News Items

  • news

    Visible to the public "The Race to Make Hospitals Cybersecure"

    The European Union Agency for Cybersecurity (ENISA) detected 623 ransomware incidents in member states between May 2021 and June 2022. Healthcare was the fifth most targeted industry, which has resulted in increased investment and technological innovation to secure the sector. Sabina Magalini, a surgery professor at the Catholic University of the Sacred Heart in Rome, Italy, coordinated the EU-funded PANACEA project to enhance hospital cybersecurity. The project lasted 38 months through February 2022. Research conducted during PANACEA revealed that nurses frequently had to log in to computer systems over 80 times a day. This is time-consuming and leads to shortcuts, such as a group of individuals using the same password or passwords being written down on paper next to the computer. The study showed that hospital staff inadequately followed cybersecurity practices, exposing systems to exploitation by attackers. PANACEA developed methods to facilitate hospital staff compliance with cybersecurity precautions. For example, one of the contributions was software designed to make login systems more secure. Magalini noted that the software enables facial recognition of healthcare employees, reducing password issues. The project also experimented with low-tech substitutes, such as posting stickers and posters in hospitals to encourage healthcare employees to adhere to basic cybersecurity practices. This article continues to discuss EU-funded research aimed at improving the cybersecurity of hospitals.

    The European Commission reports "The Race to Make Hospitals Cybersecure"

  • news

    Visible to the public "Advanced Phishing Attacks Surge 356% in 2022"

    Security researchers at Perception Point have observed a 356% growth in the number of advanced phishing attacks attempted by threat actors in 2022. The total number of cyberattacks increased by 87%. The researchers noted that among the reasons behind this growth is the fact that malicious actors continue to gain widespread access to new tools, including artificial intelligence (AI) and machine learning (ML)-powered tools. These have automated the process of generating sophisticated attacks, including those characterized by social engineering as well as evasion techniques. The researchers stated that the changing threat landscape has resulted from the swift adoption of new cloud collaboration apps, cloud storage, and productivity services for external collaboration. Threat actors have adapted to this shift, with 2022 experiencing a 161% surge in attacks on cloud storage and collaboration apps, though email and the browser remained the leading attack vectors. Overall, phishing was the most pervasive threat, accounting for 67.4% of all attacks. The researchers noted that last year also experienced a significant increase in business email compromise (BEC) attacks, which grew by 83%. Microsoft was the brand most impersonated in malicious emails, 3.3x more than the next most copied brand, LinkedIn.

    Infosecurity reports: "Advanced Phishing Attacks Surge 356% in 2022"

  • news

    Visible to the public "Group-IB: Qilin Affiliates Receive Up to 85% Of Each Ransomware Payout"

    In March 2023, Group-IB researchers infiltrated the Qilin ransomware group and discovered that affiliates received 80 to 85 percent of each ransomware payout. The researchers infiltrated Tox, an encrypted messaging app used by members of the Qilin ransomware group. They listened in on private conversations with a Qilin recruiter named Haise, who was identified as a member of another dark web group called RAMP. Qilin is a cyber extortion gang that operates a Ransomware-as-a-Service (RaaS) program. The group practices double extortion, demanding a ransom in exchange for a decryptor to access files on encrypted devices, and threatening to publish sensitive information on their data leak website unless the ransom is paid. Between July 2022 and May 2023, Qilin listed 12 organizations on its data leak website. The ransomware group uses Rust-based malware, which is difficult to detect due to the programming language's robust cryptographic properties. Before transitioning to Rust, the group initially developed the malware in the Go programming language. Many Qilin ransomware attacks are customized to maximize their impact on each victim. The group claims it does not target the Commonwealth of Independent States (CIS), which includes Russia and former Soviet states, thus leading Group-IB to believe the Qilin ransomware is pro-Russian. This article continues to discuss Group-IB researchers' findings regarding the Qilin ransomware group.

    CPO Magazine reports "Group-IB: Qilin Affiliates Receive Up to 85% Of Each Ransomware Payout"

  • news

    Visible to the public "How the ILOVEYOU Worm Exposed Human Beings as the Achilles Heel of Cybersecurity"

    The CTO of CTERA, Aron Brand, discusses how the ILOVEYOU virus ushered in the era of social engineering in the digital world. The digital world experienced a cyberattack in 2000 that altered the approach to cybersecurity. The ILOVEYOU worm, also known as the Love Bug or Love Letter For You, infected over 10 million Windows personal computers within days of its emergence on May 5, 2000. Major companies, including Ford Motor Company, AT&T, and Microsoft, as well as government organizations, were forced to shut down their email services in order to contain the damage. Since an estimated 10 percent of the world's computers connected to the Internet were compromised, the total damage could have exceeded $10 billion. Many people were drawn in by the seemingly innocent "love letter" email attachment, demonstrating how vulnerable humans are to social engineering tactics. Although there have been technological advancements throughout the years, the human brain remains the most difficult vulnerability to fix. In the digital era, technological aspects of cybersecurity are often the focus of discussion, but the human factor remains the chain's weakest link. As we observe the emergence of Large Language Models (LLMs) such as ChatGPT and deepfake technologies, the potential for social engineering attacks on a large scale becomes a more alarming concern. This article continues to discuss the ILOVEYOU worm and the human aspect of security.

    SC Magazine reports "How the ILOVEYOU Worm Exposed Human Beings as the Achilles Heel of Cybersecurity"

  • news

    Visible to the public "Chip-Based QKD Achieves Higher Transmission Speeds"

    Researchers have developed a Quantum Key Distribution (QKD) system based on integrated photonics that is capable of transmitting secure keys at unprecedented speeds. The proof-of-principle experiments are a significant step toward implementing this highly secure communication method in the real world. QKD is a method for supplying distant parties with secret keys for secure communication. By using the quantum properties of light to generate secure random keys for encrypting and decrypting data, the security is based on the laws of physics, as opposed to the computational complexity of current communication protocols. This article continues to discuss the QKD system based on integrated photonics that lays the groundwork for network implementation.

    Optica reports "Chip-Based QKD Achieves Higher Transmission Speeds"

  • news

    Visible to the public "Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry"

    Dark Frost is a new botnet launching Distributed Denial-of-Service (DDoS) attacks against the gaming industry. According to a new technical analysis by Akamai security researcher Allen West, the Dark Frost botnet, modeled after Gafgyt, QBot, Mirai, and other malware strains, has grown to include hundreds of compromised devices. The botnet's targets include gaming companies, game server hosting providers, online streamers, and other gaming community members with whom the threat actor has had direct interactions. As of February 2023, the botnet consists of 414 machines with instruction set architectures, such as ARMv4, x86, MIPSEL, MIPS, and ARM7. Dark Frost appears to have been assembled using source code stolen from multiple botnet malware strains, including Mirai, Gafgyt, and QBot. After flagging the botnet on February 28, 2023, Akamai reverse-engineered it and estimated its attack potential to be approximately 629.28 Gbps via a UDP flood attack. Researchers believe the threat actor has been active since at least May 2022. This article continues to discuss findings and observations regarding the Dark Frost botnet.

