News Items

  • news

    Visible to the public "38 Countries Take Part in NATO’s 2023 Locked Shields Cyber Exercise"

    Last week, the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Estonia hosted the 2023 edition of the annual Locked Shields cyber defense exercise. Last year's event had roughly 2,000 participants representing 32 countries, and the 2023 Locked Shields exercise had 3,000 participants from 38 countries. The exercise has been organized at the CCDCOE for more than a decade. The exercise tests participants' ability to defend systems against real-time attacks, handle incident reporting, and solve challenges related to forensics, the media, and legal issues. At Locked Shields, attacking Red Teams compete against defending Blue Teams, with the Blue Team being tasked to defend a made-up country's information systems and critical infrastructure, including energy and banking systems, from large-scale attacks. Estonian Minister of Defence Hanno Pevkur stated that this past year had shown us how vital strength in cyber defense is.

    SecurityWeek reports: "38 Countries Take Part in NATO's 2023 Locked Shields Cyber Exercise"

  • news

    Visible to the public "American Bar Association Breach Hits 1.5 Million Members"

    A leading legal industry body in the US has recently been forced to contact individuals with accounts on its website to notify them that their logins may have been compromised. The American Bar Association (ABA) reportedly told 1.5 million individuals about the breach, which occurred last month. The ABA said in a notice on its website that it first discovered unusual activity on its network on March 17 but concluded that a threat actor had gained unauthorized access even earlier than that, on March 6. The ABA noted that on March 23, 2023, the investigation identified that an unauthorized third party acquired usernames and hashed and salted passwords that users may have used to access online accounts on the old ABA website before 2018 or the ABA Career Center since 2018. In many instances, the password may have been the default password assigned to the user by the ABA if the user never changed that password on the old ABA site. The ABA is notifying all affected individuals in an abundance of caution. The ABA stated that users who didn't update their passwords in 2018 when the ABA changed its website login platform are being asked to do so now, as well as any credentials reused on other non-ABA accounts that could now be exposed to credential stuffing. Although the stolen passwords are hashed and salted, they could still be cracked given enough time and/or inclination.

    Infosecurity reports: "American Bar Association Breach Hits 1.5 Million Members"

  • news

    Visible to the public "QIS Project Shows Novel Method for Privacy-Preserving Quantum ML"

    Quantum computing promises to significantly advance computational capabilities. Programs such as the QIS@Perlmutter project at Lawrence Berkeley National Laboratory (Berkeley Lab) are gathering scientists to conduct the foundational research needed to support a quantum future. QIS@Perlmutter, established in 2021 to facilitate Quantum Information Science (QIS) research on the Perlmutter supercomputer at the National Energy Research Scientific Computing Center (NERSC), granted Perlmutter computing resources to 16 research teams in early 2022. Initial scientific results are beginning to emerge from these projects. In a recently published paper titled "Quantum machine learning with differential privacy," a QIS@Perlmutter research group presented findings from a Quantum Machine Learning (QML) project that explores techniques for preserving privacy within advanced quantum computing functions. QML brings the success of Machine Learning (ML) to quantum computers, with the quantum advantages of faster computation, convergence, and greater accuracy with fewer complexities. Differential privacy offers the probabilistic privacy guarantee on a trained ML model. Therefore, an attacker cannot easily reveal personal information from the training data. The objective is to protect training data from the training model. The researchers noted that this study marks the first proof-of-principle demonstration of privacy-preserving QML. This could ensure confidentiality and accurate learning on Noisy Intermediate-Scale Quantum (NISQ) technology. This article continues to discuss the new method for privacy-preserving QML.

    The National Energy Research Scientific Computing Center reports "QIS Project Shows Novel Method for Privacy-Preserving Quantum ML"

  • news

    Visible to the public "YouTube Videos Using Highly Evasive Loader to Distribute Aurora Stealer Malware"

    Cybersecurity researchers have detailed the inner workings of the evasive loader known as "in2al5d p3in4er" that is used to deliver the Aurora information-stealing malware. According to a report from the cybersecurity company Morphisec, the loader is compiled with Embarcadero RAD Studio and targets endpoint workstations with an advanced anti-VM (virtual machine) technique. Aurora, the Go-based information stealer, first appeared in late 2022. It is distributed via YouTube videos and Search Engine Optimization (SEO) poisoning, with websites offering fake cracked software downloads to other attackers as a commodity virus. When a victim clicks on a link in a YouTube video description, they are redirected to a fake website where they are persuaded to download malware posing as a useful tool. The loader examined by Morphisec inquires about the vendor ID of the installed graphics card and compares it to a list of allowlisted vendor IDs (i.e., AMD, Intel, or NVIDIA). The loader terminates itself if the value is incorrect. The loader ultimately uses the process hollowing technique to decode the final payload and inject it into the legitimate process "sihost.exe." The research highlights that the threat actors behind in2al5d p3in4er loader are using social engineering techniques for a high-impact campaign, which involves YouTube being used as a malware distribution channel. This article continues to discuss attackers using YouTube to deliver the in2al5d p3in4er loader and Aurora information-stealing malware.

    CyberIntelMag reports "YouTube Videos Using Highly Evasive Loader to Distribute Aurora Stealer Malware"

  • news

    Visible to the public "Can Electric Vehicles Be Hacked?"

    As the world strives to become more environmentally responsible, Electric Vehicles (EVs) have entered the mainstream vehicle market. Tesla, Rivian, Lucid, General Motors, and Nissan have emerged as leaders in developing this technology. The objective is to deliver vehicles that are energy-efficient, high-performing, and emit fewer pollutants. In addition, they include technological features such as Internet access, touchscreens, high-resolution displays, and operational safety features. The US bolstered this innovation in 2021 by releasing the Bipartisan Infrastructure Deal, which included $7.5 billion to construct an EV charging station network. With the emergence of these new technologies, Internet-enabled cars, connected vehicles, and the concept of smart cities, the number of cyberattacks is expected to increase exponentially. A group of professors and graduate students at the University of Nevada, Reno are sharing basic techniques for protecting EVs from hacking. They discuss the vulnerabilities of EVs and the proactive measures people can take to protect the cybersecurity of their vehicles. EVs are a trending technology that makes today's cars more connected, safe, convenient, energy-efficient, and environmentally friendly, but they are vulnerable to cyberattacks. In order to design, develop, and maintain the next iteration of smart and connected systems, EV manufacturers should commit more resources to cybersecurity from multiple perspectives. Users should also be aware of proactive measures to protect their vehicles and remain informed about keeping their EVs secure while on the road and off. This article continues to discuss the potential hacking of EVs and suggestions for improving the cybersecurity of such vehicles.

    University of Nevada, Reno reports "Can Electric Vehicles Be Hacked?"

  • news

    Visible to the public "CISA - Building Cyber Hygiene Capacity in Thailand, the Philippines and Indonesia"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) emphasizes that cybersecurity is a worldwide problem. A system or network vulnerability exploited on one side of the world can have global repercussions, directly affecting critical infrastructure. In order to make cyberspace safer and more secure for everyone, the CISA Global Strategy encourages capacity development with international partners. CISA conducted a series of capacity-building engagements in Thailand, the Philippines, and Indonesia in March. The workshops on cyber hygiene focused on highly interdependent sectors, such as national defense, banking, business, aviation, and shipping. During the workshops, CISA cybersecurity and vulnerability management experts discussed Information Technology/Operational Technology (IT/OT), Industrial Control Systems (ICS), threat actors, threat intelligence, cyberattack frameworks, workforce development tools, and case studies of prevalent attacks. The need to develop greater cooperation between IT and OT, raise awareness of phishing and other attack vectors within organizations, and develop the cybersecurity workforce in the public sector arose as major themes. This article continues to discuss the first-of-their-kind capacity-building engagements conducted by CISA in Thailand, the Philippines, and Indonesia.

