News Items

  • news

    Visible to the public "Researchers Find Worrying Vulnerabilities in Key 6G Technology"

    Hackers could conduct two novel types of attack by exploiting vulnerabilities in programmable metasurfaces, a technology that will play a crucial role in deploying 6G networks. Programmable metasurfaces are electromagnetic surfaces designed to be incorporated into objects, such as wallpaper or window glass, to optimize communication channels. This technology could become essential to maximizing the future potential of 6G. It is expected that speeds will be orders of magnitude faster than even the most advanced 5G home broadband and wireless networks. According to researchers from Peking University, the University of Sannio, and Southeast University, metasurfaces can also be used to launch attacks against wireless networks. Their paper, published in Nature Electronics, demonstrates both active and passive attacks, with metasurfaces at the core of both. This article continues to discuss the metasurface-based attacks that could let hackers intercept wireless interactions.

    TechRadar reports "Researchers Find Worrying Vulnerabilities in Key 6G Technology"

  • news

    Visible to the public "Ohio History Organization Says Personal Information Stolen in Ransomware Attack"

    Ohio History Connection (OHC) has recently confirmed that the personal information of thousands of individuals was stolen in a July ransomware attack and later posted online. A nonprofit organization, OHC manages the Ohio History Center, the primary museum for Ohio's history, and 50 museums and sites across the state. The organization is headquartered in Columbus, where the Ohio History Center is located. The organization stated that data on its internal servers was encrypted and stolen in a ransomware attack in July. OHC noted that the attackers threatened to post the stolen information online, demanding millions of dollars to be paid as ransom. OHC did make an offer to the cybercriminals to prevent the release of the data. On August 7, the cybercriminals rejected the offer. The organization stated that the personal information of certain stakeholders may now be accessible to those who may be looking for it. The compromised information includes the names, addresses, and Social Security numbers of current and former employees (between 2009 and 2023), along with the names and Social Security numbers of third-party vendors providing services to the organization. The organization stated that the threat actor also may have gained access to images of checks provided to OHC by some members and donors beginning in 2020. The organization estimates that roughly 7,600 individuals might have been affected by the incident. OHC says it has reported the attack to the relevant authorities and has retained an IT consulting firm to help with the investigation.

    SecurityWeek reports: "Ohio History Organization Says Personal Information Stolen in Ransomware Attack"

  • news

    Visible to the public "KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced Capabilities"

    An updated version of the botnet malware KmsdBot is now targeting Internet of Things (IoT) devices, simultaneously expanding its attack surface and capabilities. Akamai security researcher Larry W. Cashdollar noted that the binary now supports Telnet scanning and more CPU architectures. The most recent variant, which has been observed since July 16, 2023, arrives months after it was discovered that the botnet is being offered as a Distributed Denial-of-Service (DDoS)-for-hire service to other threat actors. Its effectiveness in real-world attacks is suggested by the fact that it is actively maintained. First documented in November 2022, KmsdBot is mainly designed to target private gaming servers and cloud hosting providers. However, it has since set its sights on some Romanian government and Spanish educational sites. This article continues to discuss the updated version of the KmsdBot botnet malware.

    THN reports "KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced Capabilities"

  • news

    Visible to the public "Uncovering a Privacy-Preserving Approach to Machine Learning"

    In the era of data-driven decision-making, businesses are leveraging the power of Machine Learning (ML) to uncover valuable insights, increase operational efficiencies, and solidify their competitive advantage. Even though recent advancements in generative Artificial Intelligence (AI) have raised awareness about the power of AI/ML, they have also shed light on the need for privacy and security. Groups such as IAPP, Brookings, and Gartner's recent AI TRiSM framework have outlined key considerations for organizations seeking to achieve the business outcomes made possible by AI without increasing their risk profile. ML model security is at the forefront of these requirements. Privacy-preserving ML has emerged as a means to ensure that users can maximize the potential of ML applications in this increasingly crucial field. This article continues to discuss using ML to generate insights, vulnerabilities in ML models, and privacy-enhancing technologies.

    Help Net Security reports "Uncovering a Privacy-Preserving Approach to Machine Learning"

  • news

    Visible to the public "Mom's Meals Discloses Data Breach Impacting 1.2 Million People"

    PurFoods, which conducts business in the US as 'Mom's Meals,' has issued a data breach warning after ransomware compromised the personal information of 1.2 million customers and employees. Mom's Meals is a medical meal delivery service for individuals eligible for government assistance through the Medicaid and Older Americans Act programs, as well as self-paying customers. The company warns that it discovered suspicious activity on its networks on February 22, 2023, when ransomware encrypted files on its systems. July 10, 2023, concluded a more in-depth investigation that confirmed hackers had accessed payment card information, Medicare identification, health information, and more. This article continues to discuss the Mom's Meals data breach.

    Bleeping Computer reports "Mom's Meals Discloses Data Breach Impacting 1.2 Million People"

  • news

    Visible to the public "Legal Liability for Insecure Software Might Work, but It's Dangerous"

    According to Contrast Security's CTO Jeff Williams, ensuring security in the software market is crucial, but it is essential to strike a balance that avoids excessive government regulation and the burdens of government-mandated legal responsibility, also known as a liability regime. The market is flawed in regard to security, and intervention is necessary but Williams says a less intrusive approach allows the market to determine the right level of security while minimizing the need for heavy-handed government intervention. Imposing a liability regime on software companies may be excessive and result in unintended outcomes. The disadvantages of liability, such as increased costs, the possibility of legal disputes, and innovation disincentives, can impede the development of secure software without necessarily ensuring improved security outcomes. A liability regime could also disproportionately burden smaller companies and stunt the software industry's diversity and innovation. This article continues to discuss insights regarding the potential unintended consequences of imposing government-regulated security requirements on software companies.