    THN reports "Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry"

  • news

    Visible to the public "Predator: Looking Under the Hood of Intellexa's Android Spyware"

    Security researchers at Cisco Talos and the Citizen Lab conducted a technical analysis of the commercial Android spyware named "Predator" and its loader called "Alien," detailing its data-theft capabilities and other operations. Predator is a commercial spyware for the mobile platforms, OS and Android, that was developed and sold by the Israeli company Intellexa. The spyware family has been associated with surveillance operations that target journalists, high-profile European politicians, and Meta executives. On infected Android devices, the spyware can record phone calls, gather information from messaging apps, hide apps, and prevent the execution of certain apps. This article continues to discuss findings regarding the commercial Android spyware Predator and its loader Alien.

    Bleeping Computer reports "Predator: Looking Under the Hood of Intellexa's Android Spyware"

  • news

    Visible to the public "Phishers Use Encrypted File Attachments to Steal Microsoft 365 Account Credentials"

    Attackers are using encrypted restricted-permission messages (.rpmsg) attached to phishing emails in order to steal Microsoft 365 account credentials. According to researchers from Trustwave, the campaigns are low-volume, targeted, and use trusted cloud services, such as Microsoft and Adobe, to deliver emails and host content. The initial emails are sent from compromised Microsoft 365 accounts and appear to target recipient addresses where the sender may be familiar. The phishing emails are sent from a compromised Microsoft 365 account to employees working in the billing department of the recipient company. This article continues to discuss phishers' use of encrypted restricted-permission messages to steal Microsoft 365 account credentials.

    Help Net Security reports "Phishers Use Encrypted File Attachments to Steal Microsoft 365 Account Credentials"

  • news

    Visible to the public "Lazarus Group Striking Vulnerable Windows IIS Web Servers"

    The North Korea-backed threat actor Lazarus Group has made changes to its ongoing espionage campaign by exploiting known vulnerabilities in unpatched Windows IIS Web servers to launch its reconnaissance malware. AhnLab Security Response Center (ASEC) researchers reported that the most recent wave of espionage attacks involved the Lazarus Group signature DLL side-loading technique during the initial compromise. The AhnLab Smart Defense (ASD) log revealed that Windows server systems are the target of attacks, and that malicious activity is carried out via w3wp.exe, an IIS Web server process. Therefore, the threat actor uses poorly managed or vulnerable Web servers as initial entry points before executing their malicious commands. The ASEC team highlighted that the intelligence-gathering campaign's initial attack vectors include unpatched machines with known vulnerabilities such as Log4Shell, public certificate vulnerabilities, and the 3CX supply chain attack. This article continues to discuss the North Korean Advanced Persistent Threat (APT) group using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.

    Dark Reading reports "Lazarus Group Striking Vulnerable Windows IIS Web Servers"

  • news

    Visible to the public "The Challenge of Adversarial Machine Learning"

    Researchers at Carnegie Mellon University's (CMU) Software Engineering Institute (SEI) have published a blog post explaining the concept of adversarial Machine Learning (ML) as well as examining the motivations of adversaries and what researchers are doing to mitigate their attacks. They also provided a taxonomy of what an adversary can accomplish or what a defender needs to defend against. Due to the significant growth of ML and Artificial Intelligence (AI), adversarial tactics, techniques, and procedures (TTPs) have generated a great deal of interest and expanded. When ML algorithms are used for a prediction model and then incorporated into AI systems, the focus is typically on making performance as high as possible and ensuring that the model can make accurate predictions. This emphasis on capability often places security as a secondary concern to other priorities, such as using properly curated datasets for training models, applying domain-appropriate ML algorithms, and tuning parameters and configurations for optimal results and probabilities. However, research has demonstrated that an adversary can influence an ML system by manipulating the model, the data, or both. By doing so, an adversary can force an ML system to learn, do, or reveal the wrong information. This article continues to discuss the concept of adversarial ML, how adversaries seek to influence models, and defending against adversarial AI.

    Carnegie Mellon University reports "The Challenge of Adversarial Machine Learning"

  • news

    Visible to the public "Researchers Uncover Russia-Linked Malware That Could Immobilize Electric Grids"

    Researchers have discovered new malware for Industrial Control Systems (ICS), dubbed "CosmicEnergy," which could be used to disrupt critical infrastructure systems and electric grids. CosmicEnergy was discovered by researchers at Mandiant, who compared its capabilities to those of the destructive Industroyer malware that the Russia-backed "Sandworm" hacking group used in 2016 to cut power in Ukraine. In a rare occurrence, Mandiant discovered CosmicEnergy through threat hunting rather than a cyberattack on critical infrastructure. According to Mandiant, the malware was uploaded to VirusTotal, a Google-owned malware and virus scanner, in December 2021 by a Russian submitter. An analysis indicates that the malware may have been created by Rostelecom-Solar, the cybersecurity division of Russia's national telecommunications operator Rostelecom, to support exercises such as those held in 2021 in collaboration with the Russian Ministry of Energy. This article continues to discuss the malware that could disrupt critical infrastructure systems and electric grids.

    TechCrunch reports "Researchers Uncover Russia-Linked Malware That Could Immobilize Electric Grids"

  • news

    Visible to the public "More APTs Eye Managed Service Providers in Supply Chain Attacks"

    Sophisticated threat groups are increasingly compromising Managed Service Providers (MSPs) and launching supply chain attacks against their small and medium-sized downstream customers. The analysis of data from more than 200,000 small and medium-sized businesses (SMBs), including regional MSPs, between the first quarters of 2022 and 2023 revealed the increased interest of APTs in this segment as a means to launch attacks against a large number of companies in a single geographic region. MSPs, in conjunction with solution providers and resellers, help end users with the deployment, customization, and management of cloud services and other technologies. Regional MSPs serve customers in concentrated geographic areas. Compromising these organizations could enable attackers to target "trusted relationships" between MSPs and their customers. According to Proofpoint, regional MSPs protect hundreds of SMBs local to their geography, many of which have inadequate and often non-enterprise-grade cybersecurity defenses. APT actors have observed this disparity between the levels of protection offered and the potential for gaining access to desirable end-user environments. This article continues to discuss APT groups increasingly targeting MSPs.

