News Items

  • news

    Visible to the public "New AI Model Aims to Plug Key Gap in Cybersecurity Readiness"

    A team of scientists from the Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL), Purdue University, Carnegie Mellon University (CMU), and Boise State University has turned to Artificial Intelligence (AI), threading together three large databases of information regarding computer vulnerabilities, weaknesses, and likely attack patterns. The AI-based model automatically links vulnerabilities with specific attack vectors that adversaries may use to compromise computer systems. The work should help defenders detect and prevent attacks more frequently and promptly. A portion of the work is now available on GitHub as open source. The team will release the remaining code soon. The new AI model uses Natural Language Processing (NLP) and supervised learning to connect information in three different cybersecurity databases. The team's model automatically links vulnerabilities to the corresponding weaknesses with an accuracy of up to 87 percent, and links weaknesses to the appropriate attack patterns with an accuracy of up to 80 percent. According to the researchers, these numbers are significantly better than what current tools provide, but they warn that their new methods still need to be tested more widely. This article continues to discuss the new AI model developed to improve threat prioritization and spot attacks more quickly.

    Pacific Northwest National Laboratory reports "New AI Model Aims to Plug Key Gap in Cybersecurity Readiness"

  • news

    Visible to the public "Malicious Windows Kernel Drivers Used in BlackCat Ransomware Attacks"

    The ALPHV ransomware group, also known as BlackCat, was observed using signed malicious Windows kernel drivers to avoid detection by security software. The driver seen by Trend Micro is an updated version of the malware called 'POORTRY' that Microsoft, Mandiant, Sophos, and SentinelOne saw in ransomware attacks last year. The POORTRY malware is a Windows kernel driver that was signed with stolen keys belonging to legitimate Microsoft Windows Hardware Developer Program accounts. This malicious driver was used by the UNC3944 hacking group, also known as 0ktapus and Scattered Spider, to disable security software on a Windows device in order to bypass detection. According to Trend Micro, the ransomware operators tried to use the Microsoft-signed POORTRY driver, but its detection rates were high due to the publicity it received and after the code-signing keys were revoked. Therefore, the hackers deployed an updated version of the POORTRY kernel driver signed with a stolen or leaked cross-signing certificate. The new driver used by the BlackCat ransomware operation allows for the elevation of privileges on compromised machines and the termination of security-related processes. This article continues to discuss the ALPHV ransomware employing signed malicious Windows kernel drivers to evade detection by security software.

    Bleeping Computer reports "Malicious Windows Kernel Drivers Used in BlackCat Ransomware Attacks"

  • news

    Visible to the public "New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East"

    Since at least May 2020, an unknown threat actor has been observed using a malicious Windows kernel driver in attacks likely targeting the Middle East. Fortinet Fortiguard Labs, which labeled the artifact WINTAPIX (WinTapix.sys), links the malware, with low confidence, to an Iranian threat actor. According to security researchers, WinTapix.sys is a loader, so its primary objective is to produce and execute the next phase of the attack, which is achieved using a shellcode. Samples and telemetry data analyzed by Fortinet indicate that Saudi Arabia, Jordan, Qatar, and the United Arab Emirates are the primary targets of the campaign. The activity has not been attributed to a previously identified threat actor or group. Using a malicious kernel mode driver aims to subvert or disable security mechanisms and gain access to the targeted host. This article continues to discuss researchers' observations and findings regarding the new WinTapix.sys malware.

    THN reports "New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East"

  • news

    Visible to the public "Vulnerability in Zyxel Firewalls May Soon Be Widely Exploited"

    Rapid7 researchers have warned that a recently patched command injection vulnerability, tracked as CVE-2023-28771, affecting various Zyxel firewalls may soon be exploited in the wild. This warning comes after publishing a technical analysis and proof-of-concept (PoC) script that triggers the vulnerability and achieves a reverse root shell. The vulnerability impacts Zyxel APT, USG FLEX, and VPN firewalls running versions v4.60 to v5.35 of the ZDL firmware, and Zyxel ZyWALL/USG gateways/firewalls running ZLD v4.60 to v4.73. These firewall devices monitor and control network traffic, have Virtual Private Network (VPN) and Secure Sockets Layer (SSL) inspection capabilities, and provide extra protection against malware and other threats. The vulnerability stems from improper error message handling. It can be triggered by sending a specially crafted User Datagram Protocol (UDP) packet to port 500 on the WAN interface of vulnerable devices, allowing an attacker to execute OS commands as the root user. This article continues to discuss the potential exploitation and impact of the command injection vulnerability.

    Help Net Security reports "Vulnerability in Zyxel Firewalls May Soon Be Widely Exploited"

  • news

    Visible to the public "Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations"

    Meta, the owner of Facebook and Instagram, was fined $1.3 billion by the Irish Data Protection Commission for violating the European Union's (EU) General Data Protection Regulation (GDPR). Meta violated the GDPR by transferring the personal data of EU users to US servers. This is the largest penalty imposed since the EU's strict data privacy policies went into effect in 2016. It exceeds Amazon's previously record-breaking $808 million fine in 2021 for data protection violations. As a result of the European Court of Justice's nullification of the Privacy Shield, the EU and the US continue to explore alternatives on a new data flow. Originally, Privacy Shield served as a data transfer mechanism under the GDPR, allowing participating companies to comply with EU requirements regarding transferring personal data to third countries. Although a replacement is expected later in the year, a number of multinational corporations, including Meta, continue to unlawfully rely on the previous agreement, specifically the use of standard contractual clauses. This article continues to discuss Meta being fined for GDPR violations.

    Dark Reading reports "Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations

  • news

    Visible to the public "Inside the Platform Propping up the Next Generation of Email Crime"

    Cybercriminals are launching "industrial-scale" email attacks against businesses at an increasing rate, using a malicious platform that has been around for years. Microsoft has brought further attention to the rapid adoption of platforms such as BulletProftLink, highlighting that the tools are widely used to conduct highly sophisticated Business Email Compromise (BEC) attacks. These platforms provide cybercriminals with a toolkit for performing BEC attacks, including email templates that appear legitimate, hosting, and automated attack launch services. According to Microsoft's report, Cybercrime-as-a-Service (CaaS) platforms like BulletProftLink and others in this class provide new avenues for the underground industry to effectively monetize cybercrime. Between 2019 and 2020, the company's Digital Crimes Unit observed a 38 percent increase in CaaS attacks targeting business email. This article continues to discuss how BulletProftLink works, why BEC attacks are a significant threat, and the rise in CaaS attacks.

    ITPro reports "Inside the Platform Propping up the Next Generation of Email Crime"

  • news

    Visible to the public "Swiss Army Knife Malware Slices Through Systems In so Many Ways"

    The Picus Red Report 2023, based on the analysis of over 550,000 active malware strains, uncovered more than 5 million malicious activities. In the report, researchers identified the top cybercriminal tactics used in 2022. The findings also highlighted the increasing prevalence of "Swiss Army knife" malware, which can execute various destructive actions throughout the whole cyber kill chain while evading security measures. The analysis conducted by Picus Labs brings further attention to the adaptability of modern malware. According to the research, one-third of the entire sample uses more than 20 different tactics, techniques, and procedures (TTPs). Modern malware can exploit legitimate software, move laterally within systems, and encrypt files, which is considered exceptionally sophisticated. Picus notes that the advanced level of malware development is likely attributable to the vast resources of well-funded ransomware groups. The findings emphasize the need for security defenders to develop innovative behavior-based detection methods. This article continues to discuss the concept of multi-purpose malware, the growing versatility of malware, and how to improve anti-malware security efforts.

