News Items

  • news

    Visible to the public "Hiding Undetected: Why Security Teams Can No Longer Overlook HTTPS Decryption"

    Decrypting HTTPS (TLS/SSL) traffic at the network perimeter is crucial in the protection against malware and other online threats. Much of today's web traffic is encrypted, offering a hiding place for threat actors to deliver cyberattacks. Many network security controls are not set to inspect encrypted traffic. Recent findings from WatchGuard's Threat Lab in its Internet Security Report (ISR) for the fourth quarter of 2022 suggested a decline in overall malware volume, but Threat Lab analysts discovered a much higher prevalence of malware delivered over encrypted connections when they examined decrypted HTTPS traffic more closely. This article continues to discuss why it is important not to overlook HTTPS decryption.

    BetaNews reports "Hiding Undetected: Why Security Teams Can No Longer Overlook HTTPS Decryption"

  • news

    Visible to the public "Emerging Cyber Threats in 2023 From AI to Quantum to Data Poisoning"

    As hackers gain access to new technologies and devise novel exploits for old vulnerabilities, the nature of the threats is constantly changing. According to the 2023 Comcast Business Cybersecurity Threat Report, nine out of ten attempts to compromise customer networks began with phishing, suggesting that this type of attack remains the most common. The 2022 Official Cybercrimes Report from Cybersecurity Ventures expects the cost of cybercrime to increase to $10.5 trillion in 2025 from $3 trillion in 2015. Security professionals report seeing novel attack strategies in addition to new variations on standard attack methods. The emerging threats facing CISOs today are data poisoning, Search Engine Optimization (SEO) poisoning, and threat actors with Artificial Intelligence (AI) capabilities. This article continues to discuss emerging cyber threats.

    CSO Online reports "Emerging Cyber Threats in 2023 From AI to Quantum to Data Poisoning"

  • news

    Visible to the public "AI Abuse Grows Beyond Phishing to Multistage Cyberattacks"

    Researchers predict that cybercriminals' abuse of Artificial Intelligence (AI) will soon lead to an influx of automated and multistage cyberattacks. Attack data collected between May and July indicate that cybercriminals are increasingly using social engineering techniques to deliver multistage payloads. According to researchers at Darktrace, there has been a 59 percent increase in malicious emails sent to potential victims, instructing them to complete a series of steps before delivering a malicious payload or attempting to gather sensitive information. Darktrace detected nearly 50,000 more of these attacks in July than in May, suggesting the potential use of automation. Darktrace did not conclusively declare that AI was involved in these attacks but rather that the technology could be used to expedite attacks. The Darktrace Cyber AI Research Centre predicts that the speed of these attacks will increase as greater automation and AI are incorporated and used by attackers. This article continues to discuss the abuse of AI beyond phishing.

    SC Media reports "AI Abuse Grows Beyond Phishing to Multistage Cyberattacks"

  • news

    Visible to the public "Cl0p Study Sheds Light on Rising Ransom Gang"

    Mayank Sahariya, a cyber threat intelligence researcher at FalconFeeds[.]io, notes that among the many ransomware families that have launched attacks against businesses, institutions, and individuals, Cl0p stands out for its advanced techniques and widespread impact. The cybercriminal group is believed to have originated in 2019 as an offshoot of the profit-driven FIN11 gang, while the malware it uses is a descendant of the earlier CryptoMix. Sahariya says that the CryptoMix ransomware, which is also associated with FIN11, appears to be an ancestor (or variant) of the Cl0p malware. This article continues to discuss the Cl0p ransomware gang.

    Cybernews reports "Cl0p Study Sheds Light on Rising Ransom Gang"

  • news

    Visible to the public "See Tickets Alerts 300,000 Customers After Another Web Skimmer Attack"

    Ticketing services agency See Tickets recently notified more than 300,000 individuals that their payment card data was stolen in a new web skimmer attack. Owned by Vivendi SA, See Tickets provides ticketing services for a broad range of event types, including comedy, festival, lifestyle, and sport, and operates both regional and international websites in North America and Europe. In May 2023, See Tickets became aware of unusual activity on some of its e-commerce websites. The company hired a forensics firm to investigate the unusual activity and discovered that, in May and June 2023, an unauthorized third party "inserted multiple instances of malicious code into a number of See Tickets' e-commerce checkout pages." Between February 28 and July 2, the malicious code collected and exfiltrated the information that users provided on those checkout pages, including their names, addresses, and payment card information.

    SecurityWeek reports: "See Tickets Alerts 300,000 Customers After Another Web Skimmer Attack"

  • news

    Visible to the public "UK and US Sanction 11 Russians Connected to Notorious Trickbot Group"

    Authorities in the US and UK have sanctioned 11 Russian nationals alleged to have been part of the criminal group responsible for the Trickbot malware and Conti ransomware schemes. According to the US Treasury, the sanctioned individuals include key actors involved in the Trickbot group's management and procurement. The group has connections to Russian intelligence services. The banking trojan and botnet led to the theft of over $180 million worldwide. The 11 new additions follow a first round of sanctions imposed in February against a single criminal network believed to be behind the Conti and Ryuk ransomware gangs, as well as those involved with the Trickbot banking trojan. This article continues to discuss US and UK authorities sanctioning more alleged Trickbot group members.

    The Record reports "UK and US Sanction 11 Russians Connected to Notorious Trickbot Group"

  • news

    Visible to the public "Chinese Cyberspies Obtained Microsoft Signing Key From Windows Crash Dump Due to a Mistake"

    Microsoft announced in July that it had mitigated an email-targeting attack by a threat actor with ties to China, tracked as Storm-0558. Storm-0558 threat actors have been observed conducting cyber espionage, data theft, and credential access attacks against government agencies in Western Europe. An investigation revealed that an attack began on May 15, 2023, when Storm-0558 accessed the email accounts of about 25 organizations, including government agencies and consumer accounts associated with these organizations. The attackers forged authentication tokens to access user email with a Microsoft account consumer signing key they had acquired. Researchers discovered that the threat actors accessed email accounts through Outlook Web Access in Exchange Online and Outlook[.]com by forging authentication tokens. Microsoft has now released a comprehensive technical investigation into how attackers accessed the consumer signing key. The threat actors stole the signing key from a Windows crash dump after compromising a Microsoft engineer's corporate account. This article continues to discuss Storm-0558 stealing a signing key used to breach government email accounts from a Windows crash dump.