    CISA reports "CISA - Building Cyber Hygiene Capacity in Thailand, the Philippines and Indonesia"

  • news

    Visible to the public "Ransomware Attack Hits Health Insurer Point32Health"

    Non-profit health insurer Point32Health established in 2021 as the merger between Harvard Pilgrim Health Care and Tufts Health Plan, is Massachusetts's second largest health insurer, serving more than 2 million customers. In a notification published this week, the organization revealed that it fell victim to a ransomware attack on April 17, which forced it to take systems offline to contain the incident. The attack, Point32Health says, impacted systems it uses "to service members, accounts, brokers, and providers," with most of them related to Harvard Pilgrim Health Care. The company noted that they have notified law enforcement and regulators and are working with third-party cybersecurity experts to conduct a thorough investigation into this incident and to remediate the situation. Point32Health did not say how many individuals might have been impacted by the incident, but according to the organization, Harvard Pilgrim Health Care serves roughly 1.1 million individuals.

    SecurityWeek reports: "Ransomware Attack Hits Health Insurer Point32Health"

  • news

    Visible to the public "ChatGPT Malicious Domains Spike as Bot Use Grows"

    According to researchers, the popularity of ChatGPT has prompted scammers to use OpenAI's chatbot name in malicious domains to trick unsuspecting victims. Since OpenAI introduced ChatGPT, the chatbot's popularity has skyrocketed, reaching 100 million monthly active users within two months of its debut, and scammers quickly took note. The threat detection and content filtering company DNSFilter observed a sixfold increase in blocked ChatGPT and OpenAI-related domains among its large body of clients. The vulnerabilities that ChatGPT-related domains can introduce to networks are attracting the attention of government agencies and organizations. Dave Raphael, chief operating officer at DNSFilter, stated that organizations are blocking ChatGPT from their networks because of security and privacy concerns. Scammers are one of the primary reasons to restrict access to websites containing ChatGPT keywords. The number of malicious websites with "ChatGPT" in their name increased has increased significantly, according to a recent study. Since the chatbot's introduction, fraudsters have consistently attempted to capitalize on its growing popularity. Attackers are leveraging ChatGPT's prominence to redirect users to malicious websites using phishing and deception techniques, including malware-distributing domains. This article continues to discuss the growing use of OpenAI's chatbot name in malicious domains.

    Cybernews reports "ChatGPT Malicious Domains Spike as Bot Use Grows

  • news

    Visible to the public "Trojanized Installers Used to Distribute Bumblebee Malware"

    Security researchers at Securework's Counter Threat Unit discovered that popular software tools such as Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace have been trojanized to distribute the malware known as Bumblebee. The researchers noted that the infection chain for several of these attacks relied on a malicious Google Ad that sent users to a fake download page via a compromised WordPress site. The researchers stated that as people look for new tech or want to get involved with the hype around new tech like ChatGPT, Google is the place to find it. The researchers noted that malicious ads returned in search results are incredibly hard to spot, even for someone with deep technical knowledge. One of the attacks observed by the researchers relied on a legitimate Cisco AnyConnect VPN installer modified to contain the Bumblebee malware. According to the researchers, attackers only took three hours to exploit this entry point to deploy additional tools, including Cobalt Strike and a Kerberoasting script.

    Infosecurity reports: "Trojanized Installers Used to Distribute Bumblebee Malware"

  • news

    Visible to the public "Chinese-Language Threat Group Targeted a Dozen South Korean Institutions"

    A Chinese-language threat group targeted South Korean research and academic institutions with data exfiltration attacks in January. Researchers from Recorded Future's Insikt Group suspect that the threat actors affiliated with the group have launched a series of new attacks against organizations in Japan and Taiwan. The group is known as Xiaoqiying, Genesis Day, or Teng Snake, according to Di Wu, senior threat intelligence analyst at Insikt Group. The attacks against South Korean institutions began on January 25, impacting the Korean Research Institute for Construction Policy, the Korean Archaeological Society, the Woorimal Academic Society, and the Korean Academy of Basic Medicine and Health Sciences. Wu stated that the analysis of the group's Telegram channels, postings on special-access forums, and presence on a clearnet website led to the conclusion that this is a hacktivist group motivated primarily by patriotism toward China, and that it will likely conduct similar cyberattacks against Western and NATO targets, as well as any country or region considered hostile to China. The group operated two Telegram channels, one for posting announcements and the other for communicating with other hackers and followers. Both were shut down in February when media outlets began reporting on the cyberattacks targeting South Korea. Prior to disbanding, the group recruited new members via Telegram. Xiaoqiying claimed to have stolen 54 GB of data from various organizations. This article continues to discuss the Xiaoqiying threat group targeting a dozen South Korean research and academic institutions with data exfiltration attacks.

    The Record reports "Chinese-Language Threat Group Targeted a Dozen South Korean Institutions"

  • news

    Visible to the public "CFPB Employee Sends 256,000 Consumers' Data to Personal Email"

    An employee from the US Consumer Financial Protection Bureau (CFPB) has reportedly forwarded confidential records of roughly 256,000 consumers and confidential supervisory information of approximately 50 institutions to a personal email account. Supposedly the investigation is ongoing, and the agency no longer employs the employee. Apparently, the employee certified they deleted each email before being fired. According to Darren James, senior product manager at Specops, it is unclear whether the CFPB has done any subsequent threat intelligence analysis to see if this data has appeared elsewhere. James noted that the CFPB has a lesson to learn here in responsible data handling. Paul Bischoff, a privacy advocate with Comparitech, echoed James's point, calling it "embarrassingly ironic" that the CFPB endangered consumers' information.

    Infosecurity reports: "CFPB Employee Sends 256,000 Consumers' Data to Personal Email"

  • news

    Visible to the public "Pipedream Malware Can Disrupt or Destroy Industrial Systems"

    According to a report by the industrial cybersecurity company Dragos, the Chernovite threat group developed a new modular malware called Pipedream to target Industrial Control Systems (ICS). This toolkit is capable of launching disruptive and destructive attacks against tens of thousands of critical industrial devices, posing a significant threat to organizations tasked with managing the electrical grid, oil and gas pipelines, water systems, and manufacturing plants. According to the Dragos report, Pipedream, a modular ICS attack framework created by Chernovite developers, is the seventh known ICS-specific malware. Pipedream is the first ICS/Operational Technology (OT) malware to be disruptive and destructive across multiple industries. Its existence is evidence that industrial adversarial capabilities have significantly increased. The Chernovite group possesses a greater scope of ICS-specific knowledge than other threat actors. The demonstrated ICS expertise in Pipedream includes the ability to disrupt, degrade, and potentially destroy physical processes in industrial environments. Dragos is confident that a state actor created Pipedream with the intention of using it for future disruptive or destructive operations. The capabilities of Pipedream provide an adversary with various options for discovering a target's OT network architecture and identifying its assets and processes. This article continues to discuss the Pipedream malware, the increase in ransomware attacks against industrial organizations, and five critical controls for strong ICS/OT cyber defense.

