News Items

  • news

    Visible to the public "Researchers Discover Sensitive Corporate Data on Decommissioned Routers"

    Fifty-six percent of decommissioned routers sold on the secondary market contained confidential corporate data, according to ESET's analysis of configuration data. Of the networks for which complete configuration information was available, 22 percent contained customer data and 33 percent exposed data that enabled third-party network access. In addition, 44 percent had credentials for connecting as a trusted party to other networks. Eighty-nine percent specified application-specific connection information, while 89 percent of routers contained authentication credentials. One hundred percent contained either IPsec or VPN credentials, or hashed root passwords. Finally, 100 percent had sufficient information to identify the previous owner/operator with confidence. This article continues to discuss ESET's findings from the analysis of configuration data.

    Help Net Security reports "Researchers Discover Sensitive Corporate Data on Decommissioned Routers"

  • news

    Visible to the public "Engineering Cybersecurity into US Critical Infrastructure"

    The Biden administration's National Cybersecurity Strategy recommends a security-by-design approach, which includes holding software vendors accountable for upholding a "duty of care" to consumers and designing systems to "fail safely and recover quickly." The strategy identifies the need to implement a "national cyber-informed engineering strategy" for energy infrastructure in order to achieve significantly more effective cybersecurity protections. To ensure high levels of safety and reliability, the engineers who build complex infrastructure systems adhere to standards and procedures. However, most of these procedures were developed before the start of modern cybersecurity and, therefore, do not make engineers consider cyber threats and design cybersecurity defenses. Through its cyber-informed engineering initiative, the Office of Cybersecurity, Energy Security, and Emergency Response (CESER) of the Department of Energy (DOE) aims to address this issue. CESER is working with National Laboratories to educate engineers on designing systems to eliminate cyberattack entry points and mitigate their effects. Early in the system design process, engineers can identify the system's critical functions and determine how to engineer them to mitigate the effects of digital disruption or misuse. This cyber-informed engineering, when coupled with a robust Information Technology (IT) security strategy, provides the opportunity to defend systems much more effectively than IT security alone can. The Idaho National Laboratory pioneered cyber-informed engineering concepts and is collaborating with CESER to educate industry, academia, and government on how to apply these concepts to real-world problems. This article continues to discuss cyber-informed engineering.

    Harvard Business Review reports "Engineering Cybersecurity into US Critical Infrastructure"

  • news

    Visible to the public "UCD Network Researcher Combatting 'Ecosystem of Connected Threats'"

    Dr. Madhusanka Liyanage of University College Dublin (UCD) is the coordinator of the UCD School of Computer Science's Network Softwarization and Security Labs (Netslab) research group. This group is primarily focused on the security and privacy of future mobile networks, such as 5G and 6G. Netslab is a relatively new research group comprised of nine individuals, including three postdoctoral researchers and six Ph.D. students. At Netslab, research is conducted on various network softwarization and security aspects, including network slicing, software-defined networking, and edge computing. The team is particularly interested in how blockchain and Artificial Intelligence (AI) could be used to improve the security of future mobile networks. Netslab is establishing itself as a leading research group in network security by exploring and developing these technologies. Dr. Liyanage is also the leader of two significant EU Horizon 2020 projects, SPATIAL and CONFIDENTIAL6G. SPATIAL aims to move toward a trustworthy cybersecurity sector in Europe, enabling trustworthy governance and a regulatory framework for AI-driven security. The CONFIDENTIAL6G project will design quantum-resistant cryptographic protocols as well as security proof tools, libraries, mechanisms, and architectural blueprints for 6G confidentiality. This article continues to discuss Dr. Liyanage's research on novel security and privacy solutions.

    Silicon Republic reports "UCD Network Researcher Combatting 'Ecosystem of Connected Threats'"

  • news

    Visible to the public "55% of Surveyed Healthcare Workers Believe Security Policies Keep Up With New Tech"

    Salesforce surveyed over 400 healthcare employees to explore perceived weaknesses in healthcare security programs. As generative Artificial Intelligence (AI) and other new technologies gain popularity, security experts face the challenge of keeping up with the security risks these new tools bring. Almost a quarter of Salesforce survey respondents believe generative AI tools such as ChatGPT or DALL-E are safe to use at work. Furthermore, 15 percent of respondents said they have already tested these technologies. However, despite increased interest in these developments, only 55 percent of respondents felt their organization's security policies were keeping up with emerging tools and technology. Cybersecurity risks will continue to evolve as more patient data is stored and transmitted online. Healthcare workers are essential to the security of patient data. Organizations could empower their workforce by cultivating a strong security-first culture that highlights the importance of security at all levels and provides secure digital tools. Most healthcare employees appear to grasp their duty to protect patient data, with 76 percent agreeing that patient data protection is their responsibility. Yet, about a third of respondents said they did not know what to do in the case of a breach, indicating a need for more security training and awareness. Over two-thirds of respondents stated their organization had a security-first culture, but only 31 percent were familiar with internal security practices. This article continues to discuss key findings from Salesforce's survey of healthcare workers regarding gaps in healthcare security programs.

    HealthITSecurity reports "55% of Surveyed Healthcare Workers Believe Security Policies Keep Up With New Tech"

  • news

    Visible to the public "Chrome, Edge Browsers Targeted in Zaraza Bot Malware Attacks"

    A new variant of the credential-stealing Zaraza malware has been collecting web browser login credentials from Google Chrome, Microsoft Edge, Opera, and Brave. Researchers warn that the threat actors behind the malware are using Telegram servers as their command-and-control (C2) platform to shuffle through stolen bank login information and cryptocurrency. According to Uptycs, Telegram is also used to distribute and promote the Zaraza malware. Researchers suspect that the campaign's operators are tied to Russia. Adversaries using the Zaraza bot have targeted almost 40 web browsers. Apple's Safari and Mozilla Foundation's Firefox browsers are absent from the list of browsers. The initial path or approach used by adversaries to infect targeted systems was not included in Uptycs' analysis. The Zaraza bot seems to be part of a larger criminal organization, with threat actors being able to purchase access to it through a centralized malware distributor. The adoption of Telegram as a C2 by threat actors is a continuing trend. According to Uptycs, attackers are attracted to Telegram because it allows them to deliver malware and move data while avoiding detection. This article continues to discuss researchers' findings regarding the new variant of the Zaraza malware.

    SC Media reports "Chrome, Edge Browsers Targeted in Zaraza Bot Malware Attacks"

  • news

    Visible to the public "Emerging Cyberpros Tried to Conquer The Hill in Argonne's Latest CyberForce Program Challenge"

    The latest individual CyberForce Program competition led by Argonne National Laboratory, a US Department of Energy (DOE) national laboratory, challenged college-aged students to solve anomalies in a seven-hour cyber sprint. Cameron Whitehead of the University of Central Florida was named the winner of the 2023 CyberForce Conquer the Hill: Adventurer Edition competition by Argonne National Laboratory. Whitehead was one of 213 students from 95 accredited US colleges and universities that competed digitally over a seven-hour energy sector-related adventure to resolve over 57 anomalies, which are work-based cybersecurity tasks and challenges. The goals of the DOE's Conquer the Hill competitions and the overall CyberForce Program, which Argonne leads, are to provide college students with hands-on education, raise awareness about the critical infrastructure and cybersecurity nexus, and promote basic understanding of cybersecurity in real-world scenarios. According to a 2022 study, the US lacks 410,695 cybersecurity professionals. With the volume of information on the Internet rising, enhancing security and establishing a cybersecurity workforce is a top issue. The National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education framework was used to map all of the anomalies in this year's Conquer the Hill: Adventurer competition. DOE and Argonne believe that by developing the challenges within this framework, students will be able to better understand where they are proficient in cybersecurity abilities and where they may need to improve. This article continues to discuss the 2023 CyberForce Conquer the Hill: Adventurer Edition competition.

