News Items

  • news

    Visible to the public "Chrome 113 Released With 15 Security Patches"

    Google recently announced the release of Chrome 113 to the stable channel with 15 security fixes, including patches for 10 vulnerabilities reported by external researchers. The latest Chrome update only resolves medium and low severity flaws. Google noted that even if none of the externally reported flaws was severe, they still paid over $30,000 in bug bounty rewards to the reporting researchers. The highest reward was handed out for a medium severity inappropriate implementation flaw in Prompts. The researcher earned $7,500 for reporting this issue, which is tracked as CVE-2023-2459. Four other medium severity inappropriate implementation bugs also addressed in this browser release were identified in Chrome components such as Prompts, Screen Mode, PictureInPicture, and CORS. Google noted that Chrome 113 resolves two other medium severity bugs, namely an insufficient validation of untrusted input vulnerability in Extensions (awarded a $5,000 bug bounty) and a use-after-free flaw in OS inputs (rewarded with a $4,000 bounty). The remaining three externally reported issues were low severity inappropriate implementation vulnerabilities impacting Prompts and PictureInPicture. The latest browser iteration is now rolling out as Chrome version 113.0.5672.63 for Linux and macOS and as Chrome versions 113.0.5672.63/.64 for Windows.

    SecurityWeek reports: "Chrome 113 Released With 15 Security Patches"

  • news

    Visible to the public "Netgear Vulnerabilities Lead to Credentials Leak, Privilege Escalation"

    Security researchers at Flashpoint have discovered that vulnerabilities in Netgear's NMS300 ProSAFE network management system allow attackers to retrieve cleartext credentials and escalate privileges. The tool provides users with a web-based interface for network device management. It uses TCP port 8080 for communication and supports administrator accounts and lower-privileged operator and observer account roles. The researchers noted that a user with an observer account could only view and monitor network functions, but the issues identified in the product allow an attacker to gain administrative access to devices, starting from this low-privileged role. Netgear NMS300 allows administrators to manage user accounts from a "User management" tab, where an observer account can only view information about other users, such as username, account type, contact details, and more. The researchers discovered that when the "User management" tab is accessed, the system sends two requests, one to initiate the page and another to retrieve user information to populate the page. The first identified vulnerability exists because, with the second request, an SQL query is made in the background to retrieve database information, and the response contains every user account stored in the database. The problem is that as everything stored in the database table is returned, this includes the cleartext passwords for every single account. The researchers noted that by exploiting this vulnerability, an attacker with access to a low-privileged account could retrieve the credentials for administrator accounts and then log into the web-based management interface using those credentials, which would provide them with access to all managed devices. The second issue exists because when a user with an observer account accesses the "User management" tab, the system performs insufficient checks to determine the permissions that the user has. The researchers noted that because these checks "do not restrict the individual HTTP requests sent to the system," an attacker can bypass restrictions by sending crafted requests to change the password of an administrator account and then log in to the system using the modified credentials, gaining administrative access.

    SecurityWeek reports: "Netgear Vulnerabilities Lead to Credentials Leak, Privilege Escalation"

  • news

    Visible to the public "Three-Quarters of Firms Predict Breach in Coming Year"

    According to new research by Trend Micro, most global organizations anticipate suffering a data breach or cyberattack in the next 12 months. The security vendor's Cyber Risk Index (CRI), compiled every six months, was compiled from interviews with 3729 global organizations. The index itself is based on a numerical scale of -10 to 10, with -10 representing the highest level of risk. It is calculated by subtracting the score for cyber threats from the score for cyber preparedness. The researchers stated that a risk index score of +0.01 for the second half of 2022 is the first time the index has moved into positive territory. The researchers noted that organizations may be taking steps to improve their cyber preparedness. Despite the positive direction of travel in risk scoring, most responding organizations are pessimistic about the year ahead. Most said it was "somewhat to very likely" that they would suffer a breach of customer data (70%) or IP (69%) or a successful cyberattack (78%). These figures have declined only between 1 and 7% from the previous study. Respondents pointed to both negligent insiders and mobile users and a lack of trained staff as a key cause of concern going forward. Alongside cloud infrastructure and virtual computing environments, these comprised the top five infrastructure risks.

    Infosecurity reports: "Three-Quarters of Firms Predict Breach in Coming Year"

  • news

    Visible to the public "US, Ukraine Shut Down Cryptocurrency Exchanges Used by Cybercriminals"

    Authorities in the United States and Ukraine have recently shut down nine websites offering cryptocurrency exchange services to cybercriminals. The takedowns are the result of cooperation between the FBI, its Virtual Currency Response Team (VCRT), the National Police of Ukraine, and Ukraine's Prosecutor General. The targeted domains, which now display a message informing visitors that they have been seized, are 24xbtc[.]com, 100btc[.]pro, pridechange[.]com, 101crypta[.]com, uxbtc[.]com, trust-exchange[.]org, bitcoin24[.]exchange, paybtc[.]pro, and owl[.]gold. The authorities claimed they had not only seized the domains but also shut down associated servers, including ones located in the United States. The DoJ noted that the targeted cryptocurrency exchanges were advertised on crime forums and offered support in both English and Russian. In many cases, the illegal currency exchange services were used by ransomware groups, as well as other types of scammers. Ukrainian police said they are currently trying to identify the individuals involved in the criminal activity.

    SecurityWeek reports: "US, Ukraine Shut Down Cryptocurrency Exchanges Used by Cybercriminals"

  • news

    Visible to the public "Dark Web Bust Leads to Arrest of 288 Suspects"

    International police have recently arrested nearly 300 individuals on suspicion of buying or selling drugs on the underground marketplace Monopoly Market. Operation SpecTor also led to the seizure of $53m in cash and virtual currency, 850kg of drugs, and 117 firearms. According to Europol, among the drugs haul were 258kg of amphetamines, 43kg of cocaine, 43kg of MDMA, and over 10kg of LSD and ecstasy pills. The operation involved police in Austria, France, Germany, the Netherlands, Poland, Brazil, the UK, the US, and Switzerland. The majority of arrests apparently took place in the US (153), UK (55), and Germany (52), with several suspects identified as high-value targets. Europol noted that following a secret police takedown of the market in 2021, investigators were able to obtain Monopoly Market vendors' buyer lists, meaning thousands more individuals worldwide are now also at risk of prosecution.

    Infosecurity reports: "Dark Web Bust Leads to Arrest of 288 Suspects"

  • news

    Visible to the public "South Korean Lures Used to Deploy ROKRAT Malware"

    Security researchers at Check Point Research have discovered that the North Korean threat actor known as APT37 has been changing deployment methods and using South Korean foreign and domestic affairs-themed lures with archives containing Windows shortcut (LNK) files that initiate ROKRAT infection chains. The researchers stated that their findings suggest that various multi-stage infection chains used to eventually load ROKRAT were utilized in other attacks, leading to the deployment of additional tools affiliated with the same actor. Those tools include another custom backdoor, Goldbackdoor, and the commodity malware Amadey. The researchers noted that ROKRAT infection chains, first spotted in 2017, historically involved a malicious Hangul Word Processor (HWP) document with an exploit or a Microsoft Word document with macros. While some ROKRAT samples still use these techniques, the researchers observed a shift to delivering ROKRAT with LNK files disguised as legitimate documents. The researchers noted that this shift is not exclusive to ROKRAT but represents a larger trend that became very popular in 2022. In July of that year, Microsoft began blocking macros in Office applications by default in an effort to minimize the spread of malware. The researchers stated that, technically, ROKRAT mainly focuses on running additional payloads designed for data exfiltration. It relies on cloud infrastructure for C&C functions, including DropBox, pCloud, Yandex Cloud, and OneDrive. ROKRAT also collects information about the machine to prevent further infection of unintended victims.

