News Items

  • news

    Visible to the public "VMware Warns of Exploit Available for Critical vRealize RCE Bug"

    VMware has warned customers that exploit code for a critical vulnerability in the VMware Aria Operations for Logs analysis tool, which helps administrators manage terabytes of application and infrastructure logs in large environments, is now available. The flaw, tracked as CVE-2023-20864, is a deserialization vulnerability that was patched in April. It allows unauthenticated attackers to execute code remotely on unpatched appliances. Successful exploitation allows threat actors to execute arbitrary code as root following low-complexity attacks that do not require user interaction. This article continues to discuss the critical vulnerability in the VMware Aria Operations for Logs analysis tool for which exploit code is now available.

    Bleeping Computer reports "VMware Warns of Exploit Available for Critical vRealize RCE Bug"

  • news

    Visible to the public "Virginia Tech Researchers Find Vulnerabilities in Code of Popular Reverse Engineering Tools"

    Using mathematical principles to understand the behavior of code, a team of Virginia Tech researchers discovered that the source code in popular reverse engineering tools such as Ghidra may not be as secure as its creators intended. Through their mathematical proofs, software programmers can ensure their code does not experience unintended behaviors that hackers find appealing. Security professionals typically assess a program by testing its machine code. This machine code, which consists of a series of zeros and ones, is what a computer executes. However, the code can be difficult for humans to understand, particularly in the absence of the original source code used to develop the machine code. Using reverse engineering tools, these long and difficult-to-decipher numerical lines of information can be translated into source code much closer to spoken language, thus enabling security professionals to see what is actually happening in the binary code. Unfortunately, these tools may overlook important machine code behaviors, especially those that were not intended by the original programmers who wrote the source code, allowing hackers to find vulnerabilities. This article continues to discuss the team's discovery of vulnerabilities in the code of popular reverse engineering tools.

    Virginia Tech reports "Virginia Tech Researchers Find Vulnerabilities in Code of Popular Reverse Engineering Tools"

  • news

    Visible to the public "Stressed for a Bit? Then Don't Click It, Cybersecurity Experts Advise"

    According to a study conducted by the Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL), employees who experience a specific form of stress are more likely to fall victim to a phishing attack. While most, if not all, employees experience stress, scientists have identified a particular type of stress that indicates who is more likely to click on bogus content that could lead to malware and other cyber troubles. The work could help employees and their employers in bolstering cybersecurity defenses by identifying the indicators that a user is about to take a risky action. The results of the study involving 153 participants were recently published in the Journal of Information Warfare. Although the relatively small sample size hindered the researchers' ability to identify all of the relationships between the more than two dozen variables they examined, the relationship between stress and response to the simulated phishing email was statistically significant. This article continues to discuss the phishing psychology study that explores what makes workers vulnerable.

    Pacific Northwest National Laboratory reports "Stressed for a Bit? Then Don't Click It, Cybersecurity Experts Advise"

  • news

    Visible to the public "picoCTF Empowers Teachers to Bring Cybersecurity Education Into Their Classrooms"

    Carnegie Mellon University's (CMU) picoCTF has introduced students of all ages to the field of cybersecurity through its annual Capture-the-Flag competition and year-round educational platform for more than a decade. Recent outreach efforts by picoCTF included bringing together high school teachers from across the US for the first-ever National Security Agency (NSA) GenCyber Teachers' Program. During the five-day in-person camp, attendees were introduced to new tools, resources, and best practices in cybersecurity education. Teachers left the experience with lesson plans that are ready to be implemented in the upcoming school year. David Brumley, professor in CMU's Electrical and Computer Engineering Department and co-founder of picoCTF, emphasized that training teachers is the only way to expand cybersecurity education. This article continues to discuss picoCTF and how it helps to close the cybersecurity talent gap.

    CyLab reports "picoCTF Empowers Teachers to Bring Cybersecurity Education Into Their Classrooms"

  • news

    Visible to the public "macOS Devices Under Threat as Data Thief Emerges From Shadows"

    According to the cybersecurity company Guardz, a new information-stealing program is available on the dark web. The ShadowVault program is a malicious entity that can be hired for $500 per month. The program can extract passwords, credit card information, cookies, and all Chromium and Firefox browser data from macOS devices. ShadowVault was first discovered in June by the cybersecurity company. Since such malware has long targeted Microsoft Windows devices, macOS was typically regarded as a more secure operating system. Historically, threat actors have focused on weaponizing malware outside of Apple's "closed" ecosystem. Investigators from Guardz discovered ShadowVault on the dark web forum XSS, after monitoring it using anonymous avatars. This article continues to discuss the new infostealer program on the dark web known as ShadowVault.

    Cybernews reports "macOS Devices Under Threat as Data Thief Emerges From Shadows"

  • news

    Visible to the public "Flaw in Revolut Payment Systems Exploited to Steal $20 Million"

    Organized criminal groups exploited a vulnerability in Revolut's payment systems and stole more than $20 million, according to the Financial Times, which cited sources knowledgeable about the situation. Over 30 million customers worldwide are served by Revolut, a privately held financial technology firm. It is licensed and managed by the Bank of Lithuania and has its headquarters in London. In September 2022, the business experienced a data breach that affected 50,150 customers globally. The attackers stole the names, addresses, email addresses, phone numbers, a portion of the payment card data, and account information of these customers. A few days later, some Revolut users complained online that they began receiving SMS phishing messages designed to take financial and personal information. According to unidentified sources cited by the Financial Times, the newly disclosed cash grab occurred in early 2022. This article continues to discuss the exploitation of a vulnerability in Revolut's payment systems by criminal groups.

    Help Net Security reports "Flaw in Revolut Payment Systems Exploited to Steal $20 Million"

  • news

    Visible to the public "Charming Kitten Hackers Use New 'NokNok' Malware for macOS"

    Researchers observed a new campaign that they linked to the Charming Kitten Advanced Persistent Threat (APT) group in which hackers used new macOS-targeting NokNok malware. The campaign began in May and uses a different infection chain than previously observed, with LNK files deploying the payloads as opposed to the typical malicious Word documents seen in the group's previous attacks. According to Mandiant, Charming Kitten, also known as APT42 or Phosphorus, has launched at least 30 operations in 14 countries since 2015. Google has established a connection between the threat actor and the Iranian state, specifically the Islamic Revolutionary Guard Corps (IRGC). This article continues to discuss the new campaign attributed to the Charming Kitten APT group involving NokNok malware.

    Bleeping Computer reports "Charming Kitten Hackers Use New 'NokNok' Malware for macOS"

  • news

    Visible to the public "RomCom RAT Targeting NATO and Ukraine Support Groups"

    The threat actors responsible for the RomCom Remote Access Trojan (RAT) are suspected of launching phishing attacks against the NATO summit in Vilnius and a known organization supporting Ukraine abroad. The BlackBerry Threat Research and Intelligence team discovered two malicious documents submitted on July 4, 2023, from a Hungarian IP address. RomCom, also known as Tropical Scorpius, UNC2596, and Void Rabisu, was recently observed launching cyberattacks against Ukrainian politicians working closely with Western nations and a US healthcare organization aiding refugees fleeing the war-torn nation. The group has used spear-phishing emails to direct victims to cloned websites harboring trojanized versions of popular software as part of geopolitically motivated attack chains. Militaries, food supply chains, and Information Technology (IT) companies have been targeted. This article continues to discuss the threat actors behind the RomCom RAT targeting NATO and Ukraine support groups.

