News Items

  • news

    Visible to the public "Cybercriminals Use Research Contests to Create New Attack Methods"

    According to Sophos, adversary-sponsored research contests on cybercriminal forums focus on novel attack and evasion techniques. The contests mirror legitimate security conference 'Call For Papers' and provide winners with monetary rewards, peer recognition, and employment opportunities. A new report from Sophos X-Ops says these contests prompt innovation, and when the entries are analyzed, they provide helpful insight into how cybercriminals attempt to overcome security obstacles. Cybercriminal forum competitions have evolved over the years, as earlier cybercrime contests consisted of trivia quizzes, graphic design competitions, and guessing games. Now, these forums invite attackers to submit articles on technical topics, including source code, videos, and/or screenshots. This article continues to discuss adversary-sponsored research contests on cybercriminal forums.

    Help Net Security reports "Cybercriminals Use Research Contests to Create New Attack Methods"

  • news

    Visible to the public "UTIA Analyzes Data Security and Privacy Concerns of Precision Dairy Management Systems"

    A team of researchers at the University of Tennessee Institute of Agriculture has received a US Department of Agriculture (USDA)-National Institute of Food and Agriculture (NIFA) new investigator seed grant to explore data security and privacy risks associated with the use of Precision Dairy Management (PDM) systems. This study will delve into the types and extent of PDM systems used by Tennessee dairy farmers, as well as the potential data security risks posed by these devices and how farmers and technology developers perceive these threats. During the milking process, PDM systems help farmers maximize dairy output through data collection and Artificial Intelligence (AI) technologies. PDM systems help improve animal welfare, detect and prevent disease, reduce livestock discomfort, and analyze milk production. Although there are potential long-term benefits to profitability and animal health, data breaches and privacy violations may pose a safety risk. The project will analyze the types of Internet-Connected Devices (ICDs) in PDM systems and how they are used. Researchers will work to determine how potential security breaches and unwanted online access could impact farmers on a local, state, and national scale. This article continues to discuss the research project on analyzing data security concerns and privacy risks of using PDM systems.

    The University of Tennessee Institute of Agriculture reports "UTIA Analyzes Data Security and Privacy Concerns of Precision Dairy Management Systems"

  • news

    Visible to the public "New Principles for Patient Data Use Balance Research Benefits, Individual Privacy"

    The American Heart Association (AHA) has published new policy guidance regarding collecting, storing, ethically using, and sharing patient data. Consumers and patients likely know about social media companies' health information collection strategies and practices. However, many are unaware that data collection and sharing can be incredibly valuable for advancing health research that could lead to discoveries and more informed health decisions. Concerns about privacy in the handling of sensitive health information accompany these advances. The new AHA policy statement, "Principles for Health Information Collection, Sharing, and Use," has been published in the Association's peer-reviewed journal, Circulation. This article continues to discuss the guiding principles outlined by the AHA that will help protect patients' privacy.

    The American Heart Association reports "New Principles for Patient Data Use Balance Research Benefits, Individual Privacy"

  • news

    Visible to the public "School of Engineering Establishes Virtual Institute to Combat Cyber Threats"

    A newly established virtual institute at the University of Kansas (KU) School of Engineering will prepare the next generation of military and civilian leaders to fight the growing threat of cyberattacks and protect the electromagnetic spectrum (EMS). The US Department of Defense (DoD) awarded KU a two-year $1.5 million grant to establish the Virtual Institutes for Cyber and Electromagnetic Spectrum Research and Employ (VICEROY) program. Fengjun Li, professor of electrical engineering and computer science at KU and lead researcher for the VICEROY program, emphasized that the complexity and diversity of modern communication systems, such as 5G and 6G networks, as well as Artificial Intelligence (AI) and electronic warfare systems, pose tough challenges for protecting networks from cyberattacks. This article continues to discuss the goals of the VICEROY program.

    The University of Kansas reports "School of Engineering Establishes Virtual Institute to Combat Cyber Threats"

  • news

    Visible to the public "AI Chatbots Pose Risk for Business Operations, Warn UK Cyber Authorities"

    Britain's National Cyber Security Centre (NCSC) is bringing further attention to the increased security risk posed by Artificial Intelligence (AI) chatbots such as OpenAI's ChatGPT and Google's Bard to business operations. According to the NCSC, research suggests that chatbots powered by AI can be easily tricked into conducting malicious tasks using algorithms capable of generating human-sounding interactions. The NCSC emphasized that part of the problem stems from the fact that the technology is so new, which exacerbates the risks associated with working in a constantly changing and evolving market. It was noted that the global technology community does not completely understand Large Language Models' (LLMs) capabilities and vulnerabilities. Despite the availability of several LLM Application Programming Interfaces (APIs), the NCSC explained that the current understanding of LLMs is still "in beta." There is ongoing global research to help fill in the gaps. This article continues to discuss UK cyber authorities' warning regarding AI chatbots posing security risks.

    Cybernews reports "AI Chatbots Pose Risk for Business Operations, Warn UK Cyber Authorities"

  • news

    Visible to the public "Ransomware Comic Looks to Bring Detective Noir to the Computer Age"

    Johnny Dollar is a fictional private detective turned insurance investigator whose old-school crime-fighting adventures are being rebooted decades into the future to combat digital extortion, one of the digital age's most pressing and disruptive crimes. The character started as a radio serial on February 18, 1949. Johnny made his living as a private investigator, pursuing mobsters, murderers, and scammers. More than 800 episodes were broadcast on CBS Radio before the series' cancellation in 1962. Today, Allan Liska, an analyst at the cybersecurity company Recorded Future, is relaunching Johnny's story in a new comic book. Like Liska, the new Johnny Dollar will spend his days investigating ransomware crimes and helping victims whose lives have been turned upside down by cybercriminal gangs. This article continues to discuss Liska's translation of a 1940s detective radio serial to a comic set in the modern computer age.