    Security Affairs reports "Chinese Cyberspies Obtained Microsoft Signing Key From Windows Crash Dump Due to a Mistake"

  • news

    Visible to the public "AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses"

    A security researcher has published exploit code for AtlasVPN for Linux, allowing anyone to disconnect a user and reveal their IP address by luring them to a website. NordVPN owns AtlasVPN, a "freemium" Virtual Private Network (VPN) service. According to its website, despite being only four years old, more than six million individuals worldwide use it. The unidentified researcher published exploit code for AtlasVPN Linux to the Full Disclosure mailing list and Reddit after receiving no response from the vendor. By copying and pasting the code onto their own website, any malicious hacker could disconnect any AtlasVPN user from their private network and expose their IP address. This article continues to discuss the AtlasVPN Linux exploit.

    Dark Reading reports "AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses"

  • news

    Visible to the public "Dozens of Unpatched Flaws Expose Security Cameras Made by Defunct Company Zavio"

    Security researchers at BugProve have discovered dozens of vulnerabilities in security cameras made by Zavio. Zavio is a defunct Chinese company, but its security cameras are reportedly still deployed in the United States and Europe. Since Zavio has been shut down, the researchers worked with CCTV Camera Pros, the main distributor of Zavio cameras in North America, to verify the vulnerabilities and with the US Cybersecurity and Infrastructure Security Agency (CISA) to coordinate the disclosure and obtain CVE identifiers for the flaws. The researchers identified more than 34 memory corruption and command injection vulnerabilities affecting various Zavio IP camera models, specifically a daemon called "Onvif," which is used for integrations with various surveillance systems. According to the researchers, seven of the vulnerabilities can be exploited for unauthenticated remote code execution with root privileges. The researchers noted that these types of flaws can typically enable attackers to take complete control of the targeted device. IP cameras can be targeted to hijack their video feeds, but in the wild, they are mostly targeted by botnets and abused for DDoS and other attacks. While the researchers have found many individual vulnerabilities, CISA has decided to assign only two CVE identifiers, CVE-2023-4249 and CVE-2023-3959, due to the flaws stemming from the same core issues. Since the impacted Zavio cameras will not receive patches, users have been advised to replace the devices to prevent falling victim to cyberattacks. CCTV Camera Pros is informing customers that Zavio cameras are no longer available and is recommending alternatives. The researchers originally discovered the weaknesses in late 2022, but the disclosure process was long due to the vendor's failure to respond, and due to the time it took CISA to verify the vulnerabilities.

    SecurityWeek reports: "Dozens of Unpatched Flaws Expose Security Cameras Made by Defunct Company Zavio"

  • news

    Visible to the public "Flipper Zero Can Be Used to Launch iOS Bluetooth Spam Attacks"

    The Flipper Zero portable wireless pen-testing and hacking tool can be used to spam Apple iOS devices, such as iPhones and iPads, with Bluetooth connection messages. A security researcher called 'Techryptic' developed the technique and posted a YouTube video demonstrating how it works. Apple devices supporting Bluetooth Low Energy (BLE) technology announce their presence to other devices using advertising packets (ADV packets). ADV packets are widely used in the Apple ecosystem to exchange data via AirDrop, connect the Apple Watch or AppleTV, activate Handoff, and more. As a wireless and radio-capable tool, Flipper Zero can spoof ADV packets and transmit them based on the BLE protocol. BLE-enabled devices in range will perceive these broadcasts as legitimate connection requests. This can be used to confuse a target by sending them bogus requests, making it difficult to distinguish legitimate devices from a large number of fakes, or to impersonate trusted devices in order to carry out phishing attacks. This article continues to discuss the Flipper Zero tool.

    Bleeping Computer reports "Flipper Zero Can Be Used to Launch iOS Bluetooth Spam Attacks"

  • news

    Visible to the public "Mirai Botnet Variant 'Pandora' Hijacks Android TVs for Cyberattacks"

    Pandora, a variant of the Mirai botnet, has been spotted infiltrating inexpensive Android-based TVs and TV boxes to use them as part of a botnet to launch Distributed Denial-of-Service (DDoS) attacks. According to Doctor Web, the compromises are likely to occur during malicious firmware updates or when applications for accessing pirated video content are installed. Signed with publicly available Android Open Source Project test keys, it is likely that this update has been made available for download from multiple websites, according to the company. The service that runs the backdoor is included in boot[.]img, allowing it to survive system reboots. In the alternative distribution methods, researchers believe that users are tricked into installing applications for streaming pirated movies and TV shows via websites mainly aimed at Spanish-speaking users. This article continues to discuss the Mirai botnet variant Pandora.

    THN reports "Mirai Botnet Variant 'Pandora' Hijacks Android TVs for Cyberattacks"

  • news

    Visible to the public "MacOS Malware Has a New Trick Up Its Sleeve"

    Malwarebytes researchers discovered that a newer version of the Atomic Stealer macOS malware has a new technique that enables it to evade the operating system's Gatekeeper. The malware, which was first advertised in April 2023, is an information stealer capable of grabbing passwords from browsers, Apple's keychain, files, cryptocurrency wallets, and more. According to Malwarebytes researcher Jerome Segura, criminals who buy the toolkit have been distributing it mainly through cracked software downloads but are also impersonating legitimate websites and using ads on search engines to lure victims. In the most recent delivery campaign observed by the researcher, the malware poses as TradingView, a well-known platform and app for monitoring financial markets. Potential victims are redirected by a malicious ad to a phishing site spoofing that legitimate platform's page. This article continues to discuss the new version of the Atomic Stealer macOS malware.

