News Items

  • news

    Visible to the public "CERT-UA Warns of an Ongoing SmokeLoader Campaign"

    The Computer Emergency Response Team of Ukraine (CERT-UA) warns of an ongoing phishing campaign aimed at distributing the SmokeLoader malware in the form of a polyglot file. Threat actors are sending emails with the subject line "bill/payment" and a ZIP archive attachment from compromised accounts. The JavaScript involved in the attack uses PowerShell to download and run an executable that launches the SmokeLoader malware. SmokeLoader serves as a loader for other malware. Upon execution, it injects malicious code into the running explorer process (explorer.exe) and downloads another payload. CERT-UA linked the campaign to the financially motivated threat actor UAC-0006 who has been active since at least 2013. The threat actors focus on compromising accountants' computers, which are used to support financial activities such as remote banking system access. They also steal credentials and initiate unauthorized fund transfers. This article continues to discuss researchers' findings regarding the phishing campaign distributing the SmokeLoader malware.

    Security Affairs reports "CERT-UA Warns of an Ongoing SmokeLoader Campaign"

  • news

    Visible to the public "Western Digital Confirms Ransomware Group Stole Customer Information"

    Western Digital recently confirmed that cybercriminals have stolen customer and other information after breaching its systems. According to the digital storage giant, a security breach was discovered on March 26. The company noted that it shut down some services in early April as part of its incident response activities and informed customers about a cyberattack. However, it did not share any updates until May 5. Western Digital's second public statement comes just days after a ransomware group known as Alphv/BlackCat started publishing screenshots showing the extent of their access. The screenshots appear to show video calls, emails, and internal documents discussing the cyberattack, as well as internal tools, invoices, and confidential communications. The adversaries have threatened to make public customers' personal information, firmware, code signing certificates, and intellectual property if they do not pay up. In the statement issued on Friday, WD confirmed that the hackers accessed a database associated with its online store that contained customers' personal information, including names, billing and shipping addresses, phone numbers, email addresses, hashed and salted passwords, and partial credit card numbers. The impacted online store is expected to be restored in the week of May 15. The My Cloud service, which was also shut down following the hack, was restored in mid-April. The company said it's still investigating the validity of the other data made public by the ransomware group.

    SecurityWeek reports: "Western Digital Confirms Ransomware Group Stole Customer Information"

  • news

    Visible to the public "Cryptocurrencies: Shared Irresponsibility"

    Information Technology security is of utmost importance when using cryptocurrencies. Ultimately, money, like other data, is susceptible to cyberattacks. Professor Ghassan Karame, head of the Chair for Information Security at Ruhr University Bochum, is exploring the security of various cryptocurrencies. He advocates for decentralized platforms, such as those on which cryptocurrencies are based. Karame explains that in decentralized platforms, unlike a bank, power is not centralized in a single entity. Instead, decisions are made by the majority of users. According to Karame, the two advantages of decentralized platforms are that it is difficult for a central body to impose censorship, and they are resilient against faults and misbehavior because a large community of developers monitors the technology. However, cryptocurrencies are vulnerable to security breaches like every other IT technology. As early as 2012, Karame and his team identified a critical flaw in the Bitcoin system that allowed people to spend the same Bitcoins many times to pay for different transactions. In 2015, Karame and his collaborators identified another critical vulnerability after Bitcoin's system was modified to accommodate more users. They demonstrated that if they controlled as few as tens of laptops in the system, they could halt the flow of information throughout the entire Bitcoin system. Bitcoin has long since resolved both of these security issues. This article continues to discuss security vulnerabilities associated with cryptocurrencies.

    Ruhr University Bochum reports "Cryptocurrencies: Shared Irresponsibility"

  • news

    Visible to the public "Ransomware Group Claims Attack on Constellation Software"

    The Alphv/BlackCat ransomware group has recently claimed responsibility for a cyberattack that Canadian software company Constellation Software disclosed last week. Toronto-based Constellation Software is a company specializing in the acquisition of vertical market software firms. On May 4, Constellation Software revealed that it fell victim to a cyberattack that impacted "a limited number of its IT infrastructure systems." The attack occurred on April 3, 2023. According to the company, the compromised systems were "related to internal financial reporting and related data storage by the operating groups and businesses of Constellation." The company noted that the attack did not impact the IT systems of its operating groups and businesses and did not affect its business operations. The company says that a limited amount of personal information was compromised during the incident, along with a limited amount of business partner data. The Alphv/BlackCat ransomware gang last week posted on its leak site an entry about the incident, claiming to have stolen over one terabyte of data from the company. The company has not shared information on the number of potentially impacted individuals.

    SecurityWeek reports: "Ransomware Group Claims Attack on Constellation Software"

  • news

    Visible to the public "Cookie Consent Banners Need Improvement, May Not Be the Answer"

    Cookie consent banners appear, in some form, on nearly every website, but concerns remain as to whether users understand what they agree to when they select one of the available options or click the x button to close the banner. In order to comply with regulatory requirements, websites have implemented cookie consent banners, allowing users to choose how their personal information is collected and shared. However, according to researchers at the CyLab Security and Privacy Institute at Carnegie Mellon University (CMU), many of these banners miss the mark. They may not be the best method to provide users with privacy options. Hana Habib, special faculty instructor and associate director of the CMU Software and Societal Systems Department's Masters in Privacy Engineering program, explains that the primary problem with cookie consent interfaces has been the proliferation of dark patterns. Individuals were steered towards less privacy-protective options. In a new study titled "A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile," CyLab researchers explored how US and UK users interact with and perceive cookie interfaces, how these interactions and perceptions vary on desktop and mobile devices, as well as how banner prominence, location of cookie category definitions, and initial cookie options influence users' attitudes and behaviors. This article continues to discuss findings from CyLab's US-UK usability evaluation of consent management platform cookie consent interface design.

    CyLab reports "Cookie Consent Banners Need Improvement, May Not Be the Answer"

  • news

    Visible to the public "CyberGhost VPN Patches Command Injection Vulnerability"

    CyberGhost VPN, a popular provider of Virtual Private Network (VPN) solutions, has patched a recently discovered command injection vulnerability that left Windows users' systems exposed to potential compromise. The difficulty with which the researcher who discovered the vulnerability disclosed it also adds intrigue to the bug's discovery. Ceri Coburn of the UK-based security research company Pen Test Partners found that the CyberGhost VPN client is vulnerable to an elevation of privilege flaw, stating the vulnerability affects roughly 3 million CyberGhost customers. The latest 8.3.10.10015 version of CyberGhost, released on February 24, 2023, addresses this issue. It is unknown if the patch was pushed to endpoints operating previous versions of the software or if customers must manually update instances of the software. According to Coburn, a specially crafted JSON payload sent to the CyberGhost Remote Procedure Call (RPC) service can lead to command line injection when the OpenVPN process is launched, resulting in full system compromise. This article continues to discuss the command injection vulnerability patched by CyberGhost VPN.

