News Items

  • news

    Visible to the public "Google Workspace Adds Client-Side Encryption to Gmail and Calendar"

    Google has recently expanded client-side encryption (CSE) support to additional products in its Workspace suite. The security feature was already available on Drive, Docs, Slides, Sheets, and Meet. The company announced that CSE is now also supported in Gmail and Calendar. The company stated that they recognize sovereign controls are important to customers and have accelerated delivery of these encryption capabilities to support their customers in maintaining control over their data and meeting their regulatory compliance needs. Google stated that users can now send and receive emails or create meeting events with internal colleagues and external parties, knowing that their sensitive data (including inline images and attachments) has been encrypted before reaching Google servers. From a technical standpoint, Gmail and Calendar on Workspace already supported data encryption at rest and in transit by using secure-by-design cryptographic libraries. Google noted that client-side encryption takes this capability to the next level by ensuring that customers have sole control over their encryption keys and, thus, complete control over all access to their data. Google stated that client-side encryption, including for Gmail and Calendar, is available to customers worldwide who have Workspace Enterprise Plus, Education Standard, and Education Plus subscriptions.

    Infosecurity reports: "Google Workspace Adds Client-Side Encryption to Gmail and Calendar"

  • news

    Visible to the public "LSU Computer Science Faculty Furthering Research Into Smartphone Security"

    Many smartphone users unlock their devices using biometric data such as their fingerprint, face, and voice. In addition, they use this information to log into apps, make online purchases, pay bills, and more. However, the concern is whether this data can be replicated and reused. Since these biometrics are static and unchanging, they cannot be used for future authentication if they are compromised. This challenge is at the center of Louisiana State University (LSU) Computer Science Assistant Professor Chen Wang's developing research on hand-gripping as a verification method. Wang's research last year, supported by a grant from the Louisiana Board of Regents, was on notification privacy and the use of a smartphone's own musical sounds/vibrations during notification for verification. This time, with the support of a grant from the National Science Foundation (NSF), his research has expanded to include various smartphone features. Wang stated that this research focuses on tackling two persistent problems in mobile device authentication, which are obtrusiveness and replay threats. The goals are to reduce the user effort required for authentication so that they can handle in-situation privacy provisions and to render biometric data non-reusable so that an adversary cannot replay a person's biometrics to impersonate them. This article continues to discuss Wang's research aimed at bolstering smartphone security.

    Louisiana State University reports "LSU Computer Science Faculty Furthering Research Into Smartphone Security"

  • news

    Visible to the public "Over 30 Percent of Mobile Users Encounter Phishing Attacks"

    Data from Lookout reveals that mobile phishing encounter rates reached an all-time high in 2022, with an average of over 30 percent of personal and enterprise users exposed to these attacks each quarter. Since 2021, mobile phishing has risen by almost 10 percent on enterprise devices and by more than 20 percent on personal devices. The percentage of users who fall for multiple mobile phishing links is gradually increasing per year. According to Lookout, the percentage of mobile users in workplace environments who click on more than six malicious links per year has increased from 1.6 percent in 2020 to 11.8 percent in 2022. Companies in highly regulated industries, such as insurance, banking, legal, healthcare, and financial services, were the most common targets. An analysis estimates that mobile phishing could cost a company with 5,000 employees around $4 million annually. In the second quarter of 2022, non-email-based phishing attempts such as vishing (voice phishing), smishing (SMS phishing), and quishing (QR code phishing) also increased significantly. This article continues to discuss key findings from Lookout's new report on the global state of mobile phishing.

    BetaNews reports "Over 30 Percent of Mobile Users Encounter Phishing Attacks"

  • news

    Visible to the public "Intel Releases Software Platform For Quantum Computing Developers"

    Intel Corp recently released a software platform for developers to build quantum algorithms that can eventually run on a quantum computer that the chip giant is trying to build. The platform, called Intel Quantum SDK, would allow those algorithms to run on a simulated quantum computing system. Anne Matsuura, Intel Labs' head of quantum applications and architecture, said developers can use the long-established programming language C++ to build quantum algorithms, making it more accessible for people without quantum computing expertise. Matsuura stated that the Intel Quantum SDK helps programmers get ready for future large-scale commercial quantum computers. Matsuura noted that it will also advance the industry by creating a community of developers that will accelerate the development of applications. Intel said that the number of companies pursuing quantum computer hardware is mushrooming, from big corporations such as IBM and Google to startups. Intel noted that using quantum computing simulators, such as the one they built, is therefore important to train developers and work on algorithms. So far, Intel does not have a quantum computer available for customers to use, but James Clarke, who is in charge of quantum hardware at Intel, said the company was building one based on its silicon chip-making technology. Clarke stated that at Intel, they are making transistors very close to each other, operating them at low temperatures and with single electrons and having these act as qubits. Qubits, or quantum bits, are the basic unit of quantum computing.

    Reuters reports: "Intel Releases Software Platform For Quantum Computing Developers"

  • news

    Visible to the public "Police Arrest Trio in Multimillion-Dollar Extortion Case"

    Three Dutch men have recently been arrested on suspicion of participating in a major cyber-extortion campaign affecting tens of millions of victims. According to Dutch Police, a 21-year-old from Zandvoort is the prime suspect, alongside a 21-year-old from Rotterdam and an 18-year-old. An investigation into their alleged activities began in March 2021 and uncovered evidence of attacks on thousands of organizations, both domestic and global. The police noted that after gaining initial access to targeted companies and stealing sensitive customer information, the men allegedly extorted their victims by threatening to destroy their "digital infrastructure" or to leak the info publicly, similar to ransomware actors. However, the police claimed that "in many cases," the hackers sold the stolen data even after receiving a ransom payment. Ransom demands were in the $106,000-$740,000 range, with one report claiming the prime suspect made as much as $2.6m over the past few years. The police noted that among the data stolen by the trio were names, addresses, telephone numbers, dates of birth, bank account numbers, credit card details, passwords, license plate numbers, national ID numbers, and passport data. Among those breached were hospitality firms, training institutes, online stores, software companies, and even social media providers.

    Infosecurity reports: "Police Arrest Trio in Multimillion-Dollar Extortion Case"

  • news

    Visible to the public "Gamers Being Targeted with ChromeLoader Malware Using False Nintendo and Steam Game Hacks"

    A ChromeLoader malware distribution campaign has been observed using Virtual Hard Disk (VHD) files. ChromeLoader, also known as Choziosi Loader or ChromeBack, first appeared in January 2022 as a browser-hijacking credential thief. It has since evolved into a more complex, multifunctional threat capable of stealing sensitive data, launching ransomware, and delivering decompression bombs. According to the AhnLab Security Emergency Response Center (ASEC), the VHD files are distributed with filenames that make them appear to be Nintendo and Steam game hacks or cracks. The primary goal of the malware seems to be to take over web browsers such as Google Chrome and modify their settings so that traffic is intercepted and redirected to advertising websites. Using a browser extension to pay for clicks, ChromeLoader has also become a tool for click fraud. Since its emergence, the malware has undergone multiple versions, several of which are capable of accessing both Windows and macOS operating systems. This article continues to discuss findings and observations regarding the novel ChromeLoader malware campaign.

