News Items

  • news

    Visible to the public "More UK Companies Sign Up to Test Groundbreaking Cybersecurity Technology"

    More UK companies have signed on to help test a new cybersecurity approach. Over the past year, 36 UK companies have joined the "Digital Security by Design" program, a UK government-backed initiative to create a more secure digital future. They are experimenting with the Arm Morello board, a prototype of Arm's cybersecurity technology based on the Capability Hardware Enhanced RISC Instructions (CHERI) protection model developed by researchers at the University of Cambridge and SRI International. CHERI enables hardware and software to work together to prevent attackers' exploitation of security vulnerabilities. The Arm Morello board is considered a groundbreaking cybersecurity technology prototype that is secure by design. It is built with security features that do not depend on software updates or patches to defend against malicious actors. The technology can prevent and mitigate memory-related cyberattacks, which account for two-thirds of cyberattacks worldwide. This article continues to discuss UK companies being given trial access to the prototype cybersecurity technology and why this prototype is considered cutting-edge technology.

    The University of Cambridge reports "More UK Companies Sign Up to Test Groundbreaking Cybersecurity Technology"

  • news

    Visible to the public "Center for Socially Responsible AI Awards Big Ideas Grants to Five Projects"

    As part of its Big Ideas Grant (BIG) program, the Penn State Center for Socially Responsible Artificial Intelligence (CSRAI) awarded over $212,000 to advance five interdisciplinary research projects. The high-risk, high-reward grant program helps Penn State faculty pilot cutting-edge research that advances the center's mission of promoting, studying, and practicing socially responsible methods of using, building, and deploying Artificial Intelligence (AI) technology. According to S. Shyam Sundar, director of the CSRAI, this year's funded projects cover a broad range of topics, such as mitigating the safety and security risks posed by adversarial attacks on autonomous vehicles. Among the funded projects is "Enhancing Situation Awareness of Adversary ML in Human-AI Collaboration for Safe Implementation of Automated Driving Systems." This article continues to discuss the Penn State CSRAI funding projects on AI that cover topics such as reducing security risks.

    The Pennsylvania State University reports "Center for Socially Responsible AI Awards Big Ideas Grants to Five Projects"

  • news

    Visible to the public "Cybersecurity Market Grew 12.5% In First Quarter, Outpacing Overall Tech Market"

    According to the technology market analyst Canalys, global spending on cybersecurity in the first quarter of 2023 increased by 12.5 percent to $18.6 billion, compared to the same period the previous year. The results released on Monday, June 19, were consistent with the company's best-case forecasts for the cybersecurity market and outpaced the rest of the technology industry. An April forecast by the management consulting company Gartner found that global Information Technology (IT) spending was projected to increase to $4.6 trillion in 2023, a 5.5 percent growth from 2022. Customers prioritized spending on the most critical projects and those with the highest return. Matthew Ball, a principal analyst at Canalys, noted that longer sales cycles, delays, and project downsizing have increased, while hardware refresh programs have been pushed to future quarters. Spending on identity security increased by 14.3 percent, while investments in Security Service Edge (SSE) within web and email security increased by 16 percent. This article continues to discuss new findings regarding cybersecurity spending.

    SC Media reports "Cybersecurity Market Grew 12.5% In First Quarter, Outpacing Overall Tech Market"

  • news

    Visible to the public "Asus Patches Highly Critical WiFi Router Flaws"

    Taiwanese computer hardware manufacturer Asus recently released urgent firmware updates to address vulnerabilities in its WiFi router product lines and warned users of the risk of remote code execution attacks. In a recent advisory, Asus documented at least nine security defects and multiple security weaknesses that allow code execution, denial-of-service, information disclosure, and authentication bypasses. The most serious of the nine vulnerabilities, a highly critical bug with a CVSS severity rating of 9.8/10, dates back to 2018 and exposes routers to code execution attacks. Asus stated that the vulnerability, tagged as CVE-2018-1160, is a memory corruption issue in Netatalk before 3.1.12. The Asus firmware update also patches CVE-2022-26376 (CVSS 9.8/10), a memory corruption vulnerability in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7. The company, which has struggled with security problems in the past, listed the affected WiFi routers as Asus GT6, GT-AXE16000, GT-AX11000 PRO, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000, and TUF-AX5400. Asus stated that if one chooses not to install this new firmware version, then they strongly recommend disabling services accessible from the WAN side to avoid potential unwanted intrusions. These services include remote access from WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger.

    SecurityWeek reports: "Asus Patches Highly Critical WiFi Router Flaws"

  • news

    Visible to the public "New DOJ Unit Will Focus On Prosecuting Nation-State Cybercrime"

    The US Department of Justice (DOJ) is adding a new section to its National Security Division that will prosecute malicious foreign cyber activity, a top department official recently announced. The department wants to be more active in combating digital threats from outside the US. Assistant Attorney General Matthew Olsen, the division's chief, revealed that the entity will enable the division to expand the scope and speed of disruption campaigns and prosecutions of nation-state cyber threats and state-sponsored cybercriminals. The department's Criminal Division will maintain its computer crimes section. The decision to place cyber on an equal footing with the division's three existing sections comes as the DOJ has increased its own efforts to combat botnets, contain or eliminate malware outbreaks, and pursue digital criminals worldwide. This article continues to discuss the new DOJ unit aimed at prosecuting malicious foreign cyber activity.

    The Record reports "New DOJ Unit Will Focus On Prosecuting Nation-State Cybercrime"

  • news

    Visible to the public "New Condi Malware Builds DDoS Botnet Out of TP-Link AX21 Routers"

    In May 2023, a new Distributed Denial-of-Service (DDoS)-as-a-Service botnet called "Condi" emerged, exploiting a vulnerability contained by TP-Link Archer AX21 (AX1800) Wi-Fi routers to form an army of bots for conducting attacks. AX1800 is a widely used Linux-based dual-band Wi-Fi 6 router with a bandwidth of 1.8 Gbps, mostly used by home users, small offices, shops, cafes, and more. Condi recruits new devices to create a powerful DDoS botnet that can be rented to initiate attacks against websites and services. In addition, the threat actors behind Condi sell the malware's source code, which is an aggressive method of monetization likely to result in numerous project variants with different features. According to a report published by Fortinet, Condi targets a high-severity unauthenticated command injection and Remote Code Execution (RCE) vulnerability, tracked as CVE-2023-1389, in the Application Programming Interface (API) of the router's web management interface. After Mirai exploited it at the end of April, Condi is the second DDoS botnet to target this vulnerability. This article continues to discuss the new DDoS-as-a-Service botnet Condi.