    Security Intelligence reports "Pipedream Malware Can Disrupt or Destroy Industrial Systems"

  • news

    Visible to the public "With AI Watermarking, Creators Strike Back: Backdoor Attacks Regulate Unauthorized Uses of Copyrighted or Restricted Data"

    Artificial Intelligence (AI) models rely on massive data sets to train their complex algorithms, but the use of these data sets for training purposes can sometimes violate the rights of the data owners. However, proving that a model used a data set without authorization is difficult. In a new study published in IEEE Transactions on Information Forensics and Security, researchers present a method for preventing the unauthorized use of data sets by embedding digital watermarks within them. The technique could give data owners greater control over who can train AI models with their data. Restricting their use, such as with encryption, is the simplest method for protecting data sets but doing so would also make it difficult for authorized users to access these data sets. According to the study's lead author, Yiming Li, the researchers instead focused on determining whether a given AI model was trained using a particular data set. The data owner can flag models discovered to have been impermissibly trained on a data set for follow-up. Li stated that the technique is applicable to a wide variety of Machine Learning (ML) problems, although the study focuses on classification models, including image classification. This article continues to discuss the new method aimed at protecting data sets from unauthorized use by embedding digital watermarks into them.

    IEEE Spectrum reports "With AI Watermarking, Creators Strike Back: Backdoor Attacks Regulate Unauthorized Uses of Copyrighted or Restricted Data"

  • news

    Visible to the public "The IRS Is Sending Four Investigators Across the World to Fight Cybercrime"

    Beginning this summer, the Internal Revenue Service (IRS) will send four cybercrime investigators to Australia, Singapore, Colombia, and Germany, marking a significant expansion of the IRS's global efforts to combat cybercrimes, such as those involving cryptocurrencies, decentralized finance, and cryptocurrency laundering services. In recent years, agents from the IRS's Criminal Investigation (IRS-CI) unit have played an important role in investigating crimes on the dark web as part of landmark international operations. These operations include the shutdown of the drug and hacking services marketplace AlphaBay and the arrest of its administrator, the bust of the Internet's largest child abuse website, and the takedown of a marketplace for stolen Social Security Numbers. Before now, the IRS had only one cyber investigator stationed abroad, in The Hague, Netherlands. Since 2021, this investigator has worked closely with Europol. During a panel at the Chainalysis Links conference on April 4, IRS executive director of global operations policy and support for IRS-CI, Guy Ficco, first announced the expansion. This article continues to discuss the expansion of the IRS's efforts to fight cybercrimes globally.

    TechCrunch reports "The IRS Is Sending Four Investigators Across the World to Fight Cybercrime"

  • news

    Visible to the public "DHS Announces AI Task Force, Security Sprint on China-Related Threats"

    The US Department of Homeland Security (DHS) announced two initiatives that will directly contribute to US strategies for defending critical infrastructure and essential services against cyberattacks, physical attacks, Artificial Intelligence (AI), and other threats. Secretary of Homeland Security Alejandro Mayorkas announced that the department will establish a new task force to guide the incorporation of AI technologies into departmental operations and assess how defenders and adversaries may use these technologies. It will also assess the Chinese government's defensive capabilities and threats to the nation's supply chains and critical infrastructure. The AI task force will help DHS in addressing the various offensive and defensive security implications of the rapidly growing and evolving technology, as Large Language Models (LLMs) such as ChatGPT have caught the public's attention and the attention of security researchers, who say the tools can potentially lower the barrier to entry for malicious actors in cyberspace and create custom phishing, social engineering, and mis-and-disinformation products. This article continues to discuss the DHS' efforts to better handle threats to the nation from AI and the Chinese government.

    SC Magazine reports "DHS Announces AI Task Force, Security Sprint on China-Related Threats"

  • news

    Visible to the public "Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job"

    The Lazarus Group, a notorious state-sponsored threat actor with ties to North Korea, has been linked to a new campaign targeting Linux users. According to a new report by ESET, the attacks are part of a persistent and long-running activity known as Operation Dream Job. The findings mark the first instance of the group using Linux malware as part of this social engineering scheme. Operation Dream Job, also known as DeathNote or NukeSped, refers to multiple attack waves in which the group uses fraudulent employment offers as an enticement to convince unsuspecting targets to download malware. In addition, there are overlaps with two other Lazarus clusters called Operation In(ter)ception and Operation North Star. Similarly, the attack chain discovered by ESET delivers a fake HSBC job offer as a decoy within a ZIP archive file, which is then used to initiate a Linux backdoor named SimplexTea distributed via an OpenDrive cloud storage account. This article continues to discuss the Lazarus Group's new campaign against Linux users.

    THN reports "Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job"

  • news

    Visible to the public "Outdated Cybersecurity Practices Leave Door Open for Criminals"

    According to ExtraHop, organizations experienced a considerable increase in ransomware, from an average of four attacks over five years in 2021 to four attacks over one year in 2022. Eighty-three percent of victims confessed to having paid the ransom at least once. As organizations find themselves increasingly under attack, it has been discovered that they are overwhelmed with unpatched software, unmanaged devices, shadow Information Technology (IT), and insecure network protocols that serve as entry points for malicious actors. In addition, 77 percent of IT decision-makers believe out-of-date cybersecurity practices have contributed to at least 50 percent of the security incidents their organizations have encountered. Despite these alarming statistics, fewer than one-third of them indicated they have immediate plans to resolve any of their organizations' outdated security practices. This article continues to discuss key findings from ExtraHop's report "2023 Global Cyber Confidence Index: Cybersecurity Debt Drives Up Costs and Ransomware Risk."

    Help Net Security reports "Outdated Cybersecurity Practices Leave Door Open for Criminals"

  • news

    Visible to the public "Attackers Use Abandoned WordPress Plugin to Backdoor Websites"

    Attackers are injecting stealthy backdoors into websites using Eval PHP, an outdated WordPress plugin. Eval PHP is an outdated WordPress plugin that enables site administrators to embed PHP code on WordPress pages and posts, which is then executed when the page is loaded in the browser. The plugin has not been updated in a decade and is generally regarded as abandonware, but it is still accessible via the WordPress plugins repository. According to the website security company Sucuri, the use of Eval PHP to embed malicious code on seemingly harmless WordPress pages increased in April 2023, with an average of 4,000 malicious installations per day of the WordPress plugin. The primary advantage of this method over traditional backdoor injections is that Eval PHP can be used to reinfect cleaned sites while the point of compromise remains relatively hidden. This article continues to discuss attackers' use of the old Eval PHP WordPress plugin to compromise websites.

    Bleeping Computer reports "Attackers Use Abandoned WordPress Plugin to Backdoor Websites"

  • news

    Visible to the public "'GhostToken' Opens Google Accounts to Permanent Infection"

    A security flaw in Google's Cloud Platform (GCP) could have allowed cybercriminals to hide an unremovable, malicious app within a victim's Google account, rendering the account permanently infected. The "GhostToken" vulnerability was identified and reported by Astrix Security researchers. According to an analysis, the malicious app could have enabled a wide range of malicious actions, such as reading the victim's Gmail account, accessing files in Google Drive and Google Photos, viewing the Google calendar, and monitoring the victim's location using Google Maps. Armed with this information, attackers could create highly convincing impersonation and phishing attacks. The GCP is designed to host any of thousands of end-user apps, which, like other app ecosystems, have an official store from which they can be readily downloaded. In this case, it is the Google Marketplace and third-party markets. Once the user authorizes a download, the app receives a token that grants access to the installer's Google account based on the permissions requested by the app. Using the GhostToken vulnerability, cybercriminals are able to create malicious apps that they can plant in app stores under the guise of a legitimate utility or service. However, once downloaded, the app will hide from the victim's Google account app management page. This article continues to discuss findings regarding the potential exploitation and impact of the GhostToken vulnerability.