    Decipher reports "More APTs Eye Managed Service Providers in Supply Chain Attacks"

  • news

    Visible to the public "Telegram Emerges as Criminals' Top Choice for Handling Stolen Information"

    In 2022, the cybersecurity firm Group-IB identified nearly 3,700 different phishing kits, a 25 percent increase from 2021. A phishing kit is a collection of tools used to execute widespread phishing campaigns. Typically, threat actors manage stolen data via email. Gmail remained the most popular service, with 45 percent of phishers preferring Google as a data processing tool. However, according to Group-IB's Computer Emergency Response Team (CERT-GIB), the number of phishing kits that rely on Telegram to collect stolen data has nearly doubled. In 2022, 9.4 percent of phishers used Telegram for information management. The flexibility and convenience of the messenger enable cybercriminals to manage and process compromised information in near real-time, according to the company. Many encrypted messaging services, such as Signal and WhatsApp, are used by criminals because they provide users with a great deal of anonymity. This article continues to discuss Telegram becoming a top choice among cybercriminals for handling stolen information.

    Cybernews reports "Telegram Emerges as Criminals' Top Choice for Handling Stolen Information"

  • news

    Visible to the public "Delaware Taps Artificial Intelligence to Evacuate Crowded Beaches When Floods Hit"

    Delaware's transportation department, which controls more than 90% of roads in a state with the lowest average elevation in the country, is tasked with implementing evacuation plans during high water, which is a bureaucratic nightmare considering how quickly conditions can change. Delaware's transportation department is now using machine learning and AI to help. The department stated that for humans to monitor thousands of detectors or data sources is overwhelming. That's where AI comes in. Rather than sending a crew to the scene to block an impassable road, the system uses sensors to detect weather threats and even can predict them. Then, it sends the information directly to drivers through cellphone alerts while broadcasting them simultaneously on electronic highway signs. The department noted that the amount of data keeps growing, with many automated cars now able to not only inform their drivers of the dangers ahead but also feed the system to warn others. Researchers at Missouri University of Science and Technology tested an earlier version of a flood prediction analysis system on the Mississippi River between 2019-22. Steve Corns, an associate professor of engineering management and systems engineering who co-authored the study, said the system was able to detect in minutes what used to take hours. But now, Corns said, the capabilities are even more advanced and useful.

    The Associated Press reports: "Delaware Taps Artificial Intelligence to Evacuate Crowded Beaches When Floods Hit"

  • news

    Visible to the public "API Bug in OAuth Dev Tool Opened Websites, Apps to Account Hijacking"

    A critical Application Programming Interface (API) vulnerability in the Expo open source framework enabled the harvesting of auth credentials via the Open Authorization (OAuth) protocol. According to researchers at Salt Labs, the vulnerability, while affecting a relatively small number of developers, could have impacted many users logging into online services such as Facebook, Twitter, or Spotify via the open source framework. A successful attack could have let an adversary take over accounts and steal credentials on a mobile app or website configured to use the Expo AuthSession Redirect Proxy. A victim could have triggered an attack by clicking on a malicious link. Developers use Expo (auth.expo.io) to create native apps for iOS, Android, and web platforms with a single set of tools, libraries, and services. It is regarded as an efficient method to accelerate the application development process. According to Salt Labs, the vulnerability may affect hundreds of companies using Expo, including Codecademy. However, researchers emphasize the small surface area of auth.expo.io, which reduces the number of social sign-on instances involved. This article continues to discuss the potential manipulation of steps in the OAuth sequences via the Expo API to hijack sessions and take over accounts.

    SC Media reports "API Bug in OAuth Dev Tool Opened Websites, Apps to Account Hijacking"

  • news

    Visible to the public "GitLab Security Update Patches Critical Vulnerability"

    DevOps platform GitLab recently resolved a critical-severity vulnerability impacting both GitLab Community Edition (CE) and Enterprise Edition (EE). An open source end-to-end software development platform, GitLab helps developers and organizations build, secure, and operate software. The platform has approximately 30 million registered users. The vulnerability is tracked as CVE-2023-2825 and can lead to arbitrary file reads. The newly addressed security defect has the maximum CVSS score of 10. The company noted that an unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups. The web-based Git repository will release details on the bug next month after 30 days have passed since the patch was made available. According to GitLab, the issue was introduced in GitLab CE/EE version 16.0.0 and was resolved on Tuesday with the release of version 16.0.1 of the platform. The flaw was reported by a researcher named "pwnie" via GitLab's HackerOne-hosted bug bounty program. Given the severity of the bug, all GitHub users running version 16.0.0 of GitLab CE or EE are strongly advised to upgrade to the latest version of the platform as soon as possible. The patch has already been deployed on GitLab[.]com. GitLab did not mention if this vulnerability was being exploited in malicious attacks.

    SecurityWeek reports: "GitLab Security Update Patches Critical Vulnerability"

  • news

    Visible to the public "CyLab Faculty Earn Two 'Test of Time' Awards at IEEE Symposium on Security and Privacy"

    During the 44th Symposium on Security and Privacy, the Institute of Electrical and Electronics Engineers (IEEE) gave two "Test of Time" awards to papers co-authored by faculty members at Carnegie Mellon University's (CMU) CyLab Security and Privacy Institute. Initiated in 2019, the Test of Time award honors published papers previously presented at the annual symposium that have had a significant and lasting impact on computer security and privacy research and practice. This year, the award committee considered papers presented from 2011 through 2013. The first paper that won the award is titled "Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms." Researchers examined 12,000 passwords collected under seven composition policies and developed an efficient distributed method for calculating the effectiveness of different heuristic password-guessing algorithms. The second award-winning paper is titled "Pinocchio: Nearly Practical Verifiable Computation." In 2013, researchers recognized the need to instill greater confidence in cloud-based computations and enable clients to verify the accuracy of the returned results. A team of Microsoft and IBM researchers, including now CMU Computer Science and Electrical and Computer Engineering Associate Professor Bryan Parno, developed Pinocchio, a system for efficiently verifying general computations while relying solely on cryptographic assumptions. This article continues to discuss the papers that earned CyLab faculty members two Test of Time awards at the IEEE Symposium on Security and Privacy.

    CyLab reports "CyLab faculty earn two 'Test of Time' awards at IEEE Symposium on Security and Privacy"

  • news

    Visible to the public "GUAC 0.1 Beta: Google's Breakthrough Framework for Secure Software Supply Chains"

    Google has announced the 0.1 Beta version of GUAC, which stands for Graph for Understanding Artifact Composition. It will help organizations secure their software supply chains. The search giant is making the open source framework available as an Application Programming Interface (API) for developers to integrate their tools and policy engines. GUAC aims to compile software security metadata from various sources into a graph database that illustrates the relationships between software, thus enabling organizations to determine how one piece of software impacts another. According to Google's documentation, GUAC provides organizations with organized and actionable insights into their software supply chain security position. It should consolidate Software Bill of Materials (SBOM) documents, SLSA attestations, OSV vulnerability feeds, a company's internal private metadata, and more to help create a clearer risk profile and visualize the relationships between artifacts, packages, and repositories. This article continues to discuss the 0.1 Beta version of GUAC.

