- or third-party-hosted data stores as their main cloud security concern. Runtime attacks launched by threat actors, security policy management, federation, and automation follow data stores as secondary concerns (29 percent each). Significantly more US IT decision-makers (35 percent) than European IT decision-makers (25 percent) cite security policy management, federation, and automation as their top cloud security concerns. This article continues to discuss key findings from SUSE's industry trend report "Securing the Cloud."

    Help Net Security reports "US and European IT Decision-Makers Have Different Cloud Security Priorities"

  • news

    Visible to the public "AI vs AI: Next Front in Phishing Wars"

    Business Email Compromise (BEC), which surpassed ransomware last year as the leading financially motivated attack vector organizations face, will likely become more difficult to catch. Abnormal Security's latest investigations suggest that attackers are using generative Artificial Intelligence (AI) to create phishing emails, including vendor impersonation attacks similar to those Abnormal Security identified earlier this year. Through the use of ChatGPT and other Large Language Models (LLMs), attackers can compose social engineering messages without formatting errors, incorrect grammar, misspellings, and other typical red flags. According to Abnormal Security's head of Machine Learning (ML), Dan Shiebler, the company used its own AI models to find that certain phishing emails sent to its customers were likely AI-generated. While Abnormal Security is still conducting a comprehensive analysis to gain further insight into the extent of AI-generated email attacks, the company has observed an increase in the number of attacks with AI indicators, particularly in the past few weeks. This article continues to discuss observations of cybercriminals using generative AI in phishing attacks and the use of the same technology for defense.

    TechRepublic reports "AI vs AI: Next Front in Phishing Wars"

  • news

    Visible to the public "Keeping Hackers Off the Electrical Grid"

    Attacks on grid substations increased by 70 percent in 2022 alone. Therefore, engineers at the Department of Energy's (DOE) Oak Ridge National Laboratory (ORNL) expect new attack vectors and are taking measures against hackers using them. According to Peter Fuhr, head of ORNL's Grid Communications and Security group, the researchers try to stay ahead of cyber threats rather than just react to them after they occur. Recently, Fuhr's team demonstrated a novel method that encodes grid sensor data subliminally into a video feed using a rotating color wheel and a Fibonacci sequence decoding key that rotates the color wheel so that each sensor reading uses a unique color code. This novel implementation is a type of steganography that conceals critical information within the live video feeds from the grid substations themselves. According to Fuhr, the technique translates the encrypted character codes currently used by utilities into a color code hidden in the video feeds of cameras that already monitor substation activity. EPB effectively tested the technique for six months using a Virtual Local Area Network (VLAN) link between the central-EPB grid control center and its substations. This article continues to discuss the method ORNL developed to protect our critical grid infrastructure against hackers.

    CACM reports "Keeping Hackers Off the Electrical Grid"

  • news

    Visible to the public "Standardized Information Sharing Framework 'Essential' for Improving Cyber Security"

    How private sector organizations share threat intelligence data with the broader industry has been called for development by security experts. It is believed that improved cross-organizational collaboration would increase cyber resilience in the face of increasingly frequent and sophisticated cyberattacks. According to Jen Ellis, co-chair of the Institute for Science and Technology's Ransomware Task Force, this is one of the ways the private sector can team up with governments around the globe, as well as across sectors, industries, and regions. Government agencies such as the Information Commissioner's Office (ICO) in the UK or the Cybersecurity and Infrastructure Security Agency (CISA) in the US enforce strict reporting deadlines for data breaches. However, companies often disclose only the bare minimum, which hinders the ability of other organizations to learn from and potentially prevent future attacks. This article continues to discuss experts' thoughts regarding the need to improve how private sector organizations share threat intelligence data with the wider industry.

    ITPro reports "Standardized Information Sharing Framework 'Essential' for Improving Cyber Security"

  • news

    Visible to the public "Harvard Pilgrim Data Breach Affected Millions, Yet Insurer Struggled to Contact Many Potential Victims For Months"

    A ransomware attack and subsequent data breach at Harvard Pilgrim Health Care in April affected over 2.5 million members, but the system outage caused by the ransomware attack has prevented the insurer from directly informing many of the potential victims because the insurer could not access their contact information. Two months after the breach, the insurer is only just beginning to reach out to members directly, but many remain in the dark about whether their personal information was compromised. Harvard Pilgrim, part of health insurer Point32Health, first disclosed in mid-April that it had been the victim of a ransomware attack, affecting the systems it uses to service members, accounts, brokers, and providers. On May 23, the insurer disclosed that patient data had been stolen but declined to publicly say how many members were affected. The next day, however, the insurer informed the US Department of Health and Human Services Office for Civil Rights that millions of people's data potentially had been compromised. Potential victims include those who are or were enrolled in Harvard Pilgrim Commercial or Medicare health plans since March 28, 2012. The data in the accessed files could contain a slew of patient information, including names, addresses, phone numbers, dates of birth, health insurance account information, Social Security numbers, provider taxpayer identification numbers, and medical history such as diagnoses, treatment, dates of service, and provider names. A spokeswoman at Harvard Pilgrim Health Care stated that the system outage has prevented the insurer from contacting members directly "as contact information was not accessible." Harvard Pilgrim has instead sought to inform members through employers, insurance brokers, press releases, and its website, and has made credit monitoring services available through a website for those wishing to enroll. The spokeswoman also said that Harvard Pilgrim began alerting potentially affected members by mail starting June 15. The company noted that it has repaired several functions in the two months since the attack, including the ability to check member eligibility. It also has been issuing temporary member ID cards and distributed payments to providers that had been submitted before the attack. However, Harvard Pilgrim's website and many of its internal functions remain down. The insurer cannot process claims or requests for prior authorization. Some members said they were unable to use their insurance at all. While consumers wait for notification, a class-action lawsuit against the company is moving forward, spearheaded by a woman who said that her credit card was hacked following the cybersecurity breach.