    SC Magazine reports "CyberGhost VPN Patches Command Injection Vulnerability"

  • news

    Visible to the public "Eurovision 2023: A Goldmine for Cybercriminals"

    The return of Eurovision 2023 will occur on May 9, hosted by Liverpool on behalf of Ukraine. However, the excitement about this year's acts is accompanied by cybercriminals' eagerness to make money. This year's song contest again raises concerns about malware, phishing, and data management. In May 2022, a pro-Russian hacker group was observed discussing a cyberattack against Eurovision in order to hinder Ukraine's chances of winning the song contest, but Italy had effectively blocked Distributed Denial-of-Service (DDoS) attacks during the event. Italy's successful blocking of the attacks prompted the Russia-affiliated group called Killnet to declare "war on ten countries and the Italian police." This year, hackers are attempting to infiltrate the Eurovision space through every conceivable entry point and using multiple attack vectors. Ahead of the musical event in Liverpool, the North West Cyber Resilience Centre (NWCRC) advised organizations to remain vigilant. Numerous businesses engaging with new suppliers and customers throughout the supply chain have been warned to be alert for fraud attempts. In the run-up to the Eurovision Song Contest in May, the head of Cyber and Innovation at the NWCRC, DI Dan Giannasi, advised all businesses in the North West to be vigilant against potential cybercrime, including phishing schemes in which fraudsters impersonating businesses attempt to steal personal information and money. This article continues to discuss the cybercrime accompanying Eurovision 2023.

    Cybernews reports "Eurovision 2023: A Goldmine for Cybercriminals"

  • news

    Visible to the public "1 Million Impacted by Data Breach at NextGen Healthcare"

    Healthcare solutions provider NextGen Healthcare has recently started informing roughly one million individuals that their personal information was compromised in a data breach. The company makes and sells electronic health records software and provides doctors and medical professionals with practice management services. NextGen Healthcare first identified suspicious activity on its systems on March 30, 2023. The investigation launched into the matter revealed that an unauthorized party had access to those systems between March 29 and April 14, 2023. The company noted that during that time, the attackers accessed personal information such as names, addresses, birth dates, and Social Security numbers. The company says it has no evidence that the unauthorized party had access to health or medical records and data. NextGen Healthcare noted that the attackers accessed its database using "client credentials that appear to have been stolen from other sources or incidents unrelated to NextGen." The company stated that it reset passwords to contain the incident and informed law enforcement of the breach, and has been working with them throughout the investigation.

    SecurityWeek reports: "1 Million Impacted by Data Breach at NextGen Healthcare"

  • news

    Visible to the public "ChatGPT and the New AI Are Wreaking Havoc on Cybersecurity in Exciting and Frightening Ways"

    Christopher Ahlberg, CEO of Recorded Future, emphasizes that cybercriminals are racing to discover powerful new hacks using Artificial Intelligence (AI). While defenders benefit from generative AI in bolstering cybersecurity, attackers also see the benefits of using AI technology. Cybercriminals are using AI to launch novel and sophisticated attacks on a massive scale. According to Ahlberg, defenders are using the same technology to protect critical infrastructure, government organizations, and corporate networks. Generative AI capabilities have helped malicious actors improve and develop new attack tactics, allowing them to remain one step ahead of cybersecurity defenses. AI helps cybercriminals automate attacks, scan attack surfaces, and generate content that resonates with different geographic regions and demographics, thus enabling them to target a broader range of potential victims. Cybercriminals have adopted the technology to create legitimate-looking phishing emails. AI-generated text facilitates the creation of highly personalized emails and text messages that are more likely to deceive targets. As AI becomes more pervasive in society, lawmakers, judges, and other decision-makers must understand the technology and its potential consequences. In order to navigate the future of AI in threat hunting and beyond, it is essential to develop stronger alliances between technical experts and policymakers. The opportunities, challenges, and ethical considerations of AI are complex and evolving in cybersecurity. This article continues to discuss how AI is impacting cybercrime and cybersecurity operations.

    ZDNet reports "ChatGPT and the New AI Are Wreaking Havoc on Cybersecurity in Exciting and Frightening Ways"

  • news

    Visible to the public "The Attack on Colonial Pipeline: What We've Learned & What We've Done Over the Past Two Years"

    In 2021, a ransomware attack on Colonial Pipeline made news worldwide. Since then, the Biden-Harris Administration has taken significant steps in US cyber defense, leveraging the strength of the US government to address the full spectrum of the threat. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has made efforts to improve resilience across the nation's critical infrastructure. Recognizing the need for organizations to have easy access to actionable and timely cybersecurity information, CISA created a website resource to serve as a hub for warnings and guidance for businesses and individuals. As only cohesive cross-government collaboration can scale to meet the threat, CISA formed the Joint Ransomware Task Force (JRTF) with its FBI partners to coordinate the federal government's response to the ransomware outbreak. Due to the need to bring industry, government, and internal partners together and break down siloes that create gaps for the adversary, CISA established the Joint Cyber Defense Collaborative (JCDC). This concept stemmed from the US Cyberspace Solarium Commission, catalyzing a community of experts on the front lines of cyber defense, from across the public and private sectors, to share insights and information in real-time. This article continues to discuss lessons learned from the cyberattack on Colonial Pipeline and what CISA has done to help combat the ransomware threat.

    CISA reports "The Attack on Colonial Pipeline: What We've Learned & What We've Done Over the Past Two Years"

  • news

    Visible to the public "New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks"

    Users of the Advanced Custom Fields plugin for WordPress are urged to update to version 6.1.6. The plugin has been discovered to contain a vulnerability, tracked as CVE-2023-30777, which relates to reflected cross-site scripting (XSS). It could be exploited to inject arbitrary executable scripts into websites. The plugin has over two million active installations and is available in both free and paid versions. On May 2, 2023, the problem was detected and reported to the maintainers. According to Patchstack researcher Rafie Muhammad, this vulnerability allows any unauthenticated user to steal sensitive information and gain escalated privileges on the WordPress site by tricking a privileged user into visiting a crafted URL path. Reflected XSS attacks typically occur when victims are lured into clicking on a fraudulent link received via email or another method, enabling the malicious code to be transferred to the vulnerable website, where it is reflected back to the user's browser. Since reflected XSS attacks do not have the same reach and scale as stored XSS attacks, threat actors will spread the malicious link to as many victims as possible. This article continues to discuss the potential exploitation and impact of the vulnerability found in the Advanced Custom Fields plugin for WordPress.

    THN reports "New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks"

  • news

    Visible to the public "New Cactus Ransomware Encrypts Itself to Evade Antivirus"

    Cactus, a new ransomware operation, has been exploiting Virtual Private Network (VPN) appliance vulnerabilities to gain initial access to the networks of "large commercial entities." The Cactus ransomware operation has been active since at least March and seeks significant payments from its victims. Although the new threat actor used the standard ransomware techniques of file-encrypting and data theft, it added a unique twist to avoid detection. Researchers at the corporate investigation and risk consulting company Kroll suspect that Cactus exploits known vulnerabilities in Fortinet VPN appliances to gain initial access to victim networks. The assessment is based on the observation that the hacker pivoted inside from a VPN server using a VPN service account in all incidents observed. Cactus is different from other operations because of its use of encryption to protect the ransomware binary. The threat actor behind Cactus uses a batch script to get the encryptor binary using 7-Zip. The original ZIP archive is removed, and the binary is launched with a specific execution flag. This article continues to discuss researchers' findings regarding the new Cactus ransomware operation.