    Infosecurity reports: "South Korean Lures Used to Deploy ROKRAT Malware"

  • news

    Visible to the public "Hackers Exploit High Severity Flaw in TBK DVR Camera System"

    According to security researchers at Fortinet, a five-year-old vulnerability in TBK's DVR camera system (CVE-2018-9995) has been exploited in the wild in April 2023. The High severity flaw derives from an error the camera experiences when handling a maliciously crafted HTTP cookie. The researchers noted that a remote attacker might exploit this flaw to bypass authentication and obtain administrative privileges, eventually leading to access to camera video feeds. The researchers explained that they noticed a spike of more than 50,000 attempted attacks on these devices with unique IPS (intrusion prevention systems) detections last month. Despite the vulnerability being first discovered in 2018, a patch for it may not yet be available. The researchers stated that they are unaware of any patches provided by the vendor and recommend organizations to review installed models of CCTV camera systems and related equipment for vulnerable models. According to TBK's website, there are currently 600,00 cameras, 50,000 CCTV recorders, and 300,000 accessories installed worldwide across banking, retail, government, and other sectors, making the attack surface for the vulnerability particularly wide.

    Infosecurity reports: "Hackers Exploit High Severity Flaw in TBK DVR Camera System"

  • news

    Visible to the public "Bitmarck Halts Operations Due to Cybersecurity Breach"

    German IT service provider Bitmarck has recently confirmed that it brought all of its customer and internal systems offline due to a cyberattack discovered over the weekend. The company stated that in compliance with their security protocol, they have taken down customer and internal systems from the grid in a controlled manner and conducted an impact analysis. Bitmarck also added that it does not believe customer data was impacted due to the breach. The company stated that the patient data stored in the ePA [electronic patient file] was not at risk during the attack and remains secure. According to Coalfire vice president Andrew Barratt, however, signs of data theft are often challenging to determine. Barratt noted that the big concern would be if the Bitmarck infrastructure has been leveraged to move laterally into other healthcare environments. Since the breach, Bitmarck said it restored access to some services, including the digital processing of electronic incapacity certificates (eAU) and access to ePA. Still, the tech giant clarified that there would be considerable restrictions in day-to-day business for the foreseeable future as entire data centers have been disconnected from the network since the attack.

    Infosecurity reports: "Bitmarck Halts Operations Due to Cybersecurity Breach"

  • news

    Visible to the public "UK Gun Owners May Be Targeted After Rifle Association Breach"

    The National Smallbore Rifle Association has recently warned members of possible follow-on fraud and cybercrime after its IT systems were breached. The association is working with the UK's South East Regional Organised Cybercrime Unit (SEROCU) to investigate the incident. The association noted that all their IT systems are fully operational, no funds have been lost, and they will communicate fully with their members after the police investigation. The company confirmed that this attack had not affected the membership portal, which remains secure. The cyberattack targeted legacy servers that contained working documents, not a full database. At this time, the company noted that it cannot say exactly who this affects as they have no access to the servers.

    Infosecurity reports: "UK Gun Owners May Be Targeted After Rifle Association Breach"

  • news

    Visible to the public "T-Mobile Reveals Second Breach of the Year"

    T-Mobile USA has recently begun notifying customers impacted by another breach at the firm, which may have resulted in a significant volume of compromised personal and account data. The company said in a breach notification letter that its own systems flagged the unauthorized intrusion in March. A malicious actor had access to hundreds of customer accounts between late February and March 2023. Although no financial information or call record data was taken, those affected will need to pay careful attention to follow-on fraud attempts. The company noted that the information obtained for each customer varied but may have included full name, contact information, account number and associated phone numbers, T-Mobile account PIN, social security number, government ID, date of birth, balance due, internal codes that T-Mobile uses to service customer accounts (for example, rate plan and feature codes), and the number of lines. T-Mobile said it has already reset impacted customers' T-Mobile account PIN and is offering two years of free credit monitoring and identity theft detection services.

    Infosecurity reports: "T-Mobile Reveals Second Breach of the Year"

  • news

    Visible to the public "High-Tech Toolkit to Analyze Digital Evidence Made More Efficient and Budget-Friendly for Law Enforcement Agencies"

    Purdue University has upgraded its Toolkit for Selective Analysis and Reconstruction of Files (FileTSAR+) to be easier and more cost-effective to set up and maintain. It can be used by law enforcement agencies that reconstruct and analyze digital evidence to solve crimes. FileTSAR+ enables selective reconstruction and analysis of multiple data types, including documents, images, email, and Voice over Internet Protocol (VoIP) sessions for large-scale computer networks. The toolkit was developed by a team led by Kathryn Seigfried-Spellar, an associate professor of computer and Information Technology (IT) at Purdue Polytechnic Institute. The team includes Marcus Rogers, John Springer, and Baijian Yang, all professors of computer and IT at Purdue Polytechnic Institute. Rogers is also the director of the Cybersecurity and Forensics Lab at Purdue. Seigfried-Spellar noted that law enforcement agency feedback prompted enhancements. As a first step toward improving the toolkit, the team eliminated the ability to capture digital evidence, as law enforcement agencies have already captured the data they need but lack a way to process and reconstruct files. Eliminating the ability to capture digital evidence has made FileTSAR+ significantly more resource efficient. The team's second step was to repackage the toolkit from an open-source, virtual machine-based system with a 15-step process to a single-step process that allows users to download and execute files on a laptop. The National Institute of Justice provided funding for the development of the toolkit, which was beta-tested by certified digital forensic examiners from the National White Collar Crime Center and the Tippecanoe County High Tech Crime Unit. This article continues to discuss FileTSAR+.

    Purdue University reports "High-Tech Toolkit to Analyze Digital Evidence Made More Efficient and Budget-Friendly for Law Enforcement Agencies"

  • news

    Visible to the public "Russian Hackers KillNet Executed a Cyber Attack on European Air Traffic Control Agency Eurocontrol"

    The pro-Russian hacking group KillNet launched a cyberattack against Europe's air traffic control agency. According to the European Organization for the Safety of Air Navigation (EOSAN), also known as Eurocontrol, the attack caused interruptions to its website and web availability but did not compromise the air traffic control agency's internal systems, and the safety of air navigation was not at risk. Eurocontrol coordinates air traffic in 41 countries. The KillNet group has claimed responsibility for the incident and threatened to disrupt the agency's operations for 100 hours. KillNet carries out Distributed Denial-of-Service (DDoS) attacks against organizations. This is not the first time the group has targeted the aviation industry as it launched DDoS attacks against Chicago O'Hare International Airport (ORD), Denver International Airport (DIA), Hartsfield-Jackson Atlanta International Airport (ATL), Denver International Airport (DIA), Los Angeles International Airport (LAX), Orlando International Airport (MCO), and Phoenix Sky Harbor International Airport (PHX) in October 2022. More than two dozen European airports have endured the brunt of KillNet's cyberattacks, intended to cause discomfort and incite public opposition to their governments for helping Ukraine. This article continues to discuss the KillNet cyberattack faced by Eurocontrol and other attacks launched by the group against the aviation industry.

