News Items

  • news

    Visible to the public "Most VPNs Can Be Tricked Into Leaking Traffic"

    According to university researchers, nearly 70 Virtual Private Network (VPN) clients and servers are vulnerable to an attack that can cause them to leak user traffic. The multi-campus collaboration named their attack TunnelCrack and has released proof-of-concept (POC) exploit code. TunnelCrack is a combination of two widespread security vulnerabilities in VPNs. According to the researchers, tests indicate that every VPN product is vulnerable on at least one device. The underlying cause of the vulnerabilities has been present in VPNs since their emergence in 1996. The researchers found that VPN clients enable traffic to be sent in the clear in two cases. In the first case, the traffic is being sent to their local network, meaning enabling the VPN does not disable access to the LAN. In the second case, the destination is the VPN server, a rule that eliminates routing loops. In these two cases, they discovered that routing exceptions could be manipulated to send arbitrary traffic outside of the VPN tunnel. This article continues to discuss TunnelCrack, a combination of two security vulnerabilities in VPNs.

    iTnews reports "Most VPNs Can Be Tricked Into Leaking Traffic"

  • news

    Visible to the public "How Sure Is Sure? Incorporating Human Error Into Machine Learning"

    Many Artificial Intelligence (AI) systems fail to grasp human error and uncertainty, especially in systems where a human provides the Machine Learning (ML) model with feedback. These systems are often programmed with the assumption that humans are always certain and correct, but in the real world, humans occasionally make errors and are uncertain. Therefore, researchers from the University of Cambridge, the Alan Turing Institute, Princeton, and Google DeepMind have been attempting to bridge the gap between human behavior and ML so that AI applications in which humans and machines collaborate can account for uncertainty more thoroughly. This could reduce risk and increase the trustworthiness and reliability of these applications. This article continues to discuss incorporating uncertainty into ML systems.

    The University of Cambridge reports "How Sure Is Sure? Incorporating Human Error Into Machine Learning"

  • news

    Visible to the public "Cybersecurity Project Plans to Connect Researchers Across the Country"

    As technology advances, the manufacturing industry increasingly adapts to digital instruction, from the production of fighter jets to cars. Mechanical parts can be designed on a computer and sent via the network to a manufacturing machine that follows digital instructions to create a part. The transition into the digital realm makes protecting online information a national interest. Recently, Dr. Narasimha Reddy, a professor in the Department of Electrical and Computer Engineering at Texas A&M University, received a grant from the National Science Foundation (NSF) to explore cybersecurity issues in digital manufacturing. He hopes that by getting ahead of the implementation of these digital manufacturing machines and addressing cybersecurity issues, manufacturing could be made more secure. Since these machines must receive instructions over the network, they could be sent malicious packets that cause damage. When a company uses modern manufacturing processes to produce parts for fighter jets, there is a risk that someone will compromise their network security. If these jets contain faulty equipment, there is a national security problem. This article continues to discuss the research aimed at making digital manufacturing more secure.

    Texas A&M University reports "Cybersecurity Project Plans to Connect Researchers Across the Country"

  • news

    Visible to the public "Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach"

    Northern Ireland's top police officer recently apologized for what he described as an "industrial scale" data breach in which the personal information of more than 10,000 officers and staff was released to the public. The incident is particularly sensitive given the delicate security situation in Northern Ireland, which is still trying to overcome decades of sectarian violence known as "The Troubles." The breach occurred Tuesday when the force responded to a Freedom of Information request seeking information about the number of officers and staff of all ranks and grades across the Police Service of Northern Ireland. The response accidentally included a table that contained the surnames, initials, locations, and departments for all employees, along with the information requested. A second breach that occurred in July was revealed Wednesday. That breach involved the theft of documents, including a spreadsheet containing the names of more than 200 serving officers and staff and a police-issued laptop and radio.

    SecurityWeek reports: "Northern Ireland's Top Police Officer Apologizes for 'Industrial Scale' Data Breach"

  • news

    Visible to the public "More Than 300K People Affected by Johns Hopkins Data Breach"

    In June, Johns Hopkins University and Johns Hopkins Health System learned that their systems were among those affected by a broad-based cybersecurity attack that targeted a widely used software platform for transferring data files called MOVEit. Initially, they believed 5,500 people were impacted at Johns Hopkins Health Care System and Johns Hopkins Howard County General Hospital. In a new update, now Johns Hopkins reveals that 310,405 people were affected by the hacking incident at Johns Hopkins Medicine. Hopkins noted that it has sent letters to those affected by the data breach, notifying them that they were eligible to sign up for two free years of credit monitoring. With such a large number of people affected, cybersecurity experts are warning that when unsecured protected health information is involved, that can mean things like Social Security numbers, medication information, and many other very personal and private information can be compromised.

    WBAL reports: "More Than 300K People Affected by Johns Hopkins Data Breach"

  • news

    Visible to the public "Computer Security Experts Offer Advice to Freeze Out Risk of Thermal Attacks"

    A team of computer security experts has devised a set of recommendations to defend against 'thermal attacks' that can steal personal information. Thermal attacks use heat-sensitive cameras to detect fingerprint traces left on surfaces such as smartphone screens, computer keyboards, and PIN pads. Hackers can reconstruct users' credentials using the relative intensity of heat traces across recently touched surfaces. Dr. Mohamed Khamis and his colleagues at the University of Glasgow set out to demonstrate the ease with which thermal images could be used to crack passwords. The team created ThermoSecure, a system that uses Artificial Intelligence (AI) to scan heat-trace images and correctly guess passwords in seconds. Dr. Khamis and his colleagues have now compiled the first comprehensive review of existing computer security strategies and surveyed users regarding their preferences for preventing thermal attacks on public payment devices such as ATMs and ticket dispensers. Their research also includes recommendations for manufacturers. This article continues to discuss the recommendations developed by a team of computer security experts to help defend against thermal attacks that can steal personal information.

    The University of Glasgow reports "Computer Security Experts Offer Advice to Freeze Out Risk of Thermal Attacks"

  • news

    Visible to the public "New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware Attacks"

    Malicious actors are using a legitimate Rust-based injector called Freeze[.]rs to launch the commodity malware XWorm. The attack chain, discovered by Fortinet FortiGuard Labs on July 13, 2023, begins with a phishing email containing a malicious PDF file. It has also been used to introduce the Remcos Remote Access Trojan (RAT) by means of the SYK Crypter cipher, which Morphisec first documented in May 2022. Cara Lin, a security researcher, noted that this file redirects to an HTML file and uses the 'search-ms' protocol to access an LNK file on a remote server. Once the LNK file is clicked, a PowerShell script executes Freeze[.]rs and SYK Crypter in order to carry out additional malicious actions. Freeze[.]rs is an open-source red teaming tool from Optiv that serves as a payload creation tool for bypassing security solutions and executing shellcode stealthily. This article continues to discuss the use of the Freeze[.]rs by malicious actors for XWorm malware attacks.