    Bleeping Computer reports "New Condi Malware Builds DDoS Botnet Out of TP-Link AX21 Routers"

  • news

    Visible to the public "VMware Aria Operations for Networks Vulnerability Exploited in the Wild (CVE-2023-20887)"

    The exploitation of a pre-authentication command injection flaw, tracked as CVE-2023-20887, in VMware Aria Operations for Networks (previously vRealize Network Insight), has been observed in the wild. There are no workarounds available to mitigate the risk of exploitation, so enterprise administrators are advised to patch their deployments. The vulnerability is one of three recently discovered and privately communicated to VMware by Sina Kheirkhah of Summoning Team and an anonymous researcher. The company confirmed that a malicious actor with network access to VMware Aria Operations for Networks could perform a command injection attack resulting in Remote Code Execution (RCE). Kheirkhah published a proof-of-concept (PoC) exploit for the vulnerability on June 13, and according to GreyNoise, attempts to exploit the vulnerability began two days after. This article continues to discuss the VMware Aria Operations for Networks vulnerability.

    Help Net Security reports "VMware Aria Operations for Networks Vulnerability Exploited in the Wild (CVE-2023-20887)"

  • news

    Visible to the public "Mysterious Mystic Stealer Spreads Like Wildfire in Mere Months"

    Since its debut on underground marketplaces in April, a stealer that can grab credentials from web browsers and extensions, as well as cryptocurrency, has rapidly become a favorite among cybercriminals. The "Mystic Stealer" has established a strong foothold in the threat landscape in its first few months due to its advanced capabilities, pricing, and the crowdsourcing of suggestions that have led to ongoing updates and improvements, according to two reports released simultaneously, one by Cyfirma and the other by Inquest and Zscaler. The stealer, which typically costs $150 per month or $390 for a three-month subscription, has the same capability to steal data from a victim's computer as other forms of this type of malware, along with obfuscation techniques that make it capable of advanced evasion. According to Zscaler researchers, it is evident that the developer of Mystic Stealer is attempting to produce a stealer that is on par with current trends in the malware space while focusing on anti-analysis and defense evasion. This article continues to discuss findings and observations surrounding the Mystic Stealer.

    Dark Reading reports "Mysterious Mystic Stealer Spreads Like Wildfire in Mere Months"

  • news

    Visible to the public "Chinese Hacker Group 'Flea' Targets American Ministries with Graphican Backdoor"

    In a recent campaign spanning from late 2022 to early 2023, a Chinese state-sponsored actor named "Flea" targeted foreign affairs ministries in the Americas. According to Broadcom's Symantec, the cyberattacks involved a new backdoor called "Graphican." Other targets included a government finance department, a company that markets products in the Americas, and an unidentified victim in a European country. In this campaign, Flea used many tools, the company said, describing the threat actor as "large and well-resourced." In addition to the new Graphican backdoor, the attackers used various living-off-the-land (LOTL) methods and tools previously associated with Flea. Since 2004, Flea, also known as APT15, BackdoorDiplomacy, ke3chang, Nylon Typhoon (formerly Nickel), Playful Taurus, Royal APT, and Vixen Panda, has been known to target governments, diplomatic missions, and embassies. This article continues to discuss the Chinese state-sponsored actor Flea targeting foreign affairs ministries in the Americas with the Graphican backdoor.

    THN reports "Chinese Hacker Group 'Flea' Targets American Ministries with Graphican Backdoor"

  • news

    Visible to the public "DARPA Taps LSU to Solve Cybersecurity Challenges in Virtual and Augmented Reality"

    Louisiana State University (LSU) researchers Ibrahim "Abe" Baggili and Andrew Webb have received $600K from the Defense Advanced Research Projects Agency (DARPA) in support of their project, "Mixed Reality Visual Deception for Mission Deviation & Distraction." The project integrates cybersecurity with psychology and human behavior to gain insight into the possible impacts of compromised software and hardware on people. Baggili noted that the military is interested in the concept of an augmented warfighter. The idea is to have more information in front of soldiers without requiring them to look at 10 different things at once. However, with new technology comes new threats. In addition to the technical exploit to hack the system, an adversary could control or influence the user, which is what the researchers are exploring. The project funded by DARPA will explore the physical safety and security of the individual who is using devices or applications in virtual or augmented reality (VR or AR), also collectively known as extended reality (XR). This article continues to discuss LSU's DARPA-funded project aimed at solving cybersecurity challenges in VR and AR.

    Louisiana State University reports "DARPA Taps LSU to Solve Cybersecurity Challenges in Virtual and Augmented Reality"

  • news

    Visible to the public "Microsoft Issues Detailed Response to Layer 7 DDoS Attacks"

    Microsoft is responding to Distributed Denial-of-Service (DDoS) attacks that recently interrupted the company's popular services, including Azure, Outlook, and OneDrive. Microsoft's Security Response Center (MSRC) released a comprehensive analysis of the crippling cyberattacks. The response outlines a series of Layer 7 DDoS attacks launched by a threat actor Microsoft tracks as "Storm-1359." A "Layer 7" attack is a DDoS attack that targets the application layer of the Internet protocol suite. The attack vector involves many requests to overwhelm the application layer and cause service interruptions or outages. Microsoft has determined that Storm-1359 has access to a large collection of botnets and tools, which could allow the threat actor to launch DDoS attacks from multiple cloud services and open proxy infrastructures. MSRC reported that Storm-1359 appears to be focused on causing disruption and gaining publicity. This article continues to discuss Microsoft's response to recent DDoS attacks.

    Techzine reports "Microsoft Issues Detailed Response to Layer 7 DDoS Attacks"

  • news

    Visible to the public "Expensive Proxies Underpin Anonymous Sudan DDoS Attack"

    The pro-Russian hacktivist group "Anonymous Sudan" appears to use expensive online infrastructure for Distributed Denial-of-Service (DDoS) attacks, thus undermining its claim to be a volunteer group working from an impoverished East African nation. Researchers at the Australian cybersecurity company CyberCX examined the traffic sources of Anonymous Sudan's March attacks against Australian targets. At least one-third of the attack traffic volume was concealed by a high rate of paid proxies. Since proxies are designed to be difficult to identify and track, the actual percentage of traffic originating from proxies is likely higher. Due to the consistent and high capitalization of the same paid proxies in attacks separated by six days, it is unlikely that the group abused proxy providers' free trial offers. CyberCX also noted that the source of the proxied traffic is likely paid cloud infrastructure. The group's Information Technology (IT) infrastructure probably costs tens of thousands of dollars, and CyberCX estimates that the proxy infrastructure alone costs a minimum of AU$4,000 per month. This article continues to discuss Anonymous Sudan's use of expensive online infrastructure.

    InfoRiskToday reports "Expensive Proxies Underpin Anonymous Sudan DDoS Attack"

  • news

    Visible to the public "75 Percent of People Risk Being Hacked Through Poor Password Practice"

    New research on the password behaviors of over 8,000 people in the UK, France, and Germany reveals that 75 percent of individuals put themselves at risk by not following widely accepted password best practices. Sixty-four percent of those surveyed by Keeper Security use either weak or repeated passwords for their online accounts. Additionally, more than a third of people report feeling overwhelmed in regard to improving their cybersecurity. Thirty-nine percent of respondents do not know if they have been breached, and 32 percent are unaware of whether their passwords are available on the dark web. Although 41 percent of respondents believe cybersecurity is too difficult to understand, older generations appear to be performing better. Only 20 percent of respondents of Generation Z use strong and unique passwords for every account, compared to 29 percent of baby boomers. Generation Z has the highest percentage of respondents who find cybersecurity overwhelming. This article continues to discuss key findings from Keeper Security's report on password management.