    CPO Magazine reports "Russian Hackers KillNet Executed a Cyber Attack on European Air Traffic Control Agency Eurocontrol"

  • news

    Visible to the public "Radware Report Sees Religion Fueling More DDoS Attacks"

    According to a report published by Radware, in just two months, hacktivists claimed to have launched over 1,800 Distributed Denial-of-Service (DDoS) attacks in an effort to advance various political and religious causes. The analysis of claims made on social media sites from February 18 and April 18 of 2023 revealed that while hacktivism increased at the beginning of the war in Ukraine, religious groups continue to launch more DDoS attacks. Pascal Geenens, director of threat intelligence at Radware, stated that Muslim-affiliated groups have been particularly active, with Anonymous Sudan, Mysterious Team, and Team Insane PK, ranking among the top four DDoS claimants. These four were followed by the pro-Russia hacktivist group NoName057(16), which accounted for 30 percent of all threat actors claiming credit for DDoS attacks. In the long term, organizations should expect that the number of DDoS attacks they face will only increase, either directly or as a result of being associated with other issues. Geenens noted that organizations operating in a particular country could be subjected to DDoS attacks because of politics or issues in which they are only tangentially involved. This article continues to discuss religion fueling DDoS attacks as well as the growth in such attacks.

    Security Boulevard reports "Radware Report Sees Religion Fueling More DDoS Attacks"

  • news

    Visible to the public "UNSW Calls on Government to Protect Bug Bounty Hunters"

    According to the University of New South Wales (UNSW), Australia's current cybersecurity consultations offer an opportunity to protect vulnerability researchers. The university's Allen Lab and its business school's regulatory laboratory argue in a response to the "2023-2030 Australian Cyber Security Strategy Discussion Paper" that there is currently no protection for those acting in good faith in a vulnerability disclosure program. As a result, according to the submission, a crime could be committed even if a person believes they are engaging in a vulnerability disclosure program. Their actions may not be authorized under the terms of that vulnerability disclosure program. It is also possible that someone engaging in a vulnerability disclosure program may accidentally commit a crime due to a misunderstanding of the program's rules. According to the submission, protecting bug hunters would require federal and state laws. This article continues to discuss UNSW's call on the Australian government to protect bug bounty hunters.

    iTNews reports "UNSW Calls on Government to Protect Bug Bounty Hunters"

  • news

    Visible to the public "Zscaler ThreatLabz Finds Alarming Growth in Phishing Attacks"

    A new threat analysis report released by the cloud security provider Zscaler reveals patterns in the growth of phishing attacks in 2022. Based on data including 280 million transactions and an analysis of eight billion attempted attacks, the report found a 47 percent increase in phishing attacks in 2022. Attackers are using newer tools, such as Artificial Intelligence (AI), to strike organizations with inadequate security mechanisms. Phishing scams are a growing problem, and threat actors' methods are becoming more complex, thus making them more difficult to detect and thwart, according to the report. The number of attacks against the education sector has increased more than fivefold. Attackers have also shifted away from exploits associated with the coronavirus pandemic. According to the report, COVID-themed attacks accounted for 7.2 percent of phishing schemes in 2021, but just 3.7 percent in 2022. Additionally, the US remains the most targeted country for phishing attacks, a position it has traditionally held, with more than 65 percent of all phishing attempts occurring in the country. Some of the most commonly used techniques are SMS phishing, which applies voicemail-related phishing (vishing) to trick victims into opening malware attachments. Another commonly encountered approach is the use of sophisticated adversary-in-the-middle (AiTM) attacks that can help hackers circumvent multi-factor authentication (MFA) security. This article continues to discuss key findings from Zscaler's phishing report.

    MeriTalk reports "Zscaler ThreatLabz Finds Alarming Growth in Phishing Attacks"

  • news

    Visible to the public "Report Shows 92% Of Orgs Experienced an API Security Incident Last Year"

    Data Theorem, an application security provider, has announced the release of a new report in collaboration with TechTarget's Enterprise Strategy Group (ESG). ESG surveyed 397 people on cloud-native applications and Application Programming Interface (API) security and discovered that 92 percent of organizations had at least one API-related security incident in the last 12 months. The report also revealed that 57 percent of organizations encountered several API security incidents, suggesting that many organizations still have a long way to go in protecting cloud-native applications and APIs from threat actors. This report comes just months after a hacker used a Twitter API vulnerability to collect and leak 235 million users' account details and email addresses in January 2023. The transient nature of the attack surface was one of the major problems revealed by the research. For example, 75 percent of organizations change or update their APIs on a daily or weekly basis, which introduces new vulnerabilities for security teams. This rapid rate of change creates shadow APIs and zombie APIs. However, many organizations plan to increase their spending on API security tools, Cloud-Native Application Protection Platforms (CNAPPs), and more over the next 12-18 months to bolster API security. This article continues to discuss key findings from the report on securing the API attack surface.

    VB reports "Report Shows 92% Of Orgs Experienced an API Security Incident Last Year"

  • news

    Visible to the public "UK Pension Funds Warned to Check on Clients' Data After Capita Breach"

    Hundreds of pension funds in the UK have been instructed to check whether their clients' data was stolen due to the Capita breach in March. Capita, the country's largest outsourcing firm, has contracts to manage the payment systems for pension funds used by more than 4 million people in the UK. Following the publication of sensitive data referencing home addresses and passport photos by the Black Basta ransomware gang, the company confirmed that it was investigating the release of the data allegedly stolen by the ransomware group. The Pensions Regulator has written to hundreds of pension funds, requesting that trustees contact Capita to find out if their data has been compromised. Capita has verified that there are currently some signs of limited data exfiltration from a small proportion of the impacted server estate, which could include customer, supplier, or colleague data. This article continues to discuss the Capita breach and UK pension funds being told to check on whether their clients' data had been stolen because of the breach.

    The Record reports "UK Pension Funds Warned to Check on Clients' Data After Capita Breach"

  • news

    Visible to the public "Hacking Caused 80% of Healthcare Data Breaches in 2022"

    Healthcare system hacking is a major concern, and healthcare organizations must take proactive measures to protect themselves from such attacks. Following a 250 percent increase in breach numbers between 2011 and 2021, the Fortified Health Security 2023 Horizon Report found that the number of breaches decreased slightly in 2022. However, according to the IBM 2022 Cost of a Data Breach report, the healthcare industry is still the most costly for a breach, with an average cost of $10.1 million for the twelfth year in a row. Despite a declining trend in breaches, hacking remains a major problem. According to Fortified Health, 78 percent of data breaches in 2022 were caused by hacking and Information Technology (IT) incidents, up from 45 percent in 2018. Unauthorized access, the second most common cause, was responsible for 38 percent of incidents in 2018 but now accounts for 16 percent. Theft, loss, and poor data disposal were also cited as causes. This article continues to discuss hacking being the biggest threat to healthcare, why cybercriminals target healthcare, and how healthcare organizations can reduce the risk of hacking.

    Security Intelligence reports "Hacking Caused 80% of Healthcare Data Breaches in 2022"

  • news

    Visible to the public "CISA Asks for Public Opinion on Secure Software Attestation"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has recently announced that proposed guidance for secure software development is now open to public review and opinion. For 60 days, the public can provide feedback on the draft self-attestation form for secure software development, which requires the providers of software for the government to confirm that specific security practices have been implemented. CISA stated that the self-attestation form has been drafted in line with the requirements of Memorandum M-22-18 (Enhancing the Security of the Software Supply Chain through Secure Software Development Practices) that the Office of Management and Budget (OMB) released in September 2022. CISA noted that this self-attestation form identifies the minimum secure software development requirements a software producer must meet and attest to meeting before their software subject to the requirements of M-22-18 may be used by Federal agencies. Per M-22-18's requirements, federal agencies may use specific software only if the developer has attested compliance with government-issued guidance on software supply chain security. The self-attestation requirement applies to software produced after September 14, 2022, to software-as-a-service products and other software receiving continuous code changes and to existing software when major version changes occur. Software developed by the federal agencies and freely available software used by the agencies does not fall in scope for M-22-18 and does not require self-attestation. CISA stated that software producers who utilize freely obtained elements in their software are required to attest that they have taken specific steps to minimize the risks of relying on such software in their products. Suppose a software producer cannot provide a completed self-attestation form. In that case, federal agencies are required to obtain documentation on development practices, to document measures taken to mitigate resulting risks, and to require a plan of actions and milestones (POA&M) from the software producer. Minimum attestation requirements described by the new guidance include secure development environments, efforts to maintain trusted source code supply chains, maintaining provenance data for all code, and automated vulnerability checks.