    Security Intelligence reports "Swiss Army Knife Malware Slices Through Systems In so Many Ways"

  • news

    Visible to the public "Exposed: Understanding the Threat of Digital Spying & Stalkerware"

    The global market for commercial spyware is estimated to be worth about $12 billion, with 80 countries having purchased the technology over the last decade. Spyware is used for various purposes, enabling remote access to devices from anywhere in the world. Once a device has been infected, the perpetrator gains complete control over it, granting them unrestricted access to messages, audio calls, and photos, along with remote access to cameras and microphones. Spyware is becoming increasingly accessible to people, including those lacking advanced technical skills. There are more inexpensive, rudimentary forms of spyware. Stalkerware can be especially invasive and abusive since it must be physically installed, requiring direct access to the target device. As with any technology, the market for commercial spyware has expanded at an unprecedented rate. Commercial products and services now possess capabilities similar to those of some state-affiliated Advanced Persistent Threat (APT) groups. Therefore, military-grade spyware technology is becoming increasingly accessible to the ordinary person. This article continues to discuss the threat posed by digital spying and stalking, as well as how to maximize protection.

    BetaNews reports "Exposed: Understanding the Threat of Digital Spying & Stalkerware"

  • news

    Visible to the public "Researchers Tie FIN7 Cybercrime Family to Clop Ransomware"

    The cybercrime group FIN7, which has previously used ransomware strains created by groups such as REvil and Maze, has added a new strain to its arsenal. Researchers from Microsoft's security team observed the group deploying the Clop ransomware in April. This was the group's first ransomware campaign since late 2021. Microsoft noted that FIN7, which it now refers to as Sangria Tempest, was observed deploying multiple tools to gain a foothold on victim systems before moving laterally within a network and launching the Clop ransomware. Prior to managing the now-retired DarkSide and BlackMatter ransomware operations, the group deployed REvil and Maze. In November, SentinelOne researchers linked the cybercrime group to the Black Basta ransomware operation, which was responsible for high-profile attacks against the American Dental Association and the German wind farm operator Deutsche Windtechnik. Since 2012, FIN7, formerly known as Carbanak, has conducted dozens of cybercriminal operations. Around 2020, the group went from using point-of-sale malware to ransomware. Between 2015 and 2018, FIN7 was accused of attacking over 100 US companies and orchestrating breaches of many US retailers. This article continues to discuss the FIN7 cybercrime family being tied to Clop ransomware.

    The Record reports "Researchers Tie FIN7 Cybercrime Family to Clop Ransomware"

  • news

    Visible to the public "Rheinmetall Listed on Ransomware Victim Blog"

    Black Basta, a cybercrime group with ties to Russia, allegedly infiltrated the systems of the German automotive and weapons manufacturer Rheinmetall. The cybercriminals have added Rheinmetall, one of the world's leading weapons manufacturers, to a blog on the dark web that features victims. The post included several screenshots of allegedly stolen data, including what appears to be a blueprint for manufacturing equipment. Black Basta first appeared in 2022, impacting dozens of businesses within the first weeks of its emergence. According to the monitoring platform for the dark web, DarkFeed, Black Basta has hit 153 organizations since its discovery. Using double extortion, the gang coerces victims into paying a ransom. Cybercriminals who use this model often release stolen data in increments, anticipating that victims will succumb to internal and external pressure. This article continues to discuss Rheinmetall allegedly being breached by the Russia-linked cybercriminal cartel Black Basta.

    Cybernews reports "Rheinmetall Listed on Ransomware Victim Blog"

  • news

    Visible to the public "UK Man Sentenced to 13 Years for Running Multi-Million Fraud Website"

    A man has recently been sentenced to 13 years and four months for running a multi-million-dollar fraud website that led to at least $124.2m being stolen globally. Of this, $53.4m was taken from UK victims. Law enforcement believes the actual losses to be far higher because fraud is a heavily underreported crime. Tejay Fletcher, 35, from London, UK, was handed the jail term after pleading guilty to charges of making or supplying articles for use in fraud, encouraging or assisting the commission of an offense, possessing criminal property, and transferring criminal property. The crimes took place between November 30, 2020, and November 8, 2022. The sentence followed a large international law enforcement operation led by London's Metropolitan Police in coordination with the City of London Police, the National Crime Agency, Europol, Eurojust, Dutch authorities, and the FBI. The police noted that while Fletcher was not directly responsible for the scams, his website offered tools for hire that enabled its users to launch sophisticated financial scams. Criminals used the service's technology to pose as representatives of banks, including Barclays, Santander, HSBC, Lloyds, and Halifax. They would call members of the public to warn of suspicious activity on their accounts, and ask them to disclose sensitive security information, such as one-time passcodes, to access their money. The police stated that the software allowed users to mask their phone numbers to trick victims into believing they were calling from their bank. iSpoof users could choose from a number of packages, allowing them to purchase the number of minutes they wanted to use the software for in Bitcoin. The police said that at its peak, the site had 59,000 registered users. Before it was shut down in November 2022, iSpoof was growing at a rate of 700 new users every week. In the 12 months until August 2022, around 10 million fraudulent calls were made globally via iSpoof, with roughly 3.5 million of those made in the UK.

    Infosecurity reports: "UK Man Sentenced to 13 Years for Running Multi-Million Fraud Website"

  • news

    Visible to the public "Samsung Smartphone Users Warned of Actively Exploited Vulnerability"

    The US Cybersecurity and Infrastructure Security Agency (CISA) recently warned Samsung smartphone users about a recently patched vulnerability being exploited in attacks. The flaw is CVE-2023-21492, described as a kernel pointer exposure issue related to log files. The security hole can allow a privileged local attacker to bypass the ASLR exploit mitigation technique. CISA noted that this indicates that it has likely been chained with other bugs. Samsung patched the vulnerability with its May 2023 security updates and said it learned about the flaw in mid-January. The company said certain Android 11, 12, and 13 devices are impacted. CISA added the bug to its Known Exploited Vulnerabilities (KEV) catalog on Friday, instructing government agencies to patch it by June 9. The vulnerability was discovered by Google's Threat Analysis Group, which suggests that it has likely been exploited by a commercial spyware vendor.

    SecurityWeek reports: "Samsung Smartphone Users Warned of Actively Exploited Vulnerability"

  • news

    Visible to the public "Coventry University Researchers Shocked by Excessive Data Harvesting by Apps"

    Researchers at Coventry University are helping people protect their privacy after finding excessive data collection by websites and apps. Citizen Scientists Investigating Cookies and App General Data Protection Regulation (GDPR) compliance (CSI-COP) is an award-winning privacy project led by the Centre for Computational Science and Mathematical Modelling (CSM) at Coventry University in partnership with nine other organizations. Its purpose is to investigate what personal data websites and apps automatically track when a user visits a web page or uses an app, and which have been designed to be more privacy-friendly. As part of the project, members of the public were recruited and trained as 'citizen scientists' to investigate the cookie notices and privacy policies used by websites and mobile apps. The CSI-COP collaborators and privacy champions will present their findings, unveiling a repository of cookies and online trackers containing the project's findings on over 1,000 websites and apps. The repository will allow people to determine if CSI-COP featured an app they use or a website they visited. This article continues to discuss the CSI-COP project and repository.

