News Items

  • news

    Visible to the public "Hundreds of Thousands of eCommerce Sites Impacted by Critical Plugin Vulnerability"

    Security researchers at Patchstack discovered that hundreds of thousands of ecommerce websites could be exposed to attacks due to a critical vulnerability in the WooCommerce Stripe Payment Gateway plugin. Tracked as CVE-2023-34000, the issue is described as an unauthenticated insecure direct object reference (IDOR) bug leading to information disclosure. The researchers noted that specifically, the flaw allows an unauthenticated attacker to view any information that a user provides when placing an order, including name, address, and email address. The security defect exists because the "javascript_params" and "payment_fields" functions lack proper access control and handle data in an insecure manner. The researchers stated that due to the lack of order ownership checks, an attacker can exploit the bugs to view order information in the site's page source or in the front end. The issue was resolved on May 30 with the release of WooCommerce Stripe Payment Gateway version 7.4.1. According to the official WordPress web store, the plugin has more than 900,000 active installations, and hundreds of thousands of them could be vulnerable to attacks based on available version use data.

    SecurityWeek reports: "Hundreds of Thousands of eCommerce Sites Impacted by Critical Plugin Vulnerability"

  • news

    Visible to the public "US and International Partners Release Comprehensive Cyber Advisory on LockBit Ransomware"

    "Understanding Ransomware Threat Actors: LockBit" is the title of a joint Cybersecurity Advisory (CSA) issued by the US Cybersecurity and Infrastructure Security Agency (CISA), FBI, Multi-State Information Sharing and Analysis Center (MS-ISAC), and the cybersecurity authorities of Australia, Canada, the UK, Germany, France, and New Zealand (CERT NZ, NCSC-NZ). This joint advisory is a comprehensive resource containing common LockBit affiliate tools and exploitations, as well as tactics, techniques, and procedures (TTPs). The advisory also provides recommended mitigations for organizations to reduce the likelihood and impact of future ransomware incidents. Threat actors who use LockBit, the most widely launched and prolific Ransomware-as-a-Service (RaaS) in 2022 and 2023, have targeted organizations of varying sizes in critical infrastructure sectors. This article continues to discuss the joint advisory aimed at helping organizations around the world better understand and protect against this global ransomware threat.

    CISA reports "US and International Partners Release Comprehensive Cyber Advisory on LockBit Ransomware"

  • news

    Visible to the public "DDoS Threats and Defense: How Certain Assumptions Can Lead to an Attack"

    There is a common misconception that a website with low traffic or that does not offer transaction-intensive online commerce does not need to prepare for Distributed Denial-of-Service (DDoS) attacks because it is not an attractive target. According to Jag Bains at TechRepublic, cybercriminals do not care about a website's popularity or offerings. In addition, hackers are always looking for new methods to launch even more complex and effective attacks that could have devastating financial and reputational outcomes for unprepared victims. It is currently simple and inexpensive to execute cyberattacks on a large scale. A DDoS attack can even be booked on one of many shady platforms, allowing low-skilled attackers to easily carry out such attacks without having to deal with the technology themselves. Therefore, not being prepared for DDoS attacks is no longer an option, no matter what a company's size, industry, or level of popularity is. This article continues to discuss the assumptions businesses should not make about their DDoS defenses and the steps they should take to reduce the likelihood of such attacks.

    TechRepublic reports "DDoS Threats and Defense: How Certain Assumptions Can Lead to an Attack"

  • news

    Visible to the public "Chrome 114 Update Patches Critical Vulnerability"