    BetaNews reports "75 Percent of People Risk Being Hacked Through Poor Password Practice"

  • news

    Visible to the public "Schneider Power Meter Vulnerability Opens Door to Power Outages"

    A security vulnerability was recently discovered in the Schneider Electric ION and PowerLogic power meters. The vulnerability makes it so they transmit a user ID and password in plaintext with every message. The vulnerability was given a CVSS vulnerability severity rating of 8.8 out of 10. The bug would allow an attacker with passive interception capabilities to obtain these credentials, authenticate to the ION/TCP engineering interface (as well as SSH and HTTP interfaces), and change configuration settings or potentially modify the firmware. A security researcher at Forescout stated that it is obviously not acceptable anymore for an operational technology (OT) product to transmit credentials in cleartext because anybody that has access to the network and can sniff the traffic will be able to get them and then do almost whatever they want with the device. The researcher noted that this could include controlling smart meter switches to cause load oscillations that could trigger shutdowns, with the demand (or load) then being passed on to other parts of the grid network. In a worst-case scenario, a domino effect could theoretically lead to a blackout.

    Dark Reading reports: "Schneider Power Meter Vulnerability Opens Door to Power Outages"

  • news

    Visible to the public "Norton Parent Says Employee Data Stolen in MOVEit Ransomware Attack"

    Gen Digital, the company behind known cybersecurity brands such as Avast, Avira, AVG, Norton, and LifeLock, has recently announced that employees' personal information was compromised in the recent MOVEit ransomware attack. The attack exploited a zero-day vulnerability in the MOVEit Transfer managed file transfer (MFT) software that Progress Software disclosed on May 31. Gen Digital revealed that employees' compromised personal information includes names, addresses, birth dates, and business email addresses. The company noted that they use MOVEit for file transfers and have remediated all of the known vulnerabilities in the system. The company said there was no impact to their core IT systems or services and that no customer or partner data has been exposed.

    SecurityWeek reports: "Norton Parent Says Employee Data Stolen in MOVEit Ransomware Attack"

  • news

    Visible to the public "Study Finds Bot Detection Software Isn't as Accurate as It Seems"

    The challenges posed by bots on social media continue to be diverse, ranging from the minor annoyance of spamming to the potentially grave issues of spreading misinformation, influencing elections, and inflaming polarization. Recent research suggests that existing third-party bot detection tools may not be as accurate as they appear. MIT researchers Chris Hays, Zachary Schutzman, Manish Raghavan, Erin Walk, and Philipp Zimmer report in a recently published paper that bot detection models' supposedly high accuracy rates result from a critical limitation in the data used to train them. Much research is dedicated to developing tools that distinguish between humans and bots. Social media platforms have their systems for identifying and removing bot accounts, but these systems are often kept secret. Third-party bot-detection tools use curated data sets and sophisticated Machine Learning (ML) models trained on those data sets to identify patterns believed to be human or not human. These models are then deployed on social media to analyze the operation of bots. This article continues to discuss the study on the accuracy of bot detection software.

    MIT Sloan School of Management reports "Study Finds Bot Detection Software Isn't as Accurate as It Seems"

  • news

    Visible to the public "Australian Government Says Its Data Was Stolen in Law Firm Ransomware Attack"

    The Office of the Australian Information Commissioner (OAIC) recently announced that some of its files were stolen in a ransomware attack on law firm HWL Ebsworth. One of the largest law firms in Australia, HWL Ebsworth, stated that it became aware of the incident on April 28, after the Alphv/BlackCat ransomware gang boasted about the hack, and that it immediately informed the Australian authorities and started investigating the incident. The investigation indicates the threat actor had accessed and exfiltrated certain information on a confined part of the firm's system but not on their core document management system. On June 9, HWL Ebsworth noted that the ransomware group published on their leak site some of the data allegedly stolen from its systems. The law firm says it has yet to determine the full impact of the data breach and that it will notify all individuals whose personal information might have been compromised. On Saturday, June 10, HWL Ebsworth advised the OAIC that a document or documents relating to a limited number of OAIC files were included in the breach experienced by HWL Ebsworth. The incident reportedly impacted the NDIS Quality and Safeguards Commission, the Australian Federal Police, the Commonwealth Director of Public Prosecutions, the Department of Defence, the Department of Home Affairs, the Department of Foreign Affairs, and the Taxation Office as well. The National Australian Bank (NAB), one of the four largest banks in the country, also disclosed some impact from the incident, stating that a small percentage of its customers might have been affected. The Alphv/BlackCat ransomware gang has leaked roughly 1.5 terabytes of data from the roughly 3.6 terabytes it allegedly stole from HWL Ebsworth.

    SecurityWeek reports: "Australian Government Says Its Data Was Stolen in Law Firm Ransomware Attack"

  • news

    Visible to the public "Romanian Cybercrime Gang Diicot Builds DDoS Botnet With Mirai Variant"

    According to researchers, a cybercriminal group called "Diicot" is conducting mass SSH brute-force scanning and launching a variant of the Mirai Internet of Things (IoT) botnet on compromised devices. Additionally, the group deploys a cryptocurrency mining payload on servers with CPUs containing more than four cores. Cayosin, an off-the-shelf Mirai-based botnet agent, was discovered by Cado Labs to be deployed by Diicot, despite the group's traditional association with cryptojacking campaigns. This agent was intended for routers running OpenWrt, the Linux-based embedded devices operating system. The Diicot group has been in operation since at least 2021 and was previously known as "Mexals." After examining strings found in malware payloads, scripts, and messages against those of rival hacker groups, researchers strongly believe that the group is based in Romania. Even its new name resembles the acronym for the Directorate for Investigating Organized Crime and Terrorism (DIICOT), a Romanian law enforcement agency. This article continues to discuss findings surrounding the Diicot cybercrime gang.

    CSO Online reports "Romanian Cybercrime Gang Diicot Builds DDoS Botnet With Mirai Variant"

  • news

    Visible to the public "Hackers Can Weaponize Exposed Cloud Secrets in Just 2 Minutes"

    "Secrets" are considered sensitive pieces of information that grant access to a cloud environment. Orca Security's research reveals that attackers typically identify misconfigured and vulnerable assets within two minutes and immediately begin exploiting them. Orca Security conducted six months of research by setting up honeypots in nine different cloud environments. The purpose of these honeypots is to attract attackers by simulating misconfigured resources. Every honeypot contained a secret AWS key. Researchers monitored the honeypots to determine if and when an attacker would bite. The goal was to gain insight into the most frequently targeted cloud services, the time it takes for attackers to access public or readily accessible resources, and the time it takes for them to discover and use leaked secrets. Orca's report indicates that exposed secrets on GitHub, HTTP, and SSH were all detected in less than five minutes. AWS S3 Buckets were discovered in under an hour. This article continues to discuss findings from the analysis of cloud-focused cybercrime tactics.