    Coventry University reports "Coventry University Researchers Shocked by Excessive Data Harvesting by Apps"

  • news

    Visible to the public "PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted"

    The maintainers of Python Package Index (PyPI), the official third-party software repository for the Python programming language, have disabled, until further notice, the ability for users to register and upload new packages. The volume of malicious users and malicious projects created on the index in the past week has exceeded their ability to respond on time, especially when multiple PyPI administrators are on leave. No additional information was disclosed regarding the nature of the malware or the threat actors responsible for publishing the malicious packages to PyPI. Software registries such as PyPI have repeatedly proved to be a popular target for attackers seeking to infect the software supply chain and compromise developer environments. For example, researchers at Phylum recently discovered an active malware campaign involving OpenAI ChatGPT-themed lures to trick developers into downloading a malicious Python module capable of capturing clipboard content and hijacking cryptocurrency transactions. This article continues to discuss the PyPI maintainers' decision to freeze new user and project registrations.

    THN reports "PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted"

  • news

    Visible to the public "Android Phones Are Vulnerable to Fingerprint Brute-Force Attacks"

    A team of researchers from Tencent Labs and Zhejiang University has presented a new attack dubbed 'BrutePrint,' which brute-forces fingerprints on modern smartphones to circumvent user authentication and seize control of the device. Performing brute-force attacks involves numerous trial-and-error attempts to crack a code, key, or password in order to gain unauthorized access to accounts, systems, or networks. Using what they say are two zero-day vulnerabilities, namely Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), the researchers were able to bypass existing protections on smartphones, such as attempt limits and liveness detection, which protect against brute-force attacks. The authors of the technical paper also discovered that biometric data on the Serial Peripheral Interface (SPI) of fingerprint sensors were inadequately protected, allowing a man-in-the-middle (MITM) attack to steal fingerprint images. Ten popular smartphone models were used to test BrutePrint and SPI MITM attacks, with unlimited attempts on all Android and HarmonyOS (Huawei) devices and ten additional attempts on iOS devices. This article continues to discuss the new BrutePrint attack.

    Bleeping Computer reports "Android Phones Are Vulnerable to Fingerprint Brute-Force Attacks"

  • news

    Visible to the public "Malicious Links and Misaddressed Emails Slip Past Security Controls"

    According to Armorblox, most organizations use six or more communication tools across channels, with email remaining the most vulnerable channel to attacks (38 percent). Multiple-channel attacks are picking up momentum and gaining frequency, according to respondents. Over half of respondents reported weekly (36 percent) or daily (16 percent) incidents of multi-vector, socially engineered attacks. Sixty-nine percent of respondents are concerned about attacks evading security controls by exploiting siloed communication and collaboration tools outside of email. According to the survey, 38 percent of respondents consider email the most vulnerable channel to threat actors. This highlights the high level of risk associated with email communication and the continued inadequacy of legacy security tools in protecting against sophisticated threats. This article continues to discuss key findings from Armorblox's survey of Information Technology (IT) and security professionals, focusing on the challenges organizations face in securing the abundance of communication and collaboration tools used today.

    Help Net Security reports "Malicious Links and Misaddressed Emails Slip Past Security Controls"

  • news

    Visible to the public "3 Common Initial Attack Vectors Account for Most Ransomware Campaigns"

    Most ransomware attackers use one of three primary vectors to infiltrate networks and gain access to organizations' critical systems and data. According to researchers, the most significant vector for successful ransomware attacks in 2022 was the exploitation of public-facing applications, which accounted for 43 percent of all breaches, followed by compromised accounts (24 percent) and malicious email (12 percent). The use of compromised accounts increased from 18 percent in 2021 to 22 percent in 2022. A ransomware attack can be prevented in large part by doubling down on the most common attack vectors. Many businesses are not the initial targets of attackers, but their lax Information Technology (IT) security makes them easy to breach, so cybercriminals seize the opportunity. Taking into account the top three initial vectors, which make up nearly 80 percent of all cases, it is possible to implement defensive measures that will significantly reduce the likelihood of becoming a victim. This article continues to discuss how most cyberattacks start and the basic steps that can help organizations avoid attacks.

    Dark Reading reports "3 Common Initial Attack Vectors Account for Most Ransomware Campaigns"

  • news

    Visible to the public "Ask the Expert: How New Research Can Help Protect Private Data"

    As an associate professor in the Department of Computer Science and Engineering at Michigan State University, Dr. Borzoo Bonakdarpour works to prevent the exposure of private information. Well-publicized instances of individuals being hacked due to phishing schemes or lax security practices likely come to mind when one hears "data breach." However, Bonakdarpour, a recipient of the 2023 Withrow Teaching Award, focuses on a more subtle aspect of data privacy with the same high stakes. Bonakdarpour emphasizes that programmers often make mistakes, which can result in accidental bugs. These bugs have the potential to result in massive security breaches. Bonakdarpour and his team were recently awarded a grant by the National Science Foundation (NSF) to develop what he refers to as "enforcers," or programs that can automatically detect and remedy digital mistakes before they cause damage. Enforcers watch what enters and exits a computing system, and if they detect something wrong, they take action. In addition to raising a red flag, it attempts to correct the issue. It does not fix the code, but it can take actions based on inputs and outputs. Bonakdarpour gave an analogy, where something goes wrong with the traffic light at an intersection. Accidents may occur if both directions have a green light. An enforcer would make one or both of the traffic signals red, so it does not address the underlying issue, but it prevents an accident until someone can. This article continues to discuss Bonakdarpour's insights on cybersecurity and his work to ensure bugs in computer programs do not lead to secret information being leaked.

    Michigan State University reports "Ask the Expert: How New Research Can Help Protect Private Data"

  • news

    Visible to the public "Tech Mandated by Online Safety Bill 'Could Turn Phones Into Surveillance Tools'"

    According to new research from Imperial College London, the technology mandated by the UK's Online Safety Bill could be used to transform millions of phones into facial recognition tools. Client-Side Scanning (CSS) was examined in regard to its potential privacy implications. Under the Online Safety Bill, CSS would be implemented to identify when people are attempting to share images known to be illegal content before they are encrypted and sent. The new research, which will be presented at IEEE Security and Privacy, suggests it would be possible to use CSS to search people's private messages without their knowledge, for example, by conducting facial recognition. The UK parliament is currently reviewing the Online Safety Bill. CSS is also included in a European Union proposal that, if approved, could mandate its installation on hundreds of millions of phones. According to Dr. Yves-Alexandre de Montjoye of Imperial College London's Department of Computing and coauthor of the new paper, the research shows that the software could be built or modified to include other hidden features, such as scanning private content from people's phones using facial recognition, the same technology used at airport gates. This article continues to discuss the potential privacy implications of the CSS tool.