    THN reports "New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware Attacks"

  • news

    Visible to the public "Lapsus$ Hackers Took SIM Swapping Attacks to the Next Level"

    The US Department of Homeland Security (DHS) Cyber Safety Review Board (CSRB) released a report after analyzing the techniques, such as SIM swapping, used by the Lapsus$ extortion group to breach dozens of organizations with a strong security posture. In December 2022, a review of the group's operations began following a string of incidents attributed to or claimed by Lapsus$ after leaking proprietary data from alleged victims. Microsoft, Cisco, Okta, Nvidia, T-Mobile, Samsung, Uber, Vodafone, Ubisoft, and Globant are some organizations affected by the Lapsus$ group. Lapsus$ is a loosely organized group consisting primarily of teenagers from the UK and Brazil who acted between 2021 and 2022 for notoriety, financial gain, or fun. However, they also incorporated techniques of varying degrees of complexity with "flashes of creativity." This article continues to discuss the Lapsus$ hackers' SIM swapping attacks.

    Bleeping Computer reports "Lapsus$ Hackers Took SIM Swapping Attacks to the Next Level"

  • news

    Visible to the public "Threat Intelligence's Key Role in Mitigating Malware Threats"

    According to OPSWAT, malware, one of the most prevalent and pervasive initial threat vectors, continues to evolve and become more sophisticated. Using malware as a foothold, threat actors infiltrate targeted infrastructures and then move laterally to gain long-term access, cause damage, or exfiltrate data. Organizations rely on actionable threat intelligence garnered through sandboxes and advanced malware analysis technologies and processes to effectively combat these threats. This proactive approach enables organizations to strengthen infrastructure defenses, improve incident response capabilities, and customize security strategies based on the threats they likely face. Sixty-two percent of organizations recognize the need to increase their investments in threat intelligence tools and processes. Only 22 percent of organizations have fully matured threat intelligence programs, with most indicating that they are still in the early phases or need to invest in additional tools and processes. This article continues to discuss key findings from OPSWAT's survey on threat intelligence.

    Help Net Security reports "Threat Intelligence's Key Role in Mitigating Malware Threats"

  • news

    Visible to the public "Dell Credentials Bug Opens VMWare Environments to Takeover"

    Credentials hardcoded in the Dell Compellent storage array service could allow attackers to take control of enterprise VMware environments in organizations using both services. According to Enlyft, Dell Compellent reached its end of life in 2019. However, organizations that continue to use Dell storage integrated with VMWare environments must be aware of CVE-2023-39250, a "high" severity vulnerability that affects these systems. Tom Pohl, penetration testing team manager at LMG Security, demonstrates how an adversary within an enterprise network can identify and decode a private key associated with VMWare's centralized management utility via Dell Compellent, gaining complete control over a VMware environment. Since the key is the same for all Dell customers, a compromise at one organization could easily translate to a compromise at any other organization. According to Pohl, this is a real-world example of how a private key in software can lead to the complete compromise of an organization's network. This article continues to discuss the potential exploitation and impact of the Dell credentials bug.

    Dark Reading reports "Dell Credentials Bug Opens VMWare Environments to Takeover"

  • news

    Visible to the public "University of Michigan Researchers Create Screen Protection System to Fend Off Shoulder Surfers"

    Eye-Shield is an innovative screen protection system developed by researchers at the University of Michigan that obscures images and text on a user's phone and other devices when seen from a distance. According to the researchers, previous methods have been ineffective, inconvenient, or limited. Some involve applying a physical privacy film to the device, which cannot be turned off or easily removed, provides only limited protection, and in many cases, prevents screen protector usage. Other solutions have taken the form of apps focused on specific functions, such as obscuring numbers by overlaying low- and high-frequency images, and substituting text with difficult-to-read handwriting. Eye-Shield is designed to exist on a device as a free, built-in feature that the user can turn on and off as needed. The program takes advantage of the visual perception of contrast to blur text and images at a distance. This article continues to discuss the Eye-Shield solution that uses a pixelation scheme to obscure device screens when viewed from a distance, protecting against shoulder surfing attacks.

    The University of Michigan reports "University of Michigan Researchers Create Screen Protection System to Fend Off Shoulder Surfers"

  • news

    Visible to the public "Researchers Put LLMs to the Test in Phishing Email Experiment"

    A team of security researchers tested the performance of Large Language Models (LLMs) in composing convincing phishing emails and detecting them. The results showed that Artificial Intelligence (AI) technology could generate highly effective phishing lures, though not as convincing as emails created manually. Bruce Schneier, a security expert, Arun Vishwanath, chief technologist at Avant Research Group, and Jeremy Bernstein, a postdoctoral researcher at MIT, tested with four commercial LLMs in experimental phishing attacks against Harvard students. The four LLMs included ChatGPT from OpenAI, Bard from Google, Claude from Anthropic, and ChatLlama, an open-source chatbot based on Llama from Meta. The experiment sent 112 students phishing emails offering Starbucks gift cards. LLMs could still be used to create simple marketing emails that can be repurposed for attacks, even though generative AI vendors have implemented stricter safeguards and restrictions for LLMs to prevent prompts for phishing email creation. This article continues to discuss the experiment on LLMs to see how effective the technology can be in detecting and producing phishing emails.

    TechTarget reports "Researchers Put LLMs to the Test in Phishing Email Experiment"

  • news

    Visible to the public "New York Introduces First-Ever Statewide Cybersecurity Strategy"

    Governor Kathy Hochul has recently introduced New York's first-ever statewide cybersecurity strategy, reinforced by a $600m commitment. The initiative is designed to shield critical infrastructure, data, networks, and technology systems from malicious attacks. The strategy's primary pillars: unification, resilience, and preparedness, are designed to enable New York State to not only deter cyberattacks but also neutralize potential threats effectively. The commitment also includes allocating $90m to centralize cybersecurity, with $30m designated for shared services strengthening local governments' cybersecurity. An additional $500m will be invested in healthcare information technology cybersecurity infrastructure, and $7.4m will expand New York State Police's cyber units. The governor also signed legislation to boost New York's technology talent pool, providing necessary funding for employers to acquire and retain cybersecurity professionals.