    CyberIntelMag reports "Gamers Being Targeted with ChromeLoader Malware Using False Nintendo and Steam Game Hacks"

  • news

    Visible to the public "Helping Cyber Defenders 'Decide' to Use MITRE ATT&CK"

    Since the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) released the first edition of Best Practices for MITRE ATT&CK Mapping about two years ago, the ATT&CK framework has evolved, expanded, and enhanced its ability to offer more than just cyber threat intelligence for the cybersecurity community. CISA has issued a second edition of its mapping guide and introduced a new companion tool called Decider. This tool guides users through a mapping process by asking them questions about adversary activity to help them determine the appropriate tactic, technique, or sub-technique to apply. With the tool, users are presented with a fact sheet and a video on Decider's key features and capabilities. These features include guided questions concerning adversary activity to help users confirm whether they are mapping correctly. Decider's key features also include a search and filtering functionality to help users zero in on what is most pertinent to their analysis. This article continues to discuss the purpose and development of CISA's new Decider tool as well as updates to CISA's mapping guide.

    CISA reports "Helping Cyber Defenders 'Decide' to Use MITRE ATT&CK"

  • news

    Visible to the public "Several Law Firms Targeted in Malware Attacks"

    According to security researchers at eSentire, in January and February 2023, six law firms were targeted with the GootLoader and SocGholish malware in two separate campaigns. Targeting law firm employees, the first campaign aimed to infect victims' devices with GootLoader, a malware family known for downloading the GootKit remote access trojan (RAT), REvil ransomware, or the Cobalt Strike implant. The researchers stated that the attacks appear focused on espionage and exfiltration activities, given that none of the observed GootLoader infections in 2022 deployed ransomware. The researchers said that for initial access, the attackers relied on search engine optimization (SEO) poisoning, adding blog posts to a compromised legitimate WordPress website. The researchers noted that the GootLoader-infected blogs featured legal keywords to attract law firm employees and to increase their rankings in search results. Visitors were directed to a fake forum page encouraging them to download an alleged agreement template or contract template but were served the GootLoader malware instead. The researchers stated that the increased absence of ransomware being deployed in these attacks while maintaining success in infecting legal firms, and a willingness to engage in hands-on intrusions, suggests the possibility that the GootLoader operations have shifted to not only supporting financially-motivated attacks but also supporting politically-motivated and cyber espionage operations. As part of the second campaign, the attackers targeted law firm employees and other business professionals with the SocGholish malware, which is also known as FakeUpdates. Typically used by initial access brokers, SocGholish allows attackers to perform reconnaissance and deploy additional payloads, including Cobalt Strike. The researchers noted that recently, the malware was also seen deploying the LockBit ransomware. The observed attacks relied on poisoned domains, including the hijacked website of a business offering notary public services in Miami. The compromised website displayed a pop-up notification informing visitors they should update the Chrome browser, but instead downloaded SocGholish malware. The researchers stated that by infecting a large number of lower traffic sites, SocGholish operators capture the occasional high-value victim website from their infections. For example, the Notary Public website was frequented by legal firms. These visitors are considered high value.

    SecuityWeek reports: "Several Law Firms Targeted in Malware Attacks"

  • news

    Visible to the public "Australia Has a New Cybersecurity Agenda. Two Key Questions Lie at Its Heart"

    In response to last year's cyberattacks faced by Optus and Medibank, the Australian government is exploring a new cybersecurity strategy. Claire O'Neil, Minister for Cyber Security, released a discussion paper aimed at answering questions regarding the government's role in improving Australia's cyber resilience. The government will also establish a National Office of Cyber Security and a Coordinator for Cyber Security position inside the Department of Home Affairs. Due to a lack of policy or regulation, O'Neil stated that the government was trying to establish proper solutions to the major hacks of the last year. Each of the breaches experienced by Optus and Medibank affected around one-third of the Australian population. The information leaked by hackers included driver's licenses, passports, and highly sensitive medical information. In both cases, government assistance was required, such as the development of procedures for replacing driver's license identification numbers. The discussion paper contains 21 questions, many of which are focused on how government and industry should collaborate. Two points, however, stand out as being of the utmost importance: whether the government should prohibit ransomware payments and whether the government should be able to seize control of companies' Information Technology (IT) systems. This article continues to discuss questions and concerns regarding Australia's new cybersecurity agenda.

    The Conversation reports "Australia Has a New Cybersecurity Agenda. Two Key Questions Lie at Its Heart"

  • news

    Visible to the public "Dark Web Market BidenCash Leaks Info on Two Million Payment Cards"

    BidenCash, a carding marketplace on the dark web, has exposed two million valid payment cards. As legitimate businesses celebrate birthdays by offering discounts, hackers distribute stolen items. BidenCash announced that it would be distributing credit card information as a birthday anniversary promotion. The leaked data contains cardholders' full names, card numbers, bank information, expiration dates, and Card Verification Value (CVV) numbers. The data also contains the home and email addresses associated with the stolen credit cards. Threat actors can use stolen cards to mask illegal activities. Therefore, marketplaces such as BidenCash are critical to the cybercrime economy. Threat actors typically collect card data through malware that steals information or infects Point-of-Sale (PoS) systems. According to the Cybernews research team, the leaked data includes card data from around the world. However, the team observed that US-issued cards dominate the data set. China, Mexico, India, Canada, and the UK are also largely present in the leaked data. This article continues to discuss the BidenCash leak of information on two million payment cards.

    Cybernews reports "Dark Web Market BidenCash Leaks Info on Two Million Payment Cards"

  • news

    Visible to the public "Parallax RAT Used in Attacks Aimed At Cryptocurrency Entities"

    Researchers from the cybersecurity company Uptycs warn of attacks using the Parallax Remote Access Trojan (RAT) on cryptocurrency organizations. Since December 2019, the Parallax RAT has been spread via malvertising and phishing attacks. Common RAT capabilities supported by the malware include keylogging, capturing login credentials, file access, and remote control of compromised systems. The sample used in recent attacks applies injection techniques to conceal itself within legitimate processes and evade detection. After successfully injecting malicious code, threat actors are able to communicate with their victim via Windows Notepad. The first payload examined by the researchers is written in C++ and is a 32-bit executable. The RAT is injected into a valid Microsoft pipanel.exe process through the process-hollowing approach. The malware gains persistence by creating a copy of itself in the Windows Startup folder. The second payload collects sensitive information from affected systems. This article continues to discuss the new wave of attacks against cryptocurrency entities, involving the use of the Parallax RAT for infiltration.

    Security Affairs reports "Parallax RAT Used in Attacks Aimed At Cryptocurrency Entities"

  • news

    Visible to the public "Dormant Accounts Are a Low-Hanging Fruit for Attackers"

    According to Oort, zero-day flaws are no longer required for successful system attacks, as threat actors increasingly focus on compromising identities through techniques such as evading multi-factor authentication (MFA), hijacking sessions, and brute-forcing passwords. In the past year, account takeover (ATO) made up the most successful breaches. Matt Caulfield, CEO of Oort, explains that this finding indicates how simple organizations make it for attackers to target their identities and execute effective ATO attacks. Identity and Access Management (IAM) and security teams lack the necessary visibility and control to identify these risks, leaving them blind to the most common threats they are expected to face, including ATO. Oort reports that 40.26 percent of accounts in the average company have either poor second factors or none at all, leaving them open to phishing and social engineering attacks. Additionally, only 1.82 percent of all logins used phishing-resistant second factors. The absence of robust MFA adoption has consequences not only for potential ATO attacks, but also for regulatory compliance, citing a number of compliance frameworks with MFA requirements. The analysis reveals that the accounts most frequently targeted are either inactive or those belonging to CEOs and administrators. Dormant accounts are the easiest target for attackers, yet they make up 24.15 percent of all accounts in the average organization. This article continues to discuss key findings shared by Oort on the use of weak second factors by companies, the rise in dormant accounts, and MFA adoption.