    Dark Reading reports "'GhostToken' Opens Google Accounts to Permanent Infection"

  • news

    Visible to the public "North Korean Hacker Suspected in 3CX Software Supply Chain Attack"

    The 3CX Desktop App software has been reportedly compromised via a prior software supply chain breach, with a North Korean actor suspected to be responsible. Security researchers at Mandiant stated the initial compromise was traced back to malware from financial software firm Trading Technologies' website. The researchers noted that the first attack saw hackers place a backdoor into an application available on the website known as X_Trader 1. That infected app, later installed on the computer of a 3CX employee, allowed the hackers to spread their access through 3CX's network. Mandiant said this would be the first observed instance of one software supply chain attack leading to another. The researchers noted that in late March 2023, a software supply chain compromise spread malware via a trojanized version of 3CX's legitimate software that was available to download from their website. The researchers stated that the attack shows the potential reach of this type of compromise, particularly when a threat actor can chain intrusions, as demonstrated in this investigation. The security experts said the affected versions of 3CX were DesktopApp 18.12.416 and earlier, which contained malicious code. The code ran a downloader, Suddenicon, which in turn received additional command and control (C2) servers from encrypted icon files hosted on GitHub. The decrypted C2 server was then used to download a third-stage payload called Iconicstealer, a data miner that steals browser information. Mandiant said the researchers are currently tracking this malicious activity as UNC4736, a suspected North Korean nexus cluster of activity.

    Infosecurity reports: "North Korean Hacker Suspected in 3CX Software Supply Chain Attack"

  • news

    Visible to the public "VCU Researchers Fight Cybercrime With New Digital Tools and Techniques"

    Irfan Ahmed, Ph.D., provides defenders with digital forensic tools and the knowledge to use them in cybersecurity. Ahmed is an associate professor of computer science and the director of the Virginia Commonwealth University (VCU) Engineering Department of Computer Science's Security and Forensics Engineering (SAFE) Lab. In the SAFE Lab, he leads two projects funded by the US Department of Homeland Security (DHS) that aim to keep industrial systems secure from criminals and demonstrate how the same tools developed for investigating cyberattacks can be used to investigate other crimes. Cyberattacks on physical infrastructure could be launched to disrupt systems or hold them for ransom. The focus of Ahmed's SAFE Lab is the protection of Industrial Control Systems (ICS) used in the operation of nuclear plants, dams, electricity systems, and more. Cyberattacks often target the control logic of software architecture, which receives instructions from the user and passes them to a Programmable Logic Controller (PLC) for execution. For example, the control logic monitoring a natural gas pipeline could be programmed to open a valve if the system detects high pressure. Programmers and attackers can modify the control logic. One of Ahmed's DHS-funded projects, titled "Digital Forensic Tools and Techniques for Investigating Control Logic Attacks in Industrial Control Systems," supports the development of devices and techniques that cyber detectives can use to conduct investigations. This article continues to discuss Ahmed's work to protect nuclear plants and other critical infrastructure from cybercrime.

    Virginia Commonwealth University reports "VCU Researchers Fight Cybercrime With New Digital Tools and Techniques"

  • news

    Visible to the public "Turning AI to Crime"

    The Artificial Intelligence (AI) chatbot ChatGPT has been generating a great deal of buzz in the news and on social media regarding its ability to write blogs, software source code, and frameworks. People are sharing what they have done with the Large Language Model (LLM)-based bot and what they plan to do in the future. Their applications include product prototyping, virtual assistants, and nearly limitless duties. Cybercriminals have experimented with ChatGPT. Based on dark web forums, cybercriminals are using ChatGPT to generate malicious code. According to Nicole Sette, associate managing director of the cyber risk business at Kroll, a corporate investigation and risk consultancy, most researchers agree that chatbots are not yet optimized for code creation, as they lack the creativity to develop new code. However, in March 2023, Kroll observed hacking forum users discussing methods for bypassing ChatGPT restrictions and using the program to generate code. Sette explains that other forum users shared code for circumventing ChatGPT's Terms of Service, also known as 'jailbreaking ChatGPT,' in various dark web forums. Threat actors have discovered methods to use chatbots to write malware, including information stealers. Check Point Research reported that someone on an underground hacker forum used ChatGPT to recreate a Python-based information stealer using published analyses of prevalent malware. This article continues to discuss how cybercriminals are using ChatGPT.

    CACM reports "Turning AI to Crime"

  • news

    Visible to the public "OpenAI's Hunger for Data Is Coming Back to Bite It"

    Following a temporary suspension in Italy and several investigations in other European Union countries, OpenAI has just over a week to comply with European data protection laws. Failure to comply could result in costly fines, data deletion requirements, or even a ban. However, experts say that OpenAI's compliance with the rules will be nearly impossible. This is because the data used to train its Artificial Intelligence (AI) models was collected by scraping the Internet for content. The dominant principle in AI development is that more training data is preferable. The data set for OpenAI's GPT-2 model consisted of 40 GB of text. ChatGPT is based on GPT-3, which was trained on 570 GB of data. OpenAI has not disclosed the size of the data set for its most recent model, GPT-4, but the company's desire for larger models is now coming back to haunt it. Several Western data protection authorities have launched investigations into how OpenAI collects and processes the data that powers ChatGPT in recent weeks. They believe it has extracted and used the personal information of individuals without permission, such as their names and email addresses. This article continues to discuss OpenAI's AI services potentially breaking data protection laws and why it could be impossible for the company to comply with data protection rules.

    MIT Technology Review reports "OpenAI's Hunger for Data Is Coming Back to Bite It"

  • news

    Visible to the public "Cisco Patches Critical Vulnerabilities in Industrial Network Director, Modeling Labs"

    Cisco recently announced patches for critical vulnerabilities impacting its Industrial Network Director and Modeling Labs solutions. Designed for industrial network management, Industrial Network Director (IND) provides visibility into network and automation devices. Cisco released fixes for a critical-severity flaw in the web interface of IND that could be exploited remotely to execute commands on the underlying operating system. Tracked as CVE-2023-20036 (CVSS score of 9.9), the issue exists because input was not properly validated when uploading a device pack. An authenticated attacker could alter the upload request and execute commands with administrative privileges. Cisco IND version 1.11.3 resolves this vulnerability along with a medium-severity bug that could allow an attacker to read application data. This week, Cisco also released patches for a critical-severity flaw in the external authentication mechanism of Modeling Labs, an on-premises network simulation tool. Tracked as CVE-2023-20154 (CVSS score of 9.1), the issue is the result of improper handling of certain messages returned by the external authentication server. The security defect was patched with the release of Modeling Labs version 2.5.1. Cisco noted that an attacker could exploit this vulnerability by logging in to the web interface of an affected server. Under certain conditions, the authentication mechanism would be bypassed, and the attacker would be logged in as an administrator. Successful exploitation of the vulnerability would allow the attacker to access and modify simulations and user-created data. Cisco stated that to exploit this vulnerability, the attacker would need valid user credentials that are stored on the associated external authentication server. Recently the company also announced patches for high-severity vulnerabilities in StarOS software and the BroadWorks network server that could lead to privilege escalation and denial-of-service (DoS), respectively. Cisco warned that proof-of-concept (PoC) exploitation code targeting the StarOS software bug (which is tracked as CVE-2023-20046) has been publicly released. The tech giant says it is unaware of these vulnerabilities being exploited in attacks. However, customers are advised to apply the available fixes as soon as possible, as unpatched Cisco products are known to have been exploited in the wild.

