News Items

  • news

    Visible to the public Pub Crawl #73


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Johns Hopkins APL's Out-of-Band Communications Technology Receives Boost From Department of Homeland Security"

    Out-of-Band over Existing Communication (OBEC) is a novel communications technology developed at the Johns Hopkins University Applied Physics Laboratory (APL) to provide secure access to networks experiencing disruptions or cyberattacks. APL is one of seven federal laboratories to receive funding from the Science and Technology Directorate (S&T) of the Department of Homeland Security (DHS) in the latest round of the Commercialization Accelerator Program (CAP). The OBEC technology enables the creation of a new, physically isolated Out-of-Band (OOB) network on an existing Ethernet infrastructure, without the need for additional networking equipment or wireless connections. OOB communications occur outside of the normal systems, allowing users to communicate privately and securely, even on a compromised network. Alexander Beall, an electrical engineer at APL and project manager in the Asymmetric Operations Sector's Cyber Operations Mission Area, emphasizes that Industrial Control System (ICS) network connectivity is essential to operating and managing facilities and their processes. Cyberattacks on the network can have wide-reaching and severe effects, potentially endangering operators' safety, disrupting critical operations, and causing costly downtime. Beall and OBEC co-inventor Joseph Moore say that OOB communication supports network resilience, situational awareness, and secure management of networked devices by establishing alternative communication paths to manage network infrastructure devices. These alternative paths separate non-essential traffic from operational traffic, preventing hackers from compromising network infrastructure or interfering with network operations. This article continues to discuss APL's OBEC technology and its boost from DHS.

    The Johns Hopkins University Applied Physics Laboratory reports "Johns Hopkins APL's Out-of-Band Communications Technology Receives Boost From Department of Homeland Security"

  • news

    Visible to the public "CESER Supports DOE's $38 Million Funding Opportunity to Secure the Grid of the Future"

    The US Department of Energy (DOE) recently announced a $38 million funding opportunity for National Laboratories in support of critical research and development priorities regarding developing an electricity grid that provides secure, resilient, flexible, sustainable, affordable, and equitable electricity. This Grid Modernization Initiative (GMI) funding will be used to develop and support the deployment of concepts, tools, and technologies to improve national cybersecurity, better integrate all sources of electricity and energy storage, and more. GMI expects to make awards for projects on Cybersecurity for Architectures, Standards, and Practices (CASP), Quantum Facilities for Computing, Sensing, and Security (qFACSS), and other topics. The CASP project focuses on assessing and developing cybersecurity technical architectures, standards, and guidelines to protect the electric utility infrastructure during the transition to and operation on a decarbonized grid. The qFACSS project focuses on using existing and near-term quantum computing, sensing, and security technologies to address the grid's vulnerabilities and growing complexity. This article continues to discuss the initiative to secure the power grid.

    The US Department of Energy reports "CESER Supports DOE's $38 Million Funding Opportunity to Secure the Grid of the Future"

  • news

    Visible to the public "Thermal Cameras and Machine Learning Combine to Snoop Out Passwords"

    A team of researchers at the University of Glasgow published a paper describing their method, ThermoSecure, which discovers passwords and PINs. ThermoSecure involves using a combination of thermal imaging technology and Artificial Intelligence (AI) to expose passwords on input devices such as keyboards, touchpads, and touch screens. According to the researchers, during testing, ThermoSecure effectively attacked 6-symbol, 8-symbol, 12-symbol, and 16-symbol passwords with an average accuracy of 92 percent, 80 percent, 71 percent, and 55 percent, respectively. Furthermore, these results were based on relatively 'cold' evidence, and the paper adds that thermal images captured within 30 seconds provide even greater accuracy. The system requires a thermal camera, which has become significantly less expensive in recent years. According to the research paper, a useful device may only cost $150. In regard to AI, the system uses a Mask RCNN-based object detection technique that essentially maps the thermal image to keys. In three phases, variables such as keyboard localization are considered, followed by key entry and multi-press detection, and then algorithms determine the order of key presses. This article continues to discuss the research on thermal attacks against passwords.

    Tom's Hardware reports "Thermal Cameras and Machine Learning Combine to Snoop Out Passwords"

  • news

    Visible to the public "KillNet: We Are Now a Private Military Corporation"

    KillNet, the pro-Russian hacker group notorious for launching Distributed Denial-of-Service (DDoS) attacks, will offer its services to private and state sponsors, according to Killmilk, the group's leader. "KillNet's altruism has come to an end," the group's leader announced on the Telegram channel the gang uses to publicize its latest attacks. Since Russia invaded Ukraine on February 24, KillNet has primarily targeted Ukraine-supporting organizations with DDoS attacks. However, recently, the group appears to have surpassed its usual boundaries, leaking stolen data allegedly belonging to thousands of individuals with connections to NATO. The recent statement by Killmilk on Telegram suggests that the gang's hacktivism has turned to profiteering. According to the gang's leader, KillNet will now be known as a "private military hacker company." Nevertheless, Killmilk has promised that KillNet will continue its destructive activities in support of Russia's interests despite going private. Experts have cautioned against underestimating threat actors who primarily launch DDoS attacks, but their effectiveness remains in question as most of KillNet's targets experience a few hours of downtime before resuming normal operations. This article continues to discuss the KillNet gang becoming a private military hacker company and experts' thoughts on this announced change.

    Cybernews reports "KillNet: We Are Now a Private Military Corporation"

  • news

    Visible to the public "(ISC)2 Urges Countries to Strengthen Collaboration on Cybersecurity Regulation"

    According to (ISC)2, as cybersecurity policies and regulations evolve rapidly worldwide, greater collaboration is necessary to ensure more robust and resilient frameworks to support shared learning and best practices. The international cybersecurity non-profit has led new research in collaboration with the Royal United Services Institute (RUSI), a British think tank, examining cybersecurity legislation and regulation within the UK, the US, Canada, the EU, Japan, and Singapore. The RUSI and (ISC)2 researchers identified various challenges shaping cyber policy across all six jurisdictions, including the need to tackle the shortage of skilled cybersecurity professionals and the growing importance of protecting the critical national infrastructure (CNI). While these two priorities are shared by all six jurisdictions analyzed, the study provides valuable insights on the different approaches these countries take to solve them. The researchers stated that by bringing together insights from different jurisdictions and stakeholders, the study also shows the importance of cooperation between private and public stakeholders and that policymakers increasingly seek harmonization of cyber policy. The researchers stated that it is important to understand which policies are effective in increasing cyber resilience and how they impact businesses and the cyber workforce implementing them. The researchers noted that "ally countries should adopt "a proactive, rather than reactive, approach toward cybersecurity policy and collaborate across borders, industries, and sectors to establish common standards, protocols, and best practices." The research was conducted from December 2022 to March 2023 and was primarily based on a review of existing literature about policies enacted or proposed within the six jurisdictions between 2019 and 2023.