    Bleeping Computer reports "New Cactus Ransomware Encrypts Itself to Evade Antivirus"

  • news

    Visible to the public "Your Voice Could Be Your Biggest Vulnerability"

    Security researchers from McAfee Labs have revealed their findings and analysis from an in-depth study of Artificial Intelligence (AI) voice-cloning technology and cybercriminal use. According to McAfee, only three seconds of audio are required to clone a person's voice using AI technology. McAfee surveyed 7,054 people from seven countries and found that a quarter of adults have faced an AI voice scam, with one in ten experiencing it personally and 15 percent reporting that it had happened to someone they know. Furthermore, 77 percent of victims reported financial losses as a consequence. Voice is the spoken equivalent of a biometric fingerprint, which explains why hearing someone's voice is a widely accepted method of establishing trust. With 53 percent of adults sharing their voice data online at least once per week via social media, voice notes, and more, and 49 percent doing so up to ten times per week, replicating a person's voice has become a cybercriminal weapon. It is now easier than ever to manipulate images, videos, and perhaps the voices of friends and family. McAfee's research reveals scammers are using AI technology to clone voices and then send a fake voicemail or call the victim's contacts pretending to be in distress. With 70 percent of adults lacking confidence in their ability to distinguish the cloned version from the real thing, this technique is gaining traction. This article continues to discuss key findings from McAfee on AI technology fueling a rise in online voice scams.

    Help Net Security reports "Your Voice Could Be Your Biggest Vulnerability"

  • news

    Visible to the public "2 Years After Colonial Pipeline, US Critical Infrastructure Still Not Ready for Ransomware"

    Experts warn that efforts to counter the potentially crippling ransomware threat to US critical infrastructure have been insufficient. The cyberattack on Colonial Pipeline's Information Technology (IT) infrastructure caused it to cease operations for the first time, resulting in a fuel shortage and price increases that prompted four East Coast states to declare a state of emergency. The incident elevated ransomware to a threat to national security and called for coordinated action throughout the government. Since the attack and a following one on JBS that threatened domestic meat shortages, the US government has stated that it will treat ransomware attacks on critical infrastructure as acts of terrorism. Just days after the attack on the Colonial Pipeline, President Biden signed an Executive Order mandating new security requirements for critical infrastructure organizations. There have also been numerous federal and regulatory initiatives to strengthen the resilience of US critical infrastructure against attacks. However, the ransomware threat to critical infrastructure remains elevated, as demonstrated by a recent attack on Americold, the largest cold-storage provider in the US. Similar to the attack on Colonial Pipeline, the attack forced Americold to stop cold-storage operations while it worked to address the threat. 870 of the 2,385 ransomware complaints received by the FBI in 2017 were from critical infrastructure organizations. According to FBI data, 14 of the 16 designated critical infrastructure sectors had at least one victim of ransomware. This article continues to discuss US critical infrastructure still not being ready for ransomware attacks.

    Dark Reading reports "2 Years After Colonial Pipeline, US Critical Infrastructure Still Not Ready for Ransomware"

  • news

    Visible to the public "Data Class-Specific Image Encryption Using Optical Diffraction"

    A team of researchers at the University of California, Los Angeles (UCLA) presented a diffractive network for data class-specific transformations and optical image encryption. The team demonstrated class-specific diffractive networks that perform the desired transformations for certain input data classes. In their findings, diffractive networks were trained using deep learning and then physically fabricated using 3D printing to all-optically transform the input images and generate encrypted output patterns captured by an image sensor. The encrypted images can be decrypted only by using the correct decryption keys (i.e., the class-specific inverse transformations) to reveal the original information. The UCLA team experimentally demonstrated the proof of concept for this class-specific all-optical image encryption at near-infrared and terahertz wavelengths, validating its applicability across the electromagnetic spectrum. This class-specific encryption scheme adds an extra layer of security and makes reverse engineering of the original images belonging to the target data classes more difficult. This article continues to discuss data class-specific image encryption using a diffractive optical network.

    The University of California, Los Angeles reports "Data Class-Specific Image Encryption Using Optical Diffraction"

  • news

    Visible to the public "Ransomware Task Force: Data Sharing Needed to 'Build a Clear Picture'"

    Data sharing is an essential component of ransomware defense. However, a new report shows that private sector organizations, governments, and cryptocurrency entities still need to cooperate to share information about security events. The Ransomware Task Force (RTF) of the Institute for Security and Technology, a coalition of over 60 industry, government, and law enforcement experts, recently posted an update on the progress made regarding the 48 recommendations they made in 2021 for disrupting the ransomware threat ecosystem. Several victories were highlighted in the report. As of May, 92 percent of the 48 suggestions had resulted in some action, with around half having made "significant progress" in the form of policy implementation. According to the RTF, there have been increasing public-private partnerships and government collaboration in order to carry out investigations against ransomware operators. At the same time, the US government is engaged in different cryptocurrency regulations, with recent sanctions of exchanges and mixers involved in ransomware operations. While there has been progress in cyber incident reporting, RTF stated that the industry still lacks a complete understanding of the scope, scale, and effects of ransomware attacks. As the ecosystem evolves, governments must continue to collect and process incident data, work to create target decks of ransomware developers, criminal affiliates, and ransomware variants, as well as share information with relevant stakeholders promptly. This article continues to discuss the RTF and the importance of data sharing in defending against ransomware.

    Decipher reports "Ransomware Task Force: Data Sharing Needed to 'Build a Clear Picture'"

  • news

    Visible to the public "Insurer Must Pay $1.4 Billion Due to Ransomware Damage"

    Ace Insurance has been ordered to pay $1.4 billion to the pharmaceutical company Merck, which faced a ransomware attack by the Russian NotPetya. The insurer refused to pay since the incident was considered an "act of war." The US judge argued that Merck's all-risk insurance with Ace covered a potentially politically motivated hack. The case had been ongoing for five years. In June 2017, Merck fell victim to a NotPetya ransomware attack. Merck was infected through the accounting tool MEdoc and had to cope with 10,000 infected devices. It cost the company $850 million and impacted the development of an HPV vaccine. Furthermore, the company is said to have lost $400 million in sales. The Petya ransomware variant exploited an unpatched vulnerability in Microsoft software. Ace Insurance did not want to cover the losses, claiming that the attack was an act of war by Russia. A clause in US law exempts insurers from covering damages caused by acts of war. However, the judge rejected this line of defense. According to the judge, because it was an attack on accounting software, it could not be considered a military target. This article continues to discuss Ace Insurance having to pay $1.4 billion to Merck because of ransomware damage.

    Techzine reports "Insurer Must Pay $1.4 Billion Due to Ransomware Damage"

  • news

    Visible to the public "Google Adds Passkeys for User Accounts; 'Passwords Are Dead,' Official Says"

    On May 3, Google launched passkeys for user accounts to provide secure access to its services without the need for passwords. Passkeys are intended to eventually replace passwords because they are regarded as a more secure authentication technique. The method allows users to sign into apps and websites with the same authentication they use to unlock devices (e.g., facial scan, fingerprint, or PIN). Since the transition to passwordless authentication will take time, passwords and two-step verification (2SV) will continue to work on Google accounts for now. Administrators of Google Workspace accounts will be able to enable passkeys for end-users at sign-on. Last year, Google revealed plans to roll out passkeys in partnership with the FIDO Alliance, Apple, and Microsoft. The passkey project aimed to integrate the authentication technique into Chrome and Android, as well as services such as Docusign, Kayak, PayPal, Shopify, and Yahoo! Japan. According to Christiaan Brand, the passkey project lead and Google's identity and security product manager, the goal of passkeys is to mirror the way everyone uses transport layer encryption. This article continues to discuss Google's introduction of passkey authentication for its user accounts to access its platforms without using passwords.