    The Boston Globe report: "Harvard Pilgrim Data Breach Affected Millions, Yet Insurer Struggled to Contact Many Potential Victims For Months"

  • news

    Visible to the public "Enphase Ignores CISA Request to Fix Remotely Exploitable Flaws"

    The US Cybersecurity and Infrastructure Security Agency (CISA) recently issued advisories detailing two unpatched vulnerabilities in Enphase products. Enpahse is an American energy technology company that sells solar micro-inverters, charging stations, and other energy equipment, mainly focused on residential customers. The first flaw is tracked as CVE-2023-32274 (CVSS score of 8.6) and impacts the Enphase Installer Toolkit, a mobile solution that aids with the installation and configuration of Enphase Systems. The application also allows users to connect to the Enphase Envoy communication gateway over wireless networks to perform system setups and allows them to view system status. CISA warns that Enphase Installer Toolkit for Android versions 3.27.0 and older contain hardcoded credentials that an attacker could use to gain access to sensitive data. CISA noted that successful exploitation of this vulnerability could allow sensitive information to be obtained by an attacker using hard-coded credentials. The Enphase Installer Toolkit is currently available for download as version 3.30.0 for both Android and iOS. The second vulnerability, CVE-2023-33869, is described as a command injection flaw in the Envoy communication gateway version D7.0.88, which could allow an attacker to gain root access to the affected product and execute commands. According to CISA, Enphase Energy has not responded to requests to work with the agency in addressing these vulnerabilities.

    SecurityWeek reports: "Enphase Ignores CISA Request to Fix Remotely Exploitable Flaws"

  • news

    Visible to the public "USDA is Investigating a ‘Possible Data Breach’ of Contractor Related to The Global Russian Cybercriminal Hack"

    The US Department of Agriculture (USDA) is investigating a "possible data breach" of a department contractor connected to a broader hack on multiple federal agencies that officials have blamed on Russian cybercriminals. A department spokesperson stated that they are aware of a possible data breach with a vendor that may impact a very small number of employees, and any employees whose data may have been affected will be contacted and provided support. The spokesperson noted that the data breach did not occur to the USDA network. Currently, the USDA estimates that fewer than 30 USDA employees may have been impacted by a third-party vendor data breach. No federal agencies have reported receiving demands, but corporate victims have previously reported demands of millions of dollars. The hackers last month began exploiting a vulnerability in widely used file-transfer software known as MOVEit, made by the Massachusetts-based firm Progress Software.

    CNN reports: "USDA is Investigating a 'Possible Data Breach' of Contractor Related to The Global Russian Cybercriminal Hack"

  • news

    Visible to the public "Oreo Maker Mondelez Staff Hit by Data Breach at Third-Party Law Firm"

    Snack giant Mondelez has recently announced that past and present employees' personal information may now be in the hands of hackers following a data breach at a third-party firm. Over 50,000 staff members are receiving data breach notifications from the company after a data breach at Bryan Cave Leighton Paisner LLP, a law firm hired by Mondelez to provide legal advice. Bryan Cave stated that it detected hackers had compromised its network between February 23 until March 1, 2023, and that personal information had been exposed. Accessed sensitive data related to current and former Mondelez employees, included social security numbers, first and last names, addresses, dates of birth, marital statuses, genders, employee identification numbers, and Mondelez retirement and/or thrift plan information. According to Bryan Cave, financial information was not compromised in the data breach. What isn't clear from the public statements is how the law firm's computer network was breached, just how much data was stolen, and whether the attackers have demanded any ransom. Mondelez noted that its own computer systems were not compromised.

    Bitdefender reports: "Oreo Maker Mondelez Staff Hit by Data Breach at Third-Party Law Firm"

  • news

    Visible to the public "More UK Companies Sign Up to Test Groundbreaking Cybersecurity Technology"

    More UK companies have signed on to help test a new cybersecurity approach. Over the past year, 36 UK companies have joined the "Digital Security by Design" program, a UK government-backed initiative to create a more secure digital future. They are experimenting with the Arm Morello board, a prototype of Arm's cybersecurity technology based on the Capability Hardware Enhanced RISC Instructions (CHERI) protection model developed by researchers at the University of Cambridge and SRI International. CHERI enables hardware and software to work together to prevent attackers' exploitation of security vulnerabilities. The Arm Morello board is considered a groundbreaking cybersecurity technology prototype that is secure by design. It is built with security features that do not depend on software updates or patches to defend against malicious actors. The technology can prevent and mitigate memory-related cyberattacks, which account for two-thirds of cyberattacks worldwide. This article continues to discuss UK companies being given trial access to the prototype cybersecurity technology and why this prototype is considered cutting-edge technology.

    The University of Cambridge reports "More UK Companies Sign Up to Test Groundbreaking Cybersecurity Technology"

  • news

    Visible to the public "Center for Socially Responsible AI Awards Big Ideas Grants to Five Projects"

    As part of its Big Ideas Grant (BIG) program, the Penn State Center for Socially Responsible Artificial Intelligence (CSRAI) awarded over $212,000 to advance five interdisciplinary research projects. The high-risk, high-reward grant program helps Penn State faculty pilot cutting-edge research that advances the center's mission of promoting, studying, and practicing socially responsible methods of using, building, and deploying Artificial Intelligence (AI) technology. According to S. Shyam Sundar, director of the CSRAI, this year's funded projects cover a broad range of topics, such as mitigating the safety and security risks posed by adversarial attacks on autonomous vehicles. Among the funded projects is "Enhancing Situation Awareness of Adversary ML in Human-AI Collaboration for Safe Implementation of Automated Driving Systems." This article continues to discuss the Penn State CSRAI funding projects on AI that cover topics such as reducing security risks.

    The Pennsylvania State University reports "Center for Socially Responsible AI Awards Big Ideas Grants to Five Projects"

  • news

    Visible to the public "Cybersecurity Market Grew 12.5% In First Quarter, Outpacing Overall Tech Market"

    According to the technology market analyst Canalys, global spending on cybersecurity in the first quarter of 2023 increased by 12.5 percent to $18.6 billion, compared to the same period the previous year. The results released on Monday, June 19, were consistent with the company's best-case forecasts for the cybersecurity market and outpaced the rest of the technology industry. An April forecast by the management consulting company Gartner found that global Information Technology (IT) spending was projected to increase to $4.6 trillion in 2023, a 5.5 percent growth from 2022. Customers prioritized spending on the most critical projects and those with the highest return. Matthew Ball, a principal analyst at Canalys, noted that longer sales cycles, delays, and project downsizing have increased, while hardware refresh programs have been pushed to future quarters. Spending on identity security increased by 14.3 percent, while investments in Security Service Edge (SSE) within web and email security increased by 16 percent. This article continues to discuss new findings regarding cybersecurity spending.