    Imperial College London reports "Tech Mandated by Online Safety Bill 'Could Turn Phones Into Surveillance Tools'"

  • news

    Visible to the public "NATO Member Websites Targeted by Pro-Russian Hackers"

    The pro-Russian hacking group UserSec has announced the start of a new cyber campaign targeting and defacing the websites of North Atlantic Treaty Organization (NATO) member countries. On their official UserSec Telegram channel, the group posted an announcement about the campaign. Since the Russian invasion of Ukraine, numerous pro-Russian hacking groups have targeted Western governments and organizations supporting the war-torn country, particularly those offering weapons and strategic support to the Ukrainian military. According to UserSec's encrypted Telegram channel, the group was founded in January 2023 by a small number of ordinary civilians, most of whom have less than four years of hacking experience. UserSec claims to have supported KillNet attacks alongside Anonymous Sudan. Last month, KillNet, one of the most well-known pro-Russian hacking groups, launched its own campaign against NATO. On April 21, KillNet leaked the personal information of more than 4,000 individuals affiliated with NATO via a Telegram channel created specifically for KillNet's NATO-targeted attacks. This article continues to discuss the pro-Russian hacking group UserSec launching a new cyber campaign targeting and defacing websites belonging to NATO member nations.

    Cybernews reports "NATO Member Websites Targeted by Pro-Russian Hackers"

  • news

    Visible to the public HotSoS 2023 Summary

    Hot Topics in the Science of Security (HotSoS) 2023

  • news

    Visible to the public "Congress Looks to Expand CISA’s Role, Adding Responsibilities For Satellites And Open Source Software"

    Lawmakers recently passed a series of bills to give the Cybersecurity and Infrastructure Security Agency (CISA) new responsibilities when it comes to safeguarding open source software, protecting U.S. critical infrastructure, and expanding the cybersecurity workforce. The House Homeland Security Committee advanced a bill that would require CISA to maintain a commercial public satellite system clearinghouse and create voluntary cybersecurity recommendations for the space sector. Additionally, the committee advanced legislation requiring CISA to create a pilot civilian cyber reserve program to respond to incidents. The House Homeland Security Committee also advanced legislation requiring CISA to work with the open source community to better secure it and create a framework to assess the general risks of open source components for federal agencies. The House also advanced another bill that would give CISA the authority to train employees at DHS that aren't currently in cybersecurity positions to move to such a role.

    CyberScoop reports: "Congress Looks to Expand CISA's Role, Adding Responsibilities For Satellites And Open Source Software"

  • news

    Visible to the public "Dark Web ChatGPT Unleashed: Meet DarkBERT"

    The snowball effect caused by Large Language Models (LLMs) such as ChatGPT is still in the early stages. Combined with the open-sourcing of other Generative Pre-Trained Transformer (GPT) models, the number of Artificial Intelligence (AI)-based applications is exploding, and ChatGPT can be used to create highly sophisticated malware. As time passes, applied LLMs will only increase, with each one specializing in its own domain and trained on carefully curated data for a particular purpose. One such application, trained on data from the dark web itself, has just emerged. DarkBERT, as its South Korean creators named it, has arrived and provides an introduction to the dark web. DarkBERT is based on the RoBERTa AI architecture, which was created in 2019. Researchers have discovered it has more performance to offer. To train the model, the researchers crawled the dark web through the Tor network's anonymizing firewall and then filtered the raw data to create a database of the dark web. DarkBERT stems from this database being used to feed the RoBERTa LLM, a model that can analyze and extract useful information from new dark web content. Researchers demonstrated that DarkBERT outperformed other LLMs, which should enable security researchers and law enforcement to delve deeper into the web's darkest corners. This article continues to discuss DarkBERT.

    Tom's Hardware reports "Dark Web ChatGPT Unleashed: Meet DarkBERT"

  • news

    Visible to the public "KeePass 2.X Master Password Dumper Allows Retrieving the KeePass Master Password"

    KeePass 2.X Master Password Dumper is a proof-of-concept (PoC) tool developed by the security researcher Vdohney that retrieves the master password for KeePass. The tool exploits the unpatched vulnerability in KeePass, tracked as CVE-2023-32784, to retrieve the master password from the memory of KeePass 2.X versions. KeePass is a free and open-source password management application. It serves as a digital "safe" where users can store and organize sensitive information, such as passwords, credit card numbers, and notes. KeePass encrypts the data using a master key or master password, which you must provide to access the stored data. The flaw should be addressed in KeePass 2.54, which is scheduled for release at the start of June 2023. The issue arises from the fact that KeePass 2.X uses a custom-built text box ('SecureTextBoxEx') for password entry. This text box is not only used for entering the master password, but also in other areas of KeePass, such as password edit fields, allowing an attacker to recover their contents. This article continues to discuss the PoC tool that retrieves the master password from KeePass by exploiting the CVE-2023-32784 vulnerability.

    Security Affairs reports "KeePass 2.X Master Password Dumper Allows Retrieving the KeePass Master Password"

  • news

    Visible to the public "FTC to Crack Down on Biometric Tech, Health App Data Privacy Violations"

    The Federal Trade Commission (FTC) plans to update its Health Breach Notification Rule (HBNR) to clarify language regarding security breaches, user consent, and other functions, which will result in stricter enforcement for developers of consumer-driven health apps and technology. The FTC voted unanimously on May 18 to update the HBNR. A policy statement was also issued regarding its intent to combat unjust or deceptive practices associated with the collection, use, and marketing of biometric information and technologies. The risk of biometric technology breaches is directly related to the exposure of consumers' digital identities and their privacy. The FTC vote followed a second enforcement action taken under the HBNR against the developers of Premom on May 17 to resolve numerous privacy allegations, including that the fertility app and its parent company, Easy Healthcare, deceived users by sharing their personal and health information with third parties. In addition to a monetary penalty, the app developer must implement a number of adjustments to its privacy and security program and notify its users of the FTC settlement. This article continues to discuss the FTC unanimously agreeing to combat consumer privacy violations regarding biometric information and technology.

    SC Media reports "FTC to Crack Down on Biometric Tech, Health App Data Privacy Violations"

  • news

    Visible to the public "Google Debuts Quality Ratings for Security Bug Disclosures"

    Google and Android announced recently that they will now assess device vulnerability disclosure reports based on the level of information that bug hunters provide in order to encourage more comprehensive submissions. According to Google, vulnerability reports submitted to the Android and Google Vulnerability Reward Program (VRP) will be rated as "High," "Medium," or "Low" quality based on these elements: the accuracy and detail of the vulnerability description, analysis of its root cause, proof of concept, reproducibility, and evidence of reachability. Google and Android have also upped the top bug bounty prize to $15,000. Additionally, as of March 15th, 2023, Android is no longer assigning Common Vulnerabilities and Exposures (CVEs) to moderate severity issues. The CVEs are still being assigned to critical and high severity vulnerabilities. In 2022 alone, Google's VRPs paid out a record-setting $12 million in bug bounties.

    Dark Reading reports: "Google Debuts Quality Ratings for Security Bug Disclosures"

  • news

    Visible to the public "Apple Patches 3 Exploited WebKit Zero-Day Vulnerabilities"

    Apple recently released security updates for its operating systems to patch dozens of vulnerabilities that could expose iPhones and Macs to hacker attacks, including three zero-days affecting the WebKit browser engine. Two of the actively exploited vulnerabilities, CVE-2023-28204 and CVE-2023-32373, have been reported to the tech giant by an anonymous researcher. Apple noted that their exploitation can lead to sensitive information disclosure and arbitrary code execution if the attacker can trick the targeted user into processing specially crafted web content, this includes luring them to a malicious site. No information is available on the attacks exploiting these zero-day flaws. Apple revealed in its advisories that these were the vulnerabilities that it patched with its first Rapid Security Response updates, specifically iOS 16.4.1(a), iPadOS 16.4.1(a), and macOS 13.3.1(a). Now, iOS 16.5 and iPadOS 16.5 fix CVE-2023-28204 and CVE-2023-32373, as well as CVE-2023-32409, a WebKit zero-day that can be exploited to escape the Web Content sandbox. Apple noted that CVE-2023-32409 was reported to them by Google's Threat Analysis Group and Amnesty International, which indicates that it has likely been exploited by the products of a commercial spyware vendor. The latest iOS and iPadOS updates patch over 30 other vulnerabilities, including ones that can lead to a security bypass, sandbox escape, arbitrary code execution, exposure of location and other user data, privilege escalation, termination of an app, recovery of deleted photos, retaining access to system configuration files, contact information exposure from the lock screen, and modifications of protected parts of the file system. CVE-2023-28204 and CVE-2023-32373 have also been fixed with the release of iOS and iPadOS 15.7.6. The exploited WebKit vulnerabilities have also been resolved in Apple TV, Apple Watch, and Safari. Apple stated that the latest macOS Ventura update fixes the three zero-days and nearly 50 other vulnerabilities that can lead to sensitive information disclosure, arbitrary code execution, DoS attacks, a security feature bypass, and privilege escalation. Apple has also updated macOS Monterey to version 12.6.6 and Big Sur to version 11.7.7 to patch more than two dozen vulnerabilities, but none of the zero-days.

    SecurityWeek reports: "Apple Patches 3 Exploited WebKit Zero-Day Vulnerabilities"

  • news

    Visible to the public "Satellite Signal Jamming Reaches New Lows: Starlink and Other LEO Constellations Face a New Set of Security Risks"

    Before Russia invaded Ukraine, Russian hackers knocked out Viasat satellite ground receivers across Europe. Elon Musk then offered access to Starlink, SpaceX's network of low Earth orbit (LEO) communications satellites. However, Musk reported shortly thereafter that Starlink was experiencing jamming attacks and software countermeasures. Regardless of their altitude or size, communications satellites transmit more power, requiring more power to jam than navigational satellites. However, compared to large geostationary satellites, LEO satellites have frequent handovers that introduce delays and more surface area for interference, according to Mark Manulis, a professor of privacy and applied cryptography at the University of the Federal Armed Forces' Cyber Defense Research Institute (CODE) in Munich, Germany. It is possible to infer from a handful of publications and open-source research how unprepared many LEO satellites are for direct attacks and which defenses future LEO satellites may require. Private companies and government agencies have been planning LEO constellations, with each numbering thousands of satellites. For example, the Department of Defense (DOD) has been designing its own LEO satellite network to supplement its more traditional geostationary constellations, and has already started issuing contracts for the constellation's construction. For research and demonstration purposes, university research groups are also launching small, standardized cube satellites (CubeSats) into LEO. This growth of satellite constellations coincides with the rise of off-the-shelf components and software-defined radio, both of which make satellites less expensive but less secure. This article continues to discuss the new security risks LEO satellites face and the need for more focus on cryptography for these satellites.

    IEEE Spectrum reports "Satellite Signal Jamming Reaches New Lows: Starlink and Other LEO Constellations Face a New Set of Security Risks"

  • news

    Visible to the public "Experts Warn of Voice Cloning-as-a-Service"

    Security researchers at Recorded Future warn that threat actors are gaining significant interest in voice cloning-as-a-service (VCaaS) offerings on the dark web, designed to streamline deepfake-based fraud. The researchers noted that deepfake audio technology can mimic the voice of a target to bypass multi-factor authentication, spread disinformation, and enhance the effectiveness of social engineering in business email compromise (BEC)-style attacks, among other things. The researchers warned that, increasingly, out-of-the-box voice cloning platforms are available on the dark web, lowering the bar to entry for cybercriminals. Some are free to use with a registered account, while others cost little more than $5 per month. The researchers noted that in some cases, cybercriminals are abusing legitimate tools such as those intended for use in audio book voiceovers, film and television dubbing, voice acting, and advertising. One popular option is ElevenLabs' Prime Voice AI software, a browser-based text-to-speech tool that allows users to upload custom voice samples for a premium charge. The researchers noted that the company had restricted the use of the tool to paid customers, which has led to an increase in references to threat actors selling paid accounts to ElevenLabs as well as advertising VCaaS offerings. The researchers stated that, fortunately, many current deepfake voice technologies are limited in generating only one-time samples that cannot be used in real-time extended conversations. However, the researchers argued that an industry-wide approach is needed to tackle the threat before it escalates.

    Infosecurity reports: "Experts Warn of Voice Cloning-as-a-Service"

  • news

    Visible to the public "Teen Hacker Charged in Scheme to Siphon Funds From Sports Betting Accounts"

    An 18-year-old has been charged for allegedly hacking and selling access to thousands of online sports betting accounts. Joseph Garrison of Madison, Wisconsin, who is accused of masterminding the credential stuffing scheme, is facing criminal charges. According to a criminal complaint, beginning in November 2022, Garrison purchased stolen username and password credentials on the dark web. Using the credentials, he allegedly attempted to systematically access accounts on the sports betting platform. The site is not specified in the complaint, but CNBC identified it as DraftKings. According to the complaint, this access was then sold on various websites along with instructions on how to transfer funds from the accounts. As alleged, Garrison used a sophisticated cyber-breach attack to gain unauthorized access to victim accounts and steal hundreds of thousands of dollars, according to FBI Assistant Director in Charge Michael J. Driscoll, who added that cyber intrusions aimed at stealing private individuals' funds pose a serious threat to economic security. Approximately 60,000 accounts were accessed, and $600,000 was stolen from 1,600 accounts that Garrison and his co-conspirators allegedly sold. On February 23, law enforcement agents executed a search warrant, seizing his computer and mobile phone. They found OpenBullet and SilverBullet, two programs used in credential stuffing attacks, which run customizable scripts on websites using a list of username and password combinations. This article continues to discuss the teen hacker facing criminal charges for allegedly hacking into and selling access to online sports betting accounts.

    The Record reports "Teen Hacker Charged in Scheme to Siphon Funds From Sports Betting Accounts"

  • news

    Visible to the public "Popular Android TV Boxes Sold on Amazon Are Laced With Malware"

    AllWinner and RockChip are China-based companies that power several popular Android TV boxes sold on Amazon. These Android-powered TV set-top boxes are typically inexpensive and highly customizable, incorporating multiple streaming services into a single device. Their listings on Amazon have collectively accumulated thousands of positive reviews. However, security researchers say the devices are sold with malware capable of initiating coordinated cyberattacks. Daniel Milisic purchased an AllWinner T95 set-top box last year and found that the chip's firmware was infected with malware. Milisic discovered that the set-top box was communicating with command-and-control (C2) servers and awaiting further instructions. His ongoing investigation, which he published on GitHub, revealed that his T95 model connected to a botnet composed of thousands of malware-infected Android TV boxes. According to Milisic, the default payload of the malware is a clickbot, which is code that generates ad revenue by secretly tapping on advertisements in the background. When the infected Android TV boxes are powered on, the preloaded malware contacts a C2 server, obtains instructions on finding the malware it needs, and pulls additional payloads to the device that carry out ad-click fraud. Milisic explained that due to the malware's design, its creators can distribute any payload they want. Bill Budington, an EFF security researcher, independently validated Milisic's findings after purchasing an affected device from Amazon. Several other AllWinner and RockChip Android TV models, including the AllWinner T95Max, RockChip X12 Plus, and RockChip X88 Pro 10, are also preloaded with the malware. This article continues to discuss the popular Android TV boxes being sold infected with malware.

    TechCrunch reports "Popular Android TV Boxes Sold on Amazon Are Laced With Malware"

  • news

    Visible to the public "Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware"

    As part of a BATLOADER campaign designed to distribute the RedLine Stealer malware, malicious Google Search ads for generative Artificial Intelligence (AI) services such as OpenAI ChatGPT and Midjourney are being used to direct users to questionable websites. In an analysis, security researchers at eSentire noted that both AI services are popular but lack first-party standalone applications. Users interact with ChatGPT via their web interface, while Midjourney uses Discord. Threat actors have exploited this gap to direct AI app-seekers to malicious websites promoting fake apps. BATLOADER is a loader malware that is spread via drive-by downloads, in which users searching for specific keywords on search engines are shown fraudulent ads that, when clicked, redirect them to landing pages where malware is hosted. This article continues to discuss the use of malicious Google Search ads for generative AI services to direct users to sketchy websites as part of a BATLOADER campaign aimed at delivering RedLine Stealer malware.

    THN reports "Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware"

  • news

    Visible to the public "Once Again, Malware Discovered in npm"

    Two code packages named "nodejs-encrypt-agent" were recently discovered to contain the open-source information-stealing malware TurkoRat in the popular npm JavaScript library and registry. The malware-containing packages were discovered by ReversingLabs researchers, who report that the perpetrators behind them attempted to have the packages impersonate another legitimate package, agent-base version 6.0.2, which has been downloaded over 20 million times. Checkmarx recently published a report highlighting an emerging trend of threat actors exploiting npm's failure to account for certain types of typosquatting for years, potentially leading enterprises to inadvertently download malware. ReversingLabs researchers stated that the discovery of the most recent malicious packages, along with version number irregularities, was a red flag. In this case, a "strangely high version number" was used to attempt to trick developers into downloading what appeared to be a new release of the package. This article continues to discuss the discovery of TurkoRat-poisoned packages in the npm development library.

    Dark Reading reports "Once Again, Malware Discovered in npm"

  • news

    Visible to the public "Inadequate Tools Leave Appsec Fighting an Uphill Battle for Cloud Security"

    According to Backslash Security, AppSec teams are struggling to keep up with the increasingly rapid and agile development pace, and playing security defense through a continuous and unproductive vulnerability hunt. Fifty-eight percent of respondents spend over 50 percent of their time hunting vulnerabilities, with 89 percent spending at least 25 percent of their time in this defensive mode. The annual cost of employing AppSec engineers who hunt for vulnerabilities rather than manage a comprehensive cloud-native AppSec program is estimated to be about $1.2 million. Given the accelerated pace of digital innovation across all enterprise sizes and the blurred lines between AppSec and CloudSec, enterprise AppSec teams are burdened with solutions that have yet to catch up to the cloud's speed. Therefore, AppSec professionals are losing confidence in the prevalent AppSec tools. The lack of cloud-native AppSec tools has a wide-ranging impact on nearly all organizations, including increasing friction between AppSec and development teams (39 percent), putting the ability to generate revenue at risk (39 percent), and an inability to retain high-value development talent (38 percent) and AppSec talent (35 percent). This article continues to discuss key findings from Backslash Security's report on AppSec teams being stuck in a catch-up cycle.

    Help Net Security reports "Inadequate Tools Leave Appsec Fighting an Uphill Battle for Cloud Security"

  • news

    Visible to the public "Hackers Target Vulnerable WordPress Elementor Plugin After PoC Released"

    In massive Internet scans, hackers are actively searching for vulnerable Essential Addons for Elementor plugin versions on thousands of WordPress websites in an attempt to exploit a recently disclosed critical account password reset vulnerability. The critical vulnerability, tracked as CVE-2023-32243, affects Essential Addons for Elementor versions 5.4.0 to 5.7.1, allowing unauthenticated attackers to reset the passwords of administrator accounts and take control of the impacted websites. The vulnerability that affected over one million websites was discovered by PatchStack on May 8, 2023, and fixed by the vendor on May 11, with the release of version 5.7.2 of the plugin. However, researchers published a proof-of-concept (PoC) exploit on GitHub on May 14, making it widely accessible to attackers. Wordfence reported observing millions of probes for the plugin's presence on websites and blocking at least 6,900 exploitation attempts. This article continues to discuss hackers actively probing for vulnerable Essential Addons for Elementor plugin versions on thousands of WordPress websites.

    Bleeping Computer reports "Hackers Target Vulnerable WordPress Elementor Plugin After PoC Released"

  • news

    Visible to the public "They Shall Not Pass: Keeping an Eye on Middleboxes"

    When users access a website or send an email, they trust that their information will not be altered and read by third parties. However, maintaining the flow of information on global networks requires numerous intermediary processes, which may pose security risks. Ilies Benhabbour, a Ph.D. student working with Professor Marc Dacier at King Abdullah University of Science and Technology (KAUST), explains that, in terms of security, the more complex a system is, the more vulnerabilities it has. He added that the Internet was designed to operate as a modular system, with each data transmission component designated a specific function and contained in a protective layer known as encapsulation. The data packets are concealed and should not be altered during transmission. When a piece of information, such as an email, traverses the Internet, it encounters several third-party software components typically hidden from users. These network middleboxes, which Benhabbour and Dacier refer to as "semi-active components," improve efficiency and security by compressing large data packets or checking for viruses. Despite these benefits, some semi-active components may contain code that does not conform to international standards, is overly complex, or has been improperly configured. It is also possible for malicious hackers to pose as middleboxes in order to steal or change data. Existing tools for detecting semi-active components are often found to be cumbersome and limited to a few specific Internet protocols, so Benhabbour and Dacier designed a new tool called NoPASARAN that is simple, modular, and scalable to various situations. This article continues to discuss NoPASARAN.

    KAUST reports "They Shall Not Pass: Keeping an Eye on Middleboxes"

  • news

    Visible to the public "Securing APIs Is a Top Priority, Yet Many Don't Have Dedicated Security Solutions"

    According to a new study, the security of Application Programming Interfaces (APIs) remains a top cybersecurity concern in 2023, but many businesses still lack dedicated API security. Traceable AI research conducted at this year's RSA conference reveals that while 69 percent of organizations claim to incorporate APIs into their cybersecurity strategy, 40 percent of businesses lack dedicated professionals or teams for API security. Twenty-three percent of respondents do not know if their organization has dedicated API security. Although most organizations (61 percent) do not believe they have been the target of an API attack in the past 12 months, an alarming 36 percent of respondents are unsure. In addition, 25 percent of those who have adopted API security tools are unable to baseline API behavior and identify anomalous activity that may be indicative of an API attack. Fifty percent of respondents are uncertain whether their API security solution possesses these capabilities. This article continues to discuss key findings from Traceable AI's 2023 State of API Security report.

    BetaNews reports "Securing APIs Is a Top Priority, Yet Many Don't Have Dedicated Security Solutions"

  • news

    Visible to the public "Quantum Cryptography Market to Exceed $3B by 2028"

    According to a forecast by MarketsandMarkets, the global quantum cryptography market will be worth an estimated $500 million in 2023. However, like the rapidly evolving technology, the market is expected to expand significantly over the next five years. The forecast predicts that the market for quantum cryptography will grow at a compound annual growth rate of more than 40 percent over the next five years, surpassing $3 billion by 2028. Quantum cryptography applies the principles of quantum mechanics to secure communication channels and data. Although the market for quantum cryptography products is expected to grow immensely over the next few years, it is already a highly competitive market, partly because of the technical complexity required to commercialize the technology. The market includes quantum standards, quantum random number generators, and Quantum Key Distribution (QKD) systems. The market expansion parallels the government's interest in quantum cryptography and quantum computing in general. In preparation for the commercialization of quantum computers, the Office of Management and Budget (OMB) issued a memo outlining the need for federal agencies to migrate to post-quantum cryptography. This article continues to discuss the growing global quantum cryptography market.

    NextGov reports "Quantum Cryptography Market to Exceed $3B by 2028"

  • news

    Visible to the public "Small Utilities, Hospitals Struggle With Newer Cyber Threats"

    According to government officials, small electric utilities, wastewater facilities, and hospitals struggle to defend their organizations against new cyber threats due to limited resources. David Travers, head of the Environmental Protection Agency's (EPA) Water Infrastructure and Cyber Resilience Division, emphasized that about 100,000 drinking water systems and 16,000 wastewater systems serve the US and its territories, with customer bases ranging from over 8 million to less than 500 people. The most significant cyber risk in the water industry is the failure of many utilities to adopt best practices. Travers added that this critical vulnerability is evident from a recent industry survey, which revealed that most utilities had not taken key steps to protect their operations. Cyber incidents at water systems have also exploited the failure to implement cybersecurity best practices. Hundreds of smaller water and wastewater systems have received individualized technical assistance from the EPA, and subject matter experts have identified gaps in cybersecurity best practices and implemented remediation actions tailored to the utility entities' resources and objectives. The agency announced in March that it will incorporate cybersecurity into periodic safety assessments. According to Brian Mazanec of the Department of Health and Human Services (HHS), the department has developed different sets of industry best practices for small, medium, and large hospital systems, with resources that small hospitals can use as-is. This article continues to discuss cybersecurity challenges faced by small utilities and hospitals as well as efforts to help them.

    GovInfoSecurity reports "Small Utilities, Hospitals Struggle With Newer Cyber Threats"

  • news

    Visible to the public "Five Cyberattacks in One Day Expose 150K US Residents to Data Risk"

    Five organizations reported data breaches to the Maine Attorney General's Office in one day. Village Bank, Sysco, Collins Electrical Construction, Kline & Specter, and Puma Biotechnology were the five entities that disclosed data breaches on May 17. The five cyberattacks impacted nearly 150,000 people in the US. However, there could be some overlap in cases where victims suffer from two or more separate breaches. Sysco was by far the worst affected, as it reported 126,243 victims whose names and other Personally Identifying Information (PII), including Social Security numbers, were exposed in a cybersecurity incident carried out by a threat actor on January 14, 2023. As is often the case with system infiltrations, the target organization did not discover this until March 5. Kline & Specter, the second-worst affected company, had the same type of client information exposed to cybercriminals in what it described as a ransomware attack on March 13 in which some personal data may have been copied. In regard to the number of victims, Village Bank (3,324), Puma Biotechnology (1,933), and Collins Electrical (567) fared relatively well, although they, along with Sysco and Kline, all emphasized that they are treating the attacks seriously. This article continues to discuss the five cyberattacks recently disclosed to the Maine Attorney General's Office.

    Cybernews reports "Five Cyberattacks in One Day Expose 150K US Residents to Data Risk"

  • news

    Visible to the public "Cyber Warfare Escalates Amid China-Taiwan Tensions"

    According to security researchers at Trellix, China-Taiwan tensions have led to a significant increase in cyberattacks targeting Taiwan. The researchers spotted a surge in cyberattacks aimed at Taiwanese industries, with the primary goal of deploying malware and stealing sensitive information. The researchers stated that they observed a surge in malicious emails targeted toward Taiwan, starting April 7 and continuing until April 10. The number of malicious emails during this time increased to over four times the usual amount. The researchers noted that although various industries were targeted during the surge, the most impacted industries in the respective time frame were networking/IT, manufacturing, and logistics. Moreover, the researchers observed a significant rise in extortion emails targeting Taiwan government officials. The researchers stated that though it's unclear if this activity is from China-backed threat actors, it speaks to a continued increase in attacks specifically targeting Taiwan. The researchers identified different types of malicious email campaigns, including false payment overdue notifications, fake shipment notifications from reputable companies like DHL, and fraudulent quotation request emails that contain malware-laden attachments. Additionally, attackers have employed phishing pages and harmful URLs to trick users into revealing their login details. One notable malware observed during these attacks is PlugX, a Remote Access Trojan (RAT) commonly associated with Chinese Advanced Persistent Threat (APT) groups. The researchers also saw other malware families being used, such as Kryptik, Zmutzy, and Formbook.

    Infosecurity reports: "Cyber Warfare Escalates Amid China-Taiwan Tensions"

  • news

    Visible to the public "Montana Signs Ban on TikTok Usage on Personal Devices"

    Montana's Governor Greg Gianforte has officially signed into law a ban on TikTok usage from personal devices. The legislation will take effect on January 1, 2024, and prohibits individuals in the state from accessing the popular video-sharing platform. A TikTok Spokesperson said the ban violates the First Amendment rights of Montana residents. Because of this, the company plans to challenge the legislation in court. Governor Gianforte claims the "ban aligns with efforts to safeguard Montanans from Chinese Communist Party surveillance." While the law prohibits app stores from offering TikTok, it does not restrict existing users from utilizing the app, which currently has around 150 million users in the United States. In March, a congressional committee interrogated TikTok CEO Shou Zi Chew about the possibility of Chinese government influence and data access. Chew denied the spying allegations but confessed to employee misuse of TikTok accounts.

    Infosecurity reports: "Montana Signs Ban on TikTok Usage on Personal Devices"

  • news

    Visible to the public "CISA and ONCD Award Champions of the Fourth Annual  President's Cup Cybersecurity Competition"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and Office of the National Cyber Director (ONCD) recently awarded the winners of the fourth annual President's Cup Cybersecurity Competition in a private ceremony at the White House. The individual winners are Ben Marks of the National Security Agency (NSA) and US Army Chief Warrant Officer 1 Andrew Fricke of the 781st Military Intelligence Battalion. The President's Cup, led and hosted by CISA, presents competitors with challenges based on the National Initiative for Cybersecurity Education (NICE) Framework Work Roles to identify, recognize, and reward the best cybersecurity talent in the federal workforce. Nearly 240 teams and over 1,100 individuals competed for the top rewards. The competition featured two individual tracks: one tested offensive skills, such as those required for the exploitation analyst and cyber operator NICE work roles, and the other tested defensive skills, such as those required for the incident response and forensics analyst work roles. This article continues to discuss the President's Cup Cybersecurity Competition.

