News Items

  • news

    Visible to the public "What Are 'Drainer Smart Contracts' and Why Is the FBI Warning of Them?"

    The FBI urges potential Non-Fungible Token (NFT) buyers to look out for malicious websites that use "drainer smart contracts" to secretly steal from cryptocurrency wallets. The websites pose as outlets for legitimate NFT projects with new offerings. They are promoted by compromised social media accounts belonging to known NFT developers or accounts designed to appear as if they belong to such developers. Posts attempt to provoke a sense of urgency by using phrases such as "limited supply" or referring to the promotion as a "surprise." FBI officials noted in an advisory that the spoofed websites invite victims to connect their cryptocurrency wallets and purchase the NFT. The victims connect their cryptocurrency wallets unknowingly to a drainer smart contract, transferring their cryptocurrency and NFTs to wallets operated by criminals. From there, the criminals typically launder the stolen assets through a series of cryptocurrency exchanges or other services that mix them with others' assets to cover the path and destination of the stolen NFTs. Smart contracts are a form of computer code that executes a transaction or agreement, typically involving the transfer of digital assets. Criminals often use smart contracts with flaws or loopholes that allow them to transfer millions of dollars in assets from one or more parties entering the agreement. This article continues to discuss the FBI's warning about drainer smart contracts.

    Ars Technica reports "What Are 'Drainer Smart Contracts' and Why Is the FBI Warning of Them?"

  • news

    Visible to the public "Colorado Department of Higher Education Discloses Ransomware Attack, Data Breach"

    The Colorado Department of Higher Education (CDHE) recently has been targeted in a ransomware attack that resulted in a data breach impacting many students and teachers. The organization said it became aware of a cyberattack involving ransomware on June 19. The CDHE noted that the investigation is ongoing, but it appears that cybercriminals had access to CDHE systems between June 11 and June 19, obtaining names, social security numbers, student identification numbers, and other education records. The CDHE stated that impacted individuals include "those that attended a public institution of higher education in Colorado between 2007-2020, attended a Colorado public high school between 2004-2020, individuals with a Colorado K-12 public school educator license between 2010-2014, participated in the Dependent Tuition Assistance Program from 2009-2013, participated in Colorado Department of Education's Adult Education Initiatives programs between 2013-2017, or obtained a GED between 2007-2011 may be impacted by this incident." Those affected by the breach are being offered free credit monitoring and identity theft protection services.

    SecurityWeek reports: "Colorado Department of Higher Education Discloses Ransomware Attack, Data Breach"

  • news

    Visible to the public "Lazarus Hack Russian Missile Maker as Moscow Pleas for Shells"

    According to technical evidence reviewed by Reuters and an analysis conducted by security researchers, an elite group of North Korean (DPRK) hackers infiltrated the computer networks of a Russian missile developer for at least five months in 2022. Reuters discovered that cyber espionage teams with ties to the North Korean government, known as ScarCruft and Lazarus among security researchers, secretly installed stealthy digital backdoors into the systems of NPO Mashinostroyeniya, a rocket design bureau based in Reutov, which is a small town on the outskirts of Moscow. Reuters could not confirm whether any data was taken or what information may have been viewed during the breach. In the months following the digital break-in, Pyongyang announced several developments in its banned ballistic missile program, but it is unclear if this was linked to the breach. According to experts, the incident demonstrates that the isolated country will even target its allies, such as Russia, to acquire critical technologies. This article continues to discuss the breach of a major Russian missile developer by the Lazarus hacking group.

    Cybernews reports "Lazarus Hack Russian Missile Maker as Moscow Pleas for Shells"

  • news

    Visible to the public "Clop Ransomware Now Uses Torrents to Leak Data and Evade Takedowns"

    The Clop ransomware gang has modified its extortion tactics, now using torrents to distribute data stolen in MOVEit attacks. The group launched a wave of data theft attacks beginning on May 27, exploiting a zero-day vulnerability in the MOVEit Transfer secure file transfer platform. The threat actors stole data from nearly 600 organizations by exploiting this zero-day vulnerability. On June 14, the ransomware gang began extorting its victims, gradually adding their names to their Tor data leak site and eventually releasing the files to the public. However, leaking data through a Tor site has drawbacks, as the slow download speed makes the leak, in some cases, less damaging than it could be if the data was easier to access. To overcome this, Clop created clearweb sites to leak stolen data for some MOVEit data theft victims, but these domains are easier for law enforcement and businesses to shut down. Therefore, Clop has begun leaking stolen data via torrents as a new remedy to these issues. This article continues to discuss the Clop ransomware gang moving to torrents.

    Bleeping Computer reports "Clop Ransomware Now Uses Torrents to Leak Data and Evade Takedowns"

  • news

    Visible to the public "PaperCut Fixes Bug That Can Lead To RCE"

    Researchers at Horizon3.ai have published information about CVE-2023-39143, two vulnerabilities in PaperCut application servers that unauthenticated attackers could exploit to execute code remotely. It is not a "one-shot" Remote Code Execution (RCE) bug, unlike the PaperCut vulnerability, tracked as CVE-2023-27350, recently exploited by Clop and LockBit ransomware affiliates. Researchers noted that CVE-2023-39143 is more difficult to exploit because multiple vulnerabilities must be chained together to compromise a server. PaperCut NG and MF are popular print management server software solutions. PaperCut NG and MF versions released before v22.1.3 contain the path traversal vulnerabilities (CVE-2023-39143) that could be exploited to read, delete, and upload arbitrary files to a vulnerable application server. This article continues to discuss the bug fixed by PaperCut.

    Help Net Security reports "PaperCut Fixes Bug That Can Lead To RCE"

  • news

    Visible to the public "How To Deal With the Vagueness in New Cyber Regulations"

    This year, regulatory bodies at all levels of government have issued stricter privacy and disclosure requirements and penalties, crafted with ambiguous language and vague guidelines, leaving cybersecurity teams buried in liability and without a clear path to compliance. Recent Security and Exchange Commission (SEC) guidelines on cyber incident disclosure are an example of the confusion that can be caused by vague regulatory language. Adam Shostack, a cybersecurity expert, observes that the rules are widely misinterpreted. Shostack considers the requirement for transparency to be generally positive, but it is essential to note that it is within four days of determining it is a material breach, not within four days of discovering a breach. As Shostack emphasizes, many people fail to recognize this distinction. This article continues to discuss the vagueness of new cyber regulations.

    Dark Reading reports "How To Deal With the Vagueness in New Cyber Regulations"

  • news

    Visible to the public "New 'Deep Learning Attack' Deciphers Laptop Keystrokes with 95% Accuracy"

    A group of researchers has developed a "deep learning-based acoustic side-channel attack" that is 95 percent accurate in classifying laptop keystrokes recorded by a nearby phone. According to the researchers Joshua Harrison, Ehsan Toreini, and Maryam Mehrnezhad, when trained on keystrokes recorded with the video conferencing software Zoom, an accuracy of 93 percent was reached, a new record for the medium. Side-channel attacks are a class of security exploits aimed at gaining information from a system by monitoring and measuring its physical effects while processing sensitive data. Typical observable effects include runtime behavior, power consumption, electromagnetic radiation, acoustics, and cache accesses. To execute the attack, the researchers first conducted experiments with 36 of the Apple MacBook Pro's keys (0-9, a-z), pressing each key 25 times in a row, varying in pressure and finger. The next step involved isolating the individual keystrokes and converting them into a mel-spectrogram, on which a deep learning model called CoAtNet was run to classify the keystroke images. This article continues to discuss the deep learning-based acoustic side-channel attack.