    SecurityWeek reports: "CISA Asks for Public Opinion on Secure Software Attestation"

  • news

    Visible to the public NSF Student Travel Grants for attending IEEE SmartComp 2023

    A limited number of student travel grants are available for students from US-based institutions to attend SmartComp 2023. The travel award typically covers up to $1,250 of expenses, including registration, airfare, and lodging. However, the final number may be lower based on the number of applicants.

    Award selection committee members: Dr. Sajal Das , Dr. Aniruddha Gokhale, Dr. Eirini Eleni Tsiropoulou

    Important Dates

  • news

    Visible to the public "EVs Rev up Cybersecurity Challenges"

    Even though the Biden administration recently reaffirmed its commitment to Electric Vehicles (EVs), concerns remain about the ability of charging infrastructure and vehicles to withstand a cyberattack. If charging stations are designated as critical infrastructure, the challenge will become significantly more difficult, especially when states add them to public property. Many state and local governments have cybersecurity insurance to cover some of the financial costs of an attack on their Information Technology (IT) systems, but insurance for EVs and charging stations is new territory. Recent research from the IBM Institute for Business Value discussed these emerging cybersecurity risks and their insurance implications. According to IBM's report, "software-heavy" EVs and charging stations are constantly communicating with other vehicles and the world around them, and while software updates may be sent quickly to address security flaws, the enormous attack surface catches cybercriminals' attention. The effects are also affecting the insurance industry, which is struggling to assess an unfamiliar set of risks and losses. Mike Hamilton, CISO of Critical Insight, agreed that the absence of precedent is concerning for the future of insurance. Hamilton emphasized the difficulty of determining how to price this insurance based on risk. This article continues to discuss EV owners, charging stations, and fleet managers being vulnerable to hackers without a meaningful way to secure and insure the EV infrastructure.

    GCN reports "EVs Rev up Cybersecurity Challenges"

  • news

    Visible to the public "Iranian Govt Uses BouldSpy Android Malware for Internal Surveillance Operations"

    Lookout Threat Lab researchers discovered BouldSpy, a new Android surveillance malware used by the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Although the BouldSpy spyware includes ransomware capabilities, Lookout researchers have yet to see the malicious code use them, suggesting that the malware is still in development or that it is a false flag used by its operators. Exfiltrated data from the spyware's command-and-control (C2) servers revealed that BouldSpy was used to spy on over 300 people, including minority groups such as Iranian Kurds, Baluchis, Azeris, and potentially Armenian Christian groups. The malware was most likely used to counter and track illegal trade in weaponry, drugs, and alcohol. According to Lookout, FARAJA uses physical access to devices, likely obtained during detention, to install BouldSpy and further monitor the target after release. Researchers obtained and evaluated a large amount of exfiltrated data, which includes images and device communications such as screenshots of chats, video call recordings, and SMS records. The researchers also found photos of drugs, firearms, and official FARAJA documents, indicating that the spyware may be used by law enforcement. However, much of the victim data points to its broader use, suggesting targeted surveillance efforts against Iranian minorities. This article continues to discuss Iranian authorities using the BouldSpy Android malware to spy on minorities and traffickers.

    Security Affairs reports "Iranian Govt Uses BouldSpy Android Malware for Internal Surveillance Operations"

  • news

    Visible to the public "Companies Increasingly Hit With Data Breach Lawsuits: Law Firm"

    According to US law firm BakerHostetler, lawsuits filed against companies that have suffered a data breach are increasingly common, with action being taken more frequently, even in cases where the number of impacted individuals is smaller. Last week, the company published its 2023 Data Security Incident Response Report based on data collected from more than 1,100 cybersecurity incidents investigated by the company in 2022. The report shows that 45% of incidents were network intrusions, followed by business email compromise (30%) and inadvertent data disclosure (12%). Following initial access, the most common actions were ransomware deployment (28%), data theft (24%), email access (21%), and malware installation (13%). Data collected by BakerHostetler shows that ransomware victims that did pay a ransom in 2022 paid more compared to 2021. The largest ransom demand seen by the firm in 2022 exceeded $90 million (compared to $60 million in 2021), and the largest ransom that was paid in 2022 was more than $8 million (compared to $5.5 million in 2021). The average ransom amount paid last year was roughly $600,000, up from $511,000 in 2021. The cost of forensic investigations has also increased. For the 20 largest network intrusions, the average cost increased by 24%, from $445,000 in 2021 to $550,000 in 2022. In addition to higher ransom demands and increased forensic costs, the company also found that a bigger percentage of incidents where the impacted organization notified individuals of a data breach resulted in at least one lawsuit. Specifically, the numbers have increased from four lawsuits out of 394 incidents in 2018 to 42 lawsuits filed for 494 incidents in 2022. Four of the lawsuits filed last year were in response to incidents where fewer than 1,000 people were impacted, and 14 lawsuits were filed over incidents that hit between 1,000 and 100,000 people. The company noted that another category of lawsuits has also increased: privacy-related class actions. BakerHostetler is aware of more than 50 lawsuits filed since August 2022 against hospital systems that allegedly shared patient identities and online activities via third-party website analytics tools without the user's knowledge and consent.

    SecurityWeek reports: "Companies Increasingly Hit With Data Breach Lawsuits: Law Firm"

  • news

    Visible to the public "NIST's Cybersecurity Framework Gets 'Significant Update'"

    The National Institute of Standards and Technology (NIST) is updating its Cybersecurity Framework (CSF) in order to better incorporate topics such as supply chain risk management and governance. The framework, first released in 2014, is a set of standards aimed at helping organizations assess, understand, manage, and mitigate security risks. While voluntary for the private sector, the framework serves as the foundation for many government policies worldwide, and the 2017 executive order "Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure" made it mandatory for US federal agencies. In addition, certain insurance companies have made the framework mandatory for specific industries, and organizations can also require the framework to be used within their supply chain. Previously, the framework was lightly updated every three to five years, with CSF 1.1 released in 2018. However, with significant changes in the cybersecurity landscape since then, NIST has considered a more significant overhaul for its framework that includes newer security and privacy resources and addresses recent changes in technologies and risks such as supply chain security. This article continues to discuss the update of NIST's CSF.

    Decipher reports "NIST's Cybersecurity Framework Gets 'Significant Update'"

  • news

    Visible to the public "Global Cyberattacks Rise by 7% in Q1 2023"

    According to new research by Check Point, weekly cyberattacks have increased worldwide by 7% in Q1 2023 compared to the same period last year, with each firm facing an average of 1248 attacks per week. The company found that the education and research sector experienced the highest number of attacks, rising to an average of 2507 per organization per week (a 15% increase compared to Q1 2022). While the volume of attacks has only risen marginally, the company noted that they have witnessed several sophisticated campaigns from cyber criminals who are finding ways to weaponize legitimate tools for malicious gains. Check Point stated that geographically, the APAC region experienced the highest year-on-year (YoY) increase in weekly attacks, with an average of 1835 per company (16% more than last year). North America followed with a 9% YoY increase resulting in 950 average weekly attacks per organization. The company noted that in the United States, cybersecurity regulations have recently been revised, and regulators are currently considering proposals aimed at improving incident reporting, information disclosure, oversight, and the modernization of outdated legislation. During the study, the company also found that 1 in 31 organizations worldwide experienced a ransomware attack weekly over the first quarter of 2023. This represents a 1% increase compared to the same period in 2022, when a similar number of organizations fell victim to such attacks. Latin America saw the most significant year-over-year increase of 28% when 1 out of 17 organizations experienced a ransomware attack.