    Argonne National Laboratory reports "Emerging Cyberpros Tried to Conquer The Hill in Argonne's Latest CyberForce Program Challenge"

  • news

    Visible to the public "NIST Wants to Mitigate Smart Home Telehealth Cybersecurity Risks"

    The COVID-19 pandemic increased the use of Internet of Things (IoT) devices for telehealth purposes. However, using smart speakers to share sensitive personal health information for telehealth purposes may pose a cybersecurity and privacy risk, which the government is attempting to address, according to a notice recently filed in the Federal Register. As part of the National Cybersecurity Center of Excellence (NCCoE) project addressing this issue, the National Institute of Standards and Technology (NIST) is seeking comments and solutions to help them in mitigating cybersecurity risks in telehealth smart home integration. Since consumers are using their own commercial devices and integrating them into a health delivery organization's telehealth solution, these organizations may struggle to identify and address cybersecurity risks because they do not have control over these products. While the user experience may be improved, practitioners could face challenges in deploying mitigating controls that limit cybersecurity and privacy risk because devices may use proprietary or purpose-built operating systems that do not allow engineers to add protective software, according to the NCCoE project. The NCCoE project plans to provide a reference architecture that uses the NIST Risk Management Framework, NIST Cybersecurity Framework, and NIST Privacy Framework to identify cybersecurity and privacy risks and solutions. The project will create a model that mimics patients using smart speakers for telehealth purposes to detect and mitigate the associated cybersecurity and privacy issues. This article continues to discuss NIST looking for providers to help address the cybersecurity and privacy vulnerabilities in the telehealth ecosystem.

    GCN reports "NIST Wants to Mitigate Smart Home Telehealth Cybersecurity Risks"

  • news

    Visible to the public "Takedown of GitHub Repositories Disrupts RedLine Malware Operations"

    Cybersecurity researchers at ESET have discovered that the RedLine information stealer's operations have recently been disrupted after the takedown of GitHub repositories used by the malware's control panels. A piece of commodity malware active since at least early 2020, the RedLine stealer is written in .NET and packs broad data exfiltration capabilities. The researchers noted that the malware targets system information, cookies and other browser data, login credentials for various applications and services, credit card information, and crypto wallets. Available under the stealer-as-a-service business model, RedLine was seen being offered by 23 of 34 Russian-speaking groups that were distributing infostealers last year. Each of the groups had an average of 200 members. The researchers stated that RedLine is sold on underground forums and Telegram channels. Affiliates purchase access to an all-in-one control panel that acts as a command-and-control (C&C) server, allowing them to generate new samples and to manage stolen information. The researchers noted that the removal of these repositories should break authentication for panels currently in use. While this doesn't affect the actual back-end servers, it will force the RedLine operators to distribute new panels to their customers. Stealer-as-a-service is one of the top three crime-as-a-service categories likely to be prevalent in 2023, along with ransomware-as-a-service and victims-as-a-service.

    SecurityWeek reports: "Takedown of GitHub Repositories Disrupts RedLine Malware Operations"

  • news

    Visible to the public "Business Emails Hijacked by New QBot Banking Trojan Campaign For Distributing Malware"

    Researchers have discovered a new QBot malware campaign using compromised business communications to trick victims into installing the malware. Since April 4, 2023, the most recent activity has primarily targeted users in Germany, Argentina, Italy, Algeria, Spain, the US, Russia, France, the UK, and Morocco. Since at least 2007, the banking Trojan known as QBot, also known as Qakbot or Pinkslipbot, has been in operation. In addition to stealing credentials and cookies from web browsers, it serves as a backdoor for introducing ransomware or other next-stage payloads such as Cobalt Strike. Anti-VM, anti-debugging, and anti-sandbox techniques have been added to the malware to evade detection. According to Check Point, it was also the most pervasive malware in March 2023. According to researchers, early distribution methods for QBot included infected websites and pirated software. The banker is now distributed to potential victims via pre-installed malware, social engineering, and phishing emails. This article continues to discuss the new QBot malware campaign.

    CyberIntelMag reports "Business Emails Hijacked by New QBot Banking Trojan Campaign For Distributing Malware"

  • news

    Visible to the public "Apple's High Security Mode Blocked NSO Spyware, Researchers Say"

    A year ago, Apple introduced a new feature called Lockdown Mode for iPhone users who feared being targeted by sophisticated spyware, such as journalists and human rights activists. Researchers have now discovered evidence that Lockdown Mode helped thwart an attack by hackers involving spyware developed by the infamous mercenary hacking provider NSO Group. Citizen Lab, a cybersecurity and human rights research organization, published a report analyzing three new zero-day exploits in iOS 15 and iOS 16, indicating that Apple was unaware of the vulnerabilities when at least two Mexican human rights defenders were targeted. The researchers discovered that one of these exploits was blocked by Lockdown Mode. This is the first known instance in which Lockdown Mode effectively prevented a targeted attack. In the recent cases, Citizen Lab researchers reported that the iPhones belonging to the targets blocked hacking attempts and displayed a notification stating that Lockdown Mode prevented access to the Home app. However, the researchers emphasized that NSO's exploit developers may have figured out a solution to the notification issue at some point, such as by fingerprinting Lockdown Mode. This article continues to discuss Apple's Lockdown Mode blocking NSO spyware.

    TechCrunch reports "Apple's High Security Mode Blocked NSO Spyware, Researchers Say"

  • news

    Visible to the public "Conversational Attacks Fastest Growing Mobile Threat"

    Security researchers at Proofpoint have warned of a 12-fold increase in reporting of so-called "conversational scams" like pig butchering last year, making them the fastest growing threat to mobile users in 2022. The researchers stated that such scams typically require a much longer lead time than phishing or malware delivery. The threat actor may initially approach their target on social media or a dating site and then look to build rapport over the weeks that follow, exchanging harmless-seeming messages. However, the real goal for the fraudster is to make off with their victim's information, money, or credentials. The researchers noted that often the victim will be lured into investing in a fake cryptocurrency scheme. According to the FBI, this kind of pig butchering scam was responsible for driving a surge in investment fraud last year that exceeded $3.3bn in losses. The researchers noted in addition to financial losses, these attacks also extract a significant human cost. Pig butchering and romance scams both involve an emotional investment on the part of the victim. Trust is earned and then abused, which can prompt feelings of shame and embarrassment alongside the real-world consequence of losing money. The researchers stated that the release of tools like ChatGPT, Bing Chat, and Google Bard heralds the arrival of a new kind of chatbot capable of understanding context, displaying reasoning, and even attempting persuasion. Looking further ahead, AI bots trained to understand complex tax codes and investment vehicles could be used to defraud even the most sophisticated victims. The researchers noted that if "coupled with image generation models capable of creating unique photos of real-seeming people, conversational threat actors could soon be using AI as a full-stack criminal accomplice, creating all the assets they need to ensnare and defraud victims."

    Infosecurity reports: "Conversational Attacks Fastest Growing Mobile Threat"

  • news

    Visible to the public "NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers"

    The National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), the FBI, and the Cybersecurity and Infrastructure Security Agency (CISA) have collaborated to publish a joint Cybersecurity Advisory (CSA) report on the tactics, techniques, and procedures (TTPs) related to APT28's exploitation of Cisco routers. APT28 is also known as Russian General Staff Main Intelligence Directorate (GRU) 85th Special Service Center (GTsSS) military intelligence unit 26165, Fancy Bear, STRONTIUM, Pawn Storm, the Sednit Gang, and Sofacy. The coalition disclosed the vulnerability that APT28 exploits to conduct reconnaissance and distribute malware on Cisco routers. APT28 cyber actors masqueraded Simple Network Management Protocol (SNMP) to exploit the vulnerability, tracked as CVE-2017-6742, and gain access to vulnerable Cisco routers worldwide. This included government institutions in the US, about 250 Ukrainian victims, and a small number of European victims. This article continues to discuss the joint CSA on APT28 exploiting a known vulnerability to carry out reconnaissance and deploy malware on Cisco routers.