    Dark Reading reports "Legal Liability for Insecure Software Might Work, but It's Dangerous"

  • news

    Visible to the public "3 Cryptocurrency Firms Suffer Data Breach After Kroll SIM Swapping Attack"

    Three bankrupt cryptocurrency companies, FTX, BlockFi, and Genesis, have suffered data breaches following a SIM swapping attack that targeted risk and financial advisory firm Kroll. Kroll stated that it had learned on August 19 that a threat actor had used SIM swapping to transfer an employee's T-Mobile phone number to a SIM card controlled by the attacker. As a result of the attack, which Kroll described as "highly sophisticated," the hacker was able to use the targeted employee's hijacked phone number to access systems storing files that contained personal information of bankruptcy claimants in the cases of FTX, BlockFi, and Genesis. Kroll said it immediately took action to secure the three customers' accounts and notified impacted individuals via email. In notifications sent out to customers, FTX said the attacker gained access to files storing information such as name, address, email address, and FTX account balance. The company noted that Kroll does not store FTX account passwords, and FTX systems or digital assets are not affected. Shortly after Kroll and the cryptocurrency companies started notifying customers, FTX users reported getting phishing emails claiming they were eligible to start withdrawing funds from their FTX account. Genesis also told customers that their name, address, email address, and claim against Genesis debtors were compromised as a result of the Kroll hack and warned that the information could be leveraged for phishing emails and other scams. BlockFi has also issued a statement warning customers about a likely uptick in phishing attempts and spam phone calls due to this incident.

    SecurityWeek reports: "3 Cryptocurrency Firms Suffer Data Breach After Kroll SIM Swapping Attack"

  • news

    Visible to the public "3 Malware Loaders Detected in 80% of Attacks: Security Firm"

    According to security researchers at ReliaQuest, QakBot, SocGholish, and Raspberry Robin are the three most popular malware loaders among cybercriminals, accounting for 80% of the observed attacks. The researchers noted that from January 1 to July 31, 2023, QakBot was responsible for 30% of the observed incidents, SocGholish for 27%, and Raspberry Robin for 23%. The researchers stated that not all observed incidents resulted in network compromise, as the loader was detected and stopped before it could cause problems. QuakBot has been active since 2009 and was initially a banking trojan but later evolved into a malware loader that can deploy additional payloads, steal sensitive information, and enable lateral movement. SocGholish has been active since at least 2018 and is deployed via drive-by downloads, using a wide network of compromised websites offering fake updates. The researchers noted that during the first half of 2023, SocGholish's operators were observed conducting aggressive watering hole attacks, leveraging the compromised websites of large organizations. A Windows worm initially observed in September 2021, Raspberry Robin, mainly spreads via removable devices, such as USB drives, and has been linked to various threat actors, including Evil Corp and Silence. The researchers noted that in addition to these three loaders, Gootloader, Chromeloader, Guloader, and Ursnif were also highly active during the first seven months of the year.

    SecurityWeek reports: "3 Malware Loaders Detected in 80% of Attacks: Security Firm"

  • news

    Visible to the public "Helping Policy Makers to Navigate the National Security Challenges Created by AI"

    Artificial Intelligence (AI)-based Large Language Models (LLMs) that drive chatbots such as ChatGPT could pose security risks if exploited by malicious actors. For example, an LLM can be tricked into generating malicious content, an activity known as prompt hacking. The misuse of LLMs is likely to increase, which is one security risk being explored by Turing's Centre for Emerging Technology and Security (CETaS). CETaS aims to help policymakers understand the risks and opportunities presented by AI and other emerging technologies, as well as respond accordingly. Other risks posed by AI include its potential to bolster the cyber offensive capabilities of adversaries and exacerbate disinformation. Policies must strike a balance between mitigating security risks and maximizing the societal benefits of these technologies. AI provides the security community opportunities to address emerging security risks more effectively by enhancing cyber defensive capabilities, automating software development for use within the intelligence and national security community, and more. The approach at CETaS is multidisciplinary and based on evidence, as policymakers require reliable recommendations informed by various perspectives. This article continues to discuss the efforts of Turing's CETaS to help policymakers navigate the security challenges AI creates.

    The Alan Turing Institute reports "Helping Policy Makers to Navigate the National Security Challenges Created by AI"

  • news

    Visible to the public "CS Researchers Highlight Vulnerabilities in AI-powered Wireless Networks"

    A study led by professors Deepak Vasisht and Gagandeep Singh of the Department of Computer Science (CS) at the University of Illinois Urbana-Champaign uncovered significant vulnerabilities in next-generation wireless systems that rely on Artificial Intelligence (AI). The groundbreaking research found that small amounts of noise transmitted by a malicious user can disrupt services provided by AI-powered wireless networks. Their paper, "Exploring Practical Vulnerabilities of Machine Learning-based Wireless Systems," covers how slight interference or noise can compromise AI-integrated wireless systems such as 4G, 5G, and Wi-Fi. This article continues to discuss the study on vulnerabilities in AI-powered wireless networks.

    The University of Illinois Urbana-Champaign reports "CS Researchers Highlight Vulnerabilities in AI-powered Wireless Networks"

  • news

    Visible to the public "How Ubiquitous Keyboard Software Puts Hundreds of Millions of Chinese Users at Risk"

    For millions of Chinese people, the first software they install on a new laptop or smartphone is a keyboard app. However, only some know this may make the text they type vulnerable to eavesdropping. The standard QWERTY keyboard by itself is inefficient since dozens of Chinese characters can share the same latinized phonetic spelling. A localized keyboard app can save time and frustration by predicting the characters and words a user wants to type. About 800 million Chinese people use third-party keyboard apps on different devices. A recent report by the Citizen Lab, a technology and security research group affiliated with the University of Toronto, revealed that Sogou, one of the most popular Chinese keyboard apps, had a significant security flaw. According to the researchers, Sogou's encryption system could be exploited to intercept and decrypt what users were typing in real-time. This article continues to discuss findings regarding the keyboard software putting hundreds of millions of Chinese users at risk.

    MIT Technology Review reports "How Ubiquitous Keyboard Software Puts Hundreds of Millions of Chinese Users at Risk"

  • news

    Visible to the public "Light Might Be the Answer to Our Data Security Issues, Quantum Researcher Says"

    In a world driven by data, protecting digitized lives and resources is crucial, especially as Artificial Intelligence (AI) and quantum computing technologies mature. Therefore, University of Calgary alum Jordan Smith and his team in the Faculty of Science are developing an AI-resistant and quantum-secure cybersecurity solution through their company, Quantized Technologies Inc. (QTI), to prevent the decryption of customer data. QTI's technology encrypts data with quantum photons (light particles) that rely on physics rather than mathematics to protect against data threats. This hardware and software combination distributes encryption keys to legitimate users so that even the system's other parts cannot read the key (zeroes and ones), preventing hackers from gaining access to the key and decrypting data. In addition, QTI's hardware is more cost-effective than existing Quantum Key Distribution (QKD) approaches to encryption because multiple users can be connected to a single photon detection device, as opposed to each user requiring their own. This article continues to discuss QTI's work on an AI-resistant and quantum-secure cybersecurity solution.