    Cybernews reports "Hackers Can Weaponize Exposed Cloud Secrets in Just 2 Minutes"

  • news

    Visible to the public "Ransomware Gang Preys on Cancer Centers, Triggers Alert"

    This month's attack on a cancer center in the US by an obscure ransomware group prompted a warning to the healthcare sector regarding the threat actor's rarely used but highly effective techniques. Although the group called "TimisoaraHackerTeam" (THT) is not widely known, it has a history of targeting medical facilities through the exploitation of known vulnerabilities. The group is also known to use a living-off-the-land (LOTL) approach to avoid detection. The Department of Health and Human Services' Healthcare Sector Cybersecurity Coordination Center (HC3) noted in a notification about this month's attack on the cancer center that THT was first discovered by researchers in July 2018 and had targeted healthcare organizations worldwide. According to the notification, little is known about the group, but their ransomware has paralyzed the health and public health (HPH) sector. HC3 did not specify the latest target of the THT, but stated that the attack on the cancer center rendered its digital services inaccessible, placed patients' protected health information at risk, and significantly hindered the medical center's ability to treat patients. This article continues to discuss the THT ransomware attack against a US cancer center.

    SC Media reports "Ransomware Gang Preys on Cancer Centers, Triggers Alert"

  • news

    Visible to the public "Experts Found Components of a Complex Toolkit Employed in macOS Attacks"

    Researchers have discovered malicious files with backdoor capabilities, which they believe to be a component of a toolkit targeting Apple macOS systems. Researchers at Bitdefender found the set of malicious files with backdoor capabilities believed to be part of an advanced toolkit. According to the researchers, the investigation is ongoing, and the samples remain largely undetected. The researchers analyzed four samples submitted to VirusTotal, with the earliest sample uploaded on April 18, 2023, by an anonymous actor. Two of the three samples uploaded by a victim are backdoors written in Python that target Windows, Linux, and macOS. The first file identified by the researchers is "shared.dat," which, when executed, generates a unique device identifier UID and uses a routine to determine the operating system running on the target machine. The malware can be instructed to extract system information and run specific commands. This article continues to discuss researchers' discovery of malicious files with backdoor capabilities believed to be part of a toolkit targeting Apple macOS systems.

    Security Affairs reports "Experts Found Components of a Complex Toolkit Employed in macOS Attacks"

  • news

    Visible to the public "KillNet Threatens Imminent SWIFT, World Banking Attacks"

    KillNet, the pro-Russian hacktivist group, claims to be working with a resurgent version of the infamous ReVIL ransomware gang. The objective appears to be to attack the Western financial system. KillNet has a history of launching mildly disruptive Distributed Denial-of-Service (DDoS) attacks. The group made ominous threats against the SWIFT banking system, the Wise international wire transfer system, the SEPA intra-Europe payments service, European and American central banks, and other institutions in a June 16 video posted on a Russian Telegram channel. This article continues to discuss the KillnNet group claiming to be teaming up with ReVIL and Anonymous Sudan for destructive financial attacks in retaliation for US aid in Ukraine.

    Dark Reading reports "KillNet Threatens Imminent SWIFT, World Banking Attacks"

  • news

    Visible to the public "Compromised Linux SSH Servers Engage in DDoS Attacks, Cryptomining"

    Unidentified attackers are compromising poorly managed Linux SSH servers and instructing them to launch Distributed Denial-of-Service (DDoS) attacks while simultaneously mining cryptocurrency in the background. Tsunami, also known as Kaiten, is a DDoS bot often distributed in conjunction with Mirai and Gafgyt malware strains. The fact that Tsunami functions as an Internet Relay Chat (IRC) bot distinguishes it from other DDoS bots. It uses IRC to communicate with the threat actor. Since Tsunami's source code is publicly available, it is used by various threat actors. It is primarily used in attacks targeting Internet of Things (IoT) devices. Researchers from AhnLab's Security Emergency Response Center (ASEC) explained that it is also frequently used to target Linux servers. This article continues to discuss the targeting of poorly managed Linux SSH servers in DDoS and cryptomining attacks.

    Help Net Security reports "Compromised Linux SSH Servers Engage in DDoS Attacks, Cryptomining"

  • news

    Visible to the public "New RDStealer Malware Steals From Drives Shared Over Remote Desktop"

    The "RedClouds" cyber espionage and hacking campaign involves the use of custom RDStealer malware to automatically steal data from drives shared via Remote Desktop connections. The malicious campaign was identified by Bitdefender Labs, whose researchers have observed hackers targeting systems in East Asia since 2022. Although they have been unable to attribute the campaign to specific threat actors, they note that their interests align with those of China and that their level of sophistication corresponds to that of a state-sponsored Advanced Persistent Threat (APT) group. Furthermore, according to Bitdefender, the hackers have left traces of their activity dating back to at least 2020, initially using off-the-shelf tools before applying custom malware in late 2021. This article continues to discuss the use of the RDStealer malware by the RedClouds campaign.

    Bleeping Computer reports "New RDStealer Malware Steals From Drives Shared Over Remote Desktop"

  • news

    Visible to the public "Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces"

    Between June 2022 and May 2023, over 101,100 compromised OpenAI ChatGPT account credentials appeared on illicit dark web marketplaces, with India alone making up 12,632 stolen credentials. Group-IB noted that the credentials were discovered in information stealer logs for sale on the cybercrime underground. In May 2023, the number of available logs containing compromised ChatGPT accounts peaked at 26,802 records. The Asia-Pacific region has seen the greatest number of ChatGPT credentials for sale over the past year. Pakistan, Brazil, Vietnam, Egypt, the US, France, Morocco, Indonesia, and Bangladesh are other countries with the most compromised ChatGPT credentials. Most logs containing ChatGPT accounts have been breached by the Raccoon information stealer (78,348), followed by Vidar (12,987) and RedLine (6,646). This article continues to discuss the discovery of compromised OpenAI ChatGPT account credentials on illicit dark web marketplaces.

    THN reports "Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces"

  • news

    Visible to the public "Survey Reveals AI’s Impact on The Developer Experience"

    GitHub recently surveyed 500 U.S.-based developers at companies with 1,000-plus employees about how managers should consider developer productivity, collaboration, and AI coding tools. GitHub found that AI is being used at scale, with 92% of the survey participants saying they already use AI coding tools both in and outside of work. GitHub also discovered that despite industry-wide investments in DevOps, developers still say the most time-consuming thing they're doing at work besides writing code is waiting on builds and tests. GitHub noted that developers want more collaboration, with more than 4 out of 5 developers expecting AI coding tools to make their team more collaborative. The participants also see big benefits to AI. Many participants (70%) believe that AI coding tools will offer them an advantage at work and cite better code quality, completion time, and resolving incidents as some of the top anticipated benefits.