    Infosecurity reports: "New York Introduces First-Ever Statewide Cybersecurity Strategy"

  • news

    Visible to the public "The New Technology That Is Making Cars Easier for Criminals to Steal, or Crash"

    The automotive industry is abuzz with the "Internet of Vehicles" (IoV) discussion. This describes a network of cars and other vehicles that can exchange data over the Internet to make transportation more autonomous, safe, and efficient. The IoV could help vehicles identify obstructions, traffic congestion, and pedestrians. It could help with a vehicle's positioning on the road, enable driverless vehicles, and facilitate defect diagnosis. A more advanced IoV will require the installation of even more sensors, software, and other technologies. There are currently more electronic systems than ever before in cars, including cameras, mobile phone connections, and infotainment systems. However, some of these systems may also make vehicles vulnerable to theft and malicious attacks as criminals discover and exploit vulnerabilities in this new technology. Threat actors are increasingly using a more sophisticated method of attacking vehicles. A Controller Area Network (CAN) injection attack establishes a direct connection to the CAN bus, the vehicle's internal communication system. Since the main route to the CAN bus is underneath the vehicle, criminals try to gain access to it through the headlights. The bumper must be removed so a CAN injector can be inserted into the engine system. Criminals can then send fake messages, tricking the vehicle into believing they are from the smart key and disabling the immobilizer. After gaining access to the vehicle, they can start the engine and steal it. This article continues to discuss potential security attacks against today's cars and the suggested zero trust approach to such attacks.

    The Conversation reports "The New Technology That Is Making Cars Easier for Criminals to Steal, or Crash"

  • news

    Visible to the public "Interpol Shuts Down African Cybercrime Group, Seizes $2 Million"

    A recent cross-border investigation into West African cybercriminal groups has resulted in 103 arrests and the seizure of more than $2.2 million. Operation Jackal was led by law enforcement agencies across 21 countries on six continents and targeted cybercrime groups such as the Nigerian criminal gang "Black Axe." The law enforcement agencies noted that the Black Axe group has a reputation for cyber-enabled financial fraud, particularly business email compromise, romance and inheritance scams, credit card and tax fraud, and money laundering. Isaac Kehinde Oginni, director of Interpol's Financial Crime and Anti-Corruption Centre, called the operation a successful demonstration of international cooperation and a future blueprint for financial crime enforcement. The operation began in May when $2.36 million was frozen or seized, 103 people arrested, 1,110 suspects identified, and 208 bank accounts blocked.

    Dark Reading reports: "Interpol Shuts Down African Cybercrime Group, Seizes $2 Million"

  • news

    Visible to the public "Researchers Watched 100 Hours of Hackers Hacking Honeypot Computers"

    Two security researchers deployed several Windows servers that were deliberately exposed to the Internet. They were set up with Remote Desktop Protocol (RDP), allowing hackers to remotely control the compromised servers as if they were regular users. With these honeypots, researchers were able to record 190 million events and 100 hours of video footage of hackers taking control of servers and performing a variety of actions on them, such as reconnaissance, installing malware that mines cryptocurrencies, using Android emulators to conduct click fraud, brute-forcing passwords for other computers, hiding their identities by using the honeypot as a starting point for another attack, and more. According to the researchers, a successful login can generate "tens of events." This article continues to discuss the researchers' observations from the honeypot experiment.

    TechCrunch reports "Researchers Watched 100 Hours of Hackers Hacking Honeypot Computers"

  • news

    Visible to the public "Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives"

    There has been an increase in the use of a Phishing-as-a-Service (PhaaS) toolkit called EvilProxy by threat actors to conduct account takeover attacks targeting high-ranking executives at well-known companies. According to Proofpoint, an ongoing hybrid campaign used the service to target thousands of Microsoft 365 user accounts, sending about 120,000 phishing emails to hundreds of organizations across the globe between March and June 2023. Nearly 39 percent of the hundreds of compromised users are C-level executives, including CEOs and CFOs. Additionally, the attacks have targeted employees with access to financial assets or sensitive data. At least 35 percent of compromised users had enabled additional account protections. The campaigns are viewed as a response to the increased adoption of multi-factor authentication (MFA) in enterprises, which has prompted threat actors to evolve their tactics to circumvent new security layers by incorporating Adversary-in-the-Middle (AitM) phishing kits to steal credentials, session cookies, and one-time passwords. This article continues to discuss threat actors increasingly using the EvilProxy PhaaS.

    THN reports "Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives"

  • news

    Visible to the public "Hackers Use Open-Source Merlin Post-Exploitation Toolkit in Attacks"

    Ukraine warns of a wave of attacks using Merlin, an open-source post-exploitation and command-and-control (C2) framework, against state organizations. Merlin is a Go-based, cross-platform post-exploitation toolkit that is freely available via GitHub and offers comprehensive documentation for use in red team exercises by security professionals. It provides various features that enable red teamers and attackers to gain a foothold on a compromised network. However, as seen with Sliver, threat actors are now abusing Merlin to power their own attacks and spread laterally through compromised networks. CERT-UA reports detecting it in attacks that began with the arrival of a phishing email impersonating the agency and claiming to provide recipients with instructions on how to harden their Microsoft Office suite. This article continues to discuss hackers abusing Merlin in attacks on state organizations.

    Bleeping Computer reports "Hackers Use Open-Source Merlin Post-Exploitation Toolkit in Attacks"

  • news

    Visible to the public "White House Launches AI Cyber Challenge to Make Software More Secure"

    The Biden-Harris Administration has launched a two-year competition to protect the most critical software in the US using Artificial Intelligence (AI). The AI Cyber Challenge (AIxCC) calls on competitors across the US to identify and fix software vulnerabilities using AI. This challenge is being led by the Defense Advanced Research Projects Agency (DARPA). It will involve collaboration with several top AI companies, including Anthropic, Google, Microsoft, and OpenAI, who are lending their expertise and making their advanced technology available for this competition. This competition, which will offer nearly $20 million in prizes, will spur the development of new technologies to strengthen computer code security, one of the most pressing challenges in cybersecurity. AIxCC will demonstrate the potential benefits of AI for securing software used throughout the Internet and society, from the electric grids powering the US to transportation systems. This article continues to discuss the goals and structure of the AIxCC.

    Help Net Security reports "White House Launches AI Cyber Challenge to Make Software More Secure"

  • news

    Visible to the public "'MoustachedBouncer' APT Spies on Embassies, Likely via ISPs"

    An Advanced Persistent Threat (APT) group with ties to Belarus spied on staff in at least four embassies operating in the country, most likely by abusing the country's local Internet Service Provider (ISP). According to malware researcher Matthieu Faou, "MoustachedBouncer" is nearly a decade old and aligned with the interests of the Belarusian government. From 2017 to 2022, the group effectively compromised diplomats from one Southeast Asian country, one African country, and two European countries using custom information-stealing malware. The exact intrusion technique is still unclear. MoustachedBouncer may have infected routers at individual embassies, but ESET determined that it likely exploited lawful communications interception technology used by the governments of Belarus and Russia. This article continues to discuss the MoustachedBouncer espionage campaign.