    SC Media reports "Cybersecurity Market Grew 12.5% In First Quarter, Outpacing Overall Tech Market"

  • news

    Visible to the public "Asus Patches Highly Critical WiFi Router Flaws"

    Taiwanese computer hardware manufacturer Asus recently released urgent firmware updates to address vulnerabilities in its WiFi router product lines and warned users of the risk of remote code execution attacks. In a recent advisory, Asus documented at least nine security defects and multiple security weaknesses that allow code execution, denial-of-service, information disclosure, and authentication bypasses. The most serious of the nine vulnerabilities, a highly critical bug with a CVSS severity rating of 9.8/10, dates back to 2018 and exposes routers to code execution attacks. Asus stated that the vulnerability, tagged as CVE-2018-1160, is a memory corruption issue in Netatalk before 3.1.12. The Asus firmware update also patches CVE-2022-26376 (CVSS 9.8/10), a memory corruption vulnerability in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7. The company, which has struggled with security problems in the past, listed the affected WiFi routers as Asus GT6, GT-AXE16000, GT-AX11000 PRO, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000, and TUF-AX5400. Asus stated that if one chooses not to install this new firmware version, then they strongly recommend disabling services accessible from the WAN side to avoid potential unwanted intrusions. These services include remote access from WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger.

    SecurityWeek reports: "Asus Patches Highly Critical WiFi Router Flaws"

  • news

    Visible to the public "New DOJ Unit Will Focus On Prosecuting Nation-State Cybercrime"

    The US Department of Justice (DOJ) is adding a new section to its National Security Division that will prosecute malicious foreign cyber activity, a top department official recently announced. The department wants to be more active in combating digital threats from outside the US. Assistant Attorney General Matthew Olsen, the division's chief, revealed that the entity will enable the division to expand the scope and speed of disruption campaigns and prosecutions of nation-state cyber threats and state-sponsored cybercriminals. The department's Criminal Division will maintain its computer crimes section. The decision to place cyber on an equal footing with the division's three existing sections comes as the DOJ has increased its own efforts to combat botnets, contain or eliminate malware outbreaks, and pursue digital criminals worldwide. This article continues to discuss the new DOJ unit aimed at prosecuting malicious foreign cyber activity.

    The Record reports "New DOJ Unit Will Focus On Prosecuting Nation-State Cybercrime"

  • news

    Visible to the public "New Condi Malware Builds DDoS Botnet Out of TP-Link AX21 Routers"

    In May 2023, a new Distributed Denial-of-Service (DDoS)-as-a-Service botnet called "Condi" emerged, exploiting a vulnerability contained by TP-Link Archer AX21 (AX1800) Wi-Fi routers to form an army of bots for conducting attacks. AX1800 is a widely used Linux-based dual-band Wi-Fi 6 router with a bandwidth of 1.8 Gbps, mostly used by home users, small offices, shops, cafes, and more. Condi recruits new devices to create a powerful DDoS botnet that can be rented to initiate attacks against websites and services. In addition, the threat actors behind Condi sell the malware's source code, which is an aggressive method of monetization likely to result in numerous project variants with different features. According to a report published by Fortinet, Condi targets a high-severity unauthenticated command injection and Remote Code Execution (RCE) vulnerability, tracked as CVE-2023-1389, in the Application Programming Interface (API) of the router's web management interface. After Mirai exploited it at the end of April, Condi is the second DDoS botnet to target this vulnerability. This article continues to discuss the new DDoS-as-a-Service botnet Condi.

    Bleeping Computer reports "New Condi Malware Builds DDoS Botnet Out of TP-Link AX21 Routers"

  • news

    Visible to the public "VMware Aria Operations for Networks Vulnerability Exploited in the Wild (CVE-2023-20887)"

    The exploitation of a pre-authentication command injection flaw, tracked as CVE-2023-20887, in VMware Aria Operations for Networks (previously vRealize Network Insight), has been observed in the wild. There are no workarounds available to mitigate the risk of exploitation, so enterprise administrators are advised to patch their deployments. The vulnerability is one of three recently discovered and privately communicated to VMware by Sina Kheirkhah of Summoning Team and an anonymous researcher. The company confirmed that a malicious actor with network access to VMware Aria Operations for Networks could perform a command injection attack resulting in Remote Code Execution (RCE). Kheirkhah published a proof-of-concept (PoC) exploit for the vulnerability on June 13, and according to GreyNoise, attempts to exploit the vulnerability began two days after. This article continues to discuss the VMware Aria Operations for Networks vulnerability.

    Help Net Security reports "VMware Aria Operations for Networks Vulnerability Exploited in the Wild (CVE-2023-20887)"

  • news

    Visible to the public "Mysterious Mystic Stealer Spreads Like Wildfire in Mere Months"

    Since its debut on underground marketplaces in April, a stealer that can grab credentials from web browsers and extensions, as well as cryptocurrency, has rapidly become a favorite among cybercriminals. The "Mystic Stealer" has established a strong foothold in the threat landscape in its first few months due to its advanced capabilities, pricing, and the crowdsourcing of suggestions that have led to ongoing updates and improvements, according to two reports released simultaneously, one by Cyfirma and the other by Inquest and Zscaler. The stealer, which typically costs $150 per month or $390 for a three-month subscription, has the same capability to steal data from a victim's computer as other forms of this type of malware, along with obfuscation techniques that make it capable of advanced evasion. According to Zscaler researchers, it is evident that the developer of Mystic Stealer is attempting to produce a stealer that is on par with current trends in the malware space while focusing on anti-analysis and defense evasion. This article continues to discuss findings and observations surrounding the Mystic Stealer.