    Help Net Security reports "MacOS Malware Has a New Trick Up Its Sleeve"

  • news

    Visible to the public "IBM Discloses Data Breach Impacting Janssen Healthcare Platform"

    IBM recently notified customers and users of a Johnson & Johnson healthcare platform that their personal information may have been compromised as a result of a data breach. IBM explained that it provides services to Johnson & Johnson, which includes managing an application and third-party database for the company's Janssen CarePath patient support program. When Janssen became aware of a vulnerability that enabled unauthorized access to the CarePath database. IBM was informed about the security hole and worked with the database provider to address the issue. It's not uncommon for companies to become aware of vulnerabilities causing data exposure. However, an investigation revealed that in this case, there was unauthorized access to personal information in the impacted database on August 2. IBM stated that the affected information includes names, contact information, dates of birth, health insurance data, and medical information. IBM noted that social security numbers and financial account information were not stored in the database. The extent of the access could not be determined, but IBM has decided to notify CarePath users and customers whose information was exposed "out of an abundance of caution," offering them free credit monitoring services for one year. IBM noted that it found no evidence that the exposed information was misused. It's unclear how many individuals have been impacted by the incident, but Janssen says on its website that 1.16 million patients in the US were helped through the CarePath program in 2022.

    SecurityWeek reports: "IBM Discloses Data Breach Impacting Janssen Healthcare Platform"

  • news

    Visible to the public "UChicago Researchers Win Internet Defense Prize and Distinguished Paper Awards at USENIX Security"

    At this year's USENIX Security Symposium, faculty and students from the University of Chicago's (UChicago) Department of Computer Science won two Distinguished Paper Awards and the 2023 Internet Defense Prize. A team from Associate Professor Blase Ur's SUPERgroup received the Distinguished Paper Award for their research on the university's passwords' vulnerability to password reuse-related attacks. These types of attacks are possible when a UChicago affiliate creates an account on another service, such as LinkedIn, using a password similar to their UChicago password, and then that other service is breached. The researchers discovered that thousands of UChicago accounts were vulnerable to these attacks. These vulnerabilities often persisted for years and were sometimes actively exploited by malicious actors. This article continues to discuss the Glaze Project and SUPERgroup's collaborative research on the vulnerability of the university's passwords to attacks leveraging password reuse.

    The University of Chicago reports "UChicago Researchers Win Internet Defense Prize and Distinguished Paper Awards at USENIX Security"

  • news

    Visible to the public "How One State Pushes Cybersecurity to Local Agencies"

    Staff shortages and limited budgets have long troubled local governments and school districts trying to defend themselves against cyberattacks. In Arizona, the statewide information security and privacy office known as Cyber Command provides free cloud-based security services to state and local agencies, a strategy known as whole-of-state cybersecurity. Since the tools are cloud-based security stacks, the state can add customers and enable them to connect from any location and device. This strategy has helped Arizona strengthen its cybersecurity. The program was launched in November 2020, and by February 2021, the statewide number of critical and important vulnerabilities decreased from over 11,000 to less than 1,000. This article continues to discuss the impact of Arizona's whole-of-state cybersecurity program.

    Route Fifty reports "How One State Pushes Cybersecurity to Local Agencies"

  • news

    Visible to the public "New Chaes Malware Variant Targets Banking and Logistics Industries"

    A new variant of the Chaes malware called Chae$4 targets the banking and logistics industries along with major content management platforms. According to researchers at Morphisec, Chae$4 has targeted customers of platforms and banks such as Mercado Libre, Mercado Pago, WhatsApp Web, Itau Bank, Caixa Bank, and MetaMask. Several content management services, including WordPress, Joomla, Drupal, and Magento, have also been hit. Morphisec was able to thwart a number of these attacks before they could cause too much damage. The researchers noted that the Chaes malware first appeared in November 2020, when Cybereason researchers identified its operations as primarily targeting e-commerce customers in Latin America. The fourth version of the Chaes malware incorporates a refined code architecture, improved modularity, additional layers of encryption, and other enhancements. This article continues to discuss the new variant of the Chaes malware.

    SC Magazine reports "New Chaes Malware Variant Targets Banking and Logistics Industries"

  • news

    Visible to the public "CISA Announces Secure by Design Pledge with K-12 Education Technology Providers"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has announced a voluntary pledge for manufacturers of K-12 Education Technology software to design products with improved security. CISA has received commitments from six K-12 software technology providers, including PowerSchool, Classlink, Clever, GG4L, Instructure, and D2L. CISA Director Jen Easterly emphasized that it is crucial to address K-12 cybersecurity issues by ensuring schools and administrators have access to safe and secure technology and software right out of the box. All K-12 software developers are encouraged to help CISA strengthen cybersecurity for the education sector by prioritizing security as a fundamental aspect of product development. This article continues to discuss the Secure by Design Pledge with K-12 Education Technology providers.

    CISA reports "CISA Announces Secure by Design Pledge with K-12 Education Technology Providers"

  • news

    Visible to the public "Chrome 116 Update Patches High-Severity Vulnerabilities"

    Google recently announced the release of a Chrome 116 update that patches four high-severity vulnerabilities reported by external researchers. Tracked as CVE-2023-4761, the first bug is described as an out-of-bounds memory access issue in the FedCM (Federated Credential Management) API. Google noted that out-of-bounds memory access errors occur when a program reads memory addresses outside of the bounds of a buffer, which could ultimately allow an attacker to cause a denial-of-service (DoS) condition or exploit additional weaknesses to achieve code execution. The second flaw is a type confusion issue in the V8 JavaScript engine. Tracked as CVE-2023-4762, the vulnerability could lead to out-of-bounds memory access. The third bug, CVE-2023-4763, is a use-after-free issue in Chrome's Networks component. Google noted that use-after-free issues are a type of memory corruption bug that can be exploited to execute arbitrary code or cause a DoS condition and, if combined with other vulnerabilities, could lead to full system compromise. Google stated that in Chrome, use-after-free flaws can be combined with bugs in the browser process or with issues in the underlying operating system to escape Chrome's sandbox. The fourth vulnerability patched with this Chrome 116 update is CVE-2023-4764, an incorrect security UI flaw in BFCache (the in-memory cache where a complete snapshot of a page is stored), allowing a remote attacker to use a crafted HTML page to spoof the contents of the URL bar (Omnibox). Google has yet to determine the bug bounty rewards the reporting researchers will receive for their findings. The latest Chrome iteration is now rolling out as version 116.0.5845.179 for macOS and Linux and as versions 116.0.5845.179/.180 for Windows. Google also announced that the Chrome Extended Stable channel was updated to version 116.0.5845.179 for macOS and to version 116.0.5845.180 for Windows. Google does not mention any of these vulnerabilities being exploited in malicious attacks.