    Help Net Security reports "Dormant Accounts Are a Low-Hanging Fruit for Attackers"

  • news

    Visible to the public "Dish Network Confirms Ransomware Outage"

    Satellite television company Dish Network has recently revealed that ransomware was the cause of a multi-day outage impacting customers. The Colorado-headquartered firm, which also owns wireless service provider Boost Mobile and streaming provider Sling, revealed the news in an SEC filing yesterday. Dish Network stated it "experienced a network outage that affected internal servers and IT telephony" on February 23. Dish Network noted that they immediately activated their incident response and business continuity plans designed to contain, assess and remediate the situation. The company has hired cybersecurity experts to help investigate the incident. On February 27, 2023, the company became aware that certain data was extracted from the corporation's IT systems as part of this incident. The company noted that the investigation might reveal that the extracted data includes personal information. The incident downed both the Dish and Boost Mobile website and support lines. Boost Mobile users were reportedly also told they may have trouble paying their bill. The company stated that Dish, Sling, and its wireless and data networks remain operational, however, the corporation's internal communications, customer call centers, and internet sites are still dealing with and are affected by the incident.

    Infosecurity reports: "Dish Network Confirms Ransomware Outage"

  • news

    Visible to the public "New MortalKombat Ransomware Decryptor Recovers Your Files for Free"

    Bitdefender has released a free decryptor for the MortalKombat ransomware that victims can use to recover their files without paying the demanded ransom. The release of a functional decryptor for the strain follows its emergence in January 2023, when Cisco Talos announced that it was primarily targeting systems in the US. Distributors of MortalKombat send emails to random people delivering malicious ZIP attachments containing BAT loader scripts. When the script is executed, the ransomware binary and the Laplas Clipper are downloaded and executed on the system. MortalKombat is based on the Xorist ransomware family, which has been decryptable since 2016. The MortalKombat decryptor is an executable that does not require installation on affected devices. It offers to scan the entire filesystem for infected files, but the user can alternatively choose a specific location containing backed-up encrypted data. The software also enables users to build a backup of encrypted files to avoid corrupted and unrecoverable data if the decryption process fails. In addition, there is an option to replace previously decrypted files, which were the result of partially successful decryption attempts, with new, uncorrupted copies. This article continues to discuss Bitdefender's release of a free MortalKombat ransomware decryptor.

    Bleeping Computer reports "New MortalKombat Ransomware Decryptor Recovers Your Files for Free"

  • news

    Visible to the public "Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist"

    A vulnerable Kubernetes container and weak permissions enabled an adversary to transform an opportunistic cryptojacking attack into a widespread invasion impacting intellectual property and sensitive data. The attack, dubbed "SCARLETEEL" by the cloud security company Sysdig, began with a threat actor exploiting a Kubernetes cluster, using an internal service to obtain temporary credentials, and then using those credentials to enumerate other Elastic Compute Cloud (EC2) services that had been deployed in the infrastructure of the targeted company. Ultimately, the company, which was not identified in the incident report, limited the scope of permissions for the stolen identity, therefore neutralizing the attack. Michael Clark, head of security research at Sysdig, notes that companies must be cautious when setting the controls that enable cloud resources to work with one another. The sophisticated cyberattack also demonstrates that cybercriminals are increasingly attacking cloud infrastructure. In the past, threat actors focused on rudimentary interactions with cloud services, such as the deployment of cryptojacking software. However, cloud-focused attacks are becoming more prevalent as threat actors gain a better understanding of the vulnerabilities introduced by businesses. This article continues to discuss the SCARLETEEL attack on a company's Amazon Web Services (AWS) account.

    Dark Reading reports "Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist"

  • news

    Visible to the public "BlackLotus Becomes First UEFI Bootkit Malware to Bypass Secure Boot on Windows 11"

    BlackLotus, a stealthy Unified Extensible Firmware Interface (UEFI) bootkit, is the first publicly known malware that can circumvent Secure Boot protections, making it a major cyber threat. According to a report by ESET, this bootkit can operate on Windows 11 systems with UEFI Secure Boot enabled. UEFI bootkits are launched in the system firmware and provide complete control over the operating system boot process, allowing the disabling of OS-level security features and the execution of arbitrary payloads with elevated privileges during startup. The 80-kilobyte, Assembly, and C-based robust and persistent toolkit is sold for $5,000 (plus $200 per new version). In addition, geofencing capabilities prevent infection of computers in Armenia, Belarus, Kazakhstan, Moldova, Romania, Russia, and Ukraine. This article continues to discuss the BlackLotus UEFI bootkit.

    THN reports "BlackLotus Becomes First UEFI Bootkit Malware to Bypass Secure Boot on Windows 11"

  • news

    Visible to the public "Clemson University Joins Nation's Frontline Defense against Cyberattacks on the Transportation System"

    Clemson University is opening a National Center where researchers will develop new methods to bolster the transportation system security against cyberattacks. The new National Center for Transportation Cybersecurity and Resilience (TraCR) will receive a five-year grant of $20 million from the US Department of Transportation. Researchers are working to develop software and hardware that will serve as impenetrable cyber defense. Connecting cars wirelessly to each other and to the roadway infrastructure can reduce traffic congestion, accidents, fuel consumption, pollution, and social disparities. However, it also exposes the transportation system to cyber threats from hackers, criminal gangs, terrorists, and other malicious actors. With each car and piece of infrastructure that connects to the Internet, there is the potential to steal data, breach privacy, demand a ransom, deliver false information, or even bring down an entire system. The new center will place Clemson University at the frontline of the nation's defense against major infrastructure threats. Benedict College, Florida International University, Morgan State University, Purdue University, South Carolina State University, the University of Alabama, the University of California, Santa Cruz, and the University of Texas at Dallas are partner institutions. The center's researchers plan to examine multiple modes of transportation, from cars, trucks, and bicycles to passenger rail, maritime transport, and pipelines. Researchers will create an adaptive and resilient platform to help detect threats and defend against attacks that hackers have not yet invented. The team will also delve into quantum computing, looking at how to evaluate threats from quantum computers and how such computers can be used to defend against cyberattacks. This article continues to discuss the new National Center for TraCR at Clemson University, which will develop software and hardware to combat cyberattacks on the nation's transportation systems.

    Clemson University reports "Clemson University Joins Nation's Frontline Defense against Cyberattacks on the Transportation System"

  • news

    Visible to the public "How ChatGPT Can Help Cybersecurity Pros Beat Attacks"

    There has been much discussion about how hackers might benefit from ChatGPT, the OpenAI-trained Artificial Intelligence (AI) chatbot, but it is important to also examine how cybersecurity experts can use this tool. In 2022, the Large Language Model (LLM) emerged onto the scene, amassing 1 million users in the first five days after its release. The security community and hackers have shown much interest in this AI technology. From writing malware code to generating an endless stream of phishing campaigns, many now consider ChatGPT a cyber actor's ideal platform. However, the question stills remain as to how this tool may help the good guys. As the volume and complexity of cyberattacks increase, AI is already supporting understaffed security teams in mitigating threats. AI technologies such as Machine Learning (ML) and Natural Language Processing (NLP) deliver actionable insights that cut through the noise by curating threat intelligence from various research sources, blogs, and news articles. This significantly decreases response times. Meanwhile, cognitive security blends the benefits of AI and human intelligence. Cognitive computing is a sophisticated form of AI that uses ML algorithms and deep-learning networks. These systems grow stronger and more intelligent with time. This article continues to discuss ChatGPT and its potential place in cybersecurity.