    SC Media reports "Google Adds Passkeys for User Accounts; 'Passwords Are Dead,' Official Says"

  • news

    Visible to the public "Traditions Bank Experienced a Data Breach; Were You Affected?"

    Traditions Bank recently announced that it experienced a data breach in March. Traditions Bank Executive Administrative Officer & Assistant Corporate Secretary Suzanne M. Becker said that the banking system experienced a brief disruption to some network services at that time. Becker noted that they immediately took steps to resolve the situation and engaged third-party specialists to review the matter. Becker stated that the review is ongoing but has determined that certain files were accessed without authorization. In an abundance of caution, the company mailed notification letters to individuals whose information may have been potentially accessible as a result of the situation. Becker noted that these individuals have been offered complimentary identity monitoring services. Becker added that Traditions is working with third-party specialists to review security measures and existing policies and procedures to determine whether additional measures may help prevent a similar event in the future. Becker stated that they are not sharing additional details of the situation as they focus on supporting those who were potentially affected.

    Yahoo News reports: "Traditions Bank Experienced a Data Breach; Were You Affected?"

  • news

    Visible to the public "United HealthCare Reports Data Breach That May Have Revealed Customers' Personal Information"

    United HealthCare recently made customers aware of a data breach, which temporarily allowed access to personal information for those enrolled in the company's healthcare plans. According to the company, "suspicious activity" was noticed on the UHC mobile application "that may have led to the disclosure of member information." The company says the breach happened between February 19 and February 25, and it was determined on April 10 that some member information was impacted. They believe that information including members' first and last names, health insurance member identification numbers, dates of birth, addresses, dates of service, provider names, claim information, and group name and number may have been available. The company noted that this incident did not involve the disclosure of Social Security numbers or driver's license numbers. Members who had their information impacted were contacted directly by UHS via mail. The company explained that upon discovery, they took prompt action to investigate the matter. The portal account for members was locked to prevent any further access, and they initiated a forced password reset. During the investigation, the company determined that the application was the target of a credential stuffing attack. The company noted that they have no evidence that member login credentials used during the attack were accessed or obtained from any UnitedHealthcare system.

    CBS Los Angeles reports: "United HealthCare Reports Data Breach That May Have Revealed Customers' Personal Information"

  • news

    Visible to the public "Pro-Russian Hackers Claim Downing of French Senate Website"

    The French Senate's website was offline on Friday after pro-Russian hackers claimed to have taken it down. Access to the site has been disrupted since this morning. A group calling itself NoName on Telegram claimed responsibility, saying it had acted because "France is working with Ukraine on a new 'aid' package which may include weapons." The same group said it had taken the website of France's lower-house National Assembly offline for several hours in March. NoName also claimed it was behind the disruption of Canadian government websites last month as Ukrainian Prime Minister Denys Shmyhal visited the country.

    SecurityWeek reports: "Pro-Russian Hackers Claim Downing of French Senate Website"

  • news

    Visible to the public "Lawmakers Reintroduce Legislation to Bolster Satellite Cybersecurity"

    A bipartisan pair of senators have reintroduced legislation that would require the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) to provide streamlined information and resources to commercial satellite owners and operators to help them better defend against cyberattacks on their systems. The bill aims to improve commercial satellite digital security by offering stronger strategies and suggestions for protecting critical operations from attacks. The Satellite Cybersecurity Act would require CISA to unify voluntary satellite cybersecurity guidelines, including guidance targeted for small businesses, to help companies understand how to better secure their systems. The agency would be expected to create "a publicly available, online resource" that gives commercial satellite owners and operators access to "satellite-specific cybersecurity resources and recommendations to secure their networks." In recent years, US officials have warned of the growing cyber threat that hostile nation-states pose to the operations of critical commercial and government satellites. For example, Russian hackers launched a cyberattack against a satellite broadband service used by the Ukrainian military as part of an effort to disrupt their communications networks. This article continues to discuss the bipartisan proposal that directs CISA to provide commercial satellite owners and operators with more resources and recommendations to improve their cyber protections.

    NextGov reports "Lawmakers Reintroduce Legislation to Bolster Satellite Cybersecurity"

  • news

    Visible to the public "Attacks Increasingly Use Malicious HTML Email Attachments"

    Researchers warn that attackers are increasingly relying on malicious HTML files in their attacks, with malicious files making up for half of all HTML email attachments. This rate of malicious HTML prevalence has doubled since last year, and it does not appear to be the product of mass attack campaigns that deliver the same attachment to a huge number of individuals. According to researchers from the security company Barracuda Networks, attackers continue to use malicious HTML because it is effective. HTML, the standard markup language for displaying Web content, has a variety of valid applications within email communications. For example, enterprise users typically receive reports generated and emailed by various applications and tools. This does not make them suspicious when they see this type of attachment, and email security gateway filters cannot prohibit this attachment type explicitly. HTML is also versatile regarding the types of attacks it can facilitate. One of the most prevalent use cases is credential phishing, in which attackers construct HTML attachments that, when opened, pose as the login page for various services. This may also be dynamic, with the HTML containing JavaScript code that reroutes the user to a malicious website. This article continues to discuss attackers' use of malicious HTML email attachments.

    CSO Online reports "Attacks Increasingly Use Malicious HTML Email Attachments"

  • news

    Visible to the public "Insider Hacks Exfiltrate Five Times As Many Records"

    The Ponemon Institute surveyed organizations in North America, Europe, the Middle East, Africa, and Asia-Pacific for its new report on insider threats. Researchers interviewed 1,004 Information Technology (IT) and IT security professionals from 278 organizations that experienced at least one insider-caused incident. In 2022, the total number of insider-led cyber incidents was 6,803, with an average annual cost of $15.4 million. The company with the greatest number of reported insider incidents was 46. In addition, 67 percent of businesses experienced 21 to over 40 incidents annually. According to a report by Verizon, about 200 million records have been compromised by external threats. In cases involving an insider actor, the number of exposed records exceeds one billion. The Ponemon report categorizes insider threats as negligent, malicious, and credential. Insider threats have increased in all three threat categories, but those resulting from employee negligence are the most prevalent. According to the study, more than half of the incidents reported in the survey were due to negligence. The average annual cost of negligent breaches was $6.6 million. This article continues to discuss new findings and observations regarding insider threats.

    Security Intelligence reports "Insider Hacks Exfiltrate Five Times As Many Records"

  • news

    Visible to the public "Ransomware Actors Extort University Via Alert System"

    Ransomware attackers recently turned up the heat on a small Virginian university by hijacking a staff/student alert system to warn of a major impending data leak. Bluefield University discovered an attack on its IT systems on April 30, ahead of final examinations this week. The university stated that upon learning of this issue, they immediately engaged the provider and independent third-party cybersecurity experts to assist in their review and remediation efforts, but it may be a few days before full functionality can be restored. In an unusual move designed to increase the likelihood of the university paying its extorters, the threat actors managed to gain control of the institution's mass alert system, known as RAMAlert. The university warned that if you are contacted by anyone claiming to be involved in the incident, please don't click on any links provided by the individual or respond. However, rather than post malicious links, the threat actors merely publicized the attack to staff and students in a bid to increase the chances of a ransom payment. One alert said, "We have admissions data from thousands of students. Your personal information is at risk to be leaked on the dark web blog." The second alert read, "Please share this information with local media news. If we don't receive payment, full data leak will be published!" The attackers in question claimed to be part of the AvosLocker group and to have 1.2TB of files in their possession.