    GitHub reports: "Survey Reveals AI's Impact on The Developer Experience"

  • news

    Visible to the public "Ransomware Gang Takes Credit for February Reddit Hack"

    The Alphv/BlackCat ransomware gang recently took credit for the February 2023 cyberattack against the social media site Reddit. Reddit disclosed the breach shortly after being hacked earlier this year and described the incident as the result of a sophisticated and highly targeted phishing attack in which an employee's credentials and second-factor authentication tokens were stolen. Reddit noted that the attackers accessed internal documents, internal dashboards, business systems, source code, the information of hundreds of contacts and current and former employees, and advertiser data. Alphv/BlackCat ransomware gang over the weekend listed Reddit on its leak site and claimed to have stolen 80GB of data. No file-encrypting ransomware appears to have been deployed on Reddit's systems. The attackers are demanding a $4.5 million ransom to be paid in exchange for deleting the stolen data and that Reddit drops the API pricing changes set to go into effect this week.

    SecurityWeek reports: "Ransomware Gang Takes Credit for February Reddit Hack"

  • news

    Visible to the public "US Offers $10m Reward For MOVEit Attackers"

    The US Department of State has recently announced that it is offering a $10m reward for information linking members of a Clop affiliate responsible for a recent data extortion campaign. The reward was announced after a successful Clop campaign targeting users of the popular MOVEit managed file transfer service. After exploiting a zero-day vulnerability in the software, the group claimed to have compromised data belonging to hundreds of organizations. Alongside big brand names like British Airways, Boots, and the BBC, several US government agencies are thought to have been caught in the campaign. According to the Federal News Network, tens of thousands of US government workers may have had their personal information compromised as a result. However, the identity of most of the impacted agencies is yet to be made public.

    Infosecurity reports: "US Offers $10m Reward For MOVEit Attackers"

  • news

    Visible to the public "Millions of UK University Credentials Found on Dark Web"

    Security researchers at Crossword Cybersecurity have recently discovered 2.2 million breached credentials linked to the UK's 100 top universities available on the dark web, putting staff, students, and their data at risk. The researchers who found the credentials claimed that over half (54%) belong to elite Russel Group institutions. The researchers stated that there is a potential risk to sensitive research if threat actors are able to access user accounts with compromised credentials. The researchers noted that over half (54%) of breached credentials came from UK universities with research facilities with government-funded programs in areas like nuclear energy and defense. The researchers found that the top 30 universities in the country are up to 50% more likely to have breached credentials than other institutions in the top 100 and that London's universities have more breached logins (506,330) than those in Scotland, Wales, and Northern Ireland combined (465,767).

    Infosecurity reports: "Millions of UK University Credentials Found on Dark Web"

  • news

    Visible to the public "5 Challenges to Implementing DevSecOps and How to Overcome Them"

    Software security has historically been addressed at the project level, focusing on code scanning, penetration testing, and reactive incident response strategies. However, recent discussions have shifted focus to the program level to align security with business objectives. The shift's ideal outcome would be software development teams who act in accordance with business objectives, organizational risk, and solution architectures, and who recognize the importance of security practices to the success of the business. DevSecOps builds on DevOps principles and emphasizes security activities throughout all phases of the Software Development Lifecycle (SDLC). It can help organizations achieve this ideal state, but transitioning from project-level to program-level thinking presents several challenges. This article continues to discuss the benefits and challenges of implementing DevSecOps.

    Carnegie Mellon University - Software Engineering Institute reports "5 Challenges to Implementing DevSecOps and How to Overcome Them"

  • news

    Visible to the public "Symposium Charts Progress to Zero-Trust Cybersecurity"

    In April 2023, over 1,300 cybersecurity professionals and experts convened virtually for the first Zero Trust Symposium. The event was sponsored and co-hosted by the MIT Lincoln Laboratory, the Defense Acquisition University (DAU), and the Zero Trust Portfolio Management Office of the Department of Defense (DoD). In cybersecurity, the concept of a zero trust framework has gained significant attention in recent years. Zero trust is the practice of never implicitly trusting a device or user, even if they are already within a network. In this framework, a user and their device are continuously monitored and are only permitted access to job-critical applications and data. Zero trust concepts represent a departure from traditional network security, which for years has regarded a network as a "castle and moat" where, once inside the moat, users are often granted wide-reaching access. The strategy puts organizations at risk from malicious insiders or accounts with compromised credentials. This type of vulnerability has enabled numerous high-profile data breaches, including the 2015 Office of Personnel Management breach in which 22.1 million government personnel records were stolen. This article continues to discuss the event on zero trust that emphasized cultural shifts needed to reach a new cybersecurity norm.

    MIT Lincoln Laboratory reports "Symposium Charts Progress to Zero-Trust Cybersecurity"

  • news

    Visible to the public "JPL Creates World's Largest PDF Archive to Aid Malware Research"

    NASA's Jet Propulsion Laboratory (JPL) is known for landing rovers on Mars, investigating the solar system with robotic probes, and developing sensitive scientific tools that observe Earth and other planets. However, the lab's innovative work in the digital realm is less well-known. As part of a larger effort to make the Internet more secure, JPL data scientists have developed the largest publicly available open-source archive of PDFs. The new PDF corpus is part of the Defense Advanced Research Projects Agency's (DARPA) Safe Documents (SafeDocs) program, which aims to combat online threats while anticipating PDF users' security needs. By collaborating with the non-profit PDF Association, which aims to establish open specifications and standards for the technology, JPL is helping in the development of multiple tools to address these issues. This article continues to discuss JPL data scientists amassing 8 million PDFs that can now be used for further study in order to make the Internet more secure.

    NASA's Jet Propulsion Laboratory reports "JPL Creates World's Largest PDF Archive to Aid Malware Research"

  • news

    Visible to the public "New Website Highlights Thousands of Android Apps' Data Collection Practices"

    Researchers at Carnegie Mellon University (CMU) have launched a new website that provides a convenient and easy way for Android users to see how their data is collected and shared. The Android Network Traces (ANT) project maintains a database of more than 14,000 apps, providing comprehensive insight into the apps' data collection and sharing practices. Previously, the research team had created a website that graded the privacy of smartphone apps. However, they continued to receive the same questions regarding the types of data the apps collect, who receives it, and what it is used for. Therefore, Jason Hong, a professor at CMU's Human-Computer Interaction Institute, and members of the Human-Computer Interaction: Mobility Privacy Security Lab (CHIMPS), developed MobiPurpose to track network requests made by Android apps and classify data collection purposes. In their paper titled "Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps," the authors describe how MobiPurpose parses each traffic request body into key-value pairs and uses supervised learning and text pattern bootstrapping to infer the data type and data collection purpose of each pair. MobiPurpose can predict the data collection purpose with an average accuracy of 84 percent. Using their method, the researchers collected network traces from thousands of apps and grouped them into five data type categories: network, device, general, location, and account. Then they transformed the information into easily readable charts on the ANT website. This article continues to discuss the research and development behind the new website highlighting Android apps' data collection and sharing practices.