    Dark Reading reports "Mysterious Mystic Stealer Spreads Like Wildfire in Mere Months"

  • news

    Visible to the public "Chinese Hacker Group 'Flea' Targets American Ministries with Graphican Backdoor"

    In a recent campaign spanning from late 2022 to early 2023, a Chinese state-sponsored actor named "Flea" targeted foreign affairs ministries in the Americas. According to Broadcom's Symantec, the cyberattacks involved a new backdoor called "Graphican." Other targets included a government finance department, a company that markets products in the Americas, and an unidentified victim in a European country. In this campaign, Flea used many tools, the company said, describing the threat actor as "large and well-resourced." In addition to the new Graphican backdoor, the attackers used various living-off-the-land (LOTL) methods and tools previously associated with Flea. Since 2004, Flea, also known as APT15, BackdoorDiplomacy, ke3chang, Nylon Typhoon (formerly Nickel), Playful Taurus, Royal APT, and Vixen Panda, has been known to target governments, diplomatic missions, and embassies. This article continues to discuss the Chinese state-sponsored actor Flea targeting foreign affairs ministries in the Americas with the Graphican backdoor.

    THN reports "Chinese Hacker Group 'Flea' Targets American Ministries with Graphican Backdoor"

  • news

    Visible to the public "DARPA Taps LSU to Solve Cybersecurity Challenges in Virtual and Augmented Reality"

    Louisiana State University (LSU) researchers Ibrahim "Abe" Baggili and Andrew Webb have received $600K from the Defense Advanced Research Projects Agency (DARPA) in support of their project, "Mixed Reality Visual Deception for Mission Deviation & Distraction." The project integrates cybersecurity with psychology and human behavior to gain insight into the possible impacts of compromised software and hardware on people. Baggili noted that the military is interested in the concept of an augmented warfighter. The idea is to have more information in front of soldiers without requiring them to look at 10 different things at once. However, with new technology comes new threats. In addition to the technical exploit to hack the system, an adversary could control or influence the user, which is what the researchers are exploring. The project funded by DARPA will explore the physical safety and security of the individual who is using devices or applications in virtual or augmented reality (VR or AR), also collectively known as extended reality (XR). This article continues to discuss LSU's DARPA-funded project aimed at solving cybersecurity challenges in VR and AR.

    Louisiana State University reports "DARPA Taps LSU to Solve Cybersecurity Challenges in Virtual and Augmented Reality"

  • news

    Visible to the public "Microsoft Issues Detailed Response to Layer 7 DDoS Attacks"

    Microsoft is responding to Distributed Denial-of-Service (DDoS) attacks that recently interrupted the company's popular services, including Azure, Outlook, and OneDrive. Microsoft's Security Response Center (MSRC) released a comprehensive analysis of the crippling cyberattacks. The response outlines a series of Layer 7 DDoS attacks launched by a threat actor Microsoft tracks as "Storm-1359." A "Layer 7" attack is a DDoS attack that targets the application layer of the Internet protocol suite. The attack vector involves many requests to overwhelm the application layer and cause service interruptions or outages. Microsoft has determined that Storm-1359 has access to a large collection of botnets and tools, which could allow the threat actor to launch DDoS attacks from multiple cloud services and open proxy infrastructures. MSRC reported that Storm-1359 appears to be focused on causing disruption and gaining publicity. This article continues to discuss Microsoft's response to recent DDoS attacks.

    Techzine reports "Microsoft Issues Detailed Response to Layer 7 DDoS Attacks"

  • news

    Visible to the public "Expensive Proxies Underpin Anonymous Sudan DDoS Attack"

    The pro-Russian hacktivist group "Anonymous Sudan" appears to use expensive online infrastructure for Distributed Denial-of-Service (DDoS) attacks, thus undermining its claim to be a volunteer group working from an impoverished East African nation. Researchers at the Australian cybersecurity company CyberCX examined the traffic sources of Anonymous Sudan's March attacks against Australian targets. At least one-third of the attack traffic volume was concealed by a high rate of paid proxies. Since proxies are designed to be difficult to identify and track, the actual percentage of traffic originating from proxies is likely higher. Due to the consistent and high capitalization of the same paid proxies in attacks separated by six days, it is unlikely that the group abused proxy providers' free trial offers. CyberCX also noted that the source of the proxied traffic is likely paid cloud infrastructure. The group's Information Technology (IT) infrastructure probably costs tens of thousands of dollars, and CyberCX estimates that the proxy infrastructure alone costs a minimum of AU$4,000 per month. This article continues to discuss Anonymous Sudan's use of expensive online infrastructure.

    InfoRiskToday reports "Expensive Proxies Underpin Anonymous Sudan DDoS Attack"

  • news

    Visible to the public "75 Percent of People Risk Being Hacked Through Poor Password Practice"

    New research on the password behaviors of over 8,000 people in the UK, France, and Germany reveals that 75 percent of individuals put themselves at risk by not following widely accepted password best practices. Sixty-four percent of those surveyed by Keeper Security use either weak or repeated passwords for their online accounts. Additionally, more than a third of people report feeling overwhelmed in regard to improving their cybersecurity. Thirty-nine percent of respondents do not know if they have been breached, and 32 percent are unaware of whether their passwords are available on the dark web. Although 41 percent of respondents believe cybersecurity is too difficult to understand, older generations appear to be performing better. Only 20 percent of respondents of Generation Z use strong and unique passwords for every account, compared to 29 percent of baby boomers. Generation Z has the highest percentage of respondents who find cybersecurity overwhelming. This article continues to discuss key findings from Keeper Security's report on password management.

    BetaNews reports "75 Percent of People Risk Being Hacked Through Poor Password Practice"

  • news

    Visible to the public "Schneider Power Meter Vulnerability Opens Door to Power Outages"

    A security vulnerability was recently discovered in the Schneider Electric ION and PowerLogic power meters. The vulnerability makes it so they transmit a user ID and password in plaintext with every message. The vulnerability was given a CVSS vulnerability severity rating of 8.8 out of 10. The bug would allow an attacker with passive interception capabilities to obtain these credentials, authenticate to the ION/TCP engineering interface (as well as SSH and HTTP interfaces), and change configuration settings or potentially modify the firmware. A security researcher at Forescout stated that it is obviously not acceptable anymore for an operational technology (OT) product to transmit credentials in cleartext because anybody that has access to the network and can sniff the traffic will be able to get them and then do almost whatever they want with the device. The researcher noted that this could include controlling smart meter switches to cause load oscillations that could trigger shutdowns, with the demand (or load) then being passed on to other parts of the grid network. In a worst-case scenario, a domino effect could theoretically lead to a blackout.