    Infosecurity reports: "(ISC)2 Urges Countries to Strengthen Collaboration on Cybersecurity Regulation"

  • news

    Visible to the public "New ‘Atomic macOS Stealer’ Malware Offered for $1,000 Per Month"

    Security researchers at Cyble have revealed that a new piece of macOS malware named Atomic macOS Stealer, or AMOS, appears to provide a wide range of data theft capabilities, targeting passwords, files, and other types of information. The researchers analyzed a sample of the AMOS malware that was uploaded recently to VirusTotal and which had zero detections on the malware analysis platform at the time of its discovery. It has currently only been detected by one antimalware engine. According to the researchers, the malware, advertised on a Telegram channel, has been offered for $1,000 per month. Its author claims it can steal all passwords from the Keychain, full system information, and files from the compromised computer. It can also allegedly steal passwords, cookies, cryptocurrency wallets, and payment card data from browsers such as Chrome, Firefox, Brave, Edge, Vivaldi, Yandex, and Opera. It can also steal cryptocurrency wallets outside the web browser and from browser extensions. The researchers stated that users of the malware are provided a web-based management interface hosted on a .ru domain, and exfiltrated data can also be sent to specified Telegram channels. The malware is delivered as a .dmg file, and when first executed, it displays a fake prompt to trick the victim into handing over their macOS system password. A researcher from Trellix has also analyzed the malware and noticed that an IP address used by AMOS might be linked to Raccoon Stealer, a piece of malware previously tied to Russian and Ukrainian threat actors. The researchers noted that it is unclear if the malware is signed and how much effort it takes to get it to bypass macOS security features and get it to execute on a system. The researchers stated that in many cases, malware designed to run on macOS may appear to have numerous capabilities, but actually getting it to execute on targeted systems is not an easy task.

    SecurityWeek reports: "New 'Atomic macOS Stealer' Malware Offered for $1,000 Per Month"

  • news

    Visible to the public "Google Goes After CryptBot Distributors"

    Google has recently revealed details of a new legal campaign to pursue the operators of prolific information-stealing malware, which has so far infected an estimated 670,000 computers. Google launched a civil case against several of CryptBot's major distributors, which it said are likely based in Pakistan. Google stated that to hamper the spread of CryptBot, the court has granted a temporary restraining order to bolster their ongoing technical disruption efforts against the distributors and their infrastructure. The court order allows Google to take down current and future domains that are tied to the distribution of CryptBot. Google noted that this will slow new infections from occurring and decelerate the growth of CryptBot. Google stated that lawsuits have the effect of establishing both legal precedents and putting those profiting and others who are in the same criminal ecosystem under scrutiny. CryptBot is typically hidden in legitimate-seeming but maliciously modified software like Google Earth Pro and Google Chrome. Google stated that if consumers unwittingly download the software, the CryptBot malware will get to work stealing authentication credentials, social media account logins, cryptocurrency wallets, and more from their machines.

    Infosecurity reports: "Google Goes After CryptBot Distributors"

  • news

    Visible to the public "Using Quantum Physics to Secure Wireless Devices"

    The security of communication between wireless devices, such as access cards, key fobs, Bluetooth speakers, and more, is essential to maintaining privacy and preventing theft. However, these tools are not foolproof, and it is becoming easier to find information on how to hack, clone, and circumvent these systems. Therefore, computer engineers at the University of Illinois Chicago (UIC) have been researching methods for developing more secure devices. In a new paper, UIC researchers describe a quantum physics-inspired method for improving wireless device identification and securing device-to-device communication. It uses a truly random and unique digital fingerprint to create a nearly unbreakable hardware encryption system. The scientists used a quantum physics theory with mathematical experiments to identify a "divergent exceptional point." Quantum physics describes systems that are difficult or impossible to measure precisely, and a quantum state describes a parameter space or range of possible measurements. There are exceptional points within these states where the system's uncertainty is at its maximum. These points present promise for cryptography because the more uncertain the system is, the more secure it is. This article continues to discuss the research on spectral sensitivity near exceptional points as a resource for hardware encryption.

    The University of Illinois Chicago reports "Using Quantum Physics to Secure Wireless Devices"

  • news

    Visible to the public "Microsoft Blames Clop Affiliate for PaperCut Attacks"

    Microsoft has recently claimed that recent attacks exploiting two vulnerabilities in the PaperCut print management software are likely the result of a Clop ransomware affiliate. The two bugs in question are CVE-2023-27350, a critical unauthenticated remote code execution flaw, and CVE-2023-27351, a high severity unauthenticated information disclosure flaw. The former has a CVSS score of 9.8. Microsoft Threat Intelligence attributed recent attacks exploiting the bugs to "Lace Tempest," a threat actor it says overlaps with FIN11 and TA505. FIN11 is linked to the infamous Clop ransomware gang and the Accellion FTA extortion campaign, while TA505 is reportedly behind the Dridex banking Trojan and Locky ransomware. Microsoft stated that also known as DEV-0950, Lace Tempest is a Clop ransomware affiliate that has previously been detected using GoAnywhere exploits and Raspberry Robin malware in ransomware campaigns. Microsoft said the threat group exploited the PaperCut bugs in attacks as early as April 13. Microsoft stated that in observed attacks, Lace Tempest ran multiple PowerShell commands to deliver a TrueBot DLL, which connected to a C2 server, attempted to steal LSASS credentials, and injected the TrueBot payload into the conhost.exe service. Next, Lace Tempest delivered a Cobalt Strike Beacon implant, conducted reconnaissance on connected systems, and moved laterally using WMI. The actor then identified and exfiltrated files of interest using the file-sharing app MegaSync. Microsoft noted that other groups might also be exploiting the two PaperCut vulnerabilities in the wild, noting that some intrusions had led to the deployment of the prolific LockBit ransomware.

    Infosecurity reports: "Microsoft Blames Clop Affiliate for PaperCut Attacks"

  • news

    Visible to the public "RTM Locker's First Linux Ransomware Strain Targeting NAS and ESXi Hosts"

    The threat actors behind RTM Locker have a new ransomware strain capable of infecting Linux systems. Uptycs stated in a new report that the locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by the leaked source code of the Babuk ransomware. Files are encrypted using a combination of ECDH on Curve25519 (asymmetric encryption) and Chacha20 (symmetric encryption). Trellix first documented RTM Locker earlier this month, citing the adversary as a private Ransomware-as-a-Service (RaaS) provider. Read The Manual (RTM), a cybercriminal group active at least since 2015, is its source. The group is known for avoiding high-profile targets, such as critical infrastructure, law enforcement, and hospitals, in order to attract the least amount of attention possible. In addition to using affiliates to extort victims, it leaks stolen information if they refuse to pay. Before starting the encryption process, the Linux variant terminates all virtual machines operating on a compromised host, singling out ESXi hosts. The initial infector used to distribute ransomware is currently unknown. This article continues to discuss researchers' findings and observations regarding RTM Locker's first Linux ransomware strain.

    THN reports "RTM Locker's First Linux Ransomware Strain Targeting NAS and ESXi Hosts"

  • news

    Visible to the public "CISOs Struggle to Manage Risk Due to DevSecOps Inefficiencies"

    According to Dynatrace, as hybrid and multi-cloud environments become more complex and teams continue to rely on manual processes that make it easier for vulnerabilities to enter production environments, it becomes more difficult for CISOs to keep software secure. DevSecOps adoption is hindered by the continued use of siloed tools for development, delivery, and security tasks. This emphasizes the increasing need for observability and security to converge in order to fuel data-driven automation that enables development, security, and Information Technology (IT) operations teams to deliver faster, more secure innovation. Sixty-eight percent of CISOs report that vulnerability management has become more difficult due to the increased complexity of their software supply chain and cloud ecosystem. Before deployment in production environments, only 50 percent of CISOs are confident that the software delivered by development teams has been thoroughly tested for vulnerabilities. Additionally, 77 percent of CISOs say it is difficult to prioritize vulnerabilities due to a lack of information about the risk they pose to their environment. Fifty-eight percent of vulnerability alerts that security scanners alone flag as "critical" are not significant in production, wasting development time pursuing false positives. On average, members of development and application security teams dedicate 28 percent of their time, or 11 hours per week, on vulnerability management tasks, which could be automated. This article continues to discuss key findings from Dynatrace's report on CISOs struggling to manage risk due to DevSecOps inefficiencies.

