News Items

  • news

    Visible to the public "DOE Suffers Data Breach; 45K Students Affected"

    The Department of Education (DOE) recently experienced a data breach incident on Saturday, June 24. The DOE stated that the third-party file-sharing software MOVEit, which is used by the DOE to transfer documents and data internally and to vendors, including special education providers, was targeted in the incident. While a review is still ongoing, the DOE said approximately 45,000 students, in addition to DOE staff and related service providers, were affected by the system intrusion. Roughly 19,000 documents were accessed without authorization. The data impacted by the breach includes Social Security numbers, employee ID numbers, and student ID numbers. The DOE stated that it is working to determine exactly which confidential information was exposed and the impact for each affected individual.

    Queens Chronicles "DOE Suffers Data Breach; 45K Students Affected"

  • news

    Visible to the public "Sweetwater UHSD Data Breach Compromises Student, Staff Info"

    Sweetwater Union High School District recently announced that the personal information of students, families, and current and former employees was compromised in a February data breach. Between Feb. 11 and 12, an unauthorized person gained access to the district's computer network and took files that contained the personal information of an unknown number of people, including employees' dependents. The district, which serves about 36,000 middle and high school students, initially would not say whether there had been a cybersecurity attack. The district has not said how many people were potentially affected by the incident and has not publicly announced what information was compromised. Employees and parents began receiving letters last week from the district informing them about the breach. In one letter received by a teacher, it said that an unauthorized person gained access to files that included their name and Social Security number. The district said it is offering a one-year credit monitoring and identity theft protection service via a third party to those affected.

    Goverment Technology reports: "Sweetwater UHSD Data Breach Compromises Student, Staff Info"

  • news

    Visible to the public "Dozens of Businesses Hit Recently by ‘8Base’ Ransomware Gang"

    According to security researchers at VMware, a ransomware gang named 8Base was the second most active group in June 2023. 8Base has been active since March 2022 and mainly focused on small businesses. The researchers noted that the group engages in double extortion tactics, publicly naming and shaming victims to compel them to pay the ransom. To date, the 8Base gang has hit approximately 80 organizations across sectors such as automotive, business services, construction, finance, healthcare, hospitality, IT, manufacturing, and real estate. While analyzing the group's activity, the researchers identified a resemblance with another relatively unknown ransomware gang, RansomHouse, which is known for purchasing leaked data and then extorting companies for money. According to the researchers, similarities were found in communication style and ransom notes, with the leak sites of the groups using nearly identical language, albeit different visuals. The main difference between the two groups is the fact that, while RansomHouse is openly recruiting for partners, 8Base is not. 8Base was seen using ransom notes that match both RansomHouse and Phobos. The researchers noted that it is possible that 8Base has used different types of ransomware as part of its normal operation. Whether 8Base is an offshoot of Phobos or RansomHouse remains to be seen.

    SecurityWeek reports: "Dozens of Businesses Hit Recently by '8Base' Ransomware Gang"

  • news

    Visible to the public "Using Electromagnetic Fault Injection Attacks to Take Over Drones"

    IOActive researchers explored the development of fault injection attacks against hardened Unmanned Aerial Vehicles (UAVs) as the use of drones continues to increase. The researchers focused on executing code on a commercially available drone, supporting security features such as the use of signed and encrypted firmware, Trusted Execution Environment (TEE), and Secure Boot, through the use of non-invasive methods. The research aimed to achieve the goal by using electromagnetic (EM) side-channel attacks or EM fault injection (EMFI). They tested the attacks against DJI's Mavic Pro, one of the most popular quadcopter drones. This article continues to discuss the possibility of EMFI attacks on drones.

    Security Affairs reports "Using Electromagnetic Fault Injection Attacks to Take Over Drones"

  • news

    Visible to the public Pub Crawl #75


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Serious Vulnerability Exposes Admin Interface of Arcserve UDP Backup Solution"

    A new vulnerability, tracked as CVE-2023-26258, was identified in the web management interface of Arcserve UDP by security researchers at MDSec. The researchers noted that successfully exploiting the bug could allow an attacker to access the administrative interface. According to the researchers, the flaw was discovered in the way HTTP requests containing login information were transmitted between the web browser and the administrative interface. Specifically, the security researchers observed that a user validation method being invoked creates a client acting as a proxy that communicates with a web service responsible for validating the supplied credentials. The researchers noted that because the location of the web service is supplied in the request, they were able to modify the request so that the client would contact an HTTP server controlled by them. Further analysis of the requests transmitted between the client and the web service allowed the researchers to identify information such as OS version, domain name, and administrator account name, along with a method that validates users by UUID, and an AuthUUID value. The researchers stated that once they supplied the AuthUUID value to the web service, they received the cookie for a valid administrator session in response, which allowed them to retrieve the encrypted password for that account. MDSec reported the vulnerability in early February 2023. A patch was released on June 27, roughly four months after a CVE identifier was assigned to the bug. Arcserve UDP 9.1 resolves CVE-2023-26258, along with an Apache Commons FileUpload (CVE-2023-24998) flaw, three Spring Framework vulnerabilities made public last year, and various other issues.

    SecurityWeek reports: "Serious Vulnerability Exposes Admin Interface of Arcserve UDP Backup Solution"

  • news

    Visible to the public "Over 130 Organizations, Millions of Individuals Believed to Be Impacted by MOVEit Hack"

    More victims of the MOVEit hack have recently come to light, with a total of over 130 organizations and millions of individuals believed to be impacted. Brett Callow, a threat analyst at cybersecurity firm Emisoft, stated that he is aware of 138 organizations to have been impacted by the campaign, with the data breaches resulting in the personal information of more than 15 million people being compromised. The Russia-linked cybercrime group known for operating the Cl0p ransomware has taken credit for the attack. Cl0p has claimed to have hit many organizations, and they have started naming those that have refused to pay up or enter negotiations. They have recently named over 60 entities that appear to have been targeted through the MOVEit vulnerability, which the group may have been testing since 2021. Callow stated that the list includes major organizations such as Shell (they have already leaked data allegedly stolen from the energy giant), Siemens Energy, Schneider Electric, UCLA, Sony, EY, PwC, Cognizant, and AbbVie. Law firms Kirkland & Ellis and K&L Gates have also been added to Cl0p's leak website.

    SecurityWeek reports: "Over 130 Organizations, Millions of Individuals Believed to Be Impacted by MOVEit Hack"

  • news

    Visible to the public "Linux Version of Akira Ransomware Targets VMware ESXi Servers"

    The "Akira" ransomware operation now uses a Linux encryptor to encrypt VMware ESXi Virtual Machines (VMs) in double extortion attacks against companies globally. Akira first appeared in March 2023, targeting Windows systems in different industries, including education, finance, real estate, and manufacturing. The threat actors, like other enterprise-targeting ransomware groups, steal data from breached networks and encrypt files to carry out double extortion on victims, demanding payments of several million dollars. Since its emergence, the ransomware operation has claimed more than 30 victims in the US alone, with two different surges in ID Ransomware submissions at the end of May and in June. The malware analyst rivitna recently shared a sample of the new encryptor on VirusTotal after discovering the Linux variant of Akira. This article continues to discuss the Linux version of Akira ransomware targeting VMware ESXi servers.

    Bleeping Computer reports "Linux Version of Akira Ransomware Targets VMware ESXi Servers"

  • news

    Visible to the public "North Korean Hacker Group Andariel Strikes With New EarlyRat Malware"

    "Andariel," a threat actor aligned with North Korea, used "EarlyRat," a previously undocumented malware, in attacks exploiting the Log4j Log4Shell vulnerability. According to researchers, Andariel infects machines by executing a Log4j exploit, which then downloads additional malware from the command-and-control (C2) server. Andariel, also known as "Silent Chollima" and "Stonefly," is associated with North Korea's Lab 110, a primary hacking unit that also includes APT38 (also known as "BlueNoroff") and other subordinate elements tracked collectively under the name "Lazarus Group." In addition to conducting espionage attacks against foreign government and military entities of strategic interest, the threat actor is known to conduct cybercrime as an extra source of income. Some of the cyber weapons in its arsenal include the Maui ransomware strain and numerous Remote Access Trojans (RATs) and backdoors such as Dtrack, NukeSped, MagicRAT, and YamaBot. This article continues to discuss the North Korea-aligned threat actor Andariel using the new EarlyRat malware.

    THN reports "North Korean Hacker Group Andariel Strikes With New EarlyRat Malware"

  • news

    Visible to the public "Popular Generative AI Projects Pose Serious Security Threat"

    According to Rezilion, many popular generative Artificial Intelligence (AI) projects pose an increased security risk. Open source projects that use insecure generative AI and Large Language Models (LLMs) also have a poor security posture, resulting in a risky environment for organizations. The popularity of generative AI has grown, allowing users to create, interact with, and consume content in unprecedented ways. With the advancements in LLMs, such as Generative Pre-Trained Transformers (GPT), machines can now generate text, images, and code. The number of open source projects implementing these technologies is rising exponentially. More than 30,000 open source projects on GitHub are now using the GPT-3.5 family of LLMs. However, GPT and LLM projects pose several security risks to organizations that use them, such as trust boundary risks, data management risks, inherent model risks, and general security issues. This article continues to discuss generative AI security risks.

    Help Net Security reports "Popular Generative AI Projects Pose Serious Security Threat"

  • news

    Visible to the public "NPM Plagued With 'Manifest Confusion' Malware-Hiding Weakness"

    A former GitHub employee claims that a vulnerability in Node Package Manager (npm) could enable anyone to hide malicious dependencies and scripts within their packages. Npm, owned by GitHub, is used for sharing JavaScript code among over 17 million developers. In a June 27 blog post, Darcy Clarke, the former staff engineering manager for npm's command line interface team, described a site flaw he called "manifest confusion." The "confusion" stems from the fact that npm does not validate the metadata associated with a given package, allowing any publisher to hide certain information about their packages, such as the scripts it executes and the dependencies on which it relies. In recent months, an increasing number of hackers have devised novel methods to poison packages and spread malware along the code supply chain, putting pressure on npm and other similar repositories. This article continues to discuss the manifest confusion weakness in npm.

    Dark Reading reports "NPM Plagued With 'Manifest Confusion' Malware-Hiding Weakness"

  • news

    Visible to the public "CyberCamp Introduces Students to Cybersecurity"

    The Center for Cyber Law, Policy, and Security (Pitt Cyber), together with Pitt Information Technology (Pitt IT), recently held the sixth annual Air Force Associate (AFA) CyberCamp. The EQT Foundation and Grable Foundation, along with the Pitt Community Engagement Centers and Pitt Engineering, supported the one-week camp. High school students in the Pittsburgh area who are interested in learning about cybersecurity principles, skills, and future career opportunities were welcome to participate for free. Students were taught throughout the week on cyber ethics and security fundamentals, as well as Windows, Ubuntu, and Linux security policies. Although many people believe cybersecurity is all about the attack strategies used by malicious actors, CyberCamp participants learned defensive strategies to thwart hackers. This article continues to discuss the sixth annual AFA CyberCamp and the importance of increasing cybersecurity interest among young people.

    The University of Pittsburgh reports "CyberCamp Introduces Students to Cybersecurity"

  • news

    Visible to the public "Making 911 Calls More Secure"

    The National Science Foundation (NSF) has awarded a $1.2 million grant to a team of researchers from Purdue University and Michigan State University to continue enhancing the security of cellular 911 calls. In the US, the Federal Communications Commission (FCC) has enacted regulations to make it easier for cell phone users to contact 911 in an emergency. The research team became interested in how US cell phone services comply with regulations. They discovered that compliance with the regulations could compromise security. For example, companies cannot apply encryption and integrity protection to emergency calls as they would to non-emergency calls. This can create a security vulnerability in cellular 911 communications. The team will perform various research tasks to facilitate an interdisciplinary understanding of emergency service attacks against the mobile ecosystem. They will also analyze associated research issues as well as develop algorithms, tools, and platforms to bolster the security of cellular emergency services. This article continues to discuss the project aimed at reducing cybersecurity risks to protect cellular 911 calls.

    Purdue University reports "Making 911 Calls More Secure"

  • news

    Visible to the public "To Pay or Not to Pay? Ransomware Attacks Are the New Kidnapping"

    In recent years, ransomware attacks have evolved into a persistent security risk. The inability to effectively respond to this challenge has normalized what should be intolerable: organized cybercriminals harbored by hostile states disrupting and extorting businesses and critical services regularly. Following last year's cyberattacks on Optus and Medibank, the Australian government has signaled its willingness to address one of the most difficult and divisive questions in cyber policy, which is whether ransomware payments should be prohibited. According to the specialist ransomware negotiation company Coveware, the profits ransomware attackers generate outweigh the risks. There are almost no entry barriers, and the profit margin can reach 98 percent. Therefore, a ban on payments makes logical sense. Stopping payments will eliminate the primary motivation for ransomware attacks, and those in search of a fast buck will look elsewhere. This article continues to discuss the debate regarding ransomware payments.

    Australian Strategic Policy Institute reports "To Pay or Not to Pay? Ransomware Attacks Are the New Kidnapping"

  • news

    Visible to the public "CISA Releases Cloud Services Guidance and Resources"

    The Cybersecurity and Infrastructure Security Agency (CISA) has released the first series of final security guidance resources under its Secure Cloud Business Applications (SCuBA) project: the Extensible Visibility Reference Framework (eVRF) Guidebook and a Technical Reference Architecture (TRA) document. With input from the public comment period in 2022, the final guidance documents will help public and private entities in implementing cloud security and resilience best practices. The eVRF Guidebook provides an overview of the eVRF framework, which allows organizations to identify visibility data, mitigate threats, understand the extent to which products and services offer visibility data, and identify potential data gaps. Organizations can use the TRA Document as a security guide to adopting technology for cloud deployment, adaptable solutions, secure architecture, and zero trust frameworks. This article continues to discuss CISA's release of the first series of final security guidance resources under its SCuBA project.

    CISA reports "CISA Releases Cloud Services Guidance and Resources"

  • news

    Visible to the public "NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments"

    Cybercriminals frequently target software development and delivery supply chains. These environments can be used to compromise cloud deployments throughout the automated software development and delivery lifecycle. The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released a Cybersecurity Information Sheet (CSI) titled "Defending Continuous Integration/Continuous Delivery (CI/CD) Environments" to provide guidance for incorporating security best practices into typical software development and operations (DevOps) CI/CD environments. The CSI recommends best practices for authentication and access control, development environments and tools, and the development process for hardening CI/CD pipelines. NSA and CISA recommend that organizations and network defenders implement the mitigations in this CSI to reduce CI/CD environment compromise and create a difficult environment for malicious cyber actors. This article continues to discuss the CSI released by NSA and CISA on defending CI/CD environments.

    NSA reports "NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments"

  • news

    Visible to the public "A Bridge Between Different Cryptocurrencies"

    Bitcoin is the most well-known cryptocurrency in the world today, but there are numerous others, each implementing a different set of technical features. To exchange one cryptocurrency for another, so-called "bridges" are used, which are typically provided by companies that hold significant sums of various cryptocurrencies and offer to exchange them. However, this has often led to security issues and criminal cases involving the theft of cryptocurrencies worth billions. Researchers at TU Wien developed a novel protocol to enable the exchange of one cryptocurrency for another efficiently and securely. "Glimpse" is the name of the new protocol, which will provide the cryptocurrency world with entirely new options. The "USENIX Security Symposium" accepted the paper presenting this new tool. This article continues to discuss the novel protocol developed at TU Wien that enables the exchange of one cryptocurrency for another in an efficient and secure manner.

    TU Wien reports "A Bridge Between Different Cryptocurrencies"

  • news

    Visible to the public "ChatGPT Users at Risk for Credential Theft"

    New research conducted by Group-IB reveals that threat actors are increasingly compromising ChatGPT accounts. They may use this access to collect sensitive data and launch additional targeted attacks. According to Group-IB, ChatGPT credentials have become a major target for malicious activities. Researchers cautioned that because OpenAI's Artificial Intelligence-driven chatbot stores past user queries and AI responses by default, each account could be an entry point for threat actors to access user data. Dmitry Shestakov, head of threat intelligence at Group-IB, emphasizes that exposed information, whether personal or professional, could be used for malicious purposes such as identity theft, financial fraud, targeted scams, and more. Over the past year, Group-IB researchers identified 101,134 information stealer-infected devices storing ChatGPT data. Using Group-IB's Threat Intelligence platform to gain visibility into dark web communities, researchers were able to find compromised ChatGPT credentials within the logs of information stealers sold by threat actors via illicit marketplaces. Most victims were found to reside in the Asia-Pacific region. This article continues to discuss threat actors exploiting stolen ChatGPT accounts to collect users' sensitive data and professional credentials.

    TechTarget reports "ChatGPT Users at Risk for Credential Theft"

  • news

    Visible to the public "Wagner Ransomware Wants to Recruit Its Victims"

    Wagner ransomware infects user devices and invites them to join the Wagner Group, which is a Russian Private Military Corporation (PMC). Cyble researchers say that the recently detected ransomware likely targets Russians. Instead of demanding payment, the ransomware demands that victims join the PMC led by Yevgeny Prigozhin. "Official Wagner PMCs employment virus," reads the ransom note on victim devices in Russian. The note also calls on the victim to "wage war" against Sergei Shoigu, Russia's longtime Minister of Defense. Cyble reports that while the ransom note mimics the bio section of the Wagner Group Telegram channel, the PMC itself has not publicly claimed responsibility for the ransomware campaign. The strain seems to be a variant of Chaos ransomware, which evolved from the RYUK ransomware. Wagner ransomware targets data stored on the C: drive, encrypting documents, contacts, and more. This article continues to discuss the Wagner ransomware campaign.

    Cybernews reports "Wagner Ransomware Wants to Recruit Its Victims"

  • news

    Visible to the public "ThirdEye Infostealer Poses New Threat to Windows Users"

    Security researchers at FortiGuard Labs discovered a new infostealer called ThirdEye that is potentially targeting Windows users. The researchers stated that ThirdEye is designed to extract valuable system information from compromised machines, which can be used in future cyberattacks. The researchers said that while ThirdEye is not considered technically elaborate, its capabilities include harvesting BIOS and hardware data, enumerating files and folders, identifying running processes, and collecting network information. The researchers noted that after collecting the compromised system's information, the malware sends it to a command-and-control (C2) server. Notably, the infostealer uses a unique string, "3rd_eye," to identify itself to the C2. The researchers stated that analysis of the samples revealed that the earliest variant, discovered in April 2023, collected limited information compared to the more recent samples. Over time, the infostealer has evolved, adding additional data-gathering capabilities. The researchers noted that ThirdEye variants were submitted to a public scanning service from Russia, and the latest variant has a file name in Russian, suggesting a potential focus on Russian-speaking organizations. The researchers emphasized that while there is no concrete evidence of ThirdEye being used in attacks, system defenders should still be wary of this malware tool.

    Infosecurity reports: "ThirdEye Infostealer Poses New Threat to Windows Users"

  • news

    Visible to the public "Critical SQL Injection Flaws in Gentoo Soko Can Lead To Remote Code Execution"

    Researchers at SonarSource discovered two SQL injection vulnerabilities in Gentoo Soko, tracked collectively as CVE-2023-28424 with a CVSS score of 9.1, which a remote attacker can exploit to execute arbitrary code on vulnerable systems. Soko is deployed in the Gentoo Linux infrastructure. The researchers explained that exploiting the vulnerabilities is possible due to improper database configuration. The misconfiguration likely stems from the database's Docker containerization. It was noted that containers frequently "enjoy elevated privileges" due to their status as a security boundary between software components. According to SonarSource's report, a threat actor can inject specially crafted code to evade the escaping feature in the module and introduce SQL injections, resulting in the exposure of sensitive data. This article continues to discuss the SQL injection vulnerabilities in Gentoo Soko that could lead to remote code execution (RCE) on impacted systems.

    Security Affairs reports "Critical SQL Injection Flaws in Gentoo Soko Can Lead To Remote Code Execution"

  • news

    Visible to the public "Mobile Malware and Phishing Surge in 2022"

    According to security researchers at Zimperium, the volume of mobile malware, phishing sites dedicated to mobiles, and mobile vulnerabilities increased significantly in 2022. The researchers found that the percentage of phishing sites targeting mobile devices increased from 75% to 80% year-on-year in 2022. The researchers also found that the average user is between six and ten times more likely to fall for an SMS phishing attack than an email-based one. The researchers detected an average of four malicious or phishing links clicked for every device protected with the company's anti-phishing technology. The researchers noted that phishing is not the only threat facing BYOD and corporate devices. The researchers detected a 51% increase in mobile malware variants between 2021 and 2022, reaching 920,000 unique samples. From 2021 to 2022, the share of Android devices with malware detected rose from one in 50 to one in 20. The researchers detected over 3000 unique spyware samples. EMEA (35%) and North America (25%) had the highest percentage of devices impacted by spyware last year. The researchers also found that mobile vulnerabilities are also surging. There was a 138% increase in detected bugs on the Android ecosystem in 2022, while Apple's iOS accounted for 80% of zero-days actively exploited in the wild last year.

    Infosecurity reports: "Mobile Malware and Phishing Surge in 2022"

  • news

    Visible to the public "EncroChat Bust Leads to 6500 Arrests in Three Years"

    Europol recently announced that dismantling an encrypted chat platform used by organized crime gangs (OCGs) has led to 6558 arrests in the past three years, including 197 "high-value targets." Europol noted that EncroChat was used by tens of thousands of criminals to communicate without fear of being snooped on by law enforcers. Special devices were sold for $1095 each, and six-month subscriptions were priced at $548, featuring 24/7 support, remote wipe, and a PIN code to wipe the phone if apprehended. Since EncroChat was infiltrated, police have analyzed over 115 million conversations from over 60,000 users worldwide, with Europol providing 700 "actionable intelligence packages" compiled from this information to investigators globally. Over the past three years, law enforcers have seized 740m euros in cash, frozen 154m euros in assets or bank accounts, seized 31 million pills, 104 tonnes of cocaine, 163 tonnes of cannabis, and 3.3 tonnes of heroin, seized 923 weapons, 21,750 rounds of ammunition and 68 explosives, and seized 83 boats and 40 planes. Europol stated that subsequent convictions have led to a total combined sentence of 7134 years of imprisonment.

    Infosecurity reports: "EncroChat Bust Leads to 6500 Arrests in Three Years"

  • news

    Visible to the public "MIT Researchers Devise a Way to Evaluate Cybersecurity Methods"

    Observing a computer program's behavior, such as how much time it spends accessing the computer's memory, enables a skilled hacker to obtain sensitive data, such as a password. Approaches to security that completely block these side-channel attacks are so computationally costly that they are impractical for many real-world systems. Therefore, engineers often use obfuscation schemes that aim to limit, but not eliminate, an attacker's ability to discover secret information. In order to help engineers and scientists better understand the effectiveness of various obfuscation schemes, MIT researchers developed a framework to quantitatively evaluate the amount of information an attacker could glean from a victim program with an obfuscation scheme. Their framework, dubbed "Metior," helps the user examine how different victim programs, attacker strategies, and obfuscation scheme configurations impact how much sensitive information is leaked. Engineers who develop microprocessors could use the framework to evaluate the effectiveness of multiple security schemes and determine the most promising architecture early in the design process. This article continues to discuss the system devised by MIT researchers that analyzes the likelihood that an attacker could thwart a certain security scheme to steal secret information.

    MIT News reports "MIT Researchers Devise a Way to Evaluate Cybersecurity Methods"

  • news

    Visible to the public "Sensitive Information Stolen in LetMeSpy Stalkerware Hack"

    Radeal, the Polish developer of Android stalkerware "LetMeSpy," is informing users that their personal information and collected data was stolen due to a cyberattack. LetMeSpy is a free application that collects information from the phones it has been installed on, including call logs, text messages, and device location. The phone monitoring application is marketed as offering parental control and employee monitoring capabilities, but it essentially allows users to spy on others after installing the software on their devices, likely without their knowledge. Once up and running on a device, LetMeSpy hides its icon from the phone's home screen to prevent detection and removal. The application uploads the collected information to remote servers, where the user who installed it can access it, essentially tracking a person in real time. Radeal stated that it fell victim to a cyberattack that resulted in unauthorized access to the data of website users. As a result of the attack, the criminals gained access to email addresses, telephone numbers, and the content of messages collected on accounts. The application developer suspended all account-related functions of the website, promising to restore them after mitigating the attack. Law enforcement was also informed about the incident. According to security researcher Maia Arson Crimew, who received a copy of the allegedly stolen data, the attackers got their hands on call logs, messages, user IDs, email addresses, password hashes, geolocation logs, IP addresses, payment logs, and phone information.

    SecurityWeek reports: "Sensitive Information Stolen in LetMeSpy Stalkerware Hack"

  • news

    Visible to the public "New Ongoing Campaign Targets npm Ecosystem with Unique Execution Chain"

    Cybersecurity researchers have uncovered a new ongoing campaign targeting the npm ecosystem that involves a unique execution chain to deliver an unknown payload to victim systems. According to the software supply chain security company Phylum, the packages in question appear to be published in pairs, with each pair working to retrieve additional resources that are then decoded and/or executed. As the first of the two modules is designed to store locally a token retrieved from a remote server, the order in which the packages are installed is crucial for executing a successful attack. The second package sends this token along with the operating system type as a parameter to an HTTP GET request in order to retrieve a second script from the remote server. A successful execution returns a Base64-encoded string that is executed immediately, but only if the returned string is longer than 100 characters. This article continues to discuss the new ongoing campaign aimed at the npm ecosystem.

    THN reports "New Ongoing Campaign Targets npm Ecosystem with Unique Execution Chain"

  • news

    Visible to the public "Jscrambler Launches JavaScript Scanner for PCI DSS 4.0 Compliance"

    Jscrambler has released a free tool to help businesses check the JavaScript code on their e-commerce sites and bring it into compliance with Payment Card Industry Data Security Standards (PCI DSS) 4.0. In March 2022, the PCI Security Standards Council released PCI DSS 4.0 and started a two-year phase-out of the previous versions. By March 31, 2025, all retailers and e-commerce sites, as well as anyone else who processes payment cards online, will be required to comply with PCI DSS 4.0 requirements. The PCI DSS JavaScript Compliance Tool from Jscrambler helps organizations determine whether the JavaScript on their e-commerce websites complies with two 4.0 requirements: protecting against and detecting skimming attacks on all scripts from a merchant or its third-party or fourth-party contractors. Attackers carry out web skimming campaigns by injecting malicious code into Magento, WooCommerce, Shopify, and WordPress websites, so the anti-skimming requirements are necessary. Two million websites, including those of Ticketmaster and British Airways, have been found to contain Magecart skimmers. This article continues to discuss the free tool released to help companies check the JavaScript code running on their e-commerce sites and bring it into compliance with the latest PCI DSS.

    Dark Reading reports "Jscrambler Launches JavaScript Scanner for PCI DSS 4.0 Compliance"

  • news

    Visible to the public "8Base Ransomware Gang Escalates Double Extortion Attacks in June"

    A ransomware gang named "8Base" has been targeting organizations worldwide in double-extortion attacks, with a constant stream of new victims. The ransomware group appeared for the first time in March 2022, maintaining a low profile with few notable attacks. In June 2023, the ransomware operation had a surge in activity, targeting many businesses across industries. So far, 8Base's dark web extortion site has listed 35 victims, with some days claiming as many as six victims simultaneously. This is a significant increase from March and April, when the group reported only a few victims. In May 2023, the extortion gang launched its data leak website, claiming to be "honest and simple" penetration testers. According to a new report by VMware's Carbon Black team, the tactics used in recent 8Base attacks indicate a rebranding of an established ransomware group, possibly RansomHouse. This article continues to discuss findings and observations regarding the 8Base ransomware group.

    Bleeping Computer reports "8Base Ransomware Gang Escalates Double Extortion Attacks in June"

  • news

    Visible to the public "ChatGPT Shows Promise in Detecting Phishing Sites"

    Researchers wanted to know whether ChatGPT can reliably detect phishing sites. They tested 5,265 URLs (2,322 phishing and 2,943 safe). They asked ChatGPT (GPT-3.5) the question: "Does this link lead to a phish website?" The Artificial Intelligence (AI)-driven chatbot had an 87.2 percent detection rate and a 23.2 percent false positive rate based solely on the URL form. According to the researchers, although the rate of detection is high, the rate of false positives is unacceptable. The results were much worse when they asked a slightly different question: "Is this link safe to visit?" The detection rate was 93.8 percent and the false positive rate was 64.3 percent. The more general prompt is more likely to result in a conclusion that the link is malicious. Both approaches yielded unsatisfactory results, but the researchers still believe it is possible to use this type of technology to aid human analysts by highlighting suspicious URL parts and suggesting potential attack targets. This article continues to discuss the potential use of ChatGPT to detect phishing sites.

    Help Net Security reports "ChatGPT Shows Promise in Detecting Phishing Sites"

  • news

    Visible to the public SoS Musings #74 - Cybercriminals Ramping Up Business Email Compromise (BEC) Attacks

    SoS Musings #74 -

    Cybercriminals Ramping Up Business Email Compromise (BEC) Attacks

  • news

    Visible to the public Cybersecurity Snapshots #43 - Rorschach Ransomware

    Cybersecurity Snapshots #43 -

    Rorschach Ransomware

  • news

    Visible to the public Cyber Scene #81 - California Gold Rush: AI, Chips, and the Tech Arms Race

    Cyber Scene #81 -

    California Gold Rush: AI, Chips, and the Tech Arms Race

  • news

    Visible to the public "Attackers Can Break Voice Authentication With up to 99 Percent Success Within Six Tries"

    Computer scientists at the University of Waterloo have discovered an attack technique that can bypass voice authentication security systems with a success rate of up to 99.9 percent after only six attempts. Voice authentication, which enables businesses to verify the identity of their clients through a unique "voiceprint," has become increasingly implemented in remote banking, call centers, and other security-sensitive situations. In order to enroll in voice authentication, the user must repeat a specific phrase in their own voice. The system then extracts a unique vocal signature (voiceprint) from the provided phrase and stores it on a server, explains Andre Kassis, a Computer Security and Privacy Ph.D. candidate and the study's lead author. For future authentication attempts, they are asked to repeat a different phrase, and the features extracted from it are compared to the voiceprint stored in the system to determine if they should be granted access. Following the introduction of voiceprints, malicious actors soon realized they could apply Machine Learning (ML)-enabled "deepfake" software to create convincing copies of a victim's voice using as little as five minutes of recorded audio. This article continues to discuss the attack method that can bypass voice authentication security with a high success rate.

    The University of Waterloo reports "Attackers Can Break Voice Authentication With up to 99 Percent Success Within Six Tries"

  • news

    Visible to the public "Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers"

    Researchers from the Ben-Gurion University of the Negev and Cornell University have discovered that it is possible to recover secret keys from a device by analyzing video footage of its power LED in a clever side-channel attack. They found that cryptographic computations conducted by the CPU alter the device's power consumption, thereby affecting the brightness of the power LED. Threat actors can extract the cryptographic keys from a smart card reader by leveraging video camera devices such as an iPhone 13 or an Internet-connected surveillance camera. Specifically, video-based cryptanalysis is performed by getting video footage of rapid changes in an LED's brightness and using the rolling shutter effect of the video camera to capture the physical emanations. This article continues to discuss the side-channel attack that makes it possible to recover secret keys from a device by analyzing video footage of its power LED.

    THN reports "Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers"

  • news

    Visible to the public "New Mockingjay Process Injection Technique Evades EDR Detection"

    A new process injection technique called "Mockingjay" may enable threat actors to evade Endpoint Detection and Response (EDR) and other security products in order to secretly execute malicious code on compromised systems. Researchers at the cybersecurity company Security Joes discovered the technique, which uses legitimate DLLs with read, write, and execute sections to bypass EDR hooks and inject code into remote processes. Process injection is a technique for executing arbitrary code in the address space of another running process trusted by the operating system, giving threat actors the ability to run malicious code without being detected. Examples of process injection techniques include DLL injection, PE injection, reflective DLL injection, thread execution hijacking, process hollowing, mapping injection, and more. All these methods require using Windows Application Programming Interfaces (APIs) and different system calls, creating processes/threads, and writing process memory. Mockingjay distinguishes itself from other methods because it does not use commonly abused Windows API calls, set special permissions, perform memory allocation, or even start a thread, thus removing many potential detection opportunities. This article continues to discuss findings regarding the new Mockingjay process injection method.

    Bleeping Computer reports "New Mockingjay Process Injection Technique Evades EDR Detection"

  • news

    Visible to the public "Four Ways Criminals Could Use AI to Target More Victims"

    Daniel Prince, a cybersecurity professor at Lancaster University, explores how criminals could use Artificial Intelligence (AI) to target victims. AI is a tool used to improve productivity, process and organize large volumes of data, and offload decision-making. However, AI tools are accessible to anyone, including criminals. Observing how criminals have adapted to and adopted technological advancements in the past can provide insight into how they may use AI. AI tools such as ChatGPT and Google's Bard provide writing assistance, enabling, for example, inexperienced writers to compose effective marketing messages, but this technology could also help criminals sound more credible when contacting potential victims via phishing emails and text messages. The technique known as "brute forcing" could also benefit from AI. This is where numerous character and symbol combinations are tried to determine if they match passwords. This article continues to discuss the different ways in which criminals could use AI to target victims.

    The Conversation reports "Four Ways Criminals Could Use AI to Target More Victims"

  • news

    Visible to the public "Why the FDA's SBOM Mandate Changes the Game for OSS Security"

    The US Food and Drug Administration (FDA) is not the first thing that comes to mind for most Open Source Software (OSS) project maintainers or the developers who build applications that leverage OSS. However, new FDA rules may have a greater impact on OSS security than any other government rule to date. On October 1, 2023, the FDA will begin enforcing its mandate that all medical devices running software must create and maintain a Software Bill of Materials (SBOM). The new policy addresses concerns regarding healthcare devices' critical software-powered components not being adequately protected. Medical institutions are one of the common targets of ransomware attacks, and hackers are expected to increasingly target medical devices. This article continues to discuss the new FDA SBOM guidelines for medical devices that could have a broad impact on the healthcare industry and the broader open source ecosystem.

    Dark Reading reports "Why the FDA's SBOM Mandate Changes the Game for OSS Security"

  • news

    Visible to the public "95% Fear Inadequate Cloud Security Detection and Response"

    Permiso has published its "2023 Cloud Detection and Response Survey," which surveyed over 500 security, Information Technology (IT), and engineering professionals to gain further insight into how their organizations address security challenges in cloud environments. The survey looked into the respondents' cloud security practices and the scale of their environments, including the number of identities and secrets they manage, their response time to an attack, the various access methods they have implemented, and the types of solutions they use to secure their environments. In addition, their confidence in the power of their tools and teams to defend against and detect a breach was explored. Most respondents (70 percent) place their response time to an attack between 12 and 24 hours. According to data gathered from actual production environments and incident responses, this time exceeds two weeks (16 days). This article continues to discuss key findings from Permiso's 2023 Cloud Detection and Response Survey.

    Help Net Security reports "95% Fear Inadequate Cloud Security Detection and Response"

  • news

    Visible to the public Summary: Spring 2023 SoS Quarterly Lablet Meeting



    Spring 2023 SoS Quarterly Lablet Meeting


  • news

    Visible to the public "Siemens And UCLA Say Data Compromised in MOVEit Data Breach"

    Siemens Energy and the University of California, Los Angeles (UCLA) recently announced that they were among the victims of the MOVEit hack that has affected scores of corporations, governments, and other institutions recently. The hackers behind the wide-ranging breach, Cl0p, had earlier boasted about stealing data from UCLA and Siemens on their website. Siemens and UCLA provided few additional details about the scope or consequences of the breach. Siemens said that none of its critical data had been compromised and that its operations remained unaffected. UCLA said its campus systems were unaffected and that "all of those who have been impacted have been notified."

    Reuters reports: "Siemens And UCLA Say Data Compromised in MOVEit Data Breach"

  • news

    Visible to the public "Study Reveals Alarming Gap in SIEM Detection of Adversary Techniques"

    According to security researchers at CardinalOps, Enterprise Security Information and Event Management (SIEM), solutions are falling short when it comes to detecting and countering cyber threats. During the study, the researchers examined over 4000 detection rules, one million log sources, and various unique log source types from production SIEMs like Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic. The researchers found that SIEMs can only detect 24% of the techniques listed in the MITRE ATT&CK framework, leaving organizations vulnerable to ransomware attacks, data breaches, and other cyber threats. The researchers also found that SIEMs already ingest enough data to potentially cover 94% of all MITRE ATT&CK techniques. However, inefficient manual processes for developing new detection and data quality issues contribute to the failure to achieve better coverage. Mike Parkin, a senior technical engineer at Vulcan Cyber, stated that it appears the challenge here isn't so much a lack of detection capability as it is a lack of clean correlation and prioritization capabilities. Parkin noted that until organizations can get a clear picture of their threat surfaces, manage their risk, and prioritize events to focus on what matters most, there will be problems. The researchers at CardinalOPS stated that 12% of all SIEM rules would be broken due to data quality problems, heightening the risk of undetected attacks. The researchers noted that while enterprises are increasingly implementing "detection-in-depth" strategies by collecting data from various security layers, monitoring containers lag behind other layers, with only 32% of SIEMs tracking them.

    Infosecurity reports: "Study Reveals Alarming Gap in SIEM Detection of Adversary Techniques"

  • news

    Visible to the public "Chrome 114 Update Patches High-Severity Vulnerabilities"

    Google recently announced a new Chrome 114 update that patches a total of four vulnerabilities, including three high-severity bugs reported by external researchers. Google says it paid out a total of $35,000 in bug bounty rewards to the reporting researchers. The highest payout went to GitHub Security Lab researcher Man Yue Mo, who discovered a type confusion issue in Chrome's V8 JavaScript rendering engine. Tracked as CVE-2023-3420, the vulnerability was awarded a $20,000 bug bounty. Next in line is CVE-2023-3421, a use-after-free vulnerability in Media. Cisco Talos researcher Piotr Bania earned a $10,000 bug bounty for finding this security defect. Google noted that use-after-free vulnerabilities in Chrome could lead to a sandbox escape if the attacker targets a privileged browser process or a vulnerability in the underlying operating system. The third externally reported bug is CVE-2023-3422, a use-after-free flaw in Guest View for which Google paid a $5,000 reward to a security researcher known as "asnine." Google makes no mention of any of these vulnerabilities being exploited in attacks. The latest Chrome iteration is now rolling out as version 114.0.5735.198 for macOS and Linux and as versions 114.0.5735.198/199 for Windows.

    SecurityWeek reports: "Chrome 114 Update Patches High-Severity Vulnerabilities"

  • news

    Visible to the public "Gas Stations Impacted by Cyberattack on Canadian Energy Giant Suncor"

    Some services at Petro-Canada gas stations have been disrupted following a recent cyberattack on parent company Suncor, one of the largest energy companies in North America. Suncor is a Canada-based company that produces oil and runs several refineries in North America. The organization owns a network of more than 1,800 Petro-Canada retail and wholesale locations. Suncor stated that it had experienced a cybersecurity incident that may impact some transactions with suppliers and customers. The company said it brought in third-party experts to aid investigation and response efforts and noted that authorities had been notified. The company said it is unaware of any evidence that customer, supplier, or employee data has been compromised or misused due to this situation. The investigation is still ongoing.

    SecurityWeek reports: "Gas Stations Impacted by Cyberattack on Canadian Energy Giant Suncor"

  • news

    Visible to the public "Scamming the Scammers: New AI Fake Victims to Disrupt Criminal Business Mode"

    Cybersecurity experts at Macquarie University have created a multilingual chatbot designed to keep scammers on lengthy fake conversations and, ultimately, reduce the number of people who lose money to global criminals. The new Artificial Intelligence (AI)-driven system has created convincing fake victims in the form of multilingual chatbots that waste the time of scam callers in an effort to reduce the estimated $55 billion annual loss to thieves. The "Apate" system, named after the Greek goddess of deception, is a system that uses convincing voice clones to engage in conversations with actual scammers. This article continues to discuss the Apate system developed by Macquarie University cybersecurity experts that uses voice clones to keep scammers on the line in fake conversations with AI chatbots.

    Macquarie University reports "Scamming the Scammers: New AI Fake Victims to Disrupt Criminal Business Mode"

  • news

    Visible to the public "Cybercriminals Still Want to Cash In on Cryptojacking"

    Recent campaigns indicate that cryptojacking continues to be of interest to cybercriminals, despite its declining popularity due to law enforcement crackdowns, fluctuating cryptocurrency values, and the closure of Coinhive. Microsoft researchers recently reported that threat actors have been launching brute force credential attacks against misconfigured, Internet-facing Linux and Internet of Things (IoT) devices to take control of the devices and install cryptocurrency mining malware. In addition, Fortinet researchers recently discovered that threat actors were using a RapperBot variant with cryptominer capabilities to engage in cryptojacking. Researchers define cryptojacking as the illegal use of computing resources to mine cryptocurrency, which has become more prevalent in recent years. Attackers have been building a cybercriminal economy around attack tools, infrastructure, and services to generate revenue by targeting various vulnerable systems. Cryptojacking involves malware installed on devices or small snippets of code injected into browsers that stealthily steal computer processing resources for cryptocurrency mining. This article continues to discuss the concept of cryptojacking and recent campaigns involving this malicious activity.

    Decipher reports "Cybercriminals Still Want to Cash In on Cryptojacking"

  • news

    Visible to the public "High-Impact Attacks On Critical Infrastructure Climb 140%"

    According to a recent report, over 150 industrial operations were impacted by cyberattacks in 2022, with physical consequences in process manufacturing, discrete manufacturing, and critical industrial infrastructures. Additionally, the total number of attacks increased by 2.4 times compared to the previous year. In the next five years, cyberattacks could close down up to 15,000 industrial sites at this rate. The new report by Waterfall Security revealed a 140 percent increase in cyberattacks against industrial operations in 2022, most of which involved ransomware encrypting critical computer systems and invaluable data across Information Technology (IT) networks. The attacks also affected Operational Technology (OT), with consequences extending beyond system delays. The Waterfall Security report highlighted significant incidents, such as outages at well-known companies, including 14 plants of a leading automobile manufacturer, 23 tire plants of a popular brand, and more. This article continues to discuss the growth in high-impact cyberattacks on critical infrastructure.

    Security Intelligence reports "High-Impact Attacks On Critical Infrastructure Climb 140%"

  • news

    Visible to the public "The Next Wave of Cyber Threats: Defending Your Company Against Cybercriminals Empowered by Generative AI"

    Personal information is increasingly under attack in the digital realm due to deepfakes, human error, vulnerabilities, and more. Security experts are continuing to explore the current landscape and how to get ahead of cybercriminals. Generative Artificial Intelligence (AI) can now support cybercriminal tactics, with threat actors being able to use convincing ChatGPT scripts to create effective phishing emails. They can also trick generative AI into writing malicious code, which could expose active users' chat history and Personally Identifiable Information (PII). As AI improves at predicting human patterns and impersonating humans, it will be increasingly used to deceive both employees and customers. This article continues to discuss insights on the use of generative AI by cybercriminals and how companies can combat this.

    VB reports "The Next Wave of Cyber Threats: Defending Your Company Against Cybercriminals Empowered by Generative AI"

  • news

    Visible to the public "Fortinet Patches Critical RCE Vulnerability in FortiNAC"

    Fortinet has recently released patches to address a critical vulnerability in its FortiNAC network access control solution. The zero-trust access solution allows organizations to view devices and users on the network and provides granular control over network access policies. One of the vulnerabilities patched is tracked as CVE-2023-33299 (CVSS score of 9.6) and is described as an issue related to the deserialization of untrusted data that can lead to remote code execution (RCE). Fortinet noted that an unauthenticated attacker could exploit this vulnerability "to execute unauthorized code or commands via specifically crafted requests to the TCP/1050 service." The vulnerability impacts FortiNAC versions up to 7.2.1, up to 9.4.2, up to 9.2.7, and up to 9.1.9, as well as all 8.x iterations. Fortinet has addressed the security defect with the release of FortiNAC versions 9.4.3, 9.2.8, 9.1.10, and 7.2.2, but will not release patches for FortiNAC 8.x. Another vulnerability patched was CVE-2023-33300, a medium-severity command injection via FortiNAC's TCP/5555 service. This vulnerability is described as an improper neutralization of special elements that can be exploited by "an unauthenticated attacker to copy local files of the device to other local directories of the device via specially crafted input fields." According to Fortinet, access to the copied data is only possible if the attacker has an existing foothold and enough privileges on the device. The vulnerability was resolved with the release of FortiNAC versions 9.4.4 and 7.2.2. Fortinet makes no mention of any of these vulnerabilities being exploited in attacks.

    SecurityWeek reports: "Fortinet Patches Critical RCE Vulnerability in FortiNAC"

  • news

    Visible to the public "Southwest, American Airlines Pilot Data Exposed"

    A data breach faced by a third-party vendor resulted in the exposure of sensitive information on Southwest Airlines and American Airlines pilot applicants. After a third-party vendor was compromised, both US-based air carriers sent out breach notification letters to thousands of people. The vendor managed their pilot application and recruitment websites. According to the third-party vendor, on or around April 30, 2023, an unauthorized actor accessed the vendor's systems and obtained certain files provided by some pilot and cadet applicants. Both companies have expressed that the breach did not affect their internal systems. Based on information provided to the Maine Attorney General, the data breach affected slightly more than 3,000 people for Southwest and nearly 5,800 people for American Airlines. This article continues to discuss the exposure of Southwest Airlines and American Airlines pilot applicant data.

    Cybernews reports "Southwest, American Airlines Pilot Data Exposed"

  • news

    Visible to the public "Internet Systems Consortium (ISC) Fixed Three DoS Flaws in BIND"

    The Internet Systems Consortium (ISC) has issued security updates to address three Denial-of-Service (DoS) flaws in the Domain Name System (DNS) software suite BIND. The vulnerabilities, tracked as CVE-2023-2828, CVE-2023-2829, and CVE-2023-2911, are remotely exploitable. According to ISC, the three critical vulnerabilities could be exploited to saturate devices' memory or cause the BIND's daemon 'named' to crash. An adversary can exploit one of the vulnerabilities to cause a named resolver's memory usage to exceed the configured maximum cache size, resulting in a DoS. This article continues to discuss the DoS vulnerabilities in the DNS software suite BIND addressed by the ISC.

    Security Affairs reports "Internet Systems Consortium (ISC) Fixed Three DoS Flaws in BIND"