    SC Media reports "Ransomware Comic Looks to Bring Detective Noir to the Computer Age"

  • news

    Visible to the public "Gamaredon Hackers Target Ukrainian Military Orgs Amid Counteroffensive Efforts"

    According to a new report published by Ukraine's National Coordination Center for Cybersecurity (NCCC), Gamaredon, the Moscow-backed hacking group, is intensifying its attacks against Ukraine's military and government agencies. Gamaredon works from the Russian-annexed Crimean peninsula and follows orders issued by Russia's Federal Security Service (FSB) in Moscow. Cybersecurity experts and government officials say the main objectives of the group's attacks are espionage and data theft. In a previous report, the Ukrainian Computer Emergency Response Team (CERT-UA) said the group was responsible for at least one destructive cyberattack on an unidentified information infrastructure facility. This article continues to discuss Gamaredon ramping up its attacks on Ukraine's military and government agencies.

    The Record reports "Gamaredon Hackers Target Ukrainian Military Orgs Amid Counteroffensive Efforts"

  • news

    Visible to the public "Vulnerability in WordPress Migration Plugin Exposes Websites to Attacks"

    Security researchers at Patchstack have discovered a vulnerability in several extensions for the All-in-One WP Migration plugin, potentially exposing WordPress websites to attacks leading to sensitive information disclosure. With more than five million installations and maintained by ServMask, All-in-One WP Migration is a highly popular plugin for moving websites that also provides several premium extensions for migrating to third-party platforms. The vulnerability impacts All-in-One WP Migration's Box, Google Drive, OneDrive, and Dropbox extensions that could allow attackers to access sensitive information. The vulnerability is tracked as CVE-2023-40004 and is described as an unauthenticated access token manipulation issue. The researchers noted that the bug could allow an unauthenticated attacker to tamper with the access token configuration of the affected extension. The researchers stated that this "access token manipulation could result in a potential sensitive information disclosure of migration to the attacker's controlled third-party account or restore a malicious backup." The researchers noted that the flaw was identified in the init function of the affected extensions, which is "hooked to the WordPress's admin_init hook," which in turn can be triggered by an attacker without authentication. The researchers stated that since there is no permission and nonce validation on the init function, an unauthenticated user is able to modify or delete the access token used on each of the affected extensions. On July 18, the researchers reported the vulnerability to ServMask, which patched the bug in all impacted extensions by "adding permission and nonce validation on the init function." Users are advised to update to All-in-One WP Migration's Box extension version 1.54, Google Drive extension version 2.80, OneDrive extension version 1.67, and Dropbox extension version 3.76, which were released at the end of July.

    SecurityWeek reports: "Vulnerability in WordPress Migration Plugin Exposes Websites to Attacks"

  • news

    Visible to the public "SapphireStealer Malware: A Gateway to Espionage and Ransomware Operations"

    Multiple entities are enhancing the capabilities of SapphireStealer, an open-source .NET-based information stealer malware, and spawning their own custom variants. According to Cisco Talos researcher Edmund Brumaghin, information-stealing malware such as SapphireStealer can be used to obtain sensitive data, such as corporate credentials, which are typically resold to other threat actors who use the access for espionage, ransomware/extortion, and other attacks. Over time, an entire ecosystem has developed that enables both financially motivated and nation-state actors to use stealer malware vendors' services to conduct various attacks. In this light, such malware not only represents an evolution of the Cybercrime-as-a-Service (CaaS) model, but it also enables other threat actors to profit from the stolen data in order to distribute ransomware, steal data, and engage in other malicious cyber activities. This article continues to discuss findings regarding SapphireStealer.

    THN reports "SapphireStealer Malware: A Gateway to Espionage and Ransomware Operations"

  • news

    Visible to the public "Classiscam Fraud-As-A-Service Expands, Now Targets Banks and 251 Brands"

    The "Classiscam" Fraud-as-a-Service (FaaS) operation has expanded its global reach, targeting a greater number of brands, countries, and industries, and causing more significant financial harm than before. This Telegram-based operation, similar to Ransomware-as-a-Service (RaaS), recruits affiliates who use the service's phishing kits to create fraudulent ads and pages aimed at stealing money, credit card information, and, more recently, banking credentials. The developers then divide any profits with the affiliate, with the developers receiving 20-30 percent and the affiliate receiving the remainder. Group-IB discovered the criminal platform in 2019, with researchers reporting its rapid expansion. The platform resulted in 40 cybercrime groups making $6.5 million throughout 2020. This article continues to discuss the Classiscam FaaS.

    Bleeping Computer reports "Classiscam Fraud-As-A-Service Expands, Now Targets Banks and 251 Brands"

  • news

    Visible to the public "Apple Offers Security Researchers Specialized iPhones to Tinker With"

    Apple encourages security researchers to apply for its Security Research Device Program (SRDP) to identify vulnerabilities and earn bug bounties. Apple launched its Apple SRDP in 2019. Participating researchers have identified 130 critical security flaws through the program and indirectly helped Apple implement security improvements to the XNU kernel, kernel extensions, and XPC services. The Security Research Device (SRD) is a hardware variant of the iPhone 14 Pro equipped with tools and options that enable researchers to configure or disable advanced iOS security features. It allows researchers to install and boot custom kernel caches, execute arbitrary code, initiate services at startup, persist content across restarts, and more. This article continues to discuss Apple's SRDP.

    Help Net Security reports "Apple Offers Security Researchers Specialized iPhones to Tinker With"

  • news

    Visible to the public "Cyberattackers Swarm Openfire Cloud Servers With Takeover Barrage"

    The cybercriminal group Kinsing has returned, exploiting a previously disclosed path traversal vulnerability in the Openfire enterprise messaging application to create unauthenticated admin users. They can then upload malware and a Monero cryptominer to compromised platforms after gaining complete control of Openfire cloud servers. In less than two months, Aqua Nautilus researchers have observed over 1,000 attacks exploiting the Openfire vulnerability, tracked as CVE-2023-32315, which was disclosed and fixed in May. Openfire is a web-based real-time collaboration (RTC) server used as a chat platform over XMPP that supports over 50,000 concurrent users. This article continues to discuss the Kinsing threat group exploiting an Openfire vulnerability.