    NSA reports "NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers"

  • news

    Visible to the public "Final Version of TIC Use Cases Covering Cloud Services"

    Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Email-as-a-Service (EaaS) have unique security considerations. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has published the Trusted Internet Connections (TIC) 3.0 Cloud Use Case, which provides network and multi-boundary security guidance for agencies operating in cloud environments. The feedback garnered during the 2022 public comment period has been incorporated into the new version. The Cloud Use Case describes specific security patterns, applicable security capabilities, and telemetry requirements. This guidance also contains cloud-specific factors, including the shared services model and cloud security posture management principles defined in the Cloud Security Technical Reference Architecture. In addition, this use case is written from the perspective of cloud-hosted services as opposed to the consumer accessing these services. This article continues to discuss CISA's release of TIC 3.0 guidance documents.

    CISA reports "Final Version of TIC Use Cases Covering Cloud Services"

  • news

    Visible to the public "Pen Testers Need to Hack AI, but Also Question Its Existence"

    Samsung has prohibited some uses of ChatGPT, while Ford and Volkswagen have shut down their self-driving car company, and a letter calling for a halt to the training of more powerful Artificial Intelligence (AI) systems has received over 25,000 signatures. Davi Ottenheimer, vice president of trust and digital ethics at Inrupt, a startup that develops digital identity and security solutions, says this is not an overreaction. According to Ottenheimer, the security and safety of Machine Learning (ML) and AI models need improved testing strategies. These models include ChatGPT, autonomous vehicles, and autonomous drones. Ottenheimer, who has prepared a presentation on the topic for the RSA Conference in San Francisco, emphasizes that society needs to have broader discussions about how to test and improve safety, as a steady stream of security researchers and technologists have already found ways to circumvent AI system protections. With the release of ChatGPT in November, interest in AI and ML, which was already on the rise due to data science applications, exploded. The ability of the Large Language Model (LLM) to appear to understand human language and generate coherent responses has led to an increase in proposed applications based on the technology and other forms of AI. ChatGPT has been used to triage security incidents, and a more advanced LLM serves as the foundation of Microsoft's Security Copilot. This article continues to discuss the need for security researchers to further explore whether there are sufficient protections to prevent the misuse of AI models.

    Dark Reading reports "Pen Testers Need to Hack AI, but Also Question Its Existence"

  • news

    Visible to the public "Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access"

    MuddyWater, an Iranian threat actor, continues its time-tested practice of using legitimate remote administration tools to seize control of targeted systems. While the nation-state group previously used ScreenConnect, RemoteUtilities, and Syncro, a new Group-IB analysis found the adversary's use of the SimpleHelp remote support software. Since at least 2017, MuddyWater has been believed to be a subordinate element of Iran's Ministry of Intelligence and Security (MOIS). Turkey, Pakistan, the United Arab Emirates, Iraq, Israel, Saudi Arabia, Jordan, the US, Azerbaijan, and Afghanistan are among the main targets. Nikita Rostovtsev, senior threat analyst at Group-IB, stated that MuddyWater uses the legitimate remote device control and management tool SimpleHelp to guarantee persistence on victim devices. SimpleHelp has not been compromised and is used as designed. The threat actors discovered a method for downloading the tool from the official website and deploying it in their attacks. The exact method used to distribute the SimpleHelp samples is currently unknown. However, the group is known to send spear-phishing emails containing malicious links from already compromised corporate email accounts. This article continues to discuss the use of SimpleHelp by MuddyWater.

    THN reports "Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access"

  • news

    Visible to the public "The Attacks That Can Target Your Windows Active Directory"

    Active Directory (AD) remains the predominant source of Identity and Access Management (IAM) in the enterprise, making it the target of numerous attacks. There are multiple attack techniques and attack vectors that hackers use to target AD. Different attacks against AD Domain Services (AD DS) have the potential to compromise the environment. DCSync, DCShadow, password spray, pass-the-hash, pass-the-ticket, and more are examples of modern attacks used against AD DS. For example, the DCShadow attack exploits legitimate AD communications traffic between domain controllers. The DCShadow attack also uses the DCShadow command as part of the Mimikatz lsadump module. It uses Microsoft Directory Replication Service Remote protocol instructions. Attackers can register a malicious domain controller and replicate its modifications to other domain controllers in the background. It may involve adding accounts controlled by hackers to the domain administrators group. This article continues to discuss examples of attacks used against AD DS.

    Bleeping Computer reports "The Attacks That Can Target Your Windows Active Directory"

  • news

    Visible to the public "Pre-Pandemic Techniques Are Fueling Record Fraud Rates"

    According to Pindrop, the rise and adoption of Artificial Intelligence (AI), an impending recession, and the return of pre-pandemic fraud techniques are driving record rates of fraud attacks against consumers and businesses. States with restrictions on biometrics use are twice as likely to experience fraud. During periods of economic instability, fraud increases. In the fourth quarter of 2022, financial institutions experienced a 53 percent year-over-year increase in fraudulent activity. Fraudsters are taking advantage of data from the dark web and testing it in the Interactive Voice Response (IVR) to identify high-value accounts and attack those accounts together with other fraudsters. Retail has become one of the verticals with the highest incidence of fraud, with one in 347 calls to call centers supporting online retailers being fraudulent. This article continues to discuss key findings from Pindrop's Voice Intelligence and Security Report.

    Help Net Security reports "Pre-Pandemic Techniques Are Fueling Record Fraud Rates"

  • news

    Visible to the public "Cyber Intrusion Detection Time at an All-Time Low"

    Security researchers at Google's Mandiant have found that organizations and their cyber defenders are getting better at detecting cyberattacks, but detection time still stands at 16 days. During the study, the researchers found that 2022 saw a decrease in global median dwell time (the time the cyberattack victim takes to detect the intrusion) from 21 days in 2021 to 16 days in 2022. This is the shortest global median dwell time since Mandiant started recording this metric in 2011. The researchers stated that the decrease can be attributed to cyber defenders getting better, coupled with attackers being more brazen than they were in the past. The researchers also found that ransomware attacks decreased in 2022, accounting for 18% of all intrusions recorded on Mandiant's telemetry that year, compared to 23% in 2021. The researchers noted that this drop can partially be attributed to the work of law enforcement. State-sponsored malicious activity, however, spiked in 2022. The researchers identified extensive cyber espionage and information operations leading up to and since Russia's invasion of Ukraine on February 24, 2022, and observed more destructive cyberattacks in Ukraine during the first four months of 2022 than in the previous eight years. In 2022, Mandiant began tracking 588 new malware families, the main ones being backdoors (34%), downloaders (14%), droppers (11%), ransomware (7%), and launchers (5%). As with previous years, the most common malware family identified by Mandiant in investigations was BEACON, a multi-function backdoor identified in 15% of all intrusions.

    Infosecurity reports: "Cyber Intrusion Detection Time at an All-Time Low"

  • news

    Visible to the public "Creative Software Maker Affinity Informs Customers of Forum Breach"

    UK-based photo editing, graphic design, and publishing software developer Affinity recently informed its forum members of a data breach that occurred on April 6. The company said a hacker gained access to forum user data after compromising an administrator's account. The adversary may have accessed information such as username, reputation, join date, post count, email addresses, and the last used IP address. The company noted that while most of the compromised information is already public, the email address and IP are not, and this type of information can be useful to malicious actors for targeted phishing attacks. It is unclear how many users had their data compromised, but the Affinity forum has nearly 175,000 members. The company said it's confident that user passwords were not compromised in the breach. The Affinity forum data breach has been reported to the UK Information Commissioner's Office (ICO), and steps have been taken to prevent such incidents in the future. It's unclear how the administrator account was compromised, but in many of these types of incidents, account hacking is possible because two-factor authentication has not been used.