    SecurityWeek reports: "Chrome 116 Update Patches High-Severity Vulnerabilities"

  • news

    Visible to the public "Rogue Chrome Extensions Can Steal Passwords From Websites Such as Gmail, Amazon & Facebook"

    University of Wisconsin-Madison researchers have developed a Proof-of-Concept (PoC) Chrome extension that can steal plaintext passwords from the HTML source code of nearly any website. In a recently published paper, the researchers detailed how a comprehensive analysis of the security of text input fields in web browsers revealed that their coarse-grained permission model violates two security design principles: least privilege and complete mediation. The researchers also identified two input field vulnerabilities, including plaintext passwords in the HTML source code of popular websites such as gmail[.]com. Cloudflare, Facebook, Amazon, Citibank, and Capital One are just a few other major websites that store plaintext passwords in their HTML source code. About 12.5 percent of the extensions on the Chrome web store have the necessary permissions to exploit these vulnerabilities, including some of the most widely used ad blockers and shopping add-ons. This article continues to discuss the researchers' key findings regarding security vulnerabilities in browser text input fields.

    TechSpot reports "Rogue Chrome Extensions Can Steal Passwords From Websites Such as Gmail, Amazon & Facebook"

  • news

    Visible to the public "Android Zero-Day Patched With September 2023 Security Updates"

    Google recently announced that Android's September 2023 security updates contain patches for 32 vulnerabilities, including one that has been exploited in attacks. Tracked as CVE-2023-35674, the zero-day flaw is described as a high-severity elevation of privilege in Android's Framework component. According to Google, no additional execution privileges or user interaction are required to exploit the bug. Google noted that there are indications that CVE-2023-35674 may be under limited, targeted exploitation. Five other high-severity vulnerabilities were addressed in Framework, three leading to elevation of privilege and two to information disclosure. All six issues were resolved as part of Android's "2023-09-01 security patch level," which also addresses 14 vulnerabilities in the System component. Of these, three are critical-severity bugs that could lead to remote code execution, while the rest are high-severity flaws, six leading to elevation of privilege, four to information disclosure, and one to denial-of-service (DoS). Google noted that the most severe of these issues is a critical security vulnerability in the System component that could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Google also announced that two other issues were resolved in Project Mainline components with updates delivered via Google Play. The second part of this month's security update for Android arrives on devices as the "2023-09-05 security patch level" with fixes for 12 other vulnerabilities in Qualcomm components. Google noted that the "2023-09-05 security patch level" addresses all bugs in this month's security updates and the issues resolved with previous patch levels.

    SecurityWeek reports: "Android Zero-Day Patched With September 2023 Security Updates"

  • news

    Visible to the public "Thousands of Popular Websites Leaking Secrets"

    Security researchers at Truffle Security warn that thousands of the domains in the Alexa top 1 million websites list are leaking secrets, including credentials. The researchers noted that 4,500 of the analyzed websites exposed their .git directory. Created when a Git repository is initialized, a .git directory includes all the information necessary for a project, including code commits, file paths, version control information, and more. In the case of some websites, the researchers noted, this directory can include their entire private source code. Exposed .git directories could provide attackers with access to the entire source code, configuration files, commit history, and access credentials. The researchers stated that attackers could use this inside knowledge to mount an attack against the victim's web application or search the code for live credentials to third-party services like AWS. An analysis of the exposed credentials has revealed that AWS and GitHub keys were the most prevalent type of leaked secrets, accounting for 45% of all credentials. According to the researchers, an explanation for the large number of exposed GitHub tokens is the fact that they are often stored in the Git config file during remote repository cloning. The researchers noted that third-party email marketing services (like Mailgun, SendInBlue, Mailchimp, and Sendgrid) accounted for a large percentage of the leaked keys as well. Looking into the exposed GitHub credentials, the researchers discovered that roughly 67% of them were for accounts with admin-level privileges. All (100%) had repo permissions, which would enable an attacker to take arbitrary actions against all of the victim user's repositories, including, but not limited to, implanting malware in the code. Further analysis of the identified secrets revealed the exposure of a private RSA key corresponding to a domain's TLS certificate, potentially allowing attackers to conduct man-in-the-middle attacks. The researchers stated that they attempted to contact all impacted site owners after identifying and verifying the exposed secrets but noted that the endeavor was not successful in all cases.

    SecurityWeek reports: "Thousands of Popular Websites Leaking Secrets"

  • news

    Visible to the public "MITRE & CISA Release Open-Source MITRE Caldera Extension for Operational Technology"

    MITRE Caldera for OT is now publicly available as an extension to the open-source Caldera platform, enabling security teams to conduct automated adversary emulation exercises focused on Operational Technology (OT) threats. The first Caldera for OT extensions were developed with the Homeland Security Systems Engineering and Development Institute (HSSEDI), a federally funded research and development center that is managed and operated by MITRE for the Department of Homeland Security (DHS), and the Cybersecurity and Infrastructure Security Agency (CISA). Adversary emulation has helped information system defenders exercise and improve their cyber defenses through real adversary techniques. Cyber defenders can use Caldera to save time, money, and energy by automating adversary emulation operations, security assessments, and red-, blue-, and purple-teaming. With the release of Caldera for OT, Industrial Control System (ICS) defenders now experience the same advantage. This article continues to discuss the release of MITRE Caldera for OT.

    MITRE reports "MITRE & CISA Release Open-Source MITRE Caldera Extension for Operational Technology"

  • news

    Visible to the public "Avoidable Digital Certificate Issues Fuel Data Breaches"

    According to a report by AppViewX and Forrester Consulting, of the organizations that have experienced data breaches, 58 percent were due to problems with digital certificates. Fifty-seven percent revealed that their organizations have incurred significant costs per service outage. According to the Forrester study, organizations have traditionally paid less attention to managing machine identities than human ones, in part because machine identities have different requirements and more complex lifecycle and security challenges. Digital certificates provide authentication and protection for sensitive information. However, few organizations are confident in their ability to effectively layer and manage identity security across machines and navigate privacy and security responsibility assignments. Fifty-eight percent of organizations that experienced a data breach attributed it to preventable certificate-management issues. Fifty-two percent of organizations that faced a service or application outage cited certificated-related issues as the cause. This article continues to discuss key findings from AppViewX and Forrester Consulting regarding digital certificate issues.