    Infosecurity reports: "Global Cyberattacks Rise by 7% in Q1 2023"

  • news

    Visible to the public "US Air Force Academy Wins NSA Cyber Competition"

    The US Air Force Academy successfully defended its title as champions of the National Security Agency's (NSA) annual NSA Cyber Exercise (NCX). The team won a three-day cyber competition that put US service academies, senior military colleges, and NSA professional development programs to the test in order to train them to defend the nation's cyber networks. The NCX trophy was presented to the Air Force Academy's cyber competition team by GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS. The US Military Academy came in second place, while the US Coast Guard Academy came in third, beating the US Naval Academy and senior military universities such as Norwich, Texas A&M, The Citadel, Virginia Military Institute, Virginia Tech, and the University of North Georgia. The NCX is a year-round program that ends in a three-day unclassified cyber competition. It fosters and tests cybersecurity skills, planning, communication, decision-making, and more. The theme this year was transportation and food infrastructure, including exercises focusing on data analysis, forensics, reverse engineering, and policy, as well as the final attack-and-defend cyber combat exercise. This article continues to discuss the US Air Force Academy winning the NCX as well as the structure and benefits of this competition.

    NSA reports "US Air Force Academy Wins NSA Cyber Competition"

  • news

    Visible to the public "New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise Networks"

    An analysis of more than 70 billion DNS records resulted in the discovery of Decoy Dog, a new sophisticated malware toolkit aimed at enterprise networks. Decoy Dog is evasive and uses techniques such as strategic domain aging and DNS query dribbling, in which a series of queries are sent to command-and-control (C2) domains in order to avoid detection. According to Infoblox, Decoy Dog is a cohesive toolset with several odd traits that make it distinctly identifiable, particularly when looking at its domains at the DNS level. The cybersecurity company said the malware was discovered due to unusual DNS beaconing activity, and its uncommon properties allowed it to map more domains that are part of the attack infrastructure. Researchers have found that the use of Decoy Dog in the wild is "very rare," with the DNS signature matching less than 0.0000027 percent of the 370 million active domains on the Internet. Pupy RAT, an open-source Trojan delivered using DNS tunneling, in which DNS queries and responses are used as a C2 for dropping payloads, is one of the toolkit's main components. This article continues to discuss researchers' findings and observations regarding the new sophisticated malware toolkit dubbed Decoy Dog.

    THN reports "New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise Networks"

  • news

    Visible to the public "Hackers Use Fake 'Windows Update' Guides to Target Ukrainian Govt"

    According to the Computer Emergency Response Team of Ukraine (CERT-UA), Russian hackers are sending malicious emails to different government bodies with instructions on how to upgrade Windows in order to defend against cyber threats. The Russian state-sponsored hacking group APT28, also known as Fancy Bear, according to CERT-UA, sent these emails and impersonated system administrators of the targeted government entities to fool their targets. The attackers created Outlook email addresses using real employee identities obtained through unknown ways during the attack's preliminary stages. Rather than normal instructions for upgrading Windows systems, the emails direct recipients to run a PowerShell command. This command downloads a PowerShell script to the computer, imitating a Windows update procedure while simultaneously downloading a second PowerShell payload. The second-stage payload is an information-harvesting tool that uses the 'tasklist' and 'systeminfo' commands to capture data and send it through an HTTP request to a Mocky service Application Programming Interface (API). Mocky is a legitimate tool that allows users to produce custom HTTP responses, which APT28 used for data exfiltration in this case. System administrators should restrict the ability to launch PowerShell on critical workstations and monitor network traffic for connections to the Mocky service API. This article continues to discuss APT28 using fake Windows Update guides to target various Ukrainian government bodies.

    Bleeping Computer reports "Hackers Use Fake 'Windows Update' Guides to Target Ukrainian Govt"

  • news

    Visible to the public "Cybercriminals Use Proxies to Legitimize Fraudulent Requests"

    According to HUMAN, a global leader in protecting enterprises by disrupting digital fraud and abuse with modern defense, bot attacks were viewed as a relatively insignificant type of online fraud, and that thinking has remained even as threat actors can now inflict major damage to revenue and brand reputation. Even as people spent less time online, bad bot traffic grew overall. Legitimate human traffic decreased by 28 percent, but bad bot traffic surged by 102 percent, meaning that the percentage of bad bots in total traffic has climbed even faster. The number of automated attacks has increased. Three common types of bot attacks on web applications increased year over year. Carding attacks increased 134 percent, account takeover attacks increased 108 percent, and scraping increased 107 percent. Certain industries were more vulnerable to bot attacks than others. Bad bots accounted for 57 percent of traffic to online businesses in the Media and Streaming industry. Just under half of traffic to organizations in the Travel and Hospitality (49 percent) and Ticketing and Entertainment (46 percent) industries were automated. This article continues to discuss key findings from HUMAN's 2023 Enterprise Bot Fraud Benchmark Report

    Help Net Security reports "Cybercriminals Use Proxies to Legitimize Fraudulent Requests"

  • news

    Visible to the public "Firmware Looms as the Next Frontier for Cybersecurity"

    Researchers found five vulnerabilities in servers run by over a dozen major companies, including Huawei, Qualcomm, Nvidia, AMD, Dell, and HP, in December. The flaws had CVSS scores ranging from 5.3 (medium severity) to 9.8 (critical). The flaws reside in firmware developed by American Megatrends International (AMI) for Baseboard Management Controllers (BMCs), which are processors manufactured by AMI. BMCs are chips that sit on motherboards and allow administrators to monitor and change almost everything on a machine, from applications and data down to low-level hardware. Nate Warfield, Eclypsium's director of threat research and intelligence, and Vlad Babkin, Eclypsium's security researcher, will argue that AMI's BMC flaws were symptomatic of something larger, and more structurally flawed, in firmware security. This article continues to discuss firmware security.

    Dark Reading reports "Firmware Looms as the Next Frontier for Cybersecurity"

  • news

    Visible to the public "Generative AI Helps Spot Malicious Open-Source Code"

    One company is helping developers research open-source software packages to discover code components that are secure from attacks. Endor Labs, a startup that helps governments and businesses secure open-source software, has released its DroidGPT tool in private beta, with plans to make it fully available in the next two months. Developers can log into the company's platform and use a conversational style to ask different questions, such as which packages have the fewest vulnerabilities. DroidGPT then generates results based on Endor Labs' massive and frequently updated database of open-source software. The results overlap with the company's data on the quality, popularity, trustworthiness, and security of each package. Developers in both the public and private sectors are increasingly reliant on open-source software, which has become the foundation of numerous technologies and applications. The Biden administration's 2021 executive order called for open-source software's "integrity and provenance" to be checked, as well as a Software Bill of Materials (SBOMs) to keep a formal record of the software supply chain used in building applications. Varun Badhwar, CEO of Endor Labs, stated that about 80 percent of the code that makes up applications is open-source, making it easier for developers but raising concerns about where it originates from, especially since there is no support structure in place to identify faulty code. This article continues to discuss Endor Labs' DroidGPT tool aimed at helping developers spot malicious open-source code.