    Security Intelligence reports "How ChatGPT Can Help Cybersecurity Pros Beat Attacks"

  • news

    Visible to the public "CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has released a Cybersecurity Advisory (CSA) titled "CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks," describing a red team assessment of a large organization with a mature cyber posture that manages critical infrastructure. CISA's new CSA delves into the red team's tactics, techniques, and procedures (TTPs) as well as key findings for network defenders wanting to take proactive steps to decrease the threat posed by malicious cyber actors. As described in the CSA, the CISA red team gained persistent network access to the organization, moved laterally across numerous geographically separate facilities, and gained access to systems close to the organization's sensitive business systems. This advisory emphasizes the significance of early detection and ongoing monitoring of cyber assets. This article continues to discuss the CSA on CISA red team findings to help network defenders improve the monitoring and hardening of their networks.

    HSToday reports "CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks"

  • news

    Visible to the public "State-Sponsored Hackers Are Diversifying Tactics, Targeting Small Businesses"

    According to SonicWall's 2023 Cyber Threat Report, state-sponsored threat actors are shifting their attention toward small and midsize businesses (SMBs). While large companies, public services, and crucial national infrastructure have historically been the primary targets of state-sponsored threat actors, it is expected that in 2023, adversaries will diversify their tactics to target SMBs and a larger variety of victims. The report also indicated that the change towards targeting SMBs correlates with a 21 percent reduction in the overall volume of ransomware attacks. The findings are consistent with those of other cybersecurity companies, which have mostly concurred in their various threat reports that ransomware detections have decreased over the past year. Global malware attacks rose by 2 percent last year using over 400,000 unique variants, marking the first increase in this attack method since 2018. Internet of Things (IoT) malware and cryptojacking tactics increased by 87 percent and 43 percent, respectively, as threat actors adopted slower and stealthier techniques to conduct financially motivated cyberattacks. This article continues to discuss key findings shared in SonicWall's 2023 Cyber Threat Report.

    ITPro reports "State-Sponsored Hackers Are Diversifying Tactics, Targeting Small Businesses"

  • news

    Visible to the public "88 Percent of Organizations Have Suffered Cyber Breaches in the Last Two Years"

    Pentera surveyed 300 CIOs, CISOs, and security leaders from businesses in Europe and the US, revealing that a cyberattack had impacted 88 percent of organizations over the past two years. The Pentera study finds that this is the case despite companies employing an average of nearly 44 security solutions. While regulatory requirements first drove the need for penetration testing, the primary reasons for such testing today are security validation, potential damage assessment, and cyber insurance. With only 22 percent of respondents reporting compliance as their top reason for the activity, regulatory or executive obligations remain significant but are not the key driver of penetration testing. This article continues to discuss key findings from Pentera's survey of CIOs, CISOs, and security executives.

    BetaNews reports "88 Percent of Organizations Have Suffered Cyber Breaches in the Last Two Years"

  • news

    Visible to the public "US Gov. Agencies Have 30 Days to Remove TikTok, Canada Follows Suit"

    The White House has given federal agencies 30 days to remove TikTok from all government-issued devices following the December 2022 ban on the social media app. The announcement comes from Shalanda Young, director of the office of management and budget, who published a memorandum for executive departments and agencies on Monday. The message stated that all executive agencies and those contracted by them must delete any application from TikTok and its China-based parent company, ByteDance, within 30 days of the notice. Further, within 90 days, agencies must include in contracts that the video app cannot be used on devices and must cancel existing contracts that require the app's use. The 30-day deadline comes hours before Canada Prime Minister Justin Trudeau announced banning TikTok from all government-issued mobile devices.

    Infosecurity reports: "US Gov. Agencies Have 30 Days to Remove TikTok, Canada Follows Suit"

  • news

    Visible to the public "Vulnerabilities Being Exploited Faster Than Ever: Analysis"

    Security researchers at Rapid7 discovered that in 2022, the widespread exploitation of new vulnerabilities was down 15% over the previous year, zero-day attacks declined 52% from 2021, and there were 33% fewer vulnerabilities known to have been exploited as part of a ransomware attack. The researchers noted that, on the surface, it might appear that things were easier for security teams last year. That would be wrong. During their study, the researchers also found that the time from vulnerability disclosure to exploitation is decreasing. A large number of vulnerabilities are being exploited before security teams have any time to implement patches or other mitigations. To be precise, 56% of the vulnerabilities were exploited within seven days of public disclosure, a 12% increase over 2021 and an 87% increase over 2020. The researchers noted that resources for triaging and remediating vulnerabilities remain limited, and priorities can be misdirected. The researchers believe that there are three primary takeaways from their current research. The first is that widespread threats remain high, even though they are down from 66% in 2021 to 56% in 2022's dataset. The second takeaway is the complexity of the ransomware ecosystem and how that affects visibility and statistics. And the last takeaway is that ransomware groups are leveraging fewer new vulnerabilities than they did in 2021.

    SecurityWeek reports: "Vulnerabilities Being Exploited Faster Than Ever: Analysis"

  • news

    Visible to the public "Tech Manufacturers Are Leaving the Door Open for Chinese Hacking, Easterly Warns"

    Jen Easterly, the head of the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), recently talked about the cyber threats posed by China, warning of dire consequences if technology manufacturers fail to improve the security of their products. In a speech at Carnegie Mellon University (CMU), CISA Director Jen Easterly stated that the culture of rushing technology to market is dangerous to consumers and the nation. As technology has been incorporated into practically every aspect of our lives, we have come to assume that such technology is inherently harmful, Easterly remarked. Her remarks reflect those of multiple government officials in recent years. Easterly criticized manufacturers for releasing products with many flaws that would be unacceptable in any other critical field. The speech came as the Biden administration prepares to announce a National Cybersecurity Plan, which will include initiatives for bolstering cybersecurity protections across the nation, with a focus on critical infrastructure. Officials have also stated that the strategy will address coordination between the private sector and the government. This article continues to discuss key points made by Easterly in her recent speech at CMU.

    The Record reports "Tech Manufacturers Are Leaving the Door Open for Chinese Hacking, Easterly Warns"

  • news

    Visible to the public "London Honeypots Attacked 2000 Times Per Minute"

    Security experts are warning that remote workers in the UK capital are being bombarded with cyberattacks after recording 91 million threats over a 28-day period in January. Insurer Coalition set up a series of honeypots in a project with police non-profit the Cyber Resilience Centre for London in a bid to calculate the cyber threat level to organizations operating in the region. Coalition's UK security researcher, Simon Bell, stated that they use honeypots to learn about threat actors and their methods. Once the attack happens, one can see what vulnerabilities the cybercriminal is looking for and how they try to exploit them. Bell noted that in this exercise, their honeypots were given IP addresses that were identified as physical data centers in London. The study recorded 2000 attacks per minute targeting the honeypots, with 85% of them attempting to hijack remote desktop connections used by employees working outside the office. The attacks were traced back to 101,000 different threat actors, with Russia as the largest single source of attacks, followed by Bulgaria, Monaco, and Panama. However, Coalition quickly pointed out that many threat actors hide their true location using VPNs routed through other countries. Bell argued that the research showed how working from home has significantly widened the corporate attack surface.