    SecurityWeek reports: "Creative Software Maker Affinity Informs Customers of Forum Breach"

  • news

    Visible to the public "Student Privacy Is at More Risk Than Ever Before. Can K-12 Schools Keep It Safe?"

    Education technology is now an integral part of the education system. However, there are concerns regarding the readiness of K-12 districts to address the complex privacy and security issues raised by such technology. According to "Uncovering Privacy and Security Challenges in K-12 Schools," a new study from the University of Chicago and New York University, districts are not handling privacy and security issues very well, primarily because of their inadequate preparation. After interviewing several school administrators about privacy issues, researchers scraped 15,573 websites from K-12 public schools and districts in the US to determine which education technology products these schools commonly use or recommend to students, as well as what risks these tools pose and whether schools are prepared to address them. According to the researchers, this is the first quantitative examination of the privacy and security risks concerns raised by education technology products currently used in American public schools. The resulting list includes numerous well-known resources, such as Zoom, Scholastic, College Board, Khan Academy, and Clever. Almost all of the top sites linked to schools "extensively" used tracking software. Additionally, the researchers note that many websites used session recorders known to capture sensitive information such as keystrokes. Prior research on student information policies has revealed that education technology companies often do not disclose their data practices. Human rights groups and regulators have also raised concerns about the vulnerability posed by intrusive surveillance technology and schools' improper data management. The new report adds to a growing body of research advocating for K-12 privacy laws, at a time when experts highlight that education technology companies have placed an undue burden on schools to ensure data security. This article continues to discuss privacy and security challenges faced by K-12 schools.

    EdSurge reports "Student Privacy Is at More Risk Than Ever Before. Can K-12 Schools Keep It Safe?"

  • news

    Visible to the public "New Domino Backdoor Malware Linked to Ex-Conti, FIN7 Criminals"

    Domino Backdoor is a new malware linked by security researchers to former members of the prolific Conti and FIN7 groups. It has been used to launch information-stealing malware, which involves the same techniques and source code as the infamous groups, indicating the formation of a new and dangerous alliance. IBM Security X-Force found Domino in the fall of 2022 and raised the alarm when an attack in February 2023 linked the new malware to former members of the Conti. Domino Backdoor is a 64-bit Dynamic-Link Library (DLL) with an undiscovered backdoor capable of delivering additional malicious payloads to infected systems. Once executed on a system, the malware determines the victim's username and hostname, uses this information to generate a hash, and then adds its own process ID. It then decrypts its configuration block, which contains two IP addresses for its command-and-control (C2) server and an RSA public key. The program then generates a random 32-byte key that is encrypted using the RSA key. Then it contacts its C2 using one IP address if the infected system is connected to a domain and the other IP address if it is not, and begins to harvest and encrypt core system data. It was observed decrypting and deploying its own payload using AES-256-CBC in a lab environment. Domino Backdoor and Domino Loader were discovered sharing code with Lizar, a malware with ties to the FIN7 cybercrime group, and using C2 addresses similar to those employed by FIN7 for its SSH-key-based backdoors. In addition, Domino Backdoor samples from December 2022 were discovered using the NewWorldOrder Loader, which FIN7 previously employed to install the Carbanak Backdoor malware. This article continues to discuss the new Domino Backdoor malware.

    ITPro reports "New Domino Backdoor Malware Linked to Ex-Conti, FIN7 Criminals"

  • news

    Visible to the public  "HHS Launches New Cybersecurity Awareness Resources"

    The Department of Health and Human Services (HHS) has released three new cybersecurity resources, each of which focuses on educating medical institutions on how to better protect their digital infrastructures. Two websites and an online report provide free access to cybersecurity best practices for healthcare organizations. Some of the resources include cybersecurity training in the context of public health, overviews of key cybersecurity threats and how to combat them, and an analysis of the cybersecurity preparedness of US hospitals. Healthcare-specific guidance is issued as the US digital infrastructure continues to be targeted by foreign and domestic adversaries. The training will be an asset to any organization seeking to train staff in basic cybersecurity awareness and is provided at no cost, ensuring that hospitals and healthcare organizations that are most vulnerable to attack can take measures to strengthen their resilience. According to the websites, the top five digital threats to healthcare organizations are ransomware, social engineering, device theft, data loss, and network attacks. This article continues to discuss HHS' release of three new online resources for healthcare entities to strengthen their digital networks.

    NextGov reports "HHS Launches New Cybersecurity Awareness Resources"

  • news

    Visible to the public "Vice Society Gang Is Using a Custom PowerShell Tool for Data Exfiltration"

    Palo Alto Networks Unit 42 found the Vice Society ransomware group exfiltrating data from a victim network using a custom-built Microsoft PowerShell script. Using this PowerShell tool, the threat actors are circumventing software and/or human-based security detection mechanisms. PowerShell scripting is commonly used in a typical Windows environment. A PowerShell-based tool can enable threat actors to hide in plain sight and execute their code while avoiding detection. Early in 2023, the researchers observed the gang exfiltrating data from a victim network using a script named w1.ps1. They were able to retrieve the script from the Windows Event Log (WEL). The PowerShell data exfiltration script created by Vice Society is a simple data exfiltration tool, with multi-processing and queuing used to prevent the script from consuming an excessive amount of system resources. The script focuses on files over 10 KB with file extensions and on directories on its "include list." According to researchers, the nature of PowerShell scripting in the Windows environment makes it difficult to completely prevent this type of threat. This article continues to discuss the Vice Society ransomware operators using a PowerShell tool to exfiltrate data from compromised networks.

    Security Affairs reports "Vice Society Gang Is Using a Custom PowerShell Tool for Data Exfiltration"

  • news

    Visible to the public "UK Education Sector Suffered Most from Ransomware in 2022"

    Security researchers at Malwarebytes have discovered that the education sector in the UK was hit far more by ransomware than in other countries last year, thanks to targeting by the Vice Society group. The security vendor's latest findings from April 2022 to March 2023 are based on known attacks where victims opted not to pay a ransom, so the real figures could be even higher. The researchers stated that the education vertical accounted for 16% of attacks in the UK compared to 4% in France and Germany and 7% in the US. The researchers claimed the primary reason for this disparity was down to Vice Society. The researchers noted that the UK is one of Vice Society's favorite targets, accounting for 21% of the group's known attacks in the past 12 months, a close second to the US which accounted for 23%, and vastly more than the following country, Spain, which accounted for 8%. The researchers stated that, sadly, Vice Society's disproportionate interest in the UK lands squarely on the education sector. Some 76% of Vice Society's known attacks in the UK over the past 12 months hit the education sector, and Vice Society was responsible for 70% of known attacks on UK education institutions.

    Infosecurity reports: "UK Education Sector Suffered Most from Ransomware in 2022"

  • news

    Visible to the public "Machine Learning Can Help to Flag Risky Messages on Instagram While Preserving Users' Privacy"

    It is important to protect social media users from harassment and bullying while also taking steps to protect their privacy. A team of researchers from four leading universities has proposed using Machine Learning (ML) technology to identify potentially risky conversations on Instagram without eavesdropping on them. The discovery could provide platforms and parents with the ability to protect vulnerable, younger users while maintaining their privacy. The team led by researchers from Drexel University, Boston University, Georgia Institute of Technology, and Vanderbilt University recently published their work on investigating what type of data input, such as metadata, text, and image features, could be most useful for ML models to identify risky conversations. Their findings suggest that risky conversations can be identified based on metadata characteristics, such as conversation length and participant engagement. Afsaneh Razi, Ph.D., an assistant professor in Drexel's College of Computing and Informatics and co-author of the study, stated that the prevalence of harassment, abuse, and bullying by malicious users is very concerning, considering Instagram's popularity among young people. Instagram makes its users feel safe enough to connect with others very openly. After the Cambridge Analytica scandal and the European Union's precedent-setting privacy protection regulations, platforms are under increasing pressure to protect their users' privacy. Therefore, Meta, the company behind Facebook and Instagram, is implementing end-to-end encryption for all platform messages, indicating that the message content is technologically protected and can only be accessed by those involved in the conversation. However, this increased degree of security makes it more difficult for platforms to use automated technology to detect and prevent online threats, which is why the team's system could play a crucial role in protecting users. This article continues to discuss the system developed to use ML to help flag risky messages on Instagram while preserving users' privacy.