    GCN reports "Generative AI Helps Spot Malicious Open-Source Code"

  • news

    Visible to the public "Are Meta and Twitter Making Cybersecurity Less Accessible?"

    Experts are concerned about the overall impact that new fees for security features on social media accounts will have on overall cybersecurity. Many are questioning whether basic security should be available to all users, regardless of whether they pay for it. For example, as of March 20, 2023, only subscribers to Twitter Blue, an upgraded account that starts at $8 a month, can use two-factor authentication (2FA) through text messages. In the past, all users could set their accounts to send a text code for new logins to prevent unauthorized access. In addition, Meta recently announced that its new subscription package, Meta Verified, includes impersonation protection for Facebook and Instagram users as part of its paid features. Experts are concerned about the consequences of this change because social media is the source of many cybercrimes. Although all accounts will have basic protection, only users with the financial means to pay will have access to the additional protections. Other users who do not understand the advantages of premium accounts may not choose to subscribe. Therefore, limiting security features to premium accounts, according to experts, will increase the overall cybersecurity risk. This article continues to discuss the potential impact of paid social media account security features on cybersecurity.

    Security Intelligence reports "Are Meta and Twitter Making Cybersecurity Less Accessible?"

  • news

    Visible to the public "CMU Hacking Team Defends Title at MITRE Cybersecurity Competition"

    Carnegie Mellon University's competitive hacking team, the Plaid Parliament of Pwning (PPP), won the top prize at the MITRE Embedded Capture-the-Flag (eCTF) cybersecurity competition for the second year in a row. PPP and 79 other collegiate-level teams worked for three months to design and implement a key fob system for a car door lock, securing the car from unauthorized entry and preventing attacks such as replays and key fob cloning. The yearly competition drew teams from around the world, with a record-breaking 546 student participants. The competition was divided into two parts: design and attack. Each phase provided chances to earn points by collecting flags and sending them to the live eCTF scoreboard. Hackers acted as a team of engineers at a car manufacturer throughout the design process, designing and building the embedded software that would be provisioned on the next line of cars and key fobs sold to customers. During the attack phase, teams had the opportunity to assess the designs of other groups, uncovering security holes as they attempted to unlock and start the vehicles without the vehicle owners' authorization. This article continues to discuss CMU's competitive hacking team PPP winning at the MITRE eCTF cybersecurity competition as well as the structure and benefits of eCTF competitions.

    CyLab reports "CMU Hacking Team Defends Title at MITRE Cybersecurity Competition"

  • news

    Visible to the public "MIT and Stanford Researchers Develop Operating System With One Major Promise: Resisting Ransomware"

    A team of researchers from the Massachusetts Institute of Technology (MIT) and Stanford University are working on an operating system that includes built-in cybersecurity protection. This new operating system will be resilient against common cyberattacks and recover from ransomware infections in minutes. Michael Stonebraker, a serial technology entrepreneur and computer scientist at MIT, is one of the individuals behind the project, with his work on database systems having earned him the Turing Award in 2015. Matei Zaharia, an associate professor at Stanford University and the creator of the Apache Spark project, and Jeremy Kepnew, the head of the MIT Lincoln Laboratory Supercomputing Center, are collaborating with Stonebraker on the operating system. The system is based on databases that save and track all events and changes within the operating system. This article continues to discuss the new operating system with built-in cybersecurity defenses developed by MIT and Stanford researchers.

    CyberScoop reports "MIT and Stanford Researchers Develop Operating System With One Major Promise: Resisting Ransomware"

  • news

    Visible to the public "U.S. Senator Introduces Bill Targeting AI's Shortfalls"

    On Thursday, Senator Michael Bennet introduced a bill that would create a task force to look at U.S. policies on artificial intelligence and identify how best to reduce threats to privacy, civil liberties, and due process. The widespread use of ChatGPT and other AI, which have been used for years to create text, imagery, and other content, has sparked a rush around the globe to figure out if and how it should be regulated. The job of the AI Task Force, which could include cabinet members, will be to identify shortfalls in regulatory oversight of AI and recommend reforms if needed. Bennet stated that there's going to have to be a lot of education around this set of issues because they're not well understood. He noted that there is going to be a lot of improvisation and iterative approaches to try to wrestle with this because AI is so new to everyone in the government. Under the bill, the task force would include an official from the Office of Management and Budget, the National Institute of Standards and Technology, and the Office of Science and Technology Policy as well as privacy and civil liberties officers from the Departments of Justice, State, Treasury, Defense, and other executive branch agencies. Under the terms of the bill, the task force would work for 18 months, issue a final report, and then shut down.

    Reuters reports: "U.S. Senator Introduces Bill Targeting AI's Shortfalls"

  • news

    Visible to the public "DHS S&T Forms New Startup Cohort to Strengthen Software Supply Chain Visibility Tools"

    The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has announced seven awardees for the "Software Supply Chain Visibility Tools" topic call, which pursued innovative technologies to provide Software Bill of Materials (SBOMs)-based capabilities for enterprise, system administrator, and software development community stakeholders. S&T's Silicon Valley Innovation Program (SVIP) issued the solicitation, looking for open-source-based technical solutions to provide the transparency that forms the foundation of a high-assurance software supply chain, and to enable visibility into software supply chains and new risk assessment capabilities. Melissa Oh, managing director of the SVIP, stated that it is essential to use innovative tools to create a more transparent software supply chain in order to defend against the growing number of software attacks. The seven awardees will collaborate to develop two key software modules: a multi-format SBOM translator and a software component identifier translator, which will be distributed as open-source libraries and integrated into their SBOM-enabled commercial products. Software vulnerabilities are a major cybersecurity risk, with known exploits serving as the primary route for malicious actors to perpetrate a variety of harms. Allan Friedman, the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) senior advisor and strategist, noted that leveraging SBOMs as critical elements of software security could mitigate the risk to the software supply chain and improve the response to new threats more quickly and effectively. This article continues to discuss the new startup cohort formed by DHS S&T to bolster software supply chain visibility tools.

    DHS reports "DHS S&T Forms New Startup Cohort to Strengthen Software Supply Chain Visibility Tools"

  • news

    Visible to the public "Ransomware Attack Disrupts IT Network at Hardenhuish School"

    A UK secondary school has recently revealed that it was hit by a cyberattack affecting its IT network. Hardenhuish School in Chippenham, Wiltshire, confirmed the attack on Thursday, saying hackers gained access to network infrastructure and then demanded a ransom for restoring access. It is currently unclear whether the school paid the ransom, but the school said its pupils' learning was their absolute focus, so they were doing their best to restore access to the affected systems. Rob Bolton, VP of EMEA at Versa Networks, stated that to protect against cyber threats, schools must implement advanced security controls to detect and resolve security issues quickly. Bolton noted that network segmentation is also a critical security control that limits malware movement and minimizes the impact of breaches. By prioritizing cybersecurity measures and investing in the necessary resources, schools can reduce the risk of falling victim to a cyberattack and ensure a safe and secure learning environment for their students. The Hardenhuish school cyberattack comes a few months after an audit by the National Cyber Security Centre (NCSC) showed that three-quarters (78%) of UK schools had experienced at least one type of cyber-incident.