    Google recently announced a new Chrome 114 update that resolves five vulnerabilities, including four critical and high-severity bugs reported by external researchers. Google noted that the most important of these issues is CVE-2023-3214, a critical use-after-free flaw in Autofill payments. The issue was reported by Rong Jian of VRI. Use-after-free vulnerabilities are a type of memory corruption bug that occurs when a pointer is not cleared after memory allocation has been freed. Such flaws may be exploited to achieve remote code execution (RCE), denial-of-service (DoS), or data corruption and may even lead to complete system compromise if combined with other bugs. Google noted that successful exploitation of use-after-free vulnerabilities in Chrome may lead to a sandbox escape if the attacker can target a privileged Chrome process or a flaw in the underlying operating system. In addition to CVE-2023-3214, the latest Chrome update resolves two other use-after-free issues, both rated high severity: CVE-2023-3215, which impacts WebRTC, and CVE-2023-3217, which impacts WebXR. The fourth externally reported flaw resolved with this browser release is a type confusion issue in the V8 JavaScript engine. Google stated that it paid out $3,000 for the WebRTC vulnerability but has yet to determine the amounts to be paid for the Autofill payments and V8 bugs. The WebXR flaw was reported by Sergei Glazunov of Google Project Zero, and, per Google's policy, no bug bounty reward will be issued for this security defect. Google did not mention whether these vulnerabilities were being exploited in attacks. The latest Chrome iteration is now rolling out as version 14.0.5735.133 for macOS and Linux, and as versions 114.0.5735.133/134 for Windows.

    SecurityWeek reports: "Chrome 114 Update Patches Critical Vulnerability"

  • news

    Visible to the public "E-Commerce Firms Are Top Targets for API, Web Apps Attacks"

    According to a new report by Akamai, hackers launched 14 billion attacks against the e-commerce industry in 15 months, placing it at the top of the list of targets for Application Programming Interface (API) and web application exploits. Researchers found that the volume of attacks against e-commerce companies is primarily due to the digitalization of the industry and the wide variety of vulnerabilities hackers can exploit in the web applications of their intended targets. E-commerce companies store sensitive data such as Personally Identifiable Information (PII) and payment account details, making them a lucrative target for cybercriminals, according to researchers who analyzed web attacks from January 1, 2022, to March 31, 2023. Retail, hotel, and travel companies topped the list of 13 industries with 14.5 billion attacks, or more than one-third of all attacks explored by Akamai. The high-tech industry ranked second with approximately 9 billion attacks, followed by the financial services industry with around 7 billion. This article continues to discuss e-commerce companies being the top targets for API and web application exploits.

    BankInfoSecurity reports "E-Commerce Firms Are Top Targets for API, Web Apps Attacks"

  • news

    Visible to the public "Hackers Can Steal Cryptographic Keys by Video-Recording Power LEDs 60 Feet Away"

    Researchers have developed a novel attack that recovers the secret encryption keys in smart cards and smartphones by using iPhone cameras or commercial surveillance systems to video record the power LEDs that glow when the card reader or smartphone is on. The attacks enable a new method for exploiting two previously disclosed side channels, a type of attack that measures physical effects leaked from a device during a cryptographic operation. Attackers can collect enough information to recover the secret keys underpinning a cryptographic algorithm's security and confidentiality by carefully monitoring characteristics such as power consumption, sound, electromagnetic emissions, and how long an operation takes. This article continues to discuss the attack that recovers the secret encryption keys stored in smart cards and smartphones.

    Ars Technica reports "Hackers Can Steal Cryptographic Keys by Video-Recording Power LEDs 60 Feet Away"

  • news

    Visible to the public "LLM meets Malware: Starting the Era of Autonomous Threat"

    Researchers at B42 Labs have shared some findings from their exploratory research on the application of Large Language Models (LLMs) to malware automation, examining how a potential new type of autonomous threat may manifest in the near future. The researchers explored the potential architecture of an autonomous malware threat based on four main steps: Artificial Intelligence (AI)-assisted reconnaissance, reasoning and planning, and AI-assisted execution. They demonstrated the possibility of using an LLM to recognize infected environments and determine which malicious actions would be most appropriate for the environment. In order to leverage LLMs in the complex task of generating code on the fly to accomplish the malicious objectives of the malware agent, they adopted an iterative code generation strategy. This article continues to discuss findings from B42 Labs researchers' analysis of the application of LLMs to malware automation.