    THN reports "GUAC 0.1 Beta: Google's Breakthrough Framework for Secure Software Supply Chains"

  • news

    Visible to the public "New Buhti Ransomware Gang Uses Leaked Windows, Linux Encryptors"

    A new ransomware operation, "Buhti," targets Windows and Linux systems using leaked code from the LockBit and Babuk ransomware families. Although the threat actors behind Buhti, now tracked as "Blacktail," have not developed their own ransomware strain, they have created a custom data exfiltration tool to double-extort victims. In February 2023, Palo Alto Networks' Unit 42 team identified Buhti as a Linux-targeting ransomware written in Go. Symantec's Threat Hunter team has published a new report showing that Buhti also targets Windows using a modified LockBit 3.0 variant named "LockBit Black." Blacktail uses the Windows LockBit 3.0 builder leaked by a disgruntled developer on Twitter in September 2022. For Linux attacks, Blacktail uses a payload based on the Babuk source code posted on a Russian-language hacking forum in September 2021. Malware reuse is typically a sign of less sophisticated actors. However, in this case, multiple ransomware groups gravitate towards Babuk due to its demonstrated ability to compromise VMware ESXi and Linux systems. Targeting these systems has been profitable for cybercriminals. This article continues to discuss the use of leaked Windows and Linux encryptors by the Buhti ransomware gang.

    Bleeping Computer reports "New Buhti Ransomware Gang Uses Leaked Windows, Linux Encryptors"

  • news

    Visible to the public "Phishing Campaign Targets ChatGPT Users"

    Researchers at Inky have discovered a phishing campaign designed to steal business email account credentials by impersonating OpenAI, the company behind the ChatGPT Artificial Intelligence (AI)-driven chatbot. ChatGPT has rapidly gained popularity and is now widely used by individuals and businesses, which is why cybercriminals are increasingly trying to impersonate the brand. In the initial phase of the attack, the victim receives a seemingly legitimate email purportedly sent by OpenAI. To continue using their ChatGPT account setup, the email requests that the recipient verifies their email address. To further deceive the victim, the threat actors manipulate the sender's domain to make it appear as though the email came from their company's Information Technology (IT) support. This article continues to discuss the new phishing campaign targeting ChatGPT users.

    Help Net Security reports "Phishing Campaign Targets ChatGPT Users"

  • news

    Visible to the public "'Volt Typhoon' China-Backed APT Infiltrates US Critical Infrastructure Orgs"

    An investigation conducted by Microsoft reveals that China-backed threat actors have established persistent access to telecommunications networks and other critical infrastructure targets in the US for espionage and, potentially, to disrupt communications in the event of military conflict in the South China Sea and broader Pacific. Microsoft calls the Advanced Persistent Threat (APT) "Volt Typhoon." Researchers from Microsoft, Mandiant, and other organizations have previously observed this state-sponsored group conducting cyber espionage. According to the analysis, Microsoft has moderate confidence that the Volt Typhoon campaign is pursuing the development of capabilities that could disrupt critical communications infrastructure between the US and Asia during future crises. This article continues to discuss findings regarding the Volt Typhoon China-backed APT.

    Dark Reading reports "'Volt Typhoon' China-Backed APT Infiltrates US Critical Infrastructure Orgs"

  • news

    Visible to the public "UC Santa Cruz Engineers Join Major Transportation Cybersecurity Project"

    As part of a new national center, UC Santa Cruz (UCSC) researchers will play an important role in protecting US transportation systems from cyber threats. Researchers at UCSC will focus on enhancing the Artificial Intelligence (AI) systems powering autonomous vehicles such as driverless cars. Nine universities will collaborate on the new National Center for Transportation Cybersecurity and Resilience (TraCR) with the support of a five-year, $20 million grant from the US Department of Transportation. The center will develop hardware and software to defend Internet-connected transportation systems against cyberattacks. Associate Professor Alvaro Cardenas, who will serve as the center's associate director at UCSC, emphasizes that as AI agents become more pervasive in transportation infrastructures, we will need expertise in various areas to operate these systems securely. This article continues to discuss the major transportation cybersecurity project and the UCSC engineers participating in it.

    UC Santa Cruz reports "UC Santa Cruz Engineers Join Major Transportation Cybersecurity Project"

  • news

    Visible to the public "SAS Airlines Breached by Pro-Russian Hackers – Again"

    The pro-Russian hacking group Anonymous Sudan compromised Scandinavian Airlines (SAS) for the second time this year, knocking the SAS website and app offline for hours. The group tried to extort SAS with a $3,500 ransom to stop the attack. According to the SAS corporate website, the airline carrier for Denmark, Norway, and Sweden typically offers more than 800 scheduled flights per day to over 130 destinations worldwide. In February, Anonymous Sudan claimed the airlines as part of a Valentine's Day attack against Sweden, rendering the SAS website inaccessible for hours and compromising sensitive passenger data. Several Swedish media agencies were also targeted during the Valentine's Day attacks. The group claimed to have attacked Swedish companies in retaliation for the burning of a Koran by a well-known Swedish/Danish activist during a January protest in Stockholm supporting Sweden's bid to join NATO. This article continues to discuss the recent attack on the SAS company by the pro-Russian hacking group Anonymous Sudan.

    Cybernews reports "SAS Airlines Breached by Pro-Russian Hackers - Again"

  • news

    Visible to the public "NSA and Partners Identify China State-Sponsored Cyber Actor Using Built-in Network Tools When Targeting US Critical Infrastructure Sectors"

    The National Security Agency (NSA) and its partners have identified indicators of compromise (IOCs) related to a People's Republic of China (PRC) state-sponsored cyber actor using living off the land (LOTL) techniques to target networks across the critical infrastructure of the US. NSA is leading US and Five Eyes partner agencies in releasing the "People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection" Cybersecurity Advisory (CSA) to help network defenders in hunting and detecting this type of malicious activity by PRC actors on their systems. The partner agencies include the US Cybersecurity and Infrastructure Security Agency (CISA), FBI, Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NCSC-NZ), and UK National Cyber Security Centre (NCSC-UK). The CSA provides an overview of hunting tips and recommended practices. It contains examples of the actor's commands and signatures for detection. The authoring agencies also provide a summary of IOC values, such as unique command-line strings, hashes, file paths, exploitation of CVE-2021-40539 and CVE-2021-27860 vulnerabilities, and file names commonly used by this actor. This article continues to discuss the release of guidance regarding a PRC state-sponsored cyber actor targeting US critical infrastructure.