    The University of Calgary reports "Light Might Be the Answer to Our Data Security Issues, Quantum Researcher Says"

  • news

    Visible to the public "Discord Starts Notifying Users Affected by March Data Breach"

    Discord has recently started reaching out to users affected by a data breach disclosed earlier this year to let them know what Personal Identifying Information (PII) was exposed in the incident. Discord noted that the breach stemmed from a security breach at a third-party service provider detected on March 29, involving the compromise of an account belonging to a customer support agent. This incident was subsequently disclosed on May 12 through emails sent to potentially affected individuals. Discord noted that the attackers gained access to the agent's support ticket queue, user email addresses, messages they exchanged with Discord support, and support ticket attachments.

    BleepingComputer reports: "Discord Starts Notifying Users Affected by March Data Breach"

  • news

    Visible to the public "New Quantum Device Generates Single Photons and Encodes Information"

    A new approach to quantum light emitters generates a stream of circularly polarized single photons, or light particles, which may be useful for various quantum information and communication applications. To realize this chiral quantum light source, a team at Los Alamos National Laboratory stacked two different atomically thin materials. The polarization state is a means of encoding the photon, so this accomplishment is a significant step toward quantum cryptography and quantum communication. This article continues to discuss the advancement toward using single photons in quantum communication and information processing.

    Los Alamos National Laboratory reports "New Quantum Device Generates Single Photons and Encodes Information"

  • news

    Visible to the public "Multi-Hospital Ransom Attack in US Claimed by Rhysida Gang"

    The Rhysida ransomware group has claimed responsibility for the early August ransomware attack on California-based Prospect Medical Holdings (PMH), a multi-state conglomerate with more than a dozen hospitals and over 150 outpatient facilities. In addition to recently listing PMH as a victim on their dark leak site, the threat actor organized a live auction to sell more than two terabytes of data allegedly stolen from the attack. According to a warning bulletin issued by the US Department of Health and Human Services (HHS), Rhysida is new to the realm of ransomware. Rhysida is suspected of being connected to the Vice Society ransomware gang known for targeting the education sector, mainly in the US, Canada, and the UK. This article continues to discuss the Rhysida ransomware group claiming responsibility for the recent multi-hospital attack and observations surrounding the threat actor.

    Cybernews reports "Multi-Hospital Ransom Attack in US Claimed by Rhysida Gang"

  • news

    Visible to the public "Nearly 1,000 Organizations, 60 Million Individuals Impacted by MOVEit Hack"

    According to security researchers at Emsisoft, as of August 24, 988 organizations and 59,200,000 individuals have been impacted by the recent MOVEit campaign conducted by the Russian-speaking Cl0p ransomware group. The researchers noted that these numbers include both directly and indirectly impacted entities. The researchers created a list of organizations that may have exposed the information of more than one million individuals: Maximus, Pole Emploi, Louisiana Office of Motor Vehicles, Colorado Department of Health Care Policy and Financing, Oregon Department of Transportation, Teachers Insurance and Annuity Association of America, Genworth, PH Tech, Milliman Solutions, and Wilton Reassurance Company. Cl0p, which is estimated to have earned as much as $100 million as a result of this campaign, has started leaking the data of victims who have refused to pay up. The researchers stated that on August 14 and 15, the cybercriminals leaked nearly 1 Tb of information allegedly stolen from 16 of the victims. These victims include UCLA, Siemens Energy, Cognizant, and cybersecurity firms Norton LifeLock and Netscout.

    SecurityWeek reports: "Nearly 1,000 Organizations, 60 Million Individuals Impacted by MOVEit Hack"

  • news

    Visible to the public "Google Workspace Introduces New AI-Powered Security Controls"

    Google recently introduced new AI-powered security controls for its Workspace customers, targeting zero trust, digital sovereignty, and threat defense. Google stated that the new AI-powered zero trust capabilities are meant to provide organizations with more granular control over how data is accessed and used. Google noted that to ensure data protection and prevent inappropriate sharing of data in Google Drive, Google AI can now be used to automatically and continuously classify and label new and existing files and then apply necessary controls based on the organization's security policies. Later this year, Gmail will receive enhanced DLP controls to improve control over the sharing of sensitive information, both inside and outside the organization. Google also announced new digital sovereignty controls to help prevent unauthorized access to sensitive data, storing encryption keys, selecting where data is processed, and limiting Google support access. To prevent third-party access to sensitive data, Google is introducing new client-side encryption (CSE) improvements, such as generally available support of mobile apps in Google Calendar, Gmail, and Meet, or the ability to view, edit, or convert Excel files. To improve protections against account takeover, later this year, the internet giant will make two-step verification (2SV) mandatory for select administrator accounts of resellers and largest enterprise customers and will enable multi-party approval for sensitive administrator actions. Google also announced the availability of automated protections for sensitive actions in Gmail, including filtering and forwarding and the ability to export Workspace logs into Chronicle.

    SecurityWeek reports: "Google Workspace Introduces New AI-Powered Security Controls"

  • news

    Visible to the public "VDP Platform 2022 Annual Report Showcases Platform's Success"

    Security researchers are always discovering and facilitating the mitigation of vulnerabilities in products and websites. They help vendors and defenders fix problems before adversaries exploit them to inflict harm. In 2019, the US Cybersecurity and Infrastructure Security Agency (CISA) released Binding Operational Directive (BOD) 20-01, requiring federal civilian agencies to develop and publish a Vulnerability Disclosure Policy (VDP). CISA then launched a government-wide VDP Platform in July 2021 to provide federal agencies with a streamlined shared service aimed at supporting the receipt and adjudication of VDP submissions. CISA has released its first VDP Platform 2022 Annual Report, highlighting the service's progress in promoting vulnerability awareness and remediation across the federal enterprise. The VDP Platform has experienced significant growth, receiving over 1,330 unique valid disclosures, of which about 85 percent have been remediated. Through December 2022, the VDP Platform facilitated the remediation of more than 1,000 vulnerabilities, including those in CISA's known exploited vulnerabilities catalog. This article continues to discuss the success of CISA's VDP Platform.