    Help Net Security reports "CISOs Struggle to Manage Risk Due to DevSecOps Inefficiencies"

  • news

    Visible to the public "Tencent QQ Users Hacked in Mysterious Malware Attack, Says ESET"

    The Chinese Advanced Persistent Threat (APT) hacking group known as Evasive Panda is linked to an attack that distributed the MsgBot malware as part of an automatic update for the Tencent QQ messaging app. Since 2012, the cyberespionage group Evasive Panda has targeted organizations and individuals in China, Hong Kong, Macao, Nigeria, and numerous Southeast and East Asian countries. In January 2022, security researchers at ESET discovered the threat actor's most recent campaign, citing evidence that the operation began in 2020. Most of the campaign's victims are members of an international Non-Governmental Organization (NGO) and reside in the provinces of Gansu, Guangdong, and Jiangsu, indicating a highly targeted approach. According to ESET, the malicious MsgBot malware payload was delivered to victims as a Tencent QQ software update from developer-connected URLs and IP addresses. This indicates two possible attack scenarios: a supply chain attack and an adversary-in-the-middle (AITM) attack. This article continues to discuss the Evasive Panda APT group compromising the Tencent QQ messaging app.

    Bleeping Computer reports "Tencent QQ Users Hacked in Mysterious Malware Attack, Says ESET"

  • news

    Visible to the public "Metaverse Version of the Dark Web Could Be Nearly Impenetrable"

    In the coming years, as the metaverse takes shape, many security issues plaguing cyberspace will also begin to affect virtual space. One of the threats will be the emergence of a new "darkverse," where criminals will be able to operate with greater impunity and danger than they can on the Dark Web today, according to two Trend Micro researchers speaking at an RSA Conference 2023 session on April 26 in San Francisco. The metaverse is a term used to describe a virtual space where individuals and organizations can interact in a computer-generated version of the physical world. A full-fledged metaverse will enable users to shop, work, socialize, and engage in other activities in a virtual replica of the physical world, similar to how multiplayer online games allow users to create digital avatars of themselves and interact with other gamers in fantasy worlds. According to the researchers, the same phenomenon will occur in the cybercriminal underworld. They noted that, just as the Dark Web exists on an unindexed deep web, the darkverse will operate within an unindexed "deepverse" that will be difficult for law enforcement to penetrate. Senior threat researchers at Trend Micro released a report last year detailing how security and privacy threats will likely emerge and evolve in the metaverse as its use increases. Among the threats identified in the report were amplified versions of some existing issues, such as social engineering, financial fraud, and privacy risks, as well as some novel threats, such as risks associated with NFTs, and cyber-physical threats. This article continues to discuss why it will be difficult for law enforcement to take down criminal activities on the deepverse.

    Dark Reading reports "Metaverse Version of the Dark Web Could Be Nearly Impenetrable"

  • news

    Visible to the public "8 Areas of Future Research in Zero Trust"

    In the National Cybersecurity Strategy published on March 1, 2023, the Biden administration committed to improving federal cybersecurity by implementing a Zero Trust Architecture (ZTA) strategy as well as modernizing Information Technology (IT) and Operational Technology (OT) infrastructure. Experts at Carnegie Mellon University have identified zero trust-related issues that warrant further study. By focusing on these areas, government, academia, and industry organizations can collaborate to develop solutions that improve and accelerate ongoing ZTA transformation efforts. Zero trust is a security framework that requires all users, whether inside or outside the organization's network, to be authenticated, authorized, and validated for security configuration and posture prior to gaining or maintaining access to applications and data. CMU has identified eight potential research areas in zero trust. These areas include agreeing on a generally accepted set of basic zero trust definitions, establishing a common view of zero trust, establishing standard zero trust maturity levels, explaining how to progress through zero trust maturity levels, ensuring zero trust supports distributed architectures, and more. The highlighting of these areas of future research raises awareness, fosters collaboration between public and private organizations to address real-world problems, and accelerates the adoption of zero trust in government and industry. This article continues to discuss the potential areas of future research in zero trust.

    Carnegie Mellon University reports "8 Areas of Future Research in Zero Trust"

  • news

    Visible to the public  "Used Routers Often Come Loaded With Corporate Secrets"

    Researchers from the security company ESET discovered that over half of the secondhand enterprise routers they purchased for testing were overflowing with network information, credentials, and sensitive data about the institutions that previously owned them. The researchers purchased 18 used routers from Cisco, Fortinet, and Juniper Networks. Nine were exactly as their previous owners had left them and were completely accessible, whereas only five had been thoroughly wiped. Two were encrypted, one was inoperable, and one was a copy of another device. The nine unprotected devices all contained Virtual Private Network (VPN) credentials, credentials for another secure network communication service, or hashed root administrator passwords. In addition, all of them contained sufficient information to identify the previous owner or operator of the router. Eight of the nine unprotected devices had router-to-router authentication keys and details regarding how the router connected to specific applications used by the previous owner. Four devices exposed credentials for connecting to the networks of other entities, such as trusted partners, collaborators, and more. Three contained information on how a third party could connect to the network of the previous owner, and two contained customer information. This article continues to discuss the exposure of corporate secrets by old discarded routers.

    Ars Technica reports "Used Routers Often Come Loaded With Corporate Secrets"

  • news

    Visible to the public "Irrigation Systems in Israel Hit With Cyber Attack That Temporarily Disabled Farm Equipment"

    The cyberattack that targeted irrigation systems in Israel is suspected to be part of an annual "hacktivist" campaign. The hackers targeted farms and water treatment facilities. A dozen farms failed to heed a warning from the National Cyber Directorate to disable certain remote connections before the hacking campaign struck. There was a temporary deactivation of automated irrigation systems. The cyberattack is part of an annual campaign called "OpIsrael," which targets the country in April with Distributed Denial-of-Service (DDoS) attacks and attempted breaches. The campaign was initiated in 2013 by hackers operating under the banner of Anonymous. It has never been attributed to a specific group or country, but it has always conveyed pro-Palestinian sentiment and has been praised by Hamas spokespersons. The cyberattack campaign appears to present new targets of opportunity each year. This year, the threat actors have focused on irrigation systems. The Galil Sewage Corporation was one of the targeted wastewater processors that was compromised, and the company reports that the cyberattack affected several controllers for about one day and disrupted some treatment processes. This article continues to discuss the OpIsrael campaign and its recent targets.

    CPO Magazine reports "Irrigation Systems in Israel Hit With Cyber Attack That Temporarily Disabled Farm Equipment"

  • news

    Visible to the public "As Cyber Attacks Surge, the Defense Department Turns to Universities for Cybersecurity Grads"

    As cyberattacks make the US, its businesses, and its citizens more vulnerable to data breaches, ransomware, and IP theft, the country's demand for cybersecurity professionals exceeds its talent pool. In 2022, the US cybersecurity workforce grew by five percent, but the supply-and-demand gap widened by nine percent. The gap may persist for a generation if the pipeline is not expanded significantly and quickly. In order to better defend against cyberattacks and electromagnetic spectrum (EMS) weapons, the Department of Defense (DOD) has collaborated with 19 universities, the Air Force Research Laboratory, and the STEM-talent and defense-tech accelerator Griffiss Institute to train the next generation of cybersecurity professionals. The Virtual Institutes for Cyber and Electromagnetic Spectrum Research and Employ (VICEROY) program groups university partners into six virtual institutes. Each institute receives $1.5 million over two years for its cybersecurity, EMS, cryptography, and data science efforts in accordance with DOD workforce requirements. VICEROY DECREE (DOD Electromagnetic and Cyber Research and Experiential Education) is a virtual institute led by Northeastern University that also includes Northern Arizona University, the University of Houston, and the University of South Carolina. This article continues to discuss the goals and structure of the VICEROY program.