    Infosecurity reports: "London Honeypots Attacked 2000 Times Per Minute"

  • news

    Visible to the public "Danish Parliament Urges to Remove TikTok Over Cybersecurity"

    The Danish parliament recently urged lawmakers and employees with the 179-member assembly against having TikTok on work phones as a cybersecurity measure. The popular video-sharing app, which is Chinese-owned, faces intensifying scrutiny from Europe and the U.S. over security and data privacy amid worries that TikTok could be used to promote pro-Beijing views or sweep up users' information. The assembly acted after an assessment from Denmark's Center for Cyber Security, which had said there was a risk of espionage. The agency is part of Denmark's foreign intelligence service. Earlier this month, the European Union's executive branch said it had temporarily banned TikTok from phones used by employees as a cybersecurity measure. The EU's action follows similar moves in the U.S., where more than half of the country's 50 states and Congress have banned TikTok from official government devices.

    The Associated Press reports: "Danish Parliament Urges to Remove TikTok Over Cybersecurity"

  • news

    Visible to the public "Are Our Pets Leaking Information About Us?"

    According to new research, pet and animal-related apps pose cybersecurity risks to their owners. Many pet owners may find the ability to track their cats and dogs appealing since it can bring peace of mind. However, enabling a third party to track their movements can be less appealing. Through the analysis of 40 popular Android apps for pets, computer scientists from Newcastle University and Royal Holloway, University of London, have uncovered a number of security and privacy problems. Several of these apps put their users at risk by disclosing their login credentials or location information. One of the issues revealed by the researchers was password weakness. They found three apps that had user login details visible in plain text within non-secure HTTP traffic. This means that anyone can look at the Internet traffic of an individual using one of these apps and obtain their login credentials. In addition to login information, two of the apps displayed user details that may allow cybercriminals to access their devices and launch an attack. The researchers identified the use of trackers as an additional area of concern. All apps except for four were discovered to include tracking software. The team also cautions that the privacy policies of the apps are poorly communicated to the user. Their study reveals that 21 apps track the user in some manner prior to the user's authorization, thus violating existing data protection regulations. This article continues findings from the research on the cybersecurity risks posed by pet and animal-related apps.

    Newcastle University reports "Are Our Pets Leaking Information About Us?"

  • news

    Visible to the public "PlugX Trojan Disguised as a Legitimate Windows Open-Source Tool in Recent Attacks"

    Researchers at Trend Micro discovered a new wave of attacks crafted to distribute the PlugX Remote Access Trojan (RAT) disguised as the open-source Windows debugger x32dbg. The legitimate tool enables the examination of kernel-mode and user-mode code, crash dumps, and CPU registers. The executable file x32dbg.exe that the researchers studied has a valid digital signature. Therefore, it is regarded as secure by some security programs. It enables threat actors to evade detection, maintain persistence, elevate privileges, and circumvent file execution constraints. When a digitally signed software application such as the x32dbg debugging tool is used, the RAT leverages DLL side-loading to load its own malicious payload. By altering registry entries and setting scheduled activities, attackers were able to maintain access even after a system restart. This article continues to discuss researchers' findings regarding a new wave of attacks distributing the PlugX RAT masked as a legitimate Windows debugger tool.

    Security Affairs reports "PlugX Trojan Disguised as a Legitimate Windows Open-Source Tool in Recent Attacks"

  • news

    Visible to the public "Threat Actors Getting Smarter as China-Linked Attacks Rise"

    According to CrowdStrike's annual Global Threat Report, adversaries have become more sophisticated and destructive in their cyberattacks. Malware activity has declined, indicating that threat actors are experimenting with alternative means of attack. Seventy-one percent of all detections were malware-free in 2022, up from 62 percent in 2021. This was in part due to the exploitation of valid credentials by adversaries to facilitate access and persistence in victim environments. CrowdStrike stated that the rate at which new vulnerabilities were disclosed and the speed at which adversaries were able to deploy exploits also played a role. Meanwhile, interactive intrusion campaigns or attacks that required a more 'hands-on' approach from cybercriminals surged by 50 percent, indicating that threat actors are increasingly seeking ways to circumvent automated detections. Another notable trend is decrease in the time it takes for an adversary to move laterally from one compromised host to another within the victim's environment or network of targeted computer systems. This reduced from 98 minutes in 2021 to 84 minutes the year prior, meaning that defenders were under increased pressure to detect and respond to an incursion. CrowdStrike, which monitors more than 200 adversaries, also reported an increase in "China-nexus" espionage. In the last year, threat actors associated with China attacked all 39 global industry sectors and 20 geographic regions. This article continues to discuss key findings from CrowdStrike's Global Threat Report.

    Cybernews reports "Threat Actors Getting Smarter as China-Linked Attacks Rise"

  • news

    Visible to the public "US Marshals Service Hit With Ransomware Attack"

    The United States Marshals Service (USMS) was recently hit with a ransomware attack. The incident occurred on February 17. According to a USMS spokesperson, shortly after the discovery, the USMS disconnected the affected system, and the Department of Justice initiated a forensic investigation. The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information pertaining to subjects of USMS investigations, third parties, and certain USMS employees. The USMS did not mention who was behind the attack, nor did they say if they paid the ransom to unlock the affected system. The forensic investigation is currently still ongoing.

    ABC News reports: "US Marshals Service Hit With Ransomware Attack"

  • news

    Visible to the public "How the Ukraine War Opened a Fault Line in Cybercrime, Possibly Forever"

    The Russia-Ukraine conflict has impacted cyberspace on all levels, from nation-state Advanced Persistent Threats (APT) groups to low-level carders on Dark Web forums. A new report from Recorded Future details the numerous cyberspace repercussions of that event. Cybercrime activity has changed, allies have become foes, power structures have been restructured, and more. According to the Recorded Future report "Themes and Failures of Russia's War Against Ukraine," despite "compounding strategic and tactical failures," Moscow presumably remains focused on conquering Kiev, overturning the Ukrainian government, and scoring a decisive military triumph. Russia's offensive cyber operations have been unable to complement Russia's conventional military success and will likely turn to targeting civilian infrastructure in an effort to degrade Ukraine's morale. Russia's continued reliance on proxy groups to achieve its objectives in Ukraine while maintaining plausible deniability has shed additional light on the connections between Russian Intelligence Services (RIS) and non-state actors, as evidenced by Russia's direct, indirect, and tacit relationships with cybercriminal and hacktivist groups. This article continues to discuss key points from Recorded Future's report on the disruption of the cybercriminal ecosystem by Russia's war against Ukraine.

    Dark Reading reports "How the Ukraine War Opened a Fault Line in Cybercrime, Possibly Forever"

  • news

    Visible to the public "LastPass Breach: Hacker Accessed Corporate Vault by Compromising Senior Developer's Home PC"

    LastPass has disclosed additional details on the security incident relating to the compromise of its development environment in August 2022 and subsequent unauthorized access to the company's third-party cloud storage provider that held backups. The threat actor launched a coordinated second attack using information stolen during the first incident, information obtained from a third-party data breach, and a vulnerability in a third-party media software package. The list of data and secrets that have been stolen or compromised as a result of both attacks is long. The threat actor compromised a senior DevOps engineer's credentials by targeting the engineer's computer and using a vulnerable third-party media software package to remotely execute code. The actor implanted a keylogger that recorded the master password of the employee. Then, they gained access to the engineer's corporate LastPass vault. This article continues to discuss new information regarding the LastPass breach.