    CISA reports "CISA and ONCD Award Champions of the Fourth Annual President's Cup Cybersecurity Competition"

  • news

    Visible to the public "Infostealer Malware Surges: Stolen Logs Up 670% on Russian Market"

    The Secureworks Counter Threat Unit (CTU) recently revealed that there had been a significant surge (670%) in stolen logs on online marketplace Russian Market. Infostealers are a natural choice for cybercriminals. Secureworks stated that they are readily available for purchase and, within as little as 60 seconds, generate an immediate result in the form of stolen credentials and other sensitive information. Secureworks noted that cybercriminals employ increasingly sophisticated methods to deceive users, and detecting and removing these threats is becoming even more daunting for victims. The Secureworks' report also shows that in less than nine months, the logs for sale on Russian Market surged by 150%, reaching more than five million in late February 2023 from two million in June 2022. This represents a growth rate of 670% within approximately two years. Secureworks noted that they are seeing an entire underground economy and supporting infrastructure built around infostealers, making it not only possible but also potentially lucrative for relatively low-skilled threat actors to get involved.

    Infosecurity reports: "Infostealer Malware Surges: Stolen Logs Up 670% on Russian Market"

  • news

    Visible to the public "Researchers Show Ways to Abuse Microsoft Teams Accounts for Lateral Movement"

    Proofpoint researchers explored how attackers could abuse access to a Microsoft Teams account and discovered attack vectors that could allow hackers to move laterally by launching additional phishing attacks or tricking users into downloading malicious files. According to Proofpoint, about 40 percent of Microsoft 365 cloud tenant companies have seen at least one unauthorized login attempt to gain access to a user account via Microsoft Teams in the second half of 2022 using either the web or desktop clients. Although this is less than the percentage of organizations that saw malicious login attempts on their Azure Portal or Office 365 accounts, it is significant enough to indicate that attackers are particularly interested in Microsoft Teams. Access to a Teams account can be gained via an Application Programming Interface (API) token, stolen credentials, or an active session cookie. Once inside, attackers will likely access other services or target other users. This article continues to discuss the researchers' findings regarding how attackers can enable lateral movement within a network via a compromised Teams account.

    CSO Online reports "Researchers Show Ways to Abuse Microsoft Teams Accounts for Lateral Movement"

  • news

    Visible to the public "MalasLocker Ransomware Targets Zimbra Servers, Demands Charity Donation"

    A new ransomware operation is attempting to infiltrate Zimbra servers in order to steal emails and encrypt files. Instead of a ransom payment, the threat actors demand a charity donation to provide an encryptor and not leak data. The MalasLocker ransomware attack began encrypting Zimbra servers near the end of March 2023, with victims reporting in forums that their emails were encrypted. MalasLocker's data leak site is currently distributing stolen data belonging to three companies as well as the Zimbra configuration for 169 other victims. The operation's ransom demand is quite unusual, putting it more in the realm of hacktivism. However, researchers have yet to confirm whether the threat actors keep their word when a victim donates money to a charity to get a decryptor. This article continues to discuss the MalasLocker ransomware operation and its unusual ransom demand.

    Bleeping Computer reports "MalasLocker Ransomware Targets Zimbra Servers, Demands Charity Donation"

  • news

    Visible to the public "8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency"

    The 8220 Gang, a cryptojacking group, has been observed weaponizing a six-year-old security vulnerability in Oracle WebLogic servers to pull vulnerable instances into a botnet and spread cryptocurrency mining malware. The flaw, tracked as CVE-2017-3506 with a CVSS score of 7.4, could allow an unauthenticated attacker to remotely execute arbitrary commands. According to Trend Micro researcher Sunil Bharti, this will enable attackers to gain unauthorized access to sensitive data or compromise the entire system. The group, first documented by Cisco Talos in 2018, is named for its original use of port 8220 for command-and-control (C2) network communications. SentinelOne reported last year that the 8220 Gang identifies targets by scanning the public Internet for misconfigured or vulnerable hosts. The 8220 Gang uses SSH brute force attacks post-infection to move laterally within a compromised network. Earlier this year, Sydig reported attacks carried out by the "low-skill" crimeware gang between November 2022 and January 2023 to breach vulnerable Oracle WebLogic and Apache web servers and deploy a cryptocurrency miner. This article continues to discuss the 8220 Gang exploiting a six-year-old security flaw in Oracle WebLogic servers.

    THN reports "8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency"

  • news

    Visible to the public "Organizations' Cyber Resilience Efforts Fail to Keep Up With Evolving Threats"

    According to Immersive Labs, a continuous increase in cyberattacks and changing threat landscape are causing more organizations to focus on creating long-term cyber resilience, but many of these programs fail to demonstrate teams' real-world cyber capabilities. Although 86 percent of organizations have a cyber resilience program, 52 percent of respondents say their organization lacks a comprehensive strategy for assessing cyber resilience. Increasing the cyber resilience of cybersecurity team members (83 percent) and the general workforce (75 percent) are cited as the two highest overall focus areas for organizations in 2023. Organizations have taken measures to deploy cyber resilience programs. However, 53 percent of respondents believe that the organization's workforce is unprepared for the next cyberattack. While cyber resilience is a priority and programs exist, these statistics indicate that their current structure and training are ineffective. This article continues to discuss key findings from the Cyber Workforce Resilience Trend Report.

    Help Net Security reports "Organizations' Cyber Resilience Efforts Fail to Keep Up With Evolving Threats"

  • news

    Visible to the public "Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise"

    Millions of Android phone owners worldwide unknowingly contribute to the financial upkeep of the Lemon Group. The Lemon Group operators infected their devices before they purchased them. Now, they steal and sell SMS messages and one-time passwords (OTPs), serve unwanted advertisements, create online messaging and social media accounts, and more using their mobile devices. Lemon Group has claimed that its clients have access to nearly 9 million Android devices infected with the Guerrilla malware. However, Trend Micro believes that the actual number may be larger. In recent years, a number of cybercriminal groups have developed lucrative business models around pre-infected Android devices. Trend Micro researchers performed forensic analysis on the ROM image of an Android device infected with the Guerrilla malware. Their investigation revealed that the group has infected Android devices in 180 countries. Over 55 percent of the victims are located in Asia, 17 percent in North America, and about 10 percent in Africa. Trend Micro was able to identify over 50 brands of mobile devices, the majority of which were inexpensive. This article continues to discuss Lemon Group's Guerrilla malware model.

    Dark Reading reports "Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise"

  • news

    Visible to the public "Quantum Random Number Generator Operates Securely and Independently of Source Devices"

    Quantum Random Number Generators (QRNGs) produce true randomization using the inherent unpredictability of quantum mechanics. Therefore, they have important applications in tasks involving quantum information processing and computation. In practice, any imperfection or inaccuracy in the characterization of quantum source devices in a real implementation has a significant impact on the security and generation rate of QRNGs, and may even result in the loss of quantum randomness. To effectively resolve these problems, source-device-independent (source-DI) QRNGs operate with untrusted but well-characterized measurement devices. Researchers from Nanjing University have recently proposed and demonstrated a simple and efficient source-DI QRNG protocol that is both secure and fast. In this work, the source-DI QRNG is realized through single-photon detection technology with help from entangled photons. The extraction of random numbers occurs through a process that measures the arrival time of a photon from a pair of time-energy entangled photons. The Spontaneous Parametric Down Conversion (SPDC) process produces the time-energy entangled photon pairs. According to Yan-Xiao Gong, Professor at Nanjing University, this study strikes an excellent balance between security, speed, and practicality compared to several existing semi-DI QRNGs. He adds that this research paves the way for practical applications of secure quantum information tasks and supports the creation of high-performance and high-security QRNGs. This article continues to discuss the QRNG that operates securely and independently of source devices.

    SPIE reports "Quantum Random Number Generator Operates Securely and Independently of Source Devices"