    Northeastern University reports "As Cyber Attacks Surge, the Defense Department Turns to Universities for Cybersecurity Grads"

  • news

    Visible to the public "MITRE Debuts Cyber Risk Analysis & Adversarial Emulation Tools to Secure Critical Infrastructure"

    Critical infrastructure is riddled with cyber vulnerabilities, but the issue is which vulnerabilities must be mitigated first. MITRE is debuting its Infrastructure Susceptibility Analysis (ISA) that identifies and prioritizes mitigations by exploring how adversaries compromise infrastructure and what is required to stop them. MITRE is also releasing the MITRE Caldera for OT tool, which enables security teams to conduct automated adversary emulation exercises specifically aimed at Operational Technology (OT). Many organizations need help assessing risk and prioritizing their OT system cybersecurity efforts. The coverage provided by a traditional IT strategy without an OT-specific solution is insufficient. Based on the OT system's vulnerability to adversaries and its current architecture, MITRE's ISA methodology prioritizes risks accordingly. Using risk-based context, ISA expands on current threat intelligence approaches to help organizations reduce risk in operational environments. MITRE developed the ISA methodology using several existing MITRE capabilities and research areas, such as MITRE ATT&CK for ICS, CAPEC, and Threat-Informed Failure Scenario Development, to create a new model that enables asset owners to assess the most likely adversary kill chains. The outcome is a multi-step, evolving process that helps organizations understand the potential technical effects of cyberattacks. These technology-specific insights are combined with threat information to produce actionable intelligence for OT systems. This article continues to discuss MITRE's new cyber risk analysis and adversarial emulation tools aimed at bolstering the security of critical infrastructure.

    MITRE reports "MITRE Debuts Cyber Risk Analysis & Adversarial Emulation Tools to Secure Critical Infrastructure"

  • news

    Visible to the public "A Security Team Is Turning This Malware Gang's Tricks Against It"

    The attacks and operations of specific cybercriminal groups, such as ransomware gangs, botnet operators, and financial fraudsters, receive special attention. However, the larger ecosystem behind digital crime has various malicious actors and organizations that sell support services to cybercriminal customers. Researchers from the security company eSentire are disclosing their methods for disrupting the operations of a long-standing criminal group composed of businesses and other organizations, selling digital access to other attackers. Known as an initial-access-as-a-service operation, the Gootloader malware and the group behind it have been active for years. The Gootloader gang infects victim organizations and then sells access to deliver a customer's desired malware into the compromised target network, be it ransomware, data exfiltration mechanisms, or other tools to further compromise the target. The eSentire researchers gathered evidence that, between 2019 and 2022, the notorious Russia-based ransomware gang REvil regularly collaborated with Gootloader to get initial access to victims, a relationship that other researchers have also observed. They did this by tracking Gootloader page data. Joe Stewart, the principal security researcher at eSentire, and Keegan Keplinger, a senior threat researcher, designed a web crawler to monitor live Gootloader web pages and formerly infected sites. There are currently about 178,000 live Gootloader web pages and over 100,000 pages that appear to have been infected with Gootloader in the past. This article continues to discuss researchers applying the same mechanisms used by the cybercriminals behind the Gootloader malware to stop the gang.

    Wired reports "A Security Team Is Turning This Malware Gang's Tricks Against It"

  • news

    Visible to the public "Peugeot Leaks Access to User Information in South America"

    Stellantis' French automobile brand Peugeot exposed its customers in Peru, a South American country with a population of roughly 34 million. Although the country is not a particularly significant market for the automaker, this discovery is yet another example of how well-known brands fail to secure sensitive data. The Cybernews research team found an exposed environment file (.env) on the official Peugeot store for Peru on February 3. The exposed file contained a full MySQL database Uniform Resource Identifier (URI), a unique sequence of characters identifying a resource, and the username and password to access it. The file also contained a JSON Web Token (JWT) passphrase and the locations of private and public keys, in addition to a link to the site's git repository and a Symfony application secret. This article continues to discuss the exposed environment file hosted on the official Peugeot store for Peru and the potential impact of this leak.

    Cybernews reports "Peugeot Leaks Access to User Information in South America"

  • news

    Visible to the public "Critical Flaw Patched in VMware Workstation and Fusion"

    VMware has recently addressed multiple security vulnerabilities in its Workstation and Fusion products. The vulnerabilities, identified as CVE-2023-20869, CVE-2023-20870, CVE-2023-20871, and CVE-2023-20872, have been privately reported to VMware and have a CVSS v3.x scores between 7.3 and 9.3. VMware noted that one of the flaws, CVE-2023-20869, is a stack-based buffer overflow vulnerability in the functionality for sharing host Bluetooth devices with the virtual machine (VM). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. VMware has evaluated this bug as being of Critical severity with a maximum CVSS v3.x base score of 9.3. Another vulnerability, CVE-2023-20870, is an out-of-bounds read flaw in the same Bluetooth functionality. VMware has evaluated this vulnerability as Important, with a maximum CVSS v3.x base score of 7.1. VMware noted that CVE-2023-20871, on the other hand, is a local privilege escalation vulnerability in VMware Fusion. VMware has evaluated this vulnerability as Important, with a maximum CVSS v3.x base score of 7.3. Finally, CVE-2023-20872 is an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation in VMware Workstation and Fusion. VMware has evaluated this bug as being of Important severity with a maximum CVSS v3.x base score of 7.7. VMware has released updates and workarounds to remediate these vulnerabilities in the affected products.

    Infosecurity reports: "Critical Flaw Patched in VMware Workstation and Fusion"

  • news

    Visible to the public "Alloy Taurus Hackers Update PingPull Malware to Target Linux Systems"

    Security researchers at Palo Alto Network's Unit 42 have observed the threat actor known as Alloy Taurus deploying a new variant of the PingPull malware targeting Linux systems. The researchers believe Alloy Taurus is a Chinese advanced persistent threat (APT) group focusing on espionage campaigns and has been active since at least 2012. This group has historically targeted telecommunications companies operating across Asia, Europe, and Africa. The researchers stated that in recent years, they have also observed the group expand their targeting to include financial institutions and government entities. As part of the new campaign, the security researchers said they also saw Alloy Taurus targeting individuals in South Africa and Nepal. Most vendors initially identified the Linux sample observed by the researchers as benign. However, further analysis revealed that it matched the communication structure, parameters, and commands of the known PingPull malware. The researchers noted that the malicious tool is designed to communicate with its command-and-control (C2) server using encrypted data and can receive and execute commands from the server. The results of these commands are then sent back to the server for further action. The researchers stated that this Linux variant of PingPull malware uses the same AES key as the original Windows PE (Preinstallation Environment) variant for encrypting its communication with the C2 server. While investigating the C2 domain of the PingPull Linux variant, the researchers also identified an additional sample that communicated with the same domain. This malware was found to be a backdoor, which the team called Sword2033. The backdoor supports three essential functions: uploading and downloading files to and from the system, and executing commands. The researchers noted that these commands are identical in value and functionality to those used by the PingPull malware. Further analysis of the C2 infrastructure revealed links to Alloy Taurus activities. The researchers noted that the identification of a Linux variant of PingPull malware and the recent use of the Sword2033 backdoor suggests that the group continues to evolve its operations in support of its espionage activities.