    Dark Reading reports "'MoustachedBouncer' APT Spies on Embassies, Likely via ISPs"

  • news

    Visible to the public "MITRE and Robust Intelligence Tackle AI Supply Chain Risks in Open-Source Models"

    MITRE is collaborating with Robust Intelligence, a provider of Artificial Intelligence (AI) solutions, to improve a free tool that helps organizations assess the supply chain risks of publicly available AI models online. Indiana University is also involved in the collaboration to develop automated risk assessment tools. The availability of sophisticated models in public repositories has facilitated the incorporation of AI into enterprise systems. However, there are few independent testing tools for assessing risk. Therefore, Robust Intelligence created the AI Risk Database as a community resource in March 2023. After its further development in collaboration with MITRE, a new open-source version is now available on GitHub, with a long-term plan to integrate it into the set of MITRE ATLAS tools. ATLAS is a knowledge base containing a list of adversary tactics and techniques based on real-world attack observations and AI red teaming. It includes links to other tools that enable attack emulation. The collaboration between Robust Intelligence and MITRE will lead to the characterization and operationalization of risks, including risk scores, software vulnerabilities, and associated CVEs. These characterizations will help raise awareness of potential risks and vulnerabilities associated with open-source AI models. This article continues to discuss the collaboration aimed at tackling AI supply chain risks in open-source models.

    MITRE reports "MITRE and Robust Intelligence Tackle AI Supply Chain Risks in Open-Source Models"

  • news

    Visible to the public "Five Papers by CSE Researchers Presented at USENIX Security 2023"

    Computer Science and Engineering (CSE) researchers from the University of Michigan are presenting their papers at the 32nd USENIX Security Symposium. The university has compiled a list of papers authored by the CSE researchers being presented at the event. The papers cover various topics on improving security and privacy measures in modern computing systems. The topics include Virtual Private Network (VPN) performance, autonomous vehicle security, face obfuscation systems, mobile device "shoulder surfing," and more. One of the papers being presented is titled "Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing." People often use their mobile devices in public settings, making them vulnerable to a simple yet effective attack known as shoulder surfing. A shoulder surfing attack happens when someone near a mobile device user looks at the user's device, potentially noting passcodes, PINs, browsing behavior, or other personal information. The paper proposes Eye-Shield, a method for preventing shoulder surfers from accessing/stealing sensitive information displayed on-screen. Eye-Shield is designed to protect all forms of on-screen information without significantly impeding users' mobile device interactions. This article continues to discuss the CSE researchers' papers being presented at the 32nd USENIX Security Symposium.

    The University of Michigan reports "Five Papers by CSE Researchers Presented at USENIX Security 2023"

  • news

    Visible to the public "Balada Injector Still at Large – New Domains Discovered"

    Cybernews researchers found an address that shed light on WordPress-orientated "hack waves" caused by the Balada Injector malware. Evidence indicates that the malware is still highly active, evading security software by using new domain names and small changes between surges of obfuscated attacks. The Balada Injector malware family has been active since 2017, using multiple attack vectors and persistence mechanisms. Cybernews observed a likely outcome of seven automated attack waves against a vulnerable WordPress website, each of which added a block of malicious PHP code directly into the index file of the compromised website, executing the malicious scripts when visited. However, the automated attack waves could not determine if a website had been compromised previously. This article continues to discuss findings regarding the hack waves caused by the Balada Injector malware.

    Cybernews reports "Balada Injector Still at Large - New Domains Discovered"

  • news

    Visible to the public "LockBit Threatens to Leak Medical Data of Cancer Patients Stolen From Varian Medical Systems"

    The LockBit ransomware group claims to have targeted the healthcare company Varian Medical Systems, Inc. The group threatens to leak cancer patients' medical records stolen from the healthcare company. Varian Medical Systems, Inc. designs, manufactures, distributes, and services medical devices and software products for treating cancer and other conditions. It operates through the Oncology Systems and Imaging Components segments. Siemens Healthineers owns the company, which generates 3 billion dollars in revenue. On its TOR breach website, the LockBit group claims that all databases and patient data have been exfiltrated and are ready for publication. LockBit has set the ransom payment deadline for August 17, 2023. If confirmed, the incident could significantly impact cancer patients' privacy. This article continues to discuss the LockBit ransomware group threatening to leak stolen medical data of cancer patients.

    Security Affairs reports "LockBit Threatens to Leak Medical Data of Cancer Patients Stolen From Varian Medical Systems"

  • news

    Visible to the public "Summer Spending Pressure Fuels Loan Fee Fraud Fears"

    The UK's financial regulatory recently warned consumers to be on the lookout for loan fee fraudsters after revealing new research claiming that many Brits are worried about their finances this summer. The Financial Conduct Authority (FCA) said it polled 2000 adults in late July and found that 55% are more concerned about their bank balance this summer than last. Rising food (63%) and energy costs (53%) were cited as the biggest concerns, but summer spending pressures, including entertainment costs (24%) and summer holidays (22%), also loomed large for respondents. The FCA noted that more than a third (35%) said they're worried about how they're going to pay for summer holidays this year. As a result, a quarter (24%) of British consumers are turning to credit or loans to fund their summer spending plans. The FCA stated that this could open the door to loan fee fraud, a type of advanced fee fraud where individuals pay a fee to access a loan that never materializes. The FCA warned that such scams tend to peak in summer, costing victims an average of 260 pounds. The FCA said there was a 26% year-on-year increase in complaints from victims last summer versus 2021.

    Infosecurity reports: "Summer Spending Pressure Fuels Loan Fee Fraud Fears"

  • news

    Visible to the public "How Randomized Data Can Improve Our Security"

    Technical devices have two essential units to process data: a processor and Random Access Memory (RAM). Since memory is much slower at providing data than the processor is at processing it, modern processors use a cache to function as a bridge between the two. This cache often has sensitive data, making it an attractive target for attackers. In collaboration with researchers from Japan, a group of scientists from Bochum, Germany, developed an innovative cipher that provides greater security than previous methods and is more efficient and faster. The idea is to use mathematical processes to randomize the data in the cache. This randomization in the Central Processing Unit's (CPU) cache can help stop attacks by preventing malicious actors from removing data from the cache. This article continues to discuss the research on a low-latency block cipher for secure cache-randomization.

    Ruhr University Bochum reports "How Randomized Data Can Improve Our Security"

  • news

    Visible to the public "Ukraine Says It Thwarted Attempt to Breach Military Tablets"

    The SBU, Ukraine's security service, thwarted a Russian state-controlled hacking group's attempt to break into the Ukrainian military's battlefield management system. A recently published technical report reveals that Russian hackers attempted to infect Ukrainian military networks with at least seven variants of new custom malware. The SBU attributed the attack to the hacking group known as Sandworm, which works on behalf of Russia's military intelligence agency. The security service reported that it was able to halt the operation during the planning phase. Sandworm has been persistently targeting Ukraine with various malware strains designed to disrupt critical networks. However, its latest attack aimed to gain access to sensitive information regarding the Ukrainian military's operations, locations, equipment, and movements. According to the SBU's report, the Russian hackers initially sought to seize Android tablets used by the Ukrainian military to plan and execute combat missions. They wanted to access other connected devices and infect them with malware through these tablets. The hackers have developed at least seven new information-stealing malware strains to infect Android devices, including NETD to conduct internal intelligence, TOR and DROPBEAR to gain remote access to the devices, and DEBLIND to steal information from Android devices. STL, another malware strain, can access devices connected to Starlink satellite Internet. This article continues to discuss Sandworm's attempt to infiltrate the Ukrainian military's battlefield management system.