    NSA reports "NSA and Partners Identify China State-Sponsored Cyber Actor Using Built-in Network Tools When Targeting US Critical Infrastructure Sectors"

  • news

    Visible to the public "The Real Risks in Google's New .Zip and .Mov Domains"

    Google released eight new Top-Level Domains (TLDs) at the beginning of May. These are the suffixes at the end of URLs, such as ".com" or ".uk." The new TLDs include ".zip" and ".mov," which are expected to invite phishing and other forms of online fraud. Since both of them are also common file extension names, they stand out. The former, ".zip," is used for data compression, whereas ".mov" is an Apple-developed video format. The concern is that URLs resembling file names will increase opportunities for digital scams such as phishing, which deceive web users into clicking on malicious links disguised as legitimate. In addition, the two domains may exacerbate the issue of programs mistaking file names for URLs and automatically adding links to the file names. Scammers could purchase ".zip" and ".mov" URLs that are also common file names, so online references to files with those names could automatically link to a malicious website. This article continues to discuss the new top-level domains that could be used in phishing attacks.

    Wired reports "The Real Risks in Google's New .Zip and .Mov Domains"

  • news

    Visible to the public "AT&T Resolves Issue That Would Allow Account Takeover Through ZIP Code and Phone Number"

    AT&T recently patched a vulnerability that would have allowed anyone to hijack someone's account on the telecommunications company's official website by using the account holder's phone number and ZIP code. Joseph Harris, a cybersecurity researcher, uncovered the flaw earlier this year, discovering a way to exploit an account merging feature for malicious purposes. The vulnerability enabled him to effectively merge his account with that of anyone else, granting him the ability to change the password and assume control of that account. There is no evidence that the vulnerability was exploited beyond the researcher, according to an AT&T spokesperson who verified the issue and stated that it was promptly resolved through the company's bug bounty program. AT&T has approximately 81.5 million postpaid customers and 19 million prepaid customers. According to Harris, the vulnerability was relatively easy to exploit. After creating a free profile on the company's website, an attacker could navigate to the "combine accounts" tab and select "already registered accounts." After inputting the victim's phone number and ZIP code, the masked user ID and password prompt would appear. Harris explained that hackers could intercept the request of the password being entered and use the website's backend to forward the password request to accounts the hacker controls. Harris successfully tested the attack technique using his own accounts. This article continues to discuss the issue that would have enabled AT&T website account takeover.

    The Record reports "AT&T Resolves Issue That Would Allow Account Takeover Through ZIP Code and Phone Number"

  • news

    Visible to the public "Backup Repositories Targeted in 93% of Ransomware Attacks"

    Security researchers at Veeam discovered that 85% of organizations have suffered at least one ransomware attack over the past 12 months. The researchers warned that if this trend continues, "more organizations will suffer a ransomware attack than turn a profit." The researchers also found that in 93% of ransomware incidents, the threat actors target the backup repositories, resulting in 75% of victims losing at least some of their backups during the attack and more than one-third (39%) of backup repositories being completely lost. Organizations are still ill-prepared to face this threat. The researchers noted that most (80%) continue to pay the ransom despite multiple advisories against it. They primarily do that to get their data back, yet 21% don't, even after paying the ransom. Additionally, many respondents to the researcher's survey acknowledge that progress needs to be made in incident response. For example, despite 87% claiming they have a risk management program that drives their security roadmap, only 35% believe their program is working well, and 52% are seeking to improve their situation. Moreover, while respondents cited "clean backup copies" and "recurring verification that the backups are recoverable" as the most common elements of the incident response playbook in preparation against a cyberattack, 60% of organizations say there is insufficient alignment between their backup and cyber teams.

    Infosecurity reports: "Backup Repositories Targeted in 93% of Ransomware Attacks"

  • news

    Visible to the public "Team Develops New 'Attacker' Device to Improve Autonomous Car Safety"

    Today's cars and autonomous vehicles use millimeter wave (mmWave) radio frequencies to facilitate self-driving or assisted driving functions that protect passengers and pedestrians. However, this connectivity can also leave them vulnerable to cyberattacks. To improve the safety and security of autonomous vehicles, researchers from the lab of Dinesh Bharadia, an affiliate of the UC San Diego Qualcomm Institute (QI), and faculty member in the university's Jacobs School of Engineering Department of Electrical and Computer Engineering, along with colleagues from Northeastern University developed a novel algorithm designed to simulate an attacking device. The algorithm, which is described in the paper titled "mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array," enables researchers to identify areas where autonomous vehicle security can be improved. The team developed an algorithm that mimics a spoofing attack. Previous attempts to develop an attacking device for testing cars' resistance had limited feasibility, assuming that the attacker can synchronize with the victim's radar signal to initiate an attack, or that both cars are physically connected via a cable. This article continues to discuss the attacker device developed to improve autonomous vehicle security.

    University of California San Diego reports "Team Develops New 'Attacker' Device to Improve Autonomous Car Safety"

  • news

    Visible to the public Cyber Scene #80 - Digitization: Making Money Makes the World Go Round

    Cyber Scene #80 -

    Digitization: Making Money Makes the World Go Round

  • news

    Visible to the public SoS Musings #73 - Insider Threats Are Still on the Rise

    SoS Musings #73 -

    Insider Threats Are Still on the Rise

  • news

    Visible to the public Cybersecurity Snapshots #42 - New Ransomware Gang Discovered: The RA Group

    Cybersecurity Snapshots #42 -

    New Ransomware Gang Discovered: The RA Group

  • news

    Visible to the public "Apps for Older Adults Contain Security Vulnerabilities"

    Technology and mobile devices are most commonly associated with younger users, but older individuals are not far behind. Pew Research Center estimates that approximately 61 percent of older people in the US own a smartphone. This market is expected to expand as the population ages, and a constellation of mobile apps designed for this demographic is also expanding. These apps may help older users remain in touch with loved ones, assist with health-related tasks, and enhance their social lives, but they are not risk-free. According to a new paper by Concordia researchers, some of the most popular apps designed for older adults pose significant privacy and data risks. The researchers examined 146 popular Android apps and discovered that 95 of them, or roughly two-thirds, do not adequately protect users in one or more ways. According to them, it is a significant risk for a population that may be unaware of the inherent perils of an increasingly interconnected world. The paper's main author, Pranay Kapoor, pointed out that many of these apps contain essential health or medication information. An attacker could potentially exploit the vulnerabilities in these apps to alter the medication or the reminders to take it. Even minor alterations can have profound consequences. This article continues to discuss apps designed for older adults containing multiple security vulnerabilities.