    THN reports "RomCom RAT Targeting NATO and Ukraine Support Groups"

  • news

    Visible to the public "Banking Firms Under Attack by Sophisticated 'Toitoin' Campaign"

    A sophisticated and evasive malware campaign targets businesses in Latin America with a multi-stage attack that begins with phishing and culminates with deploying a novel Trojan dubbed Toitoin that captures sensitive system information and data from financial institutions. Researchers from ZScaler discovered the campaign, which consists of a multi-stage infection chain that uses custom-built modules at each stage to inject malicious code into remote processes and bypass user account control (UAC). The multi-stage infection chain observed in this campaign uses custom-built modules that utilize various evasion and encryption techniques. Among the evasion techniques is the use of Amazon Elastic Compute Cloud (EC2) to host malware within compressed ZIP archives. This article continues to discuss findings regarding the Toitoin campaign.

    Dark Reading reports "Banking Firms Under Attack by Sophisticated 'Toitoin' Campaign"

  • news

    Visible to the public "Razer Investigates Data Breach Claims, Resets User Sessions"

    Gaming gear company Razer has recently reacted to rumors of a massive data breach with a short statement on Twitter, letting users know that they started investigating the matter. Razer is a popular American-Singaporean tech firm focusing on gaming hardware, selling high-quality peripherals, powerful laptops, and apparel. Information about a potential data breach at the company emerged on Saturday when someone posted on a hacker forum that they had stolen the source code, database, encryption keys, and backend access logins for Razer[.]com, the company's main website. The user offered to sell that data for $100,000 worth of Monero (XMR) cryptocurrency and urged interested individuals to contact him directly to close the deal. The publisher of the post has not set any limitations or exclusivity, meaning anyone willing to pay the requested amount would get the entire data set. The hacker posted screenshots as proof of the breach. The screenshots show file lists and trees, email addresses, source code allegedly for anti-cheat and reward systems, API details, Razer Gold balances, and more. Cybersecurity analysts at FalconFeedsio spotted the announcement on the hacker forum and shared it with the public.

    BleepingComputer reports: "Razer Investigates Data Breach Claims, Resets User Sessions"

  • news

    Visible to the public "Social Security Numbers, Other Data May Have Been Stolen in LCC Data Breach"

    More than 750,000 people may have had their social security numbers stolen in a data breach at Lansing Community College (LCC) in late 2022 and early 2023. The community college notified "757,832 employees, students, and vendors that their personal information may have been accessed or acquired by an unknown unauthorized person." The data breach was discovered and reported by the college in March. Because of the breach, LCC shut down for several days. The school said an "unauthorized actor" had access to "certain systems" from Dec. 25, 2022, until discovered on March 15, 2023. It took until May 24 to determine what information the actor had access to. The school noted that, to date, they have no evidence of any identity theft or fraud in connection with this incident. The community college reported an annual enrollment of 14,000 students in the 2021-22 school year, with 1,673 faculty and staff members. Some people who received letters about having data stolen attended the school decades ago.

    Yahoo News reports: "Social Security Numbers, Other Data May Have Been Stolen in LCC Data Breach"

  • news

    Visible to the public "75% of Consumers Prepared to Ditch Brands Hit by Ransomware"

    According to new research by Object First, 40% of consumers harbor skepticism regarding organizations' data protection capabilities, and 75% would shift to alternate companies following a ransomware attack. The company noted that consumers are requesting increased data protection from vendors, with 55% favoring companies with comprehensive data protection measures such as reliable backup and recovery, password protection, and identity and access management strategies. During the survey, the company found that 81% of consumers report feeling "very scared or worried" about their data being held by organizations lacking robust resilience against ransomware. After an attack, 1 in 3 consumers demand evidence of resilient backup and recovery strategies, and 30% lose all confidence in the company's data protection plan. 75% of consumers are ready to shift to a competitor should a company suffer a ransomware attack. Moreover, a second ransomware attack causes 61% of consumers to reassess their negative perception of data protection and recovery practices. The company noted that ransomware attacks impact generations differently. While 37% of Gen Z prefers an apology from companies experiencing a ransomware attack, ranking 12% higher than monetary compensation, Baby Boomers are less forgiving. 74% of them agree their trust in the vendor is irreparably damaged after suffering more than one ransomware attack, compared to only 34% of Gen Z.

    Help Net Security reports: "75% of Consumers Prepared to Ditch Brands Hit by Ransomware"

  • news

    Visible to the public "Cyber Extortion Cases Surge 39% Annually"

    According to the international law firm RPC, incidents of online extortion reported to the police increased by nearly two-fifths in 2022 compared to a year previously. The new study revealed 3200 reports of cyber extortion last year, including cases of ransomware, sextortion, and cases where data is stolen and held for ransom. That's up from 2300 cases in 2021, according to RPC. RPC also found that there was an 8% increase in reports made by victims of email and social media hacking, up from 13,500 in 2021 to 14,600 in 2022. Partner and head of cyber and tech insurance at RPC, Richard Breavington, stated that although attacks against larger organizations fell over the past year, SMEs and individuals are still struggling to manage cyber risk effectively. Breavington noted that there are an increasing number of cyber-insurance policies available, some of which are aimed at SMEs that cover the cost of dealing with a data breach. However, some of these policies will require basic security steps to have been taken. Just 36% of micro and small businesses currently have cyber insurance, with the figure rising to 63% of mid-sized businesses and 55% of large businesses. During the study, RPC also found that other forms of cybercrime are falling. Malware reports decreased from 7200 in 2021 to 5300 last year, while reports linked to the hacking of servers, PCs, and phones declined 10% over the period to 5200 last year.

    Infosecurity reports: "Cyber Extortion Cases Surge 39% Annually"

  • news

    Visible to the public "Twitter User Exposes Nickelodeon Data Leak"

    Confidential information, including unreleased TV shows, scripts, and materials, belonging to the popular children's television channel Nickelodeon have recently been reportedly compromised in a significant data leak. According to social media reports, an individual allegedly dumped approximately 500GB of animation files. The authenticity of the leaked content is yet to be confirmed by Nickelodeon. A spokesperson at Nickelodeon stated that the material in question appears to be related to production files and possibly dates back several decades. They further clarified that there is no indication of long-form content, employee data, or user data involved in the leak. The leak came to public attention when a Twitter user, operating under the handle GhostyTongue, began disclosing sensitive information related to the alleged breach on June 29. According to vx-underground, the compromise originated from an authentication issue within Nickelodeon's "consumer products and experience" portal, potentially allowing unauthorized individuals to access sensitive data from the animation department. Nickelodeon is currently investigating the incident.

