News Items

  • news

    Visible to the public "Stealthier Version of Linux BPFDoor Malware Spotted in the Wild"

    Researchers have discovered a new, stealthier variant of the Linux malware called BPFDoor. It now has more robust encryption and reverse shell communications. BPFDoor is a backdoor malware that has been active since at least 2017 but was not discovered by security researchers until about 12 months ago. The malware derives its name from its use of the Berkley Packet Filter (BPF) to receive instructions while circumventing incoming traffic firewall restrictions. BPFDoor is designed to enable threat actors to maintain prolonged persistence on compromised Linux systems and remain undetected for extended periods of time. Prior to 2022, the malware used RC4 encryption, bind shell, and iptables for communication, and commands and filenames were hardcoded. The new variant analyzed by Deep Instinct uses static library encryption, reverse shell communication, and the command-and-control (C2) server sends all commands. The malware developers achieve improved stealth and obfuscation by including encryption within a static library, as they no longer need to rely on external libraries, such as those featuring the RC4 cipher algorithm. This article continues to discuss the new version of the Linux BPFDoor malware.

    Bleeping Computer reports "Stealthier Version of Linux BPFDoor Malware Spotted in the Wild"

  • news

    Visible to the public "Fraud Victims Risk More Than Money"

    According to Telesign, digital fraud has significant financial and psychological consequences for victims. In addition, digital fraud can significantly impact a company's brand perception and bottom. In the digital realm, trust is of paramount importance. For businesses to establish and maintain long-lasting relationships with their customers, it is essential to understand consumer sentiment regarding this topic. Telesign researchers emphasize the responsibility of companies to ensure privacy protections and trust in every digital interaction, as well as what can occur when companies fail to meet this obligation. Data breaches, which accounted for 44 percent of fraud incidents in this study, have a profoundly negative effect on brand perception, with 44 percent of data breach victims discouraging others from associating with the brand. Forty-three percent of data breach victims ceased all personal association with the brand. Thirty percent of data breach victims posted about the fraud incident on social media, amplifying negative brand perceptions. Furthermore, 59 percent of victims who were initially exposed to fraud on social media indicate that they are less likely to use social media again in the future. Others report that their fraud experiences make them less likely to use online banking and payment services applications. This article continues to discuss key findings from Telesign's 2023 Trust Index report.

    Help Net Security reports "Fraud Victims Risk More Than Money"

  • news

    Visible to the public "CISA Addresses 'Cyber Poor' Small Biz, Local Government"

    Jen Easterly, director of the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), told attendees at the sixth annual Hack the Capitol event in McLean, Virginia, on May 10 that CISA aims to help "cyber poor" places such as US small businesses, election offices, local government agencies, hospitals, and K-12 schools strengthen their defenses and responses to cyberattacks. Although the agency continues to work with the government, large companies, and technology vendors to improve security, CISA wants to determine how much it can help smaller organizations defend against cyber threats. Easterly noted that the objective is to understand their requirements, what they need to invest in security, and where CISA can help them protect their capabilities. The emphasis on smaller organizations recognizes that small and midsize businesses (SMBs), local government agencies, and schools have often been overlooked and excluded from efforts to create more resilient organizations. The government's efforts to create public-private partnerships have typically centered on large companies and critical industries, but attackers, particularly ransomware gangs, have targeted smaller organizations with limited cybersecurity resources. According to US Census data, 99. percent of all companies in the US have 250 employees or less. CISA has introduced Cybersecurity Performance Goals (CPGs), which aim to be low-cost and low-effort goals organizations can pursue to enhance their cybersecurity posture. This article continues to discuss CISA's efforts to help cyber poor organizations.

    Dark Reading reports "CISA Addresses 'Cyber Poor' Small Biz, Local Government"

  • news

    Visible to the public "Spyware Lurks in Android Smartphones"

    According to researchers from the University of California, San Diego, New York University, and Cornell, Google has made installing spyware apps on Android smartphones easy. The researchers demonstrated how these Android spyware apps are built and use relatively simple Android Application Programming Interfaces (APIs) for invasive spying capabilities. Although many of these APIs are required and provide beneficial functionality, researchers call on the Google/Android team to further explore how to prevent their misuse for spying on others. As a result of Google's decision to enable its Android operating system to install third-party apps from any online service, spyware apps can easily be installed on Android smartphones. The spyware installation process is as easy as it is for apps vetted as "safe" by the Google Play Store. Before being accepted by Apple's App Store, iOS apps are screened for safety on the iPhone. Android allows downloads from third-party websites, whereas Apple has chosen to restrict downloads to its own store. GitHub references hundreds of spyware apps, which often have similar names, such as Stalkerware and Watchware, as well as spyware services hidden in 3,988 dual-use apps. Criminals use spyware for illegal surveillance, profit, political leverage, blackmail, and other malicious purposes. This article continues to discuss spyware and how it can easily be installed on Android smartphones.

    CACM reports "Spyware Lurks in Android Smartphones"

  • news

    Visible to the public "NINJIO Releases Report Focused On Increasing Necessity for Human-Based Cybersecurity in Higher Education"

    The cybersecurity awareness training company NINJIO has published a comprehensive report on cyber threats faced by higher education institutions and the sector's unique vulnerabilities. Universities are high-value targets for cybercriminals because they handle massive amounts of sensitive data, including research data and student records. Moreover, university networks' size, complexity, and openness exacerbate the cybersecurity challenges they confront. According to the report, faculty, students, and all university stakeholders must be trained to recognize cyber threats and take appropriate action against them. Cyberattacks in higher education are rising, and the report examines how universities can combat them by implementing behavior-based, end-to-end cyber awareness solutions. In addition, the report describes how university administrators and Information Technology (IT) teams struggle to keep up with the evolution of cybercriminal tactics. Since millions of students, professors, and researchers use interconnected digital systems for online instruction, record-keeping, and more daily, cybercriminals have numerous opportunities to exploit user errors. More than a third of the errors that led to breaches in the education sector in 2022 were caused by emails sent to the wrong individuals or with the wrong attachments, while ransomware accounted for more than 30 percent of breaches. This article continues to discuss NINJIO's recommendations on how universities can build a culture of cybersecurity awareness at every level.

    Higher Ed Dive reports "NINJIO Releases Report Focused On Increasing Necessity for Human-Based Cybersecurity in Higher Education"

  • news

    Visible to the public "State-Sponsored Actors Leading Cause of Cyber Concern in Public Sector"

    Foreign state actors are now regarded as the greatest threat to digital networks in the US. A recent survey of public sector organizations on the current cybersecurity landscape reveals that 60 percent of respondents are concerned about attacks from foreign actors. The report, commissioned by the software company SolarWinds, which suffered a significant cyberattack in 2020 that resulted in data breaches at multiple government agencies, analyzed survey responses from 400 public sector Information Technology (IT) leaders from federal, state, and local governments. State-sponsored cyberattacks have been a concern for years, but the report's finding of a significant increase demonstrates that government organizations, notably among federal respondents, view it as a leading threat. Fifty-eight percent of respondents cited careless or untrained insiders as the second-greatest threat to their digital networks, while 52 percent cited the general hacking community as the third-greatest concern. Ransomware, trojans, and spam ranked first, second, and third, respectively, among the different types of cyber threats. The complexity of IT, closely followed by budgetary constraints, was cited as the leading obstacle to network security. This article continues to discuss key findings from the new report surveying public sector organizations on the current cybersecurity landscape.