    Help Net Security reports "Avoidable Digital Certificate Issues Fuel Data Breaches"

  • news

    Visible to the public "Researchers Discover Critical Vulnerability in PHPFusion CMS"

    Researchers have discovered what they describe as a critical vulnerability in the open-source Content Management System (CMS) PHPFusion, which is widely used. The vulnerability, tracked as CVE-2023-2453, is an authenticated local file inclusion flaw that enables Remote Code Execution (RCE) if an attacker can upload a maliciously crafted ".php" file to a known path on a target system. It is one of two vulnerabilities recently discovered in PHPFusion by Synopsys researchers. The other vulnerability, tracked as CVE-2023-4480, is a moderate-severity bug in the CMS that allows attackers to read the contents of files on an affected system and write files to arbitrary locations on it. This article continues to discuss the critical vulnerability found in the PHPFusion open-source CMS.

    Dark Reading reports "Researchers Discover Critical Vulnerability in PHPFusion CMS"

  • news

    Visible to the public "W3LL Phishing Kit Hijacks Thousands of Microsoft 365 Accounts, Bypasses MFA"

    A threat actor known as W3LL developed a phishing kit to circumvent multi-factor authentication (MFA) and other tools. Over 8,000 Microsoft 365 corporate accounts have been compromised by the phishing kit. In ten months, security researchers discovered that W3LL's utilities and infrastructure were used in 850 phishing attacks to steal the credentials of over 56,000 Microsoft 365 accounts. W3LL's custom phishing tools were used in Business Email Compromise (BEC) attacks, resulting in significant financial losses. According to researchers, W3LL's inventory encompasses nearly the entire kill chain of a BEC operation and can be operated by "cybercriminals of all technical skill levels." This article continues to discuss the W3LL phishing kit.

    Bleeping Computer reports "W3LL Phishing Kit Hijacks Thousands of Microsoft 365 Accounts, Bypasses MFA"

  • news

    Visible to the public "Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant"

    The Iranian threat actor APT34 has been linked to a new phishing attack that deploys a variant of the SideTwist backdoor. According to NSFOCUS Security Labs, APT34 has a high level of attack technology, the ability to design different intrusion methods for various targets, and supply chain attack capabilities. APT34, also known as Cobalt Gypsy, Hazel Sandstorm (formerly Europium), Helix Kitten, and OilRig, has been targeting telecommunications, government, defense, oil, and financial services verticals in the Middle East with spear-phishing lures that lead to the deployment of multiple backdoors since at least 2014. The hacking group's ability to create new and updated tools to reduce the likelihood of detection and maintain a foothold on compromised hosts for extended periods of time is one of its defining characteristics. This article continues to discuss the phishing campaigns linked to APT34.

    THN reports "Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant"

  • news

    Visible to the public "Carmakers Are Failing the Privacy Test. Owners Have Little or No Control Over Data Collected"

    A new study reveals that most major car makers acknowledge they may be selling users' personal information. However, they are vague about the buyers. Half of them would share such information with the government or law enforcement without a court order. The proliferation of automobile sensors, ranging from telematics to digital control consoles, has transformed them into data-collection powerhouses. The latest "Privacy Not Included" survey by the non-profit Mozilla Foundation found that drivers have little to no control over the personal data collected by their vehicles. Given the history of manufacturers' vulnerability to hacking, the ambiguity of security standards is a major concern. This article continues to discuss key findings and points from the survey.

    AP reports "Carmakers Are Failing the Privacy Test. Owners Have Little or No Control Over Data Collected"

  • news

    Visible to the public "Crypto Casino Stake[.]com Back Online After $40m Heist"

    Hackers have recently stolen over $40m in cryptocurrency from Curacao-headquartered Stake[.]com, which offers casino and sports betting for players using cryptocurrency. The firm noted that on Monday, it had spotted unauthorized transactions being made from its Ethereum (ETH) and Binance Smart Chain (BSC) hot wallets. The firm claimed that BTC, LTC, XRP, EOS, TRX, and "all other wallets" were untouched by the hackers. In crypto, hot wallets are less secure than cold wallets because public and private keys can be reached from the internet, enabling remote access and unauthorized activity. This appears to be what happened to Stake[.]com, although the firm has revealed few other details. On the same day of discovery, Stake[.]com announced that the issue had been remediated. The incident was first flagged by blockchain security company Cyvers, which said its AI monitoring tools had picked up suspicious activity, specifically that $16m worth of Ethereum cryptocurrency had been withdrawn from Stake[.]com. The stolen crypto was then transferred to other external wallets. Blockchain investigator ZachXBT revealed that an additional $25.6m in BSC and Polygon was drained from the hot wallets. Hot wallets are a common target for attack by state-sponsored and cybercrime actors.

    Infosecurity reports: "Crypto Casino Stake[.]com Back Online After $40m Heist"

  • news

    Visible to the public "Better Cybersecurity With New Material"

    Encryption is the most common method for protecting information. Information is encrypted using a Random Number Generator (RNG), which can be a computer program or the hardware itself. The RNG provides the keys to encrypt and unlock information at the receiving end. According to researchers, the Quantum Random Number Generator (QRNG) is the hardware method that provides the best randomness. Guilherme B. Xavier, a researcher at Linkoping University's Department of Electrical Engineering, and his research group, in collaboration with researchers at the Department of Physics, Chemistry, and Biology (IFM), have developed a new type of QRNG that can be used for encryption. The use of light-emitting diodes made from the crystal-like material perovskite is a new aspect of the researchers' QRNG. This article continues to discuss the new type of RNG for encryption developed at Linkoping University.

    Linkoping University reports "Better Cybersecurity With New Material"

  • news

    Visible to the public "Scammers Can Abuse Security Flaws in Email Forwarding to Impersonate High-Profile Domains"

    Due to flaws in the process that enables email forwarding, it is easier than previously believed to send an email with a forged address, according to a research team led by computer scientists from the University of California San Diego. The issues discovered by researchers affect the integrity of emails sent from tens of thousands of domains, including those representing US government organizations. Major financial service providers, such as Mastercard, and news organizations like The Washington Post and the Associated Press are also at risk. It is referred to as forwarding-based spoofing, and researchers have discovered that it is possible to send email messages impersonating these organizations, circumventing the security measures implemented by email providers such as Gmail and Outlook. This article continues to discuss the researchers' findings regarding security flaws in email forwarding.