    Help Net Security reports "LastPass Breach: Hacker Accessed Corporate Vault by Compromising Senior Developer's Home PC"

  • news

    Visible to the public "New Exfiltrator-22 Post-exploitation Kit Linked to LockBit Ransomware"

    Exfiltrator-22 is a new post-exploitation framework being promoted by threat actors to spread ransomware across corporate networks while evading detection. According to threat analysts at CYFIRMA, this new framework was developed by former LockBit 3.0 affiliates with expertise in anti-analysis and defense evasion, offering a powerful solution for a monthly price. Exfiltrator-22 is priced between $1,000 per month and $5,000 for lifetime access, with ongoing updates and support included. The framework's buyers are provided with an admin panel hosted by a Virtual Private Server (VPS) from which they could control the malware and issue commands to compromised systems. On November 27, 2022, the first version of the Exfiltrator-22 framework was discovered in the wild. About ten days later, its makers created a Telegram channel to advertise the framework to other cybercriminals. By the end of the year, threat actors had disclosed additional features that helped mask traffic on hacked devices, indicating that the framework was actively being developed. In January 2023, its authors deemed the framework to be 87 percent complete, and subscription prices were released, allowing interested users to purchase access to the tool. The threat actors uploaded two videos on YouTube on February 10, 2023, demonstrating Exfiltrator-22's lateral movement and ransomware-spreading capabilities. This article continues to discuss the Exfiltrator-22 framework being promoted by threat actors.

    Bleeping Computer reports "New Exfiltrator-22 Post-exploitation Kit Linked to LockBit Ransomware"

  • news

    Visible to the public "CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability"

    Based on evidence of active exploitation, the US Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw impacting the ZK Framework to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability, tracked as CVE-2022-36537, affects ZK Framework versions 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2, and 8.6.4.1, and enables threat actors to retrieve sensitive data via carefully crafted requests. CISA stated that the ZK Framework is an open-source Java framework. Therefore, this vulnerability can affect various products, including ConnectWise R1Soft Server Backup Manager. In May 2022, the flaw was patched in versions 9.6.2, 9.6.0.2, 9.5.1.4, 9.0.1.3, and 8.6.4.2. As Huntress showed in an October 2022 proof-of-concept (PoC), the vulnerability could be exploited to bypass authentication, upload a backdoored JDBC database driver to achieve code execution, and launch ransomware on vulnerable endpoints. This article continues to discuss CISA's warning of the active exploitation of ZK Framework vulnerability.

    THN reports "CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability"

  • news

    Visible to the public "Mobile Banking Trojans Surge, Doubling in Volume"

    According to researchers at Kaspersky, mobile malware developers were busy in 2022, flooding the cybercrime landscape with twice the number of banking trojans than the year before. The researchers stated that nearly 200,000 new mobile banking Trojans emerged in 2022, a 100% increase from the year before and the biggest acceleration of mobile malware development seen in the last six years. In total, the firm detected 1.6 million installers for mobile malware within its telemetry during the year. That's actually a decline in threat activity (down from 3.5 million in 2021 and 5.7 million in 2020), even as malware creation surges ahead. The researchers stated that this drastic increase in banking Trojan development signifies that cybercriminals are targeting mobile users and are increasingly more interested in stealing financial data and actively investing in the creation of new malware. Banking Trojans are built to steal mobile bank account credentials or e-payment details, but they can often be repurposed for other kinds of data theft or used to install additional malware. The researchers noted that while unofficial app stores pose the greatest potential for encountering a banking Trojan, Google Play has been repeatedly populated with "downloaders for banking trojan families, such as Sharkbot, Anatsa/Teaban, Octo/Coper, and Xenomorph, all disguised as utilities."

    Dark Reading reports: "Mobile Banking Trojans Surge, Doubling in Volume"

  • news

    Visible to the public "QNAP Offering $20,000 Rewards via New Bug Bounty Program"

    Taiwan-based QNAP Systems has recently announced that it is offering rewards of up to $20,000 for vulnerabilities reported through its newly launched bug bounty program. QNAP, which is known for its network-attached storage (NAS) and professional network video recorder (NVR) solutions, also makes various types of networking equipment. According to the company, security researchers interested in joining their program can hunt for vulnerabilities in their applications, cloud services, and operating systems. Rewards of up to $20,000 are offered for operating system vulnerabilities, while for applications and cloud services, researchers can earn a maximum of $10,000 and $5,000, respectively. The company stated that submitted reports may qualify for a reward if they do not describe previously reported security defects, if the researcher has not publicly shared details about the flaw, and if the described issue can be replicated and validated by QNAP's security team. The company also noted that higher bounties may be awarded for clear, well-written reports that also include detailed instructions and proof-of-concept (PoC) code, along with suggestions on how the bug should be fixed. The company stated that the reward is determined by the complexity of successfully exploiting the vulnerability, the potential exposure, and the percentage of impacted users and systems. According to QNAP, while only released applications, cloud services, and operating systems are within the program's scope, rewards may be paid out for critical vulnerabilities that are out-of-scope.

    SecurityWeek reports: "QNAP Offering $20,000 Rewards via New Bug Bounty Program"

  • news

    Visible to the public "TREBUCHET: A High-Powered Processor for Cutting-Edge Encryption"

    Fully Homomorphic Encryption (FHE) enables algorithms to do direct computations on encrypted data. Usually, sensitive data is encrypted, and it must be decrypted before it can be used for any form of analysis or computing. The analysis or computation is conducted while the sensitive data is in an unencrypted state, and then the data is re-encrypted. Matthew French, Research Director at USC Viterbi's Information Sciences Institute (ISI), says that the problem with these schemes is that there is inevitably a breakdown in the process, and someone can snoop on the unencrypted processing, or someone can forget to re-encrypt the data. In the past decade, breakthrough advances in algorithms have enabled FHE, which eliminates the need to decrypt and re-encrypt data, resulting in a far more secure system, according to French. However, FHE requires substantially more computational power to accomplish tasks equivalent to those that are not encrypted. FHE requires around 100,000 times more processing than conventional techniques, so FHE must decrease the computation gap in order to be useful. French and his colleagues took on the challenge with their co-processor, TREBUCHET, which addresses this by developing custom computer hardware to accelerate FHE processing with the aim of achieving ten times the speed of traditional processing. TREBUCHET was created for the Data Protection in Virtual Environments (DPRIVE) Program of the Defense Advanced Research Projects Agency (DARPA). There are both private research facilities and academic institutions on the team. This article continues to dicuss the concept of FHE and the TREBUCHET solution.