    SecurityWeek reports: "Cisco Patches Critical Vulnerabilities in Industrial Network Director, Modeling Labs"

  • news

    Visible to the public "Secure and Reliable Long-Term Storage to Outlast Humans"

    People should be able to securely store their digital information without fear of quantum or faster computers threatening safety. With funding from the National Science Foundation (NSF), computer science professors will use their innovative collaborative research project titled "Secure, Reliable, and Efficient Long-Term Storage" to address this issue. Dr. Erez Zadok and Dr. Omkant Pandey of Stony Brook University, along with Dr. Ethan L. Miller of the University of California-Santa Clara, have been awarded $1.2 million to study techniques and develop a secure and efficient long-term storage system for digital information that can outlive a human. Using information theoretic security and combinatorial security, Zadok and his collaborators have created a model of long-term security that can withstand the power of faster computers and even quantum computers. In addition, the security model defends against malicious "insiders" who abuse their access to steal data over a long period of time. The prototype system is empirically evaluated to gain insight into the challenges of implementing these techniques in the real world, while a simulator is used to project the long-term effectiveness of these techniques. This research facilitates collaborations between systems, theory, and security researchers in order to develop techniques for securing data for many years while ensuring its integrity. This article continues to discuss the team's work on secure and reliable long-term storage.

    Stony Brook University reports "Secure and Reliable Long-Term Storage to Outlast Humans"

  • news

    Visible to the public "Developing Cybersecurity Solutions for Industrial Infrastructures"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) reports that there are about 153,000 public drinking water systems and over 16,000 publicly owned wastewater treatment systems in the US. Therefore, a cyberattack on these systems could result in service interruptions, damage to critical infrastructure, and even illness and death. The Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, has developed and implemented a cost-effective cyber-physical security situational awareness capability for Industrial Control Systems (ICS) at the Cranberry Water Treatment plant in Westminster, Maryland. The technology is designed to detect and notify operators of malicious activity, including unauthorized access, malicious code, and data exfiltration. In addition, it provides a comprehensive view of the system's health and performance, enabling operators to quickly identify and resolve any problems. This solution integrates network fingerprinting, host-based monitoring, digital twin technology, and advanced event correlation and alerting to provide system operators with a comprehensive understanding of their systems. This article continues to discuss the development of the cost-effective cyber-physical security situational awareness capability for ICS and its testing at the Cranberry Water Treatment plant in Westminster, Maryland.

    Johns Hopkins Applied Physics Laboratory reports "Developing Cybersecurity Solutions for Industrial Infrastructures"

  • news

    Visible to the public "CISA Announces Plans to Establish Logging Made Easy Service"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has announced plans to develop and establish the Logging Made Easy (LME) tool, a service that was initially created and maintained by the National Cyber Security Centre of the UK (NCSC-UK). LME is an open-source log management solution for Windows-based devices that reduces a user's log management burden by integrating capabilities that produce greater visibility into the operating system and network security across deployed devices. Those who manage their organization's catalog of Windows-based equipment but lack the resources for a more robust commercial solution will find LME particularly useful. CISA plans to expand LME's centralized logging capabilities and make them available to public and private sector stakeholders this summer, building on the work of the NCSC. Until CISA relaunches LME, neither CISA nor NCSC will support the legacy LME tool, and organizations using the unsupported version are encouraged to exercise caution. This article continues to discuss the LME tool.

    CISA reports "CISA Announces Plans to Establish Logging Made Easy Service"

  • news

    Visible to the public "UK Warns of Russian Hackers Targeting Critical Infrastructure"

    The UK government's intelligence and security arm recently issued an alert on Russian state-aligned threat actors aiming to conduct disruptive and destructive attacks against critical infrastructure in Western countries. The National Cyber Security Centre (NCSC) stated that recently these threat groups have focused on distributed denial-of-service (DDoS) attacks, defacements, and misinformation attacks. The NCSC warns that some have stated a desire to achieve a more disruptive and destructive impact against Western critical national infrastructure (CNI), including in the UK. The agency believes these groups will focus on identifying poorly protected critical infrastructure systems to cause disruptions. The NCSC noted that threat actors that pose a threat include not only groups that are actually sponsored by the Russian government but also hacktivists that are sympathetic to Russia. Aligned with Moscow's interests, these threat actors support Russia's invasion of Ukraine, are ideologically motivated, and may not be subject to formal state control, which makes them less predictable, as their targeting is broader compared to that of cybercriminal groups. The NCSC believes these groups are not sophisticated enough and lack the resources to launch destructive attacks on their own. The agency says that without external assistance, they consider it unlikely that these groups have the capability to deliberately cause a destructive, rather than disruptive, impact in the short term. Nonetheless, the NCSC notes that these groups may become more effective over time and recommends that organizations take the necessary precautions to prepare themselves for potential attacks.

    SecurityWeek reports: "UK Warns of Russian Hackers Targeting Critical Infrastructure"

  • news

    Visible to the public "Critical Infrastructure Firms Concerned Over Insider Threat"

    Security researchers at Bridewell Consulting have discovered that over a third (35%) of critical national infrastructure (CNI) security leaders believe the economic downturn is forcing employees to turn to data theft and sabotage. The researchers polled 1025 individuals with responsibility for cybersecurity in UK and US CNI firms across the communications, utilities, finance, government, transport, and aviation sectors. The researchers stated that many believe the cost-of-living crisis may be driving insiders at these firms to do the bidding of cybercrime groups in return for a big pay-off. Their suspicions are backed by hard evidence: the financial services sector was hit worse than any other industry sector studied. The researchers noted that organizations in the vertical suffered, on average, 28 security incidents caused by employee sabotage over the previous 12 months, as well as 28 instances of data theft or misuse. Overall, the number of employee sabotage incidents at CNI firms surged by 62% year-on-year. The researchers stated that challenging economic conditions are also putting pressure on CNI firms in other ways. Almost two-thirds (65%) of UK respondents said they had seen "some reduction" or a "significant reduction" in their cybersecurity budget, rising to 73% of US respondents. The communications sector has been impacted the least by these cuts, with almost half (48%) claiming to have seen no change in security budgets. At the other end of the spectrum, the transport and aviation (73%) and utilities sectors (69%) experienced the greatest falls. The researchers noted that the utilities sectors also include energy, oil, and gas companies.

    Infosecurity reports: "Critical Infrastructure Firms Concerned Over Insider Threat"

  • news

    Visible to the public "Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks"

    Fortra, the company developer of Cobalt Strike, is bringing further attention to the zero-day Remote Code Execution (RCE) flaw in its GoAnywhere MFT tool that ransomware actors are actively exploiting to steal sensitive data. The critical flaw, tracked as CVE-2023-0669, with a CVSS score: of 7.2, is a pre-authenticated command injection vulnerability that could be exploited for code execution. The company patched the vulnerability in version 7.1.2 of the software in February 2023, but not before it had been weaponized as a zero-day exploit since January 18. On January 30, 2023, Fortra, which collaborated with Palo Alto Networks Unit 42, was made aware of suspicious activity associated with some file transfer instances. According to the company, the unauthorized entity used the flaw to create unauthorized user accounts in certain MFTaaS customer environments. The unauthorized party leveraged user accounts for a subset of these customers to download files from their hosted MFTaaS environments. Cl0p, a Ransomware-as-a-Service (RaaS) provider, exploited the GoAnywhere vulnerability and was the most active threat actor observed, with a total of 129 victims, according to NCC Group. Cl0p's exploitation spree is the second time since September 2021 that LockBit has been dethroned from the top spot. Royal, BlackCat, Play, Black Basta, and BianLian were other prevalent ransomware strains. This article continues to discuss the zero-day RCE vulnerability in Fortra's GoAnywhere MFT tool that ransomware actors have actively exploited to steal sensitive data.

    THN reports "Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks"

  • news

    Visible to the public "CISOs Struggling to Protect Sensitive Data Records"

    According to Rubrik, nearly all Information Technology (IT) and security leaders are concerned that their organization will be unable to maintain business continuity following a cyberattack. The complexity of data security is growing, and the number of datasets requiring protection is expanding significantly. According to Rubrik's internal data, the average growth of secured data in 2022 was 25 percent. In addition, 56 percent of organizations currently have at least one zero trust initiative. However, in 2022, only 56 percent of IT and security leaders developed or reviewed an incident response plan, and 54 percent tested backup and recovery options. Ninety-nine percent of external organizations reported having data backup and recovery technology, with 93 percent reporting significant problems with their solution. Nine out of ten external organizations reported that during a cyberattack, malicious actors attempted to impact data backups, and 73 percent of these attempts were at least partially successful. This article continues to discuss key findings from Rubrik's report on the state of data security.