    Infosecurity reports: "Twitter User Exposes Nickelodeon Data Leak"

  • news

    Visible to the public "MOVEit Transfer Faces Another Critical Data-Theft Bug"

    Another critical SQL injection vulnerability has recently been disclosed and patched in Progress Software's MOVEit Transfer software, the fourth such flaw revealed in the space of a month. The security bug (CVE-2023-36934) is distinct from the former zero-day flaw that's being exploited with resounding success by the Cl0p ransomware gang. But like that bug, it could allow unauthenticated cyber attackers to access MOVEit Transfer databases and, from there, execute malware, manipulate files, or exfiltrate information. The company noted that an attacker could submit a crafted payload to a MOVEit Transfer application endpoint which could result in modification and disclosure of MOVEit database content. The flaw hasn't been exploited in the wild so far, according to the company, but given its severity, users are urged to patch it as soon as possible, along with two high-severity vulnerabilities (CVE-2023-36932 and CVE-2023-36933) disclosed at the same time. The bugs affect MOVEit Transfer versions 12.1.10 and earlier, 13.0.8 and earlier, 13.1.6 and earlier, 14.0.6 and earlier, 14.1.7 and earlier, and 15.0.3 and earlier.

    Dark Reading reports: "MOVEit Transfer Faces Another Critical Data-Theft Bug"

  • news

    Visible to the public "New Campaigns Use Malicious npm Packages to Support Phishing Kits"

    Several malicious npm packages on the open-source repository have been used in supply chain attacks and phishing campaigns, according to researchers at ReversingLabs. The researchers noted that the packages pose a dual threat, affecting application end users while also supporting email-based phishing attacks, mainly targeting Microsoft 365 users. The researchers discovered more than a dozen malicious npm packages posted between May 11 and June 13. These packages imitated legitimate modules, such as jquery, which has millions of weekly downloads. The researchers stated that although the malicious packages were downloaded roughly 1000 times, they were swiftly removed from npm after detection. ReversingLabs has named this campaign "Operation Brainleeches" due to the malicious infrastructure used to facilitate the theft of victim data. In the first part of the campaign, the researchers identified six packages used exclusively in phishing attacks. These packages were linked to phishing campaigns that harvested user data through deceptive Microsoft[.]com login forms delivered via malicious email attachments. The second tranche comprised seven packages targeting email phishing campaigns and software supply chain attacks. The researchers noted that these packages aimed to implant credential harvesting scripts into applications that unwittingly incorporated the malicious npm packages. During the analysis, the researchers revealed that the malicious npm packages played a role in active phishing attacks, likely conducted by low-skilled actors. While the full extent of the supply chain attack is unclear, using obfuscated code and invocating popular package names like jquery raise concerns about potential compromises.

    Infosecurity reports: "New Campaigns Use Malicious npm Packages to Support Phishing Kits"

  • news

    Visible to the public "Former Contractor Employee Charged for Hacking California Water Treatment Facility"

    A 53-year-old man from Tracy, California, has recently been charged for allegedly hacking into the systems of a water treatment facility in an attempt to delete critical software. The suspect, Rambler Gallo, has been charged with "transmitting a program, information, code, and command to cause damage to a protected computer," but this is a case of unauthorized access rather than actual hacking. Gallo was an employee for a company contracted by the town of Discovery Bay in California to operate its water treatment facility, which serves 15,000 residents. He worked at the company between 2016 and the end of 2020, and during this time, he allegedly installed software that allowed him to access the facility's systems from his personal computer. After he resigned in January 2021, authorities in the Northern District of California stated that he used that remote access software to enter the water facility's systems and "transmitted a command to uninstall software that was the main hub of the facility's computer network and that protected the entire water treatment system, including water pressure, filtration, and chemical levels. Gallo faces up to 10 years in prison and a $250,000 fine.

    SecurityWeek reports: "Former Contractor Employee Charged for Hacking California Water Treatment Facility"

  • news

    Visible to the public "Two Apps Hosted on Google Play Caught Sending User Data to Chinese Servers"

    Security researchers at security firm Pradeo have discovered two file management applications hosted on Google Play, with more than 1.5 million combined downloads, that are sending user data to servers in China. Published to Google Play by the same developer, the two applications, "File Recovery and Data Recovery" and "File Manager," were seen launching without user interaction and silently exfiltrating a trove of sensitive user information. According to the researchers, the two spyware apps would send out users' contact lists, media content, real-time location, network provider, country code, network code, operating system information, and device brand and model. Specifically, the researchers noted that each application performs more than a hundred transmissions of the collected data, an amount that is so large it is rarely observed. The collected information is sent to multiple servers in China, which have been identified as malicious. The researchers stated that in Google Play, both applications claim to collect no user data but also state that if any data is collected, users could not request the data to be deleted. The two applications have no reviews, suggesting their download counts might have been artificially inflated. The researchers believe that the hacker used an install farm or mobile device emulators to fake those numbers, hence making its applications better ranked in stores' category lists and increasing their apparent legitimacy. A look at the history of these applications shows that both were published in Google Play roughly a month ago and that both received updates at the end of June. Within a week of receiving the updates, their download counts went up by roughly 500,000 each. The researchers noted that the applications were also found to request advanced permissions that allow them to restart devices and then launch automatically, without user interaction, and to hide their icons, to make it difficult for users to remove them. Both applications appear to have been removed from Google Play.

    SecurityWeek reports: "Two Apps Hosted on Google Play Caught Sending User Data to Chinese Servers"

  • news

    Visible to the public "Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert"

    The U.S. government's cybersecurity agency CISA recently warned that hackers linked to the Truebot malware operation are exploiting a known vulnerability in the Netwrix Auditor application to break into organizations in the U.S. and Canada. In a joint advisory issued alongside the FBI and information sharing partners in Canada, CISA urged network admins to immediately apply patches for remote code execution flaws in IT auditing software sold by Netwrix. The vulnerability being exploited is CVE-2022-31199 and was discovered by researchers at Bishop Fox exactly one year ago with warnings that attackers can use this issue to achieve arbitrary code execution on servers running Netwrix Auditor. Security researchers at Bishop Fox stated that since this service is typically executed with extensive privileges in an Active Directory environment, the attacker would likely be able to compromise the Active Directory domain. CISA and law enforcement partners say malicious hackers are exploiting this Netwrix Auditor flaw to deliver new Truebot malware variants and to collect and exfiltrate information against organizations in the U.S. and Canada. The joint advisory noted that based on confirmation from open-source reporting and analytical findings of Truebot variants, threat actors leveraged the malware through phishing campaigns containing malicious redirect hyperlinks. In addition to applying all available patches, CISA also recommends that organizations reduce the threat of malicious actors using remote access tools by implementing application controls to manage and control the execution of software, including allow-listing remote access programs.