    USC Viterbi reports "TREBUCHET: A High-Powered Processor for Cutting-Edge Encryption"

  • news

    Visible to the public "Media Giant News Corp Discloses New Details of Data Breach"

    Media giant News Corp has recently disclosed new details about a data breach discovered last year and attributed to a state-sponsored threat actor. In early 2022, News Corp revealed that hackers had managed to steal corporate data from its systems but claimed that financial and customer information was not compromised. The incident was discovered in January 2022, and cybersecurity firm Mandiant was called to assist with the investigation. The company said at the time that the attack had been tied to a foreign government, and Mandiant clarified that it appeared to be the work of a Chinese group. The cyberattack hit News Corp headquarters, news operations in the UK, and News Corp-owned businesses such as The Wall Street Journal, Dow Jones, and New York Post. The media giant last week started sending out data breach notices to individuals whose data may have been compromised. The notice reveals that the hackers gained access to a business email and document storage system used by several News Corp businesses. The attackers accessed business documents and emails between February 2020 and January 2022. The company noted that the compromised information came from a "limited number" of personnel accounts on the affected system. Some personal information may have been obtained by the attackers, including name, date of birth, Social Security number, passport number, driver's license number, financial account information, health insurance details, and medical information. The company noted that not every type of information was compromised in each individual's case.

    SecurityWeek reports: "Media Giant News Corp Discloses New Details of Data Breach"

  • news

    Visible to the public "Governments Targeted by Discord-Based Threat Campaign"

    According to security researchers at Menlo Security, an unknown threat actor is targeting APAC and North American governments with info-stealing malware and ransomware. The researchers noted that the group's attacks begin with a phishing email containing a malicious Discord link, which points to a password-protected zip file. That, in turn, contains a .NET malware downloader known as PureCrypter. The researchers stated that the loader will try to download a secondary payload from the group's command and control (C2) infrastructure, which is a compromised domain belonging to a non-profit. Among the malicious payloads observed by the researchers in this campaign are various info-stealers and ransomware variants: Redline Stealer, AgentTesla, Eternity, Blackmoon, and Philadelphia ransomware. In the sample analyzed by the researchers, PureCrypter attempts to download AgentTesla, an advanced backdoor designed to steal browser-based passwords, as well as take screen captures and log keystrokes. The researchers stated that in their investigation, they found that AgentTesla establishes a connection to an FTP server where it stores the stolen victim's credentials. The FTP server appears to have been taken over, and the leaked credentials for the domain were found online, thus suggesting that the threat actors used these credentials to gain access to the server. The researchers noted that the FTP server was also seen in a campaign using OneNote to deliver malware. Attackers have been sending phishing emails with links to malicious OneNote files that can download additional malware or steal information from the victim's device. Altogether, the researchers found 106 files using said FTP server.

    Infosecurity reports: "Governments Targeted by Discord-Based Threat Campaign"

  • news

    Visible to the public "Can AI Really Be Protected from Text-Based Attacks?"

    Microsoft's Bing Chat, an Artificial Intelligence (AI)-powered chatbot co-developed with OpenAI, was not available for long before users devised ways to break it. Users got it to declare love, threaten harm, and more by providing carefully crafted inputs. The question is whether or not AI can ever be protected from these malicious prompts. It was triggered by malicious prompt engineering, or when an AI, such as Bing Chat, that uses text-based instructions or prompts to do tasks, is deceived by adversarial prompts. Bing Chat was not designed to write neo-Nazi propaganda, but because it was trained on enormous volumes of material from the Internet, it is prone to sliding into undesirable patterns. Adam Hyland, a Ph.D. student in the Human Centered Design and Engineering program at the University of Washington, compared prompt engineering to an escalation of privilege attack. In a privilege escalation attack, a hacker gains access to resources, such as memory, typically restricted to them because an audit did not capture all possible exploits. According to Hyland, the behavior of Large Language Models (LLMs) such as Bing Chat is not well understood. The interaction being exploited is the LLM's response to text input. The models are designed to continue text sequences. An LLM such as Bing Chat or ChatGPT generates the expected response based on the data provided by the designer and the user's prompt string. Some of the prompts resemble social engineering hacks, as if one were attempting to mislead a human into divulging their secrets. This article continues to discuss the protection of AI from text-based attacks.

    TechCrunch reports "Can AI Really Be Protected from Text-Based Attacks?"

  • news

    Visible to the public "Researchers Looking Into Cybersecurity of Canada's Power, IoT Sectors"

    Researchers at a Quebec university are looking into how prepared power utilities are for cyberattacks, as well as the security of wireless industrial Internet-connected devices. Ottawa recently announced that it gave the University of Sherbrooke the second half of just under $2 million for the study. One project is evaluating the resiliency of Hydro Sherbrooke, a medium-sized power distributor, in the context of Industry 4.0, specifically its ability to detect new threats. Industry 4.0 refers to the incorporation of new technologies such as Internet of Things (IoT) devices, cloud computing, and Artificial Intelligence (AI) into a company's production centers and general operations. The second project analyzes the security of industrial IoT devices with 5G connectivity and edge computing. It involves exploring the applications of the devices in agriculture, water management, and building management. Bell Canada, VMware, Honeywell, and the cities of Sherbrooke and Magog, Quebec, are partners in this study. Lessons learned from both projects will be shared with the power, telecommunications, and Information Technology (IT) manufacturing industries. This article continues to discuss the new projects investigating the readiness of power utilities to face cyberattacks and the security of wireless industrial Internet-connected devices.

    IT World Canada reports "Researchers Looking Into Cybersecurity of Canada's Power, IoT Sectors"

  • news

    Visible to the public Pub Crawl #71


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Possible New Lazarus Group Backdoor Found"

    Researchers discovered a new payload delivered by the Wslink malware downloader and believe it is part of the toolset maintained and deployed by the Lazarus Group, which is associated with North Korea. ESET researchers found the Wslink loader in 2021, which has a few unique features, the most notable of which is its ability to run as a server rather than a client. Wslink, like other loaders, allows the actors who deploy it to download and install additional malware or tools onto a compromised machine. The researchers were unable to find the payload that Wslink delivered when ESET examined the loader, but they recently discovered one, which they dubbed WinorDLL64. The payload was discovered on a small number of victim machines in locations previously targeted by the Lazarus Group, including Europe and North America. There are also some code commonalities between WinorDLL and other samples used by the Lazarus Group, such as Bankshot and GhostSecret. The ESET researchers discovered several behavioral parallels with known Lazarus Group tools, but they were not certain that WinorDLL was used by the gang. This article continues to discuss the new payload delivered by the Wslink malware downloader, possibly part of the cache of tools maintained and deployed by the Lazarus Group.

    Decipher reports "Possible New Lazarus Group Backdoor Found"

  • news

    Visible to the public "Investment Scams Drive $9bn in Fraud in 2022"

    According to new data from the FTC, Americans lost $8.8bn to fraud last year, with investment scams ($3.8bn) being the biggest money-maker for fraudsters. The FTC stated that investment fraud had surged by over 100% from 2021 when the figure stood at $1.8bn. "Impoter scams" was second place on the FTC list, which garnered $2.8bn, up slightly from 2021 figures of $2.4bn. Imposter scams include calls, texts, or emails where a victim is contacted out of the blue by a scammer pretending to be someone else and socially engineered into handing over their personal and financial information or paying the fraudster directly. The FTC noted that losses to business imposters were particularly high, climbing from $453m in 2021 to $660m in 2022. Overall, the FTC's Consumer Sentinel Network received 5.2 million reports in 2022. Identity theft reports were most common, followed by notification of imposter scams and then problems with credit bureaus and info furnishers. A total of 2.4 million fraud reports were filed with the FTC in 2022, a quarter (26%) of which involved financial losses. The agency said the $8.8bn figure works out to a median loss of $650 per victim. However, the FTC noted that it is much higher ($1400) for scams carried out over the phone, highlighting the danger of vishing calls, tech support scams, and other tactics designed to trick recipients. The FTC found that younger people reported losing money more often to fraudsters than their elders: 43% of 20-29-year-olds did so, versus 23% of 70-79-year-olds. However, when the latter group did suffer a loss, it was far greater, $1000, versus $548 for the younger group. The median loss for those aged 80+ was even higher still, at $1674.