    CISA reports "VDP Platform 2022 Annual Report Showcases Platform's Success"

  • news

    Visible to the public "China-Linked Flax Typhoon Cyber Espionage Targets Taiwan's Key Sectors"

    A China-based hacking group has been linked to cyberattacks on dozens of Taiwanese organizations as part of a suspected espionage campaign. The Microsoft Threat Intelligence team tracks the activities under the name Flax Typhoon, also known as Ethereal Panda. According to the company, Flax Typhoon operates with minimal use of malware and relies on tools built into the operating system to quietly remain in victims' networks. Microsoft has not observed the group use the access for data collection and exfiltration. Taiwan's government agencies, educational institutions, critical manufacturing, and Information Technology (IT) companies account for most targets. The group is believed to have been operating since mid-2021. This article continues to discuss findings and observations regarding Flax Typhoon.

    THN reports "China-Linked Flax Typhoon Cyber Espionage Targets Taiwan's Key Sectors"

  • news

    Visible to the public "Jupiter X Core WordPress Plugin Could Let Hackers Hijack Sites"

    Two vulnerabilities impacting Jupiter X Core, a premium plugin for configuring WordPress and WooCommerce websites, enable account hijacking and file uploading without authentication. Jupiter X Core is a simple but powerful visual editor, which is part of the Jupiter X theme used in over 172,000 websites. Rafie Muhammad, an analyst with the WordPress security company Patchstack, uncovered the two vulnerabilities and reported them to ArtBee, the Jupiter X Core developer, who fixed the flaws earlier this month. The first vulnerability, tracked as CVE-2023-38388, allows for uploading files without authentication, potentially leading to the execution of arbitrary code on the server. The second vulnerability, tracked as CVE-2023-38389, allows unauthenticated attackers to take control of any WordPress user account if the email address is known. This article continues to discuss the potential impact of the Jupiter X Core vulnerabilities.

    Bleeping Computer reports "Jupiter X Core WordPress Plugin Could Let Hackers Hijack Sites"

  • news

    Visible to the public "Cybersecurity Insurance Is Missing the Risk"

    Cybersecurity insurance is a rapidly developing market, expected to rise from around $13 billion in 2022 to $84 billion in 2030. However, insurers have difficulty quantifying the possible risks of this type of insurance. Traditional actuary models do not work well in an environment where highly driven, creative, and sophisticated attackers dynamically pursue activities resulting in insurable events. Accurate loss estimation is critical for establishing customer premiums, but even after two decades, insurers' loss ratios vary significantly. Underwriting processes must be more robust to estimate losses and price reasonable premiums accurately. This article continues to discuss cybersecurity insurance challenges and the next generation of this type of insurance.

    Help Net Security reports "Cybersecurity Insurance Is Missing the Risk"

  • news

    Visible to the public "Ransomware With an Identity Crisis Targets Small Businesses, Individuals"

    Researchers have discovered a new strain of ransomware dating back to 2019. It targets individuals and small organizations, demanding small ransoms from each victim. Researchers from the security and operations analytics company Netenrich recently revealed that TZW is the latest strain of the Adhubllka ransomware family, which first surfaced in January 2020 but was already active the year before. Even more significant than the strain's discovery is the process that researchers used to correctly identify it. Many Adhubllka samples have been misclassified and/or mistagged into other ransomware families throughout the years, according to Rakesh Krishnan, senior threat analyst at Netenrich. This article continues to discuss findings regarding the latest version of Adhubllka.

    Dark Reading reports "Ransomware With an Identity Crisis Targets Small Businesses, Individuals"

  • news

    Visible to the public "Malicious AI Arrives on the Dark Web"

    Malicious non-state actors are using Artificial Intelligence (AI) to amplify their malicious activities. Since the release of OpenAI's ChatGPT last year, there has been much discussion on the dark web about methods involving this technology. Dark web users have shared tips on jailbreaking the technology to evade safety and ethical limitations and use it for more sophisticated malicious activity. A new generation of AI-powered tools and applications has emerged that aim to satisfy cybercriminals' needs. On July 13, the first of these tools, WormGPT, surfaced on the dark web. WormGPT is based on the open-source GPT-J Large Language Model (LLM) developed in 2021. It is marketed as a 'blackhat' alternative to ChatGPT with no ethical limits. Allegedly trained on malware data, its primary applications are to generate advanced phishing and business email attacks, as well as to write malicious code. FraudGPT first appeared for sale on the dark web on July 22, following WormGPT's release. Based on GPT-3 technology, FraudGPT is advertised as an advanced bot for offensive purposes. Its uses include creating undetectable malware, developing hacking tools, discovering security flaws, and more. This article continues to discuss new malicious AI tools.

    The Australian Strategic Policy Institute reports "Malicious AI Arrives on the Dark Web"

  • news

    Visible to the public "Hacking Group KittenSec Claims to 'Pwn Anything We See' to Expose Corruption"

    In the past month, a hacking group known as "KittenSec" claims to have attacked government and private sector computer systems in multiple NATO countries, arguing that it is exposing corruption. KittenSec is part of a line of groups hacking government and private targets worldwide, contributing to the overall increase in hacktivism. Representatives of KittenSec told CyberScoop that the group is new but has connections to other hacktivist groups, including ThreatSec and GhostSec. According to the representatives, KittenSec has about a dozen members. The group has struck targets whose governments it deems corrupt, but KittenSec's representatives insist they have no ties to any country. This article continues to discuss the KittenSec hacking group.

    CyberScoop reports "Hacking Group KittenSec Claims to 'Pwn Anything We See' to Expose Corruption"

  • news

    Visible to the public "Fraudsters Can Bypass Biometric Facial Recognition"

    Organizations are increasingly implementing biometrics to streamline and expedite authentication. However, Stuart Wells, CTO of the biometrics authentication company Jumio, identifies potential threats and methods fraudsters may use to circumvent facial recognition. Europol has predicted that by 2026, as much as 90 percent of online content could be artificially generated, making it more difficult for organizations to determine the true identities of individuals. According to Wells, fraudsters can use a "camera injection" technique to inject deepfake videos into the system and deceive biometric and liveness detection tools. This technique involves bypassing a camera's Charged-Coupled Device (CCD) to inject pre-recorded content, a real-time face swap video feed, or entirely fabricated content using deepfake technology. If attackers use camera injection, they can remain undetected without victims being aware of the hack. If malicious actors can evade the verification, they can cause significant damage by stealing identities, creating fake accounts, and more. This article continues to discuss the use of deepfake videos and camera injection attacks by fraudsters.