    Dark Reading reports: "Schneider Power Meter Vulnerability Opens Door to Power Outages"

  • news

    Visible to the public "Norton Parent Says Employee Data Stolen in MOVEit Ransomware Attack"

    Gen Digital, the company behind known cybersecurity brands such as Avast, Avira, AVG, Norton, and LifeLock, has recently announced that employees' personal information was compromised in the recent MOVEit ransomware attack. The attack exploited a zero-day vulnerability in the MOVEit Transfer managed file transfer (MFT) software that Progress Software disclosed on May 31. Gen Digital revealed that employees' compromised personal information includes names, addresses, birth dates, and business email addresses. The company noted that they use MOVEit for file transfers and have remediated all of the known vulnerabilities in the system. The company said there was no impact to their core IT systems or services and that no customer or partner data has been exposed.

    SecurityWeek reports: "Norton Parent Says Employee Data Stolen in MOVEit Ransomware Attack"

  • news

    Visible to the public "Study Finds Bot Detection Software Isn't as Accurate as It Seems"

    The challenges posed by bots on social media continue to be diverse, ranging from the minor annoyance of spamming to the potentially grave issues of spreading misinformation, influencing elections, and inflaming polarization. Recent research suggests that existing third-party bot detection tools may not be as accurate as they appear. MIT researchers Chris Hays, Zachary Schutzman, Manish Raghavan, Erin Walk, and Philipp Zimmer report in a recently published paper that bot detection models' supposedly high accuracy rates result from a critical limitation in the data used to train them. Much research is dedicated to developing tools that distinguish between humans and bots. Social media platforms have their systems for identifying and removing bot accounts, but these systems are often kept secret. Third-party bot-detection tools use curated data sets and sophisticated Machine Learning (ML) models trained on those data sets to identify patterns believed to be human or not human. These models are then deployed on social media to analyze the operation of bots. This article continues to discuss the study on the accuracy of bot detection software.

    MIT Sloan School of Management reports "Study Finds Bot Detection Software Isn't as Accurate as It Seems"

  • news

    Visible to the public "Australian Government Says Its Data Was Stolen in Law Firm Ransomware Attack"

    The Office of the Australian Information Commissioner (OAIC) recently announced that some of its files were stolen in a ransomware attack on law firm HWL Ebsworth. One of the largest law firms in Australia, HWL Ebsworth, stated that it became aware of the incident on April 28, after the Alphv/BlackCat ransomware gang boasted about the hack, and that it immediately informed the Australian authorities and started investigating the incident. The investigation indicates the threat actor had accessed and exfiltrated certain information on a confined part of the firm's system but not on their core document management system. On June 9, HWL Ebsworth noted that the ransomware group published on their leak site some of the data allegedly stolen from its systems. The law firm says it has yet to determine the full impact of the data breach and that it will notify all individuals whose personal information might have been compromised. On Saturday, June 10, HWL Ebsworth advised the OAIC that a document or documents relating to a limited number of OAIC files were included in the breach experienced by HWL Ebsworth. The incident reportedly impacted the NDIS Quality and Safeguards Commission, the Australian Federal Police, the Commonwealth Director of Public Prosecutions, the Department of Defence, the Department of Home Affairs, the Department of Foreign Affairs, and the Taxation Office as well. The National Australian Bank (NAB), one of the four largest banks in the country, also disclosed some impact from the incident, stating that a small percentage of its customers might have been affected. The Alphv/BlackCat ransomware gang has leaked roughly 1.5 terabytes of data from the roughly 3.6 terabytes it allegedly stole from HWL Ebsworth.

    SecurityWeek reports: "Australian Government Says Its Data Was Stolen in Law Firm Ransomware Attack"

  • news

    Visible to the public "Romanian Cybercrime Gang Diicot Builds DDoS Botnet With Mirai Variant"

    According to researchers, a cybercriminal group called "Diicot" is conducting mass SSH brute-force scanning and launching a variant of the Mirai Internet of Things (IoT) botnet on compromised devices. Additionally, the group deploys a cryptocurrency mining payload on servers with CPUs containing more than four cores. Cayosin, an off-the-shelf Mirai-based botnet agent, was discovered by Cado Labs to be deployed by Diicot, despite the group's traditional association with cryptojacking campaigns. This agent was intended for routers running OpenWrt, the Linux-based embedded devices operating system. The Diicot group has been in operation since at least 2021 and was previously known as "Mexals." After examining strings found in malware payloads, scripts, and messages against those of rival hacker groups, researchers strongly believe that the group is based in Romania. Even its new name resembles the acronym for the Directorate for Investigating Organized Crime and Terrorism (DIICOT), a Romanian law enforcement agency. This article continues to discuss findings surrounding the Diicot cybercrime gang.

    CSO Online reports "Romanian Cybercrime Gang Diicot Builds DDoS Botnet With Mirai Variant"

  • news

    Visible to the public "Hackers Can Weaponize Exposed Cloud Secrets in Just 2 Minutes"

    "Secrets" are considered sensitive pieces of information that grant access to a cloud environment. Orca Security's research reveals that attackers typically identify misconfigured and vulnerable assets within two minutes and immediately begin exploiting them. Orca Security conducted six months of research by setting up honeypots in nine different cloud environments. The purpose of these honeypots is to attract attackers by simulating misconfigured resources. Every honeypot contained a secret AWS key. Researchers monitored the honeypots to determine if and when an attacker would bite. The goal was to gain insight into the most frequently targeted cloud services, the time it takes for attackers to access public or readily accessible resources, and the time it takes for them to discover and use leaked secrets. Orca's report indicates that exposed secrets on GitHub, HTTP, and SSH were all detected in less than five minutes. AWS S3 Buckets were discovered in under an hour. This article continues to discuss findings from the analysis of cloud-focused cybercrime tactics.