    The University of California San Diego reports "Scammers Can Abuse Security Flaws in Email Forwarding to Impersonate High-Profile Domains"

  • news

    Visible to the public "VU Researcher to Develop New Framework for Data Privacy & Utility"

    Dr. Yongfeng (Felix) Ge of Victoria University will develop an evolutionary computation-based framework to optimize privacy and utility issues associated with data storage and publishing. Recent large-scale data breaches in Australia, which resulted in the disclosure of personal information belonging to millions of people, have highlighted the need for enhanced data security systems. His project titled "Evolving privacy and utility in data storage and publishing" seeks to produce the theory and practical demonstration of building a reliable and robust system for privacy preservation and utility maintenance. This article continues to discuss the project aimed at developing a new framework for data privacy and utility.

    Victoria University reports "VU Researcher to Develop New Framework for Data Privacy & Utility"

  • news

    Visible to the public "Project Aims to Ensure Offshore Renewable Innovations Remain Cyber-Secure"

    Researchers are establishing a cybersecurity research and development facility to harden offshore wind technology against cyberattacks. The Cyber-Resilience of Offshore Wind Networks (CROWN) project will establish the lab space at the University of Plymouth. It will include examples of the software and hardware implemented in a wind turbine array and its integration with the grid, and it will use these examples to identify potential vulnerabilities. The project team will then create resilience procedures, security measures, and training tools to ensure that future attacks do not disrupt wind farms' energy flow. The CROWN project is being led by researchers from the Maritime Cyber Threats research group at the University of Plymouth, together with the Offshore Renewable Energy (ORE) Catapult. This article continues to discuss the CROWN project.

    The University of Plymouth reports "Project Aims to Ensure Offshore Renewable Innovations Remain Cyber-Secure"

  • news

    Visible to the public "What's in a NoName? Researchers See a Lone-Wolf DDoS Group"

    NoName057(16), a Russian hacker group, conducts Distributed Denial-of-Service (DDoS) attacks against European financial institutions, government websites, and transportation services. The group recently claimed responsibility for disrupting the websites of several banks and financial institutions in the Czech Republic and Poland, which it views as hostile to the Russian state due to their support for Ukraine. NoName057(16), like other pro-Kremlin hacktivist groups such as Killnet or the Cyber Army of Russia, carries out relatively easy and brief DDoS attacks with the help of hundreds of volunteers. The objective is to disrupt everyday life, even if it is just for a few minutes. Researchers note that some aspects distinguish this group from others. According to Pascal Geenens, director of cyber threat intelligence at the cybersecurity company Radware, NoName057(16) is considered a "lone wolf" in the Russian cybercrime landscape as the group does not form any alliances with other hackers and relies mainly on the custom-built DDoSia toolkit to execute its attacks. This article continues to discuss findings and observations regarding NoName057(16).

    The Record reports "What's in a NoName? Researchers See a Lone-Wolf DDoS Group"

  • news

    Visible to the public "Parcel Delivery Smishing Campaign Targets iPhone Users"

    According to researchers at Resecurity, a threat group that specializes in impersonating postal agencies and mail delivery companies has launched an SMS phishing (smishing) campaign against iPhone users in the US. The group develops fake but convincing parcel tracking websites, using smishing techniques to trick victims into disclosing Personal Identifiable Information (PII) and payment credentials. Its most recent campaign, which impersonates the US Postal Service (USPS), is suspected of having impacted at least 108,000 victims. Resecurity noted that in addition to orchestrating last month's successful campaign, the Chinese-speaking group it refers to as Smishing Triad has sold various country-specific "smishing kits" to other cybercriminals. This article continues to discuss the parcel delivery smishing campaign.

    SC Magazine reports "Parcel Delivery Smishing Campaign Targets iPhone Users"

  • news

    Visible to the public "Airlines Battle Surge in Loyalty Program Fraud"

    According to security researchers at Group-IB, cyber fraudsters have been observed increasingly exploiting vulnerabilities in air miles and customer service systems across the EU, the UK, and the US. The researchers noted that in 2022 alone, cases of loyalty fraud surged by 30%, impacting more than 75 airlines and involving over 2000 malicious resources. The researchers stated that one common tactic employed by fraudsters is the customer service scam. Scammers impersonate airlines' customer service through fake phone numbers. They lure victims into calling these numbers, often shared via various platforms, under the guise of booking flights or claiming refunds. The researchers noted that unsuspecting victims end up divulging their banking information, including credit card details. Fraudsters may even attempt to install remote access Trojans (RATs) on victims' devices, potentially gaining control over sensitive data. Fraudsters have also been observed employing tactics like phishing websites, promising victims enticing rewards or prizes.

    Infosecurity reports: "Airlines Battle Surge in Loyalty Program Fraud"

  • news

    Visible to the public "New BLISTER Malware Update Fueling Stealthy Network Infiltration"

    Threat actors are using an updated version of a malware loader known as BLISTER in SocGholish infection chains to distribute an open-source command-and-control (C2) framework called Mythic. According to Elastic Security Labs researchers, the new BLISTER update includes a keying feature that enables precise targeting of victim networks and reduces exposure within Virtual Machine (VM)/sandbox environments. In December 2021, the company discovered BLISTER serving as a conduit for distributing Cobalt Strike and BitRAT payloads on compromised systems. In July 2023, Palo Alto Networks Unit 42 disclosed the use of the malware alongside SocGholish, also known as FakeUpdates, a JavaScript-based downloader malware, to deliver Mythic. In an attempt to bypass security software and infiltrate victim environments, BLISTER is embedded within a legitimate VLC Media Player library in these attacks. This article continues to discuss findings regarding the new BLISTER malware update.

    THN reports "New BLISTER Malware Update Fueling Stealthy Network Infiltration"

  • news

    Visible to the public "Hackers Exploit MinIO Storage System to Breach Corporate Networks"

    Hackers are exploiting two MinIO vulnerabilities to compromise object storage systems, gain access to private information, execute arbitrary code, and take control of servers. MinIO is an open-source object storage service compatible with Amazon S3 and capable of storing up to 50TB of unstructured data, logs, backups, and container images. MinIO is a popular, cost-effective option due to its high performance and adaptability, especially for Artificial Intelligence (AI)/Machine Learning (ML) and data lake applications. The two vulnerabilities discovered chained in attacks by Security Joes' incident responders are tracked as CVE-2023-28432 and CVE-2023-28434, two critical flaws affecting all versions of MinIO before RELEASE.2023-03-20T20-16-18Z. During an incident response engagement, analysts discovered that attackers attempted to deploy a modified version of the MinIO application, named Evil MinIO. This article continues to discuss hackers exploiting MinIO vulnerabilities to breach corporate networks.