    Cybernews reports "Fraudsters Can Bypass Biometric Facial Recognition"

  • news

    Visible to the public "More Than 3,000 Openfire Servers Exposed to Attacks Using a New Exploit"

    Vulncheck researchers found over 3,000 Openfire servers vulnerable to attacks due to a path traversal flaw, tracked as CVE-2023-32315. Openfire is a widely used Java-based open-source chat server maintained by Ignite Realtime. The vulnerability impacts the Openfire administration console. An unauthenticated threat actor could exploit the flaw to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment in order to access restricted pages in the Openfire Admin Console, which is reserved for administrative users. According to the researchers, the flaw has been exploited in the wild for over two months. This article continues to discuss the exposure of over 3,000 unpatched Openfire servers to attacks.

    Security Affairs reports "More Than 3,000 Openfire Servers Exposed to Attacks Using a New Exploit"

  • news

    Visible to the public "University of Minnesota Confirms Data Breach, Says Ransomware Not Involved"

    The University of Minnesota has recently confirmed that a threat actor has exfiltrated data from its systems but says no malware infection was identified. The confirmation comes one month after a threat actor boasted about accessing the university's database containing information about students, staff, and faculty. The adversary claimed to have accessed 7 million unique Social Security numbers, as the database contained records the university has been digitizing since 1989. The university claimed that it initially learned about the hacker's claims on July 21 and immediately launched an investigation to verify the validity of the attacker's claims. The university stated that the preliminary assessment is that the data at issue is from 2021 and earlier. The university also said that scans it has performed revealed no ongoing activity related to the incident, and there were no system disruptions. The university noted that its investigation is continuing, but its security professionals have not detected any system malware (including ransomware), encrypted files, or fraudulent emails related to the incident. There have been no known disruptions to current university operations as a result of this data security incident. The educational institution did not say what type of personal information was accessed in the data breach and did not confirm the number of impacted individuals. However, it did say that it would inform all affected parties if it determines that sensitive information might have been compromised.

    SecurityWeek reports: "University of Minnesota Confirms Data Breach, Says Ransomware Not Involved"

  • news

    Visible to the public "NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers"

    Four quantum-resistant algorithms were chosen by the National Institute of Standards and Technology (NIST) last year. The agency has now begun the process of standardizing these algorithms, which is the last step before making these mathematical tools accessible so that organizations worldwide can integrate them into their encryption infrastructure. NIST has released draft standards for three of the four algorithms it selected in 2022. In about a year, a draft standard for FALCON, the fourth algorithm, will be released. The global cryptographic community has until November 22, 2023, to provide feedback on the draft standards. Sensitive electronic information, such as email and bank transfers, is currently protected by public-key encryption techniques based on math problems that a conventional computer cannot readily solve. Although quantum computing is still relatively new, a sufficiently powerful quantum computer could solve these problems and break encryption. Once completed, the new standards will provide the world with the first tools to protect sensitive data from this new type of threat. This article continues to discuss NIST standardizing encryption algorithms that can withstand attack by quantum computers.

    NIST reports "NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers"

  • news

    Visible to the public "Data of 2.6 Million Duolingo Users Leaked on Hacking Forum"

    Data from 2.6 million users of Duolingo, a language learning platform with over 74 million monthly users, was leaked on a hacking forum. The compromised data, which includes real names, login names, email addresses, and internal service-related details, was initially offered for sale on the now defunct Breached hacking forum in January 2023 for $1500. Duolingo stated that these records were obtained by data scraping public profile information and noted that they have no indication that their systems were compromised. According to security researchers, the breach reportedly originated from an exposed application programming interface (API), discovered in March 2023, that enables the retrieval of user profile information. This API inadvertently permitted unauthorized access to email addresses associated with Duolingo accounts. Despite the potential consequences of the breach, Duolingo has not commented on why the API remains accessible even after abuse was reported earlier in the year.

    Infosecurity reports: "Data of 2.6 Million Duolingo Users Leaked on Hacking Forum"

  • news

    Visible to the public "FBI: Unplug Exploited Barracuda ESG Appliances Now"

    The FBI has advised Barracuda customers who are still using the vendor's vulnerable Email Security Gateway (ESG) to remove the appliance from operation. Many of the appliances were hit in a zero-day attack discovered in May. The attack was attributed to a previously unknown China-linked threat group, dubbed UNC4841 by Mandiant. Barracuda released patches for the critical remote command injection vulnerability, tracked as CVE-2023-2868, and informed consumers that compromised appliances would be replaced. However, the FBI's Cyber Division has upped the ante, emphasizing in a flash advisory that "Barracuda customers should remove all ESG appliances immediately" because "the patches released by Barracuda in response to this CVE were ineffective." The FBI noted that it had independently confirmed that all exploited ESG appliances, including those with patches issued by Barracuda, remain vulnerable to computer network compromise by PRC (People's Republic of China) cyber actors suspected of exploiting this vulnerability. This article continues to discuss the FBI's warning about Barracuda ESG appliances.

    SC Media reports "FBI: Unplug Exploited Barracuda ESG Appliances Now"

  • news

    Visible to the public "New Telegram Bot 'Telekopye' Powering Large-scale Phishing Scams from Russia"

    A new operation motivated by financial gain involves a malicious Telegram bot to help threat actors scam their victims. The Telekopye toolkit automates creating a phishing website from a template and sending the URL to potential victims. According to ESET, this toolkit functions as a Telegram bot that, when activated, provides easy-to-navigate menus that can accommodate multiple scammers simultaneously. Evidence suggests that Russia is the toolkit's country of origin due to the use of Russian SMS templates. Multiple variants of Telekopye have been discovered to date, with the earliest dating back to 2015, indicating that it has been actively maintained and used for several years. This article continues to discuss researchers' findings and observations regarding Telekopye.

    THN reports "New Telegram Bot 'Telekopye' Powering Large-scale Phishing Scams from Russia"

  • news

    Visible to the public "North Korea's Lazarus APT Uses GUI Framework to Build Stealthy RAT"

    In recent attacks targeting healthcare organizations and an Internet infrastructure company, the North Korean state-sponsored cyber threat group Lazarus launched a new highly evasive Remote Access Trojan (RAT) called "QuiteRAT." QuiteRAT is an upgraded variant of another RAT the group used in 2022 called "MagicRAT," which was itself a successor to 2021's "TigerRAT." It can steal information about its host machine and user as well as execute commands, and at four to five megabytes, it barely leaves a trace in a target network. According to researchers, QuiteRAT is built on Qt, a framework for designing Graphical User Interfaces (GUIs). The RAT uses this framework as a disguise to avoid malware detection tools. This article continues to discuss findings regarding QuiteRAT.