    Infosecurity reports: "Ransomware Attack Disrupts IT Network at Hardenhuish School"

  • news

    Visible to the public "Texas Bank Breach Exposed Thousands of Social Security Numbers"

    HSB, a Texas-based financial institution, alerted customers about a Business Email Compromise (BEC) attack that compromised the personal data of thousands of customers. The company notified the Maine Attorney General's Office that threat actors may have gained access to customer names or other personal identifiers with Social Security numbers (SSNs), potentially exposing more than 17,000 customers. Malicious actors can use stolen SSNs in conjunction with names and driver's license numbers to commit fraud. The bank claims to have observed "unusual activity" on a former company employee's email account. The investigation revealed that the former employee was the victim of a phishing attack. Between July 28 to July 29, 2022, the threat actors had unauthorized access to the individual's HSB email account. The unauthorized activity only involved this email account. The letter of notice attached to the HSB breach notification states that all essential banking systems were unaffected and remain secure. The sensitive customer data was contained by attachments in the former employee's emails. This article continues to discuss the exposure of over 17,000 HSB customers' SSNs due to a suspected cyberattack.

    Cybernews reports "Texas Bank Breach Exposed Thousands of Social Security Numbers"

  • news

    Visible to the public "Cybersecurity Teams Are Overconfident of Their Ability to Deal With Threats"

    Immersive Labs' research found that while businesses are confident in their overall resilience against cyberattacks, security teams are inadequately prepared for cyber threats. The study surveyed 316 global cybersecurity training strategy decision-makers in the UK, the US, Canada, Germany, and Sweden. Eighty-two percent agree that if they had been better prepared, they could have mitigated some to all of the damage caused by their most significant cyber incident over the past year. Over 80 percent of respondents do not believe or are uncertain that their teams have the capability to respond to future attacks. Only 17 percent of respondents believe their cybersecurity team is fully staffed, and nearly half confess they are unable to measure their cyber capabilities, further undermining confidence in their organization's readiness. This article continues to discuss the need for cyber leaders to have a more effective approach to building resilience.

    BetaNews reports "Cybersecurity Teams Are Overconfident of Their Ability to Deal With Threats"

  • news

    Visible to the public "Vietnamese Hackers Linked to 'Malverposting' Campaign"

    According to security researchers at Guardio Labs, a recent "malverposting" campaign linked to a Vietnamese threat actor has been ongoing for months and is estimated to have infected over 500,000 devices worldwide in the past three months alone. The researchers stated that malverposting is the use of promoted social media posts and tweets to propagate malicious software and other security threats, and in this case, the abuse of Facebook's Ads service to deliver malware. The researchers noted that the initial enabler for those numbers is the abuse of Facebook's Ads service as the first stage delivery mechanism responsible for this mass propagation. The researchers observed that the Vietnamese campaign relied on malverposting while it evolved various evasion techniques. It particularly focused on the USA, Canada, England, and Australia. The researchers noted that this threat actor is creating new business profiles as well as hijacking real, reputable profiles with even millions of followers. They also repeatedly posted malicious clickbait on Facebook feeds promising adult-rated photo album downloads for free. Once victims click on those posts/links, a malicious ZIP file is downloaded to their computers. Inside are photo files (that are actually masqueraded executable files) that, when clicked, will initiate the infection process. The executable then opens a browser window popup with a decoy website showing related content. The researchers noted that while in the background, the stealer will silently deploy, execute and gain persistence to periodically exfiltrate one's sessions cookies, accounts, crypto-wallets, and more. The researchers clarified that they observed several variations of the latest payload, yet all shared a benign executable file to start the infection flow.

    Infosecurity reports: "Vietnamese Hackers Linked to 'Malverposting' Campaign"

  • news

    Visible to the public "Transparent Labeling of Training Data May Boost Trust in Artificial Intelligence"

    According to researchers at Pennsylvania State University, showing users that visual data input into Artificial Intelligence (AI) systems was correctly labeled could increase people's trust in AI. The team added that the findings could pave the way for scientists to better measure the relationship between labeling credibility, AI performance, and trust. In the study, the researchers discovered that high-quality image labeling increased people's perception of the credibility of the training data and their trust in the AI system. However, when the system displays additional signs of bias, some aspects of their trust decrease while others remain high. In order for AI systems to learn, they must first be trained using data that humans often label. According to S. Shyam Sundar James P. Jimirro Professor of Media Effects at the Donald P. Bellisario College of Communications and co-director of the Media Effects Research Laboratory at Penn State, the majority of users never see how the data is labeled, which raises questions about the accuracy and bias of those labels. Sundar explained that trusting AI systems involves having trust in AI's performance and its ability to accurately reflect reality and truth. This is only possible if the AI has been trained on a good data set. Ultimately, concerns regarding AI trust should be directed toward the training data upon which the AI is built. However, it has been difficult to convey the quality of training data to the general public. This article continues to discuss the research on boosting trust in AI through transparent labeling.

    Pennsylvania State University reports "Transparent Labeling of Training Data May Boost Trust in Artificial Intelligence"

  • news

    Visible to the public "Counting Photons for Quantum Computing"

    Engineers at Jefferson Lab contributed to the design and construction of a photon detection system that is essential to photonics-based quantum computing and unbreakable encryption. Nuclear physicists and quantum information experts have demonstrated the capability of a photon-number-resolving system to resolve more than 100 photons accurately. This accomplishment represents a significant stride forward in the development of quantum computing capabilities. It may also facilitate the quantum generation of truly random numbers, a long-sought objective in the development of unbreakable encryption techniques for applications such as military communications and financial transactions. Recently, the detector was disclosed in Nature Photonics. This article continues to discuss the research on the resolution of 100 photons and quantum generation of unbiased random numbers.

    Jefferson Lab reports "Counting Photons for Quantum Computing"

  • news

    Visible to the public "Google Bans 173,000 Bad Developers in 2022"

    Google recently claimed that it is making it harder for malicious developers to get their software published on its Play Store while removing large volumes of bad accounts. Google has revealed that it removed 173,000 bad accounts in 2022 and raised the bar for new developers by adding phone, email, and "other identity verification methods." This helped the firm to reduce the number of accounts used to publish apps that violate its policies. Google said it prevented 1.43 million of these apps from being published on the Play marketplace. All told, Google estimated that it prevented $2bn in "fraudulent and abusive" transactions. Google noted that they continued to partner with SDK providers to limit sensitive data access and sharing, enhancing the privacy posture for over one million apps on Google Play. Google said thanks to stronger Android platform protections and policies, and developer outreach and education, it also prevented around 500,000 submitted apps from unnecessarily accessing sensitive permissions over the past three years. Last year Google launched an App Security Improvements program which it claimed helped developers fix 500,000 security weaknesses impacting 300,000 apps with around 250 billion installs.

    Infosecurity reports: "Google Bans 173,000 Bad Developers in 2022"

  • news

    Visible to the public "Man Gets Four Years for Stealing Bitcoins Seized by Feds"

    An Ohio man has recently been sentenced to four years and three months behind bars after stealing 712 bitcoin ($21m), which were seized by investigators following the arrest of his brother. According to the Department of Justice (DoJ), Gary James Harmon, 31, of Cleveland, stole the cryptocurrency, which was the subject of "pending criminal forfeiture proceedings" in the case of his sibling, Larry Dean Harmon. Larry Harmon was arrested in February 2020 for operating a dark web cryptocurrency mixer known as Helix. It was used to launder over 350,000 Bitcoin, valued at the time of the transactions at over $300m, but which are now worth $10.3bn. The DoJ noted that the funds came from customers operating on dark web markets. During Harmon's arrest, law enforcers seized a cryptocurrency storage device containing funds generated by Helix, which were subject to forfeiture, meaning they were confiscated by the state. However, investigators were unable to recover the Bitcoin stored on the device due to built-in security features. The DoJ stated that Gary Harmon used his brother's logins to recreate and access the wallets stored on the device, transferring over 712 bitcoin to his own wallet. The digital currency was worth $4.8m at the time but is worth many times more today. Gary Harmon then laundered these funds through two online Bitcoin mixers before using the digital currency to finance some large purchases. Following his arrest, he subsequently agreed to forfeit to the state the crypto he stole, including over 647 Bitcoin, 2 Ethereum, and 17.4 million Dogecoin, which have a combined value in excess of $20m. Larry Harmon pleaded guilty to money laundering conspiracy in his case in August 2021.