    Dark Reading reports "Cyberattackers Swarm Openfire Cloud Servers With Takeover Barrage"

  • news

    Visible to the public "Government Agencies Report New Russian Malware Targets Ukrainian Military"

    US federal agencies and international partners have issued a report warning of a new malware campaign called Sandworm that Russian military cyber actors carry out. The objective of the joint guidance is to facilitate the detection and mitigation of this new malware, which is attributed to an actor known to target US government and Defense Industrial Base (DIB) networks. According to Cybersecurity Director Rob Joyce of the National Security Agency (NSA), Russia continues to use the cyber domain to advance its conflict against Ukraine. This article continues to discuss the "Infamous Chisel" malware analysis report.

    NSA reports "Government Agencies Report New Russian Malware Targets Ukrainian Military"

  • news

    Visible to the public "Energy Department Offering $9M in Cybersecurity Competition for Small Electric Utilities"

    The US Department of Energy recently announced a competition that can help smaller electric utilities obtain funding and technical assistance for improving their cybersecurity posture. The competition, named the Advanced Cybersecurity Technology (ACT) 1 Prize Competition, is part of the Biden administration's Rural and Municipal Utility Cybersecurity (RMUC) Program, which has set aside $250 million over a five-year period for enhancing cybersecurity at cooperative, municipal and small investor-owned electric utilities. The total budget for the ACT 1 Prize Competition, which is the first in a series, is $8.96 million in cash and technical assistance. The competition has three phases, focusing on commitment, planning, and implementation. The Department of Energy stated that in the planning phase, competitors need to describe their current resources and their need for improving their cybersecurity posture. The deadline for the first phase of the project is November 29, 2023. The department noted that "winning utilities in the Commitment Phase will receive cash prizes and technical assistance based on their commitment to improving their utility's cybersecurity posture through investments in cybersecurity technologies, staff training, and improvements to governance processes." In the planning phase, utilities will conduct system assessments, identify areas for training, understand potential risks and solutions, and draft an implementation roadmap. In the final phase, they will work on implementing that roadmap. In the second and third phases, electric utilities will receive cash prizes and technical assistance based on the work they completed in the respective phase.

    SecurityWeek reports: "Energy Department Offering $9M in Cybersecurity Competition for Small Electric Utilities"

  • news

    Visible to the public "500k Impacted by Data Breach at Fashion Retailer Forever 21"

    Fashion retailer Forever 21 has recently started informing more than 500,000 individuals that their personal information was compromised in a data breach earlier this year. The fashion retailer revealed that, on March 20, 2023, it identified a cyberattack that impacted some of its systems. Forever 21's investigation determined that the attackers had access to the company's systems since at least January 5, 2023, and that they accessed those systems several times until March 21. The company noted that this month, it discovered that the files the attackers accessed contained personal information, including names, birth dates, Social Security numbers, bank account numbers, and Forever21 health plans data. Forever 21 told the Maine Attorney General that close to 540,000 individuals were impacted by the incident. The company noted that it has no evidence suggesting that the stolen information "has been misused for fraud or identity theft." While the retailer shared no details on how the attackers breached its systems and whether file-encrypting ransomware was used, the notification letter suggests that it engaged in communication with the attackers and that a ransom might have been paid.

    SecurityWeek reports: "500k Impacted by Data Breach at Fashion Retailer Forever 21"

  • news

    Visible to the public "Splunk Patches High-Severity Flaws in Enterprise, IT Service Intelligence"

    Splunk recently announced patches for multiple high-severity vulnerabilities in Splunk Enterprise and IT Service Intelligence, including flaws in third-party packages. The most severe of the bugs resolved in Splunk Enterprise this month is CVE-2023-40595 (CVSS score of 8.8), which is described as a remote code execution issue exploitable using crafted queries. Splunk noted that the exploit requires the use of the collect SPL command, which writes a file within the Splunk Enterprise installation. The attacker can then use this file to submit a serialized payload that can result in the execution of code within the payload. The next most severe vulnerability is CVE-2023-40598, a command injection vulnerability impacting a legacy internal function, which could be exploited to execute arbitrary code. Splunk stated that the vulnerability revolves around the currently deprecated runshellscript command that scripted alert actions use. The researchers noted that this command, along with external command lookups, lets an attacker use this vulnerability to inject and execute commands within a privileged context from the Splunk platform instance. Splunk stated that the latest Splunk Enterprise releases also resolve a cross-site scripting (XSS) flaw (CVE-2023-40592), an absolute path traversal bug leading to code execution (CVE-2023-40597), and a privilege escalation issue resulting from an insecure path reference in a DLL (CVE-2023-40596). All vulnerabilities were addressed with the release of Splunk Enterprise versions 8.2.12, 9.0.6, and 9.1.1, which also patch two medium-severity denial-of-service (DoS) flaws. Splunk also recently announced patches for an unauthenticated log injection bug (CVE-2023-4571, CVSS score of 8.6) in IT Service Intelligence. Splunk noted that the issue allows an attacker to inject ANSI escape codes into log files, resulting in malicious code being executed when the log file is read in a vulnerable terminal application. While IT Service Intelligence is not directly impacted by the flaw, indirect impact results from the permissions the terminal application has and from where and how the user reads the malicious log files. Splunk patched the vulnerability in IT Service Intelligence versions 4.13.3 and 4.15.3. Splunk makes no mention of any of these vulnerabilities being exploited in attacks.

    SecurityWeek reports: "Splunk Patches High-Severity Flaws in Enterprise, IT Service Intelligence"

  • news

    Visible to the public "Innovative Approach: Detecting Malware Through Hardware-integrated Protection"

    Dr. Marcus Botacin, a visiting assistant professor in the computer science and engineering department at Texas A&M University, was recently awarded a grant by the National Science Foundation (NSF) for efforts aimed at moving malware detection from software to hardware, enhancing existing technology. According to Botacin, the concept of using hardware to detect malware faster has existed for around ten years, but his proposal would be the "first formal scientific treatment of the problem." The "Next Generation Antivirus" project will include establishing a framework for extending existing CPU hardware to integrate malware detection, as well as developing the metrics and formal materials required for methodological evaluation. A new technology for faster and more efficient detection needs evaluations to determine if the technique is practical enough without compromising other important operations. Botacin will use a hardware emulator, simulating hardware operations in a software application, to create the framework and uncover new ways CPUs can be designed and organized to include malware detection. This article continues to discuss the Next Generation Antivirus project.