    Dark Reading reports "North Korea's Lazarus APT Uses GUI Framework to Build Stealthy RAT"

  • news

    Visible to the public "Lack of Visibility Into Cloud Access Policies Leaves Enterprises Flying Blind"

    According to Strata Identity, the top security concern in multi-cloud environments is fragmented access policies, as more than 75 percent of enterprises reported not knowing where applications are deployed or who has access to them. Since last year, the percentage of organizations using a single cloud identity provider (IDP) has decreased from 30 percent to 20 percent. The remaining 80 percent are currently using multiple IDPs to manage enterprise identity. The top three cloud security concerns among enterprises are a lack of visibility into access policies (67 percent), identity-based threats (65 percent), and data privacy regulations (56 percent). This article continues to discuss key findings from Strata Identity regarding cloud security concerns and cloud identity systems.

    Help Net Security reports "Lack of Visibility Into Cloud Access Policies Leaves Enterprises Flying Blind"

  • news

    Visible to the public "New Whiffy Recon Malware Uses Wi-Fi to Triangulate Your Location"

    Cybercriminals responsible for the Smoke Loader botnet are using new malware called Whiffy Recon to triangulate the location of infected devices through Wi-Fi scanning and Google's geolocation Application Programming Interface (API). Google's geolocation API accepts HTTPS requests with Wi-Fi access point information and returns latitude and longitude coordinates to locate devices that do not have GPS. Smoke Loader is a modular malware dropper that has been active for several years. It is mainly used in the initial phases of a compromise to deliver new payloads. In the case of Whiffy Recon, knowing the victim's location could allow for more targeted attacks in specific regions or help intimidate victims by demonstrating tracking ability. This article continues to discuss findings regarding the Whiffy Recon malware.

    Bleeping Computer reports "New Whiffy Recon Malware Uses Wi-Fi to Triangulate Your Location"

  • news

    Visible to the public "Rockwell ThinManager Vulnerabilities Could Expose Industrial HMIs to Attacks"

    Vulnerabilities discovered by researchers at Tenable in Rockwell Automation's ThinManager ThinServer product could be exploited in attacks aimed at industrial control systems (ICS). The researchers found one critical and two high-severity vulnerabilities in ThinManager ThinServer, a thin client and RDP server management software offered by Rockwell. The flaws are tracked as CVE-2023-2914, CVE-2023-2915, and CVE-2023-2917. The researchers describe the security holes as improper input validation issues that can lead to integer overflow or path traversal. The researchers noted that remote attackers can exploit the flaws without prior authentication by sending specially crafted synchronization protocol messages. If the vulnerabilities were exploited, an adversary could cause a denial-of-service (DoS) condition, delete arbitrary files with system privileges, and upload arbitrary files to any folder on the drive where ThinServer.exe is installed. The researchers reported the vulnerabilities in May, and the researchers released technical details on August 17, the same day Rockwell Automation informed customers about the availability of patches.

    SecurityWeek reports: "Rockwell ThinManager Vulnerabilities Could Expose Industrial HMIs to Attacks"

  • news

    Visible to the public "Hosting Provider CloudNordic Loses All Customer Data in Ransomware Attack"

    Danish cloud hosting services provider CloudNordic recently announced that all its systems were rendered unusable following a ransomware attack. The company noted that the attack started on Friday, August 18, and resulted in all its systems and servers being shut down. According to CloudNordic, the attackers took advantage of an ongoing transition to a new data center and likely leveraged an existing, dormant infection to encrypt all systems. The company noted that during the transition, previously separated servers were connected to the company's internal network, providing the attackers with access to the central administration systems and the backup systems, including secondary ones. The firm explained that the attackers succeeded in encrypting all servers' disks, as well as on the primary and secondary backup systems, causing all of their machines to crash and causing them to lose access to all data. CloudNordic says it has no plans to pay a ransom, although its investigation into the attack showed that it cannot recover the lost data. According to the company, the encryption was performed via the administration systems, and there is no evidence that the attackers had access to or exfiltrated any data from the compromised servers. CloudNordic says it has started restoring new systems, including name servers, web servers, and mail servers, to help customers restore their services without moving their domains. CloudNordic warns that the recovery process might take a very long time.

    SecurityWeek reports: "Hosting Provider CloudNordic Loses All Customer Data in Ransomware Attack"

  • news

    Visible to the public "Sensitive Data of 10 Million at Risk After French Employment Agency Breach"

    The French national employment agency, Pole emploi, has recently been hit by a cyberattack potentially exposing critical information of up to 10 million people. Several security researchers have linked the breach to the Clop ransomware gang's MOVEit campaign. The incident is thought to have exposed the names, employment statuses, and social security numbers of six million people who registered with the agency in February 2022 and four million who had been off the register for less than 12 months at the time of the cyberattack. Pole emploi said the security of its information system remains untouched, and welfare payments will continue. The organization also confirmed that the breach does not affect jobseekers' email addresses, phone numbers, passwords, or bank details. Investigations are currently ongoing.

    Infosecurity reports: "Sensitive Data of 10 Million at Risk After French Employment Agency Breach"

  • news

    Visible to the public "Protecting Canada's Energy Infrastructure and Supply Chain From Cyber Attacks"

    Dr. Sebastian Fischmeister, an engineering professor at the University of Waterloo, has been awarded federal funding in support of efforts to protect Canada's critical energy infrastructure and energy sector supply chains from cyberattacks. Dr. Fischmeister and his research team will use the grant to develop an advanced cybersecurity system that identifies threats to the supply chains serving the country's energy sector. The hardware and firmware integrity system will assess critical energy infrastructure equipment and systems for the presence of fraudulent or counterfeit components. In addition, engineers will look for new methods to protect this infrastructure from interference that could cause damage. The team will compare the strengths and limitations of the latest techniques for detecting cyberattacks on supply chains. They will then recommend ways to improve the cybersecurity of companies that rely on electronics containing components sourced outside their region. This article continues to discuss the team's research and development efforts aimed at protecting Canada's energy infrastructure and supply chain from cyber threats.