    The Record reports "Ukraine Says It Thwarted Attempt to Breach Military Tablets"

  • news

    Visible to the public "Breach Connected to MOVEit Flaw Affects Missouri Medicaid Recipients"

    The Missouri Department of Social Services (DSS) recently issued an alert urging residents to safeguard their personal information following a cyberattack originating from a data security breach at IBM Consulting in May 2023. DSS stated that this breach potentially exposed the identities of numerous Medicaid participants. DSS, responsible for administering Medicaid services in the state, disclosed details surrounding the incident in a press release published on Tuesday. The breach centered around a vulnerability discovered in Progress Software's MOVEit Transfer software, a third-party application used by IBM. While DSS systems remained unaffected, data belonging to the agency was compromised. Upon notification of the breach, IBM halted the use of the software for investigation and applied necessary fixes. On June 13, 2023, IBM informed DSS that unauthorized access to files within the MOVEit application had occurred, potentially including Medicaid participants' protected health information.

    Infosecurity reports: "Breach Connected to MOVEit Flaw Affects Missouri Medicaid Recipients"

  • news

    Visible to the public "Planting Ideas in a Computer's Head"

    Researchers at ETH Zurich have discovered a new attack on AMD computer chips in which the attacker secretly plants an "idea" within the computer. It was possible to leak data from anywhere in the computer's memory using this attack. The team led by Kaveh Razavi, a professor in the Department of Information Technology and Engineering, demonstrated a serious flaw in certain Central Processing Units (CPUs) that allows an attacker to plant the equivalent of an idea in a victim's CPU, coax it into executing specific commands, and thus retrieve information. This article continues to discuss the research behind the new attack on AMD computer chips.

    ETH Zurich reports "Planting Ideas in a Computer's Head"

  • news

    Visible to the public "CyLab Faculty, Students to Present at the 32nd USENIX Security Symposium"

    Carnegie Mellon University (CMU) faculty and students are presenting their research at the 32nd USENIX Security Symposium. The event brings together experts focused on highlighting the latest advancements in the security and privacy of computer systems and networks. CyLab has compiled a list of papers co-authored by members of the CyLab Security and Privacy Institute being presented at the event. One of the papers being presented is titled "Adversarial Training for Raw-Binary Malware Classifiers." Machine Learning (ML) models have demonstrated promise in accurately classifying raw executable files (binaries) as malicious or benign. This has resulted in the growing influence of ML-based classification methods in academic and real-world malware detection. However, previous research prompted caution by creating adversarial examples, which are variants of malicious binaries transformed in a functionality-preserving way to avoid detection. In this study, researchers explore the effectiveness of using adversarial training methods to develop malware classification models that are more robust to some advanced attacks. This article continues to discuss the CyLab research being presented at the 32nd USENIX Security Symposium.

    CyLab reports "CyLab Faculty, Students to Present at the 32nd USENIX Security Symposium"

  • news

    Visible to the public "Microsoft Patches 80+ Flaws Including Two Zero-Days"

    Microsoft recently released updates for 87 vulnerabilities, including two that are being actively exploited in the wild. The first zero-day was publicly disclosed last month when Microsoft initially announced a series of zero-day vulnerabilities in various Microsoft products that were discovered and exploited in the wild. They were assigned a single placeholder: CVE-2023-36884. This month, Microsoft released patches for this vulnerability, calling it a Windows Search Security Feature Bypass Vulnerability, and also released ADV230003, a defense-in-depth update designed to stop the attack chain associated that leads to the exploitation of this CVE. The second zero-day is CVE-2023-38180, a denial of service bug in .NET and Visual Studio that could cause systems to crash. Another vulnerability addressed is CVE-2023-21709, an elevation of privilege vulnerability in Microsoft Exchange Server with a CVSS score of 9.8. The attack complexity is low and doesn't require user interaction, making it a potentially popular choice for threat actors. There were also over 20 remote code execution (RCE) bugs listed by Microsoft this month. These include CVE-2023-29328 and CVE-2023-29330, two critical vulnerabilities in Microsoft Teams that attackers can exploit with direct access to a targeted device. For exploitation, the user must join a Teams meeting organized by the attacker. Microsoft noted that CVE-2023-36911, CVE-2023-36910, and CVE-2023-35385 are all RCE flaws in the Microsoft Message Queuing Service, with a CVSS score of 9.8 but a low likelihood of exploitation. All three have a network attack vector, low complexity of the attack, require no privileges, and do not need user interaction.

    Infosecurity reports: "Microsoft Patches 80+ Flaws Including Two Zero-Days"

  • news

    Visible to the public "Dr. Hisham Kholidy Receives $1.1 Million Contract from Air Force Research Lab to Improve Security Across 5G Open Architecture"

    Dr. Hisham A. Kholidy, associate professor and chair of the Network and Computer Security Department at SUNY Polytechnic Institute, has been awarded a nearly $1.1 million contract by the Air Force Research Laboratory (AFRL) for a 36-month project aimed at helping to address the need for an advanced security system capable of identifying, assessing, and protecting against attacks across the 5G open architecture without human intervention. Dr. Kholidy notes that the Department of Defense (DoD) has identified 5G security as a critical area of national security. 5G is expected to significantly affect global economic growth and technological development for many stakeholders. The proposed research explores mechanisms for protecting 5G open networks, meeting resilience requirements, and mitigating potential attack damage. Improving the current 5G security testbed developed in collaboration with AFRL engineers to support the 5G open architecture network is one of this project's key contributions. This network will be the first "open 5G-federated testbed" to support 5G multi-vendor and commercial service providers. It will help them develop innovative cybersecurity solutions and data sets for the emerging global architecture. These solutions and data sets will allow researchers to enhance this new architecture. The project will also develop an intelligent Vulnerability Assessment Approach (VAA) to evaluate the new architecture's security level. This article continues to discuss the research aimed at improving security across the 5G open architecture.