    SecurityWeek reports: "Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert"

  • news

    Visible to the public "Cisco Enterprise Switch Flaw Exposes Encrypted Traffic"

    Cisco recently discovered a critical security flaw in the Cisco Application Centric Infrastructure (ACI) Multi-Site CloudSec encryption feature, potentially allowing hackers to read or alter inter-site encrypted traffic. The vulnerability (CVE-2023-20185) affects Cisco Nexus 9000 Series Fabric Switches running releases 14.0 and later, specifically when they are part of a multi-site topology and have the CloudSec encryption feature enabled. Cisco noted that it attributed the vulnerability to an implementation issue with the ciphers used by the CloudSec encryption feature on the affected switches. Cisco stated that while CloudSec encryption is designed to protect data transmitted between sites, by exploiting the vulnerability, an unauthenticated attacker with a position between ACI sites could intercept and compromise the encrypted traffic. Currently, Cisco has not released any software updates to address this vulnerability, and no workarounds are available. Cisco stated that customers who are currently using the Cisco ACI Multi-Site CloudSec encryption feature for the Cisco Nexus 9332C and Nexus 9364C Switches and the Cisco Nexus N9K-X9736C-FX Line Card are advised to disable it and to contact their support organization to evaluate alternative options.

    Infosecurity reports: "Cisco Enterprise Switch Flaw Exposes Encrypted Traffic"

  • news

    Visible to the public "Shell Confirms MOVEit-Related Breach After Ransomware Group Leaks Data"

    Energy giant Shell has recently confirmed that personal information belonging to employees has been compromised due to the recent MOVEit Transfer hack. In a brief statement issued on Wednesday, Shell finally confirmed being hit by the MOVEit hack, clarifying that the MFT software was "used by a small number of Shell employees and customers." The company noted that some personal information relating to employees of the BG Group had been accessed without authorization. The company stated that it is unclear exactly what type of information has been compromised, but impacted individuals are being notified. Shell confirmed the incident after the Cl0p cybercrime gang published files allegedly stolen from the firm. The group has made available 23 archive files labeled "part1," which could suggest that they are in possession of more data. When Cl0p published the Shell files, the cybercriminals noted that the company did not want to negotiate.

    SecurityWeek reports: "Shell Confirms MOVEit-Related Breach After Ransomware Group Leaks Data"

  • news

    Visible to the public "28,000 Impacted by Data Breach at Pepsi Bottling Ventures"

    A data breach at independent bottling company Pepsi Bottling Ventures recently impacted more than 28,000 individuals. Discovered on January 10, the data breach occurred between December 23, 2022, and January 19, 2023, and resulted in the personal, financial, and health information of the company's employees being accessed by an unauthorized party. On February 10, Pepsi Bottling Ventures started informing the impacted individuals that the attackers gained access to certain systems containing their personal information but did not reveal how many individuals were affected. Pepsi Bottling Ventures recently informed the Maine Attorney General's Office that the attackers had access to the personal information of more than 28,000 individuals. According to the company, the compromised data includes names, addresses, email addresses, financial account information, ID numbers, driver's license numbers, Social Security numbers, digital signatures, medical history details, and health insurance information. The company says the stolen information belongs to current and former employees and contractors.

    SecurityWeek reports: "28,000 Impacted by Data Breach at Pepsi Bottling Ventures"

  • news

    Visible to the public "Police Arrest Suspected OPERA1ER Cybercrime Kingpin"

    Police have recently announced the arrest of an individual they believe to be a key figure in a prolific cybercrime group that has stolen at least $11m from banks and telcos over a four-year period. Interpol stated that it worked with the authorities in Cote d'Ivoire, alongside Afripol, Group-IB, and the Orange CERT Coordination Center (Orange-CERT-CC) to make the arrest as part of Operation Nervone. The group in question, OPERA1ER (aka NX$M$, DESKTOP Group, and Common Raven), may have actually stolen as much as $30m from dozens of attacks across 15 countries in Africa, Asia, and Latin America. Group-IB first discovered the group in 2018 after the threat intelligence firm spotted spear-phishing emails containing remote access Trojans (RATs) and other malware like password sniffers and dumpers.

    Infosecurity reports: "Police Arrest Suspected OPERA1ER Cybercrime Kingpin"

  • news

    Visible to the public "Exploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks"

    Security researchers at VulnCheck have found that hundreds of energy organizations could be exposed to attacks due to an actively exploited vulnerability affecting a solar power monitoring product made by Contec. Contec specializes in custom embedded computing, industrial automation, and IoT communication technology. The company's SolarView solar power monitoring and visualization product is used at more than 30,000 power stations, according to its website. The vulnerability is tracked as CVE-2022-29303 and is described as a code injection issue affecting SolarView version 6.0. The vulnerability can be exploited remotely by unauthenticated attackers. The researchers noted that the security hole was only patched with the release of version 8.0, and versions dating back to at least 4.0 are impacted. A Shodan search shows more than 600 internet-exposed SolarView systems, including over 400 running vulnerable versions.

    SecurityWeek reports: "Exploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks"

  • news

    Visible to the public "Japan’s Nagoya Port Suspends Cargo Operations Following Ransomware Attack"

    The Nagoya Port Unified Terminal System (NUTS) in Japan recently suffered a significant system outage that was attributed to a ransomware attack. According to a notice (in Japanese) sent to customers, the attack disrupted container operations across all terminals within the port. In particular, container import and export operations via trailer transportation have been temporarily halted at the terminals. Shipping companies responsible for the arrival and departure of container vessels are advised to consult with the primary carrier for instructions and updates regarding loading and unloading operations. Upon investigation, officials from the Nagoya Port Transport Association Terminal Subcommittee and the Aichi Prefectural Police Headquarters confirmed the cyberattack's nature. Recovery measures are underway, with all stakeholders dedicating their resources to expedite the process. In terms of attribution, the Nagoya Harbor Transportation Association said the LockBit ransomware gang was behind the attack.

    SecurityWeek reports: "Japan's Nagoya Port Suspends Cargo Operations Following Ransomware Attack"

  • news

    Visible to the public "Microsoft Denies Major 30 Million Customer-Breach"

    Microsoft has recently hit back at claims from Anonymous Sudan that it managed to breach the company and obtain account access for tens of millions of customers. Anonymous Sudan, which has been linked in the past to pro-Kremlin groups like Killnet, posted the details of its alleged raid on Telegram. In one of the posts, it said: "We announce that we have successfully hacked Microsoft and have access to a large database containing more than 30 million Microsoft accounts, emails, and passwords. We will begin selling this database, so if you're interested, contact us at our bot to negotiate." Anonymous Sudan said it would be selling the haul for $50,000. It attached what it claimed to be a "small sample" of compromised details as proof of its word. Microsoft, in a brief statement, stated that at this time, their analysis of the data shows that this is not a legitimate claim and an aggregation of data. Microsoft noted that they have seen no evidence that their customer data has been accessed or compromised. Anonymous Sudan has caused trouble for Microsoft in the past. The tech giant admitted in mid-June that the group, which it tracks as "Storm-1359," had been responsible for Layer 7 DDoS attacks against it earlier that month. In February, Anonymous Sudan claimed responsibility for a number of DDoS attacks against Swedish companies, which it said were retaliation for an incident of Quran burning near Turkey's embassy in Stockholm. However, experts at the time assessed the cyberattacks may have been a Russian false-flag campaign designed to continue whipping up hatred towards Sweden in Muslim countries like Turkey, which has a veto over the country's accession to NATO.