    Infosecurity reports: "Man Gets Four Years for Stealing Bitcoins Seized by Feds"

  • news

    Visible to the public "Ukrainian Man Arrested for Selling Data on 300 Million People to Russians"

    A 36-year-old Ukrainian citizen was recently arrested for allegedly selling personal information belonging to over 300 million people to Russia, according to a statement from the Ukrainian cyber police. The individual used the messaging platform Telegram to sell the stolen information, which included passport data, taxpayer numbers, birth certificates, driver's licenses, and bank account data belonging to Ukrainian citizens and citizens of other European countries. Depending on the amount and nature of the information sought, he would sell access to the data for a price between $500 and $2,000. According to the cyber police, the individual sold the data to Russian citizens for rubles, a currency that is banned in Ukraine. When police arrived to search the suspect's home in Netishyn, a town of 36,000 people in western Ukraine, they seized several mobile phones, about 30 hard drives, SIM cards, computer equipment, and server equipment. The police stated that they are also investigating databases with restricted access that the suspect operated. The individual is facing charges for creating malicious software, illegally accessing information stored on computer networks, and more. The arrest brings further attention to how Telegram has become a popular but flawed cybercriminal tool. This article continues to discuss the arrest of a Ukrainian man for selling personal data on 300 million people to Russia and the increase in hacker-related posts on Telegram.

    The Record reports "Ukrainian Man Arrested for Selling Data on 300 Million People to Russians"

  • news

    Visible to the public "FDA, CISA Advise on Genomic Device Software Vulnerabilities"

    A software patch has been made available to prevent cybersecurity threats to patient care, genomic data, and provider networks posed by software vulnerabilities in benchtop and production-scale genomic sequencing instruments manufactured by Illumina. According to a letter to healthcare providers from the US Food and Drug Administration (FDA), malicious actors could take control of the devices, alter the software and patient test results, or compromise a provider's network and exfiltrate protected data. The FDA issued a statement to healthcare providers and laboratory personnel regarding the necessary steps to mitigate cybersecurity risks in Illumina's sequencing instruments. According to a medical advisory from the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the vulnerability affects the universal copy service in various versions of device control and operating software. The FDA noted that some laboratories may be using Illumina genomic sequencing devices for clinical diagnostic applications. In addition to the FDA and CISA, the FBI urges healthcare organizations to remain vigilant regarding medical device cybersecurity. The agency reports that risks associated with out-of-date software and a lack of security features in older hardware in unpatched, active medical devices are being increasingly targeted. In the event of a data compromise, genomic data is especially concerning. This article continues to discuss genomic device software vulnerabilities.

    HealthITNews reports "FDA, CISA Advise on Genomic Device Software Vulnerabilities"

  • news

    Visible to the public "ViperSoftX InfoStealer Adopts Sophisticated Techniques to Avoid Detection"

    Many consumers and businesses in Australia, Japan, the US, and India have been infected with the evasive information-stealing malware ViperSoftX. ViperSoftX was first discovered in 2020, and in November 2022, the cybersecurity company Avast described a campaign that involved the malware in distributing a malicious Google Chrome extension capable of stealing cryptocurrencies from wallet applications. A new analysis by Trend Micro reveals that the malware now uses more sophisticated encryption and basic anti-analysis techniques, such as byte remapping and web browser communication blocking. The vector of entry for ViperSoftX is typically a software crack or a key generator (keygen), but it also uses non-malicious applications such as multimedia editors and system cleaners as "carriers." Before downloading the first-stage PowerShell loader, the malware performs a series of anti-virtual machine, anti-monitoring, and anti-malware checks. The loader then decrypts and initiates a second-stage PowerShell script retrieved from a remote server, which launches the primary routine responsible for installing malicious browser extensions to exfiltrate passwords and cryptocurrency wallet data. This article continues to discuss researchers' findings and observations regarding the ViperSoftX information-stealing malware.

    THN reports "ViperSoftX InfoStealer Adopts Sophisticated Techniques to Avoid Detection"

  • news

    Visible to the public "Android Minecraft Clones With 35M Downloads Infect Users With Adware"

    A collection of 38 Minecraft clones on Google Play infected devices with the Android adware HiddenAds in order to secretly load advertisements in the background to generate revenue for the operators. Numerous game publishers have attempted to replicate the success of Minecraft, a sandbox game with 140 million monthly active users. About 35 million Android users downloaded games resembling Minecraft that hid the adware, primarily from the US, Canada, South Korea, and Brazil. These users did not notice the adware activity taking place in the background because they were able to play the games as advertised. Additionally, any potential overheating, increased network data usage, or battery consumption caused by loading advertisements may be attributed to the game. The adware set was discovered by McAfee's Mobile Research Team, which was formed to defend Google Play against all forms of threats. All of the apps have been removed from the store following their reporting. This article continues to discuss Minecraft copycat games on Google Play infecting devices with the Android adware HiddenAds.

    Bleeping Computer reports "Android Minecraft Clones With 35M Downloads Infect Users With Adware"

  • news

    Visible to the public "Phishing-Resistant MFA Shapes the Future of Authentication Forms"

    According to Yubico, organizations have continued to rely on the least secure forms of authentication, such as traditional usernames and passwords and one-time passwords (OTPs), over the past two years, based on a survey of over 500 Information Technology (IT) leaders in the US and Canada. Fifty-nine percent of respondents reported a security breach in the past year, an increase of 6 percent over the past two years. In addition, there has been a significant increase in MFA deployment among customers, which increased from 45 percent to 57 percent. Ronnie Manning, CMO of Yubico, noted that not all MFA tools are created equal, and despite the fact that businesses are aware that legacy MFA tools are ineffective for maintaining security, they continue to rely on them as their primary line of defense. Manning added that education regarding the significance of phishing-resistant MFA is more important to move away from legacy MFA tools that leave thousands of businesses vulnerable to attacks. This article continues to discuss key findings from research on the top MFA trends among businesses today and the critical forces shaping authentication.

    Help Net Security reports "Phishing-Resistant MFA Shapes the Future of Authentication Forms"

  • news

    Visible to the public "Malware-Free Cyberattacks Are on the Rise; Here's How to Detect Them"

    According to George Kurtz, CEO of CrowdStrike, and Michael Sentonas, president of the company, 71 percent of enterprise cyberattacks in 2022 were conducted without malware. At this year's RSA Conference, Kurtz and Sentonas walked the audience through a case study of how easily a threat actor can not only penetrate a network but also move laterally and remain undetected, showing the difficulty cybersecurity teams face when attempting to detect malwareless compromises. They detailed the "Spider" cybercrime group as a prime example of the phenomenon. Endpoint Detection and Response (EDR) and other malware detection technologies are not particularly useful for defending the enterprise against malware-free cyberattacks as there is no malicious code to detect. Instead, organizations are advised to focus on collecting as much telemetry as possible from the endpoint to the cloud and managing identity to the smallest details. However, after collecting all of this telemetry and identity data, teams are left with enormous amounts of information that are not particularly useful for threat hunting. This is where Artificial Intelligence (AI) and Machine Learning (ML) can be applied effectively to search for anomalous activity, such as newly created user accounts, to detect malicious activity without malicious code. This article continues to discuss the rise in malware-free cyberattacks and how to detect them.

    Dark Reading reports "Malware-Free Cyberattacks Are on the Rise; Here's How to Detect Them"