    Drexel University reports "Machine Learning Can Help to Flag Risky Messages on Instagram While Preserving Users' Privacy"

  • news

    Visible to the public "Montana Becomes 1st State to Approve a Full Ban of TikTok"

    Montana has recently become the first state to approve a bill that would ban TikTok. On Friday, the GOP-controlled Montana House of Representatives sent the bill to Republican Gov. Greg Gianforte, who can now sign the measure into law. If signed into law, it would be illegal to download TikTok in the state, with penalties of up to $10,000 a day for any entity, such as Apple and Google's app stores or TikTok itself, that makes the popular video-streaming app available. If enacted, the ban in the state would start in January 2024. Since ByteDance owns TikTok, the fear is that the Chinese Communist Party could request access to the 150 million TikTok accounts in America and potentially spy on U.S. citizens or use the personal data to mount disinformation campaigns on the app.'

    NPR reports: "Montana Becomes 1st State to Approve a Full Ban of TikTok"

  • news

    Visible to the public "Making a Smaller Target for Hackers: Technology Keeps Industrial Control Systems Safer by Limiting Online Access"

    OpDefender, a technology created at Idaho National Laboratory (INL) for the US Department of Homeland Security (DHS), is founded on the principle of minimizing the attack surface as much as possible. Operational control technology exists at all levels of the nation's critical infrastructure, switching breakers at substations, opening floodgates at dams, and opening and closing valves in oil refineries and water treatment facilities. If left unprotected, Industrial Control Systems (ICS) are so vulnerable that anyone with basic programming skills can shut down a substation, leaving thousands of people in the dark. OpDefender operates on the premise that no device on a network of control systems can be trusted. It includes network switches that analyze and filter network packets in real-time, enabling operators to implement "whitelisting" rules. Its human-machine interface prevents any device from communicating with a network until an administrator has configured it. By default, an alarm sounds when a network receives data from a device that has not been whitelisted. OpDefender's proprietary software enables it to function as a "smart" switch, differentiating between routine and suspicious communications. When suspicious communication is detected, the system quarantines the packet and notifies a human operator. The operator then controls which commands reach the ICS via a simple interface. OpDefender, unlike detection systems that require span ports and big data analysis, analyzes packets in real-time and only flags violations. This article continues to discuss the capabilities, development, testing, and support of the OpDefender technology.

    Idaho National Laboratory reports "Making a Smaller Target for Hackers: Technology Keeps Industrial Control Systems Safer by Limiting Online Access"

  • news

    Visible to the public "Police Crack Comms to Bust Money Laundering Group"

    Police have recently claimed to have busted a criminal network believed to have laundered over $198m in drug trafficking profits after analyzing decrypted messages. Europol said it supported a joint investigation by the Belgian Federal Judicial Police Leuven and the Spanish Guardia Civil. Europol noted that the organized crime group of Moroccan, Spanish, and Belgian nationals apparently operated in Belgium, the Netherlands, Spain, South America, and Dubai. An action day in March 2023 led to five arrests in Belgium and another in Spain, and the seizure of $1.3m in cryptocurrency, three properties, $55,000 in cash, one luxury car, several luxury watches, jewelry, 23 phones, three safe boxes and a money counting machine. Europol noted that the investigation began in October 2021 when police analyzed messages sent via the popular criminal communications network Sky ECC, after cracking the service's encryption. That uncovered a major cocaine trafficking operation that ferried the drug in large quantities from South America to ports and airports in Europe, using insiders at various locations to wave several tonnes of shipments through. According to Europol, the group had managed to stay hidden by using a string of cover companies until police got hold of the decrypted Sky ECC messages. The money laundering was achieved mainly through investments in cryptocurrency and luxury property in the EU and Morocco and via an underground banking system.

    Infosecurity reports: "Police Crack Comms to Bust Money Laundering Group"

  • news

    Visible to the public "CISA: Patch Bug Exploited by Chinese E-commerce App"

    The US Cybersecurity and Infrastructure Security Agency (CISA) recently added CVE-2023-20963 to its Known Exploited Vulnerabilities Catalog. CISA has given the government until May 4 to patch the zero-day vulnerability, which was allegedly exploited by an e-commerce app to eavesdrop on users. The high severity vulnerability was patched by Google last month after the firm said it may be under "limited, targeted exploitation." CISA stated that Android Framework contains an unspecified vulnerability that allows for privilege escalation after updating an app to a higher Target SDK with no additional execution privileges needed. Mobile security company Lookout confirmed late last month that the vulnerability, which has a CVSS score of 7.8, was being exploited by malicious versions of the Pinduoduo Android app. At least two versions of the popular Chinese e-commerce app available from third-party app stores were to blame. With over 750 million monthly active users, Pinduoduo is one of the world's most popular destinations for online shopping. The firm has denied its software is malicious, even though the two apps analyzed by researchers were apparently signed with an official key. The Pinduoduo app has been temporarily pulled from the official Play store, but most Chinese consumers rely on third-party app stores to source their Android downloads. Although the CISA catalog of known vulnerabilities is designed to force federal government agencies to improve patching processes, it is also strongly recommended that private enterprises use the same tool to help prioritize their efforts in this area.

    Infosecurity reports: "CISA: Patch Bug Exploited by Chinese E-commerce App"

  • news

    Visible to the public "LockBit Ransomware Is Targeting Macs for the First Time"

    LockBit, one of the most notorious ransomware strains, reportedly infected Apple Mac devices for the first time. MalwareHunterTeam cybersecurity researchers reported discovering "locker_Apple_M1_64," which is said to be the first LockBit ransomware sample seen targeting Mac devices. In addition, the researchers suspect that this may be the first time a "big name" criminal group has targeted a Mac. While targeting M1-powered devices may garner more attention, 9To5Mac reports that a LockBit ransomware version is also appearing for PowerPC Macs. LockBit is one of the most prevalent ransomware variants in use today. Its creators offer it as a Ransomware-as-a-Service (RaaS), allowing various hacking groups to pay to use the tool. Among its most recent victims is SpaceX, a space exploration company. The hackers allegedly breached one of the company's suppliers and gained access to sensitive information, including thousands of drawings certified by SpaceX engineers. This article continues to discuss researchers spotting a LockBit variant for Apple M1 chips and the history of the LockBit group.

    TechRadar reports "LockBit Ransomware Is Targeting Macs for the First Time"

  • news

    Visible to the public "Genius Hackers Help Russia's Neighbors Thwart Cyber Incursions"

    Russia's cyber capabilities are not to be underestimated, but NATO neighbors are more than capable of defending themselves against the Kremlin, according to the Lithuanian cyber chief. Constant cyberattacks from Russia are launched against the nations that border Moscow's empire. Everything is on the agenda, from ransomware attacks to attack attempts against critical infrastructure. As demonstrated by the war in Ukraine, military operations are often accompanied by cyber operations, prompting NATO and EU members such as Lithuania to develop tools and methods to defend against numerous and better-resourced adversaries. Liudas Alisauskas, the head of Lithuania's National Cyber Security Centre (NCSC), believes that one way to meet the challenge is by fostering local talent and forming partnerships with the most skilled hackers. Cybernews sat down with Alisauskas to discuss how the frontline NATO member defends against Moscow's hackers, whether Russia can still be considered a significant power after a year of disastrous warfare, and the impact of attacks launched by pro-Russian hacktivists such as Killnet. This article continues to discuss NATO members' defense against Moscow's hackers.