    Infosecurity reports: "Investment Scams Drive $9bn in Fraud in 2022"

  • news

    Visible to the public "Intel Paid Out Over $4.1 Million via Bug Bounty Program Since 2017"

    Intel has reported recently that it has paid out more than $4.1 million through its bug bounty program since its creation in 2017. Intel noted that, on average, between 2018 and 2021, they paid $800,000 through its bug bounty program each year for vulnerabilities discovered in the company's products. In 2022, it awarded $935,000. Intel says a total of 243 vulnerabilities were reported in 2022, roughly the same as in the previous three years. Intel noted that more than half of the 2022 vulnerabilities were found internally by them, and 90 security flaws, representing 37% of the total, were reported via its bug bounty program. The company engaged 151 researchers last year, more than double compared to the previous three years. Intel stated that most of the vulnerabilities were discovered in Intel software, processors, and network communications products. Only two issues were assigned a "critical" severity rating, but 79 were classified as having "high" severity. Intel has helped create a hardware common weakness enumeration (CWE) list, and 19 of the hardware vulnerabilities addressed last year were assigned to 13 hardware CWEs.

    SecurityWeek reports: "Intel Paid Out Over $4.1 Million via Bug Bounty Program Since 2017"

  • news

    Visible to the public "Firms Who Pay Ransom Subsidise 10 New Attacks: Report"

    During a new study, security researchers at Trend Micro found that just 10% of ransomware victims pay their extorters, but those who do are effectively funding 6-10 new attacks. The researchers noted that those who did decide to pay the ransom usually did so quickly to avoid severe disruption to their infrastructure and services. Over half of the victims who paid the ransom paid the threat actors within 20 days. The researchers stated that given the low number of victims who pay, threat actors are generally forced to demand more money per compromise. The researchers indicated that it is essential to remember that paying the ransom only drives up the overall incident cost for victims. During the study, the researchers also found that over the past two years, ransomware monetization activities have been lowest in January and from July to August. The researchers noted that these times are potentially the best periods for network defenders to rebuild infrastructure or take vacations.

    Infosecurity reports: "Firms Who Pay Ransom Subsidise 10 New Attacks: Report"

  • news

    Visible to the public "Hackers Could Try to Take over a Military Aircraft; Can a Cyber Shuffle Stop Them?"

    Many aircraft, spacecraft, and weapons systems contain an onboard computer network referred to as military standard 1553, sometimes known as MIL-STD-1553 or just 1553. The network is a tried-and-true protocol for enabling communications between systems such as radar, flight controls, and the heads-up display. According to Chris Jenkins, a Sandia cybersecurity scientist, securing these networks against a cyberattack is a national security issue. He said that if a hacker took control of 1553 mid-flight, the pilot would lose control of critical aircraft systems. Several researchers across the US are developing protections for systems that use the MIL-STD-1553 protocol. Chris and his Sandia team recently collaborated with Purdue University researchers in West Lafayette, Indiana, to test an idea that could protect these critical networks. Their findings, which were recently published in the scientific journal IEEE Transactions on Dependable and Secure Computing, show that when used correctly, a technique known in the cybersecurity realm as Moving Target Defense (MTD) can effectively secure MIL-STD-1553 networks against a Machine Learning (ML) algorithm. This article continues to discuss the collaborative work on a moving target defense that makes a computer network commonly used on many aircraft, spacecraft, and weapons systems less vulnerable to cyberattacks.

    Sandia National Laboratories reports "Hackers Could Try to Take over a Military Aircraft; Can a Cyber Shuffle Stop Them?"

  • news

    Visible to the public "61 Percent of Americans Rely on Free Antivirus Programs"

    According to a new report on the antivirus industry from Security.org, nearly three-quarters of Americans strongly believe computers require antivirus to protect their devices, and 61 percent rely on free solutions such as Microsoft Defender. The percentage of people who choose free solutions has remained stable, falling by only one point since 2021. Just 8 percent of free antivirus users had encountered a breakthrough virus in the last year, compared to 10 percent of paying users. An estimated 33 million households pay for antivirus software. Several paid programs are delivered in Internet security suites that include extra features to improve Internet security, such as Virtual Private Networks (VPNs), password managers, and secure browsers. According to the report, which is based on a survey of more than 1,000 people in the US, 7 percent of people will be in the market for antivirus software in the next six months, amounting to an estimated 16 million Americans, indicating that this is still a large market despite the popularity of free solutions. The study's authors concluded that antivirus programs remain a dominant protection solution for American computer users. Yet, there has been a progressive shift toward using proprietary security products instead of paid security products. This article continues to discuss findings from the new report on the antivirus market.

    BetaNews reports "61 Percent of Americans Rely on Free Antivirus Programs"

  • news

    Visible to the public "Hacked Russian Radio Stations Broadcast Fake Air Raid Warnings"

    Radio stations in multiple Russian cities were recently hacked to broadcast fake air raid warnings. Air raid alerts were heard in Belgorod, Kazan, Novosibirsk, Penza, Magnitogorsk, Ufa, Voronezh, Nizhny Novgorod, Tyumen, Izhevsk, and other cities, according to the Russian state news agency RIA Novosti. Radio stations, including Relax FM, Funny FM, Business FM, Like FM, Comedy FM, Romantika, Avtoradio, Radio Energy, and Children's Radio, were hacked. According to RIA Novosti, many stations are owned by Gazprom Media. The Russian Ministry of Emergency Situations verified the hack in a Telegram post, but provided no other details or attribution. This is not the first time hackers have infiltrated Russian radio stations or breached other Russian systems. For example, a hacker took over Kommersant FM radio in June 2022, blasting the Ukrainian anthem and anti-war songs. As a result, the company briefly discontinued its air programming for a few hours. This article continues to discuss the recent hacking of Russian radio stations to broadcast fake air raid warnings.

    Cybernews "Hacked Russian Radio Stations Broadcast Fake Air Raid Warnings"

  • news

    Visible to the public "11 Countries Take Part in Military Cyberwarfare Exercise"

    The biggest military cyberwarfare exercise in Western Europe recently took place in Estonia. A total of 34 teams from 11 countries took part in a live-fire cyber battle. Countries such as the US, UK, Japan, India, Italy, Estonia, Ukraine, Ghana, Kenya, and Oman were represented by 750 experts at the Defence Cyber Marvel 2 (DCM2) exercise. Many of them participated remotely. The seven-day event was led by the British Army and tested participants' responses to common and complex cyber scenarios, including attacks on networks and industrial control systems (ICS). One scenario simulated in NATO's CR154 cyber range involved attacks on uncrewed robotic systems, a tactic used by Russia to disrupt Ukrainian cyberspace in the early days of its invasion. The participating teams competed against each other and were judged based on their speed in identifying and responding to cyber threats. A team from Italy was declared the winner, followed by teams representing Estonia and the UK.

    SecurityWeek reports: "11 Countries Take Part in Military Cyberwarfare Exercise"