    NextGov reports "State-Sponsored Actors Leading Cause of Cyber Concern in Public Sector"

  • news

    Visible to the public "NIST Revises SP 800-171 Guidelines for Protecting Sensitive Information"

    The National Institute of Standards and Technology (NIST) has updated its draft guidelines for protecting sensitive unclassified information to help federal agencies and government contractors implement cybersecurity requirements more consistently. "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations" (NIST Special Publication [SP] 800-171 Revision 3) will be of particular interest to businesses with federal contracts. The SP 800-171 security requirements are referenced in federal rules governing the protection of Controlled Unclassified Information (CUI), which includes sensitive data such as health information, critical energy infrastructure information, and intellectual property. Systems that store CUI typically support government programs containing critical assets. The changes are intended to help organizations understand how to implement the specific cybersecurity safeguards outlined in a closely related NIST publication, SP 800-53 Rev. 5. The authors have aligned the terminology of the two documents so that organizations can more easily use SP 800-53's catalog of technical tools, or "controls," to achieve SP 800-171's cybersecurity outcomes. According to Ron Ross of NIST, the update is intended to help maintain consistent defenses against high-level information security threats. This article continues to discuss NIST's update of its draft guidelines for protecting sensitive unclassified information.

    NIST reports "NIST Revises SP 800-171 Guidelines for Protecting Sensitive Information"

  • news

    Visible to the public "CISA Releases White Paper Highlighting R&D Needs and Strategic Actions for Enhancing the Resilience of Critical Infrastructure"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has announced the release of the white paper titled "Research, Development, and Innovation for Enhancing Resilience of Cyber-physical Critical Infrastructure: Needs and Strategic Actions," which was developed by the Resilient Investment Planning and Development Working Group (RIPDWG). As stated in the paper, federal research is often sector-specific or interdisciplinary fragmented, making it difficult to effectively mitigate cross-cutting and systemic infrastructure risks. The paper aims to help the federal research enterprise capitalize on the opportunity to make congressionally-funded research more relevant, equitable, accessible, and useful to decision-makers who must address critical infrastructure challenges at the local and regional levels. The paper identifies three significant gaps that call for a more unified, empirical, and user-centered approach to federal Research, Development, and Innovation (RD&I). First, critical services that depend on cyber-physical infrastructure systems require an integrated analysis of the consequences and risk reduction decision factors. There needs to be an understanding of the societal dimensions of enhancing the resilience of cyber-physical infrastructure systems as well as user-engagement in cyber-physical infrastructure research to translate resilience knowledge into effective action. In order to fill the identified RD&I gaps, the paper proposes a dozen strategic actions for implementation by research partners across the federal interagency in collaboration with stakeholders. This article continues to discuss CISA's release of a white paper that highlights RD&I needs and strategic actions for making critical infrastructure more resilient.

    CISA reports "CISA Releases White Paper Highlighting R&D Needs and Strategic Actions for Enhancing the Resilience of Critical Infrastructure"

  • news

    Visible to the public "US Agencies and Allies Partner to Identify Russian Snake Malware Infrastructure Worldwide"

    In over 50 countries, the National Security Agency (NSA) and several partner agencies have identified infrastructure for the sophisticated Russian cyber espionage tool known as Snake malware. The agencies are publishing the joint Cybersecurity Advisory (CSA) "Hunting Russian Intelligence 'Snake' Malware" in order to help network defenders in detecting Snake and any associated activity. The agencies link Snake operations to a known unit within Russia's Federal Security Service (FSB) Center 16. Snake malware infrastructure has been discovered in North America, South America, Europe, Africa, Asia, and Australia, including the US and Russia. Rob Joyce, the NSA's Director of Cybersecurity, stated that Russian government actors have used this intelligence-gathering tool for years. The technical details will help many organizations in locating and eliminating malware worldwide. In the US, the FSB has targeted education institutions, small companies, and media organizations. The Snake malware is typically deployed on external-facing infrastructure nodes on a network. From there, it applies more techniques, tactics, and procedures (TTPs) to conduct additional exploitation operations on the internal network. This article continues to discuss the release of the CSA on the Snake malware.

    NSA reports "US Agencies and Allies Partner to Identify Russian Snake Malware Infrastructure Worldwide"

  • news

    Visible to the public "Mass Event Will Let Hackers Test Limits of AI Technology"

    As soon as ChatGPT was released, hackers began "jailbreaking" the Artificial Intelligence (AI) chatbot in an attempt to circumvent its safeguards so that it presents something irrational or offensive. Its creator, OpenAI, and other major AI providers, including Google and Microsoft, are collaborating with the Biden administration to allow thousands of hackers to test the limits of their technology. They are looking into how chatbots can be manipulated to cause harm, whether they share private information provided by users, and more. Anyone who has interacted with ChatGPT, Microsoft's Bing chatbot, or Google's Bard will soon discover that they have a propensity to fabricate information and confidently present it as fact. These systems, which are based on what are known as Large Language Models (LLMs), also imitate the cultural biases they have learned by being trained on vast troves of online text. US government officials were drawn to the concept of mass hacking in March at the South by Southwest festival in Austin, Texas, where Sven Cattell, founder of DEF CON's long-running AI Village, and Austin Carson, president of the responsible AI nonprofit SeedAI, led a workshop inviting community college students to hack an AI model. This article continues to discuss hackers testing the limits of AI technology.

    AP reports "Mass Event Will Let Hackers Test Limits of AI Technology"

  • news

    Visible to the public "CryptNet: Russian Ransom Gang Makes Its Debut"

    Cybersecurity researchers at ZeroFox have discovered a new ransomware gang on the dark web called CryptNet. They made the discovery on the dark web forum RAMP, where a threat actor advertised the new Ransomware-as-a-Service (RaaS) group. ZeroFox noted that CryptNet is advertised as quick and undetectable with various capabilities and features, including deleting shadow copies and disabling backup services. The group also offers offline encryption and a negotiation chat panel. ZeroFox suspects that CryptNet has already racked up some ransomware victims, with two victims having been identified at the end of April. CryptNet offers a 90 percent cut to anyone using its newly developed illegal software in a successful attack. This is one of the highest percentages seen on the RaaS market, with most affiliates receiving between 60 and 80 percent, according to ZeroFox, which added that CryptNet claimed it would also provide support during ransom negotiations. This article continues to discuss the new ransomware gang CryptNet.

    Cybernews reports "CryptNet: Russian Ransom Gang Makes Its Debut"

  • news

    Visible to the public "Department of Health Notification Regarding Decedent Information"

    The New Mexico Department of Health (DOH) recently started notifying the public, out of an abundance of caution, about an incident that could have compromised some information regarding decedent health information. On March 6, 2023, DOH discovered a spreadsheet containing information about individual deaths in New Mexico had been sent to a journalist requesting such information subject to the Inspection of Public Records Act. The spreadsheet contained some protected health information about every death in New Mexico from January 2020 through December 2021. The DOH noted that the information released did not include the names, birthdates, addresses, or contact information of anyone. As a result of this incident, DOH urges individuals to be alert for any financial or other activity done in the name of a recently deceased person in their family. The DOH noted that they are working to enhance policies and practices to elevate the protection of patient information in the future.

    New Mexico Department of Health reports: "Department of Health Notification Regarding Decedent Information"

  • news

    Visible to the public "Evil Digital Twins and Other Risks: The Use of Twins Opens up a Host of New Security Concerns"

    Digital twins, which are virtual representations of actual real-world objects, are becoming increasingly popular. Providing real-time models of physical assets, people, or biological systems that can help identify problems as they occur or in advance is just one of their many applications. However, experts warn that cybersecurity exposure increases as organizations expand their use of digital twins and others create new ones. Digital twins are vulnerable because they rely on data to accurately represent whatever they model. There are concerns that the data may be corrupted or stolen and used for malicious purposes rather than their intended function. According to technology experts and security leaders, digital twins are exposed to the same threats as conventional Information Technology (IT) and Operational Technology (OT) environments. Some emphasize that digital twins could create not only new entry points for these types of attacks but also present opportunities for new attack types, including what one security expert termed the "evil digital twin." This article continues to discuss concerns regarding the vulnerability of digital twins to threats.

    CSO Online reports "Evil Digital Twins and Other Risks: The Use of Twins Opens up a Host of New Security Concerns"

  • news

    Visible to the public "Ransomware Group Tries and Fails to Extort Security Vendor Dragos"

    A cybercrime group that managed to compromise the cloud-based resources of a cybersecurity vendor tried to extort the company by threatening family members, the company has revealed. Dragos said it was hit on May 8 after threat actors compromised the email account of a new sales employee prior to their start date. The company noted that the cybercrime group used the employee's personal information to impersonate them and complete some basic onboarding. This got them as far as access to the company SharePoint account and contract management system, but no further. However, after failing to deploy a ransomware payload or steal more sensitive information, the group apparently resorted to trying to extort Dragos executives to avoid public disclosure. The company stated that although no Dragos contact responded, the group repeatedly tried to up the pressure, contacting multiple publicly known Dragos employees and trying to use knowledge of family members to force a response. The cybercriminals' texts demonstrated research into family details as they knew the names of family members of Dragos executives. However, they referenced fictitious email addresses for these family members. The company noted that during this time, the cybercriminals also contacted senior Dragos employees via personal email. Dragos stated that once the hackers were identified via the vendor's security information and event management (SIEM) tool, it blocked the compromised account and activated third-party incident response and MDR. Security controls prevented any malicious actor lateral movement, privilege escalation, persistent access, or changes to the firm's infrastructure, Dragos said.

    Infosecurity reports: "Ransomware Group Tries and Fails to Extort Security Vendor Dragos"

  • news

    Visible to the public "Details Disclosed for Exploit Chain That Allows Hacking of Netgear Routers"

    Industrial and IoT cybersecurity firm Claroty recently disclosed the details of five vulnerabilities that can be chained in an exploit, potentially allowing threat actors to hack certain Netgear routers. The vulnerabilities were first presented at the 2022 Pwn2Own Toronto hacking competition, where white hat hackers earned a total of nearly $1 million for exploits targeting smartphones, printers, NAS devices, smart speakers, and routers. Claroty's router exploit, which targeted Netgear's Nighthawk RAX30 SOHO router, earned the company's researchers $2,500 at Pwn2Own. Claroty noted that the flaws used in the exploit chain are tracked as CVE-2023-27357, CVE-2023-27367, CVE-2023-27368, CVE-2023-27369, and CVE-2023-27370. They were all patched by Netgear with the release of firmware version 1.0.10.94 in early April. Claroty stated that three of the vulnerabilities have been rated "high severity," and their exploitation can lead to remote code execution, authentication bypass, and command injection. Chaining all the flaws can have a significant impact. Claroty noted that successful exploits could allow attackers to monitor users' internet activity, hijack internet connections and redirect traffic to malicious websites, or inject malware into network traffic. An attacker could also use these vulnerabilities to access and control networked smart devices (security cameras, thermostats, smart locks), change router settings, including credentials or DNS settings, or use a compromised network to launch attacks against other devices or networks. Claroty stated that one mitigating factor is that executing the exploit requires access to the LAN it's not a WAN attack that can be executed from the internet, which is why it earned a smaller reward at Pwn2Own. Netgear explained in an advisory that these vulnerabilities require an attacker to have your WiFi password or an Ethernet connection to your network to be exploited.

    SecurityWeek reports: "Details Disclosed for Exploit Chain That Allows Hacking of Netgear Routers"

  • news

    Visible to the public "Bad Bots Now Account For 30% of All Internet Traffic"

    Security researchers at Imperva have discovered that the volume of internet traffic stemming from malicious automated software has increased by 2.5% since 2021 to over 30%, the highest figure since Imperva's first Bad Bot Report in 2013. The researchers noted that billions of dollars are lost annually due to bad bot attacks, which can lead to account compromise, data theft, spam, higher infrastructure and support costs, customer churn, and degraded online services. The researchers warned that such traffic is increasingly hard to identify, with "advanced" bad bots now accounting for 51% of all malicious traffic versus 26% two years ago. The researchers noted that more sophisticated software looks to mimic human behavior to evade detection, such as by cycling through random IPs, entering through anonymous proxies, and changing identities. The researchers stated that account takeover (ATO) attacks are among the most common traced back to malicious bots, growing 155% in volume in 2022 as cybercriminals looked to drive credential stuffing and brute force attacks. Some 15% of all login attempts last year were classified as ATO. APIs were also a popular target for bad bots last year, and 17% of all attacks on APIs came from malicious software exploiting flaws in the design and implementation of an API or application to steal sensitive data or access accounts. The researchers noted that more than half of the countries analyzed for the Imperva report had bad bot levels exceeding the global average, with Germany (69%), Ireland (45%), and Singapore (43%) in the top three. In the US, the share was just above the average, at 32%. Travel (25%), retail (21%), and financial services (13%) experienced the highest volume of bad bot attacks, although the gaming (59%) and telecoms (48%) sectors had the highest share of bad bot traffic on their websites and applications.

    Infosecurity reports: "Bad Bots Now Account For 30% of All Internet Traffic"

  • news

    Visible to the public "Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems"

    Threat actors are taking advantage of the leak of Babuk, also known as Babak or Babyk, ransomware code in September 2021 to build different ransomware families that can target VMware ESXi systems. Alex Delamotte, a security researcher at SentinelOne, noted that the emergence of these variants in the second quarter of 2022 and the first quarter of 2023 shows a growing trend of Babuk source code adoption. Leaked source code allows malicious actors to target Linux systems when they may otherwise lack the expertise to develop a working program. As a result, several large and small cybercrime groups have set their sights on ESXi hypervisors. At least three different ransomware strains, including Cylance, Rorschach, and RTM Locker, that have emerged since the start of the year are based on the leaked Babuk source code. The most recent analysis by SentinelOne indicates that this phenomenon is becoming more prevalent, with the cybersecurity company identifying source code overlaps between Babuk and ESXi lockers attributed to Conti and REvil. Other ransomware families that have adopted features from Babuk include LOCK4, DATAF, Mario, and Play ransomware. This article continues to discuss the leaked Babuk ransomware code sparking different ransomware strains that target VMware ESXi systems.

    THN reports "Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems"

  • news

    Visible to the public "RapperBot DDoS Malware Adds Cryptojacking as New Revenue Stream"

    New samples of the RapperBot botnet malware now include cryptojacking capabilities for cryptocurrency mining on compromised Intel x64 machines. Developers added the cryptomining component separately from the botnet malware at first. At the end of January, the botnet and cryptocurrency mining capabilities were merged. Since June 2022, researchers at Fortinet's FortiGuard Labs have been monitoring RapperBot activity and have reported that the Mirai-based botnet focused on brute-forcing Linux SSH servers to recruit them for launching Distributed Denial-of-Service (DDoS) attacks. In November, the researchers discovered an updated version of RapperBot that used a Telnet self-propagation mechanism and contained Denial-of-Service (DoS) commands for attacks against gaming servers. FortiGuard Labs recently reported an updated RapperBot variant that uses the XMRig Monero miner on Intel x64 architectures. According to the cybersecurity company, this campaign has been active since January and primarily targets Internet of Things (IoT) devices. This article continues to discuss the new RapperBot mining campaign.

    Bleeping Computer reports "RapperBot DDoS Malware Adds Cryptojacking as New Revenue Stream"

  • news

    Visible to the public "Automotive Industry Employees Unaware of Data Security Risks"

    According to Salesforce, 30 percent of automotive employees do not check security protocols before attempting to use a new tool, thus putting their company and customer data at risk. As companies store and use exponentially more data to power connected car features, concerns regarding cybersecurity grows in the automotive industry. According to Upstream, the number of automotive Application Programming Interface (API) attacks increased by 380 percent last year alone. In addition, 34 percent of automotive employees who participated in Salesforce's survey reported that their company now faces more security threats than it did two years ago. Salesforce's research explores the impacts of gaps between company security efforts and employee actions, revealing the need for automotive organizations to equip employees with trusted, simple-to-use technologies. This article continues to discuss automotive industry employees being unaware of data security risks, the rise in automotive API attacks, automotive employees taking risks with personal devices at work, and data security in the automotive industry.