    Help Net Security reports "CISOs Struggling to Protect Sensitive Data Records"

  • news

    Visible to the public "Microsoft SQL Servers Hacked to Deploy Trigona Ransomware"

    Hackers are infiltrating inadequately protected and Internet-exposed Microsoft SQL (MS-SQL) servers in order to deploy Trigona ransomware and encrypt all files. The MS-SQL servers are being compromised by brute-force or dictionary attacks that exploit account credentials that are easy to guess. After connecting to a server, the threat actors deploy malware called CLR Shell by researchers from the South Korean cybersecurity company AhnLab who discovered the attacks. This malware collects system information, modifies the compromised account's configuration, and escalates privileges to LocalSystem by exploiting a flaw in the Windows Secondary Logon Service, which is required to initiate the ransomware as a service. This article continues to discuss the hacking of MS-SQL servers to deploy Trigona ransomware payloads.

    Bleeping Computer reports "Microsoft SQL Servers Hacked to Deploy Trigona Ransomware"

  • news

    Visible to the public "Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones"

    Researchers discovered that fitness apps such as Strava leak sensitive location information of users, even when they have used in-app features to specifically set up privacy zones to conceal their activity within specified areas. Two Ph.D. students from KU Leuven in Belgium discovered that if a person begins an activity at home, an attacker with limited skills can use high-precision Application Programming Interface (API) metadata revealed in the app to pinpoint their home location, even if they have set up an Endpoint Privacy Zone (EPZ) for that area. In addition, the researchers reported that, despite contacting the companies whose apps leaked this information, the issue remains largely unresolved. They will present their findings at Black Hat Asia in a session titled "A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks." This article continues to discuss attackers pinpointing where a person lives by lifting metadata from Strava and other apps, even if they're using a feature for protecting their location information.

    Dark Reading reports "Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones"

  • news

    Visible to the public "Not All Encryption Is Created Equal"

    E2EE was proposed as an additional layer of encryption for the Global System for Mobile Communication and Terrestrial Trunked Radio mobile communications standards when the need and value of private and secure communications came of age. Nearly all consumer-oriented information-sharing services provide data encryption today, but not all are E2EE, and there is still confusion regarding what true E2EE entails. E2EE is a secure communication method that encrypts data at the sender's device and decrypts it only at the recipient's device, preventing anyone in between from reading or modifying the data. True E2EE offers a very high level of security because it prevents unauthorized parties from intercepting communications. In addition, unlike simpler encryption techniques, E2EE can provide mathematical proof of security through public/private key cryptography, algorithms that factor large prime numbers, and digital signatures that guarantee the sender's authenticity. This definition articulates the security functions and requirements necessary for government agencies to deploy E2EE services securely. True E2EE services are robust and fortified to help organizations meet the complex and stringent security and privacy requirements that most enterprises require. They enable agencies to minimize risk and maximize compliance, while providing the ability to communicate quickly and securely. Adopting best practices allows organizations in the public and private sectors to integrate E2EE successfully into their communications and file-sharing platforms. This article continues to discuss key attributes of secure communications that enterprises should consider when designing their E2EE models.

    GCN reports "Not All Encryption Is Created Equal"

  • news

    Visible to the public "GitHub Launches Private Bug Reporting, Package Provenance Features"

    GitHub is launching a new feature that enables the collaboration between security researchers and developers in quickly and privately resolving vulnerability reports. The private vulnerability reporting channel makes it easier for researchers to submit bug reports to developers and provides developers with a single, clear communication channel with researchers. Researchers who wanted to report a bug to a GitHub repository's maintainer previously had limited options. They could either open an issue for the specific repository or email the repository's maintainer, both of which were burdensome and lacked security. The new feature provides a secure channel for the parties to communicate about vulnerability reports without doing so publicly or through email correspondence. Since GitHub announced the public beta of the program in November 2022, over 30,000 organizations have enabled the feature for more than 180,000 repositories. With one setting, organizations can enable private vulnerability reporting across all of their projects, and the capability allows maintainers to automatically send new findings to third-party vulnerability management applications. Researchers can also use an Application Programming Interface (API) to initiate new bug reports on multiple repositories simultaneously. In addition to the private vulnerability reporting tool, GitHub is releasing a feature enabling developers to provide provenance information about their projects on npm, the repository managed by GitHub. This article continues to discuss the private bug reporting and package provenance features launched by GitHub.

    Decipher reports "GitHub Launches Private Bug Reporting, Package Provenance Features"

  • news

    Visible to the public "TAMU-CC Researchers Part of Cybersecurity Research Team Funded by $10M Department of Transportation Grant"

    Researchers continue to work toward realizing a future populated by autonomous vehicles, but the threat of cyberattacks is one of the most pressing issues to resolve. To address this critical issue, a new research team is exploring methods to mitigate the effects of cyberattacks on transportation infrastructure and Connected Autonomous Vehicle (CAV) systems on road traffic safety. As part of its University Transportation Centers (UTC) program, the Department of Transportation (DOT) has awarded a $10 million, five-year grant in support of the work. Dr. Yunpeng (Jack) Zhang will lead the Transportation Cybersecurity Center for Advanced Research and Education (CYBER-CARE) at the University of Houston (UH). Texas A&M University-Corpus Christi, Embry-Riddle Aeronautical University, Rice University, the University of Cincinnati, and the University of Hawaii at Honolulu are members of the CYBER-CARE consortium. The work will include researching, developing, and testing various technologies to specify, evaluate, and enforce cybersecurity and safety policies for CAV accident management policies. This article continues to discuss the research effort to bolster transportation cybersecurity.

    Texas A&M University-Corpus Christi reports "TAMU-CC Researchers Part of Cybersecurity Research Team Funded by $10M Department of Transportation Grant"

  • news

    Visible to the public "ChatGPT Helps or Hurts our Cybersecurity?"

    Professor of Electrical and Computer Engineering and Computer Science at Purdue University, Saurabh Bagchi, has provided insights into ChatGPT's implications for online security and privacy. ChatGPT is already being used to launch security attacks, such as phishing schemes. There are concerns that when this technology reaches full maturity, it will be capable of generating undetectable attacks, and defenders will constantly be fighting these fires. The fear is that it will generate sophisticated attacks automatically, but within this specialized field of automatic attack generation, the dark forces have had access to sophisticated tools for at least a decade. It is possible that ChatGPT will become a highly sophisticated weapon, but it will not represent a completely new threat vector. According to Bagchi, security researchers and practitioners in computer security have devised sophisticated defenses that have thwarted most of these attacks. ChatGPT is also a classic example of dual-use technology, as defenders are expected to use it to expand their defense arsenal. This article continues to discuss Bagchi's insights on ChatGPT's implications for security and privacy in the online world.

    CACM reports "ChatGPT Helps or Hurts our Cybersecurity?"

  • news

    Visible to the public "NSA Part of Coalition Highlighting Cybersecurity Best Practices for Smart Cities"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the FBI are collaborating with international partners' cybersecurity agencies to publish cybersecurity best practices for smart cities. Smart cities incorporate public services into a connected environment to increase efficiencies and improve the quality of life in different communities. Seven agencies from five countries have published the Cybersecurity Information Sheet, "Cybersecurity Best Practices for Smart Cities," highlighting how the integration of Operational Technology (OT) in a connected environment has many benefits but can also be an attractive target for malicious cyber actors seeking to steal data from critical infrastructure and proprietary information, perform ransomware operations, or execute destructive cyberattacks. The report explores risks stemming from three areas, including a large interconnected attack surface, the Information and Communications Technology (ICT) supply chain and vendors, and infrastructure operations automation. This article continues to discuss the agencies' release of a report aimed at strengthening cybersecurity for smart cities.