    Concordia University reports "Apps for Older Adults Contain Security Vulnerabilities"

  • news

    Visible to the public "Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own"

    Latvian network equipment manufacturer MikroTik has recently released a patch for a major security defect in its RouterOS product and confirmed the vulnerability was exploited five months ago at the Pwn2Own Toronto hacking contest. The flaw, CVE-2023-32154, affects devices running MikroTik RouterOS versions v6.xx and v7.xx with enabled IPv6 advertisement receiver functionality. According to ZDI, organizers of the Pwn2Own software exploitation event, the vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Mikrotik RouterOS. ZDI warned that authentication is not required to exploit this vulnerability. MikroTik stated that the specific flaw exists within the Router Advertisement Daemon. "The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root." The Pwn2Own organizers decided to go public with an advisory prior to the availability of patches after waiting five months for MikroTik to acknowledge and fix the already-exploited security flaw. ZDI noted that it reported the issue to MikroTik during the event last December and asked again for an update in May this year, five months later. On May 10, ZDI said it "re-disclosed the report at the vendor's request" and gave the company an extra week to provide fixes. In its response, MikroTik said it could not find a record of the December disclosure from ZDI and that it was not present at the Toronto event in December to discuss the exploit.

    SecurityWeek reports: "Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own"

  • news

    Visible to the public "UCLA Computer Grad Constructs 'Crown Jewel of Cryptography'"

    Aayush Jain received the 2022 ACM Doctoral Dissertation Award for his dissertation entitled "Indistinguishability Obfuscation From Well-Studied Assumptions." From well-studied hardness conjectures, Jain's dissertation established the feasibility of mathematically rigorous software obfuscation. The primary objective of software obfuscation is to render source code unintelligible without altering its functionality. Additional conditions can be added, such as requiring the transformed code to perform similarly to the original or even the same. As a mechanism for software security, software obfuscation must have a solid mathematical foundation. The mathematical object that Jain's thesis creates, indistinguishability obfuscation, is regarded as a "master tool" in the context of cryptography, not only for achieving long-desired cryptographic goals such as functional encryption but also for broadening the field of cryptography itself. For example, indistinguishability obfuscation helps achieve software security objectives that were previously only in software engineering. This article continues to discuss Jain's dissertation "Indistinguishability Obfuscation From Well-Studied Assumptions."

    ACM reports "UCLA Computer Grad Constructs 'Crown Jewel of Cryptography'"

  • news

    Visible to the public "Could These Bills Endanger Encrypted Messaging?"

    Billions of people worldwide use end-to-end encrypted messaging apps such as WhatsApp, Telegram, and Signal. In theory, end-to-end encryption ensures that only the sender and recipient possess the keys necessary to decrypt their message. Not even an app's owners can look in. According to some encryption advocates, this privacy tool now faces its greatest challenge: legislation enacted in the name of a safer Internet. The UK's Online Safety Bill, expected to become law later this year, is the most recent example. Similar laws are proposed in other democratic countries. According to their opponents, these laws would undermine the foundation of end-to-end encryption for protecting privacy. Clause 110 of the Online Safety Bill, which authorizes the Brig broadcasting and telecommunications regulator, Ofcom, to issue takedown orders for messages "whether communicated publicly or privately by means of the service," worries encryption advocates. To accomplish this, the law requires services to monitor messages using "accredited technology" that has been approved by Ofcom. Observers believe service providers cannot comply with Clause 110 takedown orders without jeopardizing encryption. This article continues to discuss the bills raising concerns among privacy advocates.

    IEEE Spectrum reports "Could These Bills Endanger Encrypted Messaging?"

  • news

    Visible to the public "Legion Malware Upgraded to Target SSH Servers and AWS Credentials"

    An updated version of the commodity malware known as Legion includes enhanced capabilities to compromise SSH servers and Amazon Web Services (AWS) credentials linked to DynamoDB and CloudWatch. Cado Labs researcher Matt Muir said the recent update demonstrates a broadening of scope, with new capabilities such as compromising SSH servers and retrieving additional AWS-specific credentials from Laravel web applications. The developer's targeting of cloud services improves with each release. Legion, a Python-based hacking tool, was first documented by the cloud security company in April, describing its ability to breach vulnerable SMTP servers and extract credentials. It is also known to exploit web servers operating Content Management Systems (CMS), use Telegram as a data exfiltration point, and use stolen SMTP credentials to send spam SMS messages to a list of dynamically-generated US mobile numbers. Legion's capability to exploit SSH servers using the Paramiko module is also a notable addition. It includes functionality to retrieve additional AWS-specific credentials for DynamoDB, CloudWatch, and AWS Owl from Laravel web applications. This article continues to discuss the updated Legion malware.

    THN reports "Legion Malware Upgraded to Target SSH Servers and AWS Credentials"

  • news

    Visible to the public "GoldenJackal State Hackers Silently Attacking Govts Since 2019"

    Since 2019, a relatively unknown Advanced Persistent Threat (APT) group called GoldenJackal has been conducting espionage against government and diplomatic entities in Asia. The threat actors have maintained a low profile for hiding, carefully selecting their victims, and limiting the number of attacks to reduce the likelihood of being discovered. Since 2020, researchers have been monitoring GoldenJackal, now reporting that the threat actors have been active in Afghanistan, Azerbaijan, Iran, Iraq, Pakistan, and Turkey. GoldenJackal uses a collection of custom .NET malware tools for various functions, including credential dumping, data theft, malware loading, lateral movement, file exfiltration, and more. The primary payload used to infect a system is JackalControl, which grants the perpetrators remote control of the infected computer. The malware can establish persistence by adding Registry keys, Windows scheduled tasks, or Windows services. This article continues to discuss the GoldenJackal APT group.

    Bleeping Computer reports "GoldenJackal State Hackers Silently Attacking Govts Since 2019"

  • news

    Visible to the public "Less Is Not More; Mapping a Better Route to User Ad Settings"

    For users seeking to modify their privacy settings on websites such as Facebook and Google, the process often feels like a scavenger hunt. In many cases, these settings are spread across multiple pages, requiring at least five clicks to locate the desired option. In a new study titled "Less is Not More: Improving Findability and Actionability of Privacy Controls for Online Behavioral Advertising," researchers from Carnegie Mellon University's (CMU) CyLab Security and Privacy Institute and the University of Michigan explore design options for making settings related to advertising preferences on Facebook more discoverable. The researchers also try to understand how design changes would affect users' behaviors and sentiments towards settings and the platform. The study focuses on two variables: the entry points a user would click on to locate the correct ad settings and the level of actionability within the ad control interface. This article continues to discuss the study on improving the findability and actionability of privacy controls.