    Infosecurity reports: "Ransomware Actors Extort University Via Alert System"

  • news

    Visible to the public "Security Researcher Finds Trove of Capita Data Exposed Online"

    A researcher has found that the London-based outsourcing company Capita left a large amount of data exposed online for seven years, just weeks after the company admitted to having experienced a data breach that could have affected customer information. The unprotected Amazon-hosted storage container discovered by a security researcher has now been secured by Capita. According to the researcher, the AWS bucket had been exposed to the Internet since 2016 and contained about 3,000 files estimated to be 655 GB in total size. The lack of a password on the bucket enabled anyone with the easy-to-guess web address to access the files. GrayHatWarfare, a searchable database that indexes publicly accessible cloud storage, also captured the exposed cloud server's information. According to a sample of filenames reviewed by TechCrunch, the exposed data included software files, server images, and a multitude of Excel spreadsheets, PowerPoint presentations, and text files. The security researcher told TechCrunch that one of the text files contained login credentials for one of Capita's systems, as well as filenames indicating that data was uploaded to the exposed container as recently as this year. This article continues to discuss the discovery of data exposed by Capita.

    TechCrunch reports "Security Researcher Finds Trove of Capita Data Exposed Online"

  • news

    Visible to the public "Cyber Patrols Lead to Seizure of Stolen Artifacts"

    According to Europol, European police have arrested scores of suspects and seized thousands of stolen artifacts after a joint physical and cyber operation last year. Operation Pandora VII involved police from Austria, Bulgaria, the Czech Republic, Croatia, Cyprus, Greece, Ireland, Italy, Poland, Portugal, Romania, Spain, Sweden, and Bosnia and Herzegovina. The aim was to crack down on a thriving international trade in stolen art. Led by Spain's Guardia Civil and backed by Europol and Interpol, officers across the region arrested 60 people and recovered 11,049 stolen artifacts. A large part of the operation was carried out online, where ancient artifacts are often traded. Europol stated that during two "cyber patrol" weeks in May and October last year, officers ran 8495 checks and seized 4017 stolen goods. Some of the artifacts included 77 ancient books, which the Italian Command for the Protection of Cultural Heritage (Arma dei Carabinieri) seized from an online marketplace. The books were originally stolen from the archives of a monastery. The liberated artifacts also included 3073 ancient coins from an online sales platform by the Polish Police Service. Europol explained that as part of the operation, pan-regional police also carried out thousands of checks at airports, ports, border crossing points, and in auction houses, museums, and private houses. Some of the recovered artifacts had been stolen in robberies of churches in northern Portugal over a decade-long period. Europol said that 130 investigations are ongoing, which means more seizures and arrests are expected.

    Infosecurity reports: "Cyber Patrols Lead to Seizure of Stolen Artifacts"

  • news

    Visible to the public "Google Play Witnessed 600K Installations of New Android Malware Fleckpe"

    Fleckpe, a new Android subscription malware, has been downloaded over 620,000 times. According to researchers, Fleckpe is now among other infamous Android spyware, such as Jocker and Harly, that enrolls users in premium services to generate illegal payments. Threat actors profit from illicit subscriptions by receiving a portion of the premium services' monthly or one-time membership payments. Most of Fleckpe's victims are in Thailand, Malaysia, Indonesia, Singapore, and Poland. Eleven Fleckpe Trojan apps masquerading as image editors, photo libraries, and premium wallpapers were discovered on Google Play. The malicious apps demand access to notification content in order to get subscription confirmation codes for various premium services. When a Fleckpe app is launched, a payload containing malicious code is decoded and executed. This payload sends the Mobile Country Code (MCC) and Mobile Network Code (MNC) of the newly infected device, along with other basic information, to the threat actor's command-and-control (C2) server. Then, in an unnoticed web browser window, the malware visits the URL supplied by the C2 and registers the victim for a premium service. If a confirmation code is needed to finalize the subscription, the malware will retrieve it from the device's notifications and insert it on the hidden screen. The app provides users with the advertised functionality while concealing malicious intent and reducing the likelihood of suspicion. This article continues to discuss findings regarding the new Android subscription malware Fleckpe.

    CyberIntelMag reports "Google Play Witnessed 600K Installations of New Android Malware Fleckpe"

  • news

    Visible to the public "Fortinet Patches High-Severity Vulnerabilities in FortiADC, FortiOS"

    Fortinet recently announced its monthly set of security updates that address nine vulnerabilities in multiple products, including two high-severity bugs in FortiADC, FortiOS, and FortiProxy. Impacting the FortiADC application delivery controller, the most severe of these issues is tracked as CVE-2023-27999 and is described as "an improper neutralization of special elements used in an OS command vulnerability." The company stated that an attacker could exploit the bug via crafted arguments to existing commands, allowing them to execute unauthorized commands. The attacker needs to be authenticated to exploit the vulnerability. The issue impacts FortiADC versions 7.2.0, 7.1.1, and 7.1.0 and was addressed with the release of FortiADC versions 7.2.1 and 7.1.2. The second high-severity flaw, CVE-2023-22640, is described as an out-of-bounds write in the "sslvpnd" component of FortiOS and FortiProxy. Fortinet noted that the bug allows an authenticated attacker to send specifically crafted requests to achieve arbitrary code execution. The bug was identified in FortiOS versions 7.2.x, 7.0.x, 6.4.x 6.2.x, and 6.0.x, and FortiProxy versions 7.2.x, 7.0.x, 2.0.x, and 1.x.x. It was addressed with the release of FortiOS versions 7.4.0, 7.2.4, 7.0.11, 6.4.12, and 6.2.14, and in FortiProxy versions 7.2.2 and 7.0.8. Fortinet does not mention any of these vulnerabilities being exploited in malicious attacks.

    SecurityWeek reports: "Fortinet Patches High-Severity Vulnerabilities in FortiADC, FortiOS"

  • news

    Visible to the public "MSI's Leaked Firmware Keys Endanger Hundreds of Devices"

    Researchers have discovered leaked firmware image signing keys and Intel Boot Guard keys for MSI products. According to Alex Matrosov, CEO of the firmware supply chain security platform Binarly, the leaked firmware keys impact 57 MSI products, while the leaked Boot Guard keys affect 166 MSI products. Firmware image signing keys are an integral component of the hardware's security infrastructure. The keys provide trust that the firmware is authentic and has not been modified by anyone other than the software developer or device manufacturer. Similarly, Intel Boot Guard is a processor safeguard that prevents the computer from executing firmware images that the system manufacturer has not published. Exposure of the keys poses a significant risk to users, as attackers with access to leaked keys can push malware-infected firmware images or updates as legitimate. Since firmware is typically launched before the operating system, malicious code may evade detection by antivirus software and other security measures. Attackers could also use the keys to modify the device's firmware, severely compromising its reliability. According to Binarly, the exposed devices include many models of MSI's Stealth, Creator, Crosshair, Prestige, Pulse, Modern, Raider, Sword, Summit, Vector, and Katana series laptops. This article continues to discuss the discovery and potential impact of the leaked firmware image signing keys.