    NSA reports "NSA Part of Coalition Highlighting Cybersecurity Best Practices for Smart Cities"

  • news

    Visible to the public "Russian Man Who Laundered Money for Ryuk Ransomware Gang Sentenced"

    Denis Mihaqlovic Dubnikov, the Russian national who recently pleaded guilty to charges related to laundering money for the Ryuk ransomware group, has been sentenced to time served. The Department of Justice (DoJ) stated that Dubnikov laundered money for the cybercrime gang between 2018 and August 2021. He was arrested in the Netherlands in November 2021 and extradited to the United States in August 2022. In February 2023, he pleaded guilty to one count of conspiracy to commit money laundering. According to the DoJ, Dubnikov, on one occasion, laundered $400,000 worth of cryptocurrency obtained by the ransomware group from a victim in the United States. The 30-year-old Russian national and other members of the conspiracy allegedly laundered a total of at least $70 million in ransom proceeds. For the charges brought against him, the man faced 20 years in federal prison, three years of supervised release, and a fine of up to $500,000. However, he has been sentenced to time served and ordered to pay $2,000 in restitution.

    SecurityWeek reports: "Russian Man Who Laundered Money for Ryuk Ransomware Gang Sentenced"

  • news

    Visible to the public "'Denim Tsunami' and 'Mulberry Typhoon': Microsoft Alters the Way It Names Hacking Groups"

    Cybersecurity professionals need help remembering all the various names companies use to refer to threat actors. For example, some use a number system, while others use colors, animals, and adjectives such as "fancy" and "charming." Microsoft has announced that it is moving away from a taxonomy based on chemical elements to one that uses weather-themed names to classify hacking groups, adding yet another naming scheme. The tech giant outlined its new naming scheme, explaining that countries will be assigned weather conditions such as blizzard for Russia, sleet for North Korea, typhoon for China, and sandstorm for Iran, while specific groups within nations will be categorized by an adjective such as a color. An Iranian nation-state group will be renamed "Mint Sandstorm" after previously being referred to as "Phosphorus." Microsoft's John Lambert stated that the increasing complexity, scale, and volume of threats calls for reimagining not only how Microsoft communicates threats but also how the company enables customers to understand these threats quickly and with clarity. With the new taxonomy, consumers and security researchers who are already overwhelmed by threat intelligence data will be provided with more context. Lambert explained that the new system would enable them to better organize the threat groups they are tasked with monitoring and provide easier classification methods. Simply by reading the name, researchers and security teams will immediately have an idea about the type of threat actor they are facing. He added that Microsoft is currently tracking over 300 threat actors, including 160 nation-state groups, 50 ransomware gangs, and hundreds of other types of attackers. Using its new naming taxonomy, Microsoft has reclassified every actor it tracks. This article continues to discuss Microsoft's new naming scheme for threat actors.

    The Record reports "'Denim Tsunami' and 'Mulberry Typhoon': Microsoft Alters the Way It Names Hacking Groups"

  • news

    Visible to the public "NCSC: 'New Class' of Russian Cyber Attackers Seek to Destroy Critical Infrastructure"

    The National Cyber Security Centre (NCSC) is warning organizations operating Critical National Infrastructure (CNI) to be prepared for destructive cyberattacks launched by Russia-aligned adversaries armed with sophisticated technology. In the past 18 months, a "new class" of Russia-aligned cyberattackers has emerged, which has not been identified by name, but has been referred to as "Wagner-like groups" by Chancellor Oliver Dowden. They are less operationally constrained by diplomacy and are, therefore, regarded as "less predictable." Therefore, they can also target a significantly broader range of organizations. These groups will seek opportunities to create an impact, especially if systems are inadequately protected. The new groups are not deemed powerful enough to execute a destructive attack successfully and deliberately in the near future, but there is speculation that more damaging attacks could be launched if they were given assistance, perhaps by Russian state-sponsored hackers. The NCSC warned that these groups could become stronger over time, and it is not inconceivable that their capabilities could evolve from disruptive to destructive. This article continues to discuss the new class of Russia-aligned cyberattackers.

    ITPro reports "NCSC: 'New Class' of Russian Cyber Attackers Seek to Destroy Critical Infrastructure"

  • news

    Visible to the public "New Report Calls on EU to Develop Cohesive Cybersecurity Skills Plan for All"

    Researchers from Finland's Aalto University published a report titled "Cyber Citizen Skills and Their Development in the European Union," urging EU member states to develop a unified, people-centered approach to cyber skills and cybersecurity. It was discovered that there are significant differences in the quality of cybersecurity education and other digital skills across the EU. The researchers' study was conducted as part of the Cyber Citizen Initiative. Its primary objective is to create a "cybersecurity civic skills learning model and a learning portal for all Europeans," according to the report's authors. According to the report, the online learning portal will contain content aimed at various audiences. It will include a cybersecurity game that facilitates practical and entertaining cybersecurity education. The researchers found that a unified learning model would help the EU in focusing its efforts to ensure that all citizens have at least a moderate level of cybersecurity competence based on their analysis of the various methodologies EU countries use to develop citizens' cybersecurity skills. This article continues to discuss the new EU cyber citizen report calling on EU member states to develop a cohesive cybersecurity skills plan for all citizens.

    Silicon Republic reports "New Report Calls on EU to Develop Cohesive Cybersecurity Skills Plan for All"

  • news

    Visible to the public "Nurse Call Systems, Infusion Pumps Riskiest Connected Medical Devices"

    Security researchers at Armis have discovered that nurse call systems and infusion pumps are the riskiest connected medical devices. The researchers found that 39% of all nurse calling systems, devices used by patients to alert caregivers when they need assistance, have critical severity unpatched Common Vulnerabilities and Exposures (CVEs). Almost half (48%) of them have unpatched CVEs. The researchers stated that the numbers are somehow lower for infusion pumps, medical devices used by healthcare professionals to deliver fluids such as nutrients or medications into a patient's body in a controlled manner. According to the researchers, 27% of them have critical severity unpatched CVEs, and 30% have unpatched CVEs. In the third spot are dedication dispensing systems used to organize, prepare, prescribe, and deliver prescription drugs to patients. Roughly 4% have critical severity unpatched CVEs, but the number is much larger for those with unpatched CVEs (86%). Moreover, 32% of them run on unsupported Windows versions. The researchers stated that unsupported software issues extend to other devices as well. The researchers suggested that 19% of all connected medical devices are running unsupported OS versions. During the study, the researchers also found that IP cameras were the riskiest IoT device in clinical environments, with over half of them having critical severity unpatched CVEs (56%) and unpatched CVEs (59%). Printers were the second riskiest IoT device in clinical environments, with 37% of them having unpatched CVEs and 30% having critical severity unpatched CVEs. VoIP was third in the IoT list, with more than half of them (53%) having unpatched CVEs. Interestingly, only 2% of them have critical severity unpatched CVEs.