    THN reports "New 'Deep Learning Attack' Deciphers Laptop Keystrokes with 95% Accuracy"

  • news

    Visible to the public "Vanderbilt Computer Scientists Develop Community-Based App for Managing Mobile Privacy and Security"

    Mamtaj Akter, a graduate student in computer science at Vanderbilt University working in the lab of Pamela Wisniewski, Flowers Family Fellow in Engineering and associate professor of computer science, co-authored a study evaluating how technology can help people in managing mobile privacy and security as a community. The Community Oversight of Privacy and Security (CO-oPS) app was developed in 2022 by Akter, Wisniewski, and their collaborators from the University of North Carolina-Charlotte and the University of Cincinnati to evaluate the role of community oversight in fostering collective efficacy for groups managing their mobile privacy and security together. Their initial research focused on its use by parents and teens. The current research, conducted within the Socio-Technical Interaction Research lab led by Wisniewski, Akter, and her co-authors, was a four-week field study with 22 communities of friends, families, and/or coworkers who installed the CO-oPS app on their mobile devices. Individual and community participation in mobile privacy and security co-management, as well as transparency, trust, and awareness of one another's mobile privacy and security behaviors, were measured. After using the app, individual and collective capacity for managing mobile privacy and security increased, with some concerns regarding collaborative management of mobile privacy and security. This article continues to discuss the research and findings behind the CO-oPS app.

    Vanderbilt University reports "Vanderbilt Computer Scientists Develop Community-Based App for Managing Mobile Privacy and Security"

  • news

    Visible to the public "Decommissioned Medical Infusion Pumps Sold on Secondary Market Could Reveal Wi-Fi Configuration Settings"

    Rapid7 researchers warn that the secondary market sale of decommissioned medical infusion pumps may result in the exposure of Wi-Fi configuration settings. Most medical infusion pumps purchased from secondary market services such as eBay contained wireless authentication data from the initial medical organization that deployed the devices. The researchers analyzed three different infusion pump models: the Alaris PC 8015, the Baxter Sigma Spectrum model 35700BAX2, and the Hospira Abbott PLUM A+ with MedNet. They analyzed 13 infusion pumps that are still in use in many medical facilities worldwide despite no longer being manufactured. Sensitive data was gathered by analyzing the content of compact flash cards, capturing serial communication while using the product's maintenance software serial communication, and physically removing and extracting data from the flash memory chip on the main circuit boards. Researchers retrieved hostnames with domain information, AES keys for encryption, SSIDs, Wi-Fi Pre Shared Keys (PSK) passphrases in clear text, Microsoft Active Directory authentication credentials, and Wi-Fi configuration settings. This article continues to discuss the security risks posed by decommissioned medical infusion pumps sold via the secondary market.

    Security Affairs reports "Decommissioned Medical Infusion Pumps Sold on Secondary Market Could Reveal Wi-Fi Configuration Settings"

  • news

    Visible to the public "Hackers Could Have Scored Unlimited Airline Miles by Targeting One Platform"

    Travel rewards programs, such as those offered by airlines and hotels, highlight the benefits of joining their club as opposed to others. The digital infrastructure of many of these programs, including Delta SkyMiles, United MileagePlus, Hilton Honors, and Marriott Bonvoy, is built on the same platform. The infrastructure is provided by Points and its suite of services, which includes an expansive Application Programming Interface (API). However, new research published by a group of security researchers reveals vulnerabilities in the Points[.]com API that could have been exploited to expose customer data, steal customers' "loyalty currency" (miles), or even compromise Points global administration accounts in order to take control of entire loyalty programs. This article continues to discuss the potential exploitation and impact of the flaws found in the Points platform.

    Wired reports "Hackers Could Have Scored Unlimited Airline Miles by Targeting One Platform"

  • news

    Visible to the public "Many Tech Experts Fail a Test of Their Cybersecurity Knowledge"

    A survey of over 2,300 self-identified technologists from 90 countries reveals a lack of cybersecurity knowledge. In April and May, on behalf of RSA Security, a series of fact-based questions were posed, such as the most common cause of data breaches and how to implement a zero-trust strategy. The results were recently released as part of the RSA ID IQ report, as most of the questions dealt with identity-related issues. Fewer than 10 percent of respondents answered the majority of questions correctly, while nearly 50 percent answered at least half of the questions incorrectly. Two-thirds of the self-proclaimed experts in identity management did not choose the best practices for phishing prevention. This article continues to discuss key findings from the survey on cybersecurity knowledge.

    SiliconANGLE reports "Many Tech Experts Fail a Test of Their Cybersecurity Knowledge"

  • news

    Visible to the public "Google, Microsoft Take Refuge in Rust Language's Better Security"

    When Fortanix launched in 2016, the company decided to commit to the one-year-old Rust's programming language to benefit from its security strengths and performance. Seven years later, Fortanix's commitment to Rust has proved to be a success. Eight years after its 1.0 release, the Rust language and development platforms continue to gain popularity among developers and companies focused on secure code. Currently, Rust has a far lower TIOBE rating than C or C++. However, the language is seeing significant additional users year over year. Rust also has a committed following. According to the Stack Overflow 2023 Developer Survey, while only 12% of programmers used the technology in the past year, nearly 85% of those developers want to continue using the language, making it the "most admired" programming language. Mircosoft is now also turning to using Rust as part of an effort to eliminate classes of bugs. The company has created DWriteCore in Rust to turn font parsing into a memory safety feature and is currently working on experimenting with writing parts of the graphics driver interface (GDI) in Rust. The company has seen performance increase by 5% to 15% in early versions of the code. Google is also a major supporter of Rust. The company attributes a drop in the share of memory-safety vulnerabilities in Android to the transition to Rust, Kotlin (a functional programming language), and Java from C and C++.

    Dark Reading reports: "Google, Microsoft Take Refuge in Rust Language's Better Security"

  • news

    Visible to the public "Russia-Based Hackers Building New Attack Infrastructure to Stay Ahead of Public Reporting"

    Due to increased public reporting by security researchers and technology companies such as Microsoft and Google, a Russia-based hacking group connected to previous attacks on governments is shifting tactics. According to a report from Recorded Future, since March 2023, the group tracked as BlueCharlie, has established new infrastructure to launch attacks against various targets. BlueCharlie aims to collect information, steal credentials, and conduct hack-and-leak operations against Ukraine and North Atlantic Treaty Organization (NATO) nations. Several companies track the group as Calisto, COLDRIVER, or Star Blizzard/SEABORGIUM. It has previously targeted different government, higher education, defense, and political sector organizations, as well as non-governmental organizations (NGOs), activists, journalists, think tanks, and national laboratories. Recorded Future's Insikt Group could not determine who was targeted in this campaign but said they have observed it register 94 new domains as part of its new infrastructure building. According to the researchers, several tactics, techniques, and procedures (TTPs) observed in BlueCharlie's current operation deviate from previous activity, suggesting that the group is evolving its operations in response to public disclosures of its activities. This article continues to discuss recent findings and observations regarding BlueCharlie.