    Cybernews reports "MSI's Leaked Firmware Keys Endanger Hundreds of Devices"

  • news

    Visible to the public "Kimsuky Hackers Use New Recon Tool to Find Security Gaps"

    In a global cyber espionage campaign, the North Korean hacking group Kimsuky has been observed using a new version of its reconnaissance malware, now known as ReconShark. According to Sentinel Labs, the threat actor is now targeting government organizations, research organizations, universities, and think tanks in the US, Europe, and Asia. South Korean and German authorities issued a warning in March 2023 that Kimsuky, also known as Thallium and Velvet Chollima, had begun distributing malicious Chrome extensions targeting Gmail accounts and an Android spyware that served as a Remote Access Trojan (RAT). Previously, in August 2022, researchers found another Kimsuky campaign targeting South Korean politicians, diplomats, university professors, and journalists using a multi-stage target validation scheme to ensure that only valid targets would be infected with malware. This article continues to discuss the history of the Kimsuky hacking group and its use of a new version of its reconnaissance malware ReconShark.

    Bleeping Computer reports "Kimsuky Hackers Use New Recon Tool to Find Security Gaps"

  • news

    Visible to the public "Hackers Targeting Italian Corporate Banking Clients with New Web-Inject Toolkit drIBAN"

    Since at least 2019, Italian corporate banking clients have been the target of an ongoing financial fraud campaign involving a new web-inject toolkit called drIBAN. According to Cleafy researchers, the primary objective of drIBAN fraud operations is to infect Windows workstations within corporate environments in an attempt to alter legitimate banking transfers performed by victims by changing the beneficiary and transferring money to an illegitimate bank account. The bank accounts are either controlled by the threat actors or their affiliates, who are then tasked with laundering the stolen funds. Web-injects are a time-tested technique that allows malware to inject custom scripts on the client side via a man-in-the-browser (MitB) attack and intercept traffic to the server. This article continues to discuss the ongoing financial fraud campaign leveraging the new drIBAN web-inject toolkit.

    THN reports "Hackers Targeting Italian Corporate Banking Clients with New Web-Inject Toolkit drIBAN"

  • news

    Visible to the public "Universal Data Permissions Scanner: Open-Source Tool to Overcome Data Authorization Blindspots"

    Satori has released Universal Data Permissions Scanner (UDPS), a free, open-source tool that allows companies to identify which employees have access to which data, thereby mitigating the risks associated with overprivileged or unauthorized users and streamlining compliance reporting. User authorization for accessing data is complicated. Determining who has access to what data is often unclear due to complex role hierarchies, varying authorization models used for different technologies, and the variety of data that may be accessible across technologies and clouds. The UDPS reduces authorization complexity, improving the ability to share information across departments quickly and easily, and increasing the time-to-value. According to Satori, using the UDPS reduces the security risk posed by overprivileged users by ensuring that access controls are applied and revoked appropriately. This article continues to discuss the UDPS tool.

    Help Net Security reports "Universal Data Permissions Scanner: Open-Source Tool to Overcome Data Authorization Blindspots"

  • news

    Visible to the public "Dallas City Systems Taken Down by Royal Ransomware"

    After a cyberattack by the Royal ransomware group, city government systems in Dallas are still not entirely functional. The City of Dallas has confirmed the ransomware attack, but has assured residents that police and fire rescue services will continue as usual. It has been announced that ransomware has compromised a number of servers, impacting multiple functional areas, including the Dallas Police Department website, according to a city statement. One person shared a copy of a ransom note churned out of printers across the Dallas city network, which threatened to leak data stolen from Dallas City systems. The Royal ransomware group has ties to the defunct Conti gang and has previously targeted the healthcare industry. This article continues to discuss the Royal ransomware attack that has impacted Dallas city government systems.

    Dark Reading reports "Dallas City Systems Taken Down by Royal Ransomware"

  • news

    Visible to the public "Maritime Security Lab: Bringing Better IT Security on Board"

    Cyberattacks against industry and critical infrastructure are increasing globally. Targets of these cyberattacks also include ships, which contribute to international supply chains by transporting billions of tons of products annually. However, ships' on-board Information Technology (IT) systems have often been found to lack adequate security. Therefore, the Maritime Cybersecurity research group at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) has partnered with the Fraunhofer Center for Maritime Logistics and Services (CML) to establish a modular maritime security lab. The objective is to raise awareness of the risks of inadequate cybersecurity at sea and to help in the development of defensive solutions against cyberattacks. The lab will simulate cyberattacks on ships to help researchers discover novel ways to detect and defend against such attacks. This article continues to discuss the importance of protecting ships from cyberattacks and the initiative aimed at improving maritime system cybersecurity.

    Fraunhofer reports "Maritime Security Lab: Bringing Better IT Security on Board"

  • news

    Visible to the public "New KEKW Malware Infects Open-Source Python Wheel Files via a PyPI Distribution"

    Malicious open-source Python .whl (Wheel) files were distributing a new malware called KEKW, which can steal sensitive data from infected systems by combining clipper activities with infostealers to take over cryptocurrency transactions. Cyble Research and Intelligence Labs (CRIL) noted that the Python packages under investigation were absent from the actual Python Package Index (PyPI) repository, suggesting that the Python security team removed the malicious packages. CRIL also confirmed with the Python security team that the malicious packages were removed within 48 hours of their upload. Due to the quick removal of the malicious packages, CRIL said it is impossible to determine how many people downloaded them. However, they suspect that the incident's impact was likely minimal. The incident highlights a persistent issue within the open-source community. PyPI has become a popular repository for software packages using Python. As developers use it to share and download Python code, PyPI has become an attractive target for threat actors seeking to attack developers due to its pervasive adoption. This article continues to discuss the new KEKW malware and its distribution via malicious open-source Python .whl files.

    SC Magazine reports "New KEKW Malware Infects Open-Source Python Wheel Files via a PyPI Distribution"

  • news

    Visible to the public "Facebook Warns of a New Information-Stealing Malware Dubbed NodeStealer"

    NodeStealer is a new malware that steals information and is distributed on Meta. It can steal browser cookies to hijack accounts on multiple platforms, including Facebook, Gmail, and Outlook. The malware was first discovered targeting Windows browsers in late January 2023. It is capable of targeting multiple web browsers, including Chrome, Edge, Brave, and Opera. NodeStealer is a custom JavaScript malware that bundles the Node.js environment, according to the researchers. The author uses Node.js to enable the execution of malware on multiple operating systems. The infostealer is suspected to be the work of threat actors in Vietnam. Meta, the parent company of Facebook, took action to thwart the malware campaign and help victims with account recovery. The malware is disguised as PDF and XLSX files, and their filenames were selected to lure victims into opening them, thereby initiating the infection process. This article continues to discuss the new information-stealing malware NodeStealer being distributed on Meta.