    SUNY Polytechnic Institute reports "Dr. Hisham Kholidy Receives $1.1 Million Contract from Air Force Research Lab to Improve Security Across 5G Open Architecture"

  • news

    Visible to the public "Intel Addresses 80 Firmware, Software Vulnerabilities"

    Intel recently released a total of 46 new security advisories to inform customers about 80 vulnerabilities affecting the company's firmware and software. The most serious of the flaws, based on their CVSS score, are 18 high-severity issues allowing privilege escalation or, in a few cases, denial-of-service (DoS) attacks. Intel noted that the vulnerabilities impact processor BIOS, chipset firmware, NUC BIOS, Unison, Manageability Commander, NUC Kit and Mini PC BIOS, Driver and Support Assistant (DSA), AI Hackathon, PROSet/Wireless Wi-Fi and Killer WiFi, NUC Pro Software Suite, Easy Streaming Wizard, Virtual RAID on CPU (VROC), SGX and TDX for some Xeon Processors, and Unite products. Medium-severity vulnerabilities have been addressed in processors, RealSense SDKs and ID software, ITS, Unite Android app, NUC BIOS firmware, PSR SDK, SDP tool, Server Board BMC video drivers, Unison, oneAPI, Hyperscan Library, DTT, Support Android app, Agilex (Quartus Prime Pro Edition for Linux), ISPC, and Advanced Link Analyzer Standard Edition. Intel noted that bugs with a "medium severity" rating have also been resolved in VCUST Tool, Distribution of OpenVINO Toolkit, Optimization for TensorFlow, Ethernet controllers and adapters, System Firmware Update Utility for Server Boards and Server System, NUC ITE Tech, Arc graphics cards, SSD Tools, PCSD, Ethernet Controller RDMA driver for Linux, and RST products. These mostly allow a local attacker to escalate privileges, and some can lead to information disclosure or DoS attacks. Intel noted that a vast majority of the flaws disclosed on Tuesday have received patches, but some of the impacted products have been discontinued.

    SecurityWeek reports: "Intel Addresses 80 Firmware, Software Vulnerabilities"

  • news

    Visible to the public "NIST Researchers Explore Best Practices for Talking to Kids About Online Privacy"

    It is essential for parents to encourage their children to use online technology safely. According to recent research conducted by scientists at the National Institute of Standards and Technology (NIST), parents should talk to their children about online privacy and security from a young age through high school. The NIST team members describe the research as an exploratory study, which involved interviewing 40 parent/child pairs with children from 3rd to 12th grade. The purpose of this research effort was to gain insight into their knowledge of online privacy, security, and risky online behavior, as well as how parents try to influence their children's online activities and awareness of privacy and security. This article continues to discuss the NIST team's preliminary findings and suggested strategies.

    NIST reports "NIST Researchers Explore Best Practices for Talking to Kids About Online Privacy"

  • news

    Visible to the public "UK Electoral Commission Breach Exposes Voter Data of 40 Million Britons"

    The UK Electoral Commission has disclosed a "complex" cyberattack on its systems that went undetected for more than a year, allowing threat actors access to 40 million people's voter data spanning years. According to the regulator, the incident was identified in October 2022 following the detection of suspicious activity on its systems. It was then discovered that the malicious actors first gained access to the systems in August 2021. The intrusion allowed unauthorized access to the Commission's servers hosting email, control systems, and copies of electoral registers maintained for research purposes. The perpetrators' identities are currently unknown. The registers contained the names and addresses of anyone who enrolled to vote in the UK between 2014 and 2022, as well as those registered as overseas voters. However, they did not have the information of those who were eligible to register anonymously and the addresses of overseas electors registered outside the UK. This article continues to discuss the breach faced by the UK Electoral Commission.

    THN reports "UK Electoral Commission Breach Exposes Voter Data of 40 Million Britons"

  • news

    Visible to the public "Interpol Takes Down 16shop Phishing-as-a-Service Platform"

    The 16shop Phishing-as-a-Service (PhaaS) platform has been taken down in a joint operation involving Interpol and cybersecurity companies. PhaaS platforms provide cybercriminals with a one-stop shop for launching phishing attacks. These platforms usually include email distribution, ready-made phishing kits for popular brands, hosting, data proxying, victim overview dashboards, and other tools. They pose a significant threat because they allow inexperienced cybercriminals to conduct phishing attacks with just a few clicks. Group-IB, which helped Interpol with the takedown, reports that the 16shop platform offered phishing kits targeting Apple, PayPal, American Express, Amazon, Cash App, and more. According to Group-IB's telemetry data, 16shop is responsible for creating 150,000 phishing pages that targeted people mainly from Germany, Japan, France, the US, and the UK. 16shop-created phishing pages compromised at least 70,000 users from 43 countries. The data stolen in these attacks include personal information, account emails, passwords, ID cards, credit card numbers, and telephone numbers. This article continues to discuss the shutdown of the 16shop PhaaS platform.

    Bleeping Computer reports "Interpol Takes Down 16shop Phishing-as-a-Service Platform"

  • news

    Visible to the public "Raft of TETRA Zero-Day Vulnerabilities Endanger Industrial Communications"

    Following the discovery of vulnerabilities in the Terrestrial Trunked Radio (TETRA) communications protocol, which is used by Industrial Control Systems (ICS) worldwide, researchers have uncovered multiple additional zero-day vulnerabilities in a Motorola base station and system chip. Both are needed to execute and decrypt the TETRA communications algorithm, which may expose sensitive information. TETRA is a global standard for encrypted two-way communications devised by public safety experts. TETRA systems are used in public safety and industrial-commercial sectors, including utility companies, rail and metro lines, power stations, oil refineries, and chemical plants. Wouter Bokslag, co-founder of Midnight Blue, says that the base station has a Trusted Execution Environment (TEE) designed to prevent the exfiltration of cryptographic primitives and keys. However, he explains that through a side-channel attack on the TEE, his team was able to decrypt the module and get an AES key that could be used to decrypt further communications passing through the equipment. This article continues to discuss the TETRA-related vulnerabilities.

    Dark Reading reports "Raft of TETRA Zero-Day Vulnerabilities Endanger Industrial Communications"

  • news

    Visible to the public "Downfall Attacks Can Gather Passwords, Encryption Keys From Intel Processors"

    Various Intel Core processors and the devices that use them are vulnerable to "Downfall," a new class of attacks stemming from CVE-2022-40982, which enables attackers to access and steal sensitive data such as passwords, encryption keys, and private data from other users on the same personal or cloud computer. CVE-2022-40982 results from memory optimization features in Intel processors that unintentionally reveal internal hardware registers to software. Daniel Moghimi, a research scientist at Google, explained that this allows untrusted software to access data stored by other programs that typically would not be accessible. During speculative execution, he discovered that the Gather instruction, which is meant to speed up access to scattered data in memory, exposes the contents of the internal vector register file. He devised two exploitation techniques, Gather Data Sampling (GDS) and Gather Value Injection (GVI). He demonstrated how they can be used to steal AES keys, data from the Linux kernel, and other sensitive information. This article continues to discuss CVE-2022-40982 and the Downfall attacks.