    Infosecurity reports: "Alloy Taurus Hackers Update PingPull Malware to Target Linux Systems"

  • news

    Visible to the public "A Developer Exploited an API Flaw to Provide Free Access to GPT-4"

    Unconcerned with legal repercussions, a developer is attempting to reverse engineer Application Programming Interfaces (APIs) in order to provide free access to popular Artificial Intelligence (AI) models such as OpenAI's GPT-4. The developer's project called GPT4Free exploded on GitHub over the past few days after links to it on Reddit went viral. GPT4Free appears to provide free and nearly unlimited access to GPT-4 and GPT-3.5, the predecessor to GPT-4. The developer, a computer science student, stated that reverse engineering has always been an area of interest to them. Instead of bypassing OpenAI's paywall, GPT4Free tricks the OpenAI API into believing that it is receiving requests from websites with paid OpenAI accounts. The researcher claims that GPT4Free only serves "educational purposes." There is expected to be a game of whack-a-mole between efforts such as GPT4Free and OpenAI that reflects the larger cybersecurity landscape. If the model-serving APIs do not become significantly more difficult to exploit, researchers and malicious actors will continue to take advantage of vulnerabilities. This article continues to discuss the exploitation of an API vulnerability to provide free access to GPT-4.

    TechCrunch reports "A Developer Exploited an API Flaw to Provide Free Access to GPT-4"

  • news

    Visible to the public "UK Cyber Pros Burnt Out and Overwhelmed"

    According to security researchers at Expel, over half (52%) of UK IT decision-makers (ITDMs) expect security team members to leave within the year due to burnout. The researchers polled 500 ITDMs from organizations of all sizes for their study. The researchers noted that nearly half (48%) of respondents claimed that alert fatigue impacts their teams. This typically occurs in security operations (SecOps) teams when they are unable to prioritize multiple alerts from disparate tools. As a result, 93% of respondents said they've regularly missed personal commitments because of their jobs, while a third (34%) said this happens most or all of the time. Over half (52%) agreed that their team spends too much time dealing with unnecessary cybersecurity notifications. The researchers stated that security remains a significant challenge for UK firms. Respondents were most concerned about the impact of malware (43%), followed by ransomware (38%), phishing (38%), and business email compromise (25%), although just 14% said the same about nation states. The researchers stated that worryingly, on average, 27% of security budgets went unspent in 2022, amounting to around $66,000 per firm. A fifth (21%) of respondents spent 50% or less of their budgets.

    Infosecurity reports: "UK Cyber Pros Burnt Out and Overwhelmed"

  • news

    Visible to the public "Quad Countries Prepare For Info Sharing on Critical Infrastructure"

    The Quadrilateral Security Dialogue (Quad) is working on a new information-sharing agreement that would help its four members improve cyber-resilience and their response to critical infrastructure (CNI) threats. The four members of the group are the US, Japan, India, and Australia. They aim to reach an agreement by May when they meet in Australia. The cybersecurity agencies of each government will share information on CNI threats passed on to them by the private sector operators of essential services. The Quad also wants to agree on common security standards to align procurement of security management and data encryption systems. That could ensure greater interoperability of systems and minimum baseline security so that they all work well together in an emergency. A joint statement issued by the Quad following a meeting in New Delhi in January 2023 highlighted further steps the group will take. In the longer term, the group has also committed to: "leveraging machine learning and related advanced technologies to enhance cybersecurity; establishing secure channels for Computer Emergency Response Teams (CERT) and private sector threat information sharing; and creating a framework and methodology for ensuring supply chain security and resilience for ICT and operational technology (OT) systems of critical sectors."

    Infosecurity reports: "Quad Countries Prepare For Info Sharing on Critical Infrastructure"

  • news

    Visible to the public SoS Musings #72 - Making the Move to Memory-Safe Programming Languages

    SoS Musings #72 -

    Making the Move to Memory-Safe Programming Languages

  • news

    Visible to the public Cybersecurity Snapshots #41 - BlackCat Ransomware Group

    Cybersecurity Snapshots #41 -

    BlackCat Ransomware Group

  • news

    Visible to the public "Making Emergency Calls More Secure"

    The National Science Foundation (NSF) has awarded a $1.2 million grant to a team of Michigan State University (MSU) researchers to continue enhancing the security of cellular 911 calls. Customers benefit from improved coverage and faster service as the nation's cellular networks and technological infrastructure continue to develop. However, these advancements also present new opportunities for cybercriminals to exploit security vulnerabilities. Researchers from the College of Engineering at MSU have been concerned with the security of cellular 911 calls. They want to advance the technology for protecting next-generation services over cellular networks from the design phase to the implementation phase. This grant will allow Guan-Hua "Scott" Tu and Li Xiao, MSU professors of computer science and engineering, to continue expanding their work on securing cellular 911 calls. At the 28th Annual International Conference on Mobile Computing and Networking (MobiCom) in October 2022, Tu and Xiao's team presented work titled "Uncovering Insecure Designs of Cellular Emergency Services (911)." This presentation highlighted vulnerabilities in the systems implemented in the US that allow anyone to connect to emergency services from a mobile phone. The team demonstrated that these vulnerabilities could be exploited to cause various issues, including allowing attackers to hijack cell services, send spam to customers, and even prevent 911 callers from reaching dispatchers. This article continues to discuss the project to continue reducing cybersecurity risks to protect cellular 911 calls.

    Michigan State University reports "Making Emergency Calls More Secure"

  • news

    Visible to the public Cyber Scene #79 - Tech Driving Geopolitics; Cyber at the Wheel

    Cyber Scene #79 -

    Tech Driving Geopolitics; Cyber at the Wheel

  • news

    Visible to the public "Charming Kitten's New BellaCiao Malware Discovered in Multi-Country Attacks"

    Charming Kitten is an Iranian nation-state group that has targeted multiple victims in the US, Europe, the Middle East, and India with a novel malware called BellaCiao. BellaCiao, discovered by Bitdefender Labs, is a "personalized dropper" capable of delivering other malware payloads onto a victim machine in response to commands from an actor-controlled server. The cybersecurity company stated that each sample collected was linked to a specific victim and contained hard-coded information such as specially crafted subdomains, a company name, and an associated public IP address. Charming Kitten, also known as APT35, Cobalt Illusion, Educated Manticore, ITG18, Mint Sandstorm, TA453, and Yellow Garuda, is an Advanced Persistent Threat (APT) group associated with the Islamic Revolutionary Guard Corps (IRGC). Over the years, the group has deployed backdoors in systems belonging to various industry verticals using multiple techniques. Microsoft linked the threat actor to retaliatory attacks against critical infrastructure entities in the US between late 2021 and mid-2022, which involved custom malware such as harmPower, Drokbk, and Soldier. This article continues to discuss Charming Kitten's use of the BellaCiao malware and the history of the APT group.