    CyLab reports "Less Is Not More; Mapping a Better Route to User Ad Settings"

  • news

    Visible to the public "Legitimate Android App Transforms Into Data-Snooping Malware"

    iRecorder - Screen Recorder is a trojanized Android app discovered by ESET researchers. It was available as a legitimate app on Google Play in September 2021, and malicious functionality was likely introduced in August 2022. During its existence, more than 50,000 devices installed the app. The malicious code that was introduced to the clean version of iRecorder is based on the open-source AhMyth Android Remote Access Trojan (RAT) and has been changed into what ESET researchers call AhRat. The malicious app's ability to record audio using the device's microphone and steal files suggests it may be part of an espionage operation. Other than the Google Play Store, ESET Research has not found AhRat in the wild. However, this is not the first time AhMyth-based Android malware has been available on the official store. In 2019, ESET published research on a similar trojanized app. In the past, the spyware, which was based on AhMyth, circumvented Google's app-vetting process twice as a malicious app that provided radio streaming. However, the iRecorder app is also available on unofficial and alternative Android markets, and the developer offers other apps on Google Play that do not contain malicious code. This article continues to discuss findings regarding the trojanized Android app iRecorder - Screen Recorder.

    Help Net Security reports "Legitimate Android App Transforms Into Data-Snooping Malware"

  • news

    Visible to the public "US Sanctions North Korean University for Training Hackers"

    The US Department of the Treasury recently announced sanctions against four entities and one individual for engaging in malicious cyber activities on behalf of the North Korean government. The US Department of the Treasury stated that North Korean threat actors, such as the infamous Lazarus group, launch malicious campaigns targeting organizations and individuals worldwide to generate illicit revenue to support the Pyongyang regime and its priorities. According to the Treasury's Office of Foreign Assets Control (OFAC), North Korean threat actors are trained at the Pyongyang University of Automation, with many of them landing jobs within units of the Reconnaissance General Bureau (RGB), the country's primary intelligence bureau. RGB, which was designated by OFAC in 2015 as being subordinated to the North Korean government, also controls the Technical Reconnaissance Bureau and its cyber unit, the 110th Research Center. The US says that the 110th Research Center is responsible for numerous cyberattacks, including the devastating DarkSeoul campaign, and for the theft of sensitive government information from South Korea related to military defense and response planning. The US announced that Pyongyang University of Automation, the Technical Reconnaissance Bureau, and the 110th Research Center are being designated pursuant to EO 13687 for being agencies, instrumentalities, or controlled entities of the Government of North Korea or the Workers' Party of Korea.

    SecurityWeek reports: "US Sanctions North Korean University for Training Hackers"

  • news

    Visible to the public "SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft"

    A massive credential-harvesting campaign uses the legitimate email newsletter program SuperMailer to send out a large number of phishing emails designed to circumvent Secure Email Gateway (SEG) protections. Cofense reported on May 23 that SuperMailer-created emails account for a significant 5 percent of all credential phishing attempts within the company's telemetry for the month of May. The monthly volume of the activity has more than doubled in three of the past four months, which is notable even in a time when credential phishing is on the rise. Combining SuperMailer's customization features and sending capabilities with evasion techniques, threat actors behind the campaign sent customized, legitimate-looking emails to inboxes across all industries, according to Brad Haas, cyber threat intelligence analyst at Cofense and author of the study. According to Cofense, the threat actors behind the activity are casting a wide net, hoping to catch victims in a variety of industries, including construction, consumer goods, energy, financial services, food service, government, healthcare, information and analytics, insurance, manufacturing, media, mining, professional services, retail, transportation, and utilities. This article continues to discuss the credential-harvesting SuperMailer campaign.

    Dark Reading reports "SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft"

  • news

    Visible to the public "Surprise: A Small Change Leads to Big Results for Computer Security"

    A team of researchers from UC San Diego and Purdue University has discovered a hidden feature of Intel processors that can enhance security, including shutting down an entire class of Spectre attacks capable of providing an attacker with sensitive information such as passwords or encryption keys. In their 2023 IEEE Security and Privacy paper titled "Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution," the researchers have completely reverse-engineered the conditional branch predictor for all of Intel's flagship processors. No prior work had fully deciphered these predictors, even those introduced over 12 years ago. The researchers successfully reverse-engineered the structure, sizes, and lookup functions of these predictors. This article continues to discuss computer scientists discovering, for the first time, that the popular Intel processor already has a key security feature that protects against attacks, including Spectre.

    UC San Diego reports "Surprise: A Small Change Leads to Big Results for Computer Security"

  • news

    Visible to the public "#StopRansomware Guide Released by NSA and Partners"

    The National Security Agency (NSA) and several partners have released the "#StopRansomware Guide" Cybersecurity Information Sheet (CSI) to help network defenders protect against malicious cyber actors' evolving ransomware tactics. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and Multi-State Information Sharing and Analysis Center (MS-ISAC) originally released the guidance in 2020, but the new update incorporates additional best practices and recommendations based on operational insight from CISA, MS-ISAC, NSA, and the FBI. Additional recommendations address the prevention of common initial infection vectors, cloud backups, and Zero Trust Architecture (ZTA). CISA and the National Institute of Standards and Technology (NIST) devised the Cross-Sector Cybersecurity Performance Goals (CPGs), which these recommended practices align with. The CSI expands the ransomware response checklist to include recommendations for threat hunting and analysis. This article continues to discuss the #StopRansomware Guide.

    NSA reports "#StopRansomware Guide Released by NSA and Partners"

  • news

    Visible to the public "Hackers Attack Medical Equipment Provider, Almost 2M People Affected"

    In an attack on Apria Healthcare, cybercriminals stole the credit card information of nearly two million customers. Apria is a leading provider of home medical equipment delivery and clinical support in the US. The attackers reportedly stole financial information, including account numbers and credit/debit card numbers. The attackers also accessed account security codes, access codes, passwords, and PINs. From April 5 to May 7, 2019, an unauthorized third party allegedly accessed Apria's systems. The malicious actors then re-entered the systems between August 27 and October 10, 2021. The company claims to have found no evidence of funds being removed, and there have been no reports of misuse of disclosed personal data. This article continues to discuss the attack on the medical equipment provider.

    Cybernews reports "Hackers Attack Medical Equipment Provider, Almost 2M People Affected"

  • news

    Visible to the public "Fata Morgana Watering Hole Attack Targets Shipping, Logistics Firms"

    Security researchers at ClearSky have discovered a sophisticated watering hole attack targeting multiple Israeli websites. The malicious attempt, believed to be conducted by a nation-state actor from Iran, has raised concerns about the security of shipping and logistics companies operating in the region. The researchers stated that in watering hole attacks, the attacker compromises a website that is frequently visited by a specific group of people, such as government officials, journalists, or corporate executives. Once compromised, the attacker can inject malicious code into the website, which will be executed when users visit it. The researchers noted that currently, the campaign focuses on shipping and logistics companies, aligning with Iran's focus on the sector for the past three years. The researchers attributed the attack with low confidence to Tortoiseshell, also known as TA456 or Imperial Kitten, a hacking group traditionally linked to Iranian cyber operations.