    CyLab reports "New Website Highlights Thousands of Android Apps' Data Collection Practices"

  • news

    Visible to the public "Breaches Decline as Security Culture Improves"

    The most recent Security Maturity Report, published by ClubCISO, reveals that 76 percent of CISOs reported no material breaches over the past year, an increase from 68 percent in 2022. Despite the challenging economic climate, heightened global tensions, and the introduction of new technology that simplifies cybercrime, 60 percent of those surveyed report that their organization has not experienced any significant cybersecurity incidents in the past year. Eighty percent of respondents believe their organization's security culture has improved over the past year. The primary drivers of security culture continue to be proactive 'report it' no-blame policies (41 percent), simulated phishing (38 percent), and customized training (37 percent). This article continues to discuss key findings from ClubCISO's latest Security Maturity Report.

    BetaNews reports "Breaches Decline as Security Culture Improves"

  • news

    Visible to the public "Millions of Americans’ Personal Data Exposed in Global Hack"

    Millions of people in Louisiana and Oregon have recently had their data compromised in the sprawling cyberattack that has also hit the US federal government. Authorities stated that the breach had affected 3.5 million Oregonians with driver's licenses or state ID cards and anyone with that documentation in Louisiana. The Louisiana governor's office did not put a number on the number of victims, but over 3 million Louisianians hold driver's licenses. The states did not blame anyone in particular for the hack, but federal officials have attributed a broader hacking campaign using the same software vulnerability to a Russian ransomware gang. Authorities noted that the sweeping hack has likely exposed data at hundreds of organizations across the globe and also compromised multiple US federal agencies, including the Department of Energy, as well as data from major corporations in Britain like the BBC and British Airways. The Russian-speaking hackers that claimed credit are known to demand multimillion-dollar ransoms, though US and state governments say they have not received any demands. The data exposed in the breach of the Oregon and Louisiana motor vehicle departments may include Social Security numbers and driver's license numbers, prompting state authorities to advise their residents on how to protect themselves from identity fraud.

    CNN reports: "Millions of Americans' Personal Data Exposed in Global Hack"

  • news

    Visible to the public "Russian National Arrested, Charged in US Over Role in LockBit Ransomware Attacks"

    The US Justice Department (DoJ) recently announced charges against a third Russian national allegedly involved in deploying the LockBit ransomware. The man, Ruslan Magomedovich Astamirov, 20, was arrested in Arizona and allegedly owned, controlled, and used multiple IP addresses, email addresses, and other online accounts to deploy the LockBit ransomware and communicate with victims. According to court documents, in at least one instance, authorities were able to trace a victim's payment to a cryptocurrency address that Astamirov controlled. According to an FBI complaint, Astamirov has been a member of the LockBit ransomware gang since at least August 2020 and directly executed at least five cyberattacks against victim systems in the US. In May 2023, during a voluntary interview with the FBI, Astamirov lied about his connection with one of the email addresses used in LockBit ransomware attacks but later admitted that he used the email account on at least three different devices. At the time, authorities seized several devices Astamirov owned, including an iPhone, an iPad, a MacBook Pro, and a USB drive. According to the FBI complaint, law enforcement obtained evidence that Astamirov used the email address to set up online accounts used in LockBit attacks and that he also controlled an IP address used in attacks against at least four victims. The authorities also linked the IP address to a second email address that Astamirov used and discovered that Astamirov received 80% of a ransom payment in roughly $700,000 worth of cryptocurrency from a fifth victim of the LockBit ransomware, with which he and likely other co-conspirators negotiated. Astamirov is charged with conspiracy to commit wire fraud, punishable by a maximum of 20 years in prison, and conspiracy to damage computers and transmit ransom demands, which is punishable by a maximum of five years in prison. The LockBit ransomware has been active since at least January 2020, operating under the Ransomware-as-a-Service (RaaS) model and targeting organizations in the US, Asia, Europe, and Africa. The FBI estimates that it has been used in roughly 1,700 attacks in the US, with victims paying approximately $91 million in ransoms.

    SecurityWeek reports: "Russian National Arrested, Charged in US Over Role in LockBit Ransomware Attacks"

  • news

    Visible to the public "Quantum Hacking Alert: USTC Uncovers Critical Vulnerabilities in Quantum Key Distribution"

    A team led by Guo Guangcan from the University of Science and Technology of China (USTC) of the Chinese Academy of Sciences made an advancement in the practical security of Quantum Key Distribution (QKD). They identified a potential security flaw in the modulator device of the QKD transmitter and exploited this vulnerability to conduct quantum hacking attacks. Theoretically, QKD enables the generation of secure keys between users. However, the non-ideal characteristics of practical devices may deviate from the theoretical assumptions, making them vulnerable to eavesdropping attacks. In order to advance the practical application of QKD, it is essential to perform a comprehensive and in-depth analysis of the security of QKD systems and then design more robust and secure practical systems. This article continues to discuss the team's progress in analyzing the practical security of QKD systems and developing attack-defense techniques.

    SCIENMAG reports "Quantum Hacking Alert: USTC Uncovers Critical Vulnerabilities in Quantum Key Distribution"

  • news

    Visible to the public "Microsoft Names Russian Threat Actor Cadet Blizzard"

    Microsoft Threat Intelligence has recently shed light on a previously tracked threat actor (DEV-0586), now known as "Cadet Blizzard." Microsoft believes Cadet Blizzard to be associated with the Russian General Staff Main Intelligence Directorate (GRU) and operates separately from other known GRU-affiliated groups. Microsoft noted that while the group's activities may be less prolific than other threat actors, their destructive campaigns have targeted government organizations and IT providers primarily in Ukraine, with occasional operations in Europe and Latin America. From a technical standpoint, Cadet Blizzard predominantly achieved initial access by exploiting web servers and vulnerabilities in Confluence servers, Exchange servers, and open-source platforms. Microsoft noted that they then achieved persistence on networks using web shells like P0wnyshell and reGeorg, escalated privileges through living-off-the-land techniques, and harvested credentials. To maintain operational security, Cadet Blizzard used anonymization services like IVPN, SurfShark, and Tor. They employed anti-forensics techniques and carried out destructive actions, including data exfiltration, deploying malware, hack-and-leak operations, and information operations through Tor sites and Telegram channels.

    Infosecurity reports: "Microsoft Names Russian Threat Actor Cadet Blizzard"

  • news

    Visible to the public "NSA and CISA Release Guide To Protect Baseboard Management Controllers"

    Baseboard Management Controllers (BMCs) are common server-class computer components. Cybercriminals could exploit the capabilities of these controllers to compromise industry and government systems. Neal Ziring, the Technical Director of the National Security Agency's (NSA) Cybersecurity Directorate, commented that implementing effective security defenses for these embedded controllers is often neglected. The firmware in these controllers is highly privileged, so malicious actors can use the firmware's capabilities to remotely control a critical server while evading traditional security tools. Therefore, organizations must take measures to protect servers with BMCs. NSA and the Cybersecurity and Infrastructure Security Agency (CISA) published the Cybersecurity Information Sheet "Harden Baseboard Management Controllers" to help network defenders. The guidance provides network defenders with recommendations and mitigations for securing their systems. This article continues to discuss the guidance released on hardening BMCs.