    THN reports "Charming Kitten's New BellaCiao Malware Discovered in Multi-Country Attacks"

  • news

    Visible to the public "Chinese Hackers Use New Linux Malware Variants for Espionage"

    In cyberespionage attacks, hackers are deploying new Linux malware variants, such as a new PingPull variant and a previously undocumented backdoor known as Sword2033. PingPull is a Remote Access Trojan (RAT) first identified by Unit 42 in espionage attacks conducted by the Chinese state-sponsored group Gallium, also known as Alloy Taurus, last summer. The group attacked government and financial institutions in Australia, Russia, Belgium, Malaysia, Vietnam, and the Philippines. Unit 42 has continued to monitor these malicious campaigns and now reports that the Chinese threat actor is using new malware variants against targets in South Africa and Nepal. The Linux variant of PingPull is an ELF file that only three out of 62 anti-virus vendors identify as malicious. Unit 42 determined that it is a variant of the well-known Windows malware by observing similarities in the HTTP communication structure, POST parameters, AES key, and commands it receives from the threat actor's command-and-control (C2) server. This article continues to discuss new Linux malware variants used by the Chinese state-sponsored group Gallium in cyberespionage attacks.

    Bleeping Computer reports "Chinese Hackers Use New Linux Malware Variants for Espionage"

  • news

    Visible to the public "New Coercive Tactics Used to Extort Ransomware Payments"

    According to GuidePoint Security, the increase in reported ransomware victims during the first quarter of 2023 reflects the continued prevalence of ransomware as a global, industry-agnostic threat. The report is based on data from publicly available resources, including the threat groups themselves, as well as an analysis of the ransomware threat landscape. The GuidePoint Research and Intelligence Team (GRIT) tracked 849 publicly posted ransomware victims claimed by 29 threat groups during the first quarter. The most recent report from GRIT reveals a 27 percent increase in public ransomware victims compared to the first quarter of 2022 and a 25 percent increase compared to the fourth quarter of 2022. Manufacturing, technology, education, banking and finance, and healthcare organizations continue to account for the majority of ransomware victims that have been posted publicly. LockBit remains the most prolific ransomware threat group, but Clop has taken the lead due to its rapid and extensive exploitation of a file-sharing application vulnerability. Vice Society continues to be the most effective group targeting the education sector, supporting the claim that certain groups maintain a consistent targeting profile. GRIT's analysis reveals an increase in the use of novel coercive tactics by multiple prolific ransomware groups that follow the "double extortion" model of operations. This article continues to discuss key findings from the GuidePoint GRIT Q1 2023 Ransomware Report.

    Help Net Security reports "New Coercive Tactics Used to Extort Ransomware Payments"

  • news

    Visible to the public "Attackers Abuse PaperCut RCE Flaws to Take Over Enterprise Print Servers"

    Researchers have disclosed new information about how attackers are circumventing authentication and executing remote code by exploiting two vulnerabilities in the PaperCut enterprise print management system used by more than 100 million customers worldwide. The vulnerabilities bring further attention to the threat that enterprise printers and related systems pose to organizations' overall security, a frequently overlooked threat. Researchers from PaperCut and security companies have already warned that attackers are exploiting the vulnerabilities, which PaperCut patched in an update to its PaperCut MF and NG products on March 8. Threat actors are using the flaws to seize control of unpatched versions of the software. On April 21, the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerabilities to its catalog of known exploited vulnerabilities. This article continues to discuss attackers exploiting flaws in the PaperCut enterprise print management system to bypass authentication and execute remote code.

    Dark Reading reports "Attackers Abuse PaperCut RCE Flaws to Take Over Enterprise Print Servers"

  • news

    Visible to the public "A New Mirai Botnet Variant Targets TP-Link Archer A21"

    The Zero Day Initiative (ZDI) threat-hunting team observed the Mirai botnet attempting to exploit a vulnerability, tracked as CVE-2023-1389 with a CVSS score of 8.8, also known as ZDI-CAN-19557/ZDI-23-451 in TP-Link Archer AX21 Wi-Fi routers. The flaw is an unauthenticated command injection vulnerability in the locale Application Programming Interface (API) of the web management interface used in the TP-Link Archer AX21 router. The cause of the problem is the lack of input sanitization in the locale API managing the router's language settings. As a result, a remote attacker can trigger the issue to inject commands that should be executed on the device. The vulnerability was disclosed to ZDI for the first time during Pwn2Own Toronto 2022. Team Viettel and Qrious Security reported exploits for LAN and WAN interface accesses. TP-Link released a firmware update in March to fix multiple vulnerabilities, including CVE-2023-1389. ZDI reported that threat actors began exploiting the vulnerability after the public release of the fix, with initial attacks focusing on Eastern Europe. Threat actors are exploiting the vulnerability by sending a specially crafted request to the router that includes a command payload as part of the country parameter. Then, the attackers send a second request that causes the command to be executed. This article continues to discuss a new Mirai botnet variant exploiting the ZDI-CAN-19557/ZDI-23-451 vulnerability in TP-Link Archer AX21 Wi-Fi routers.

    Security Affairs reports "A New Mirai Botnet Variant Targets TP-Link Archer A21"

  • news

    Visible to the public "MedCrypt Funds Medical Device Usable Security Research at the School of Engineering at Tufts University"

    MedCrypt, a provider of proactive cybersecurity solutions for medical device manufacturers, has announced its financial support for a fellowship program at Tufts University's School of Engineering that will fund research into medical device security and threat modeling. Fifty-three percent of connected medical devices and other Internet of Things (IoT) devices in hospitals contain a critical vulnerability. Although the Food and Drug Administration (FDA) and the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) recognize the importance of threat modeling as a process resulting in more secure devices, a Ponemon Institute study found that about 49 percent of device manufacturers do not follow FDA guidance to mitigate or reduce inherent security risks. To address this issue, Ronald Thompson and Daniel Votipka will conduct research in the Tufts Security and Privacy Lab at the School of Engineering on the effectiveness and applicability of threat modeling and other security measures that organizations can use as a guide to establishing more efficient and repeatable security processes for medical devices. This article continues to discuss the new research initiative aimed at investigating the challenges of effective threat modeling for medical devices and making cybersecurity evidence more reproducible.

    PR Newswire reports "MedCrypt Funds Medical Device Usable Security Research at the School of Engineering at Tufts University"

  • news

    Visible to the public "The Car Thieves Using Tech Disguised Inside Old Nokia Phones and Bluetooth Speakers"

    Researchers have further explored the world of car hacking. A new type of vehicle theft is spreading across the US. To gain access to a vehicle's control system, criminals can use small devices, which are sometimes hidden within seemingly harmless Bluetooth speakers or mobile phones. This allows thieves with little technical knowledge to steal cars without the key, sometimes in as little as 15 seconds. With the devices available for purchase online for a few thousand dollars, the entry barrier for stealing even the most expensive luxury vehicles has been drastically lowered. Ken Tindell, CTO of the vehicle cybersecurity company Canis Labs, and Ian Tabor, Tindell's colleague in automotive cybersecurity, published their research on these devices. Tabor purchased a reverse engineering device after suspecting that car thieves used one to steal his Toyota RAV4 last year. Tabor discovered devices that target Jeeps, Maseratis, and other vehicle brands. They detailed a Controller Area Network (CAN) injection attack that works by sending fake messages appearing to be from the vehicle's smart key receiver. The underlying issue is that these messages are trusted without verification. Once the thieves have accessed the necessary cables by removing the headlights, they can send these messages using their devices. This article continues to discuss new research on car hacking.

    Motherboard reports "The Car Thieves Using Tech Disguised Inside Old Nokia Phones and Bluetooth Speakers"

  • news

    Visible to the public "AI-Generated Spam May Soon Be Flooding Your Inbox – And It Will Be Personalized to Be Especially Persuasive"

    The battle between spam blockers and spammers will intensify as generative Artificial Intelligence (AI) emerges as a new weapon. Recent AI advancements made by ChatGPT could provide spammers with new tools to evade filters, capture people's attention, and persuade them to click, purchase, or share personal information. As the director of the University of South Florida's Advancing Human and Machine Reasoning lab, John Licato explores the intersection of AI, Natural Language Processing (NLP), and human reasoning. He has studied how AI can learn the preferences, beliefs, and peculiarities of individuals. People need to be prepared for more intelligent spam that can exploit their vulnerabilities. AI advancements suggest that fraudsters may no longer need to rely on hit-or-miss methods. Based on easily accessible information, such as social media posts, AI could enable them to target individuals and make their messages more convincing. This article continues to discuss how AI will be used for spam.