    Infosecurity reports: "Fata Morgana Watering Hole Attack Targets Shipping, Logistics Firms"

  • news

    Visible to the public "A Deeper Insight Into the CloudWizard APT's Activity Revealed a Long-Running Activity"

    In March 2023, researchers detected a previously unknown Advanced Persistent Threat (APT) group, Bad Magic, also known as Red Stinger, which targeted organizations in the region of the Russo-Ukrainian conflict. The attackers were seen using PowerMagic and CommonMagic implants. On the lookout for other implants with similarities to PowerMagic and CommonMagic, the researchers discovered a different cluster of even more sophisticated malicious activities associated with the same threat actor. In addition to Donetsk, Lugansk, and Crimea, victims of this cluster were also located in central and western Ukraine. The APT group targeted individuals as well as diplomatic and research organizations in the conflict zone. In the most recent campaign discovered by researchers, the APT group used a modular framework dubbed CloudWizard that supports spyware capabilities, such as capturing screenshots, recording microphones, harvesting Gmail inboxes, and keylogging. This article continues to discuss the CloudWizard APT targeting organizations involved in the region of the Russo-Ukrainian conflict.

    Security Affairs reports "A Deeper Insight Into the CloudWizard APT's Activity Revealed a Long-Running Activity"

  • news

    Visible to the public "Infostealers Distributed via Fraudulent CapCut Websites"

    Different information-stealing malware strains have been distributed using websites posing as the TikTok video editor CapCut in different campaigns. A Cyble report revealed that the threat actors behind the first campaign used fraudulent CapCut websites to facilitate the distribution of the Offx Stealer with a PyInstaller-compiled binary on Windows 8, 10, and 11 devices. Offx Stealer's execution would enable the exfiltration of web browser passwords, cookies, and certain file types, as well as information from cryptocurrency wallet apps, messaging apps, and remote access software. The second campaign involved the delivery of a batch script-containing file that triggered a PowerShell script facilitating the delivery of the RedLine stealer and a .NET executable. RedLine would enable data theft, whereas the other payload would ensure the data thief remains undetected on the compromised systems. This article continues to discuss the distribution of information-stealing malware strains through fraudulent CapCut websites.

    SC Media reports "Infostealers Distributed via Fraudulent CapCut Websites"

  • news

    Visible to the public "FBI Warns About Fake Job Ads From Cyber Traffickers"

    The FBI warns people to be aware of fake employment advertisements that are used to lure applicants into Southeast Asian scam operations. In recent years, such schemes, perpetrated primarily by Chinese organized crime groups, have expanded in size, with Cambodia as the industry's epicenter and Myanmar increasingly becoming a hub. Workers are trafficked into "pig butchering" operations, in which a cybercriminal forges a relationship with a victim from a distance before stealing their money. Historically, labor trafficking has involved precarious manual jobs, but cyber trafficking in Southeast Asia requires a well-educated population with technology and language skills, so syndicates cast a wide net in the quest for workers. In employment fraud schemes, criminal actors primarily target victims in Asia by publishing false job advertisements on social media and online employment sites, according to the FBI's notice, adding that advertised positions include tech support and offer high salaries and benefits. The FBI alert is intended for US travelers, but victims are from all over the world, mostly from Asia. This article continues to discuss the FBI's warning about fake job advertisements from cyber traffickers.

    The Record reports "FBI Warns About Fake Job Ads From Cyber Traffickers"

  • news

    Visible to the public "Google Launches Bug Bounty Program for Mobile Applications"

    Google recently introduced Mobile VRP (vulnerability rewards program), a new bug bounty program for reporting vulnerabilities found in the company's mobile applications. The Mobile VRP runs alongside the Android and Google Devices security reward program, which rewards security researchers for issues identified in the Android OS, Pixel phones, and Google Nest and Fitbit devices. Google noted that the new program is specifically designed for first-party Android applications, which fall into three categories. Tier 1 apps include Google's own Play Services, AGSA (Android Google Search app), Chrome, Cloud, Gmail, and Chrome Remote Desktop software. Applications published by Developed with Google, Research at Google, Red Hot Labs, Google Samples, Fitbit LLC, Nest Labs Inc., Waymo LLC, and Waze are also within scope. Google stated that as part of Mobile VRP, it is looking for reports describing flaws leading to arbitrary code execution and theft of sensitive data (credentials and personal information) but may also accept submissions of other types of bugs with a security impact, such as path traversal, intent redirections, unsafe usage of pending intents, and orphaned permissions. The internet giant is willing to pay up to $30,000 for vulnerabilities in Tier 1 apps that can be exploited remotely without user interaction to achieve arbitrary code execution. The lowest reward for this type of bug is $2,250. Researchers reporting issues in Tier 2 and Tier 3 apps may earn up to $25,000 and $20,000, respectively, for similar vulnerabilities. Flaws leading to sensitive data theft and other types of issues will be awarded between $750 and $7,500 for Tier 1 apps, between $625 and $6,250 for Tier 2 software, and between $500 and $5,000 for Tier 3 applications. Google notes it may also award $1,000 bonuses for surprising vulnerabilities or exceptional writeups. Google stated that researchers are encouraged to present their findings in a succinct manner, adding a short proof-of-concept (PoC) if possible. It was noted that researchers interested in participating in the Mobile VRP should only target their own accounts and should submit their findings through Google's report page. Additional information on the program can be found on the new Mobile VRP page.

    SecurityWeek reports: "Google Launches Bug Bounty Program for Mobile Applications"

  • news

    Visible to the public "China Issues Ban on US Chipmaker Products"

    China has recently banned products sold by US chipmaker giant Micron, citing cybersecurity concerns. The Cyberspace Administration of China announced the decision on May 21, 2023, following a cybersecurity review of Micron products sold in China that was initiated in March 2023. The Chinese government stated that the review had flagged "serious cybersecurity problems" with Micron products, "which posed major risks to China's critical information infrastructure supply chain and affected China's national security." The Chinese government noted that, as a result, "operators of critical information infrastructure in China should stop purchasing Micron products." The specific cybersecurity concerns were not explained, although the Cyberspace Administration of China cited the country's cyber and information security laws as the reason. The US Commerce Department quickly condemned the decision, stating: "We have seen the announcement by the People's Republic of China (PRC) regarding Micron. We firmly oppose restrictions that have no basis in fact. This action, along with recent raids and targeting of other American firms, is inconsistent with the PRC's assertions that it is opening its markets and committed to a transparent regulatory framework." The announcement has come amid growing geopolitical tensions between the US and China, spilling over into fields such as semiconductor chip manufacturing and cybersecurity.

    Infosecurity reports: "China Issues Ban on US Chipmaker Products"