    Cybernews reports "Genius Hackers Help Russia's Neighbors Thwart Cyber Incursions"

  • news

    Visible to the public "Payments Giant NCR Hit by Ransomware"

    US payments giant NCR recently confirmed that a recent data center outage resulted from a ransomware attack. A well-known ransomware group has taken credit for the attack. NCR first reported investigating an "issue" related to its Aloha restaurant point-of-sale (PoS) product on April 12. On April 15, the company said a limited number of ancillary Aloha applications for a subset of its hospitality customers had been impacted by an outage at a single data center. The company stated that on April 13, they confirmed that the outage was the result of a ransomware incident. The company noted that immediately upon discovering this development, they began contacting customers, engaged third-party cybersecurity experts, and launched an investigation. Law enforcement has also been notified. The company has been working to restore affected services but said that impacted restaurants should still be able to serve customers, with only specific functionality being impacted. Cybersecurity researcher Dominic Alvieri noticed on April 15 that the ransomware group known as BlackCat, Alphv, and Noberus took credit for the attack on its Tor-based leak website, but the post was quickly removed by the hackers. The researchers stated that in the now-removed post, the cybercriminals said they were contacted by NCR representatives who wanted to find out what type of data had been stolen from their systems. The hackers claimed they did not steal any actual NCR data, but they did obtain "a lot of credentials" that can be used to access NCR customer networks. The researchers noted that the removal of the post naming NCR from BlackCat's leak website suggests that negotiations have started and the cyber criminals are hoping to get paid. The BlackCat ransomware has been around since at least November 2021, and its leak website currently lists more than 300 victims. The group has been known to target industrial companies.

    SecurityWeek reports: "Payments Giant NCR Hit by Ransomware"

  • news

    Visible to the public "Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job Sites"

    A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver Google Command and Control (GC2), an open-source red teaming tool, as part of a broader exploitation of Google's infrastructure for malicious purposes. Google's Threat Analysis Group (TAG) attributed the campaign to a threat actor it monitors as HOODOO, also known as APT41, Barium, Bronze Atlas, Wicked Panda, and Winnti. The attack begins with a phishing email containing links to a password-protected file hosted on Google Drive, which incorporates the GC2 tool to read commands from Google Sheets and exfiltrate data via the cloud storage service. After installation on a victim's computer, the malware queries Google Sheets for commands. In addition to exfiltration via Drive, GC2 allows the download of other files from Drive onto the victim system. Google reported that the same malware was previously used to target an Italian job search website in July 2022. The development is noteworthy because it suggests that Chinese threat actors are increasingly relying on publicly accessible tools, such as Cobalt Strike and GC2, to obfuscate attribution efforts. It also indicates that malware and tools written in the Go programming language are gaining popularity due to its cross-platform compatibility and modularity. This article continues to discuss APT41's use of GC2 and other findings surrounding the threat actor.

    THN reports "Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job Sites"

  • news

    Visible to the public "New Chameleon Android Malware Mimics Bank, Govt, and Crypto Apps"

    Since the start of the year, a new Android Trojan called Chameleon has been targeting users in Australia and Poland by imitating the CoinSpot cryptocurrency exchange, an Australian government agency, and the IKO bank. The cybersecurity company Cyble discovered the mobile malware and reported its distribution, which is through compromised websites, Discord attachments, and Bitbucket hosting services. Chameleon includes various malicious capabilities, such as stealing user credentials via overlay injections and keylogging, cookies, and SMS texts from an infected device. Chameleon is an emerging threat, with future variants expected to include additional features and capabilities. Therefore, Android users are advised to exercise caution when installing apps on their devices, to only download software from official stores, and to keep Google Play Protect enabled at all times. This article continues to discuss researchers' findings and observations regarding the new Chameleon Android Trojan.

    Bleeping Computer reports "New Chameleon Android Malware Mimics Bank, Govt, and Crypto Apps"

  • news

    Visible to the public "Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement"

    Extended Internet of Things devices (xIoT) are attractive to cyberattackers aiming to move laterally within enterprise networks and establish persistence. Such devices have everything the bad guys need to gain a foothold as xIoT devices are significantly under-secured, present in large numbers, present in sensitive network areas, and are typically not well monitored. Brian Contos, a security researcher and strategist, explains that xIoT devices typically fall into three device categories that have all proliferated in business environments. The first category consists of enterprise IoT devices, such as cameras, printers, IP phones, and door locks. The second category consists of Operational Technology (OT) devices, such as industrial robots, valve controllers, and other digital equipment used to regulate physics in industrial settings. General network devices, such as switches, network-attached storage, and gateway routers, are the third and often the least-remembered category. Contos has explored how these devices can be used to launch massive attacks against enterprise resources, as well as what security strategists should do to mitigate the threat. This article continues to discuss the use of xIoT devices by attackers to establish persistence across networks and what enterprises should start doing about the risk.

    Dark Reading reports "Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement"

  • news

    Visible to the public "AI Tools Like ChatGPT Expected to Fuel BEC Attacks"

    Armorblox reports that 57 percent of all Business Email Compromise (BEC) attacks observed in the past year used language as the primary attack vector to reach unsuspecting employees. In addition, vendor compromise and fraud are increasing as a new attack vector, and graymail wastes 27 hours per week of security teams' time. The report is based on data collected from over 58,000 customer tenants, analyzing over 4 billion emails and preventing 800,000 threats each month. Small and midsize businesses (SMBs) are especially vulnerable to vendor fraud and email supply chain attacks. Fifty-three percent of vendor compromise attacks were directed at technology organizations. Malicious actors continue to infiltrate legitimate business workflows in order to gain access to sensitive business data. The most compromised business workflows involved email notifications, a significant increase from 2021. Fifty-two percent of all attacks target sensitive user information, such as login credentials. This article continues to discuss key findings shared by Armorblox regarding BEC attacks.

    Help Net Security reports "AI Tools Like ChatGPT Expected to Fuel BEC Attacks"

  • news

    Visible to the public "ODU Researchers Receive Grants to Address Maritime Cybersecurity Needs"

    The Coastal Virginia Center for Cybersecurity Innovation (COVA CCI), the Commonwealth Cyber Initiative (CCI) node for southeastern Virginia, has awarded $581,100 to seven maritime industry-focused cybersecurity research projects. Old Dominion University, Christopher Newport University, and the College of William and Mary submitted proposals in response to the COVA CCI request for proposals titled "Addressing Cybersecurity Compliance Challenges to Technology Adoption for the Maritime Industry." Researchers were asked to collaborate with maritime industry partners to resolve barriers to technology adoption resulting from or related to cybersecurity compliance issues. The projects seek to eliminate or mitigate cybersecurity obstacles to adopting new technologies such as cloud computing, 5G connectivity, and Machine Learning (ML). The projects include "Applying Risk Assessment Methodology to Produce Cyber-Hardened 5G Communication Capabilities for Autonomous Maritime Platforms," "Machine Learning-Enabled Dependency Network Analysis for Quantifying Risks and Ripple Effects Stemming from Cybersecurity Non-Compliance Issues," "Spotlighting and Mitigating Cyber Attacks in Artificial-Intelligence-of-Things (AIoT)-Enabled Maritime Transportation Systems," and more. This article continues to discuss the awarded projects aimed at addressing maritime cybersecurity needs.