    The University of Waterloo reports "Protecting Canada's Energy Infrastructure and Supply Chain From Cyber Attacks"

  • news

    Visible to the public "Five Unique Cybersecurity Challenges in Africa"

    The African economy is expected to grow significantly over the next five years. In order to promote financial inclusion with this growth, the continent's financial technologies and infrastructure must undergo security and resilience improvements. The CyLab-Africa initiative, a collaboration between Carnegie Mellon University's (CMU) CyLab Security and Privacy Institute and CMU Africa, seeks to strengthen the cybersecurity of financial systems in Africa and other emerging economies. Assane Gueye, associate teaching professor and co-director of CyLab-Africa, has identified five cybersecurity challenges that Africa must overcome. Cybersecurity is a global concern, but as Africa enters the digital world, the continent faces unique challenges. This article continues to discuss the five cybersecurity challenges unique to Africa.

    Carnegie Mellon University Africa reports "Five Unique Cybersecurity Challenges in Africa"

  • news

    Visible to the public "Palo Alto Networks Closes Door on TunnelCrack"

    Palo Alto Networks has responded to researchers' TunnelCrack Virtual Private Network (VPN) eavesdropping technique demonstrated earlier in August. According to the study, most VPNs could be tricked into leaking traffic. They described two vulnerabilities, one of which enabled traffic to leak on the VPN client side (LocalNet) and the other on the server side (ServerIP). Palo Alto Networks has now issued an advisory noting that the vulnerabilities are product- and configuration-specific. The company says its GlobalProtect agent deployments on iOS, Android, and ChromeOS are not vulnerable to LocalNet attacks. In addition, all platforms running GlobalProtect are safe if they are configured with no direct access to the local network. This article continues to discuss Palo Alto Networks' response to the TunnelCrack VPN eavesdropping technique.

    iTnews reports "Palo Alto Networks Closes Door on TunnelCrack"

  • news

    Visible to the public "Combating Phishing Attacks Using AI and Machine Learning Technologies"

    The advancement of Artificial intelligence (AI) technology and the ease with which the general public can access it has given attackers powerful new capabilities to create more convincing phishing messages for victims. However, AI technology can also be used for good. Before phishing attacks can cause damage to organizations' finances and reputations, defenders are effectively detecting and preventing them. Traditional security solutions cannot completely stop phishing attacks, especially those involving the exploitation of zero-day vulnerabilities. Despite their success in reducing the number of phishing attacks that enable malicious actors to gain access to enterprise Information Technology (IT) environments, many phishing emails can still evade these solutions and reach end users' devices. To use Machine Learning (ML) algorithms to detect phishing attacks, they must be trained on a large dataset of normal (honest) and phishing (suspicious) emails to learn how to catch anomalies and identify common malicious patterns in phishing emails. There are three main ML techniques for detecting phishing emails: social graph analysis, employee communication profiling, and email structural analysis. This article continues to discuss phishing attacks and how ML algorithms are used to fight them.

    Cybernews reports "Combating Phishing Attacks Using AI and Machine Learning Technologies"

  • news

    Visible to the public "FBI Finds 1,580 Bitcoin in Crypto Wallets Linked to North Korean Hackers"

    The Federal Bureau of Investigation (FBI) has published information on six cryptocurrency wallets operated by North Korean hackers and believed to be holding stolen funds. The FBI stated that the cryptocurrency addresses hold roughly 1,580 Bitcoin, likely related to the recent theft of cryptocurrency assets worth hundreds of millions of dollars. The FBI noted that over the last 24 hours, they tracked cryptocurrency stolen by the Democratic People's Republic of Korea (DPRK) TraderTraitor-affiliated actors (also known as Lazarus Group and APT38). The FBI believes the DPRK may attempt to cash out the Bitcoin worth more than $40 million. According to the FBI, TraderTraitor-affiliated hackers stole $60 million and $37 million in cryptocurrency from Alphapo and CoinsPaid in July and $100 million from Atomic Wallet in June. Previously, the hackers stole crypto assets in attacks against Harmony's Horizon Bridge and Sky Mavis' Ronin Bridge. The FBI noted that private sector entities should examine the blockchain data associated with these addresses and be vigilant in guarding against transactions directly with or derived from the addresses.

    SecurityWeek reports: "FBI Finds 1,580 Bitcoin in Crypto Wallets Linked to North Korean Hackers"

  • news

    Visible to the public "Artificial Intelligence and USBs Drive 8% Rise in Cyberattacks"

    Researchers at Check Point Research have recently released their 2023 Mid-Year Security Report. The research reveals a concerning 8% surge in global weekly cyberattacks during Q2, marking the most significant increase in two years. The researchers noted that USB devices have resurfaced as threats, employed by both state-affiliated groups and cybercriminals to distribute malware globally. Hacktivism is on the rise, with politically motivated groups conducting targeted attacks. The researchers stated that the misuse of AI has escalated, as attackers use generative AI tools for phishing emails, keystroke monitoring malware, and basic ransomware code. In the first half of 2023, over 2200 victims fell victim to 48 ransomware groups. Lockbit, with a 20% increase in victims compared to the previous year, led the pack. The researchers noted that emerging groups like Royal and Play appeared as Hive and Conti Ransomware-as-a-Service (RaaS) groups disbanded. Geographically, 45% of victims were in the US. The manufacturing and retail sectors were most affected, indicating a shift in ransomware strategy.

    Infosecurity reports: "Artificial Intelligence and USBs Drive 8% Rise in Cyberattacks"

  • news

    Visible to the public "Speed Demons: Ransomware Attackers' Dwell Time Shrinks"

    According to Sophos security researchers, ransomware actors are moving faster than ever to execute malicious encryption. In the first half of 2023, the median dwell time for ransomware incidents decreased from nine days to five days, while the median dwell time for all non-ransomware incidents increased from 11 to 13 days. According to Chester Wisniewski at Sophos, improved endpoint detection is probably why ransomware hackers are acting faster. In order to crypto-lock systems on a network using ransomware, attackers must be able to release their malware before defenders detect their intrusion and attempt to block it. To reduce the time required to move from intrusion to encryption, ransomware groups continue to explore methods for moving more quickly, such as intermittent encryption, which encrypts only parts of files. This article continues to discuss findings regarding ransomware attackers' dwell time shrinking.