    Security Affairs reports "Facebook Warns of a New Information-Stealing Malware Dubbed NodeStealer"

  • news

    Visible to the public "OpenAI Flaw Allows Unlimited Credit on New Accounts"

    OpenAI offered free credits to users interested in trying its open Artificial Intelligence (AI) projects. However, Checkmarx discovered a vulnerability that allowed users to abuse the trial and get unlimited credit on new accounts. The researchers were able to circumvent restrictions by intercepting and modifying an OpenAI Application Programming Interface (API) request. According to the researchers, this allowed them to create a number of user accounts using the same phone number, receiving as many free credits as they desired. A user had to enter their email address, click on the activation link sent to their inbox, enter a phone number, and then enter the validation code received via SMS in order to register for the trial. Both the user's email address and phone number had to be unique for them to receive free credits. Researchers found it difficult to bypass the phone number limitation. They attempted to alter the phone number subtly, such as by adding the country code. Ultimately, they avoided the requirement by using multiple variants of the same phone number. This article continues to discuss the flaw that allowed Checkmarx researchers to get unlimited credits for testing different OpenAI projects such as ChatGPT.

    Cybernews reports "OpenAI Flaw Allows Unlimited Credit on New Accounts"

  • news

    Visible to the public "Cybercrime Groups Find a New Target: Religious Institutions"

    Two well-known hacking groups have claimed responsibility for recent attacks on religious organizations, which is a departure from their usual focus on businesses and government agencies. The infamous LockBit ransomware group has added Relentless Church to its list of victims, alleging to have stolen employee information, including passports and financial documents. The South Carolina-based evangelical megachurch has over 15,000 members and more than 100,000 online viewers during streamed services. The data extortion group Karakurt claimed responsibility for an attack on Our Sunday Visitor, a Catholic publishing company that writes newsletters, religious books, pamphlets, and more. The organization was founded in 1912 and has grown from a parish news bulletin to a publisher of a wide variety of content for Catholics. Karakurt hackers claimed to have stolen 130 GB of data, including accounting documents, human resources information, employee data, financial contracts, invoices, and more. Several experts have noted that it was uncommon for hackers to target religious institutions, citing examples in which groups have expelled members for targeting such organizations deemed off-limits. This article continues to discuss the LockBit ransomware group and the data extortion group Karakurt claiming recent attacks on religious organizations.

    The Record reports "Cybercrime Groups Find a New Target: Religious Institutions"

  • news

    Visible to the public "Brightline Hack Exposes Data of Over 780,000 Child Mental Health Patients"

    Pediatric mental health provider Brightline has recently warned patients that it suffered a data breach on January 30, impacting 783,606 people. Brightline said the breach was related to a zero-day vulnerability in its Fortra GoAnywhere MFT secure file-sharing platform. Through its investigation, Fortra states that it identified a previously-unknown vulnerability which an unauthorized party used to gain access to certain Fortra customers' accounts and download files, including Brightline's. Brightline said its investigation determined the incident was limited to the Fortra service and did not impact its network. However, the data stolen from the breach included patients' confidential information. Data impacted could consist of some combination of the following data elements: individuals' names, addresses, dates of birth, member identification numbers, date of health plan coverage, and/or employer names. According to Bleeping Computer, these attacks were conducted by the Clop ransomware gang using the command injection vulnerability CVE-2023-0669.

    Infosecurity reports: "Brightline Hack Exposes Data of Over 780,000 Child Mental Health Patients"

  • news

    Visible to the public "Cisco Warns of Critical Vulnerability in EoL Phone Adapters"

    Cisco recently raised the alarm on a critical remote code execution (RCE) vulnerability impacting SPA112 2-Port phone adapters, which have reached end-of-life (EoL) status. Tracked as CVE-2023-20126 (CVSS score of 9.8), the flaw impacts the web-based management interface of the phone adapters and can be exploited without authentication. Cisco noted that the issue exists because of "a missing authentication process within the firmware upgrade function." To exploit the bug, a remote attacker needs to upgrade a device to a crafted firmware version, which would allow them to execute arbitrary code with full privileges. Cisco stated that given that the SPA112 2-Port phone adapters are no longer supported (they reached EoL on June 1, 2020), it does not plan to release firmware updates to address the vulnerability. Instead, the tech giant recommends that customers migrate to an ATA 190 Series analog telephone adapter. Cisco says it is not aware of the vulnerability being exploited in malicious attacks. However, unpatched, vulnerable Cisco devices are known to have been exploited in the wild, and organizations should consider eliminating the SPA112 2-Port phone adapters from their environments as soon as possible.

    SecurityWeek reports: "Cisco Warns of Critical Vulnerability in EoL Phone Adapters"

  • news

    Visible to the public "Apple Releases First-Ever Security Updates for Beats, AirPods Headphones"

    Apple has recently released the first-ever security updates for its Beats and AirPods products to patch a vulnerability that can be exploited to gain access to headphones through a Bluetooth attack. The flaw is tracked as CVE-2023-27964, and it was reported to Apple by Yun-hao Chung and Archie Pusaka of Google ChromeOS. The vulnerability has been described as an authentication issue. Apple noted that when your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones. The firmware update for AirPods (5E133), including the Pro and Max models, was made available on April 11, while the Beats firmware update (5B66), including for Powerbeats Pro and Beats Fit Pro, was released on May 2. Apple stated that firmware updates are delivered automatically to AirPods and Beats headphones while they are charging and in Bluetooth range of the user's iPhone, iPad, or Mac. Users can check whether their headset is running the latest firmware version.

    SecurityWeek reports: "Apple Releases First-Ever Security Updates for Beats, AirPods Headphones"

  • news

    Visible to the public "UCSB to Lead NSF-Funded Research Institute for Next-Level AI-Powered Cybersecurity"

    The Institute for Agent-based Cyber Threat Intelligence and Operation (ACTION), funded by the National Science Foundation (NSF), is composed of the top US computer scientists and engineers. It combines the continuous learning and reasoning of Artificial Intelligence (AI) with the situational awareness fundamental to cybersecurity. The ACTION Institute includes more than 20 collaborators from UC Santa Barbara, UC Berkeley, Purdue University, Georgia Tech, the University of Chicago, the University of Washington, and more. According to Dimitri Kusnezov, the Under Secretary for Science and Technology at the Department of Homeland Security (DHS), the ACTION Institute will help accurately assess the opportunities and risks posed by AI technology, as well as its impact on DHS missions. The aim of this group of researchers to push the boundaries of fundamental AI and implement new insights represents a major investment in cybersecurity defense. Building a joint human-AI system that complements each other's capabilities, such as presenting a human expert with risk-reward options derived from an AI-learned model, is one of the ways the ACTION Institute will be at the forefront of AI-cybersecurity research. The realization that security systems can be viewed as a stage where multiple agents interact, each with their own motivations, objectives, and abilities, will inform the institute's approach to cybersecurity. When designing security systems, one must consider how one agent's actions will influence the behavior of another agent. This type of reasoning is required to ensure that the protection mechanisms used to defend a system against a particular type of attack do not inadvertently introduce a new vulnerability. This article continues to discuss the new NSF-funded ACTION Institute.