    Cybernews reports "Hackers Can Weaponize Exposed Cloud Secrets in Just 2 Minutes"

  • news

    Visible to the public "Ransomware Gang Preys on Cancer Centers, Triggers Alert"

    This month's attack on a cancer center in the US by an obscure ransomware group prompted a warning to the healthcare sector regarding the threat actor's rarely used but highly effective techniques. Although the group called "TimisoaraHackerTeam" (THT) is not widely known, it has a history of targeting medical facilities through the exploitation of known vulnerabilities. The group is also known to use a living-off-the-land (LOTL) approach to avoid detection. The Department of Health and Human Services' Healthcare Sector Cybersecurity Coordination Center (HC3) noted in a notification about this month's attack on the cancer center that THT was first discovered by researchers in July 2018 and had targeted healthcare organizations worldwide. According to the notification, little is known about the group, but their ransomware has paralyzed the health and public health (HPH) sector. HC3 did not specify the latest target of the THT, but stated that the attack on the cancer center rendered its digital services inaccessible, placed patients' protected health information at risk, and significantly hindered the medical center's ability to treat patients. This article continues to discuss the THT ransomware attack against a US cancer center.

    SC Media reports "Ransomware Gang Preys on Cancer Centers, Triggers Alert"

  • news

    Visible to the public "Experts Found Components of a Complex Toolkit Employed in macOS Attacks"

    Researchers have discovered malicious files with backdoor capabilities, which they believe to be a component of a toolkit targeting Apple macOS systems. Researchers at Bitdefender found the set of malicious files with backdoor capabilities believed to be part of an advanced toolkit. According to the researchers, the investigation is ongoing, and the samples remain largely undetected. The researchers analyzed four samples submitted to VirusTotal, with the earliest sample uploaded on April 18, 2023, by an anonymous actor. Two of the three samples uploaded by a victim are backdoors written in Python that target Windows, Linux, and macOS. The first file identified by the researchers is "shared.dat," which, when executed, generates a unique device identifier UID and uses a routine to determine the operating system running on the target machine. The malware can be instructed to extract system information and run specific commands. This article continues to discuss researchers' discovery of malicious files with backdoor capabilities believed to be part of a toolkit targeting Apple macOS systems.

    Security Affairs reports "Experts Found Components of a Complex Toolkit Employed in macOS Attacks"

  • news

    Visible to the public "KillNet Threatens Imminent SWIFT, World Banking Attacks"

    KillNet, the pro-Russian hacktivist group, claims to be working with a resurgent version of the infamous ReVIL ransomware gang. The objective appears to be to attack the Western financial system. KillNet has a history of launching mildly disruptive Distributed Denial-of-Service (DDoS) attacks. The group made ominous threats against the SWIFT banking system, the Wise international wire transfer system, the SEPA intra-Europe payments service, European and American central banks, and other institutions in a June 16 video posted on a Russian Telegram channel. This article continues to discuss the KillnNet group claiming to be teaming up with ReVIL and Anonymous Sudan for destructive financial attacks in retaliation for US aid in Ukraine.

    Dark Reading reports "KillNet Threatens Imminent SWIFT, World Banking Attacks"

  • news

    Visible to the public "Compromised Linux SSH Servers Engage in DDoS Attacks, Cryptomining"

    Unidentified attackers are compromising poorly managed Linux SSH servers and instructing them to launch Distributed Denial-of-Service (DDoS) attacks while simultaneously mining cryptocurrency in the background. Tsunami, also known as Kaiten, is a DDoS bot often distributed in conjunction with Mirai and Gafgyt malware strains. The fact that Tsunami functions as an Internet Relay Chat (IRC) bot distinguishes it from other DDoS bots. It uses IRC to communicate with the threat actor. Since Tsunami's source code is publicly available, it is used by various threat actors. It is primarily used in attacks targeting Internet of Things (IoT) devices. Researchers from AhnLab's Security Emergency Response Center (ASEC) explained that it is also frequently used to target Linux servers. This article continues to discuss the targeting of poorly managed Linux SSH servers in DDoS and cryptomining attacks.

    Help Net Security reports "Compromised Linux SSH Servers Engage in DDoS Attacks, Cryptomining"

  • news

    Visible to the public "New RDStealer Malware Steals From Drives Shared Over Remote Desktop"

    The "RedClouds" cyber espionage and hacking campaign involves the use of custom RDStealer malware to automatically steal data from drives shared via Remote Desktop connections. The malicious campaign was identified by Bitdefender Labs, whose researchers have observed hackers targeting systems in East Asia since 2022. Although they have been unable to attribute the campaign to specific threat actors, they note that their interests align with those of China and that their level of sophistication corresponds to that of a state-sponsored Advanced Persistent Threat (APT) group. Furthermore, according to Bitdefender, the hackers have left traces of their activity dating back to at least 2020, initially using off-the-shelf tools before applying custom malware in late 2021. This article continues to discuss the use of the RDStealer malware by the RedClouds campaign.

    Bleeping Computer reports "New RDStealer Malware Steals From Drives Shared Over Remote Desktop"

  • news

    Visible to the public "Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces"

    Between June 2022 and May 2023, over 101,100 compromised OpenAI ChatGPT account credentials appeared on illicit dark web marketplaces, with India alone making up 12,632 stolen credentials. Group-IB noted that the credentials were discovered in information stealer logs for sale on the cybercrime underground. In May 2023, the number of available logs containing compromised ChatGPT accounts peaked at 26,802 records. The Asia-Pacific region has seen the greatest number of ChatGPT credentials for sale over the past year. Pakistan, Brazil, Vietnam, Egypt, the US, France, Morocco, Indonesia, and Bangladesh are other countries with the most compromised ChatGPT credentials. Most logs containing ChatGPT accounts have been breached by the Raccoon information stealer (78,348), followed by Vidar (12,987) and RedLine (6,646). This article continues to discuss the discovery of compromised OpenAI ChatGPT account credentials on illicit dark web marketplaces.

    THN reports "Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces"

  • news

    Visible to the public "Survey Reveals AI’s Impact on The Developer Experience"

    GitHub recently surveyed 500 U.S.-based developers at companies with 1,000-plus employees about how managers should consider developer productivity, collaboration, and AI coding tools. GitHub found that AI is being used at scale, with 92% of the survey participants saying they already use AI coding tools both in and outside of work. GitHub also discovered that despite industry-wide investments in DevOps, developers still say the most time-consuming thing they're doing at work besides writing code is waiting on builds and tests. GitHub noted that developers want more collaboration, with more than 4 out of 5 developers expecting AI coding tools to make their team more collaborative. The participants also see big benefits to AI. Many participants (70%) believe that AI coding tools will offer them an advantage at work and cite better code quality, completion time, and resolving incidents as some of the top anticipated benefits.