    Old Dominion University reports "ODU Researchers Receive Grants to Address Maritime Cybersecurity Needs"

  • news

    Visible to the public "The Quantum Security Era Is Coming – Here's How Leaders Can Prepare for It"

    Quantum computers promise transformative power for certain types of complex computational problems, such as advanced statical modeling in the financial sector, accelerated research and development for pharmaceutical companies, and a more efficient supply chain in the automotive industry. However, quantum computers must manage a specific risk for maximum transformative gains. The risk is that the cryptography used to secure many digital activities, such as Internet browsing and online banking, will be broken by sufficiently powerful quantum computers. Concerns ignited in the security community over reports that researchers may already be able to break a common type of cryptography on an existing quantum computer underscores the gravity of this threat and how unprepared we are if these reports are real. In addition, attackers may already be performing Harvest Now, Decrypt Later (HNDL) attacks. These attacks involve capturing sensitive data, such as personal health information or military secrets, today and storing it until a sufficiently powerful quantum computer emerges to decrypt it. If this happens while the data remains sensitive, the repercussions could be severe. Therefore, organizations must act immediately to learn and prepare to mitigate the threat posed by quantum computers. This article continues to discuss quantum computers potentially becoming a threat without better quantum security, as well as how organizations could prepare for the quantum security era.

    World Economic Forum reports "The Quantum Security Era Is Coming - Here's How Leaders Can Prepare for It"

  • news

    Visible to the public "What Are Passkeys? A Cybersecurity Researcher Explains How You Can Use Your Phone to Make Passwords a Thing of the Past"

    Passwords may soon become obsolete. However, the need for authentication and secure website access remains as strong as ever. Passkeys are digital credentials that are stored on a user's mobile device or computer. They are similar to actual keys. Access to a passkey is gained by logging into a device with a Personal Identification Number (PIN), a swipe pattern, or biometrics such as fingerprint or facial recognition. A user configures their online accounts to trust their computer or phone. In order to access accounts, a hacker would need physical access to the user's device and the ability to login in. Sayonnha Mandal, lecturer in interdisciplinary informatics and cybersecurity researcher at the University of Nebraska, believes that passkeys provide quicker, simpler, and more secure sign-ins and reduce human error in password security and authorization procedures. Passkeys eliminate the need to remember passwords and eliminate the need for two-factor authentication (2FA). Passkeys are created through public-key cryptography. They use a public-private key pair to guarantee a mathematically protected private relationship between the user's device and the online account being accessed. Since it would be almost impossible for a hacker to guess the passkey, the device from which the passkey is accessed must be physically at hand. This article continues to discuss Mandal's insights on how passkeys work and why they matter.

    The Conversation reports "What Are Passkeys? A Cybersecurity Researcher Explains How You Can Use Your Phone to Make Passwords a Thing of the Past"

  • news

    Visible to the public "LVHN: Sensitive Photos of Almost 2,800 Patients Potentially Stolen in Data Breach"

    Lehigh Valley Health Network (LVHN) has recently revealed that cybercriminals potentially stole sensitive photographs of as many as 2,760 patients during a data breach. LVHN announced in February that a cyberattack carried out by the Russian ransomware gang BlackCat had compromised the confidential records and "clinically appropriate" photographs of an unknown number of its patients. The attack targeted a network supporting Delta Medix, the Lackawanna County-based medical practice LVHN acquired in 2021. According to the company, when they refused to pay the ransom sought by the hackers, BlackCat began making the stolen patient images and information available for download on the dark web. The company is now being served with a class-action lawsuit. LVHN stated that its investigation also showed some patients whose photos were possibly accessed by hackers are residents of other states, including New York, New Jersey, Virginia, Georgia, and California.

    Yahoo News reports: "LVHN: Sensitive Photos of Almost 2,800 Patients Potentially Stolen in Data Breach"

  • news

    Visible to the public "LSU and US Secret Service Partner to Address Cyber Challenges for Louisiana, Nation"

    Louisiana State University (LSU) and the US Secret Service (USSS) have a formal agreement for the development of cyber technology and cyber talent, as well as for state and national security. The Memorandum of Understanding (MOU) strengthens interactions and collaborations between the agency and the university in research, talent, and outreach. LSU and the USSS have agreed to advance cyber-physical system security and forensics knowledge, operational processes, and tools through collaboration. The partnership will provide LSU faculty and students with the opportunity to gain insight into and work on pertinent, real-world law enforcement and protective services challenges, as well as increase the Secret Service's access to LSU's talented students and nationally renowned cybersecurity expertise. The partnership will drive agency-specific research projects, connect students with agents directly, defend vulnerable Louisiana residents from cyberattacks, and more. This article continues to discuss the partnership between LSU and the USSS aimed at addressing cyber challenges.

    Louisiana State University reports "LSU and US Secret Service Partner to Address Cyber Challenges for Louisiana, Nation"

  • news

    Visible to the public "Hackers Claim Vast Access to Western Digital Systems"

    The hackers who breached the data storage company Western Digital claim to have stolen about 10 terabytes of data, including large amounts of customer information. The extortionists are pressuring the company to negotiate a minimum eight-figure ransom in exchange for not releasing the stolen data. On April 3, Western Digital disclosed a network security incident in which hackers accessed a number of the company's systems and stole data. One of the hackers spoke with TechCrunch and provided additional information in an effort to verify their claims. The hacker shared a file digitally signed with Western Digital's code-signing certificate, demonstrating that they could now digitally sign files to impersonate Western Digital. Two security researchers examined the file and found that it was signed with the company's certificate. In addition, the hackers shared the phone numbers of several company executives. The hacker shared screenshots of a folder from a Box account that appears to belong to Western Digital, an internal email, files stored in a PrivateArk instance, and a group call in which one of the participants is Western Digital's CISO. They claimed to have stolen information from the company's SAP Backoffice, a back-end interface that helps companies manage e-commerce data. This article continues to discuss the hackers claiming to have accessed Western Digital's systems.

    TechCrunch reports "Hackers Claim Vast Access to Western Digital Systems"

  • news

    Visible to the public "Volume of Opaque Breach Notices Surges in Q1"

    According to the Identity Theft Resource Center (ITRC), the volume of US data breaches fell in Q1 2023, but the number of notices with no actionable information contained within grew by 20% from the previous quarter. The ITRC is a non-profit that tracks publicly reported data breaches and leaks in the US and has been dismayed by the growing reluctance of breached firms to share important information about incidents. The ITRC argued that this means that those impacted can't make accurate assessments about the risk of data compromise and what actions they should take following a breach involving their data. The number of data breaches with no actionable information about the root cause of the compromise grew from just five in Q1 2021 to 155 a year later and 187 in Q1 2023. Eva Velasquez, president, and CEO of the ITRC stated that it is troubling to see the trend of a lack of actionable information in data breaches continue from 2022. Velasquez said that among the top ten breaches they saw in Q1, 60% did not include information about the root cause of the event, compared to 40% in Q4 2022. This means individuals and businesses remain at a higher risk of cyberattacks and data compromises. Last year, the ITRC claimed that only a third (34%) of breach notices included both victim and attack details, the lowest figure in five years and a 50% decline from 2019. The total number of reported breaches declined 13% from the previous quarter to 445 for the first three months of 2023. The number of victims decreased by 65% to 89 million. The ITRC noted that healthcare topped the list of most breached sectors for the third consecutive quarter, followed close behind by financial services. Incidents in the manufacturing and utilities, technology, healthcare, and transportation sectors impacted the most people. Velasquez claimed that the number of victims and compromises usually falls in Q1 each year.

    Infosecurity reports: "Volume of Opaque Breach Notices Surges in Q1"

  • news

    Visible to the public "US-Based Company Debuts 'World's First Smart Gun' With Fingerprint Unlocking System"

    A US-based technology company has developed the first biometric smart gun. Biofire Technologies announced the handgun that is fingerprint and 3D infrared facial recognition-secured. It functions under various conditions, including when the user is wearing gloves or a face mask. For gun owners concerned about privacy, the gun uses biometric information that never leaves the firearm, which lacks onboard Wi-Fi, Bluetooth, and GPS. Furthermore, integrated IR sensors in the grip keep the firearm armed while an authorized user is holding the gun, eliminating the need to continuously authenticate their biometrics. This article continues to discuss the biometric smart gun and how it addresses the privacy of users.