    The Conversation reports "AI-Generated Spam May Soon Be Flooding Your Inbox - And It Will Be Personalized to Be Especially Persuasive"

  • news

    Visible to the public "Google Audit Finds Vulnerabilities in Intel TDX"

    Google recently published the results of a nine-month audit of Intel Trust Domain Extensions (TDX), which resulted in the discovery of ten security defects. Providing hardware isolated virtual machines, TDX has been added to some Intel Xeon Scalable CPUs to support confidential computing by isolating sensitive resources from the hosting environment. Google Cloud Security and Project Zero researchers, working together with Intel engineers, focused on identifying any vulnerabilities in Intel's technology before it entered production. The researchers identified 81 potential attack vectors and ten confirmed vulnerabilities. Nine of the defects were addressed in the TDX code, while the tenth issue required changes to the guide for writing a BIOS to support TDX. Intel also made five defense-in-depth changes. Google stated that the vulnerabilities could lead to arbitrary code execution, cryptographic weaknesses, denial-of-service conditions, and weaknesses in debug or deployment facilities. No CVE identifiers were issued for the discovered bugs, but Intel did assess their severity and assigned a CVSS score of 9.3 to an incorrect handling of interrupts when the Authenticated Code Module (ACM) transitioned from the privileged execution context to an untrusted context. The flaw could be exploited to execute arbitrary code within the privileged ACM execution mode, compromising both TDX integrity and the security of any deployed virtual machines. All confirmed issues were mitigated before the production release of the 4th gen Intel Xeon Scalable processors. According to Google, only two of the identified vulnerabilities were memory safety issues, with logical bugs representing the most common type of identified flaws. Google also discovered design-level and implementation issues in pre-release code, and Intel decided to release the reviewed code in open source so that further reviews could be performed.

    SecurityWeek reports: "Google Audit Finds Vulnerabilities in Intel TDX"

  • news

    Visible to the public "Data Security Breach May Have Left Jewel-Osco Employees' Information Exposed"

    Thousands of Jewel-Osco employees might have had their personal information exposed in a data breach. In a letter sent to employees by Jewel-Osco parent company Albertsons last week, the letter said hackers were able to infiltrate Albertsons internal computer systems last December and steal employee data, including names, dates of birth, and Social Security numbers. It is currently not clear how many employees have been impacted. Albertsons said the incident has been contained, and they are providing affected individuals with free identity protection services.

    CBS Chicago reports: "Data Security Breach May Have Left Jewel-Osco Employees' Information Exposed"

  • news

    Visible to the public "Yellow Pages Canada Hit by Cyberattack, Black Basta Claims Credit"

    Yellow Pages Canada has recently discovered that it has been the victim of a cyberattack. The company stated that a data breach affected some employee and business customer data, though the company did not specify what type of data in particular. The company noted that based on their investigation to date, they have reason to believe that the unauthorized third party stole certain personal information from servers containing YP employee data and limited data relating to their business customers. The company stated that they have been notifying impacted individuals and reporting to all appropriate privacy regulatory authorities regarding this incident. Yellow Pages did not provide further information about the attack. The infamous threat group Black Basta has claimed responsibility for the cyberattack, saying it involved ransomware and the publication of some data over the weekend.

    Infosecurity reports: "Yellow Pages Canada Hit by Cyberattack, Black Basta Claims Credit"

  • news

    Visible to the public "Researchers Find 250 Million Artifacts Exposed in Misconfigured Registries"

    Security researchers at Aqua Nautilus have recently discovered thousands of misconfigured artifact repositories and container image registries, exposing organizations to potentially serious software supply chain attacks. The researchers found that over 250 million software artifacts and more than 65,000 container images had been exposed in this way, putting at risk some of the world's largest companies, including several Fortune 500 firms. The researchers noted that often artifact management systems and container registries are deliberately connected to the internet and allow anonymous users to connect so that global stakeholders can access open source software. Yet that's not always the case. The researchers saw instances where "restricted environments are accidentally shared with anonymous users" and other examples where teams "accidentally publish sensitive information to public areas." The misconfigurations found by the researchers included mistakenly connecting registries to the internet, exposing secrets to public registries, using default passwords, and granting excessive privileges to users. The researchers also found instances of private container image registries that had been misconfigured to allow anonymous access or even ones that had it built in as a feature. The researchers found 57 registries with critical vulnerabilities, such as default admin passwords, out of which 15 registries allowed admin access with the default password. The researchers detected more than 2100 artifact registries with upload permissions, which may allow an attacker to poison the registry with malicious code. The researchers noted that small, medium, and large organizations worldwide were exposed in this way, including 10 Fortune 500 firms. Five of which had registries containing highly sensitive information that was exposed or allowed anonymous access. The researchers also found two cybersecurity companies with exposed secrets in their registries.

    Infosecurity reports: "Researchers Find 250 Million Artifacts Exposed in Misconfigured Registries"

  • news

    Visible to the public "Hackers to Show They Can Take Over a European Space Agency Satellite"

    Cybersecurity researchers will reveal how they took control of a European Space Agency (ESA) satellite in what is considered the world's first ethical satellite hacking exercise. Experts from the French defense giant Thales, together with members of the ESA team, will provide an explanation of the attack scenario at the CYSAT conference in Paris. Documents have revealed that China is developing similar capabilities to assume control of what it considers hostile satellites. According to one document, China plans to surpass conventional communications jamming, which blocks satellite-to-terrestrial terminal signals. The attackers would instead mimic the operator signals, potentially allowing them to gain control of a satellite and render it incapable of supporting communications, weapons, intelligence, surveillance, and reconnaissance systems. The demonstrative hack was orchestrated specifically for the CYSAT conference in order to illustrate the effects that real-world cyberattacks could have on civilian space systems. It targeted ESA's OPS-SAT, a shoebox-sized nanosatellite launched in December 2019 that contains an experimental computer ten times more powerful than any ESA spacecraft currently in operation. OPS-SAT is designed to address the risks associated with live-testing mission control systems. Thales stated that ESA maintained access to the satellite's systems throughout the exercise, allowing a return to normal operation following the drill. This article continues to discuss the ethical satellite hacking exercise.

    The Record reports "Hackers to Show They Can Take Over a European Space Agency Satellite"

  • news

    Visible to the public "New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks"

    A high-severity security vulnerability is impacting Service Location Protocol (SLP). The vulnerability could be exploited to launch volumetric Denial-of-Service attacks against targets. Bitsight and Curesec researchers stated that attackers exploiting this vulnerability could use vulnerable instances to execute massive DoS amplification attacks with a factor of up to 2200 times, potentially making it one of the largest amplification attacks ever reported. It is estimated that the vulnerability, tracked as CVE-2023-29552 with a CVSS score of 8.6, affects more than 2,000 global organizations and over 54,000 Internet-accessible SLP instances. This includes over 600 product types, including VMWare ESXi Hypervisor, Konica Minolta printers, Planex Routers, IBM Integrated Management Module (IMM), and SMC IPMI. The US, the UK, Japan, Germany, Canada, France, Italy, Brazil, the Netherlands, and Spain are the top 10 countries with the most organizations using SLP instances that are vulnerable. SLP is a service discovery protocol that enables computers and other devices to find printers, file servers, and other network resources in a Local Area Network (LAN). The successful exploitation of CVE-2023-29552 could allow an attacker to leverage vulnerable SLP instances to launch a reflection amplification attack and overwhelm a target server with garbage traffic. This article continues to discuss the potential exploitation and impact of the high-severity security vulnerability impacting Service Location Protocol (SLP).