    GitHub reports: "Survey Reveals AI's Impact on The Developer Experience"

  • news

    Visible to the public "Ransomware Gang Takes Credit for February Reddit Hack"

    The Alphv/BlackCat ransomware gang recently took credit for the February 2023 cyberattack against the social media site Reddit. Reddit disclosed the breach shortly after being hacked earlier this year and described the incident as the result of a sophisticated and highly targeted phishing attack in which an employee's credentials and second-factor authentication tokens were stolen. Reddit noted that the attackers accessed internal documents, internal dashboards, business systems, source code, the information of hundreds of contacts and current and former employees, and advertiser data. Alphv/BlackCat ransomware gang over the weekend listed Reddit on its leak site and claimed to have stolen 80GB of data. No file-encrypting ransomware appears to have been deployed on Reddit's systems. The attackers are demanding a $4.5 million ransom to be paid in exchange for deleting the stolen data and that Reddit drops the API pricing changes set to go into effect this week.

    SecurityWeek reports: "Ransomware Gang Takes Credit for February Reddit Hack"

  • news

    Visible to the public "US Offers $10m Reward For MOVEit Attackers"

    The US Department of State has recently announced that it is offering a $10m reward for information linking members of a Clop affiliate responsible for a recent data extortion campaign. The reward was announced after a successful Clop campaign targeting users of the popular MOVEit managed file transfer service. After exploiting a zero-day vulnerability in the software, the group claimed to have compromised data belonging to hundreds of organizations. Alongside big brand names like British Airways, Boots, and the BBC, several US government agencies are thought to have been caught in the campaign. According to the Federal News Network, tens of thousands of US government workers may have had their personal information compromised as a result. However, the identity of most of the impacted agencies is yet to be made public.

    Infosecurity reports: "US Offers $10m Reward For MOVEit Attackers"

  • news

    Visible to the public "Millions of UK University Credentials Found on Dark Web"

    Security researchers at Crossword Cybersecurity have recently discovered 2.2 million breached credentials linked to the UK's 100 top universities available on the dark web, putting staff, students, and their data at risk. The researchers who found the credentials claimed that over half (54%) belong to elite Russel Group institutions. The researchers stated that there is a potential risk to sensitive research if threat actors are able to access user accounts with compromised credentials. The researchers noted that over half (54%) of breached credentials came from UK universities with research facilities with government-funded programs in areas like nuclear energy and defense. The researchers found that the top 30 universities in the country are up to 50% more likely to have breached credentials than other institutions in the top 100 and that London's universities have more breached logins (506,330) than those in Scotland, Wales, and Northern Ireland combined (465,767).

    Infosecurity reports: "Millions of UK University Credentials Found on Dark Web"

  • news

    Visible to the public "5 Challenges to Implementing DevSecOps and How to Overcome Them"

    Software security has historically been addressed at the project level, focusing on code scanning, penetration testing, and reactive incident response strategies. However, recent discussions have shifted focus to the program level to align security with business objectives. The shift's ideal outcome would be software development teams who act in accordance with business objectives, organizational risk, and solution architectures, and who recognize the importance of security practices to the success of the business. DevSecOps builds on DevOps principles and emphasizes security activities throughout all phases of the Software Development Lifecycle (SDLC). It can help organizations achieve this ideal state, but transitioning from project-level to program-level thinking presents several challenges. This article continues to discuss the benefits and challenges of implementing DevSecOps.

    Carnegie Mellon University - Software Engineering Institute reports "5 Challenges to Implementing DevSecOps and How to Overcome Them"

  • news

    Visible to the public "Symposium Charts Progress to Zero-Trust Cybersecurity"

    In April 2023, over 1,300 cybersecurity professionals and experts convened virtually for the first Zero Trust Symposium. The event was sponsored and co-hosted by the MIT Lincoln Laboratory, the Defense Acquisition University (DAU), and the Zero Trust Portfolio Management Office of the Department of Defense (DoD). In cybersecurity, the concept of a zero trust framework has gained significant attention in recent years. Zero trust is the practice of never implicitly trusting a device or user, even if they are already within a network. In this framework, a user and their device are continuously monitored and are only permitted access to job-critical applications and data. Zero trust concepts represent a departure from traditional network security, which for years has regarded a network as a "castle and moat" where, once inside the moat, users are often granted wide-reaching access. The strategy puts organizations at risk from malicious insiders or accounts with compromised credentials. This type of vulnerability has enabled numerous high-profile data breaches, including the 2015 Office of Personnel Management breach in which 22.1 million government personnel records were stolen. This article continues to discuss the event on zero trust that emphasized cultural shifts needed to reach a new cybersecurity norm.

    MIT Lincoln Laboratory reports "Symposium Charts Progress to Zero-Trust Cybersecurity"

  • news

    Visible to the public "JPL Creates World's Largest PDF Archive to Aid Malware Research"

    NASA's Jet Propulsion Laboratory (JPL) is known for landing rovers on Mars, investigating the solar system with robotic probes, and developing sensitive scientific tools that observe Earth and other planets. However, the lab's innovative work in the digital realm is less well-known. As part of a larger effort to make the Internet more secure, JPL data scientists have developed the largest publicly available open-source archive of PDFs. The new PDF corpus is part of the Defense Advanced Research Projects Agency's (DARPA) Safe Documents (SafeDocs) program, which aims to combat online threats while anticipating PDF users' security needs. By collaborating with the non-profit PDF Association, which aims to establish open specifications and standards for the technology, JPL is helping in the development of multiple tools to address these issues. This article continues to discuss JPL data scientists amassing 8 million PDFs that can now be used for further study in order to make the Internet more secure.