    The Record reports "Russia-Based Hackers Building New Attack Infrastructure to Stay Ahead of Public Reporting"

  • news

    Visible to the public "Threat of Cyber Attacks to National Security Compared to That of Chemical Weapons"

    According to the UK government's latest National Risk Register (NRR) report for 2023, the risk of cyberattacks is now considered to be more severe than that posed by small-scale chemical, biological, radiological, or nuclear (CBRN) attacks, such as the Salisbury poisoning. The NRR report assigns severity scores to various scenarios that could significantly impact the national safety and security of the UK. Cyberattacks on infrastructure were given a 3 out of 5 impact rating, or 'moderate,' alongside risks such as climate change-induced severe storms and terrorist attacks on transportation. In comparison, small-scale CBRN attacks were rated a 2 or 'limited.' In the 2020 NRR, cyberattacks were classified as a 'minor' risk that would disrupt critical services for less than 12 hours and cause tens of millions of pounds in damage. This article continues to discuss the UK government raising the threat level posed by cyberattacks.

    ITPro reports "Threat of Cyber Attacks to National Security Compared to That of Chemical Weapons"

  • news

    Visible to the public "Report Reveals 'Sudden Surge' in Cyberattacks Targeting Government Agencies"

    According to a new report, cyberattacks against government agencies and the public sector have increased alarmingly over the past few months, as threat actors deployed various novel malware campaigns targeting financial institutions, healthcare services, and critical infrastructure industries. Blackberry's quarterly Global Threat Intelligence report reveals a 40 percent rise in attacks against government agencies and the public sector between March and May, as well as a 13 percent increase in novel malware samples. Blackberry's vice president of threat research and intelligence, Ismael Valenzuela, noted that these organizations struggle to defend against the threat posed by nation-states and cybercriminals due to limited resources and immature cyber defense programs. The report described the increase in attacks against the public sector as a "sudden surge" partly attributed to "extremely active" state-sponsored threat actors linked to Russia and North Korea. These actors primarily target government agencies, military organizations, businesses, and financial institutions in the US, Europe, and South Korea. In addition, they frequently modify their methods to make their attacks more difficult to detect and defend against. The growth in cyberattacks against US institutions coincides with recent high-profile breaches affecting multiple federal agencies. This article continues to discuss the rise in cyberattacks targeting government agencies and the public sector.

    NextGov reports "Report Reveals 'Sudden Surge' in Cyberattacks Targeting Government Agencies"

  • news

    Visible to the public "A Cyberattack Has Disrupted Hospitals and Health Care in Five States"

    A recent cyberattack has disrupted hospital computer systems in several states, forcing some emergency rooms to close and ambulances to be diverted, and many primary care services remained closed on Friday as security experts worked to determine the extent of the problem and resolve it. The "data security incident" began Thursday at facilities operated by Prospect Medical Holdings, which is based in California and has hospitals and clinics there and in Texas, Connecticut, Rhode Island, and Pennsylvania. Prospect Medical Holdings stated that upon learning of the data security incident, they took their systems offline to protect them and launched an investigation with the help of third-party cybersecurity specialists. The company noted that while the investigation continues, they are focused on addressing the pressing needs of their patients as they work diligently to return to normal operations as quickly as possible.

    SecurityWeek reports: "A Cyberattack Has Disrupted Hospitals and Health Care in Five States"

  • news

    Visible to the public "CISA Cybersecurity Strategic Plan: Shifting the Arc of National Risk to Create a Safer Future"

    President Biden issued the National Cybersecurity Strategy in March, outlining a clear and imperative path for the US. As the nation's Cyber Defense Agency, the Cybersecurity and Infrastructure Security Agency (CISA) plays a pivotal role in advancing toward a future in which robust collaboration is the norm and the responsibility for more effective and equitable cybersecurity is rebalanced. CISA has released its Cybersecurity Strategic Plan for FY2024-2026 to assure accelerated progress toward this vision. The plan is centered on three goals: addressing immediate threats, hardening the environment, and driving security at scale. CISA will collaborate with partners to gain visibility into the breadth of intrusions targeting the US, enable the disruption of threat actor campaigns, ensure adversaries are quickly evicted when intrusions occur, and expedite the mitigation of exploitable conditions that adversaries repeatedly exploit. This article continues to discuss the CISA Cybersecurity Strategic Plan.

    CISA reports "CISA Cybersecurity Strategic Plan: Shifting the Arc of National Risk to Create a Safer Future"

  • news

    Visible to the public "New York Couple Plead Guilty to Bitcoin Laundering"

    A married couple from New York dubbed "Bitcoin Bonnie and Crypto Clyde" recently pleaded guilty to laundering billions of dollars in stolen bitcoin. Ilya Lichtenstein, 35, and Heather Morgan, 33, were arrested in February last year after the US government seized 95,000 bitcoin, then valued at $3.6 billion. Prosecutors said the pair stole the bitcoin in 2016 using "advanced hacking tools." Authorities recovered the funds from wallets controlled by the duo. The Southern District of New York stated that since their arrests, the government has seized another approximately $475 million tied to the hack. In total, the couple admitted to laundering conspiracies arising from the theft of approximately 120,000 bitcoin from Bitfinex, a global cryptocurrency exchange. The charges carry a maximum penalty of 20 years in prison. Prosecutors noted that Lichtenstein, at times with Morgan's help, "employed numerous sophisticated laundering techniques." That included using fictitious identities to set up online accounts and utilizing computer programs to automate transactions. They deposited the stolen funds into accounts in various darknet markets and cryptocurrency exchanges and then withdrew the money, which confuses the transaction history. The couple also converted bitcoin to other forms of cryptocurrency and even exchanged a portion of the stolen funds into gold coins, which Morgan then concealed by burying them.

    SecurityWeek reports: "New York Couple Plead Guilty to Bitcoin Laundering"

  • news

    Visible to the public "CPU Security Loophole: Analysis of Energy Consumption Allows Data Theft"

    Central Processing Units (CPUs) are designed to run multiple applications simultaneously, which is advantageous for productivity, but poses a security risk. By analyzing the processor's energy consumption, researchers at TU Graz and the Helmholtz Center for Information Security have discovered a novel technique named "Collide+Power" that enables attackers to read data from the memory of CPUs. The adversary stores a data package on a CPU segment in this attack. In the second phase, malicious code causes the attacker's data to be overwritten with the targeted data. This overwriting consumes power, and the greater the difference between the two data packages, the more power is consumed. The process is repeated thousands of times, each time with minimally different attacker data packages to be overwritten. The targeted data package can be derived from the variations in power consumption that occur throughout this process. This article continues to discuss the novel security gap in all common CPUs that is difficult to mitigate.