    BankInfoSecurity reports "Speed Demons: Ransomware Attackers' Dwell Time Shrinks"

  • news

    Visible to the public "Barracuda Details How AI Is Being Used by Attackers and Defenders"

    The cloud cybersecurity company Barracuda has published a new report on the evolution of the malicious use of Artificial Intelligence (AI), detailing how attackers use AI and how to prevent attacks. The company analyzed 905 billion events from customers' integrated network, cloud, email, endpoint, and server security tools between January and July 2023. Barracuda outlines the three most prevalent high-risk detections during the first half of 2023 in this report. AI was essential to both the detection and analysis of the data. While the data analysis showed how AI can be used to detect and prevent attacks, the report warns that AI can also be exploited for malicious purposes by attackers. The report notes that generative AI language tools can compose highly convincing emails appearing to be from a legitimate company, making it more difficult for individuals to determine whether an email is legitimate or an attempt at phishing, account takeover, or Business Email Compromise (BEC). This article continues to discuss findings from Barracuda regarding the use of AI by attackers and defenders.

    SiliconANGLE reports "Barracuda Details How AI Is Being Used by Attackers and Defenders"

  • news

    Visible to the public "First Weekly Chrome Security Update Patches High-Severity Vulnerabilities"

    Google recently announced a Chrome 116 security update that patches five memory safety vulnerabilities reported by external researchers, including four issues rated high severity. Based on the bug bounty reward Google paid out for these flaws, the most severe of them is CVE-2023-4430, a use-after-free bug in Vulkan, the cross-platform, open standard for 3D graphics. Google noted that the vulnerability was reported by Cassidy Kim, who received a $10,000 bug bounty reward for the finding. Next in line is another use-after-free issue, this time in the Loader component. The flaw is tracked as CVE-2023-4429 and was reported by an anonymous researcher, who received a $3,000 bounty. Google stated that it also handed out a $2,000 reward for a high-severity out-of-bounds memory access vulnerability in CSS. However, per Google's policy, no bug bounty reward will be paid for a similar issue in the V8 JavaScript engine, which a Google Project Zero researcher reported, nor for a medium-severity out-of-bounds memory access flaw in Fonts that was reported by a Microsoft security researcher. The latest Chrome iteration is rolling out as version 116.0.5845.110 for Mac and Linux and as versions 116.0.5845.110/.111 for Windows. Google makes no mention of any of these vulnerabilities being exploited in attacks.\

    SecurityWeek reports: "First Weekly Chrome Security Update Patches High-Severity Vulnerabilities"

  • news

    Visible to the public "Doubling of Identity Theft Victims With Suicidal Thoughts"

    According to a new study conducted by researchers at the Identity Theft Resource Center (ITRC), 16% of American identity theft victims have had suicidal thoughts following their experiences, up from just 8% in 2020. During the study, the researchers conducted interviews with a random sample of victims who had contacted the ITRC in the past and 1048 general consumers. Identity crimes, in this case, mean identity fraud or theft. The researchers stated that the share of general consumers who have been victims of identity crimes multiple times stood at 69%, with first-time victims less common (41%). A quarter (26%) of victims claimed losses in excess of $100,000 from romance and social media scams and other threats. The researchers noted that, in some cases, consumers are defrauded through no fault of their own. A third (33%) of ITRC victims and nearly a quarter (23%) of general consumers have received between two and five data breach notices from companies they've done business with that have failed to safeguard their personal information. However, the researchers noted that poor personal security sometimes provides an open door for hackers and fraudsters. Only half (53%) of general consumers use multi-factor authentication (MFA), and a similar share (52%) have their mobile lock screen enabled. Some 59% say they share the same password across multiple accounts. The researchers also found that just 57% limit what they post online, and even fewer (48%) restrict who can see these posts. The researchers stated that "the fact that 16% of identity crime victims thought it's easier to end their lives than try to recover from an identity crime says as much about the lack of concern and support for identity crime victims as it does the victims themselves." The researchers argued that we need to fundamentally change the way we support identity crime victims to ensure no one feels ignored or dismissed the way they do today.

    Infosecurity reports: "Doubling of Identity Theft Victims With Suicidal Thoughts"

  • news

    Visible to the public "Cyberattack Shutters Major NSF-Funded Telescopes for More Than 2 Weeks"

    A cyber incident at a National Science Foundation (NSF) center coordinating international astronomy efforts knocked out key telescopes in Hawaii and Chile. Officials stopped all operations at ten telescopes. At a few others, only in-person observations are allowed. The incident, which was first announced on August 1, has forced research teams to devise alternatives as critical observation windows lessen. Multiple international projects, doctoral theses, and papers rely on data from the telescopes. Ground-based astronomical studies often rely on observations precisely timed for when extraterrestrial objects align with the field of view for specific telescopes. Astronomers try to plan for various delays, such as severe weather, power outages, or a shattered mirror, but hackers are often not factored into their calculations. This article continues to discuss the impact of the cyber incident on space telescopes.

    Science reports "Cyberattack Shutters Major NSF-Funded Telescopes for More Than 2 Weeks"

  • news

    Visible to the public "Akira Ransomware Targets Cisco VPNs to Breach Organizations"

    A growing body of evidence suggests that the Akira ransomware uses Cisco Virtual Private Network (VPN) products as an attack vector to infiltrate corporate networks, steal data, and encrypt it. Akira ransomware is a relatively new ransomware operation that was launched in March 2023, with a Linux encryptor later being added to target VMware ESXi virtual machines. Cisco VPN solutions are widely used in various industries to provide secure, encrypted data transmission between users and corporate networks, typically for remote workers. According to researchers, Akira has been using compromised Cisco VPN accounts to infiltrate corporate networks without installing additional backdoors or persistence mechanisms that could lead to their identification. This article continues to discuss the Akira ransomware targeting Cisco VPN products.

    Bleeping Computer reports "Akira Ransomware Targets Cisco VPNs to Breach Organizations"

  • news

    Visible to the public "Over a Dozen Malicious npm Packages Target Roblox Game Developers"

    Since the beginning of August 2023, more than a dozen malicious packages have been discovered in the npm package repository with the capability to launch an open-source information stealer named Luna Token Grabber on Roblox game developers' systems. The ongoing campaign, discovered by ReversingLabs on August 1, involves modules masquerading as the legitimate package noblox.js, an Application Programming Interface (API) wrapper used to create scripts that interact with the Roblox gaming platform. The packages were downloaded a total of 963 times before being removed. This article continues to discuss the malicious packages discovered on the npm package repository targeting Roblox game developers.

    THN reports "Over a Dozen Malicious npm Packages Target Roblox Game Developers"