    Infosecurity reports: "Microsoft Denies Major 30 Million Customer-Breach"

  • news

    Visible to the public "Over Two-Thirds of FortiGate Firewalls Still at Risk"

    According to security researchers at Bishop Fox, approximately 69% of FortiGate firewalls affected by a recently discovered FortiOS vulnerability remain unpatched. The flaw CVE-2023-27997 could lead to remote code execution (RCE). It was patched by Fortinet in mid-June. A recent advisory published by the researchers stated that they have successfully developed an exploit for the vulnerability. The researchers noted that their exploit smashes the heap, connects back to an attacker-controlled server, downloads a BusyBox binary, and opens an interactive shell. The entire process reportedly takes approximately one second, significantly faster than an earlier demonstration provided by Lexfo. The researchers stated that a search on Shodan, a search engine for internet-connected devices, revealed that nearly 490,000 SSL VPN interfaces exposed on the internet are affected by this vulnerability. According to the researchers, it is important to note that previous reports estimating 250,000 exposed FortiGate firewalls based on SSL certificates alone may not accurately reflect the actual number of vulnerable devices. This would be because the search query used in those reports did not specifically target SSL VPN interfaces, where this vulnerability resides. The researchers noted that an in-depth analysis revealed that only 153,414 devices on the internet had been patched, leaving a concerning 69% of devices unpatched. The researcher's analysis also highlighted the distribution of different major operating system versions. While a significant number of installations run the latest version, FortiOS 7, there are still devices running older versions, particularly version 5, which has reached its end of life.

    Infosecurity reports: "Over Two-Thirds of FortiGate Firewalls Still at Risk"

  • news

    Visible to the public "Firefox 115 Patches High-Severity Use-After-Free Vulnerabilities"

    Mozilla recently announced the release of Firefox 115 to the stable channel with patches for a dozen vulnerabilities, including two high-severity use-after-free bugs. The first high-severity issue is tracked as CVE-2023-37201 and is described as a use-after-free flaw in WebRTC certificate generation. WebRTC is an open source project and enables real-time communication in web browsers and mobile applications via application programming interfaces (APIs). Mozilla noted that an attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS. The second high-severity vulnerability, CVE-2023-37202, is described as a potential use-after-free issue from compartment mismatch in the open source JavaScript and WebAssembly engine SpiderMonkey. Mozilla stated that cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free. Mozilla noted that the latest Firefox update also addresses high-severity memory safety bugs that might have led to the execution of arbitrary code. The flaws are collectively tracked as CVE-2023-37211 and CVE-2023-37212. Firefox 115 also includes patches for eight medium-severity vulnerabilities leading to malicious sites placing trackers without permissions, arbitrary code execution, spoofing attacks, URL spoofing, download of files containing malicious code, use-after-free conditions, and tricking users into submitting sensitive data to malicious sites. Recently, Mozilla also announced that Firefox ESR 102.13 and Thunderbird 102.13 were released with patches for five vulnerabilities, including the high-severity use-after-free and memory safety bugs that were addressed in Firefox 115.

    SecurityWeek reports: "Firefox 115 Patches High-Severity Use-After-Free Vulnerabilities"

  • news

    Visible to the public "UEFI: 5 Recommendations for Securing and Restoring Trust"

    Despite declining overall computer sales in 2022, 286.2 million Windows-based PCs were sold. Each computer was released with firmware based on the Unified Extensible Firmware Interface (UEFI), an alternative to the Basic Input/Output System (BIOS) that provides an extensible intersection between hardware and the operating system. The UEFI standard also identifies reliable methods for updating this firmware from the operating system. Most users are unaware of this piece of software, but it is on attackers' radar. The "BlackLotus" attack exposed a bootkit, an advanced form of malicious software that is difficult to detect or remove. Microsoft and other vendors are still struggling to detect this bootkit reliably or protect even completely patched machines against this attack. Soon after that attack, another one involving a leak of sensitive information, including private keys from multiple PC manufacturers, occurred. These private keys, typically used to cryptographically sign UEFI-based software, could be used to create malicious software capable of achieving high-privileged access to the CPU. The bootkits plant malicious code into highly trusted software that is critical for these devices' normal operation. Vijay S. Sarvepalli, a senior security solutions architect with the Carnegie Mellon Software Engineering Institute's (SEI) CERT Division, further expands on the concerns raised by these attacks as well as highlights recommendations to secure the UEFI ecosystem and restore trust in this firmware. This article continues to discuss recommendations to secure the UEFI ecosystem and restore trust.

    SEI reports "UEFI: 5 Recommendations for Securing and Restoring Trust"

  • news

    Visible to the public "Commonwealth Cyber Initiative Funds New Round of CyberArts Projects"

    In the Commonwealth Cyber Initiative (CCI) 2023 CyberArts Program, researchers from across Virginia will explore cybersecurity issues through an artistic lens. These issues include Artificial Intelligence (AI), privacy, fraud, misinformation, and more. In June, CCI funded six projects conducted by five Virginia universities and colleges, including Blue Ridge Community College, James Madison University, Old Dominion University, Virginia Commonwealth University, and Virginia Tech, in the second installment of its CyberArts Program. According to Luiz DaSilva, the CCI executive director, the CCI CyberArts Program makes cybersecurity more approachable by incorporating performances, interactive artworks, and visual arts. For one of the funded 2023 CyberArts projects, "Cyber Insecurity: Exploring Vulnerabilities of Artificial Intelligence Through Visual Art," researchers will create an exhibit comprised of interactive installations, photography, sculpture, and digital art to raise awareness of the cybersecurity vulnerabilities of Al systems and spark conversation about AI's ethical implications. This article continues to discuss the CCI CyberArts Program.

    Virginia Tech reports "Commonwealth Cyber Initiative Funds New Round of CyberArts Projects"

  • news

    Visible to the public "Catching the Catfish: How University Students Won a National Cybersecurity Contest"

    A team of four undergraduate students from the University of Nevada, Reno, who competed in the 2023 Summer Social Engineering Event hosted by Temple University, found success by scamming an Internet scammer. The team named "WolfHack@UNR" won the three-day online competition aimed at bringing further attention to the relevance of social engineering in cybersecurity. This year's social engineering competition focused on romance scams or "catfishing," the practice of luring someone into a relationship by creating a fake online persona. Catfishing is not a technical computer problem or vulnerability that a cybersecurity student would typically encounter, but it is a significant problem. According to data from the Federal Trade Commission (FTC) cited on the competition website, nearly 70,000 people reported a romance scam in 2022, and losses reached $1.3 billion. Since these schemes rely on manipulation and deception, a competition to identify and prove catfishing differs slightly from the typical cybersecurity contest that tests technical expertise. One of the winning team members noted that it was not a typical cybersecurity competition and was almost psychological. This article continues to discuss the national cybersecurity contest and how the WolfHack@UNR team won it.

    The University of Nevada, Reno reports "Catching the Catfish: How University Students Won a National Cybersecurity Contest"

  • news

    Visible to the public "In-Office Work Is the Real Threat to Cybersecurity"

    New research indicates that remote employees take more security-related measures than their in-office counterparts. As organizations worry about the potential dangers of remote work, new research from the Farmer School of Business at Miami University suggests that the actual risks lie within the office, and it will inform future discussions. Researchers from the Farmer School of Business found that remote employees demonstrate a higher level of cybersecurity awareness and take more security-related precautions than their in-office counterparts. According to the author Joseph K. Nwankpa, when they surveyed remote workers, they expected the results to disclose cybersecurity complacency. However, the survey revealed remote cyber vigilance. This unexpected result can be attributed to the so-called "Peltzman Effect" and the complacency framework, which the study uses to explore how remote work may cause a moral hazard with respect to employee cybersecurity awareness and security-based precautions. Office workers often become complacent, trusting their employers to handle cyber threats on their behalf, whereas remote employees tend to experience a greater sense of responsibility for their own cybersecurity. This article continues to discuss key findings from the study on the roles of cyber awareness and cybersecurity policies among remote workers.

    Fast Company reports "In-Office Work Is the Real Threat to Cybersecurity"

  • news

    Visible to the public "The Latest Victim of the MOVEit Data Breach is the Department of Health and Human Services"

    Federal health officials have recently notified Congress of a data breach that could involve the information of more than 100,000 people. A representative of the U.S. Department of Health and Human Services said Thursday that attackers gained access to the department's data by exploiting a vulnerability in widely used file-transfer software. Other government agencies, major pension funds, and private businesses also have been affected by a Russian ransomware gang's so-called supply chain hack of the software MOVEit. The HHS official did not provide details on the type of data affected but said none of the department's systems or networks were compromised.

    The Associated Press reports: "The Latest Victim of the MOVEit Data Breach is the Department of Health and Human Services"

  • news

    Visible to the public "A New Wave of Insider Threats Will Be Driven by 'Shadow AI'"

    According to Imperva, poor data controls and the introduction of new generative Artificial Intelligence (AI) tools based on Large Language Models (LLMs) will cause an increase in insider data breaches in the coming year. As the effectiveness of chatbots driven by LLMs has grown, many organizations have implemented bans or limitations on the data that can be shared with them. However, because most organizations (82 percent) lack an insider risk management strategy, they remain unaware of instances of employees using generative AI to help them with tasks such as writing code or filling out requests for proposals (RFPs). Terry Ray, SVP, Data Security GTM and Field CTO at Imperva, argues that prohibiting employees from using generative AI is futile. Ray added that, as with other technologies, people will always find a way to bypass such restrictions, so prohibitions create an infinite game of whack-a-mole for security teams, without actually securing the enterprise. Malicious intent is not required to cause a data breach, Ray emphasized. Instead of relying on employees not to use unauthorized tools, Imperva suggests that businesses should focus on securing their data and ensuring they can answer important questions such as who is accessing it, what is being accessed, how, and from where. This article continues to discuss the expectation that AI will lead to a significant rise in insider data breaches and the steps organizations should take to protect themselves.

    Continuity Central reports "A New Wave of Insider Threats Will Be Driven by 'Shadow AI'"

  • news

    Visible to the public "MITRE Publishes the Top 25 Most Dangerous Software Weaknesses"

    The US cybersecurity research organization MITRE has released its list of the top 25 most dangerous software vulnerabilities for 2023, with the top three remaining the same as last year's list. The 2023 Common Weakness Enumeration (CWE) list derives from analyzing public vulnerability data in the National Vulnerability Database (NVD) for root cause mappings to CWE weaknesses for the two prior calendar years. An attacker may exploit the vulnerabilities to take control of applications and systems, steal their data, or otherwise interfere with their operation. According to MITRE, this type of trend analysis on vulnerability data enables organizations to make more informed investment and policy decisions concerning vulnerability management. Many professionals who work with software will find this list to be a useful risk mitigation resource. The list is a helpful resource for businesses seeking to strengthen their Continuous Integration/Continuous Delivery (CI/CD) environments. Despite the existence of vulnerability scanning tools, this list serves as a reminder that even the most widely used products can contain errors. This article continues to discuss MITRE's list of the top 25 most dangerous software weaknesses for 2023.

    ITPro reports "MITRE Publishes the Top 25 Most Dangerous Software Weaknesses"

  • news

    Visible to the public "Employees Worry Less About Cybersecurity Best Practices in The Summer"

    According to security researchers at ThreatX, IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely. The researchers surveyed 2,000 employees' across the US and UK to assess whether employees' behaviors during the summer are inadvertently increasing API and application risk. The researchers found that 55% of employees admit to relying solely on their mobile devices while working from vacation and holiday destinations in the summer. Further, 25% claim that they aren't concerned about ensuring network connections are secure when accessing company data, and only 12% use a VPN when traveling and working remotely. The researchers noted that the results show that employees increasingly rely on personal devices to access corporate data during the summer, which could open the door to cyber criminals seeking to penetrate corporate networks. The researchers stated that with 38% of respondents neglecting to notify their employers when working from new locations while traveling, it becomes harder for IT teams to monitor BYOD policies and application usage. The researchers stated that the summer months lead to increased cybersecurity risks as employees' behaviors shift and as cyber hygiene becomes laxer.

    Help Net Security reports: "Employees Worry Less About Cybersecurity Best Practices in The Summer"

  • news

    Visible to the public "Torrent of Image-Based Phishing Emails Are Harder to Detect and More Convincing"

    A torrent of image-based phishing emails has been released. They contain QR codes to bypass security protections and provide a level of customization that makes it easier to deceive recipients. In many cases, the emails are sent from a compromised email address within the recipient's organization, providing a false sense of authenticity, according to researchers from the security firm Inky. The emails detected by Inky instruct the employee to address security issues, such as a missing two-factor authentication (2FA) enrollment, and warn of potential consequences if the employee does not comply. Those who click on the QR code are led to a website masquerading as a legitimate one used by the organization, but it captures and sends credentials to the attackers. Inky referred to the campaign's strategy as "spray and pray" because the threat actors behind it send emails to as many individuals as possible. Several factors distinguish this campaign from others. First, there is no text in the emails. Instead, only an image file is attached, thus enabling the emails to evade security measures that analyze the text-based words within an email. Some email programs and services automatically display attached images in the message body by default. Therefore, recipients often miss that the image-based email contains no text. This article continues to discuss image-based phishing emails that embed QR codes into their bodies.

    Ars Technica reports "Torrent of Image-Based Phishing Emails Are Harder to Detect and More Convincing"

  • news

    Visible to the public "miniOrange's WordPress Social Login and Register Plugin Was Affected by a Critical Auth Bypass Bug"

    Wordfence researchers have found a vulnerability in miniOrange's WordPress Social Login and Register plugin that allows an unauthenticated attacker to gain access to any account on a website by knowing the associated email address. Instead of requiring visitors to spend time filling out a traditional registration form, the plugin enables them to register/login to a website using their social media profiles. More than 30,000 WordPress websites have actively installed the plugin. The vulnerability, tracked as CVE-2023-2982, with a CVSS Score of 9.8, affects versions up to 7.6.4. According to the researchers, the encryption key used to protect the information used during the login process via social media accounts is hardcoded and is not unique for each WordPress installation. This allows attackers to craft a valid request containing a properly encrypted email address, which vulnerable plugin versions use to determine the user during the login process. This article continues to discuss the critical authentication bypass flaw found in miniOrange's WordPress Social Login and Register plugin that can allow access to any account on a site.

    Security Affairs reports "miniOrange's WordPress Social Login and Register Plugin Was Affected by a Critical Auth Bypass Bug"

  • news

    Visible to the public "Russian Satellite Telecom Dozor Allegedly Hit by Hackers"

    Hackers aligned with the Private Military Corporation (PMC) Wagner attacked Dozor-Teleport, a satellite communications provider used by Russia's Ministry of Defense and security services. Attackers targeted the infrastructure of the satellite communication provider, causing damage to user terminals. Herm1t, a pro-Ukrainian hacker and malware historian, says that attackers could have significantly damaged client equipment and the network core. According to the Internet Intelligence Research Lab's Internet Outage Detection and Analysis (IODA) project, the Dozor network went offline for over 10 hours. Russia's Ministry of Defense, ships of the Northern Fleet, the Federal Security Service (FSB), Rosatom, and other organizations use Dozor-Teleport. Users on a Telegram channel managed by Herm1t observed that the attack resembles Russia's cyberattack on Viasat's satellites. This article continues to discuss hackers targeting the Russian satellite communications provider Dozor-Teleport.

    Cybernews reports "Russian Satellite Telecom Dozor Allegedly Hit by Hackers"

  • news

    Visible to the public "Medtronic Fixes Critical Flaw in Cardiac Device Data System"

    Medtronic's heart monitor data management system contains a vulnerability of critical severity that, if exploited, could lead to Remote Code Execution (RCE) or a Denial-of-Service (DoS) condition. The deserialization of untrusted data flaw, tracked as CVE-2023-31222, for which patches are now available, exists on the Paceart Optima system. The software application collects, stores, and retrieves patient cardiac device data from remote heart monitors. It runs on healthcare organizations' Windows servers. The Paceart Messaging Service, which allows healthcare delivery organizations to send fax, email, and pager messages within the Paceart Optima system, is particularly vulnerable. The system's Paceart Messaging Service is optional, as opposed to being configured by default, but when it is enabled, the vulnerability is remotely exploitable and has a low attack complexity. The US Cybersecurity and Infrastructure Security Agency (CISA) warned that RCE could lead to the deletion, theft, or modification of the Paceart Optima system's cardiac device data, or the system's use for further network penetration. A DoS attack could render the Paceart Optima system unresponsive. This article continues to discuss the critical-severity vulnerability found in a heart monitor data management system.

    Decipher reports "Medtronic Fixes Critical Flaw in Cardiac Device Data System"

  • news

    Visible to the public "200,000 WordPress Sites Exposed to Attacks Exploiting Flaw in ‘Ultimate Member’ Plugin"

    Over 200,000 WordPress websites have recently been exposed to ongoing attacks targeting a critical vulnerability in the Ultimate Member plugin. The plugin is designed to make it easy for users to register and log in on sites and allows site owners to add user profiles, define roles, create custom form fields and member directories, and more. The vulnerability is tracked as CVE-2023-3460 (CVSS score of 9.8). It allows attackers to add a new user account to the administrator's group. Some of the plugin's users have observed the creation of rogue accounts and reported them this week, but the attacks appear to have been ongoing at least since the beginning of June. According to researchers at WPScan, the issue is rooted in a conflict between the plugin's blocklist logic and the way WordPress treats metadata keys. The researchers noted that Ultimate Member uses blocklists to store metadata keys that users should not manipulate and checks these lists whenever users attempt to register these keys when creating accounts. Due to the difference in operation between the plugin and WordPress, attackers were able to trick the plugin into updating metadata keys, including one that stores user roles and capabilities. The plugin's maintainers, who describe the issue as a privilege escalation bug, have attempted to address it in the last two versions of Ultimate Member, but they have reportedly failed to patch it fully. However, they did acknowledge the ongoing in-the-wild exploitation. Site owners are advised to disable Ultimate Member to prevent exploitation of the vulnerability. They should also audit all administrator roles on their sites to identify rogue accounts.

    SecurityWeek reports: "200,000 WordPress Sites Exposed to Attacks Exploiting Flaw in 'Ultimate Member' Plugin"

  • news

    Visible to the public "Researcher Outlines Known RFC Vulnerabilities in SAP Software That Lead to Unauthenticated Remote Code Execution"

    A researcher has identified what he deems to be several critical vulnerabilities impacting enterprise software solutions operating on ubiquitous SAP platforms. In a paper presented at a recent European cybersecurity conference, Fabian Hagg describes his work on testing the server-to-server communications bugs and design flaws found in SAP NetWeaver Application Server ABAP (AS ABAP) and ABAP Platform. He said that the laboratory analysis revealed alternate logon material, cryptographic failures, memory corruptions, and Advanced Business Application Programming (ABAP) programming pitfalls. The vulnerabilities are associated with SAP's long-standing proprietary interface protocol, Remote Function Call (RFC). Three are from 2021 and 2022, while the fourth was discovered in January this year. Two are rated 9.8 on the CVSS severity scale. Although patches have been developed for all four vulnerabilities, users with unpatched versions of SAP software remain vulnerable. This article continues to discuss the attack chain presented at a security conference that could impact all enterprise software solutions running on top of SAP AS ABAP platform technology.

    SC Media reports "Researcher Outlines Known RFC Vulnerabilities in SAP Software That Lead to Unauthenticated Remote Code Execution"

  • news

    Visible to the public "LockBit Claims TSMC Hack, Demands $70m Ransom"

    National Hazard Agency, a sub-group of the LockBit ransomware gang, has recently posted the name of Taiwan Semiconductor Manufacturing Company (TSMC), the world's largest chip manufacturer, on LockBit's dark web leak site on June 29, 2023. The threat actor has demanded TSCM pay a $70m ransom to prevent them from leaking the data they allegedly possess. The victim was initially given seven days to respond, but the deadline has since been extended to August 6. Currently, there is no information on the type of data LockBit may have extorted or whether they have any TSMC data at all. At the same time, it has been reported that Kinmax Technologies, one of TSMC's suppliers, which also works with Cisco, HPE, Microsoft, Citrix, VMware, and Nvidia has suffered a cyberattack, which led to the leak of information pertinent to server initial setup and configuration. Kinmax Technologies did not mention TSMC directly, and there is no official communication from the chip manufacturer currently If the breach is confirmed, it would be the fourth-largest ransom demand in ransomware history, according to William Thomas, a cyber threat intelligence researcher at Equinix. TSMC produces 65% of the world's semiconductors and 90% of the most advanced nodes. It has an estimated annual revenue of over $74bn in 2023.

    Infosecurity reports: "LockBit Claims TSMC Hack, Demands $70m Ransom"

  • news

    Visible to the public "Pro-Russia DDoSia Hacktivist Project Sees 2,400% Membership Increase"

    The pro-Russia crowdsourced Distributed Denial-of-Service (DDoS) project called "DDoSia" has grown 2,400 percent in less than a year, with thousands of people participating in the launch of attacks against Western organizations. The project was initiated by a pro-Russian hacktivist group known as "NoName057(16)" in the summer of 2022, and it rapidly attracted 400 active members and 13,000 users on its Telegram channel. In a new report published by Sekoia, analysts note that the DDoSia platform has grown significantly over the year, with about 10,000 active members contributing to the project's DDoS attacks and 45,000 subscribers to its main Telegram channel. In addition to the increase in community size, which has resulted in more disruptive attacks, DDoSia has improved its toolset and added binaries for all main operating system platforms, expanding its reach to a larger audience. This article continues to discuss the DDoSia platform experiencing a significant membership increase.

    Bleeping Computer reports "Pro-Russia DDoSia Hacktivist Project Sees 2,400% Membership Increase"

  • news

    Visible to the public "Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes"

    Cybersecurity researchers have shared details regarding the "Fluhorse" Android malware family. According to Fortinet FortiGuard Labs, the malware represents a significant transition because it includes malicious components directly within the Flutter code. Check Point first documented Fluhorse in early May 2023, describing its attacks on users in East Asia via rogue apps masquerading as ETC and VPBank Neo, which are widely used in Taiwan and Vietnam. Phishing is the initial vector of infection for the malware. The malicious apps aim to steal credentials, credit card information, and two-factor authentication (2FA) codes. The most recent findings from Fortinet, which reverse-engineered a Fluhorse sample uploaded to VirusTotal on June 11, 2023, indicate that the malware has evolved by hiding the encrypted payload within a packer. This article continues to discuss the latest findings regarding the Fluhorse Android malware family.

    THN reports "Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes"

  • news

    Visible to the public "CyberSentry Program Launches Webpage"

    CyberSentry is a US Cybersecurity and Infrastructure Security Agency (CISA)-managed capability for threat detection and monitoring, governed by an agreement between CISA and voluntarily participating critical infrastructure partners that operate major systems supporting National Critical Functions (NCFs). CyberSentry looks for known and unknown malicious activity that impacts Information Technology (IT) and Operational Technology (OT) networks. CISA's CyberSentry program supports trusted partnerships between CISA and each participating organization. The program has had much success, such as discovering an infection on a partner's Human Machine Interface (HMI) equipment that had been improperly patched and secured. CISA analysts promptly alerted the partner to the issue and provided recommendations for preventative measures. CyberSentry data also helped quickly identify partners impacted by the SolarWinds supply chain breach. This article continues to discuss the mission and recent successes of CISA's CyberSentry program.

    CISA reports "CyberSentry Program Launches Webpage"

  • news

    Visible to the public "6 Ways Cybersecurity Is Gut-Checking the ChatGPT Frenzy"

    Generative Artificial Intelligence (AI), ChatGPT, OpenAI, and Large Language Models (LLMs) are now almost daily topics of conversation within the cybersecurity community. Some small and large security vendors have incorporated AI chatbots into their offerings. Currently, investment in GPT-based AI security is one of the most active startup funding areas, and it is impossible to avoid encountering research on potential generative AI-related cybersecurity threats and countermeasures. This article continues to discuss how the security conversation regarding the new generation of AI is beginning to deepen.

    Dark Reading reports "6 Ways Cybersecurity Is Gut-Checking the ChatGPT Frenzy"

  • news

    Visible to the public "Global Rise in DDoS Attacks Threatens Digital Infrastructure"

    According to Nexusguard, the total number of Distributed Denial-of-Service (DDoS) attacks increased by 115.1 percent in 2022 compared to 2021 globally. The data also revealed that attackers continued to change their threat vectors by focusing on Internet Service Provider (ISP) application platforms, online databases, and cloud storage systems. As organizations transfer more workloads to the cloud, this has resulted in a more significant global impact. Although the number of DDoS attacks more than doubled from 2021 to 2022, the maximum size decreased by 48.2 percent to 361.9 gigabits per second (Gbps). The average size of attacks decreased by 22.4 percent. In 2022, 85.6 percent of DDoS threats were single-vector attacks, which is nearly identical to the percentage observed in 2021. User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) based attacks were the most common, accounting for 72.5 percent and 23 percent of all attacks, respectively. This article continues to discuss key findings from Nexusguard's DDoS Statistical Report for 2022.

    Help Net Security reports "Global Rise in DDoS Attacks Threatens Digital Infrastructure"

  • news

    Visible to the public "DHS S&T Seeks Solutions for Privacy-Preserving Digital Credential Wallets & Verifiers"

    The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has issued a new solicitation for the development, improvement, and implementation of a new set of tools that protect the privacy of individuals when using digital credentials for various purposes. The solicitation, "Privacy-Preserving Digital Credential Wallets & Verifiers," is administered by S&T's Silicon Valley Innovation Program (SVIP). It seeks advanced solutions to support a privacy-preserving digital credentialing ecosystem for DHS components and offices. Melissa Oh, managing director of SVIP, emphasizes that in an increasingly interconnected world, protecting the privacy of individuals who store their credentials in digital wallets is crucial to ensuring the security and confidentiality of their digital interactions. The solicitation builds on the success and global adoption of the open, standards-based digital credentialing solutions developed in response to SVIP's previous "Preventing Forgery & Counterfeiting of Certificates and Licenses" topic call. This article continues to discuss the new solicitation announced by DHS S&T to create solutions for privacy-preserving digital credential wallets and verifiers.

    DHS reports "DHS S&T Seeks Solutions for Privacy-Preserving Digital Credential Wallets & Verifiers"

  • news

    Visible to the public "Rise of the Script Kiddie: A Tenth of Children Say They Can Hack Websites"

    One in ten children believe they can hack into websites and online accounts, but only 8 percent of parents are concerned about this possible issue. Censuswide surveyed 500 children in the UK aged 12 to 17. Less than half of parents (44 percent) limit their children's Internet access, indicating that technically savvy children have ample opportunities to test and refine their hacking skills. According to researchers, the problem arises when children view hacking as a "victimless crime." Six out of ten children said they would feel guilty if they stole money from a parent's wallet or purse, but only half of that proportion would feel remorseful if they used someone else's credit card information to make online purchases. Researchers have noted that an increasing number of children are exposed to online hacking groups who could lure them into cybercriminal activities. This article continues to discuss survey findings regarding the rise in child hackers as well as one participant who got into hacking at the age of 12 and was able to take control of his school's computers.

    Cybernews reports "Rise of the Script Kiddie: A Tenth of Children Say They Can Hack Websites"