    Texas A&M University reports "Innovative Approach: Detecting Malware Through Hardware-integrated Protection"

  • news

    Visible to the public "Tech Companies Mull Strategies to Block Threat Groups From Abusing Platforms"

    As threat groups increasingly use cloud storage, email, and messaging platforms in cyberattacks, technology providers seek new ways to bolster their defense strategies. Threat groups have used legitimate services for command-and-control (C2) communication, payload delivery, and data exfiltration. This abuse can make cyberattacks difficult to detect for victims. In addition, this strategy reduces operational expenses and infrastructure costs for cybercriminals because it simplifies C2 server installation and eliminates the need for hosting or registration fees. According to a new report by Recorded Future's Insikt Group, Advanced Persistent Threat (APT) groups have been at the forefront of innovation efforts surrounding this type of abuse, but less sophisticated groups are following suit due to a "trickle down effect." This article continues to discuss blocking threat groups from abusing legitimate platforms.

    Decipher reports "Tech Companies Mull Strategies to Block Threat Groups From Abusing Platforms"

  • news

    Visible to the public "Checkmarx Warns of Unknown Threat Actor Targeting Developers Through NPM Packages"

    Researchers at Checkmarx have uncovered a previously unknown threat actor using NPM packages to steal source code and secrets from developers. The threat actor, suspected to have been active since 2021, has published malicious NPM packages designed to exfiltrate sensitive data, such as source code and configuration files, from victim machines. Each malicious package used by the threat actor executes automatically upon installation. The packages each included three files as part of the attack process. This article continues to discuss the targeting of developers through malicious NPM packages.

    SiliconANGLE reports "Checkmarx Warns of Unknown Threat Actor Targeting Developers Through NPM Packages"

  • news

    Visible to the public "Credentials of NASA, Tesla, DOJ, Verizon, and 2K Others Leaked by Workplace Safety Organization"

    The National Safety Council (NSC) is a US nonprofit organization that provides workplace and driving safety training. On its digital platform, NSC offers online resources to its nearly 55,000 members, representing various businesses, agencies, and academic institutions. However, the organization's website was exposed to cyberattacks for five months. The Cybernews research team discovered web directories with public access that exposed thousands of credentials. The leaked credentials include those belonging to employees from around 2,000 businesses and government agencies, such as Shell, BP, Exxon, Chevron, Siemens, Intel, HP, Dell, Intel, IBM, AMD, and more. This article continues to discuss the NSC leaking nearly 10,000 emails and passwords of their members, exposing 2,000 organizations.

    Cybernews reports "Credentials of NASA, Tesla, DOJ, Verizon, and 2K Others Leaked by Workplace Safety Organization"

  • news

    Visible to the public "Earth Estries Cyberespionage Group Targets Government, Tech Sectors"

    A cyberespionage group possibly linked to China has recently targeted government-related organizations and technology companies in various parts of the world. Security researchers at Trend Micro, which tracks it as Earth Estries, say the group has been around since at least 2020. The researchers have not directly attributed Earth Estries to any particular country, but they did point out that there are some overlaps in tactics, techniques, and procedures (TTPs) with an APT named FamousSparrow. FamousSparrow, which in 2021 was seen targeting governments and hotels, may be connected to the China-linked threat actors SparklingGoblin and DRBControl. The researchers noted that they are aware of Earth Estries victims in the United States, Germany, South Africa, Malaysia, the Philippines, and Taiwan. Some evidence suggests that entities in India, Canada, and Singapore were also attacked. The researchers noted that the targets were mainly organizations in the government and technology sectors. The attackers typically compromise admin accounts after hacking the targeted organization's internal servers. They then move laterally and deploy backdoors and other tools before collecting and exfiltrating valuable data. The researchers noted that the list of malware used by the group includes the HemiGate and Zingdoor backdoors and the TrillClient information stealer. Earth Estries' command and control (C&C) infrastructure relies on the Fastly CDN service, which in the past was seen being abused by threat actors related to the Chinese group APT41. The researchers analysis uncovered C&C servers hosted on virtual private server (VPS) services in various countries, including the US, India, Canada, the UK, Finland, Germany, Macedonia, China, South Korea, Japan, South Africa, and Australia.

    SecurityWeek reports: "Earth Estries Cyberespionage Group Targets Government, Tech Sectors"

  • news

    Visible to the public "UK Cyber Agency Warns of Potentially Fundamental Flaw in AI Technology"

    Britain's National Cyber Security Centre (NCSC) has issued a warning about a fundamental security vulnerability impacting Large Language Models (LLMs), the type of Artificial Intelligence (AI) used by ChatGPT to perform human-like conversations. Since ChatGPT's launch in November 2022, most security concerns regarding the technology have centered on its ability to automatically generate human-like speech. Cybercriminals are now deploying their own versions to generate "remarkably persuasive" phishing emails. In addition to the malicious use of LLM software, there are vulnerabilities stemming from its use and integration with other systems, especially when the technology interfaces with databases and other product components. It is referred to as a "prompt injection" attack, and according to the NCSC, the issue may be fundamental. The agency warned that research suggests an LLM cannot distinguish between an instruction and data provided to help complete the instruction. This article continues to discuss Britain's NCSC warning of a fundamental flaw in AI technology.

    The Record reports "UK Cyber Agency Warns of Potentially Fundamental Flaw in AI Technology"

  • news

    Visible to the public  "China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users"

    Researchers have found malicious Android apps for Signal and Telegram being distributed through the Google Play Store and Samsung Galaxy Store. They are designed to deliver the BadBazaar spyware on infected devices. ESET researchers attributed the campaign to GREF, an actor linked to China. Most victims have been detected in Germany, Poland, and the US, followed by Ukraine, Australia, Brazil, Denmark, Congo-Kinshasa, Hong Kong, Hungary, Lithuania, the Netherlands, Portugal, Singapore, Spain, and Yemen. BadBazaar was first identified by Lookout in November 2022 as targeting the Uyghur community in China with seemingly harmless Android and iOS apps that, once installed, harvest data, including call logs, SMS messages, locations, and more. This article continues to discuss the China-linked BadBazaar Android spyware.

    THN reports "China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users"

  • news

    Visible to the public "DreamBus Malware Exploits RocketMQ Flaw to Infect Servers"

    A new version of the DreamBus botnet malware infects devices by exploiting a critical Remote Code Execution (RCE) flaw in RocketMQ servers. The exploited vulnerability, tracked as CVE-2023-33246, is a permission verification flaw that affects RocketMQ versions 5.1.0 and earlier and allows remote command execution under certain conditions. Recent DreamBus attacks exploiting this vulnerability were discovered by researchers at Juniper Threat Labs, who reported an uptick in activity in the middle of June 2023. This article continues to discuss findings regarding the new version of the DreamBus botnet malware.

    Bleeping Computer reports "DreamBus Malware Exploits RocketMQ Flaw to Infect Servers"

  • news

    Visible to the public "Rising Cyber Incidents Challenge Healthcare Organizations"

    According to Claroty, healthcare organizations face multiple cybersecurity challenges, calling for them to increasingly prioritize cybersecurity and compliance. In addition to focusing on Information Technology (IT) systems, threat actors have shifted their attention to Internet of Medical Things (IoMT) devices, Building Management Systems (BMS), and other cyber-physical systems that are essential for maintaining a safe environment for patient care. The healthcare sector is unique due to the wide variety of cyber-physical systems connected to the Internet and to one another. A successful attack on any of these systems or devices could impact care delivery or patient safety. This article continues to discuss cybersecurity challenges faced by healthcare organizations.

    Help Net Security reports "Rising Cyber Incidents Challenge Healthcare Organizations"

  • news

    Visible to the public "In Airbnb, Cybercriminals Find a Comfortable Home for Fraud"

    Cybercriminals are now targeting Airbnb for fraud on the dark web. Thousands of Airbnb accounts have become available in underground cybercrime markets for purchase in recent months, sometimes for as little as one dollar. According to an investigation conducted by SlashNext researchers, cybercriminals are using phishing, stealer malware, and stolen cookies to gain unauthorized access to Airbnb accounts, which they then sell online. With unauthorized access to the accounts of legitimate hosts and guests, cybercriminals are able to book properties and perform other unauthorized actions without raising any red flags. This article continues to discuss cybercriminals targeting Airbnb for fraud.

    Dark Reading reports "In Airbnb, Cybercriminals Find a Comfortable Home for Fraud"

  • news

    Visible to the public "Twelve Nations Urge Social Media Giants to Tackle Illegal Data Scraping"

    Twelve nations have issued a joint statement cautioning against using data scraping technologies to collect personal information from social media platforms and other online sites, which are required by local laws to protect their users' data. They note that data scraping is increasingly used to collect and process personal information from the Internet, raising significant privacy concerns because these technologies can be exploited for various purposes. According to the statement, these include data monetization through reselling to third-party websites, identity fraud, and intelligence gathering to facilitate malicious cyberattacks. The statement cites the respective data privacy agencies of Australia, Canada, the UK, Hong Kong, Switzerland, and more. This article continues to discuss a band of nations calling on social media platforms and websites that hold personal data to protect their users against illegal data scraping.

    ZDNet reports "Twelve Nations Urge Social Media Giants to Tackle Illegal Data Scraping"

  • news

    Visible to the public "High-Severity Memory Corruption Vulnerabilities Patched in Firefox, Chrome"

    Mozilla and Google recently announced the release of stable updates for Firefox and Chrome to address several high-severity vulnerabilities, including memory corruption issues. Mozilla released Firefox 117 with patches for 13 vulnerabilities, including seven rated "high severity," four of which are described as memory corruption bugs affecting the browser's IPC CanvasTranslator, IPC ColorPickerShownCallback, IPC FilePickerShownCallback, and JIT UpdateRegExpStatics components. The first three flaws are tracked as CVE-2023-4573, CVE-2023-4574, and CVE-2023-4575 and could have led to a use-after-free, causing a potentially exploitable crash. The fourth vulnerability tracked as CVE-2023-4577, could have led to a potentially exploitable crash as well. Mozilla noted that it also patched a high-severity integer overflow (CVE-2023-4576) in the RecordedSourceSurfaceCreation component of Firefox for Windows, resulting in "a heap buffer overflow potentially leaking sensitive data that could have led to a sandbox escape." Mozilla stated that Firefox 117 also addresses multiple high-severity memory safety bugs that are collectively tracked as CVE-2023-4584 and CVE-2023-4585 and which also impact Firefox ESR and Thunderbird. The remaining six issues addressed with this browser release are medium and low-severity vulnerabilities that could lead to site spoofing, sensitive information leaks, the download of files without a warning of their potential harm, a buffer overflow, or browser context not being cleared when closing a private window. Mozilla also announced the release of Firefox ESR 115.2 with patches for 14 vulnerabilities, including 12 resolved in Firefox 117. Additionally, Mozilla released Firefox ESR 102.15 recently with patches for six vulnerabilities. Google stated that the recent Chrome update resolves one vulnerability, tracked as CVE-2023-4572 and described as a use-after-free flaw in MediaStream. Google noted that such issues may often be exploited to escape Chrome's sandbox and achieve remote code execution if combined with other vulnerabilities. Mozilla and Google make no mention of any of these flaws being exploited in attacks.

    SecurityWeek reports: "High-Severity Memory Corruption Vulnerabilities Patched in Firefox, Chrome"

  • news

    Visible to the public "GitHub Enterprise Server Gets New Security Capabilities"

    GitHub recently announced the general availability of Enterprise Server 3.10 with new security capabilities, including support for custom deployment rules. GitHub noted that with the new release, GitHub Projects is now generally available in Enterprise Server, providing administrators with increased visibility over issues and pull requests. Now, teams using GitHub Actions can also create their own custom deployment protection rules to ensure that only "the deployments that pass all quality, security, and manual approval requirements make it to production." GitHub noted that the new release also provides administrators with additional control over the management and security of runners in GitHub Actions, allowing them to disable repository-level self-hosted runners across the entire organization and cross-user namespaces to ensure that jobs are hosted on centrally managed machines only. GitHub stated that GitHub Enterprise Server 3.10 also makes it easier for developers to set up code scanning on their repositories, using the new default setup, without the need for YAML files. The new default setup also allows teams to enable code scanning across multiple repositories at once. According to GitHub, the new release also makes it easier for security teams to track coverage and risks across all repositories, from the enterprise-level "code security" pages, through the Dependabot feature.

    SecurityWeek reports: "GitHub Enterprise Server Gets New Security Capabilities"

  • news

    Visible to the public "Barracuda ESG Hacks Focused On China's 'High Priority Targets'"

    According to researchers at Mandiant, the hackers responsible for a recent campaign targeting Barracuda Email Security Gateway (ESG) devices have conducted follow-up attacks against compromised organizations considered "high priority targets" by the Chinese government, and have made significant efforts to evade victims' remediation actions. Between October 2022 and June 2023, a previously unknown threat group, UNC4841, which Mandiant and the FBI revealed to have clear ties to China, compromised Barracuda ESG appliances globally. Barracuda hired Mandiant to investigate the attacks when they were discovered in May, and the company has been collaborating closely with affected organizations and authorities in multiple jurisdictions. In a recent report, Mandiant notes that UNC4841 was able to launch additional malware to maintain a presence on a smaller group of targeted networks, even as organizations scrambled to address the initial attacks. A few victims remained at risk from the novel backdoor malware, DEPTHCHARGE, that the threat group deployed in response to remediation efforts. This article continues to discuss Barracuda ESG hacks focusing on China's high priority targets.

    SC Magazine reports "Barracuda ESG Hacks Focused On China's 'High Priority Targets'"

  • news

    Visible to the public "Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits"

    According to a new study by Abnormal Security, which analyzed brand impersonation and credential phishing trends in the first half of 2023, Microsoft was the most commonly abused brand for phishing exploits. Microsoft's name was used in approximately 650,000 phishing attempts blocked by Abnormal Security. According to the company's report, attackers prefer Microsoft due to the ability to move laterally throughout an organization's Microsoft environment. Additionally, Abnormal Security's threat unit observed the growing use of generative Artificial Intelligence (AI) in social engineering attacks. AI tools have made it much easier and faster for cybercriminals to craft convincing phishing emails, spoof websites, and write malicious code. This article continues to discuss the top 10 brands impersonated in phishing attacks, attackers increasingly relying on generative AI, and how credential-focused phishing attacks lead to persistence.

    TechRepublic reports "Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits"

  • news

    Visible to the public SoS Musings #76 - Side-Channel Attacks Continue Emerging

    SoS Musings #76 -

    Side-Channel Attacks Continue Emerging

  • news

    Visible to the public Cybersecurity Snapshots #45 - Cuba Ransomware

    Cybersecurity Snapshots #45 -

    Cuba Ransomware

  • news

    Visible to the public Cyber Scene #83 - AI Abounding: Worldwide Regulation, Home and Abroad

    Cyber Scene #83 -

    AI Abounding: Worldwide Regulation, Home and Abroad

  • news

    Visible to the public "US, European Agencies Dismantle Qakbot Network Used for Ransomware and Scams"

    Multiple law enforcement agencies worldwide have dismantled Qakbot, one of the most prolific and persistent botnets. The FBI and US Department of Justice (DOJ), together with agencies in France, Germany, the Netherlands, the UK, Romania, and Latvia, announced that they shut down Qakbot's computer infrastructure and removed the malware from infected devices. Since 2008, cybercriminals have used the Qakbot malware to infect over 700,000 devices, enabling them to launch ransomware attacks and carry out scams. According to senior FBI officials, more than 200,000 infected devices were in the US. This article continues to discuss the collaborative takedown of the Qakbot network.

    The Record reports "US, European Agencies Dismantle Qakbot Network Used for Ransomware and Scams"

  • news

    Visible to the public "Iran Spyware Breached and Exposed by GhostSec"

    The GhostSec hacktivist group claims to have compromised the FANAP Behnama software, exposing 20GB of data, including face recognition and motion detection systems the Iranian government allegedly uses to monitor and track its citizens. GhostSec is suspected to be an offshoot of the larger Anonymous hacktivist group that emerged around 2015 as a separate entity, seemingly in response to the ISIS terrorist attacks in France that same year. Since then, it claims to have sabotaged hundreds of websites and social media accounts promoting Islamist extremism. This article continues to discuss the GhostSec hacktivist group claiming to have taken down the "Iran regime's very own privacy-invading software."

    Cybernews reports "Iran Spyware Breached and Exposed by GhostSec"

  • news

    Visible to the public "UN Warns Hundreds of Thousands in Southeast Asia Roped Into Online Scams"

    The U.N. human rights office recently announced that criminal gangs have forced hundreds of thousands of people in Southeast Asia into participating in unlawful online scam operations, including false romantic ploys, bogus investment pitches, and illegal gambling schemes. The U.N. human rights office said that at least 120,000 people in strife-torn Myanmar and roughly 100,000 in Cambodia "may be held in situations where they are forced to carry out online scams." Laos, the Philippines, and Thailand were also cited among the main countries of destination or transit for tens of thousands of people. The human rights office noted that criminal gangs have increasingly targeted migrants and lured some victims by false recruitment, suggesting they are destined for real jobs. The human rights office stated that some victims have been subjected to torture, cruel punishments, sexual violence, and arbitrary detention, among other crimes. In June, Philippine police backed by commandos led a raid to rescue more than 2,700 workers from China, the Philippines, Vietnam, Indonesia, and more than a dozen other countries who were allegedly swindled into working for fraudulent online gaming sites and other cybercrime groups.

    SecurityWeek reports: "UN Warns Hundreds of Thousands in Southeast Asia Roped Into Online Scams"

  • news

    Visible to the public "DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates"

    A new malspam campaign has been observed deploying DarkGate, an off-the-shelf malware. The current increase in DarkGate malware activity is likely given that the malware's developer has recently begun renting it out to a limited number of affiliates, according to Telekom Security. The most recent report expands on the findings of security researcher Igal Lytzki, who described a "high volume campaign" that uses hijacked email threads to trick recipients into downloading malware. DarkGate, which is mainly sold on underground forums by an actor named RastaFarEye, includes the ability to evade detection by security software, set up persistence using Windows Registry changes, escalate privileges, and steal data from web browsers and other applications such as Discord and FileZilla. This article continues to discuss the DarkGate malspam campaign.

    THN reports "DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates"

  • news

    Visible to the public "MalDoc in PDFs: Hiding Malicious Word Docs in PDF Files"

    Japan's Computer Emergency Response Team (JPCERT) reveals a new "MalDoc in PDF" attack discovered in July 2023 that evades detection by embedding malicious Word documents within PDFs. The file sampled by JPCERT is a polyglot recognized as a PDF by most scanning engines and tools, but office applications can open it as a standard Word document (.doc). Polyglots comprise two different file formats that, depending on the application reading/opening, can be interpreted and executed as more than one file type. For example, the malicious documents in this campaign are a combination of PDF and Word files that can be accessed in either format. Threat actors typically use polyglots to bypass detection or confuse analysis tools since these files may appear harmless in one format while hiding malicious code in another. In this case, the PDF file contains a Word document with a VBS macro that will download and install an MSI malware file if opened in Microsoft Office as a .doc file. This article continues to discuss the MalDoc in PDF attack.

    Bleeping Computer reports "MalDoc in PDFs: Hiding Malicious Word Docs in PDF Files"

  • news

    Visible to the public "Addressing Cybersecurity's Talent Shortage & Its Impact on CISOs"

    Recent research from ISC2 shows that the cybersecurity industry continues to face a severe talent shortage as the threat landscape evolves and the skills gap grows. The organization discovered that there is still a need for more than 3.4 million security professionals. Organizations are adopting cloud-first strategies to attain greater scalability and flexibility. In addition, they are using multiple cloud technology providers and database providers, increasing workload, alerts, and data. Complexity requires new tools, practice changes, skill modifications, and increased participation. Furthermore, CISOs lack the budgets and employees to meet the demand in the current economic climate. This affects organizations of all sizes and is partially attributable to an expanding and evolving threat landscape. In 2022 alone, 1,802 data breaches occurred, and 422 million individuals were affected. This article continues to discuss the cybersecurity talent shortage.

    Dark Reading reports "Addressing Cybersecurity's Talent Shortage & Its Impact on CISOs"

  • news

    Visible to the public "Easy-To-Exploit Skype Vulnerability Reveals Users' IP Address"

    Attackers can exploit a vulnerability in Skype mobile apps to discover a user's IP address, a piece of information that can endanger individuals whose physical safety depends on the secrecy of their location. A security researcher named Yossi discovered the vulnerability and privately reported it to Microsoft. The specifics of the vulnerability have not been made public because it has not yet been patched, but it is said to be trivially easy to exploit and require changing a link-related parameter. The vulnerability enables attackers to send a message containing a link that, when opened, reveals the recipient's IP address. They are not required to click the link or perform any other action for the attack to be successful. Microsoft initially stated that the issue does not meet the definition of a security vulnerability requiring immediate servicing but later confirmed that it will be addressed in a "future product update." The attack is effective if the target uses the Skype mobile app, but Mac users are secure. This article continues to discuss findings regarding the Skype vulnerability.

    Help Net Security reports "Easy-To-Exploit Skype Vulnerability Reveals Users' IP Address"

  • news

    Visible to the public "Report Reveals Growing Disparity in Cyber Insurance Landscape"

    According to security researchers at Delinea, there is a growing disconnect between carriers and enterprises seeking robust coverage. Insights from 300 US organizations highlighted an escalating trend: securing cyber insurance is increasingly challenging, with more firms requiring over six months for policies. The survey sought to identify shifting patterns since last year's analysis. The researchers stated that companies making multiple claims surged to 47%, while 67% of respondents reported insurance premiums surging by 50-100% during application or renewal. The researchers also found that there is a growing list of exclusions that could potentially render cyber insurance coverage null, encompassing factors such as inadequate security protocols (43%), human errors (38%), acts of war (33%) and non-adherence to compliance procedures (33%). The researchers noted that even organizations that succeed in procuring or renewing policies may face claim denials or reductions due to intricate policy stipulations. The researchers stated that security controls are important given the prevalence of cyberattacks stemming from compromised credentials. Approximately 51% of respondents indicate Identity and Access Management (IAM) controls as policy requisites, closely followed by 49% citing Privileged Access Management (PAM). With cyber insurance shaping up as a strategic imperative, the researchers noted that organizations are also aligning budgets: 50% invested in IAM solutions, 45% procured password vaults, and 44% acquired PAM controls to fortify their coverage.

    Infosecurity reports: "Report Reveals Growing Disparity in Cyber Insurance Landscape"

  • news

    Visible to the public "Signs of Malware Attack Targeting Rust Developers Found on Crates.io"

    According to security researchers at Phylum, the Crates[.]io Rust package registry was targeted recently in what appeared to be the initial phase of a malware attack aimed at developers. The researchers noted that it is not uncommon for threat actors to rely on typosquatting and software development package registries to deliver malware to Node.js and Python developers. In these types of attacks, hackers typically create packages with names that are misspelled or typosquatted variants of popular packages. The researchers noted that these attacker packages are initially benign to ensure that they are accepted into official registries. Days or weeks later, the threat actor adds malicious functionality that they can leverage against developers who download their package instead of the legitimate version. Phylum reported that such an attack targeted the Rust package registry Crates[.]io earlier this month. The researchers stated that, fortunately, the suspicious packages were detected early, but in some cases, the attacker did manage to add code designed to send information about the compromised host to a Telegram channel. The researchers noted that this is likely part of a callback mechanism used for communications. The Rust Foundation was notified, and it quickly removed the packages and locked the uploader's account. GitHub was also notified and took action against the associated account. The researchers noted that it is unclear exactly what type of malicious functionality would have been added to the packages had they not been removed, but the researchers believe the attacker may have wanted to steal secrets or sensitive files from victims.

    SecurityWeek reports: "Signs of Malware Attack Targeting Rust Developers Found on Crates.io"

  • news

    Visible to the public "Leaseweb Reports Cloud Disruptions Due to Cyberattack"

    Dutch infrastructure-as-a-service and cloud solutions provider Leaseweb shut down some critical systems last week due to a cyberattack. Leaseweb stated that it detected unusual activity in certain areas of its cloud environments on the night of August 22. The company noted that the issue had an impact on a specific portion of its cloud-based infrastructure, leading to downtime for a small number of cloud customers. The company noted that impacted systems should now be restored. According to its website, Leaseweb provides cloud, CDN, managed hosting, colocation, bare metal servers, and other services to more than 17,000 customers, including SMBs and enterprises.

    SecurityWeek reports: "Leaseweb Reports Cloud Disruptions Due to Cyberattack"

  • news

    Visible to the public "Clemson Mathematicians' Collaborative Digital Signature Is a Candidate to Become a National Standard"

    Clemson University and three other universities in Europe developed a digital signature that could become part of the national standard for encryption tools aimed at protecting the privacy of digital information against quantum computers in the future. The US National Institute of Standards and Technology (NIST) is holding a competition to select standard post-quantum digital signature algorithms that would protect email, credit card and bank transactions, and digital documents against tampering by unauthorized third parties. The researchers' Codes and Restricted Objects Signature Scheme (CROSS) proposal has been identified as a candidate for standardization. A digital signature is a mathematical algorithm used to prove the authenticity and integrity of an email, credit card transaction, or digital document. Digital signatures create a virtual fingerprint unique to a person or entity, identifying users and protecting information in digital messages or documents. The US Cybersecurity and Infrastructure Security Agency (CISA) notes that digital signatures are more secure than other types of electronic signatures. This article continues to discuss the Clemson mathematicians' collaborative digital signature being a candidate to become a national standard.

    Clemson University reports "Clemson Mathematicians' Collaborative Digital Signature Is a Candidate to Become a National Standard"

  • news

    Visible to the public "Tor Turns to Proof-Of-Work Puzzles to Defend Onion Network From DDoS Attacks"

    The Onion Router (Tor) faced a massive Distributed Denial-of-Service (DDoS) attack. DoS abuse continues to be a persistent problem, degrading the performance of the anti-censorship service and causing many to be concerned for its security. Tor's onion routing is a privacy technology dating back 20 years. It essentially works by relaying a user's Internet traffic through a shifting maze of nodes so that, with some clever encryption encapsulation, a network eavesdropper, for example, will struggle or be unable to determine a user's true public IP address. To prevent future crippling DDoS attacks, Tor developers have been working on a defense initially proposed in April 2020. It was introduced in Tor version 0.4.8.4 and relies on a mechanism developed by Moni Naor and Cynthia Dwork in 1992 as a defense against DoS and spam. This article continues to discuss Tor turning to proof-of-work puzzles in the fight against DDoS attacks.

    The Register reports "Tor Turns to Proof-Of-Work Puzzles to Defend Onion Network From DDoS Attacks"

  • news

    Visible to the public "LockBit Code Leak Sparks Wave of RaaS Attacks"

    LockBit 3.0, the LockBit ransomware gang's malware, was leaked last year. Researchers have found that several other threat groups used the leaked LockBit 3.0 builder to create their own ransomware variant and implement it in extortion campaigns. Soon after the September 2022 leak, researchers found an intrusion involving LockBit 3.0 ransomware. Although this variant was confirmed to be LockBit, the ransom demand procedure differed from that previously observed for this threat actor. In the examined ransom note, the extortionists referred to themselves as the National Hazard Agency, a previously unknown group. The note stood out because it included a specific demand ($3 million) for the decryption keys to the victim's encrypted files, as well as email and chat contact information. In contrast, the LockBit group interacts with their victims via their own communication and negotiation platform. Other threat groups discovered using LockBit 3.0 included Blacktail's Buhti ransomware operation, the Bl00dy ransomware gang, and GetLucky. This article continues to discuss the boost in Ransomware-as-a-Service (RaaS) attacks due to the LockBit code leak.

    SC Media reports "LockBit Code Leak Sparks Wave of RaaS Attacks"

  • news

    Visible to the public "A Brazilian Phone Spyware Was Hacked and Victims' Devices 'Deleted' From Server"

    In recent years, WebDetetive, a Portuguese-language spyware, has compromised over 76,000 Android phones in South America, primarily in Brazil. WebDetetive is also the latest phone spyware company to be compromised in recent months. In an undated note seen by TechCrunch researchers, the unidentified hackers described how they discovered and exploited multiple security flaws to compromise WebDetetive's servers and gain access to its user databases. By exploiting other vulnerabilities in the spyware maker's web dashboard, which abusers used to access the stolen phone data of their victims, the hackers claimed to have enumerated and downloaded every dashboard record, including customers' email addresses. According to the hackers, dashboard access enabled them to delete victim devices from the spyware network, effectively severing the connection at the server level to prevent the device from uploading new data. This article continues to discuss the Portuguese-language app WebDetetive used to compromise over 76,000 phones.

    TechCrunch reports "A Brazilian Phone Spyware Was Hacked and Victims' Devices 'Deleted' From Server"

  • news

    Visible to the public "Met Police Officers at Risk After Serious Data Breach"

    London's Metropolitan Police Service is investigating a severe data breach that may have exposed personnel names, ranks, and pictures. The force informed staff that it is still investigating the "unauthorized access to the IT system of a Met supplier" and that it is not yet known when or how it happened, or exactly how many individuals were affected. The company had access to officer and staff names, titles, photos, vetting levels, and salaries. The company did not maintain personal data such as addresses, phone numbers, or financial information. There are concerns that the identities of undercover officers may have been compromised. This article continues to discuss the Met Police security incident and other recent data breach alerts from UK police forces.

    BankInfoSecurity reports "Met Police Officers at Risk After Serious Data Breach"

  • news

    Visible to the public "Two Men Arrested Following Poland Railway Hacking"

    Polish police recently arrested two men suspected of illegally hacking into the national railway's communications network, which destabilized traffic in some areas of the country this weekend. The Polish police noted that the two men arrested were Polish citizens. Police also seized radio equipment from the apartment where the men, who are 24 and 29 years of age, were detained. On Friday night, the radio communication network of the Polish PKP railway was hacked near the northwestern city of Szczecin, leading to the issuing of several stop signals, which brought to a standstill or delayed some 20 trains. According to the PKP, traffic resumed a few hours later. The police noted that the attacks continued on Saturday and Sunday in other parts of the country without posing major problems to traffic.

    SecurityWeek reports: "Two Men Arrested Following Poland Railway Hacking"