    THN reports "New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks"

  • news

    Visible to the public "Intel CPUs Vulnerable to New Transient Execution Side-Channel Attack"

    Researchers have discovered a new side-channel attack impacting multiple generations of Intel CPUs. It allows data leakage via the EFLAGS register. Researchers from Tsinghua University, the University of Maryland, and a computer lab operated by the Chinese Ministry of Education discovered the new side-channel attack that differs from most other side-channel attacks. Rather than relying on the cache system like many other side-channel attacks, this new attack exploits a vulnerability in transient execution that enables the extraction of secret data from user memory space via timing analysis. The attack functions as a side-channel for Meltdown, a critical security vulnerability discovered in 2018 that affects many x86-based microprocessors. Meltdown exploits a performance optimization feature known as "speculative execution" to allow attackers to circumvent memory isolation mechanisms and access passwords, encryption keys, and other private data stored in kernel memory. Meltdown has been mitigated by software patches, microcode updates, and hardware redesigns, but no solution has addressed the issue in its entirety, and the most recent attack method may work on fully patched systems depending on hardware, software, and patch configurations. The new side-channel attack described in a technical paper involves a vulnerability in the modification of the EFLAGS register in transient execution, which affects the timing of Jump On Condition Code (JCC) instructions. This article continues to discuss the new side-channel attack impacting multiple generations of Intel CPUs.

    Bleeping Computer reports "Intel CPUs Vulnerable to New Transient Execution Side-Channel Attack"

  • news

    Visible to the public "Attackers Are Logging in Instead of Breaking In"

    According to Sophos, cyberattackers used more than 500 unique tools and tactics in 2022. The analysis of data from over 150 Sophos Incident Response (IR) cases revealed over 500 unique tools and techniques, including 118 Living off the Land binaries (LOLBins). LOLBins, unlike malware, are executables that are naturally present on operating systems, making it much more difficult for defenders to prevent their malicious use. In addition, Sophos discovered that unpatched vulnerabilities were the most common cause of initial system access by attackers. Attackers exploited ProxyShell and Log4Shell vulnerabilities in half of the included investigations to infiltrate organizations. The second most common cause of attacks was compromised credentials. This article continues to discuss key findings from Sophos' report on the changing behaviors and attack techniques that adversaries used in 2022.

    Help Net Security reports "Attackers Are Logging in Instead of Breaking In"

  • news

    Visible to the public "Tangled Up: 'Tomiris' APT Uses Turla Malware, Confusing Researchers"

    Certain campaigns previously attributed to the Russian Advanced Persistent Threat (APT) group Turla were carried out by what appears to be a different group that researchers have dubbed "Tomiris." Turla, also known as Snake, Venomous Bear, and Ourobouros, is a notorious threat actor with connections to the Russian government. Over the years, it has used zero-day vulnerabilities, legitimate software, and other techniques to install backdoors in the systems of militaries, governments, diplomatic entities, and technology and research organizations. In one example, its Kazuar backdoor was linked to the SolarWinds compromise. However, not everything is Turla. Researchers have published evidence that attacks previously attributed to Turla were actually perpetrated by Tomiris, a completely different group with different tactics, techniques, and procedures (TTPs) and affiliations. This article continues to discuss researchers' findings on the separate, but in some ways overlapping, Russian-language APTs.

    Dark Reading reports "Tangled Up: 'Tomiris' APT Uses Turla Malware, Confusing Researchers"

  • news

    Visible to the public "Critical Flaw in Inea ICS Product Exposes Industrial Organizations to Remote Attacks"

    A critical vulnerability in a remote terminal unit (RTU) made by Slovenia-based industrial automation company Inea can expose industrial organizations to remote hacker attacks. The vulnerability came to light after the Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to inform organizations. The vendor has released a firmware update that patches the issue. According to CISA, the security hole, tracked as CVE-2023-2131 with a CVSS score of 10, impacts Inea ME RTUs running firmware versions prior to 3.36. CISA noted that this OS command injection bug could allow remote code execution. The impacted product provides a data interface between remote field devices and the control center through a cellular network. According to CISA, the product is used worldwide in industries such as energy, transportation, and water and wastewater. The vulnerability was discovered and responsibly disclosed by Floris Hendriks, a researcher who is working on getting his master's degree in cybersecurity at Radboud University in the Netherlands. Hendriks found the vulnerability as part of a bigger research project into the security of ICS remote management devices. The researcher stated that exploitation of CVE-2023-2131 can result in the attacker gaining root privileges on the targeted RTU, which gives them complete control of the device. The potential impact in a real world scenario depends on what the RTU is used for, but the flaw could allow an attacker to cause disruption.

    SecurityWeek reports: "Critical Flaw in Inea ICS Product Exposes Industrial Organizations to Remote Attacks"

  • news

    Visible to the public "US Navy Contractor Fincantieri Marine Group Hit by Cyberattack"

    A US commercial and defense shipbuilder with ties to the government was hit by a ransomware attack on April 12. Fincantieri Marine Group (FMG) stated that it experienced a cybersecurity incident that caused a temporary disruption to certain computer systems on its network. The company, a subsidiary of Italy-based Fincantieri SpA, also clarified that it has no evidence that employees' personal information was affected. Carol Volk, chief marketing officer at cybersecurity solution provider BullWall, stated that this ransomware attack on the Fincantieri Marinette Marine shipyard disrupted operations across the shipyard by rendering data on network servers unusable, impacting critical CNC (Computer Numerical Control) manufacturing machines. The investigation is still ongoing.

    Infosecurity reports: "US Navy Contractor Fincantieri Marine Group Hit by Cyberattack"

  • news

    Visible to the public "SolarWinds Platform Update Patches High-Severity Vulnerabilities"

    Two high-severity vulnerabilities that were patched recently in SolarWinds Platform could lead to command execution and privilege escalation. The most severe of the two issues is CVE-2022-36963 (CVSS score of 8.8), which is described as a command injection bug in SolarWinds' infrastructure monitoring and management solution. According to Trend Micro Zero Day Initiative researchers, the flaw can be exploited remotely to execute arbitrary commands. Successful exploitation of the vulnerability requires that the attacker is in the possession of credentials for a valid SolarWinds Platform admin account. Tracked as CVE-2022-47505 (CVSS score of 7.8), the second high-severity issue is described as a local privilege escalation flaw. The researchers stated that this vulnerability allows a local adversary with a valid system user account to escalate local privileges. The issues were addressed with the release of SolarWinds Platform version 2023.2. The software release also resolves CVE-2022-47509, a medium-severity incorrect input neutralization vulnerability that could be exploited remotely to append URL parameters to inject HTML code. A valid account is required to exploit the issue. SolarWinds also addressed two medium-severity bugs in Database Performance Analyzer, one leading to sensitive information disclosure and another allowing users to enumerate to different folders of the server. Database Performance Analyzer version 2023.2 resolves both vulnerabilities. SolarWinds did not mention if any of these flaws are being exploited in attacks.

    SecurityWeek reports: "SolarWinds Platform Update Patches High-Severity Vulnerabilities"