    NSA reports "NSA and CISA Release Guide To Protect Baseboard Management Controllers"

  • news

    Visible to the public "New Research: 6% of Employees Paste Sensitive Data into GenAI tools as ChatGPT"

    Generative Artificial Intelligence (AI) tools such as ChatGPT pose significant threats to organizations' sensitive data. New research from the browser security company LayerX highlighted the scope and nature of these risks. The "Revealing the True GenAI Data Exposure Risk" report provides data protection stakeholders with essential insights and helps them to take proactive measures. The report identifies key areas of concern by analyzing the use of ChatGPT and other generative AI applications by 10,000 employees. Six percent of employees have pasted sensitive information into generative AI, with 4 percent engaging in this behavior weekly. This recurring behavior poses a significant risk of data exfiltration. The report addresses crucial risk assessment questions, such as the actual scope of generative AI usage across enterprise workforces, the proportion of "paste" actions within this usage, the number of employees pasting sensitive data into this AI, the departments that use generative AI the most, and the types of sensitive data that are most likely to be exposed through pasting. This article continues to discuss findings from the LayerX study on the risks posed by generative AI tools such as ChatGPT to organizations' sensitive data.

    THN reports "New Research: 6% of Employees Paste Sensitive Data into GenAI tools as ChatGPT"

  • news

    Visible to the public "Barracuda Zero-Day Exploited by Chinese Actor"

    A zero-day vulnerability in the Barracuda Email Security Gateway (ESG) discovered in late May has been exploited in a Chinese espionage campaign since October 2022, according to security researchers at Mandiant. The researchers noted that new threat actor UNC4841 began sending phishing emails as far back as October 10 last year. The researchers stated that these malicious emails contained file attachments designed to exploit the Barracuda bug CVE-2023-2868 to gain initial access to vulnerable appliances. Once a foothold had been established, the group used Saltwater, Seaside, and Seaspray malware to maintain a presence on the devices by masquerading as legitimate Barracuda ESG modules or services. The researchers noted that post-initial compromise, they observed UNC4841 aggressively target specific data of interest for exfiltration and, in some cases, leverage access to an ESG appliance to conduct lateral movement into the victim network or to send mail to other victim appliances. The researchers also observed UNC4841 deploy additional tooling to maintain a presence on ESG appliances. Barracuda discovered the campaign on May 19 and released patches to contain and remediate the threat two days later. However, the threat group switched malware and deployed new persistence mechanisms to maintain access. The researchers noted that between May 22 and 24, UNC4841 targeted victims in 16 countries with "high frequency" operations, prompting Barracuda to take the unusual step of urging customers to isolate and replace their appliances, whatever their patch status. The researchers stated that UNC4841 has shown to be highly responsive to defensive efforts and actively modifies TTPs to maintain their operations.

    Infosecurity reports: "Barracuda Zero-Day Exploited by Chinese Actor"

  • news

    Visible to the public "Russian Hackers Use PowerShell USB Malware to Drop Backdoors"

    The Russian state-sponsored hacking group Gamaredon, also known as Armageddon or Shuckworm, continues to target critical organizations in Ukraine's military and security intelligence sectors using updated tools and novel infection techniques. Previously, the Russian hackers with ties to the FSB, were observed using information-stealing malware against Ukrainian state organizations. They were using new variants of their "Pteranodon" malware and a default Word template hijacker. Symantec's threat research team has reported that the threat actors have recently begun using USB malware to spread to additional systems within infected networks. Gamaredon's newest campaign targets HR departments, suggesting that the threat actors are aiming for spear-phishing attacks within breached organizations. This article continues to discuss the Gamaredon hacking group using USB malware to spread to additional systems inside infected networks.

    Bleeping Computer reports "Russian Hackers Use PowerShell USB Malware to Drop Backdoors"

  • news

    Visible to the public "Cybercriminals Return to Business as Usual in a Post-pandemic World"

    According to Proofpoint, cybercriminals resumed normal operations in 2022 following two years of pandemic-induced disruption. As COVID-19 medical and economic programs began to slow down, attackers were forced to find new ways to make a living by sharpening their social engineering skills, commercializing once-sophisticated attack techniques, and creatively seeking new opportunities. From scaling brute-force and targeted attacks on cloud tenants to an increase in conversational smishing attacks and the expansion of multi-factor authentication (MFA) bypass, the cyberattack landscape in 2022 saw significant developments on multiple fronts. Despite sending over 25 million messages in 2022, which is more than double the volume of the second most prominent threat actor, Emotet's presence has been unsteady, and the group has demonstrated a lack of adaptability to the post-pandemic threat landscape. This article continues to discuss key findings from Proofpoint's annual Human Factor report.

    Help Net Security reports "Cybercriminals Return to Business as Usual in a Post-pandemic World"

  • news

    Visible to the public "'Shampoo' ChromeLoader Variant Difficult to Wash Out"

    Fake websites promoting pirated video games, movies, and more are spreading a new variant of the ChromeLoader malware called "Shampoo." It steals sensitive information, redirects searches, and injects advertisements into browser sessions. Researchers from HP Wolf Security have been observing the new campaign, which appears to have been active since March. It distributes malware similar to the original ChromeLoader that was first discovered in May 2022 but is significantly more difficult to eradicate due to multiple persistence mechanisms. The first version of ChromeLoader installed a malicious Chrome extension for advertising, a process involving victims downloading malicious ISO files from websites hosting illegal content that hijack browsers. The ChromeLoader used in the Shampoo campaign is very similar in that it tricks victims into downloading and executing malicious VBScript files from websites, which ultimately leads to the installation of a malicious Chrome browser extension. Shampoo differs from the original ChromeLoader because it uses the browser's Task Scheduler to achieve persistence by scheduling a relaunch every 50 minutes. This article continues to discuss the new variant of the ChromeLoader malware.

    Dark Reading reports "'Shampoo' ChromeLoader Variant Difficult to Wash Out"

  • news

    Visible to the public "Detecting Deviators From the Norm - 'An Accurate Identification Method of Abnormal Users in Social Network Based on Multivariate Characteristics'"

    Research published in the International Journal of Web Based Communities introduces a new method for identifying abnormal users in social networks, which involves analyzing multiple user behavior characteristics. Using the APIs of different social networks, Jian Xie of the College of Education at Fuyang Normal University in Fuyang, China, collected comprehensive data about users, including information about their accounts, the content they post, and the specific behaviors they exhibit. This data analysis allowed him to ascribe a set of attributes to users. Through attribute reduction, he eliminated redundant features and built a targeted attribute feature set to analyze suspicious accounts. Xie then used the data to train the XGBoost model, a Machine Learning (ML) algorithm, in order to develop a highly objective function that can quickly flag abnormal behavior on a social network. Xie was able to identify abnormal users with 95 percent accuracy. This level of accuracy in identification is enough to alert the system's administrators to any potential issues, which could then be manually investigated and handled (e.g., blocking malicious users). The approach could set the groundwork for developing highly effective social network security policies. This article continues to discuss the proposed approach to identifying abnormal users in social networks and its potential impact on security for social networking.

    Inderscience reports "Detecting Deviators From the Norm - 'An Accurate Identification Method of Abnormal Users in Social Network Based on Multivariate Characteristics'"

  • news

    Visible to the public "MSSQL Makes up 93% Of All Activity on Honeypots Tracking 10 Databases"

    Honeypots focused on tracking the activity on database servers in Russia, Ukraine, Poland, the UK, China, and the US revealed that Microsoft SQL (MSSQL) composed 93 percent of all attack activity. SpiderLabs of Trustwave noted in a blog post that its study calls for security teams to treat database security seriously by using strong passwords, disabling default accounts, enabling multi-factor authentication (MFA), and more. In addition to keeping software up-to-date and conducting frequent security audits, the SpiderLabs researchers recommended that security teams keep a close watch on who is attempting to access the system and with what privileges. They added that the results regarding MSSQL prompted them to conduct another study on MSSQL, which will be published later this month. While the UK had the highest number of MSSQL attacks (21.84 percent), China was a close second (21.49 percent), followed by Ukraine (19.52 percent), Russia (17.54 percent), Poland (11.54 percent), and the US (8.04 percent). MSSQL instances were subjected to highly intense attacks. According to Shodan, there are more than 450,000 MSSQL instances accessible on the Internet, with more than 133,000 instances located in China. This article continues to discuss MSSQL making up 93 percent of all attack activity on honeypots tracking 10 databases.

    SC Magazine reports "MSSQL Makes up 93% Of All Activity on Honeypots Tracking 10 Databases"

  • news

    Visible to the public "Popular Email Provider Leaves Systems Wide Open"

    The popular disposable email provider Temp Mail left its systems publicly accessible for over three months, thus risking potential security breaches and widespread malware distribution. The Cybernews research team recently discovered a configuration error in the Temp Mail system that exposed sensitive data. Temp Mail is a free disposable email service that enables users to receive email at a temporary address, which then self-destructs after a specified amount of time. The email service is a popular option for users who wish to avoid spam and protect their email addresses from disclosure when registering on different websites, blogs, and forums. The recently discovered misconfiguration could have allowed malicious actors access to the internal systems of Temp Mail, manipulate sensitive data, deliver malware on a large scale, and target users. The severity of the situation is highlighted by the fact that Temp Mail's Android app alone has over 10 million downloads. This article continues to discuss the Temp Mail system leaving sensitive data exposed and the potential impact of this exposure.

    Cybernews reports "Popular Email Provider Leaves Systems Wide Open"

  • news

    Visible to the public "Spotify Fined $5 Million for Breaching EU Data Rules"

    Music streaming giant Spotify, was recently fined 58 million kronor ($5.4 million) for not properly informing users on how data it collected on them was being used, Swedish authorities said. Spotify said it planned to appeal the decision. The Swedish Authority for Privacy Protection's (IMY) stated that it had reviewed how Spotify handles customers' right of access to their personal data and found shortcomings. The regulator noted that under the rules of the European data protection act GDPR, users have a right to know what data a company has about an individual and how that data is being used. IMY stated that while Spotify did hand out the data it had when requested by an individual, it said the company had not been sufficiently specific as to how that data was being used. IMY noted that since the information provided by Spotify has been unclear, it has been difficult for individuals to understand how their personal data is processed and to check whether the processing of their personal data is lawful.

    SecurityWeek reports: "Spotify Fined $5 Million for Breaching EU Data Rules"

  • news

    Visible to the public "SAP Patches High-Severity Vulnerabilities With June 2023 Security Updates"

    SAP on Tuesday announced the release of eight new security notes as part of its June 2023 Security Patch Day, including two notes that address high-severity vulnerabilities. Five other notes were updated. The most important of SAP's new security notes resolve a stored cross-site scripting (XSS) bug in UI5 Variant Management. The bug is tracked as CVE-2023-33991 (CVSS score of 8.2), and it can be exploited to gain user-level access to the UI5 Varian Management application and compromise confidentiality, integrity, and availability. The second high-severity flaw is a missing authentication issue in Plant Connectivity and Production Connector for Digital Manufacturing, tracked as CVE-2023-2827 (CVSS score of 7.9). SAP noted that it can be exploited to connect to a vulnerable application without a valid JSON Web Token (JWT). According to enterprise application security firm Onapsis, "in order to fully patch this vulnerability, both components must be patched, and JWT signature validation must be configured from the Cloud Connector settings." This week, SAP also updated two notes dealing with high-severity bugs in Knowledge Warehouse (CVE-2021-42063) and SAPUI5 (CVE-2023-30743). The updates only contain "minor textual or structural" changes from the previous notes. Of the eight new and updated medium-severity security notes that SAP released this week, six deal with XSS flaws in NetWeaver, CRM ABAP (Grantor Management), CRM (WebClient UI), and BusinessObjects. The other two notes resolve an information disclosure bug in S/4HANA and an SQL injection issue in Master Data Synchronization. The last security note published on SAP's June 2023 Security Patch Day resolves a low-severity denial-of-service (DoS) vulnerability in NetWeaver (Change and Transport System).

    SecurityWeek reports: "SAP Patches High-Severity Vulnerabilities With June 2023 Security Updates"

  • news

    Visible to the public "Cyber Win: NSA Selects LSU to Build Cybersecurity Clinic to Support Small Businesses in Louisiana"

    The National Security Agency (NSA) has selected Louisiana State University (LSU) as the first university in the US to develop and pilot a cyber clinic to help protect small businesses, which are becoming increasingly frequent targets of cyberattacks. The LSU Cybersecurity Clinic (LCC) will provide free services through the Louisiana Small Business and Development Center at LSU while offering opportunities for students in the LSU College of Engineering and LSU E. J. Ourso College of Business to advance their cybersecurity education, gain practical experience, and earn professional certifications. The initial $1.5 million award from the NSA will be used to establish the LCC, providing services through three collaborative sub-clinics run by LSU students and faculty advisors. Each sub-clinic has a distinct purpose and technical focus. Together, they will make it easier for small businesses in Louisiana to access solutions to highly technical issues. The first sub-clinic, focusing on threat and vulnerability assessment, will place students on the offensive by having them pose as malicious hackers to help businesses identify security flaws. The cyber defense sub-clinic will provide guidance and solutions. The cyber risk assessment sub-clinic will focus on a company's specific assets, data, and operations to develop practical and effective mitigation strategies. This article continues to discuss the NSA-funded LCC that will enable small businesses in Louisiana to reach a proper cybersecurity posture.

    Louisiana State University reports "Cyber Win: NSA Selects LSU to Build Cybersecurity Clinic to Support Small Businesses in Louisiana"