    Infosecurity reports: "Nurse Call Systems, Infusion Pumps Riskiest Connected Medical Devices"

  • news

    Visible to the public "DC Health Link Data Breach Blamed on Human Error"

    According to Mila Kofman, Executive Director of the District of Columbia Health Benefit Exchange Authority, the recent data breach of personal information for thousands of users of Washington D.C.'s health insurance exchange, including members of Congress, was caused by basic human error. The data breach was first discovered in early March and included basic personal information, including date of birth, Social Security numbers, and contact information for "56,415 current and past customers including members of Congress, their families, and staff." Kofman stated that her office immediately brought in the FBI Cyber Security Task Force, and the security flaw was quickly tracked down to a particular computer server that was "misconfigured to allow access to the reports on the server without proper authentication. Based on their investigation to date, they believe the misconfiguration was not an intentional but human mistake." Kofman noted that this security flaw enabled an unidentified hacker to steal two reports that contained the client information, some of which were later offered up for sale in an online forum. Kofman stated that the stolen data "included that of 17 Members of the House and 43 of their dependents, and 585 House staff members and of their 231 dependents."

    NBC Washington reports: "DC Health Link Data Breach Blamed on Human Error"

  • news

    Visible to the public "Cloud Security Alerts Take Six Days to Resolve"

    Security researchers at Palo Alto Networks are warning that cloud security teams are exposing their organization to potential days of elevated cyber risk by failing to deal promptly with alerts. During the study, the researchers found that security teams take 145 hours, or around six days, on average, to resolve a security alert, with 60% of organizations taking longer than four days. Previous Palo Alto research revealed that threat actors often begin exploiting a newly disclosed vulnerability within hours, leaving a potentially lengthy window of exposure for many firms. The researchers stated that although unpatched vulnerabilities are by no means the only source of such alerts, they are a popular target for threat actors. The researchers noted that almost two-thirds (63%) of codebases in production have unpatched vulnerabilities rated high or critical, and more than one in 10 (11%) hosts exposed in public clouds feature high severity or critical bugs. The researchers stated that in a cloud environment, a single vulnerability in the source code can be replicated to multiple workloads, posing risks to the entire cloud infrastructure. The researchers noted that many of these vulnerabilities appear in open-source packages, with the complexity of code dependencies making it challenging to find and patch them. Around half (51%) of codebases depend on more than 100 open-source packages, but just a quarter (23%) of packages are directly imported by developers. The rest (77%) of the required packages, which often contain bugs, are introduced by "non-root packages" or dependencies. During the study, the researchers also found that cloud users make the same mistakes repeatedly. Just 5% of security rules trigger 80% of the alerts, meaning that if organizations can prioritize remediating things like unrestricted firewall policies, exposed databases, and unenforced multi-factor authentication (MFA), they could drive security ROI.

    Infosecurity reports: "Cloud Security Alerts Take Six Days to Resolve"

  • news

    Visible to the public "GPT Tricked by Analysts Into Believing Malware Is Benign"

    Researchers have emphasized that Large Language Model (LLM)-driven malware assessments should not be used in place of human analysis because the Artificial Intelligence (AI) technology underlying them can be deceived and manipulated. They have warned that the prevalence of malicious packages in repositories such as PyPI and npm continues to rise. Researchers from Endor Labs stated that the creation of fake accounts and the distribution of malicious packages can be automated to such an extent that the marginal costs of creating and spreading a malicious package are close to zero. Therefore, the company conducted an experiment and helped identify malicious packages by using a combination of AI techniques and examining the source code and metadata of packages. Researchers explained that the source code is examined for the presence of typical malware behaviors such as droppers, reverse shells, and information exfiltration. GPT-3.5 was queried for 1,874 artifacts. Although LLMs can be beneficial in day-to-day operations, Endor Labs has determined that they cannot replace human review. This article continues to discuss GPT being tricked into believing malware is benign.

    Cybernews reports "GPT Tricked by Analysts Into Believing Malware Is Benign"

  • news

    Visible to the public "Iranian Government-Backed Hackers Targeting US Energy and Transit Systems"

    Mint Sandstorm, an Iranian government-backed actor, has been attributed to attacks on US critical infrastructure between late 2021 and mid-2022. The Mint Sandstorm subgroup is said to be technically and operationally mature as it can develop custom tools and weaponize N-day vulnerabilities. It appears to align with Iran's national priorities, according to an analysis by the Microsoft Threat Intelligence team. Seaports, energy companies, transit systems, and a major US utility and gas company have been targeted. The activity is believed to be retaliatory and a response to attacks on its maritime, railway, and gas station payment systems between May 2020 and late 2021. Microsoft has renamed the threat actor previously known as Phosphorus, APT35, Charming Kitten, ITG18, TA453, and Yellow Garuda to Mint Sandstorm. This article continues to discuss the new findings surrounding the Iranian government-backed actor Mint Sandstorm.

    THN reports "Iranian Government-Backed Hackers Targeting US Energy and Transit Systems"

  • news

    Visible to the public "Triple-digit Increase in API and App Attacks on Tech and Retail"

    Security researchers at Akamai have discovered that last year was a record-breaker in terms of API and application-based attacks on the EMEA retail sector, with detected threats surging 189%. During the study, Akamai analyzed intelligence gathered from 340,000 servers in 4000 locations on 1300 networks in 134 countries. The researchers saw a significant spike in attacks last year across the high-tech (176%) and social media (404%) sectors in EMEA. Globally, the financial services sector also saw an increase in attacks based on 2021 figures. However, in the UK, recorded threats declined by 4%, making this the only region to experience a decrease in this vertical. The researchers suggested that this could be down to threat actors targeting individual account holders rather than large banking institutions. Retail, high tech, and financial services remained by far the most popular targets for web attacks in 2022, accounting for over 70% of total detected threats during the year. The researchers noted that elsewhere, attacks on the healthcare industry globally surged 55% from 2021 to 2022, driven by greater adoption of IoT equipment, which has expanded organizations' attack surfaces. The researchers also found that Local File Inclusion (LFI) remained the top attack vector in EMEA, with attacks growing 115% from 2021 to 2022. Globally they surged by even more (193% year-on-year).

    Infosecurity reports: "Triple-digit Increase in API and App Attacks on Tech and Retail"

  • news

    Visible to the public "Play Ransomware Gang Uses Custom Shadow Volume Copy Data-Theft Tool"

    According to Symantec's security researchers, the Play ransomware group has developed two custom tools called Grixba and VSS Copying Tool in .NET to strengthen its cyberattacks. The two tools allow the attackers to enumerate users and computers in compromised networks, collect information about security, backup, and remote administration software, and copy files from Volume Shadow Copy Service (VSS) to circumvent locked files. Grixba is a network-scanning and information-stealing application used to enumerate users and computers in a domain. In addition, it supports a 'scan' mode that uses WMI, WinRM, Remote Registry, and Remote Services to determine what software is installed on network devices. This article continues to discuss the Play ransomware gang's new custom tools.

    Bleeping Computer reports "Play Ransomware Gang Uses Custom Shadow Volume Copy Data-Theft Tool"

  • news

    Visible to the public "'Goldoson' Malware Sneaks into Google Play Apps, Racks Up 100M Downloads"

    Through an infected third-party library, malware capable of stealing data and committing click fraud has infiltrated 60 mobile apps. Researchers discovered that the infected apps have been downloaded more than 100 million times from the official Google Play store and are available in other app stores in South Korea. Goldoson, discovered and named by researchers at McAfee Labs, is capable of various malicious activities on Android-based devices. The malware can compile lists of installed apps and determine the location of nearby devices via Wi-Fi and Bluetooth. In addition, it can commit ad fraud by clicking on advertisements in the background without the user's consent or knowledge. L.POINT with L.PAY, Swipe Brick Breaker, Money Manager Expense & Budget, Lotte Cinema, Live Score, and GOM are among the popular apps affected by Goldoson. This article continues to discuss the Goldoson malware.

    Dark Reading reports "'Goldoson' Malware Sneaks into Google Play Apps, Racks Up 100M Downloads"