    Help Net Security reports "Downfall Attacks Can Gather Passwords, Encryption Keys From Intel Processors"

  • news

    Visible to the public "Virtual Reality Headsets Are Vulnerable to Hackers"

    According to computer scientists at the University of California, Riverside (UCR), the headset hardware and virtual keyboard interfaces associated with Augmented Reality (AR) and Virtual Reality (VR) present new opportunities for hackers. The metaverse technology, currently being developed by Facebook's Mark Zuckerberg and other technology giants, relies on headsets that interpret bodily motions, including reaches, nods, steps, and blinks, to navigate new AR and VR worlds in order to play games, socialize, shop, and more. A computer science team at UCR's Bourns College of Engineering led by professors Jiasi Chen and Nael Abu-Ghazaleh, has demonstrated that spyware can monitor and record a user's every movement and then use Artificial Intelligence (AI) to translate those motions into words with accuracy of at least 90 percent. They showed that if a user runs multiple applications, and one of them is malicious, it can spy on the other applications. It can spy on the environment around a user to see whether people are around them and how far they are. It can also expose the user's interactions with the headset to the attacker. For example, if a user pauses a virtual game to check Facebook messages by air-typing the password on a virtual keyboard generated by the headset, the spyware could capture the password. Similarly, attackers could interpret the user's body movements to access their actions during a virtual meeting where sensitive information is disclosed and discussed. This article continues to discuss the study on the hacking opportunities created by headset hardware and virtual keyboard interfaces associated with AR and VR.

    The University of California, Riverside reports "Virtual Reality Headsets Are Vulnerable to Hackers"

  • news

    Visible to the public "CyLab Research to Be Presented at 2023 SOUPS"

    Carnegie Mellon University (CMU) faculty and students are presenting their research at the 2023 Symposium on Usable Privacy and Security (SOUPS). The event, founded by CyLab Director Lorrie Cranor and first hosted by CMU in 2005, continues bringing together interdisciplinary groups of researchers focused on addressing security, privacy, and human-computer interaction challenges. CyLab has compiled a list of papers co-authored by members of the CyLab Security and Privacy Institute being presented at the event. In one of the papers titled "GuardLens: Supporting Safer Online Browsing for People with Visual Impairments," it is emphasized that visual cues play a significant role in how users assess the privacy/security of a website, but are often inaccessible to people with visual impairments (PVIs), thus exposing them to a disproportionate amount of privacy and security risks. GuardLens is a browser extension that enhances the accessibility of privacy/security cues and helps PVIs determine a website's legitimacy. The browser extension helps PVIs quickly and accurately determine whether websites are legitimate or spoofs by extracting and listing relevant privacy/security cues in one place for faster and easier access. This article continues to discuss the CyLab research being presented at 2023 SOUPS.

    CyLab reports "CyLab Research to Be Presented at 2023 SOUPS"

  • news

    Visible to the public "How Do People Really Feel About Electronic Health Records?"

    Since January 2021, patients with statutory health insurance in Germany have had the option to use an electronic health record. However, not many people have taken advantage of it. An interview study conducted by researchers at Ruhr University Bochum, Leibniz University Hannover, and CISPA - Helmholtz Center for Information Security revealed that there are many misconceptions about the digital infrastructure on which the records are based, such as who can view which data. People have expressed skepticism regarding the role of health insurance companies. Professor Karola Marky and Ph.D. student Rebecca Panskus of Ruhr University Bochum presented the findings at the 2023 Symposium on Usable Privacy and Security (SOUPS). Marky concludes from the study that there is much room for improvement with regard to the digital infrastructure of electronic health records. This article continues to discuss the study on privacy mental models of electronic health records.

    Ruhr University Bochum reports "How Do People Really Feel About Electronic Health Records?"

  • news

    Visible to the public "A New Weapon in the War on Robocall Scams"

    A new weapon in the war against robocalls is an automated system capable of analyzing the content of these unsolicited bulk calls. It highlights the scope of the problem and the types of scams perpetrated by robocalls. SnorCall is a tool designed to help regulators, phone carriers, and other stakeholders better understand and monitor robocall trends, as well as take action against criminal activity related to robocalls. Although telephone service providers, regulators, and researchers have access to call metadata, such as the number being called and the length of the call, they lack the necessary tools to investigate what is being said on robocalls, according to Brad Reaves, an assistant professor of computer science at North Carolina State University. Providers do not want to eavesdrop on calls because it poses serious privacy concerns. However, robocalls are a problem and are typically used to commit fraud. It is essential to understand the scope of this problem and gain insight into these scams by knowing what is said on robocalls. Therefore, researchers developed the SnorCall tool to enable the characterization of robocalls' content without violating privacy. This article continues to discuss the SnorCall tool.

    North Carolina State University reports "A New Weapon in the War on Robocall Scams"

  • news

    Visible to the public "Criminals Have Created Their Own ChatGPT Clones"

    Just months after the launch of OpenAI's ChatGPT chatbot, cybercriminals and hackers claim to have developed their own versions of the text-generating Artificial Intelligence (AI) technology. Theoretically, the systems could improve criminals' ability to develop malware or write phishing emails that can trick users into revealing login information. Since the beginning July, cybercriminals have been advertising two Large Language Models (LLMs), WormGPT and FraudGPT, on dark web forums and marketplaces. The systems, said to mimic ChatGPT and Google's Bard, generate text in response to the questions or prompts that users input. In contrast to the LLMs built by legitimate companies, these chatbots are marketed for illegal purposes. The malicious LLMs claim to eliminate all safety protections and ethical barriers. This article continues to discuss the LLMs advertised by cybercriminals that could help perform phishing attacks and create malware.

    Wired reports "Criminals Have Created Their Own ChatGPT Clones"

  • news

    Visible to the public "Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns"

    Adobe recently rolled out a big batch of security updates for its flagship Acrobat and Reader software, patching at least 30 vulnerabilities affecting Windows and macOS installations. Adobe warned that successful exploitation could lead to arbitrary code execution, memory leaks, security feature bypass, and application denial-of-service attacks. Adobe said affected software includes Acrobat DC, Acrobat Reader DC, Acrobat 2020 and Acrobat Reader 2020. The company described most of the bugs as memory safety issues and said it was not aware of any exploits in the wild. Adobe separately shipped an urgent update covering a trio of security vulnerabilities in the Adobe Commerce and Magento Open Source. Adobe noted that successful exploitation could lead to arbitrary code execution, privilege escalation, and arbitrary file system read. The Adobe PSIRT team also updated the Adobe Dimension software to cover three flaws that expose Windows and macOS users to arbitrary code execution and memory leaks.