    CBS reports "US-Based Company Debuts 'World's First Smart Gun' With Fingerprint Unlocking System"

  • news

    Visible to the public "The Hacking of ChatGPT Is Just Getting Started"

    Alex Polyakov, CEO of the security company Adversa, only needed a couple of hours to break GPT-4. In March, when OpenAI released the latest version of its text-generating Artificial Intelligence (AI)-driven chatbot, Polyakov started entering prompts into the chatbot designed to circumvent OpenAI's safety systems. He eventually had GPT-4 making inappropriate remarks, writing phishing emails, and supporting violence. Polyakov is among a handful of security researchers, technologists, and computer scientists who are devising jailbreaks and prompt injection attacks against ChatGPT and other generative AI systems. The jailbreaking process seeks to create prompts that enable the chatbots to bypass restrictions on producing hateful content or writing about illegal acts. Prompt injection attacks can covertly insert malicious data or instructions into AI models. The attacks are a form of hacking that exploits system vulnerabilities with carefully crafted and refined sentences rather than code. Although the attack types are primarily used to circumvent content filters, security researchers warn that the rush to deploy generative AI systems increases the risk of cybercriminals stealing data and wreaking havoc on the web. Polyakov has developed a "universal" jailbreak that is effective against multiple Large Language Models (LLMs), such as GPT-4, Microsoft's Bing chat system, Google's Bard, and Anthropic's Claude. This article continues to discuss security researchers' work on jailbreaking LLMs to demonstrate the avoidance of safety rules.

    Wired reports "The Hacking of ChatGPT Is Just Getting Started"

  • news

    Visible to the public "Siemens Metaverse Exposes Sensitive Corporate Data"

    Siemens Metaverse, a virtual space designed to replicate actual machines, factories, and other highly complex systems, has exposed sensitive information, including the company's office layouts and Internet of Things (IoT) devices. Siemens, a German multinational company with over $71 trillion in revenue and 300,000 employees, has also joined the metaverse movement. In 2022, it partnered with the American multinational technology company NVidia to create the industrial metaverse. The Cybernews research team discovered that the Siemens Metaverse platform, which seeks to create digital 'twins' of its factories and offices, was leaking sensitive data, which could have had catastrophic repercussions for the company and other large corporations using its services, such as ransomware attacks. The research team found an environment file hosted on the company's domain, containing ComfyApp credentials and endpoints. Siemens was also found to have exposed four sets of WordPress users and three sets of backend and authentication endpoint URLs across multiple endpoints of the impacted systems. This article continues to discuss the Siemens Metaverse data leak and other security problems facing the metaverse.

    Cybernews reports "Siemens Metaverse Exposes Sensitive Corporate Data"

  • news

    Visible to the public "Darktrace Denies Getting Hacked After Ransomware Group Names Company on Leak Site"

    Cybersecurity company Darktrace issued a statement recently after it was named on the leak website of the LockBit ransomware group. In the statement, the company noted that the cybercriminal gang was claiming that they had compromised Darktrace's internal security systems and had accessed their data. The company stated that its security teams had run a full review of their internal systems and could see no evidence of compromise. Darktrace noted that they would continue to monitor the situation extremely closely, but based on their current investigations, they are confident that their systems remain secure and all customer data is fully protected. On LockBit's leak website, the post suggested that data was stolen from Darktrace and that the cybercriminals were asking for a $1 million ransom. The fake data on the LockBit site was apparently test data posted by the hackers while doing maintenance. A recent Twitter post from Singapore-based threat intelligence firm DarkTracer, which is unrelated to Darktrace, read, "The reliability of the RaaS service operated by LockBit ransomware gang seems to have declined." The cybercriminals were not happy with DarkTracer's allegations but confused it with UK-based Darktrace and published a post suggesting that they had hacked Darktrace. These types of mistakes are not uncommon for ransomware groups. It's worth noting that there is also no evidence that LockBit targeted DarkTracer either. LockBit has also been known to make false claims when it comes to cybersecurity companies.

    SecurityWeek reports: "Darktrace Denies Getting Hacked After Ransomware Group Names Company on Leak Site"

  • news

    Visible to the public "Russian Hackers Linked to Widespread Attacks Targeting NATO and EU"

    Poland's Military Counterintelligence Service and Computer Emergency Response Team have linked APT29 state-sponsored hackers, who are part of the Russian government's Foreign Intelligence Service (SVR), to attacks against NATO and European Union countries. The cyber espionage group, also known as Cozy Bear and Nobelium, sought to steal information from diplomatic entities and foreign ministries as part of this campaign. The attackers targeted diplomatic personnel with spear phishing emails that impersonated embassies of European nations and contained links to malicious websites or attachments designed to launch malware via ISO, IMG, and ZIP files. APT29-controlled websites infected victims with the EnvyScout dropper via HTML smuggling, which helped in the deployment of downloaders referred to as SNOWYAMBER and QUARTERRIG. The downloaders are designed to deliver additional malware and a CobaltStrike Beacon stager named HALFRIG. APT29 is the hacking division of the SVR that was linked to the SolarWinds supply-chain attack that compromised multiple US federal agencies three years ago. This article continues to discuss APT29 state-sponsored hackers being linked to attacks targeting NATO and European Union countries.

    Bleeping Computer reports "Russian Hackers Linked to Widespread Attacks Targeting NATO and EU"

  • news

    Visible to the public "Five Arrests in Crackdown on $98m Investment Fraud Gang"

    European police have recently arrested five individuals in an attempt to bust a criminal network believed to have made $98m from tens of thousands of victims through investment fraud. According to Europol, some 33 German law enforcers teamed up with their peers in Bulgaria, Romania, Georgia, and Israel to search 15 locations, including five illegal call centers. Europol noted that the two action days in March were a follow-up to operations undertaken against the same criminal gang in 2021 and enabled police to glean new evidence that revealed a much larger cost to victims than the 15m euros first estimated. Europol stated that the fraudsters lured potential victims through legitimate-looking website advertising and social media, encouraging them to make small initial investments of between 200-250 euros. Contact center workers then called the individuals, tricking them with fake "graphics" showing the purportedly large profits they'd already made and promising even bigger returns if they invested more. Europol claimed that persistently low interest rates at the time of the scheme (2019-21) made the high-risk investments more attractive to the victims. In reality, their funds went straight to the gang members' bank accounts. In the latest crackdown, police seized high-value assets, including luxury watches, electronic equipment, cash, bitcoins, bank cards, and various documents. An estimated 33,000 victims lost money to the gang. Investment fraud cost victims an estimated $3.3bn in 2022, making it the highest-grossing cybercrime category that year.

    Infosecurity reports: "Five Arrests in Crackdown on $98m Investment Fraud Gang"

  • news

    Visible to the public "Zelle Users Targeted With Social Engineering Tricks"

    Avanan reports that cybercriminals have been using social engineering to impersonate the popular US-based digital payments network Zelle and steal money from unsuspecting victims. The phishing email is crafted to appear as authentic as possible, containing the Zelle logo, grammatically correct text, and a real link to the company's website in the "security and privacy" footer. However, it also contains a maliciously shortened link. In order to approve a pending money transfer, users are instructed to click the link. If they do so, they are redirected to a page designed to gain the trust of Zelle users. Instead of receiving funds, they may send funds to the cybercriminals behind the scam. This article continues to discuss the phishing campaign targeting Zelle users.

    Help Net Security reports "Zelle Users Targeted With Social Engineering Tricks"