    Bleeping Computer reports "Hackers Exploit MinIO Storage System to Breach Corporate Networks"

  • news

    Visible to the public "Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers"

    The Zero Day Initiative (ZDI) has announced that over $1 million in cash and prizes will be offered at the first Pwn2Own hacking contest centered on car systems. The competition, named Pwn2Own Automotive, will consist of four categories: all things Tesla, In-Vehicle Infotainment (IVI), electrical vehicle chargers, and operating systems. It will be held in Tokyo in January 2024. ZDI's Brian Gorenc outlined the event's three primary objectives, which are to provide a venue to promote automotive research, incentivize vendors to participate in the security research community, and bring attention to the vehicle's subcomponents. This article continues to discuss the competition encouraging automotive security research.

    Dark Reading reports "Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers"

  • news

    Visible to the public "Connected Cars and Cybercrime: A Primer"

    When considering how to invest their budgets, Original Equipment Manufacturers (OEMs) and their suppliers may be tempted to invest less in addressing cyber threats. So far, the attacks they have encountered have not been very sophisticated or harmful. However, the analysis of conversations in underground criminal message exchanges reveals that the pieces are in place for multi-layered, widespread attacks in the future. Given the typical length of the automotive industry's development cycles, waiting for more sophisticated attacks on connected vehicles is impractical. The world's automotive OEMs and suppliers are urged to prepare for the unavoidable transition from today's manual, car-modding hacks to tomorrow's user impersonation, account thefts, and other potential attacks. This article continues to discuss how connectivity is changing car crime, emerging fronts for next-generation attacks, the exploitation of connected cars, and positioning today for the future threat landscape.

    Help Net Security reports "Connected Cars and Cybercrime: A Primer"

  • news

    Visible to the public "Ransomware Attack on Fencing Systems Maker Zaun Impacts UK Military Data"

    British mesh fencing systems maker Zaun has recently disclosed that a LockBit ransomware attack potentially led to the compromise of data related to UK military and intelligence sites. Headquartered in Wolverhampton, Zaun specializes in high-security perimeter fencing products used by prisons, military bases, and utilities. In a data breach notice posted on September 1, Zaun announced that the cyberattack occurred in early August, that it was able to thwart it before data was encrypted, and that its services were not interrupted by the incident. The organization stated that although file-encrypting ransomware was not executed on its systems, the LockBit ransomware group managed to exfiltrate network data. The company noted that LockBit will have potentially gained access to some old emails, orders, drawings, and project files. Zaun does not believe that any classified documents were stored on the system or have been compromised. Zaun noted that they are in contact with relevant agencies and will keep the agencies updated as more information becomes available. In a recent update, Zaun acknowledges that the ransomware group has since made the stolen data public on the internet. Some of the information appears related to the UK military, intelligence, and research bases. Zaun says that as part of the cyberattack, the LockBit gang first compromised a Windows 7 computer running software for a manufacturing machine and likely only exfiltrated data from that system.

    SecurityWeek reports: "Ransomware Attack on Fencing Systems Maker Zaun Impacts UK Military Data"

  • news

    Visible to the public "Freecycle Breach May Have Hit Millions of Users"

    A non-profit organization used by millions on both sides of the Atlantic to recycle their possessions has admitted to suffering a data breach last month. The US-based Freecycle Network, which is also registered as a charity in the UK, claimed in an online notice that it discovered the incident on August 30. The organization claimed that the data affected includes usernames, User IDs, email addresses, and passwords. Because of the exposure of personal passwords, the organization noted that they are taking every measure to quickly inform members about the need to change their passwords. The organization advised that if users used the same password elsewhere, they should also change that account password. Freecycle noted that no other personal information was compromised, and the breach is being reported to the respective privacy authorities. Freecycle claims to have nearly 11 million members.

    Infosecurity reports: "Freecycle Breach May Have Hit Millions of Users"

  • news

    Visible to the public "Hacker Gains Admin Control of Sourcegraph and Gives Free Access to the Masses"

    An unidentified hacker gained administrative control of Sourcegraph, an Artificial Intelligence (AI)-powered service used by developers at Uber, Reddit, Dropbox, and other companies. Through this control, the hacker provided free access to resources normally requiring payment. In doing so, the hacker may have accessed Sourcegraph users' personal information. The exposed information for paid users included license keys, as well as the names and email addresses of license key holders. For non-paying users, the exposure was limited to email addresses associated with their accounts. The hacker gained administrative access by obtaining an authentication key that a Sourcegraph developer inadvertently included in code published to a public Sourcegraph instance hosted on Sourcegraph[.]com. After creating a standard user Sourcegraph account, the hacker used the token to grant the account administrator privileges. This article continues to discuss the administrative control of Sourcegraph gained by a hacker.

    Ars Technica reports "Hacker Gains Admin Control of Sourcegraph and Gives Free Access to the Masses"

  • news

    Visible to the public "More Okta Customers Trapped in Scattered Spider's Web"

    Customers of Okta, one of the leading providers of authentication services and Identity and Access Management (IAM) systems, report social engineering attacks targeting their Information Technology (IT) service desks to compromise administrator-level user accounts. Multiple Okta customers in the US have reported phishing efforts in which a caller tries to convince service desk employees to reset all multi-factor authentication (MFA) factors enrolled for highly privileged users. The attackers then used the compromised Okta Super Administrator accounts to abuse legitimate identity federation features that allowed them to impersonate users within the organization. When asked if Okta linked the attacks to a specific group, Okta's CSO, David Bradbury, said that other cybersecurity companies have attributed this behavior to threat actors known as Scattered Spider. According to security researchers, Scattered Spider, also known as UNC3944, Scatter Swine, and Muddled Libra, has been in operation since May 2022. This article continues to discuss the phishing campaign targeting Okta customers.