    Graz University of Technology reports "CPU Security Loophole: Analysis of Energy Consumption Allows Data Theft"

  • news

    Visible to the public "Credentials Account For Over Half of Cloud Compromises"

    Google recently discovered that over half (55%) of public cloud compromises in the first three months of the year were down to a missing or weak password. Google noted that the second most common compromise factor in the period was misconfiguration, which accounted for 19% of incidents. Google said misconfigurations could also be linked to other compromise factors, such as exposure of sensitive UIs or APIs, which accounted for 12% of incidents. Google noted that the top risk action leading to compromise in Google Cloud environments was overwhelmingly cross-project abuse of access token generation permission (75%). Google stated that this can be associated with the MITRE ATT&CK tactic of privilege escalation and the technique of "valid accounts: cloud accounts." In second place came replacement of existing compute disks or snapshots, which accounted for 12% of alerts detected by Google.

    Infosecurity reports: "Credentials Account For Over Half of Cloud Compromises"

  • news

    Visible to the public "U-M Researchers Play Role in Creating New California Privacy Choice Icon"

    California has enacted a new online privacy icon designed to give users greater authority over their personal information. Researchers from the University of Michigan's School of Information (UMSI) led the research to create the icon, simplifying consumers' privacy choices. According to Florian Schaub, associate professor of information at the University of Michigan, consolidation was found to be the most important aspect of the design when testing different styles of icons to get consumers' reactions. One link is the most effective and easy-to-understand alternative to multiple links for different aspects of a privacy policy. Implementing clear opt-out options and concrete privacy choices will benefit consumers by easing their control over their personal data. Schaub, Yixin Zou, a former doctoral candidate at UMSI, as well as researchers from Carnegie Mellon University and Fordham University collaborated with the California attorney general's office to research the misconceptions some users had about different privacy icons. They conducted multiple rounds of research and testing to eliminate misconceptions and ensure that the icon effectively conveys the essence of privacy options. This article continues to discuss the new California privacy choice icon.

    The University of Michigan reports "U-M Researchers Play Role in Creating New California Privacy Choice Icon"

  • news

    Visible to the public "Malicious npm Packages Found Exfiltrating Sensitive Data from Developers"

    Researchers have found a new set of malicious packages on the npm package registry that are designed to steal sensitive developer information. On July 31, 2023, the software supply chain company Phylum discovered the "test" packages, which showed increasing capability and refinement before being removed and re-uploaded under new, legitimate-sounding package names. While the campaign's ultimate goal remains unclear, it is believed to be a highly focused effort directed at the cryptocurrency sector based on references to modules such as "rocketrefer" and "binarium." Malikrukd4732, a npm user, published all of the packages. A feature shared by all the modules is the ability to execute JavaScript ("index.js") capable of exfiltrating sensitive information to a remote server. This article continues to discuss findings regarding the new set of malicious npm packages.

    THN reports "Malicious npm Packages Found Exfiltrating Sensitive Data from Developers"

  • news

    Visible to the public "Hacktivists Fund Their Operations Using Common Cybercrime Tactics"

    Hacktivist groups that operate for political or ideological reasons use various strategies to finance their operations. Although hacktivism appears to be about inflicting service disruption through Distributed Denial-of-Service (DDoS) attacks or reputational damage through data leaks, the modus operandi of these threat groups spans a larger array of operations, including common cybercrime strategies, according to the cyber intelligence company KELA. These tactics include stealing and selling data, selling malware and botnet licenses, demanding ransom from victims, and even offering hack-for-hire services that target non-political entities. For example, the pro-Russia hacktivist group KillNet promoted a botnet-for-hire in November 2021, but their monetization methods grew significantly in 2023. KillNet introduced a hack-for-hire service in March 2023, a new DDoS-for-hire service in July 2023, and a 'Dark School' training program in May 2023, selling nine hacking courses to hackers. This article continues to discuss the different ways in which hacktivists fund their operations.

    Bleeping Computer reports "Hacktivists Fund Their Operations Using Common Cybercrime Tactics"

  • news

    Visible to the public "VPNs Remain a Risky Gamble for Remote Access"

    According to a new Zscaler report, organizations are concerned about network security because of the threats posed by Virtual Private Networks (VPNs). Due to the increased threat of cybercriminals exploiting VPN vulnerabilities, the report emphasizes the need for organizations to reevaluate their security posture and shift to a zero-trust architecture. According to the report, 92 percent of survey respondents understand the importance of implementing a zero-trust architecture. However, many organizations continue to use VPNs for remote employee and third-party access, unknowingly creating a major attack surface for threat actors. Eighty-eight percent of organizations are concerned about potential breaches caused by VPN vulnerabilities. Organizations are particularly concerned about possible phishing attacks (49 percent) and ransomware attacks (40 percent) as a result of regular VPN usage. Nearly half of the companies reported being targeted by attackers who were able to exploit a VPN flaw, such as outdated protocols or data leaks. This article continues to discuss key findings and points from Zscaler's report on VPNs.

    Help Net Security reports "VPNs Remain a Risky Gamble for Remote Access"

  • news

    Visible to the public "Exclusive: CISA Sounds the Alarm on UEFI Security"

    The Cybersecurity and Infrastructure Security Agency (CISA) is calling for improved security for Unified Extensible Firmware Interface (UEFI) update mechanisms in the wake of the debacle that has been mitigating the BlackLotus bootkit. CISA urges the computer industry to adopt a secure-by-design approach to improve the overall security of UEFI, which is the firmware responsible for a system's boot-up routine. It comprises several components: security and platform initializers, drivers, bootloaders, and a power management interface. According to Jonathan Spring, senior technical advisor at CISA, secure-by-design is about having the companies that create the software take responsibility for the security, which includes the update pathways. Threat actors can gain a high level of persistence on a device if UEFI is loaded with malicious code. That code will launch before the operating system or any security software, making it invisible to most incident response strategies and operating system-level defenses, as well as resistant to system reboots. This article continues to discuss the importance of improving UEFI security.

    Dark Reading reports "Exclusive: CISA Sounds the Alarm on UEFI Security"

  • news

    Visible to the public "Researcher Explores Effect of Hospital Mergers on Data Breaches"

    According to research conducted by a University of Texas at Dallas doctoral student, patient data is especially vulnerable during and after hospital mergers and acquisitions, when the likelihood of a cybersecurity breach more than doubles. Nan Clement, a Ph.D. candidate in economics at the School of Economic, Political, and Policy Sciences, noted that the announcement of a merger is enough to cause an increase in data breaches. Clement analyzed hospital merger records and archived data breach reporting from the US Department of Health and Human Services (HHS) from 2010 to 2022. She discovered that in a two-year window around hospital consolidation (one year before a deal is closed and one year after), the probability of data breaches in merger targets, buyers, and sellers increased significantly. The probability of a data breach during the two-year window was 6 percent. In comparison, it was a 3 percent probability of a data breach for hospitals that merged over the course of the data set, but were not within the two-year window. This article continues to discuss the study on the impact of hospital mergers on data breaches.

    The University of Texas at Dallas reports "Researcher Explores Effect of Hospital Mergers on Data Breaches"

  • news

    Visible to the public "Researchers Strengthen Defenses Against Common Cyberattack"

    Scientists have developed a method that improves the detection of a common Internet attack by 90 percent compared to current methods. The new technique developed by computer scientists at the Pacific Northwest National Laboratory (PNNL) of the US Department of Energy (DOE) monitors the Internet's ever-changing traffic patterns. PNNL scientist Omer Subasi presented the findings on August 2 at the IEEE International Conference on Cyber Security and Resilience, where the manuscript was deemed the best research paper presented at the conference. The scientists modified the standard playbook for detecting Denial-of-Service (DoS) attacks, in which attackers attempt to bring down a website by bombarding it with requests. In order to increase detection accuracy, the PNNL team sidestepped thresholds and instead focused on the evolution of entropy, a measure of system disorder. This article continues to discuss the new method PNNL researchers developed to recognize a common Internet attack.

    Pacific Northwest National Laboratory reports "Researchers Strengthen Defenses Against Common Cyberattack"

  • news

    Visible to the public "Satellites Easier to Hack Than a Windows Device"

    According to a new paper by a team of researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrucken, satellites are vulnerable to cyberattacks and do not even use basic cryptography. The research team analyzed two smallsats and one medium-sized device. One of the satellites is used commercially and orbits the planet in order to monitor Earth. Rarely do commercial companies disclose information about their software. However, with the help of the European Space Agency (ESA), several universities engaged in the building of satellites, and a commercial company, researchers were able to gain access to sensitive information. Johannes Willbold, a Ph.D. student from Bochum and one of the leaders of the paper's research team, told Cybernews that his group discovered several exploitable flaws in satellites. According to Willbold, malicious hackers could hack them using off-the-shelf equipment. This article continues to discuss Willbold's insights and research on satellite security and why a hacker would target a satellite.

    Cybernews reports "Satellites Easier to Hack Than a Windows Device"

  • news

    Visible to the public "Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks"

    Microsoft Threat Intelligence has recently announced that it detected a series of highly targeted social engineering attacks employing credential theft phishing lures delivered as Microsoft Teams chats. Microsoft stated that these attacks have been traced back to the threat actor known as Midnight Blizzard, previously identified as Nobelium. The method used by the Russia-based threat actor involves exploiting previously compromised Microsoft 365 tenants owned by small businesses to create seemingly legitimate technical support entities. Using these domains from compromised tenants, Midnight Blizzard sends messages through Microsoft Teams to steal credentials by persuading users to approve multi-factor authentication (MFA) prompts. Microsoft's investigation revealed that roughly 40 global organizations have been affected by this campaign. Microsoft noted that the targeted sectors indicate specific espionage objectives by Midnight Blizzard, including government, non-government organizations (NGOs), IT services, technology, discrete manufacturing, and media entities. CEO of My1Login, Mike Newman, stated that this is a highly sophisticated phishing scam that would be almost impossible to detect to the untrained eye. To protect against such attacks, Microsoft advised organizations to implement phishing-resistant authentication methods, use conditional access authentication strength for critical applications, and educate users about social engineering and credential phishing threats.

    Infosecurity reports: "Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks"

  • news

    Visible to the public "Google Awards Over $60,000 for V8 Vulnerabilities Patched With Chrome 115 Update"

    Google recently announced a Chrome 115 update that patches 17 vulnerabilities, including 11 flaws reported by external researchers. Google noted that the browser update resolves three high-severity type confusion bugs in the V8 JavaScript and WebAssembly engine that earned the reporting researchers over $60,000 in bug bounties. The company stated that it handed out $43,000 in rewards to a security researcher named "Jerry," who reported two of these V8 issues, tracked as CVE-2023-4068 and CVE-2023-4070. A $21,000 bug bounty was awarded to Man Yue Mo of GitHub Security Lab for reporting the third type of confusion bug, tracked as CVE-2023-4069. The latest Chrome update also resolves six other high-severity vulnerabilities. Based on the paid bug bounties, the most severe of these is CVE-2023-4071, a heap buffer overflow bug in Visuals. Next in line is an out-of-bounds read and write issue in WebGL (CVE-2023-4072), followed by an out-of-bounds memory access flaw in the ANGLE graphics engine abstraction layer (CVE-2023-4073). The remaining three high-severity security defects that were externally reported are use-after-free vulnerabilities in Blink Task Scheduling, Cast, and WebRTC. Google noted that the latest Chrome iteration also resolves two medium-severity bugs in Extensions: an insufficient data validation and an inappropriate implementation issue. Google says it handed out a total of $123,000 in bug bounty rewards to the reporting researchers. The latest Chrome release is currently rolling out as version 115.0.5790.170 for Mac and Linux and as versions 115.0.5790.170/.171 for Windows. Google makes no mention of any of these vulnerabilities being exploited in attacks.

    SecurityWeek reports: "Google Awards Over $60,000 for V8 Vulnerabilities Patched With Chrome 115 Update"

  • news

    Visible to the public "U.S. and International Cybersecurity Partners Warn Organizations of Routinely Exploited Vulnerabilities"

    The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and international cybersecurity partners have published an advisory on the Common Vulnerabilities and Exposures (CVEs), to include associated Common Weakness Enumeration (CWE), that were routinely and frequently exploited by malicious actors in 2022. The joint Cybersecurity Advisory, titled "2022 Top Routinely Exploited Vulnerabilities," provides technical background information on the 12 most exploited vulnerabilities and an overview of an additional 30 vulnerabilities frequently used to compromise organizations, as well as specific information that organizations can use to identify and mitigate their exposure. This advisory describes the CWEs associated with these vulnerabilities for the first time, reflecting the underlying root causes that lead to the exploitable vulnerability. To reduce the prevalence of common classes of vulnerabilities, this advisory suggests technology vendors implement specific secure-by-design principles and ensure that all published CVEs contain the correct CWE identifying the vulnerability's root cause. This article continues to discuss the new joint advisory urging organizations to implement secure-by-design practices and prioritize patching known exploited vulnerabilities.

    CISA reports "U.S. and International Cybersecurity Partners Warn Organizations of Routinely Exploited Vulnerabilities"

  • news

    Visible to the public "Python Versions of Stealer Malware Discovered Targeting Facebook Business Accounts"

    Researchers have discovered a previously unknown phishing campaign that targets Facebook business accounts and distributes two variants of a Python-written infostealer. Palo Alto Networks Unit 42 reported finding Python variants of the NodeStealer malware while exploring the trend of threat actors targeting Facebook business accounts with phishing lures involving business tools such as spreadsheet templates. Meta described NodeStealer in May, noting that the JavaScript-written malware allowed threat actors to steal browser cookies and hijack accounts. The Python versions of the malware are an improvement over the original by adding cryptocurrency theft capabilities, downloader capabilities, and the ability to take over Facebook business accounts. In addition to the direct impact on Facebook business accounts, which is primarily financial, the malware also steals browser credentials that can be used for future attacks. According to Unit 42 researchers, the campaign ran until December 2022 and is no longer active. However, the researchers believe that the threat actors behind the attacks will continue to develop NodeStealer or use similar techniques to continue targeting Facebook business accounts. This article continues to discuss the Python versions of the NodeStealer malware targeting Facebook business accounts.

    SC Magazine reports "Python Versions of Stealer Malware Discovered Targeting Facebook Business Accounts"

  • news

    Visible to the public "Salesforce Email Service Zero-Day Exploited in Phishing Campaign"

    According to security researchers at Guardio, threat actors have exploited a Salesforce zero-day vulnerability and abused Meta features in a sophisticated phishing campaign. Attackers sent out legitimate-looking emails designed to lure targeted users to a phishing page where they were instructed to hand over their Facebook account information, including their name, account name, email address, phone number, and password. The researchers noted that the emails mentioned the targeted user's real name, appeared to come from "Meta Platforms," and were sent from an @salesforce[.]com address. A button included in the email led users to a legitimate Facebook domain, "apps.facebook[.]com", where they were informed about violating Facebook's terms of service. When users clicked on a button to resolve the issue, they were taken to a phishing page that instructed them to provide their information. The researchers stated that the fact that the email came from an @salesforce[.]com address and the link it included pointed to facebook[.]com helped the phishing emails bypass traditional security mechanisms. The analysis revealed that the attackers had targeted the Email Gateway component in the Salesforce CRM, specifically an "Email-To-Case" feature designed to convert customer inbound emails into actionable tickets in Salesforce. By abusing this feature, the attacker managed to receive verification emails that gave them control over a genuine Salesforce email address that they could use to send out the phishing emails. As for Facebook, the phishing page was hosted on a legacy web games platform offered by Facebook until 2021. The researchers noted that while the platform has been discontinued, games developed prior to this date can still receive support, and it appears that the attackers gained access to an account associated with such a game. They used that account to host their phishing page. The researchers notified Salesforce on June 28, and a fix was rolled out to all impacted services and instances within a month, preventing the use of an address from the Salesforce domain to send emails. Salesforce said it had no evidence of impact to customer data.

    SecurityWeek reports: "Salesforce Email Service Zero-Day Exploited in Phishing Campaign"

  • news

    Visible to the public "OWASP Top 10 for LLM (Large Language Model) Applications"

    The Open Worldwide Application Security Project (OWASP) has released the "OWASP Top 10 for Large Language Model (LLM) Applications" list, which highlights the most critical vulnerabilities impacting LLM applications. The project aims to educate developers, designers, architects, managers, and organizations on the security issues associated with the deployment of LLMs. The organization notes that developers and security experts who design and implement LLM applications are the primary audiences for its Top 10. However, other stakeholders in the LLM ecosystem, such as academics, legal professionals, compliance officers, and end users, may be interested in this list. Nearly 500 security specialists, Artificial Intelligence (AI) researchers, developers, industry leaders, and academics contributed to the compilation of this list. This article continues to discuss the goals of the OWASP Top 10 for LLM Applications project and the most critical vulnerabilities included on the list.

    Security Affairs reports "OWASP Top 10 for LLM (Large Language Model) Applications"

  • news

    Visible to the public "Humans Unable to Reliably Detect Deepfake Speech"

    Researchers from the University College London (UCL) have discovered that humans cannot detect deepfake speech 27% of the time. During the study, the researchers presented 529 individuals with genuine and deepfake audio samples and asked them to identify the deepfakes. Participants could only identify the fake audio 73% of the time, although detection accuracy improved by 3.84% on average after they received training to recognize aspects of deepfake speech. The researchers noted that they used a text-to-speech (TTS) algorithm trained on two publicly available datasets to produce the deepfake speech samples. These were run in English and Mandarin to understand if language can affect detection performance and decision-making rationale. The researchers stated that their findings confirm that humans are unable to reliably detect deepfake speech, whether or not they have received training to help them spot artificial content. The researchers noted that the samples that they used in this study were created with algorithms that are relatively old, which raises the question of whether humans would be less able to detect deepfake speech created using the most sophisticated technology available now and in the future. The researchers are now planning to develop better automated speech detectors as part of efforts to create detection capabilities for deepfake audio and imagery.

    Infosecurity reports: "Humans Unable to Reliably Detect Deepfake Speech"

  • news

    Visible to the public "NSA Releases Guide to Harden Cisco Next Generation Firewalls"

    The National Security Agency (NSA) has issued a new Cybersecurity Technical Report (CTR) titled "Cisco Firepower Hardening Guide" to help network and system administrators configure these next generation firewalls (NGFWs). The CTR covers properly configuring NGFWs and provides best practices for configuring and hardening Cisco Firepower Threat Defense (FTD), now known as Cisco Secure Firewall, systems beyond default security features and traditional firewall capabilities. The report notes that Cisco FTD systems are NGFWs that incorporate application and network layer security features. In addition to traditional features, NGFWs offer application visibility and controls (AVC), URL filtering, user identity and authentication, malware protection, and intrusion prevention. This article continues to discuss NSA's CTR on strengthening the security of Cisco NGFWs.

    NSA reports "NSA Releases Guide to Harden Cisco Next Generation Firewalls"

  • news

    Visible to the public "Tesla Jailbreak Unlocks Theft of In-Car Paid Features"

    Tesla cars are vulnerable to a nearly irreversible jailbreak of their onboard infotainment systems, which would enable owners to gain access to a variety of paid in-car features for free. According to a team of researchers, the stolen benefits can range from better bandwidth to faster acceleration and heated seats. The researchers also discovered that it is possible to escape the infotainment system and switch to the internal Tesla network for authenticating cars, which opens the door to more advanced modding, including breaking geolocation restrictions on navigation and self-driving and the ability to transfer the Tesla's "user profile" to another vehicle. Teslas have been at the forefront of enabling "smart" features, notably autonomous driving, for quite some time. All recent Tesla models feature an AMD-based infotainment system called MCU-Z, allowing an innovative in-car purchase scheme for advanced features enabled over-the-air (OTA) upon purchase. This was the target of a group of doctoral students in the Technical University of Berlin graduate program and independent researcher Oleg Drokin. This article continues to discuss the researchers' demonstrated jailbreaking of Tesla cars.

    Dark Reading reports "Tesla Jailbreak Unlocks Theft of In-Car Paid Features"

  • news

    Visible to the public "Russian APT Phished Government Employees via Microsoft Teams"

    Microsoft reports that an Advanced Persistent Threat (APT) group with ties to Russia's Foreign Intelligence Service has used Microsoft Teams to launch phishing attacks against employees of dozens of global organizations. To host and execute their social engineering attack, the actor uses Microsoft 365 tenants belonging to small businesses they have compromised in previous attacks. According to the company, the actor renames the compromised tenant, adds a new onmicrosoft[.]com subdomain, and then adds a new user associated with that domain to send the outbound message to the target tenant. The actor-controlled subdomains and new tenant names contained product- or security-related keywords. The actor would then send a Microsoft Teams message request to the targeted employees, who, if they accepted, would receive a message urging them to input a code into the Microsoft Authenticator app on their mobile device. This article continues to discuss the Russian APT group targeting employees of global organizations with phishing attacks via Microsoft Teams.

    Help Net Security reports "Russian APT Phished Government Employees via Microsoft Teams"

  • news

    Visible to the public "'Mysterious Team Bangladesh' Targeting India with DDoS Attacks and Data Breaches"

    Since June 2022, the hacktivist group Mysterious Team Bangladesh has been linked to more than 750 Distributed Denial-of-Service (DDoS) attacks and 78 website defacements. According to Group-IB, the group primarily targets logistics, government, and financial sector organizations in India and Israel. The group's main motivations are religious and political. Other countries of interest to the group include Australia, Senegal, the Netherlands, Sweden, and Ethiopia. In addition, the threat actor is said to have gained access to web servers and administrative panels, most likely by exploiting known security vulnerabilities or poorly protected passwords. Mysterious Team Bangladesh, as its name suggests, is likely of Bangladeshi origin. The group maintains an active presence on Telegram and Twitter. This article continues to discuss findings regarding the Mysterious Team Bangladesh hacktivist group.

    THN reports "'Mysterious Team Bangladesh' Targeting India with DDoS Attacks and Data Breaches"

  • news

    Visible to the public "Over 640 Citrix Servers Backdoored With Web Shells in Ongoing Attacks"

    Hundreds of Citrix Netscaler ADC and Gateway servers have been compromised and backdoored in a series of attacks targeting a critical Remote Code Execution (RCE) flaw, tracked as CVE-2023-3519. The vulnerability has been exploited as a zero-day to breach the network of a US critical infrastructure organization. Shadowserver Foundation security researchers have revealed that the attackers had deployed web shells on at least 640 Citrix servers in these attacks. This article continues to discuss Citrix Netscaler ADC and Gateway servers being breached and backdoored in attacks targeting an RCE vulnerability.

    Bleeping Computer reports "Over 640 Citrix Servers Backdoored With Web Shells in Ongoing Attacks"

  • news

    Visible to the public "AI-Powered CryptoRom Scam Targets Mobile Users"

    According to security researchers at Sophos, CryptoRom, a notorious scam that combines fake cryptocurrency trading and romance scams, has taken a new twist by utilizing generative artificial intelligence (AI) chat tools to lure and interact with victims. The researchers noted that CryptoRom scams typically begin by contacting potential targets through dating apps or social media platforms. Once the conversation moves to private messaging apps like WhatsApp or Telegram, the scammers introduce the idea of trading cryptocurrencies and offer to guide the targets through installing and funding a fake crypto-trading app. The researchers stated that what makes this new development particularly concerning is the use of generative AI tools like ChatGPT or Google Bard to assist scammers in creating more convincing conversations with targets. This makes the interactions more persuasive and reduces the workload for the scammers when dealing with multiple victims. Moreover, the researchers noted that recent cases revealed that scammers are not stopping at the initial "tax" payment but are coming up with additional excuses to extract even more money from victims. The researchers noted that the scammers have also slipped their fraudulent apps past both Apple's and Google's app store reviews by modifying the app's content after approval. By changing a pointer in remote code, the benign app can be switched to a fraudulent one without further scrutiny. The researchers warned individuals who believe they may have fallen victim to these scams to report the incident to local authorities experienced in dealing with fraud cases. Victims are also advised to contact their banks to see if any transactions can be reversed and report the wallet addresses of the fraud to the relevant cryptocurrency exchange.

    Infosecurity reports: "AI-Powered CryptoRom Scam Targets Mobile Users"

  • news

    Visible to the public Call for Papers: Journal of Cybersecurity Special Collection

    Call for Papers
    Special Collection: The Philosophy of Information Security

    Editors: David Pym and Jonathan Spring

    For this special collection, we solicit papers at the intersection of philosophy, information security, and philosophy of science. There are multiple under-explored ways in which these fields intersect.

    Suggested, but not exclusive, topics include:

  • news

    Visible to the public "Allegheny County Issues Notice of Data Breach"

    Allegheny County recently released limited details on a data breach. According to the county, they were affected by a global cybersecurity incident impacting the popular file transfer tool, MOVEit. The county noted that the breach allowed a group of cybercriminals to access county files on May 28 and 29. The hackers claim they're only interested in business data and deleted files from the county. However, the county said they could have obtained personal information from Social Security numbers to health information. The county recommends that those concerned they are affected by the breach should monitor their credit for things such as new credit inquiries, new accounts opened, delinquent payments, and other things that would imply their identity was stolen.

    CBS Pittsburgh reports: "Allegheny County Issues Notice of Data Breach"

  • news

    Visible to the public "OT/IoT Malware Surges Tenfold in First Half of the Year"

    According to security researchers at Nozomi Networks, malware-related cyber threats in operational technology (OT) and Internet of Things (IoT) environments jumped tenfold year-on-year in the first six months of 2023. The researchers noted that specific to malware, denial-of-service (DoS) activity remains one of the most prevalent attacks against OT systems. This is followed by the remote access trojan (RAT) category commonly used by attackers to establish control over compromised machines. The researchers noted that distributed denial of service (DDoS) threats are the top threat in IoT network domains. The researchers stated that malicious IoT botnets remain active this year as threat actors continue to use default credentials in attempts to access chained IoT devices. Trojans, "dual use" malware, and ransomware were among the most commonly detected alerts across OT and IoT environments, with phishing a common vector for stealing information, establishing initial access, and deploying malware. The researchers stated that poor authentication and password hygiene topped the list of most prolific threats for the period, despite alerts declining by 22% YoY. However, network anomalies and attacks were up 15%, and access control and authorization threats surged 128%. The manufacturing, energy, healthcare, water, and wastewater sectors were hardest hit, alongside the public sector. The researchers found that water treatment organizations experienced a large number of generic network scans, while oil and gas facilities suffered OT protocol packet injection attacks. The researchers noted that "the number of OT/IoT vulnerabilities remains high, with 643 published during the six months, while Nozomi's honeypots detected an average of 813 unique attacks daily."

    Infosecurity reports: "OT/IoT Malware Surges Tenfold in First Half of the Year"

  • news

    Visible to the public "Firefox 116 Patches High-Severity Vulnerabilities"

    Mozilla recently announced the release of Firefox 116, Firefox ESR 115.1, and Firefox ESR 102.14, which include patches for multiple high-severity vulnerabilities. Mozilla lists 14 CVEs in its advisory, nine of which are rated high severity. Three of the CVEs refer to memory safety bugs in Firefox. The first of the high-severity flaws tracked as CVE-2023-4045 is described as a cross-origin restrictions bypass in Offscreen Canvas, which failed to properly track cross-origin tainting. Mozilla noted that the issue can allow web pages to view images displayed in a page from a different site. Browsers include a same-origin policy that prevents HTML and JavaScript code originating on a website from accessing content on other sites. The second high-severity issue that Firefox 116 patches is CVE-2023-4046, which is described as the use of an incorrect value during WASM compilation. Mozilla noted that in some circumstances, a stale value could have been used for a global variable in WASM JIT analysis. This resulted in incorrect compilation and a potentially exploitable crash in the content process. Mozilla noted that the browser update also resolves CVE-2023-4047, a permission request bypass via clickjacking. A page could trick users into clicking on a carefully placed item but instead, register the input as a click on a security dialog that was not displayed to the user. The three other high-severity vulnerabilities that Firefox 116 resolves include CVE-2023-4048 (an out-of-bounds read flaw causing DOMParser to crash when deconstructing a crafted HTML file), CVE-2023-4049 (race conditions leading to potentially exploitable use-after-free vulnerabilities), and CVE-2023-4050 (stack buffer overflow in StorageManager potentially leading to a sandbox escape). Tracked as CVE-2023-4056, CVE-2023-4057, and CVE-2023-4058, Mozilla noted that the memory safety bugs resolved in Firefox 116 could have led to arbitrary code execution. Most of these high-severity issues, Mozilla says, also impact Firefox extended support and Thunderbird and were addressed in Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14. Mozilla makes no mention of any of these vulnerabilities being exploited in attacks.

    SecurityWeek reports: "Firefox 116 Patches High-Severity Vulnerabilities"

  • news

    Visible to the public "Managing Technological Security of Smart Environment Monitoring Systems"

    New research in the International Journal of Critical Infrastructures presents guidance regarding securing water-related critical infrastructures and further emphasizes the need to protect environment monitoring technologies as cities evolve into smart cities. The research conducted by Anh Tuan Hoang and Xuan Ky Nguyen of the Vietnam National University in Hanoi focuses on the city of Quang Ninh and provides recommendations to help it construct resilient and secure systems. As cities evolve and systems become increasingly interconnected and dependent on Information Technology (IT), there is an urgent need to improve not only the required sensors and actuators for the smart city, but also to ensure that they can withstand cyberattacks and other forms of malicious activity. The current study explores the critical infrastructure of water systems in Vietnam, a nation where smart cities are a top priority. The team highlights the significance of protecting environmental monitoring technologies against various security threats. By focusing on Quang Ninh, the team has demonstrated the risks that a smart city may encounter and how critical infrastructure can be made watertight. The researchers have identified a strong relationship between technological security and environmental protection and management performance. The work underlines the human factors that can lead to the compromise of technological systems, calling for such factors to be closely examined to improve security and prevent social engineering-based cyberattacks. This article continues to discuss the study on managing the technological security of smart environment monitoring systems.

    Inderscience reports "Managing Technological Security of Smart Environment Monitoring Systems"

  • news

    Visible to the public "Alleged NATO Data Theft Leaked Hundreds of Sensitive Documents and Thousands of User Records"

    The North Atlantic Treaty Organization (NATO) is investigating the alleged theft of data by the hacktivist group known as SiegedSec. The threat actor claims to have compromised the Communities of Interest (COI) Cooperation Portal and stolen hundreds of confidential documents. According to SiegedSec, the data breach had nothing to do with the ongoing conflict between Russia and Ukraine. The threat intelligence company CloudSEK analyzed the 845 MB of leaked compressed data, discovering unclassified information and 8,000 employee records from 31 countries. The compromised information included names, business email addresses, home addresses, companies and units, working groups, job titles, and pictures. In addition, CloudSEC discovered 20 unclassified documents, while SeigedSec claims to have up to 700. Some leaked documents were several years old, while others were as recent as July 2023. Although the nature of the information in most leaked documents remains unknown, some contained a list of software used by NATO, including vendor information and version numbers. This article continues to discuss the alleged NATO data theft.

    CPO Magazine reports "Alleged NATO Data Theft Leaked Hundreds of Sensitive Documents and Thousands of User Records"

  • news

    Visible to the public "New Malware WikiLoader Targeting Italian Organizations"

    Researchers are warning about a malware downloader spoofing Italian organizations in order to deliver a banking Trojan to Italian companies. The downloader, dubbed WikiLoader by Proofpoint researchers, uses multiple methods to avoid detection. The financially-motivated threat actor, tracked as TA544, likely developed WikiLoader to rent it out to "select cybercriminal threat actors." The loader leads to the Ursnif banking Trojan, one of TA544's two preferred Trojans. Researchers named the downloader WikiLoader because the malware makes a request to Wikipedia and verifies that the response contains the string "The Free." Since December 2022, Proofpoint has observed at least eight campaigns distributing WikiLoader. This article continues to discuss findings regarding WikiLoader.

    BankInfoSecurity reports "New Malware WikiLoader Targeting Italian Organizations"

  • news

    Visible to the public "False Claims Attacks on Infrastructure Focus of NSF-Funded Research"

    False claims and disinformation in a society highly influenced by social media have become significant problems with potentially severe consequences. Researchers at the University of Oklahoma and collaborating institutions have received funding from the National Science Foundation's (NSF) Secure and Trustworthy Cyberspace (SaTC) program to study false claim attacks. Kash Barker, Ph.D., is the Principal Investigator (PI) leading a team of researchers exploring indirect attacks against infrastructure systems via unsuspecting users. In recent years, the number of false claims has increased, and studies suggest that most online users are initially tricked by fake news, as noted by Barker. When these incidents are weaponized by an adversary against US infrastructure networks, a damaging problem may occur. Disinformation can be used as a weapon to disrupt cyber-physical systems, human lives, and economic productivity. In these scenarios, chaos is caused not by systems or devices, but by "hacked" people. Imagine an adversary spreading information claiming that an electric company is offering free power during the hottest hours of the day, luring customers to use as much power as they want. This could exceed the grid's capacity and cause issues. Researchers will analyze the information and physical layers to combat these weaponized false claims. Both layers are intrinsically connected but are also individually vulnerable to attacks. This article continues to discuss the study on socio-technical approaches for securing cyber-physical systems from false claim attacks.

    The University of Oklahoma reports "False Claims Attacks on Infrastructure Focus of NSF-Funded Research"

  • news

    Visible to the public "Apple Users Open to Remote Control via Tricky macOS Malware"

    Researchers at Guardz have discovered Hidden Virtual Network Computing (hVNC) malware that infests Macs and silently executes complete takeovers without user permission. It also sports persistence through reboots. It's being sold at a lifetime price of $60,000 on the Dark Web, with add-ons available. Virtual Network Computing (VNC) software is typically used by IT teams to provide remote technical support to users. A doppelganger version of the tool is hVNC, which can be bundled into malware that operates covertly, gaining access without requesting permission from the user. According to the researchers, a macOS version of such a tool has emerged on Exploit, the infamous Russian underground forum. It specializes in bagging all manner of sensitive information, including login credentials, personal data, financial information, and more. The researchers noted that, concerningly for Apple users, the malware can also survive system reboots and other attempts at removal. The macOS hVNC identified by Guardz has been available since April, with updates made as recently as July 13, and was tested on a wide array of macOS versions from 10 through 13.2.

    Dark Reading reports: "Apple Users Open to Remote Control via Tricky macOS Malware"