    Help Net Security reports "Automotive Industry Employees Unaware of Data Security Risks"

  • news

    Visible to the public "Free Tool Unlocks Some Encrypted Data in Ransomware Attacks"

    Researchers at Cyberark have released a free tool on GitHub that can help victims of intermittent encryption attacks recover data from some types of partially encrypted files, without having to pay a ransom for the decryption key. Intermittent encryption is where a ransomware operator only partially encrypts targeted files, instead of the entire file, to speed up encryption, impact more files, and make detection harder. In recent months, several ransomware groups, including BlackCat and Play, have used the approach in attacks on many organizations, which included hospitals, banks, and universities. According to Cyberark, for such victims, data in some types of partially encrypted files can be decrypted given the right circumstances because many file formats, including PDF and formats that Microsoft Office adhere to, contain certain common parameters, which, even if encrypted, can be reconstructed relatively easily to make data recovery possible. Cyberark created a tool called "White Phoenix" that automates recovering data from intermittently encrypted documents in various file formats. This article continues to discuss the White Phoenix automated tool for recovering data on partially encrypted files hit with ransomware.

    Dark Reading reports "Free Tool Unlocks Some Encrypted Data in Ransomware Attacks"

  • news

    Visible to the public "Wendy’s to Test AI Chatbot at Ohio Drive-Thru"

    Wendy's is teaming up with Google to add artificial intelligence to its menu. Wendy's plans to launch an AI chatbot to automate its restaurants' drive-thrus. Dubbed FreshAI, the AI tech will hold limited conversations with customers, handling their food orders and answering frequently asked questions. The bot will integrate with the store's hardware and cash register systems for processing orders. The burger chain, founded in Columbus in 1969, is using Google to power FreshAI with its existing cloud-based generative AI and large language models. The language models include the restaurant's menu as data and will allow the drive-thru chatbot to understand complex, customized, or indirect orders, as well as discern between a customer's voice and background noise. Wendy's will test FreshAI at one of its corporate-owned Columbus storefronts in June, though it did not specify which one. It also did not mention if the chatbot would ultimately result in fewer workers at restaurant locations. Google had first partnered with Wendy's in 2021 when the two companies announced they would work together to improve customer experiences with analytics and machine learning.

    The Hill reports: "Wendy's to Test AI Chatbot at Ohio Drive-Thru"

  • news

    Visible to the public "Twitter Celebrity Hacker Pleads Guilty in US"

    A British man recently pleaded guilty for his role in schemes to hack the Twitter accounts of celebrities like Barack Obama and Elon Musk and stealing $794,000 in cryptocurrency. Joseph James O'Connor, 23, entered his guilty plea in a New York court after being extradited from Spain on April 26. He was arrested nearly two years ago in Spain for the July 2020 hack of over 130 Twitter accounts, including those of Apple, Uber, Kanye West, Bill Gates, Joe Biden, Obama, and Musk. He and others in his hacking group hijacked the accounts and asked the owners' followers to send them Bitcoin, promising to double their money. In 2019 the group also used a technique known as sim card swaps to break their way into social media accounts of two media stars, not named in court filings but named in press reports as TikTok star Addison Rae and actress Bella Thorne. The group threatened to release their private images and other information. The group also used the same technique to steal $794,000 of virtual currency from a New York cryptocurrency company. O'Connor, who went by the online name of PlugwalkJoe, pleaded guilty to multiple counts of computer intrusion, extortion, stalking, wire fraud, and money laundering. The most serious of the charges brings up to 20 years in prison.

    SecurityWeek reports: "Twitter Celebrity Hacker Pleads Guilty in US"

  • news

    Visible to the public "Capita Says Ransomware Attack Will Cost It Up to $25 Million"

    UK-based business process outsourcing and professional services company Capita recently announced that it expects to incur costs ranging between roughly $19 million and $25 million due to a recent cybersecurity incident, but it has not clarified whether that includes a ransom payment to the hackers. The breach came to light on March 31, when Capita said it was experiencing a major IT incident that had been causing disruptions, but it took until April 3 for the company to confirm that the cause was a cyberattack. Capita initially said there was no evidence of customer or other information getting compromised but confirmed that files were stolen from its systems on April 20, days after a ransomware group named Black Basta started leaking information allegedly stolen from the company. The leaked files stored personal and financial information. In its latest update on the cybersecurity incident, the company said it determined that data was stolen from less than 0.1% of its server estate, it previously said that 4% of its servers were impacted. Capita is one of the largest business outsourcing providers in the UK, and its services are used by the government.

    SecurityWeek reports: "Capita Says Ransomware Attack Will Cost It Up to $25 Million"

  • news

    Visible to the public "Spanish Police Arrest 40 in Phishing Gang Bust"

    Spanish police have recently arrested dozens of individuals on suspicion of their involvement in a serious organized crime gang said to have made over $767,000 from phishing victims. Among the 40 apprehended by law enforcers were two hackers and 15 suspected members of the "Trinitarios" group, who were charged with belonging to a criminal organization, bank fraud, document forgery, identity theft, and money laundering. The group was allegedly funded mainly through phishing and bank fraud, used to buy drugs and weapons, pay lawyers' fees for members in prison, and sent directly to members behind bars. Spanish police stated that the alleged hackers would send SMS phishing messages to victims purporting to come from their bank, alleging a security issue that required them to click on a malicious link. Following the link took the victim to a spoofed banking log-in page where they entered their logins. The hackers monitored these actions in real-time via phishing panels and immediately used the logins to access the real accounts, requesting loans and linking the cards to virtual wallets on their phones. The police noted that the cybercriminals would then purchase cryptocurrency with these card details, which was apparently exchanged with fiat currency and put into a "common box" for later use. The group also monetized the hijacked bank details by directing an extensive money mule network to "cash out" at ATMs or receive funds via bank transfer and additionally made false purchases through fictitious online cosmetics companies via point-of-sale (POS) terminals. The police stated that some of the funds were sent abroad and were even used to purchase real estate in the Dominican Republic. During the operation, 13 house searches were conducted in Madrid, Seville, and Guadalajara, where a list of 300,000 phishing victims was discovered, along with 5000 Euros in cash, computer equipment, and devices for picking locks.


    Infosecurity reports: "Spanish Police Arrest 40 in Phishing Gang Bust"

  • news

    Visible to the public "Ransomware Encryption Rates Reach New Heights"

    According to security researchers at Sophos, the share of ransomware victims whose data was encrypted by their extorters grew to 76% over the past year. In a new study, the researchers conducted interviews with 3000 cybersecurity/IT leaders carried out in the first quarter of 2023. Responding organizations were located in 14 countries and had between 100 and 5000 employees, with revenue ranging from less than $10m to more than $5bn. The researchers noted that the encryption rate in 2022 is the highest since tracking began in 2020 when it was 73%. The researchers claimed this is evidence of an "ever-increasing skill level of adversaries who continue to innovate and refine their approaches." The researchers noted that only the IT, technology, and telecoms sector managed to buck the trend, with an encryption rate of just 47%. In just under a third (30%) of cases where data was encrypted, it was also stolen in double extortion attacks. However, only in 3% of cases were victims held to ransom without data being encrypted. The researchers stated that interestingly, those who choose to pay their extorters double recovery costs: from an average of $375,000 for those who use backups to $750,000. They also run the risk of extending recovery times: 45% of organizations using backups recovered within a week versus 39% of those that paid the ransom. Around half (46%) of victims that had data encrypted elected to pay a ransom, rising to over half for higher-wealth businesses more likely to have standalone cyber-insurance policies.

    Infosecurity reports: "Ransomware Encryption Rates Reach New Heights"

  • news

    Visible to the public "IBM Unveils End-To-End, Quantum-Safe Tools to Secure Business, Government Data"

    IBM has introduced a new set of quantum-safe, end-to-end security tools and capabilities designed to protect organizations and government agencies as we enter the post-quantum computing era. Quantum-Safe technology, as announced at the company's annual Think conference in Orlando, Florida, integrates cryptography and critical infrastructure expertise to address the potential future security risks posed by quantum computing. IBM also introduced the Quantum-Safe Roadmap to help industries transition to post-quantum cryptography. Experts and scientists predict that quantum computers will one day be able to break commonly used encryption methods, exposing email, secure banking, cryptocurrencies, and communications systems to significant cybersecurity threats. Organizations, technology providers, and Internet standards will be required to adopt quantum-safe encryption. The National Institute of Standards and Technology (NIST) has launched a competition to identify and standardize quantum-safe encryption algorithms. NATO has already begun testing quantum-safe solutions to investigate the feasibility and practicality of such technology for real-world applications. In addition, the National Security Agency (NSA) announced new requirements for national security systems to transition to quantum-safe algorithms by 2025, and the White House issued requirements for federal agencies to submit a cryptographic inventory of systems that may be vulnerable to attacks from cryptographically-relevant quantum computers. This article continues to discuss IBM's new set of tools and capabilities designed as an end-to-end, quantum-safe solution as well as the roadmap.

    CSO Online reports "IBM Unveils End-To-End, Quantum-Safe Tools to Secure Business, Government Data"

  • news

    Visible to the public "New 'Greatness' Service Simplifies Microsoft 365 Phishing Attacks"

    The Phishing-as-a-Service (PhaaS) platform called 'Greatness' has increased activity as it targets organizations using Microsoft 365 in the US, Canada, the UK, Australia, and South Africa. Many organizations use the Microsoft 365 cloud-based productivity platform, making it an attractive target for cybercriminals seeking to steal data or credentials for use in network breaches. In a new report by Cisco Talos, researchers detail how the Greatness phishing platform launched in the middle of 2022, with activity spiking in December 2022 and March 2023. Many victims work in manufacturing, healthcare, technology, education, real estate, construction, finance, and business services, with most being located in the US. The Greatness PhaaS includes everything a phisher requires to conduct a successful campaign. To initiate an attack, the user accesses the 'Greatness' administration panel with their Application Programming Interface (API) key and a list of target email addresses. The PhaaS platform provides the server that will host the phishing page and the HTML attachment generator. The affiliate then creates the email's content and provides any additional content or adjustments to the default settings. The service then sends the victims a phishing email with an HTML attachment. When this attachment is opened, the browser executes obfuscated JavaScript code to connect to the Greatness server and retrieve the malicious page to display to the user. The phishing service will inject the target's company logo and background image from the employer's Microsoft 365 login page. This article continues to discuss findings and observations regarding the Greatness PhaaS.

    Bleeping Computer reports "New 'Greatness' Service Simplifies Microsoft 365 Phishing Attacks"

  • news

    Visible to the public "Never Leak Secrets to Your GitHub Repositories Again"

    Push protection, a security feature designed to automatically prevent the leakage of secrets to repositories, is now free for all public repository owners on GitHub. Previously, only private repositories with a GitHub Advanced Security license had access to this feature. This expanded availability is intended to help open-source developers and maintainers in proactively securing their code. Credential leakage is one of the most prevalent causes of data breaches in today's digital landscape, fueled in part by the common developer practice of embedding sensitive information, such as passwords, encryption keys, and Application Programming Interface (API) keys, directly within the source code. Whether this occurs due to oversight, negligence, or a lack of cognizance of security best practices, the outcome is the same as threat actors can discover and exploit the secrets. Push protection prevents the leakage of secrets by scanning code commits before they are pushed. In their Integrated Development Environment (IDE) or Command Line Interface (CLI), developers are notified immediately. This article continues to discuss the prevention of leaking secrets with GitHub push protection.

    Help Net Security reports "Never Leak Secrets to Your GitHub Repositories Again"

  • news

    Visible to the public "Operation ChattyGoblin: Hackers Targeting Gambling Firms via Chat Apps"

    In a campaign that has been ongoing since October 2021, a China-aligned threat actor has targeted a gambling company in the Philippines. The cybersecurity company ESET is tracking the attacks against Southeast Asian gambling companies under the name Operation ChattyGoblin. According to ESET, these attacks target the support agents of victim companies via chat applications, specifically the Comm100 and LiveHelp100 apps. CrowdStrike first documented the use of a Trojanized Comm100 installer to deliver malware in October 2022. The company attributed the supply chain compromise to a potentially China-linked threat actor. The attack chains use the chat applications to deliver a C# dropper, which in turn deploys a second C# executable that ultimately serves as a conduit to drop a Cobalt Strike beacon on compromised workstations. Also highlighted in ESET's APT Activity Report Q4 2022-Q1 2023 are attacks against South Asian government institutions by threat actors Donot Team and SideWinder with ties to India. This article continues to discuss researchers' findings regarding Operation ChattyGoblin.

    THN reports "Operation ChattyGoblin: Hackers Targeting Gambling Firms via Chat Apps"

  • news

    Visible to the public "Npm Packages Vulnerable to Old-School Weapon: the 'Shift' Key"

    Since 2017, hackers have been able to imitate legitimate Node Package Manager (npm) packages by removing the capital letters from their titles. According to Checkmarx, npm did not address this type of typosquatting for years, which could have resulted in enterprises downloading malware inadvertently. The registry recently patched the vulnerability, but organizations should be aware of any malicious packages they may have downloaded prior to the update. Cybercriminals engage in typosquatting when they intentionally but subtly misspell names in copying legitimate Web domains. For example, a hacker might use an uppercase "I" instead of a lowercase "l" in the word "Google," or substitute zeros for the two "o"s. To combat typosquatting in its registry, npm announced a change to its naming system on December 26, 2017. After then, package names could only contain lowercase letters. However, all the thousands of existing packages with capital letters in their titles remained, and no mechanism was implemented to prevent new packages from duplicating them in all but capitalization. This article continues to discuss the typosquatting techniques hackers have used to trick enterprises into downloading malware.

    Dark Reading reports "Npm Packages Vulnerable to Old-School Weapon: the 'Shift' Key"

  • news

    Visible to the public "Cybersecurity Goes Undercover to Protect Electric Grid Data"

    Based on one of the mysteries of human perception known as synesthesia, a researcher at the Oak Ridge National Laboratory (ORNL) developed a new method to hide sensitive electric grid information from malicious actors in a cyberattack. This method involves a palette of colors that is constantly changing. The Grid Communications and Security group leader at ORNL, Peter Fuhr, was intrigued by synesthesia, a condition that causes some people to experience one sense through another, such as perceiving sounds as colors. Fuhr used this idea to encrypt the "language" of grid management software into colors. Utilities use a computer system to gather and analyze real-time data to monitor and control equipment. This system communicates with hardware using strings of letters, which can be translated into color combinations represented as bars, wheels, or swirls. The color patterns are then faded under another image, such as a colorful pointillist painting, or hidden between video feed frames. With each sensor reading, the decoding key rotates. According to Fuhr, this innovative approach has already gained attention from private companies interested in licensing. Using a secure link between ORNL and the public utility EPB of Chattanooga, the concept was tested for six months. The encoded colors are transferred via communication links among video cameras at EPB's electrical substations. This article continues to discuss the new synesthesia-inspired way to hide sensitive electric grid information from cyberattacks.

    Oak Ridge National Laboratory reports "Cybersecurity Goes Undercover to Protect Electric Grid Data"

  • news

    Visible to the public "Research Shows Mobile Phone Users Do Not Understand What Data They Might Be Sharing"

    New research from the School of Management at the University of Bath reveals that privacy and security features designed to give consumers greater control over the sharing of their data by smartphone apps are widely misunderstood. For example, 43 percent of participants in the study were unclear or confused about the meaning of app tracking. People often misunderstand the purpose of tracking, believing that it is integral to the app's functionality or will enhance the user experience. Companies use app tracking to deliver targeted advertisements to smartphone users. When iPhone users open an app, a pop-up asks their permission to allow the app company to track their activity across other apps, as introduced by Apple's App Tracking Transparency framework in April 2021. Android users access tracking consent through their phone's settings. If people opt out of tracking, the company cannot track their use of apps and websites on their device, nor can the data be used for targeted advertising or shared with data brokers. The most prevalent misunderstanding was that tracking refers to sharing the device's physical location instead of tracking the use of apps and websites. People believed they had to consent to tracking for food delivery and collection services because they thought their location was essential to the app's functionality. While slightly more than half of participants (51 percent) expressed concerns about privacy or security, including the security of their data after it had been collected, the analysis revealed no association between their concern for privacy in their daily lives and a lower rate of tracking acceptance. This article continues to discuss the study on user motivations behind app tracking transparency decisions.

    The University of Bath reports "Research Shows Mobile Phone Users Do Not Understand What Data They Might Be Sharing"

  • news

    Visible to the public "Microsoft Authenticator Mandates Number Matching to Counter MFA Fatigue Attacks"

    In order to make multi-factor authentication (MFA) less susceptible to social engineering attacks, Microsoft Authenticator will now require number matching for all push notifications. The use of MFA fatigue attacks by cybercriminals has proven effective. These attacks involve sending a barrage of MFA push notification requests to employees, usually at unsociable hours, to manipulate them into authenticating a login attempt to clear the notifications. To authorize the login attempt, number matching requires opening a push notification, launching Microsoft Authenticator, and entering a series of numbers that appear in the app. This technique has existed for years and combines MFA and two-factor authentication (2FA). These numbers typically reset after a predetermined amount of time, such as 30 seconds, and add an extra layer of interaction to reduce the risk of successful social engineering attacks. In a typical attack scenario, the recipients of the constant notifications are often asleep and awakened by loud smartphone alerts. The attack is successful if the individual hurries to approve the login attempts. Adding this layer makes the process more manual, giving the recipient more time to recognize that a malicious actor is triggering the event. This article continues to discuss the Microsoft Authenticator adding another layer of complexity to prevent social engineering attacks.

    ITPro reports "Microsoft Authenticator Mandates Number Matching to Counter MFA Fatigue Attacks"

  • news

    Visible to the public "Data Breaches and Exfiltrated Data From Fortune 1000 Companies Rise by 7%"

    According to a new report from the cybercrime analytics company SpyCloud, the amount of data breaches and exfiltrated data from Fortune 1000 companies on the dark web has increased by 7 percent year-over-year. As a result, organizations are at more risk of account takeover, session hijacking, fraud, and ransomware. The 2023 Fortune 1000 Identity Exposure Report examined the dark web exposure of Fortune 1000 employees in 21 industries, including technology, financial services, retail, and media. Researchers at SpyCloud found 27.48 million pairs of credentials containing the email addresses of Fortune 1000 companies and plaintext passwords, with over 223,000 exfiltrated by malware. The discovered passwords facilitated access to over 56,000 cloud-based applications, including leading enterprise email, single sign-on, payroll management, hosting, and collaboration tools. Researchers also found that 62 percent of Fortune 1000 employees who have been exposed multiple times reuse their passwords. In addition, 1.87 billion malware cookie records associated with Fortune 1000 employees were found, most of which are believed to have been exfiltrated by malware. This article continues to discuss key findings from the 2023 Fortune 1000 Identity Exposure Report.

    SiliconANGLE reports "Data Breaches and Exfiltrated Data From Fortune 1000 Companies Rise by 7%"

  • news

    Visible to the public "Business Leaders Don't Understand Cybersecurity"

    Delinea's new survey of over 2,000 Information Technology (IT) security decision-makers reveals that only 39 percent of respondents believe their company's leadership has a solid grasp of cybersecurity's role as a business enabler. In addition, more than one-third of respondents (36 percent) believe that cybersecurity is viewed as important only in regard to compliance and regulatory requirements, while 17 percent say it is not a business priority. This misalignment between business and security goals appears to have resulted in at least one negative consequence for 89 percent of respondents' organizations, with more than a quarter (26 percent) reporting an increase in the number of successful cyberattacks against their organization. Misaligned cybersecurity objectives have caused delays in investments (35 percent), delays in strategic decision-making (34 percent), and unnecessary increases in spending (27 percent). There are also consequences for individuals, with 31 percent of respondents reporting a stress-related impact on security teams. This article continues to discuss key findings from the survey of IT security decision-makers.

    BetaNews reports "Business Leaders Don't Understand Cybersecurity"

  • news

    Visible to the public "Adobe Patches 14 Vulnerabilities in Substance 3D Painter"

    Adobe recently announced security updates for its Substance 3D Painter product to address more than a dozen vulnerabilities. This is the only product for which the software giant released updates this Patch Tuesday. Adobe stated that the 3D painting software, specifically version 8.3.0 and earlier, is impacted by 14 vulnerabilities. A vast majority are high-severity ("critical" based on Adobe's severity ratings) memory-related vulnerabilities that can be exploited for arbitrary code execution in the context of the targeted user. Some of the less severe issues can result in memory leaks. Adobe noted that there is no indication that these flaws have been exploited in the wild. All of the vulnerabilities were reported to Adobe by researcher Mat Powell through Trend Micro's Zero Day Initiative (ZDI). Adobe is running a private, invite-only bug bounty program on HackerOne, but researchers interested in helping the company find vulnerabilities in its products can contact Adobe's security team and provide their HackerOne handle.

    SecurityWeek reports: "Adobe Patches 14 Vulnerabilities in Substance 3D Painter"

  • news

    Visible to the public "CISA, FBI Need Data from Cybercrime Victims to Support Policy"

    Federal entities at the forefront of policing cybercrime and ransomware in the US urge organizations to continue reporting cyber incidents to help fill data gaps. Recent executive actions call for a stricter approach to penalizing ransomware incidents. Leaders from the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and FBI spoke at a recent George Washington University Business and Policy Forum about ongoing government initiatives to continue countering and preventing zero-day cyber incidents. CISA's CSO Valerie M. Cofield and the FBI's Cyber Division Section Chief David Ring discussed a data gap in the larger picture of the current cyber threat landscape and how sharing incident information contributes to the national security goal of strengthening digital networks. Ring reiterated that victim reporting is crucial and that federal agencies overseeing cybercrime in the US still have much work to do to close the gap regarding what is reported, what is actually seen, and what is occurring in the wild. The Cyber Incident Reporting for Critical Infrastructure Act, which became law in 2022, offers promise for CISA and the FBI's efforts. This legislation requires public and private sector entities to report any cyber incident. Cofield commented that while this is a step in the right direction, collecting the necessary data may take several years following the bill's passage. This article continues to discuss the importance of collaboration and data sharing to protect US digital networks.

    NextGov reports "CISA, FBI Need Data from Cybercrime Victims to Support Policy"

  • news

    Visible to the public "$1.1M Paid to Resolve Ransomware Attack on California County"

    Southern California News Group reported that a $1.1 million payment was made to resolve a ransomware attack on a California county's law enforcement computer network. The San Bernardino County Sheriff's Department announced in April that a "network disruption" was being investigated by information technology staff and forensic specialists and that the FBI and Department of Homeland Security were notified. County spokesperson David Wert said the county paid $511,852, and the remainder was covered by insurance. Wert said that the decision to render payment was the subject of careful consideration. Sheriff's Department spokesperson Gloria Huerta said an investigation is continuing to try to determine whether any information was stolen and whether the ransom payment can be traced to identify the hacker.

    SecurityWeek reports: "$1.1M Paid to Resolve Ransomware Attack on California County"

  • news

    Visible to the public "Kremlin-Linked 'Snake' Espionage Malware Eliminated, Justice Department Says"

    US and international law enforcement agencies have announced the successful dismantling of a malware implant used by a Kremlin-sponsored hacking group. The US Justice Department (DOJ) obtained court authorization that permitted US law enforcement to wipe out the malicious code used by Turla called "Snake." Turla has a long history of ties to the Russian Federal Security Service (FSB). Snake has been assessed to be their premier espionage weapon, according to a senior FBI official, who added that it had been deployed against NATO countries and others to steal sensitive US information. According to the official, the initiative, dubbed "Operation Medusa," has denied the Moscow-backed group of a resource upon which it has relied for 20 years. In an affidavit released alongside the announcement, the bureau determined that the FSB compromised hundreds of computers in at least 50 countries using the Snake malware package. This article continues to discuss the elimination of the Kremlin-linked Snake espionage malware.

    The Record reports "Kremlin-Linked 'Snake' Espionage Malware Eliminated, Justice Department Says"

  • news

    Visible to the public "AndoryuBot DDoS Botnet Exploiting Ruckus AP Vulnerability"

    Owners of Ruckus access points (APs) have been warned by Fortinet that a DDoS botnet named AndoryuBot has been exploiting a recently patched vulnerability to hack devices. The vulnerability in question is tracked as CVE-2023-25717, and it was patched by Ruckus in February in many of its wireless APs. The vulnerability allows a remote, unauthenticated attacker to execute arbitrary code and take complete control of a targeted Ruckus device. Technical details have been available since February, and cybersecurity firm Fortinet started seeing attacks exploiting the vulnerability in late April. The company issued a warning on April 28 about CVE-2023-25717 being exploited, and on Monday, it revealed that a spike in exploitation is driven by the AndoryuBot botnet. The company stated that AndoryuBot emerged in February 2023, and it's designed to abuse compromised devices to launch various types of DDoS attacks. The vulnerability is exploited to gain access to Ruckus APs. A script is then downloaded to the compromised device for propagation to other devices. Fortinet noted that once a target device is compromised, AndoryuBot quickly spreads and begins communicating with its C2 server via the SOCKS protocol. In a very short time, it is updated with additional DDoS methods and awaits attack commands. The company noted that prices for DDoS attacks using the AndoryuBot botnet are listed on a Telegram channel, and threat actors can cause disruption even with limited financial resources. Fortinet has made available indicators of compromise (IoCs) and other technical details that can be useful to defenders.

    SecurityWeek reports: "AndoryuBot DDoS Botnet Exploiting Ruckus AP Vulnerability"

  • news

    Visible to the public "Royal Ransomware Gang Quickly Expands Reign"

    The Royal ransomware group has become more active this year, targeting critical infrastructure organizations with various tools. Based on the group's leak site, Palo Alto Networks' Unit 42 reports that it has affected 157 organizations since its inception last year. Royal ransomware has affected different industries, including both small and large businesses. According to information from their leak site and public reporting agencies, the Royal ransomware has impacted manufacturing and more. The group has been observed using multiple initial access vectors, including callback phishing, Search Engine Optimization (SEO) poisoning, exposed Remote Desktop Protocol (RDP) accounts, and compromised credentials, to gain access to vulnerable systems. After securing access, the group uses multiple tools to support the intrusion operation, such as the TCP/UDP tunnel Chisel and the Active Directory query tool AdFind. Royal has compromised victims via a BATLOADER infection. BATLOADER will download additional payloads, such as VidarStealer, Ursnif/ISFB, and Redline Stealer, as well as legitimate system management and Remote Monitoring and Management (RMM) tools. Researchers have observed Royal operators using PowerTool, a piece of software with access to the kernel that is ideal for removing endpoint security software. This article continues to discuss researchers' findings and observations regarding the Royal ransomware gang.

    SC Media reports "Royal Ransomware Gang Quickly Expands Reign"

  • news

    Visible to the public "85K+ MS Exchange Servers Remain Vulnerable to Severe RCE Bugs"

    According to researchers at Cybernews, months after Microsoft urged organizations to update their software to address Exchange server vulnerabilities, over 85,000 servers remain vulnerable to attack. Russia-linked malicious actors have exploited similar vulnerabilities to conduct large-scale attacks against government agencies. Microsoft discovered new vulnerabilities in Microsoft Exchange on February 14 and called on software users to patch them by installing the most recent security updates. The Remote Code Execution (RCE) vulnerabilities, tracked as CVE-2023-21529, CVE-2023-21706, and CVE-2023-21707, can allow attackers to execute malicious code and access other users' private emails and inboxes. The only requirement for an adversary to access the server is to have a Microsoft Exchange account, which is not difficult, as it can be done by malicious employees, students, or other users. Threat actors could also attempt to conduct a phishing attack on a single user and, if successful, gain access to the organization's email system. Although gaining access to confidential and private information is the primary concern, the vulnerabilities could also be exploited for initial network access to launch ransomware or extract sensitive data from other servers on the same network. This article continues to discuss over 85,000 Microsoft Exchange servers still being vulnerable to RCE flaws.

    Cybernews reports "85K+ MS Exchange Servers Remain Vulnerable to Severe RCE Bugs"

  • news

    Visible to the public "Microsoft: Iranian APTs Exploiting Recent PaperCut Vulnerability"

    Microsoft recently warned that more threat actors have started targeting a recently patched vulnerability in PaperCut MF/NG print management solutions, including Iranian state-sponsored groups. The critical flaw tracked as CVE-2023-27350 (CVSS score of 9.8) and patched in March 2023 could allow remote, unauthenticated attackers to bypass authentication and execute arbitrary code with the privileges of the System user. In late April, PaperCut urged customers to update their installations as soon as possible. A few days later, Microsoft reported that it had seen a Cl0p ransomware operator affiliated with the FIN11 and TA505 Russian groups exploiting the vulnerability for weeks. Now, Microsoft warns that Iranian state-sponsored threat actors Mint Sandstorm and Mango Sandstorm have adopted publicly available proof-of-concept (PoC) code exploiting the bug and are targeting unpatched PaperCut installations in attacks. For now, Microsoft stated that Mint Sandstorm activity targeting CVE-2023-27350 appears opportunistic, while Mango Sandstorm's exploitation of the flaw remains low. Microsoft noted that as more threat actors begin to use this vulnerability in their attacks, organizations are strongly urged to prioritize applying the updates provided by PaperCut to reduce their attack surface. Also tracked as Ajax Security Team, Charming Kitten, APT35, Magic Hound, NewsBeef, Newscaster, Phosphorus, and TA453, Mint Sandstorm has been active since at least 2011, targeting governments, critical infrastructure, activists, journalists, and other entities.

    SecurityWeek reports: "Microsoft: Iranian APTs Exploiting Recent PaperCut Vulnerability"

  • news

    Visible to the public "CISOs Worried About Personal Liability For Breaches"

    According to security researchers at Proofpoint, over three-fifths (62%) of global CISOs are concerned about being held personally liable for successful cyberattacks that occur on their watch, and a similar share would not join an organization that fails to offer insurance to protect them. The researchers polled 1600 CISOs from organizations of 200 employees or more across different industries in 16 countries. The researchers found that CISOs in sectors with high volumes of sensitive data and/or heavy regulation, such as retail (69%), financial services (65%), and manufacturing (65%), are most likely to demand insurance coverage. The researchers noted that a combination of high-stress working environments, shrinking budgets, and personal liability could be harming CISOs' quality of life. Some 60% told the researchers that they've experienced burnout in the past 12 months. CISOs are most likely to experience burnout in the retail (72%) and IT, technology, and telecoms (66%) industries. The researchers stated that nearly two-thirds (63%) of respondents said they have had to deal with the loss of sensitive information in the past year, with a similar number (61%) claiming their organization would not be able to cope with a targeted attack. Email fraud (33%), insider threats (30%), cloud account compromise (29%), and DDoS attacks (29%) topped the list of concerns.

    Infosecurity reports: "CISOs Worried About Personal Liability For Breaches"

  • news

    Visible to the public "Researchers Uncover SideWinder's Latest Server-Based Polymorphism Technique"

    As part of a campaign that began in late November 2022, the Advanced Persistent Threat (APT) actor known as SideWinder has been using a backdoor in attacks against Pakistani government organizations. According to the BlackBerry Research and Intelligence Team, the SideWinder APT group used a server-based polymorphism method to deliver the next stage payload. Another campaign discovered by the company in March 2023 shows that Turkey has also become a priority for the threat actor. SideWinder has been on the radar since at least 2012, and it is primarily known to target Southeast Asian organizations in Pakistan, Afghanistan, Bhutan, China, Myanmar, Nepal, and Sri Lanka. The group is also tracked under the names APT-C-17, APT-Q-39, Hardcore Nationalist (HN2), Rattlesnake, Razor Tiger, and T-APT4. It is believed to be an Indian state-sponsored group. In the past year, SideWinder has been linked to a cyberattack against the Pakistan Navy War College (PNWC) and an Android malware campaign that harvested sensitive information using rogue phone cleaner and Virtual Private Network (VPN) apps uploaded to the Google Play Store. What distinguishes this campaign is the threat actor's use of server-based polymorphism to circumvent traditional signature-based antivirus detection and spread additional payloads by responding with two variants of an intermediate RTF file. This article continues to discuss findings regarding SideWinder's attacks, techniques, and targets.

    THN reports "Researchers Uncover SideWinder's Latest Server-Based Polymorphism Technique"

  • news

    Visible to the public "FBI Seizes 13 More Domains Linked to DDoS-For-Hire Services"

    The US Justice Department (DOJ) has announced the court-ordered seizure of 13 Internet domains associated with Distributed Denial-of-Service (DDoS)-for-hire services, as part of an ongoing initiative against computer attack booter services. This set of seizures represents the third wave of US law enforcement actions against major booter services that allow paying users to launch powerful DDoS attacks in which computers are flooded with information and prevented from accessing the Internet. In December 2022, the FBI also targeted leading stresser services by seizing an additional 48 domains. Ten previously disrupted platforms registered new domains, allowing them to remain online. The DOJ stated that ten of the thirteen domains recently seized are reincarnations of services that were taken down in December during an earlier search that targeted leading booter services. The FBI tested the seized booter services domains by opening or renewing accounts with each of them and launching DDoS attacks against agency-controlled computers to determine the effects on target computers. These tests confirmed the functionality of the booters, with the FBI stating that certain attacks took the targeted devices offline despite their high-capacity Internet connections. This article continues to discuss the DOJ's seizure of 13 more domains linked to DDoS-for-hire platforms.

    Bleeping Computer reports "FBI Seizes 13 More Domains Linked to DDoS-For-Hire Services"

  • news

    Visible to the public "Finding Bugs in AI Models at DEF CON 31"

    DEF CON's AI Village will host the first public assessment of Large Language Models (LLMs) to discover bugs and the potential for AI model misuse. There are numerous ways in which LLMs can help users' creativity, but there are also challenges, particularly regarding security and privacy. This event aims to bring further attention to the implications of using generative Artificial Intelligence (AI), a technology with many potential applications and unclear repercussions. Red teams will evaluate LLMs from leading vendors, including Anthropic, Google, Hugging Face, NVIDIA, OpenAI, Stability, and Microsoft. They will do so on a Scale AI-developed evaluation platform. This exercise is intended to reveal both the potential and limitations of LLMs. Red teams hope that testing these models will reveal any potential vulnerabilities and evaluate the extent to which LLMs are vulnerable to manipulation. The White House, the National Science Foundation's (NSF) Computer and Information Science and Engineering (CISE) Directorate, and the Congressional AI Caucus' support for the red teaming exercise indicate the importance of the use of LLMs. It also emphasizes the possible risks associated with this technology. This article continues to discuss the first public assessment of LLMs.

    Help Net Security reports "Finding Bugs in AI Models at DEF CON 31"

  • news

    Visible to the public "BEC Campaign via Israel Spotted Targeting Large Multinational Companies"

    An Israel-based threat group is conducting a Business Email Compromise (BEC) campaign primarily against large and multinational companies with an average annual revenue of over $10 billion. According to researchers at Abnormal Security who discovered the attacks, the group has carried out 350 BEC campaigns targeting employees in 61 countries across six continents since February 2021. The attackers masquerade as the CEO and then pass the communication to a second external persona, typically a mergers and acquisitions attorney, who is responsible for overseeing the payment process. In some cases, once the second stage of an attack has been reached, the attackers request that the conversation transition from email to a WhatsApp voice call in order to accelerate the attack and reduce the likelihood of leaving a trail of evidence. This article continues to discuss the Israel-based group's BEC campaign targeting large and multinational companies.

    Dark Reading reports "BEC Campaign via Israel Spotted Targeting Large Multinational Companies"

  • news

    Visible to the public "Applying Blockchain to Digital Advertising"

    According to a new study from researchers at the University of Georgia, the same blockchain technology that secures cryptocurrency systems could also shield users from intrusive and predatory advertising. Many consumers do not understand how their personal data is used in digital advertising. Which devices collect what data, how companies use that data, and how to block certain ads can be puzzling. Advertisers and publishers can experience the negative effects of ad fraud, such as unauthorized ads and bots that hijack ad traffic and divert profits. According to the researchers, blockchain can combat both of these challenges. Jooyoung Kim, the study's lead author, explained that there will always be malicious actors due to the size and complexity of the advertising ecosystem. Advertisers and publishers cannot effectively track them, and consumers are concerned about the security and privacy of their personal information. With the automated nature of blockchain, consumers have greater control over their exposure to ads. This could increase consumer trust in advertising by placing control in their hands. People can track how their data is used and opt out of certain ad categories. In addition to placing fake ads, fraudsters can use bots to defraud ads. These bots can click on ads, depleting the budgets of advertisers. Such fraud schemes have caused 15 to 50 percent of ads to be wasted, contributing to an estimated $100 billion in losses in 2022. Digital advertising fraud schemes have wasted consumers' attention and increased the number of potential threats to them. Although blockchain may not completely prevent fraud from the start, it does pave the way to do so. When a fraudulent ad is identified, it can be traced back to its source via the blockchain. This article continues to discuss the new study on the anti-fraud possibilities of blockchain.

    The University of Georgia reports "Applying Blockchain to Digital Advertising"

  • news

    Visible to the public "How the ZeuS Trojan Info Stealer Changed Cybersecurity"

    After infecting a computer or device, information-stealing malware is highly adept at exfiltrating login credentials, financial information, and other confidential data. Typically, information stealers operate by capturing keystrokes, screenshots, and network traffic. They may also search a hard drive for certain data types. The data is then sent to the attacker's command-and-control (C2) server for further exploitation. On underground criminal networks, information-stealing malware has thrived. Information stealer services for financial fraud attacks are available for as little as $200 per month on the dark web. Although this category of malware has existed in some form for more than two decades, the ZeuS Trojan has been the most influential as an information stealer. ZeuS was the first true information stealer used in an attack with the intent to harvest data. ZeuS became one of the most prevalent information stealers ever. The malware's primary objective was to steal online banking credentials. To steal sensitive information from infected computers, ZeuS used various methods, including keylogging and form grabbing. The information was then used to conduct unauthorized transfers from the victims' bank accounts to the attackers' accounts. In addition, the malware could identify when a user visited certain websites, especially those related to banking. ZeuS affected Android, Symbian, and Blackberry mobile devices. It is considered the first malware to steal Mobile Transaction Authentication Numbers (mTANs), a form of two-factor authentication (2FA) banks use during transactions. This article continues to discuss the ZeuS Trojan and other information stealers.

    Security Intelligence reports "How the ZeuS Trojan Info Stealer Changed Cybersecurity"