    The Register reports "More Okta Customers Trapped in Scattered Spider's Web"

  • news

    Visible to the public "CDM Policies Provide a Vital Shield Against Climate-Driven Cyberattacks, Experts Say"

    According to cybersecurity experts, critical infrastructure operators can use traditional but increasingly innovative security practices to prevent emerging threats related to extreme heat waves, massive storms, and other weather events exacerbated by climate change. Continuous Diagnostics and Mitigation (CDM) policies can significantly mitigate destructive cyberattacks targeting critical infrastructure industries by proactively identifying and addressing various cybersecurity challenges, ranging from digital intrusions to software system vulnerabilities. As cybercriminals continue exploiting climate-induced extreme weather events, CDM policies can play a crucial role in mitigating these heightened risks by providing critical infrastructure operators with important security tools, such as modern access controls and automated vulnerability remediation. This article continues to discuss climate-driven cyberattacks and the use of CDM policies to protect against them.

    NextGov reports "CDM Policies Provide a Vital Shield Against Climate-Driven Cyberattacks, Experts Say"

  • news

    Visible to the public "Ransomware Attackers Are Targeting Exposed Microsoft SQL Databases, Report Says"

    Researchers at Securonix found ransomware campaigns using Internet-exposed Microsoft SQL (MSSQL) databases as a launching point for attacks against victim systems. Oleg Kolesnikov, vice president of threat research at Securonix, says the typical attack sequence starts with brute-force attempts to access exposed MSSQL databases. According to Securonix researchers, it is unclear whether the hackers are making dictionary-based or random password spray attempts. Once a database's password is cracked, attackers expand their foothold within the target system and use MSSQL as a launchpad for various payloads, such as Remote Access Trojan (RAT) malware and ransomware. This article continues to discuss the exploitation of Internet-exposed MSSQL databases in ransomware campaigns.

    The Record reports "Ransomware Attackers Are Targeting Exposed Microsoft SQL Databases, Report Says"

  • news

    Visible to the public "Telegram's Popularity Continues to Soar as Catalog of Available Cyber Crime Services Matures"

    The Telegram messaging application has become cybercriminals' go-to assistant for various cyberattacks, as it provides services similar to those found on the dark web via a more accessible platform. Phishing and other cyberattack services are often associated with dark web forums, but the ease of use and privacy features of Telegram have made the platform increasingly attractive to criminals, who advertise a variety of services through its channels. Searchlight Cyber researchers uncovered many phishing services being advertised through Telegram, ranging from simple static pages sold for as little as $50 to significantly more complex and customizable sites with administration pages and controls. This article continues to discuss the growing popularity of Telegram among cybercriminals.

    ITPro reports "Telegram's Popularity Continues to Soar as Catalog of Available Cyber Crime Services Matures"

  • news

    Visible to the public "Researchers Released a Free Decryptor for the Key Group Ransomware"

    The threat intelligence company EclecticIQ has released a free decryption tool for the Key Group ransomware that enables victims to recover their data without paying the demanded ransom. Since at least January 2023, the Key Group ransomware gang has been in operation. Researchers believe that the financially-motivated gang primarily speaks Russian. The group is a less sophisticated threat actor focusing on financial gain by selling Personally Identifiable Information (PII) or initial access to compromised devices and demanding ransom payments. The researchers observed that the group's ransomware samples contained multiple cryptographic mistakes, which allowed them to develop a decryption tool for a ransomware version created on August 3, 2023. This article continues to discuss the release of a free decryptor for the Key Group ransomware.

    Security Affairs reports "Researchers Released a Free Decryptor for the Key Group Ransomware"

  • news

    Visible to the public "A Brief History of ICS-Tailored Attacks"

    According to Oleg Brodt, Chief Innovation Officer for Cyber at Ben-Gurion University of the Negev, Industrial Control System (ICS)-specific malware is relatively difficult to develop for malware authors. It takes more effort to attack ICS. ICS facilities are much more heterogenic than Information Technology (IT), requiring attackers to tailor their attacks to a specific target and gather intelligence on that site. The attacker must understand the targeted process. Malware authors are typically not experts in metallurgy, energy production, or water desalination, so they must collaborate with those who are knowledgeable in those areas to understand the underlying physical process if they want to manipulate it. Many safety systems are in place in ICS environments to prevent operators from making costly mistakes. These systems are also useful for containing cyberattacks, as they have safeguards against dangerous physical anomalies. Despite the difficulties in launching ICS-specific attacks, malware families have managed to impact ICS environments. Malware families, including Stuxnet, Havex, BlackEnergy2/3, Industroyer Crashoverride, and more, have specifically targeted ICS environments. This article continues to discuss seven ICS-centered malware families.

    Dark Reading reports "A Brief History of ICS-Tailored Attacks"

  • news

    Visible to the public "North Korean Hackers Behind Malicious VMConnect PyPI Campaign"

    North Korean state-sponsored hackers are responsible for the VMConnect campaign, which uploaded malicious packages to the Python Package Index (PyPI) repository. One of the packages mimicked the VMware vSphere connector module vConnector. The packages were uploaded at the beginning of August, with a package named "VMConnect" aimed at Information Technology (IT) professionals looking for virtualization tools. VMConnect had 237 downloads before its removal from the PyPI platform. Two additional packages containing the same code, named "ethter" and "quantiumbase," were downloaded 253 and 216 times, respectively. According to a new report, ReversingLabs links the campaign to Labyrinth Chollima, a subgroup of North Korean Lazarus hackers. This article continues to discuss the VMConnect PyPI campaign.

    Bleeping Computer reports "North Korean Hackers Behind Malicious VMConnect PyPI Campaign"

  • news

    Visible to the public "New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean Activists"

    SuperBear, a novel Remote Access Trojan (RAT), was discovered due to a new phishing attack targeting civil society groups in South Korea. According to Interlabs, the attack targeted an unnamed activist who was contacted in late August 2023 and received a malicious LNK file from an address impersonating a member of the organization. When the LNK file is executed, a PowerShell command is launched to execute a Visual Basic script, which then fetches the next-stage payloads from a legitimate but compromised WordPress website. The attack has been loosely attributed to the North Korean nation-state actor named Kimsuky, also known as APT43, Emerald Sleet, Nickel Kimball, and Velvet Chollima, based on similarities with the initial attack vector and the PowerShell commands used. This article continues to discuss the SuperBear RAT.

    THN reports "New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean Activists"