    The University of California, Santa Barbara reports "UCSB to Lead NSF-Funded Research Institute for Next-Level AI-Powered Cybersecurity"

  • news

    Visible to the public "OSU Research Shows How Hackers Can Target Smart Meters to Destabilize Electricity Grid"

    Researchers from the Oregon State University (OSU) College of Engineering have demonstrated that hackers can destabilize a power transmission grid by manipulating smart meters to cause an oscillation in electricity demand. A smart meter is a digital device that captures electricity usage data and transmits it via a telecommunications connection to a local utility. The meters can be used to remotely shut off customers' power, such as in the case of unpaid bills, as well as to provide customers with more information about their electricity consumption. Similar to circuit breakers in a home's electrical panel, power grid components can "trip" and shut off when demand or load is excessive or otherwise problematic. The load is then transferred to other grid network components, which may also shut down, creating the potential for a domino effect that can cause a blackout. In this study, conducted with OSU College of Engineering associate professor Jinsub Kim, researchers used a time-domain grid protection simulator model to show how a load oscillation attack can compromise transmission. This article continues to discuss the research on load oscillating attacks on smart grids.

    Oregon State University reports "OSU Research Shows How Hackers Can Target Smart Meters to Destabilize Electricity Grid"

  • news

    Visible to the public "AMD TPM Exploit: faulTPM Attack Defeats BitLocker and TPM-Based Security"

    A newly published paper by security researchers at the Technical University of Berlin reveals that AMD's firmware-based Trusted Platform Module (fTPM/TPM) can be fully compromised using a voltage fault injection attack, allowing full access to the cryptographic data stored within the fTPM. The attack dubbed 'faulTPM' ultimately enables an adversary to completely compromise any application or encryption, such as BitLocker, that relies solely on TPM-based security. To attack AMD's Platform Security Processor (PSP) in Zen 2 and Zen 3 chips, the researchers used off-the-shelf components that cost around $200. The attack requires physical access to the machine for 'several hours.' The researchers' report does not specify whether Zen 4 CPUs are vulnerable. This article continues to discuss the faulTPM attack that can defeat BitLocker and TPM-based security.

    Tom's Hardware reports "AMD TPM Exploit: faulTPM Attack Defeats BitLocker and TPM-Based Security"

  • news

    Visible to the public "US Authorities Dismantle Dark Web Card Checking Platform"

    The US government recently claimed it had dismantled another popular cybercrime service after unsealing a four-count indictment against its alleged Russian operator. Try2Check played a vital role in the online fraud supply chain by enabling cybercriminals who bought stolen cards on underground sites to test how many were still active and could therefore be used to commit fraud. According to the US Attorney's Office, the site processed a minimum of tens of millions of cards each year since it was founded in 2005 and supported carding shops like the infamous Joker's Stash that made hundreds of millions of dollars in profits annually. Try2Check's websites have now been taken offline, and the State Department has issued a $10m reward for information leading to the capture of the man accused of running the platform. Russian resident Denis Gennadievich Kulkov (aka "Kreenjo," "Nordex," and "Nordexin") is accused of access device fraud, computer intrusion, and money laundering in connection with Try2Check. If found and convicted, he could face a 20-year stretch behind bars.

    Infosecurity reports: "US Authorities Dismantle Dark Web Card Checking Platform"

  • news

    Visible to the public "Meta Expunges Multiple APT, Cybercrime Groups From Facebook, Instagram"

    Meta, the parent company of Facebook, announced that it thwarted the activities of three Advanced Persistent Threat (APT) groups in South Asia engaged in cyber espionage and six adversarial groups from different global regions involved in "inauthentic behavior" on Facebook and other social networks. According to the company, the takedown of these and other activities on the company's platforms indicates consistent and globally dispersed exploitative behavior by threat actors who leverage online platforms to create intricate social-engineering campaigns to lure and exploit Internet users. Meta reports that in most instances, threat actors use Facebook and other social networking and media platforms, such as Twitter, Telegram, YouTube, Medium, TikTok, and Blogspot, to make numerous fake online accounts and personas. According to Meta, the attackers used fake identities, such as job recruiters, journalists, and even military personnel, to gain the trust of users and legitimate entities so they could engage in malicious threat activity. In its recently released Quarterly Adversarial Threat Report, Meta described these incidents and the steps it is taking to mitigate security threats that leverage its platforms. This article continues to discuss Meta's removal of three APTs and six potentially cybercriminal networks from its platforms.

    Dark Reading reports "Meta Expunges Multiple APT, Cybercrime Groups From Facebook, Instagram"

  • news

    Visible to the public "ChatGPT and Other AI-Themed Lures Used to Deliver Malicious Software"

    According to Check Point researchers, from the beginning of 2023 until the end of April, one out of every 25 newly created domains related to ChatGPT or OpenAI was malicious or potentially malicious. In addition, Meta has stated that, since March 2023, they have prevented the sharing of over 1,000 malicious links using ChatGPT as a lure across their platforms. Typically, threat actors hide malware within files that appear harmless and offer nonexistent ChatGPT desktop and mobile apps or browser extensions in official app stores. Fake ChatGPT Chrome extensions that steal Facebook session cookies to compromise personal and business Facebook accounts are common. Threat actors may customize their malware to a specific online platform, including incorporating more sophisticated account compromise techniques than expected from common malware. Malware families have been observed attempting to circumvent two-factor authentication (2FA) or automatically scanning for and detecting connections between a compromised account and a business account. The malware they use, such as DuckTail, NodeStealer, and others, are after almost any login credentials or session cookies they can get, which they will use to take over accounts on various social media platforms and online services in order to spread and host malware. This article continues to discuss key findings on the malware threat landscape.

    Help Net Security reports "ChatGPT and Other AI-Themed Lures Used to Deliver Malicious Software"

  • news

    Visible to the public "Hackers Start Using Double DLL Sideloading To Evade Detection"

    An Advanced Persistent Threat (APT) group known as Dragon Breath, Golden Eye Dog, or APT-Q-27 demonstrates a new trend of evading detection by using multiple complex variations of the classic DLL sideloading technique. These attacks begin with an initial vector that uses a clean application, such as Telegram, that sideloads a second-stage payload, which is sometimes also clean, and then sideloads a malicious malware loader DLL. Trojanized versions of Telegram, LetsVPN, and WhatsApp apps for Android, iOS, and Windows, supposedly localized for Chinese users, are used to lure victims. It is believed that BlackSEO or malvertising was used to promote the malicious apps. According to Sophos analysts who have observed the threat actor's recent attacks, Chinese-speaking Windows users in China, Japan, Taiwan, Singapore, Hong Kong, and the Philippines are the primary targets of this campaign. This article continues to discuss the use of double DLL sideloading by the Dragon Breath APT hacking group.

    Bleeping Computer reports "Hackers Start Using Double DLL Sideloading To Evade Detection"

  • news

    Visible to the public "Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware Tactics"

    After more than six months of inactivity, the Chinese state-sponsored cyber group Earth Longzhi has reemerged with a new campaign targeting government, healthcare, technology, and manufacturing entities in Taiwan, Thailand, the Philippines, and Fiji. Trend Micro linked the intrusion set to the cyber espionage group Earth Longzhi, which is a subgroup of APT41, also known as HOODOO or Winnti, and overlaps with Earth Baku, SparklingGoblin, and GroupCC. The cybersecurity company first documented Earth Longzhi in November 2022, detailing its attacks against numerous organizations in East and Southeast Asia and Ukraine. Attack chains conducted by the threat actor involve vulnerable public-facing applications as entry points to deploy the BEHINDER web shell, and then leverage this access to drop additional payloads, including a new variant of a Cobalt Strike loader known as CroxLoader. This article continues to discuss the resurfacing of the Chinese state-sponsored hacking group Earth Longzhi.

    THN reports "Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware Tactics"