    SecurityWeek reports: "Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns"

  • news

    Visible to the public "GDPR Compliance Is Not Cybersecurity, Says Analyst"

    General Data Protection Regulation (GDPR) fines are forcing businesses to reconsider their cybersecurity strategies. However, experts are concerned that, despite compliance looking good on paper, it does not translate into better protection in practice and may end up costing them more. Global fines, including those charged under the EU law, account for 6 percent of the 13.5 billion pounds lost by British businesses as a result of the "most notable data breaches" reported to the Information Commissioner's Office (ICO) between 2019 and 2022, according to research conducted by the cybersecurity firm Imperva. There are concerns that the fear itself may be the problem. UK organizations, anxious to avoid penalties, are engaging in "tick-box" exercises that may render them compliant on paper but leave them vulnerable to cyberattacks in reality. Although regulators are taking a tougher stance on data breaches and ICO penalties have increased nearly tenfold since the implementation of GDPR fines, there is still a risk that organizations will prioritize compliance measures over those that provide real data security, according to Terry Ray, senior vice president of Imperva. This article continues to discuss cybersecurity concerns surrounding GDPR compliance.

    Cybernews reports "GDPR Compliance Is Not Cybersecurity, Says Analyst"

  • news

    Visible to the public "NIST Drafts Major Update to Its Widely Used Cybersecurity Framework"

    Since its initial publication nearly a decade ago, the world's leading cybersecurity guidance is undergoing its first major update. The National Institute of Standards and Technology (NIST) has released a draft version of the Cybersecurity Framework (CSF) 2.0, a new version of a tool it released in 2014 to help organizations understand and communicate cybersecurity risks as well as reduce them. The draft update NIST released for public comment reflects changes in the cybersecurity landscape and makes it easier for all organizations to put the CSF into practice. The CSF provides high-level guidance, including a common language and systematic methodology for managing cybersecurity risk across industries and facilitating communication between technical and nontechnical staff. It includes activities that can be added to cybersecurity programs and customized to suit the specific requirements of an organization. Since its publication a decade ago, users have downloaded the CSF over two million times in more than 185 countries. This article continues to discuss the draft version of CSF 2.0.

    NIST reports "NIST Drafts Major Update to Its Widely Used Cybersecurity Framework"

  • news

    Visible to the public "Identity-Based Attacks Soared in Past Year: Report"

    CrowdStrike recently released its 2023 Threat Hunting Report, warning that threat actors have doubled down on identity-based attacks over the past year. The new report is based on data collected over 12 months between July 1, 2022, and June 30, 2023, and it covers several major topics, including identity threats, cybercrime group techniques and tactics, and Linux and macOS insights and trends. CrowdStrike found that 62% of interactive intrusions involved the abuse of valid accounts, and 34% of breaches involved the use of domain or default accounts. In addition, there was a 160% increase in attempts to collect secret keys and other credentials through cloud instance metadata APIs. Pass-the-hash attacks increased by 200% year-over-year. CrowdStrike noted that the biggest rise related to identity threats was observed in Kerberoasting attacks, which increased by 583%, with a Russian-speaking ransomware group known as Vice Spider and Vice Society being responsible for 27% of all Kerberoasting attacks. Kerberoasting is a post-exploitation technique that involves the abuse of the Kerberos network authentication protocol. CrowdStrike observed a 40% year-over-year increase in interactive intrusions, with the technology sector being the most targeted for the sixth year in a row. The financial services industry saw the biggest increase in interactive intrusions, at more than 80%.

    SecurityWeek reports: "Identity-Based Attacks Soared in Past Year: Report"

  • news

    Visible to the public "Over 200 Million Brits Have Data Compromised in Four Years"

    According to security researchers at Imperva, UK organizations lost billions in data breaches between 2019 and 2022, with hundreds of millions of their customers suffering compromise of their personal information. The researchers studied 99,490 breaches reported to the Information Commissioner's Office (ICO) between April 2019 and December 2022, as well as the "most notable breaches" identified by Chartered Institute of Information Security (CIISec) members during the study. The researchers found that data on over 200 million Brits was compromised during the period, the equivalent of every citizen's data being stolen at least three times. The researchers noted that the analysis also revealed that malicious attacks such as malware, phishing, and ransomware accounted for just a third (33%) of breaches reported to the ICO versus 40% of incidents caused by insider threats. Additionally, 10% were related to unauthorized access to data, and 12% to data emailed to the wrong person. A similar share (11%) could be explained by data being lost or stolen, such as device theft. The researchers stated that nearly two-fifths (37%) of all breaches studied can be explained by human error.

    Infosecurity reports: "Over 200 Million Brits Have Data Compromised in Four Years"

  • news

    Visible to the public "Protecting Your Self-Driving Car - And Your Privacy - From Cyberhackers in the Age of AI"

    As cars become increasingly equipped with computerized components, they become more vulnerable to cyberattacks and privacy leaks. Ethical hackers, also known as white hat hackers, have already demonstrated attacks on computerized car technology. The cybersecurity sector is becoming a greater research focus, especially as Artificial Intelligence (AI) innovations enter the auto industry. M. Hadi Amini, an assistant professor at the Knight Foundation School of Computing and Information Sciences in the College of Engineering and Computing at Florida International University, is an expert in developing Machine Learning (ML), AI, and optimization algorithms as well as customizing them for real-world applications, such as healthcare, homeland security, and infrastructure resilience. In the Sustainability, Optimization, and Learning for InterDependent Networks laboratory, he explores integrating AI into complex systems while considering cyber, physical, and societal perspectives. Amini leads the university's AI research for the National Center for Transportation Cybersecurity and Resilience, which is supported by the US Department of Transportation. The potential of AI in vehicles is significant as some drivers are already using the technology to operate their vehicles semi-autonomously, but the technology also poses new challenges. One of the primary focuses is the storage of driver data. A driver's data is required for AI to make smarter decisions. Therefore, Amini is delving into whether or not someone's personal information might be vulnerable if a car is hacked. This article continues to discuss Amini's research on protecting cars and drivers' privacy from hackers in the age of AI.

    Florida International University reports "Protecting Your Self-Driving Car - And Your Privacy - From Cyberhackers in the Age of AI"

  • news

    Visible to the public "LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes"

    Researchers have found 11 living-off-the-land binaries and scripts (LOLBAS) that threat actors could exploit to conduct post-exploitation activities. Nir Chako, a security researcher at Pentera, describes LOLBAS as an attack technique involving using binaries and scripts that are already part of the system for malicious purposes. Since they are all performed by trusted system utilities, it is difficult for security teams to distinguish between legitimate and malicious activities. The cybersecurity company reported discovering nine LOLBAS downloaders and three executors that enable adversaries to download and execute "more robust malware" on infected hosts. The discovered LOLBAS downloaders and executors include MsoHtmEd.exe, Mspub.exe, ProtocolHandler.exe, ConfigSecurityPolicy.exe, InstallUtil.exe, Mshta.exe, Presentationhost.exe, Outlook.exe, MSAccess.exe, scp.exe, and sftp.exe. This article continues to discuss the LOLBAS downloaders and executors that threat actors could abuse for post-exploitation activities.

    THN reports "LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes"