News Items

  • news

    Visible to the public "FIA World Endurance Championship Driver Passports Leaked"

    The research team at Cybernews discovered that Le Mans Endurance Management, which operates the FIA World Endurance Championship (WEC) website, exposed data belonging to hundreds of drivers. The researchers discovered two misconfigured, publicly accessible Google Cloud Storage buckets on June 16. Together, they held more than 1.1 million files, containing FIA WEC drivers' passports, government-issued IDs, and driver's licenses. With such personal data, a criminal could impersonate victims to engage in fraudulent activity, open bank accounts, and apply for loans. Cybercriminals may attempt to gain unauthorized access to bank accounts or credit cards and use stolen identities to execute fraudulent transactions, potentially resulting in financial loss and damage to victims' credit scores. This article continues to discuss the discovery and potential impact of the FIA WEC data leak.

    Cybernews reports "FIA World Endurance Championship Driver Passports Leaked"

  • news

    Visible to the public "US Gov Adds Surveillance Firms Cytrox and Intellexa to Entity List for Trafficking in Cyber Exploits"

    The US government has placed Cytrox and Intellexa on an economic blocklist for trafficking in cyber exploits. The US Department of Commerce's Bureau of Industry and Security (BIS) added the two surveillance technology vendors to the Entity List for trafficking in cyber exploits used to gain access to information systems. The Entity List maintained by BIS is a trade control list created by the US government. It identifies foreign individuals, organizations, and government entities subject to specific export controls and restrictions due to their participation in activities that threaten the national security or foreign policy interests of the US. This article continues to discuss the US government adding surveillance technology vendors Cytrox and Intellexa to an economic blocklist for trafficking in cyber exploits.

    Security Affairs reports "US Gov Adds Surveillance Firms Cytrox and Intellexa to Entity List for Trafficking in Cyber Exploits"

  • news

    Visible to the public "Estee Lauder Hit by Cyberattack Affecting Some Business Operations"

    Cosmetics maker Estee Lauder recently announced that a hacker had obtained some data from its systems, with the cyber incident causing, and expected to further cause, disruption to parts of the company's business operations. The company stated that it was working to restore the affected systems and had implemented measures to secure its operations, including taking down some of its systems to mitigate the incident. Estee Lauder did not reveal further details about the impact on its operations but said it was trying to understand the nature and scope of the breached data.

    AM City reports: "Estee Lauder Hit by Cyberattack Affecting Some Business Operations"

  • news

    Visible to the public "Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware"

    WyrmSpy and DragonEgg, two previously undocumented Android spyware strains, have been linked to APT41, a prolific nation-state actor with ties to China. According to Lookout, an established threat actor such as APT41, known for exploiting web-facing applications and infiltrating traditional endpoint devices, adding mobile malware to its arsenal, demonstrates that mobile endpoints are high-value targets with corporate and personal data. Since at least 2007, APT41, also known as Axiom, Blackfly, Brass Typhoon, Bronze Atlas, HOODOO, Wicked Panda, and Winnti, has been known to target various industries for intellectual property theft. Recent attacks launched by the group involved Google Command and Control (GC2), an open source red teaming tool, to target media and employment platforms in Taiwan and Italy. This article continues to discuss APT41 targeting mobile devices with WyrmSpy and DragonEgg spyware.

    THN reports "Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware"

  • news

    Visible to the public "Cybersecurity Firm Sophos Impersonated by New SophosEncrypt Ransomware"

    The cybersecurity vendor Sophos is being impersonated by a new Ransomware-as-a-Service (RaaS) called SophosEncrypt. MalwareHunterTeam recently discovered the ransomware that was initially believed to be part of a Sophos red team exercise. However, the Sophos X-Ops team announced that they did not make the encryptor and that its launch is being investigated. In addition, ID Ransomware reveals one submission from infected victims, suggesting that the RaaS operation is active. This article continues to discuss findings regarding the new SophosEncrypt ransomware.

    Bleeping Computer reports "Cybersecurity Firm Sophos Impersonated by New SophosEncrypt Ransomware"

  • news

    Visible to the public "Cybersecurity Measures SMBs Should Implement"

    According to the 2023 Verizon Data Breach Investigations Report (DBIR), small and medium-sized businesses (SMBs) are targeted by cybercriminals as much as large companies. SMBs are often found to underestimate their appeal as potential targets since they believe they are not worth the effort of attackers and that their data is of little value. However, their systems contain sensitive information, including employee and customer data as well as financial data. In addition, they are frequently used to access the systems of larger organizations (i.e., partners, customers, or suppliers). According to a recent Proofpoint study, cybercriminals often target SMBs to breach larger organizations, especially through regional Managed Service Providers (MSPs). This article continues to discuss how SMBs can up their cybersecurity game.

    Help Net Security reports "Cybersecurity Measures SMBs Should Implement"

  • news

    Visible to the public "Hacker Infected & Foiled by Own Infostealer"

    The reputation of the malicious actor "La_Citrix" was based on gaining access to Citrix Remote Desktop Protocol (RDP) Virtual Private Network (VPN) servers and selling them to the highest bidder on Russian-language dark web forums. The threat actor was using an infostealer to collect credentials in malicious campaigns dating back to 2020 until La_Citrix accidentally infected his own computer with the malware and sold it, along with a cache of other stolen data, to threat researchers from Hudson Rock who were on the dark web gathering threat intelligence. According to a report, the first indication of something unusual was when Hudson Rock's Application Programming Interface (API) detected a single user in the stolen data who appeared as an employee at almost 300 different companies. This article continues to discuss the prolific threat actor accidentally infecting their own computer and selling off its contents to threat researchers.

    Dark Reading reports "Hacker Infected & Foiled by Own Infostealer"

  • news

    Visible to the public "Intern Develops Technology to Find EV Charging Vulnerabilities"

    Jake Guidry, an Idaho National Laboratory (INL) intern, has developed a cybersecurity research tool to improve the security of Electric Vehicle (EV) charging. The AcCCS tool provides access capabilities through the Combined Charging System (CCS) communications protocol. AcCCS combines hardware and software, emulating the electronic communications that occur between an EV and a charger during the charging process. The tool provides researchers with a new vulnerability search method for EVs and charging stations. The AcCCS hardware has a charging port and cable that can be plugged into real-world equipment. No charging power travels through the device. When AcCCS is plugged into an EV, the vehicle's computer believes the battery is being charged. If plugged into a 350-kilowatt fast charging station, the station thinks it is charging an EV. According to Guidry, it is essentially mimicking one to deceive another. Researchers have already used AcCCS to hack a charging station and a vehicle. Then they demonstrated a mitigation technique against the cyberattacks. Future experiments will help researchers in developing industry best practice recommendations. This article continues to discuss the cybersecurity research tool developed to improve the security of EV charging.

    Idaho National Laboratory reports "Intern Develops Technology to Find EV Charging Vulnerabilities"

  • news

    Visible to the public "DBST: A Lightweight Block Cipher Based on Dynamic S-Box"

    Block ciphers, a branch of cryptography, are important in information security as 5G technology advances. While encryption algorithms of the traditional Feistel structure have significant advantages regarding consistent encryption and decryption, they have poor diffusion effects. They cannot adapt to the high-throughput communication environment and devices with limited resources. The S-box is a critical nonlinear component in the block cipher that greatly influences algorithm security. However, many S-boxes exist in a static manner, making effective resistance to cryptographic attacks based on specific S-boxes difficult. To address the problems, a team of researchers proposed DBST, a lightweight block cipher based on dynamic S-box for devices with limited hardware resources and high-throughput requirements. They performed a security analysis and a hardware experiment on DBST as part of the research. This article continues to discuss the lightweight block cipher based on dynamic S-box.

    SCIENMAG reports "DBST: A Lightweight Block Cipher Based on Dynamic S-Box"

  • news

    Visible to the public "UC Prepares to Host Statewide Cybersecurity Exercise"

    The experience gained at the largest unclassified Department of Defense (DOD) cyber defense exercise helps the Ohio Cyber Range Institute (OCRI) at the University of Cincinnati (UC) develop the country's civilian cybersecurity operation in Ohio. Last month, in North Little Rock, Arkansas, over 800 National Guard soldiers, airmen, and civilian cyber professionals attended Cyber Shield 2023, including people from UC. Bekah Michael, associate professor-educator in the UC School of Information Technology (IT) and executive staff director of the OCRI, said the DOD exercise experience has been directly applied to developing cybersecurity exercises in Cincinnati. UC will host teams from the Ohio Cyber Reserve for a validation exercise this summer, marking Cincinnati's second consecutive year for a statewide cybersecurity exercise. Three teams from the Ohio Cyber Reserve, a volunteer force commanded by the state's adjutant general, will participate in the OCRI-hosted exercise. This year's exercise will be different from the previous year in that it will be a validation exercise rather than a training exercise. The teams responding to an attack in a training exercise can consult with and get direction from the event organizers and the group doing the cyberattacks. They do not receive additional instruction during a validation exercise since they must demonstrate their ability to respond to a critical cybersecurity incident. This article continues to discuss the cybersecurity exercise that UC will host.

    The University of Cincinnati reports "UC Prepares to Host Statewide Cybersecurity Exercise"

  • news

    Visible to the public "Meet NoEscape, the Return of the Avaddon RaaS Gang"

    NoEscape appears to be the return of Avaddon, a Ransomware-as-a-Service (RaaS). Since June 2023, NoEscape has used double-extortion techniques against large companies. The cybercriminals behind it steal data from Windows, Linux, and VMware ESXi servers and encrypt files. Avaddon had not been detected since June 2021 until NoEscape emerged last month. The connection was made based on an analysis by ID Ransomware creator and ransomware expert Michael Gillespie. According to security experts, the NoEscape and Avaddon encryptors are almost identical. Avaddon encrypted files using the AES algorithm, whereas NoEscape uses the Salsa20 algorithm. However, NoEscape uses the same encryption logic and file formats as Avaddon. This article continues to discuss the return of the Avaddon RaaS gang with NoEscape.

    Techzine reports "Meet NoEscape, the Return of the Avaddon RaaS Gang"

  • news

    Visible to the public "Henry Ford Health Confirms Data Breach Affecting 168,000 Patients"

    Henry Ford Health has recently confirmed that an email phishing scheme led to a data breach affecting 168,000 patients. Patients were told Monday that someone conducting an email phishing scheme gained access to business email accounts on March 30, 2023. According to officials, that access was quickly discovered, and the email accounts were secured. According to the company, some patient information was contained in the affected emails, but it's unclear if that information was accessed. This discovery was made on May 16. The affected information might have included name, gender, date of birth, age, lab results, procedure type, diagnosis, date of service, telephone number, medical record number and/or internal tracking number. Henry Ford Health stated that it is adding security measures and further employee training.

    WDIV reports: "Henry Ford Health Confirms Data Breach Affecting 168,000 Patients"

  • news

    Visible to the public "Google Fixes 'Bad.Build' Vulnerability Affecting Cloud Build Service"

    Google patched a flaw in its Cloud Build service that allowed attackers to manipulate application images and infect users. Although a fix for the vulnerability was released in June, the researchers who discovered it have just published a detailed explanation of how it created a threat vector similar to SolarWinds or the more recent 3CX and MOVEit supply chain attacks. Through Cloud Build, users can execute builds on Google Cloud to their specifications and import code from various repositories and cloud storage spaces. The Bad.Build issue centered on the permissions granted to default service accounts with the Cloud Build service. Orca Security, who disclosed the vulnerability to Google, noted that by exploiting this vulnerability that facilitates impersonation of the default Cloud Build service account, an attacker could manipulate images in Google's Artifact Registry and inject malicious code. Any applications made from manipulated images are then vulnerable to Denial-of-Service (DoS) attacks, data theft, and the spread of malware. This article continues to discuss findings regarding the Bad.Build vulnerability.

    The Record reports "Google Fixes 'Bad.Build' Vulnerability Affecting Cloud Build Service"

  • news

    Visible to the public "Admins of Genesis Market Marketplace Sold Their Infrastructure on a Hacker Forum"

    The administrators of Genesis Market on the dark web have announced the sale of their platform to a threat actor who will resume operations next month. In April, the FBI seized Genesis Market, a marketplace for stolen credentials, launched in 2017. Genesis Market was an invite-only marketplace, but invitation codes were not difficult to find online. The platform provided access to "browser fingerprints" that enable criminals to impersonate victims' web browsers, including IP addresses, operating system data, time zones, device information, session cookies, and more. Amazon, eBay, Facebook, Gmail, Netflix, PayPal, Spotify, and Zoom were among the most popular services to which Genesis Market provided access. The seizure of the platform was part of Operation Cookie Monster, a law enforcement operation. This article continues to discuss the administrators of the dark web Genesis Market selling the platform on a hacker forum.

    Security Affairs reports "Admins of Genesis Market Marketplace Sold Their Infrastructure on a Hacker Forum"

  • news

    Visible to the public "Nigerian Man Sentenced to 8 Years in US Prison for $8 Million BEC Scheme"

    A Nigerian national who had been living in the United Arab Emirates has recently been sentenced to more than eight years in a US prison for his role in an $8 million cybercrime scheme. The man, 31-year-old Olalekan Jacob Ponle, aka Mark Kain, and Mr Woodbery was involved in a business email compromise (BEC) scheme for at least nine months in 2019 while he was living in the UAE. He was arrested in the UAE in June 2020 and extradited to the United States the next month. Earlier this year, he pleaded guilty to a wire fraud charge and has now been sentenced to eight years and four months in prison. He will also have to pay over $8 million in restitution to victims and forfeit luxury cars and watches he obtained using the proceeds of the cybercrime scheme. According to the US Justice Department, Ponle and his accomplices used phishing attacks to gain access to email accounts, which they then used to send fraudulent emails instructing victims to wire money to bank accounts they controlled. Authorities say the cybercriminals attempted to obtain more than $51 million from targeted organizations, with actual losses exceeding $8 million.

    SecurityWeek reports: "Nigerian Man Sentenced to 8 Years in US Prison for $8 Million BEC Scheme"

  • news

    Visible to the public "'Metior' Defense Blueprint Against Side-Channel Vulnerabilities Debuts"

    Metior is an analysis framework developed by MIT researchers to simplify hardware and software design frameworks in order to enhance defense capabilities against known and unknown side-channel attacks. Using Metior, engineers could quantitatively evaluate how much information an adversary can steal through a specific side-channel attack. It is considered a simulation sandbox in which chip designers and other engineers can determine, based on their use case, what combination of defenses maximizes their protection against side-channel attacks. As Metior allows the quantitative measure of how much information is stolen, users can calculate the impact of it being stolen, so they can implement protections against the most impactful types of attacks. This article continues to discuss the new Metior framework that bridges hardware design and cybersecurity.

    Tom's Hardware reports "'Metior' Defense Blueprint Against Side-Channel Vulnerabilities Debuts"

  • news

    Visible to the public "Seven New Gadgets Added to Riskiest Connected Devices List"

    For 2023, Forescout's list of the riskiest connected devices includes seven new entries that security teams should consider when securing their assets. The cybersecurity vendor's annual list, published on July 13, now includes Virtual Private Network (VPN) gateways, security appliances, Network Attached Storage (NAS), and out-of-band management for Internet of Things (IoT) devices. This year's new devices are rounded out by engineering workstations, Remote Terminal Units (RTUs), and blood glucose monitors. Daniel Dos Santos, head of security research at the company and author of this year's list, explains that the findings derive from data sent by millions of connected devices to Forescout's device cloud between January 1 and April 30. Forescout classified devices into the Information Technology (IT), IoT, Operational Technology (OT), and Internet of Medical Things (IoMT) categories. Uninterruptible Power Supply (UPS) was the riskiest OT device, and the healthcare workstation was the riskiest IoMT device. This article continues to discuss Forescout's list of the riskiest connected devices for 2023.

    SC Magazine reports "Seven New Gadgets Added to Riskiest Connected Devices List"

  • news

    Visible to the public "JumpCloud Confirms Data Breach By Nation-State Actor"

    Identity and access management solutions provider JumpCloud has recently revealed that it was the target of a security breach caused by a sophisticated nation-state-sponsored threat actor. The company noted that the breach first came to light on June 27 when anomalous activity was detected on an internal orchestration system. The investigation traced the incident back to a spear-phishing campaign initiated by the threat actor on June 22, which resulted in unauthorized access to a specific section of JumpCloud's infrastructure. While no evidence of customer impact was found then, JumpCloud proactively bolstered its security measures by rotating credentials, rebuilding infrastructure, and fortifying its network and perimeter. The situation escalated on July 5 when unusual activity was discovered in the commands framework for a small group of customers, indicating that customer data had been compromised. In response, JumpCloud force-rotated all admin API keys and notified affected customers immediately. After a forensic investigation conducted with incident response partners and law enforcement, the attack vector was identified as data injection into the commands framework. JumpCloud emphasized that the breach was highly targeted and limited to specific customers.

    Infosecurity reports: "JumpCloud Confirms Data Breach By Nation-State Actor"

  • news

    Visible to the public "WooCommerce Bug Exploited in Targeted WordPress Attacks"

    Security researchers at Wordfence have recorded over one million attempts to compromise a popular WordPress plugin over the past few days. The researchers stated that the attacks began on July 14 and continued over the weekend, peaking at 1.3 million attacks against 157,000 sites on July 16. The researchers noted that the attack exploited a critical WooCommerce Payments plugin vulnerability (CVE-2023-28121), which has a CVSS score of 9.8. WooCommerce Payments enables users to accept card payments in WooCommerce-powered online stores and is said to have around 600,000 installations. The researchers noted that the vulnerability in question would enable a remote attacker to impersonate an administrator and take control of an impacted WordPress site if exploited. The researchers stated that they have seen threat actors attempting to use their admin privileges to remotely install the WP Console plugin on victim sites. Once the WP Console plugin is installed, attackers use it to execute malicious code and place a file uploader in order to establish persistence. The researchers noted that although the number of attack attempts recorded exceeded one million, the researchers claimed that this campaign is relatively targeted. Unlike many other large-scale campaigns, which typically attack millions of sites indiscriminately, this one seems to be targeted against a smaller set of websites. The WooCommerce Payments plugin vulnerability was patched by its developers on March 23 with version 5.6.2. It affects versions 4.8.0 and higher.

    Infosecurity reports: "WooCommerce Bug Exploited in Targeted WordPress Attacks"

  • news

    Visible to the public "How Popular AI Apps Are Invading Your Privacy"

    Cybernews researchers further explored how privacy-invasive Artificial Intelligence (AI)-powered applications like ChatGPT are. Large Language Models (LLM)s such as OpenAI's ChatGPT, Meta's LLaMA, and Google's PaLM2 are the most notable examples of advanced Natural Language Processing (NLP) models. To train their algorithms, these models must collect enormous amounts of data, as more data means they can generate more natural responses that resemble human language. They have crawled the web to collect data, including content from social media platforms such as Reddit, Facebook, Twitter, and Instagram. However, a part of the data collected contains sensitive personal information. AI tools must also record user prompts and file uploads, including images or voice commands, to improve their algorithms' training. AI users may inadvertently divulge sensitive personal and professional information, exposing them to the possibility of exposure to third parties. This article continues to discuss how AI-powered apps impact user privacy, the benefits AI brings to social media applications, and privacy concerns around ChatGPT.

    Cybernews reports "How Popular AI Apps Are Invading Your Privacy"

  • news

    Visible to the public "The Biden Administration Announces a Cybersecurity Labeling Program for Smart Devices"

    US President Joe Biden's administration and major consumer technology companies have launched an initiative to establish a nationwide cybersecurity certification and labeling program to help consumers select smart devices less vulnerable to hacking. Officials compared the new US Cyber Trust Mark initiative, which will be overseen by the Federal Communications Commission (FCC), with the Energy Star program that rates the energy efficiency of appliances. According to Anne Neuberger, deputy national security adviser, the effort will enable Americans to confidently identify which Internet- and Bluetooth-connected devices are cyber-secure. Amazon, Best Buy, Google, LG Electronics USA, Logitech, and Samsung are included in the list of industry participants. As early as next year, devices such as baby monitors, home security cameras, fitness trackers, TVs, refrigerators, and smart climate control systems that meet the US government's cybersecurity requirements will have the "Cyber Trust" label. This article continues to discuss the effort to put a nationwide cybersecurity certification and labeling program in place to help consumers choose smart devices that are less vulnerable to hacking.

    AP reports "The Biden Administration Announces a Cybersecurity Labeling Program for Smart Devices"

  • news

    Visible to the public "How AI-Augmented Threat Intelligence Solves Security Shortfalls"

    Security operations and threat intelligence teams are understaffed, overwhelmed with data, and juggling competing demands, all of which can be remedied by Large Language Model (LLM) systems. However, the lack of experience with the systems prevents many companies from using the technology. According to researchers, organizations that implement LLMs can better synthesize intelligence from raw data and expand their threat intelligence capabilities, but such programs require the support of the security leadership to be appropriately focused. John Miller, head of intelligence analysis at Mandiant, notes that teams should implement LLMs for solvable problems, but first, they must evaluate the utility of LLMs in an organization's environment. In a presentation titled "What Does an LLM-Powered Threat Intelligence Program Look Like?" to be given at Black Hat USA in early August, Miller and Ron Graf, a data scientist on the intelligence analytics team at Mandiant's Google Cloud, will demonstrate the areas in which LLMs can help security analysts in accelerating and enhancing cybersecurity analysis. This article continues to discuss where LLMs can be of help to security professionals.

    Dark Reading reports "How AI-Augmented Threat Intelligence Solves Security Shortfalls"

  • news

    Visible to the public "VirusTotal Leaked Data of 5,600 Registered Users"

    A data breach faced by VirusTotal exposed the names and email addresses of 5,600 registered users. The leaked data reportedly includes employee information from US and German intelligence agencies. VirusTotal is a popular online service owned by Google that analyzes suspicious files and URLs to detect malware and malicious content through antivirus engines and website scanners. A VirusTotal employee unintentionally uploaded a file containing the names and email addresses of VirusTotal customers at the end of June, as confirmed by Google to the German publication Der Spiegel. Even though the company deleted the list within an hour of its upload, at least one user downloaded the file. It ultimately reached the hands of Der Spiegel journalists, who confirmed the authenticity of the list. This article continues to discuss the VirusTotal data leak and the risk associated with uploading files to this online service.

    Help Net Security reports "VirusTotal Leaked Data of 5,600 Registered Users"

  • news

    Visible to the public "CISA Shares Free Tools to Help Secure Data in the Cloud"

    The Cybersecurity and Infrastructure Security Agency (CISA) has published a factsheet outlining free tools and guidance for securing digital assets after migrating to cloud environments. The factsheet helps network defenders, incident response analysts, and cybersecurity professionals in mitigating the risk of information theft, exposure, data encryption, and extortion attacks. It helps identify, detect, and mitigate known vulnerabilities and cyber threats faced when managing cloud-based or hybrid environments. The highlighted tools supplement the built-in tools provided by cloud service providers and help bolster the resilience of network infrastructures, enhance security measures, identify malicious compromises, map potential threat vectors, and pinpoint malicious activity following a breach. This article continues to discuss the free tools shared by CISA to help improve the security of data in the cloud.

    Bleeping Computer reports "CISA Shares Free Tools to Help Secure Data in the Cloud"

  • news

    Visible to the public "FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware Attacks"

    The financially motivated threat actor known as FIN8 has been delivering the BlackCat ransomware via a "revamped" version of the Sardonic backdoor. According to the Symantec Threat Hunter Team, the group is attempting to diversify its focus and maximize profits from infected entities with this effort. The attempted attack occurred in December 2022. FIN8 is being tracked by the cybersecurity firm called Syssphinx. Since at least 2016, the adversary has been associated with attacks against point-of-sale (PoS) systems using malware such as PUNCHTRACK and BADHATCH. After over a year, the group reappeared in March 2021 with an updated version of BADHATCH, followed by a new implant called Sardonic, which Bitdefender disclosed in August 2021. This article continues to discuss the FIN8 group using an updated version of a backdoor called Sardonic to deliver the BlackCat ransomware.

    THN reports "FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware Attacks"

  • news

    Visible to the public "UMD Researchers Uncover Privacy Risks in Cell Phones Purchased at Police Auctions"

    Law enforcement agencies regularly sell items confiscated in criminal investigations or unclaimed from lost-and-found inventories. Many of these items, including cars, jewelry, watches, and devices such as mobile phones, end up on online auction sites. People searching for a bargain can bid on cell phones in bulk, picking up dozens at low prices. However, according to a recent study conducted by security researchers at the University of Maryland (UMD), many phones sold at police property auction houses are not adequately wiped of personal data. The study, which lasted over two years and involved cell phones purchased from the largest police auction house in the US, led to the discovery of troves of personal information from previous owners that was freely accessible. The UMD team successfully bid on 228 phones, 61 (27 percent) of which contained personal data such as Social Security numbers, credit card information, banking information, passport data, driver's license photos, and more. This article continues to discuss the UMD team's discovery of privacy risks in cell phones purchased at police auctions.

    The University of Maryland reports "UMD Researchers Uncover Privacy Risks in Cell Phones Purchased at Police Auctions"

  • news

    Visible to the public "ESF Members NSA and CISA Publish Second Industry Paper on 5G Network Slicing"

    The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA), which are Enduring Security Framework (ESF) partners, have published an assessment of 5G network slicing. ESF is a public-private cross-sector working group led by NSA and CISA, that recognizes three keys to ensuring the security of this developing technology: Security Consideration for Design, Deployment, and Maintenance. According to Lauren Wyble, NSA's Technical Director for Network Infrastructure Security, this document represents an initial step in capturing the current but evolving landscape of network slicing. It catalyzes initiating meaningful conversations regarding the potential use cases for network slicing. 5G network slicing is a network architecture that enables mobile service providers to break their network into multiple separate ones in order to construct unique virtual networks for different clients and use cases. The release builds on threat and security considerations previously published by the ESF. This article continues to discuss the assessment of 5G network slicing published by ESF Members NSA and CISA.

    NSA reports "ESF Members NSA and CISA Publish Second Industry Paper on 5G Network Slicing"

  • news

    Visible to the public "Email Hack Prompts Call for Microsoft to Make Security Logs Free"

    There is criticism regarding Microsoft charging its cloud services customers additional fees to access security records after a China-based threat group compromised the email accounts of more than two dozen organizations, including US government agencies. The State and Commerce Departments are reportedly among the targets. The threat group responsible for the attacks, identified by Microsoft as Storm-0558, used forged authentication tokens to access Microsoft 365 (M365) accounts via Outlook Web Access and Outlook[.]com. Following the reveal of the attacks on July 11, Microsoft provided a more comprehensive account of the breach. Microsoft noted that the attacks had been mitigated for all customers and that the company was still investigating how the attackers got the forged tokens. This article continues to discuss the email hack that calls for Microsoft to make security logs free.

    SC Media reports "Email Hack Prompts Call for Microsoft to Make Security Logs Free"

  • news

    Visible to the public "LockBit and Clop Responsible for About 40% Of Ransomware Attacks"

    Last month, 475 ransomware attacks were observed, according to Flashpoint's June Cyber Threat Intelligence Report. Most of these attacks, 97 in total, were carried out by LockBit. Clop followed with the launch of 91 attacks. They accounted for around 40 percent of all attacks. The Information Technology (IT) software and services sector and the construction sector were the most targeted. In addition, US businesses were the target of 226 attacks, or nearly half of all attacks reported. This article continues to discuss key findings from Flashpoint's June Cyber Threat Intelligence Report.

    Techzine reports "LockBit and Clop Responsible for About 40% Of Ransomware Attacks"

  • news

    Visible to the public "Owner of Cybercrime Website BreachForums Pleads Guilty"

    The owner of the infamous cybercrime website BreachForums has recently pleaded guilty in a US court to conspiracy to commit device fraud, access device fraud, and possession of child pornography. The man, Conor Brian Fitzpatrick, 21, of Peekskill, New York, was arrested on March 15, 2023, being charged with conspiracy to commit access device fraud. Fitzpatrick, known online as "Pompompurin," has admitted to investigators that he was the owner and administrator of the BreachForums portal. Also known as Breached, BreachForums was launched in 2022 as an alternative to RaidForums, a cybercrime marketplace that was taken down by law enforcement in February 2022. According to US law enforcement, BreachForums claimed to have over 340,000 members at the time it was shut down. The FBI noted that during its year of operation, the website became a top hacker marketplace, facilitating the trading of hacked or stolen data, including bank account information, Social Security numbers, personally identifiable information, hacking tools, online account credentials, and hacking services for hire. According to the plea agreement, Fitzpatrick faces up to 10 years in prison for conspiracy to commit access device fraud, 10 years in prison for solicitation for the purpose of offering access devices, and up to 20 years in prison for possession of child pornography. The maximum penalty for each count also includes a fine of $250,000, and supervised release.

    SecurityWeek reports: "Owner of Cybercrime Website BreachForums Pleads Guilty"

  • news

    Visible to the public "Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting"

    According to security researchers at eSentire, attackers have been observed using the notorious Sorillus remote access trojan (RAT) and phishing attacks to exploit Google Firebase Hosting infrastructure. The researchers stated that the attackers have been using Firebase Hosting due to its ability to obscure malicious content. In a recent case in June 2023, the researchers were alerted to suspicious code written to the registry in an endpoint in a manufacturing customer's network. The investigation identified Sorillus RAT and a phishing page being delivered using HTML smuggled files and links using Google's Firebase Hosting service. The researchers noted that attackers particularly capitalized on Firebase's legitimacy to deliver the Sorillus RAT, a Java-based commercial malware that facilitates remote access and data theft. The attack started with victims opening a phishing email that enticed them to open a seemingly innocuous tax-themed file. The attachment concealed a Java payload that executed the Sorillus RAT on the victim's system. The researchers stated that the investigation uncovered an intricately obfuscated phishing kit that heavily relied on Google Firebase Hosting. This phishing campaign utilized multiple cloud services, including Cloudflare, to craft a convincing Microsoft 365 login page. The attackers leveraged the credibility of these cloud platforms to bypass security filters and automated scanners, making detection challenging. The researchers emphasize the importance of keeping antivirus signatures up-to-date and adopting Next-Gen antivirus or endpoint detection and response (EDR) tools. Furthermore, the researchers are suggesting removing Java from systems where unnecessary and configuring systems to open potentially dangerous files with caution.

    Infosecurity reports: "Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting"

  • news

    Visible to the public "CERT-UA Uncovers Gamaredon's Rapid Data Exfiltration Tactics Following Initial Compromise"

    Gamaredon, a threat actor with connections to Russia, was observed conducting data exfiltration operations within an hour of the initial compromise. As a vector of primary compromise, emails and messages in messengers (i.e., Telegram, WhatsApp, Signal) are used, in most cases, with previously compromised accounts, according to a published analysis by the Computer Emergency Response Team of Ukraine (CERT-UA). Gamaredon, also known as Aqua Blizzard, Armageddon, Shuckworm, and UAC-0010, is a state-sponsored actor connected to the SBU Main Office in the Autonomous Republic of Crimea. It is estimated that this group has infected thousands of government computers. This article continues to discuss recent findings and observations regarding Gamaredon.

    THN reports "CERT-UA Uncovers Gamaredon's Rapid Data Exfiltration Tactics Following Initial Compromise"

  • news

    Visible to the public "Thousands of Images on Docker Hub Leak Auth Secrets, Private Keys"

    Researchers from the RWTH Aachen University in Germany have published a study revealing tens of thousands of container images hosted on Docker Hub containing confidential secrets, exposing software, online platforms, and users to attacks. Docker Hub is a cloud-based repository for storing, sharing, and distributing Docker images for the Docker community. These container creation templates include the necessary software code, runtime, libraries, environment variables, and configuration files for deploying an application in Docker with ease. The German researchers analyzed 337,171 Docker Hub images and thousands of private registries and discovered that about 8.5 percent contain sensitive data, such as private keys and API secrets. This article continues to discuss findings from the analysis of images from Docker Hub and thousands of private registries.

    Bleeping Computer reports "Thousands of Images on Docker Hub Leak Auth Secrets, Private Keys"

  • news

    Visible to the public "Rogue Azure AD Guests Can Steal Data via Power Apps"

    Guest accounts in Azure AD (AAD) provide external third parties with limited access to corporate resources. The objective is to facilitate collaboration without excessive risk of exposure. However, enterprises may inadvertently overshare access to sensitive resources and applications with Azure AD guests, thus enabling data theft and other threats. An upcoming presentation at Black Hat USA will detail how a toxic combination of easily manipulable default guest account settings and connections within Microsoft's low-code development platform known as Power Apps can open the door for guest accounts to gain access to the corporate jewels. This article continues to discuss the possible data theft by rogue Azure AD guests through Power Apps.

    Dark Reading reports "Rogue Azure AD Guests Can Steal Data via Power Apps"

  • news

    Visible to the public "Critical XSS Vulnerability in Zimbra Exploited in the Wild"

    Attackers are exploiting a critical cross site scripting (XSS) vulnerability tracked as CVE-2023-34192 in the open source email collaboration suite Zimbra. The vulnerability could enable an authenticated remote threat actor to execute arbitrary code via a specially crafted script to the /h/autoSaveDraft function. This vulnerability affects Zimbra Collaboration Suite (ZCS) version 8.8.15. The organization has provided administrators with instructions on how to manually implement the fix by editing a single data file. ZCS vulnerabilities, whether zero-day or otherwise, are often exploited by attackers, as government agencies, universities, businesses, and more widely use Zimbra. This article continues to discuss the potential exploitation and impact of the XSS vulnerability in Zimbra.

    Help Net Security reports "Critical XSS Vulnerability in Zimbra Exploited in the Wild"

  • news

    Visible to the public "MOVEit Hack: Number of Impacted Organizations Exceeds 340"

    Brett Callow, a threat analyst at Emsisoft, has been monitoring the MOVEit attack carried out by a notorious cybercrime gang, and he is currently aware of 347 impacted organizations, including 58 educational institutions in the United States. Callow noted that the number of impacted organizations includes both ones that were directly affected and ones that were indirectly hit. Callow believes more than 18.6 million individuals had their data compromised as a result of the MOVEit hack. Callow warned that the Cl0p ransomware group conducted the attack and is in possession of a massive quantity of data that could be useful for business email compromise (BEC) and phishing attacks.

    SecurityWeek reports: "MOVEit Hack: Number of Impacted Organizations Exceeds 340"

  • news

    Visible to the public "Researchers at NHL Stenden Launch Database That Exposes Cyber Hacking in the Worldwide Maritime Industry"

    A team of researchers led by Dr. Stephen McCombie, Professor of Maritime Information Technology (IT) Security at NHL Stenden University of Applied Sciences, have created the Maritime Cyber Attack Database (MCAD), which consists of incidents involving the global maritime sector. The database contains more than 160 incidents, such as the location spoofing of NATO ships visiting Ukraine in the Black Sea in 2021. The incidents included in the database highlight the importance of improving cybersecurity in the maritime industry. The NHL Stenden's Maritime IT Security research group compiled information for the MCAD using open source data. The database includes not only incidents involving vessels, but also ports and other maritime facilities throughout the globe. The research group expects that the database, which is now publicly available online, will help raise cybersecurity awareness in the industry and provide data for more accurate simulations in this area. This article continues to discuss the MCAD launched by researchers at NHL Stenden University of Applied Sciences.

    NHL Stenden University of Applied Sciences reports "Researchers at NHL Stenden Launch Database That Exposes Cyber Hacking in the Worldwide Maritime Industry"

  • news

    Visible to the public "Three Grove School Faculty Join $12 Million Google Cybersecurity Research Project"

    The City College of New York is participating in a $12 million Google initiative aimed at boosting the cybersecurity ecosystem and positioning New York City as the global leader in cybersecurity. Other institutions involved in the Google Cyber NYC Institutional Research Program include CUNY, Columbia University, Cornell, and New York University. Rosario Gennaro, Nelly Fazio, and Samah Saeed are three faculty members from The City College's Grove School of Engineering who are among the $12 million grant beneficiaries for advanced research. Gennaro and Fazio are conducting research together. They will work on developing new and more efficient Zero-Knowledge Proofs, which are used to protect the privacy and integrity of computations performed on data distributed over networks. The project scope includes new cryptographic schemes, resistance to quantum computing advances, and more. Saeed's research focuses on identifying new techniques for hiding information/gates in quantum circuits. Findings from this research will inform the development of a lightweight security application to prevent the illegal distribution of quantum circuits at a low cost by using information hiding. This article continues to discuss the cybersecurity research of the Grove School experts participating in Google's $12 million cybersecurity research program.

    The City College of New York reports "Three Grove School Faculty Join $12 Million Google Cybersecurity Research Project"

  • news

    Visible to the public "New Members to Enhance CyManII's Mission to Support"

    The University of Texas at San Antonio-based Cybersecurity Manufacturing Innovation Institute (CyManII) welcomes three new members to support its mission to secure and sustain US manufacturing. Each member will contribute to the institute's efforts to develop integrated cybersecurity and energy-efficient solutions for small and medium-sized manufacturers by bringing valuable industry insight. Siemens joins as a managing member and will be part of CyManII's Governance Board, providing strategic direction as the institute evolves. Formlabs and Humtown are now collaborative members of CyManII. Formlabs will support the Cyber for Manufacturing (C4M) hub's research and training missions. Humtown will contribute valuable knowledge and experience in additive manufacturing. CyManII will collaborate with Siemens, Formlabs, and Humtown as the institute continues to develop its long-term cybersecurity solutions roadmap. This article continues to discuss CyManII and what the new members will contribute to the institution.

    The University of Texas at San Antonio reports "New Members to Enhance CyManII's Mission to Support"

  • news

    Visible to the public "picoCTF-Africa Sees Significant Growth in Competition's Second Year"

    Cybersecurity remains a global concern, with a lack of skilled professionals worsening the problem. Therefore, Carnegie Mellon's picoCTF-Africa, a computer security competition for high school, undergraduate, and graduate students on the African continent, seeks to raise awareness and introduce the future workforce to the cybersecurity field. In its second year, the cybersecurity hacking competition attracted more than 1,250 students, with the number of female competitors doubling and the number of high school competitors increasing by over 365 percent. In addition, four teams finished in the top 50 on the global leaderboard for picoCTF, showing the immediate impact of the effort. Assane Gueye, co-director of the Upanzi Network and CyLab-Africa initiatives and associate teaching professor at CMU-Africa, commented that cybersecurity is rarely considered when young Africans consider possible career paths. Students entering college lack cybersecurity awareness, and those who explore the field typically do so after getting an undergraduate degree in computer science. However, picoCTF-Africa aims to change this by introducing cybersecurity to high school students across the continent. This article continues to discuss the growth seen by Carnegie Mellon's picoCTF-Africa.

    Carnegie Mellon University Africa reports "picoCTF-Africa Sees Significant Growth in Competition's Second Year"

  • news

    Visible to the public "White House Launches Cybersecurity Implementation Plan"

    US President Joe Biden's administration has released the first version of the National Cybersecurity Strategy Implementation Plan, which was first announced in March 2023. The plan aims to strengthen public and private cybersecurity resilience, bolster infrastructure defense, and establish a clear national roadmap for cybersecurity responsibilities. Each initiative in the plan corresponds to one of five pillars. These pillars include defending critical infrastructure, disrupting and dismantling threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and establishing international partnerships to achieve shared objectives. This article continues to discuss the pillars of the cybersecurity plan and the software supply chain as a new focus.

    TechRepublic reports "White House Launches Cybersecurity Implementation Plan"

  • news

    Visible to the public "Ransomware Costs Financial Services $32bn in Five Years"

    According to security researchers at Comparitech, global financial services organizations have lost over $32bn in downtime since 2018 due to ransomware breaches. The researchers analyzed 225 confirmed attacks on the sector over the past five years and found that the average organization loses two weeks in downtime due to an incident. Among the sub-sectors analyzed in the financial sector were credit unions, accounting companies, public and retail banks, and insurers. Of these, insurance companies recorded the highest number of attacks over the period (65). The researchers noted that demands varied from $180,000 to $40m, with the average demand peaking in 2021 at $61.6m. The researchers noted that 2021 was the biggest year for ransomware attacks on finance companies, with 86 recorded in total, followed by 2020 (56).

    Infosecurity reports: "Ransomware Costs Financial Services $32bn in Five Years"

  • news

    Visible to the public "UNE Researcher Awarded Major Grant to Tackle Cybercrime"

    Dr. Kamaljeet Sandhu of the University of New England (UNE) has been awarded a major international research grant in support of him leading a groundbreaking project to prevent and detect cybersecurity threats. He is one of 12 Australian researchers from nine universities to receive a prestigious Australia India 'Unati' Research Collaboration Grant from the Australian Government, which seeks to strengthen the relationship between the two countries. This cybersecurity research will benefit Australian and Indian citizens, universities, businesses, and governments. However, the research will also benefit the greater global community and all Internet users. Dr. Sandhu and his team will develop new ethical frameworks and identify best practices for digital technology platforms to detect and prevent cyberattacks. The research will involve exploring a quantum computing model that will solve complex problems quicker than classical computers and training machines to detect attacks on their own. This article continues to discuss Dr. Sandhu's research on ways to prevent and detect cybersecurity threats.

    The University of New England reports "UNE Researcher Awarded Major Grant to Tackle Cybercrime"

  • news

    Visible to the public "Services in North Carolina Town Unavailable After Ransomware Attack"

    As a result of a recent ransomware attack, residents of Cornelius, North Carolina, are facing delayed or inaccessible services. The town has a population of around 32,000 and is a prominent Charlotte suburb on Lake Norman. On the evening of July 11, government officials discovered a cybersecurity incident later identified as a ransomware attack. According to the town government, the Technology Operations (TechOps) Department promptly disconnected on-site technology from the network to contain the threat and prevent its spread. Last year, North Carolina became the first US state to prohibit all government entities from paying ransoms in response to ransomware attacks, a controversial measure questioned by several cybersecurity experts. When the law was passed, some feared it would provide ransomware gangs with an additional means of extortion, allowing them to threaten organizations not only with the release of stolen data but also with unverified claims of having paid a ransom in violation of state law. This article continues to discuss the ransomware attack on a North Carolina town and the state's ban on ransom payments associated with ransomware attacks.

    The Record reports "Services in North Carolina Town Unavailable After Ransomware Attack"

  • news

    Visible to the public "Infrastructure at Risk: Can Trains Be Hacked?"

    Amir Levintal, co-founder and CEO of Cylus, a cybersecurity company focusing on the railway industry, warns that cybercriminals may increasingly target critical infrastructures, including railways, as political tensions rise. The question remains as to whether hackers are capable of causing real damage to infrastructures, such as transportation. Although trains may not appear to be the most apparent targets for cybercriminals, they can "hack" a train. Modern trains and railways have sophisticated digital control and navigation systems, and of course, anything digital can be compromised. For example, in 2022, an anonymous hacktivist group was able to halt trains in Belarus in an effort to prevent Russia's military build-up in Ukraine. The attack had a political objective and was aimed at disrupting military aggression. This article continues to discuss Levintal's insights on cyber threats to railways.

    Cybernews reports "Infrastructure at Risk: Can Trains Be Hacked?"

  • news

    Visible to the public "Critical Cisco SD-WAN Vulnerability Leads to Information Leaks"

    A recently discovered remotely-exploitable critical vulnerability in the Cisco SD-WAN vManage software could allow unauthenticated attackers to retrieve information from vulnerable instances. Tracked as CVE-2023-20214 (CVSS score of 9.1), the vulnerability exists because the REST API feature of vManage does not sufficiently validate requests. Cisco noted that the vManage API allows administrators to configure, control, and monitor Cisco devices over the network. Cisco stated that an attacker could trigger the vulnerability by sending a crafted API request to a vulnerable instance to retrieve information from vManage or send information to it. Cisco explained in an advisory that a vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to gain read permissions or limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance. Cisco noted that the web-based management interface and the CLI are not impacted by this security defect. Cisco said that to hunt for attempts to access the REST API, administrators are advised to examine a log file. The existence of requests in the log, however, does not indicate unauthorized access. Cisco noted that while there are no workarounds to address this bug, implementing access control lists (ACLs) to limit vManage access mitigates the issue. Cisco explained that in cloud hosted deployments, access to vManage is limited by ACLs that contain permitted IP addresses. Network administrators should review and edit the permitted IP addresses in the ACLs. In on-premises deployments, vManage access can be limited in a similar way by using ACLs and configuring permitted IP addresses. The vulnerability has been addressed with the release of SD-WAN vManage versions 20.6.3.4, 20.6.4.2, 20.6.5.5, 20.9.3.2, 20.10.1.2, and 20.11.1.2. Versions 18.3 to 20.6.3.2 are not affected. Customers using SD-WAN vManage versions 20.7 and 20.8 are advised to migrate to a patched version. Cisco noted that it is unaware of this vulnerability being exploited in attacks.

    SecurityWeek reports: "Critical Cisco SD-WAN Vulnerability Leads to Information Leaks"

  • news

    Visible to the public "Proponents Boast That 802.11bb Is 100 Times Faster Than Wi-Fi and More Secure"

    The Institute of Electrical and Electronics Engineers (IEEE) has added 802.11bb as a standard for light-based wireless communications. Proponents of Li-Fi say that it is 100 times faster and more secure than Wi-Fi. Fraunhofer's Dominic Schulz noted that Li-Fi improves reliability as well as reduces latency and jitter because it works in an exclusive optical spectrum. According to Schulz, there is an increase in security as a result of the prevention of wall penetration, the reduction of risks associated with jamming and eavesdropping, and more. This article continues to discuss the 802.11bb standard and improvements regarding speed, security, and privacy.

    Tom's Hardware reports "Proponents Boast That 802.11bb Is 100 Times Faster Than Wi-Fi and More Secure"

  • news

    Visible to the public "A New Way to Look at Data Privacy"

    Researchers at MIT developed a new data privacy metric, Probably Approximately Correct (PAC) Privacy, and an algorithm based on this metric that can automatically determine the minimum amount of randomness that must be added to a Machine Learning (ML) model in order to protect sensitive data such as lung scan images from adversaries. The algorithm does not require knowledge of a model's inner workings or its training process, making it simpler to apply to various models and applications. In multiple cases, the researchers demonstrate that the amount of noise needed to protect sensitive data is significantly less with PAC Privacy than with other approaches. This could help engineers develop ML models that provably hide training data while maintaining accuracy in the real world. This article continues to discuss the privacy technique created by MIT researchers that protects sensitive data while maintaining an ML model's performance.

    MIT News reports "A New Way to Look at Data Privacy"

  • news

    Visible to the public "Malicious Microsoft Office Docs Drop LokiBot Malware"

    FortiGuard Labs identified several malicious Microsoft Office documents that, when executed, launch the LokiBot malware on a victim's computer. According to FortiGuard Labs, the malicious Microsoft Office documents exploited the CVE-2021-40444 (CVSS 7.8) and CVE-2022-30190 (CVSS 7.8) Remote Code Execution (RCE) vulnerabilities. Patches for both vulnerabilities have been available for well over a year. LokiBot, also known as Loki PWS, has been an active information-stealing trojan since 2015, according to the researchers. LokiBot targets Windows systems primarily and collects sensitive data from infected devices. It takes advantage of multiple vulnerabilities and Visual Basic for Applications (VBA) macros to initiate attacks. Additionally, it uses a Visual Basic injector to avoid detection or analysis. Using the injector, it can circumvent certain security measures and pose a serious threat to users. This article continues to discuss malicious actors using Microsoft Office documents to exploit known RCE vulnerabilities.

    SC Magazine reports "Malicious Microsoft Office Docs Drop LokiBot Malware"

  • news

    Visible to the public "Google Play Will Crack Down on Malicious Apps With DUNS Number"

    Google Play will make it more difficult to upload malicious apps to its app store beginning August 31. Soon, developers will be required to identify themselves with a Data Universal Numbering System (DUNS) registration number. The purpose of requiring developers to identify themselves with this new registration number when uploading apps to Google Play is to make it easier to determine their trustworthiness. This pertains specifically to new developer accounts for the app store. The DUNS number is a nine-digit registration number companies use to identify themselves. Dun & Bradstreet, a data and business analytics company, created this registration number. Obtaining this type of business identification number requires a lengthy administrative procedure. With this measure, Google aims to ensure that as few malicious apps as possible penetrate its app store. This article continues to discuss Google Play implementing DUNS registration numbers to make uploading malicious apps more difficult.

    Techzine reports "Google Play Will Crack Down on Malicious Apps With DUNS Number"