    NASA's Jet Propulsion Laboratory reports "JPL Creates World's Largest PDF Archive to Aid Malware Research"

  • news

    Visible to the public "New Website Highlights Thousands of Android Apps' Data Collection Practices"

    Researchers at Carnegie Mellon University (CMU) have launched a new website that provides a convenient and easy way for Android users to see how their data is collected and shared. The Android Network Traces (ANT) project maintains a database of more than 14,000 apps, providing comprehensive insight into the apps' data collection and sharing practices. Previously, the research team had created a website that graded the privacy of smartphone apps. However, they continued to receive the same questions regarding the types of data the apps collect, who receives it, and what it is used for. Therefore, Jason Hong, a professor at CMU's Human-Computer Interaction Institute, and members of the Human-Computer Interaction: Mobility Privacy Security Lab (CHIMPS), developed MobiPurpose to track network requests made by Android apps and classify data collection purposes. In their paper titled "Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps," the authors describe how MobiPurpose parses each traffic request body into key-value pairs and uses supervised learning and text pattern bootstrapping to infer the data type and data collection purpose of each pair. MobiPurpose can predict the data collection purpose with an average accuracy of 84 percent. Using their method, the researchers collected network traces from thousands of apps and grouped them into five data type categories: network, device, general, location, and account. Then they transformed the information into easily readable charts on the ANT website. This article continues to discuss the research and development behind the new website highlighting Android apps' data collection and sharing practices.

    CyLab reports "New Website Highlights Thousands of Android Apps' Data Collection Practices"

  • news

    Visible to the public "Breaches Decline as Security Culture Improves"

    The most recent Security Maturity Report, published by ClubCISO, reveals that 76 percent of CISOs reported no material breaches over the past year, an increase from 68 percent in 2022. Despite the challenging economic climate, heightened global tensions, and the introduction of new technology that simplifies cybercrime, 60 percent of those surveyed report that their organization has not experienced any significant cybersecurity incidents in the past year. Eighty percent of respondents believe their organization's security culture has improved over the past year. The primary drivers of security culture continue to be proactive 'report it' no-blame policies (41 percent), simulated phishing (38 percent), and customized training (37 percent). This article continues to discuss key findings from ClubCISO's latest Security Maturity Report.

    BetaNews reports "Breaches Decline as Security Culture Improves"

  • news

    Visible to the public "Millions of Americans’ Personal Data Exposed in Global Hack"

    Millions of people in Louisiana and Oregon have recently had their data compromised in the sprawling cyberattack that has also hit the US federal government. Authorities stated that the breach had affected 3.5 million Oregonians with driver's licenses or state ID cards and anyone with that documentation in Louisiana. The Louisiana governor's office did not put a number on the number of victims, but over 3 million Louisianians hold driver's licenses. The states did not blame anyone in particular for the hack, but federal officials have attributed a broader hacking campaign using the same software vulnerability to a Russian ransomware gang. Authorities noted that the sweeping hack has likely exposed data at hundreds of organizations across the globe and also compromised multiple US federal agencies, including the Department of Energy, as well as data from major corporations in Britain like the BBC and British Airways. The Russian-speaking hackers that claimed credit are known to demand multimillion-dollar ransoms, though US and state governments say they have not received any demands. The data exposed in the breach of the Oregon and Louisiana motor vehicle departments may include Social Security numbers and driver's license numbers, prompting state authorities to advise their residents on how to protect themselves from identity fraud.

    CNN reports: "Millions of Americans' Personal Data Exposed in Global Hack"

  • news

    Visible to the public "Russian National Arrested, Charged in US Over Role in LockBit Ransomware Attacks"

    The US Justice Department (DoJ) recently announced charges against a third Russian national allegedly involved in deploying the LockBit ransomware. The man, Ruslan Magomedovich Astamirov, 20, was arrested in Arizona and allegedly owned, controlled, and used multiple IP addresses, email addresses, and other online accounts to deploy the LockBit ransomware and communicate with victims. According to court documents, in at least one instance, authorities were able to trace a victim's payment to a cryptocurrency address that Astamirov controlled. According to an FBI complaint, Astamirov has been a member of the LockBit ransomware gang since at least August 2020 and directly executed at least five cyberattacks against victim systems in the US. In May 2023, during a voluntary interview with the FBI, Astamirov lied about his connection with one of the email addresses used in LockBit ransomware attacks but later admitted that he used the email account on at least three different devices. At the time, authorities seized several devices Astamirov owned, including an iPhone, an iPad, a MacBook Pro, and a USB drive. According to the FBI complaint, law enforcement obtained evidence that Astamirov used the email address to set up online accounts used in LockBit attacks and that he also controlled an IP address used in attacks against at least four victims. The authorities also linked the IP address to a second email address that Astamirov used and discovered that Astamirov received 80% of a ransom payment in roughly $700,000 worth of cryptocurrency from a fifth victim of the LockBit ransomware, with which he and likely other co-conspirators negotiated. Astamirov is charged with conspiracy to commit wire fraud, punishable by a maximum of 20 years in prison, and conspiracy to damage computers and transmit ransom demands, which is punishable by a maximum of five years in prison. The LockBit ransomware has been active since at least January 2020, operating under the Ransomware-as-a-Service (RaaS) model and targeting organizations in the US, Asia, Europe, and Africa. The FBI estimates that it has been used in roughly 1,700 attacks in the US, with victims paying approximately $91 million in ransoms.

    SecurityWeek reports: "Russian National Arrested, Charged in US Over Role in LockBit Ransomware Attacks"

  • news

    Visible to the public "Quantum Hacking Alert: USTC Uncovers Critical Vulnerabilities in Quantum Key Distribution"

    A team led by Guo Guangcan from the University of Science and Technology of China (USTC) of the Chinese Academy of Sciences made an advancement in the practical security of Quantum Key Distribution (QKD). They identified a potential security flaw in the modulator device of the QKD transmitter and exploited this vulnerability to conduct quantum hacking attacks. Theoretically, QKD enables the generation of secure keys between users. However, the non-ideal characteristics of practical devices may deviate from the theoretical assumptions, making them vulnerable to eavesdropping attacks. In order to advance the practical application of QKD, it is essential to perform a comprehensive and in-depth analysis of the security of QKD systems and then design more robust and secure practical systems. This article continues to discuss the team's progress in analyzing the practical security of QKD systems and developing attack-defense techniques.

    SCIENMAG reports "Quantum Hacking Alert: USTC Uncovers Critical Vulnerabilities in Quantum Key Distribution"