    Security Affairs reports "LLM meets Malware: Starting the Era of Autonomous Threat"

  • news

    Visible to the public "New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs"

    Skuld is a new Golang-based information stealer that has compromised Windows systems in Europe, Southeast Asia, and the US. According to Trellix researcher Ernesto Fernandez Provecho, this new strain of malware attempts to steal sensitive information from its victims. It searches for data stored in applications such as Discord and web browsers, information from the system, and files stored in the victim's folders. Skuld, shares overlaps with publicly available stealers like Creal Stealer, Luna Grabber, and BlackCap Grabber. It was developed by someone going by the online alias "Deathined" on different social media platforms. In addition to gathering system metadata, the malware can harvest cookies and credentials stored in web browsers, as well as files present in Windows user profile folders, including Desktop, Documents, Downloads, Pictures, Music, Videos, and OneDrive. This article continues to discuss findings regarding the new Golang-based information stealer Skuld.

    THN reports "New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs"

  • news

    Visible to the public "Fake Zero-Day PoC Exploits on GitHub Push Windows, Linux Malware"

    Hackers are posing as cybersecurity researchers on Twitter and GitHub to publish fake proof-of-concept (PoC) exploits for zero-day vulnerabilities that infect Windows and Linux with malware. The alleged researchers advertise these malicious exploits through a fake cybersecurity company called "High Sierra Cyber Security," which promotes the GitHub repositories on Twitter, likely targeting cybersecurity researchers and companies engaged in vulnerability research. The repositories seem legitimate, as the users who maintain them even use headshots to impersonate real security researchers from Rapid7 and other security companies. The same personas maintain Twitter accounts to lend credibility to their research and code repositories, such as GitHub, as well as to attract victims from the social media platform. According to VulnCheck, this campaign has been active since at least May 2023, promoting exploits for zero-day vulnerabilities in software such as Chrome, Discord, Signal, WhatsApp, and Microsoft Exchange. This article continues to discuss the impersonation of cybersecurity researchers to publish fake PoC exploits that push Windows and Linux malware.

    Bleeping Computer reports "Fake Zero-Day PoC Exploits on GitHub Push Windows, Linux Malware"

  • news

    Visible to the public "Switzerland Under Cyberattack"

    Swiss government websites are being hit with Distributed Denial-of-Service (DDoS) attacks, but several ransomware gangs have also been targeting Swiss government organizations, cantonal governments, cities, and companies in the last few months. The Swiss National Cyber Security Centre (NCSC) reported that a DDoS attack rendered several Federal Administration websites inaccessible on June 12, 2023. According to the NCSC, the group responsible for these DDoS attacks is the pro-Russian hacker group Noname057(16). In addition, the group has claimed responsibility for the recent DDoS attack on the website and mobile app of the Swiss Federal Railways that temporarily disrupted certain online services. In the past few months, ransomware groups have effectively targeted many Swiss businesses and government agencies, despite appearing to target organizations of all types globally. This article continues to discuss recent cyberattacks against Switzerland.

    Help Net Security reports "Switzerland Under Cyberattack"

  • news

    Visible to the public "Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs"

    A Chinese cyber espionage group that researchers previously spotted targeting VMware ESXi hosts has been exploiting a zero-day authentication bypass flaw in the virtualization technology to execute privileged commands on guest Virtual Machines (VMs). Researchers from Mandiant discovered the vulnerability during ongoing investigations of UNC3886, a Chinese threat actor they have been monitoring for some time. They disclosed the vulnerability to VMware, which then issued a patch to address it. VMware Tools, a collection of services and modules for improved administration of guest operating systems, contains the zero-day vulnerability, tracked as CVE-2023-208670. The vulnerability enables attackers to use a compromised ESXi host to transfer files to and from Windows, Linux, and vCenter guest VMs without the need for guest credentials and without the activity being logged by default. VMware rated the vulnerability as having a medium severity because an attacker must already have root access to an ESXi host in order to exploit it. This article continues to discuss UNC3886 and the threat actor's exploitation of a zero-day vulnerability in VMware Tools.

    Dark Reading reports "Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs"

  • news

    Visible to the public "Robot Can Rip the Data Out of RAM Chips With Chilling Technology"

    Cold boot attacks, in which memory chips are cooled and data, including encryption keys, are stolen, were first demonstrated in 2008. The original attack has been improved and automated in the form of a memory-stealing machine that costs about $2,000. At the REcon reverse engineering conference in Canada, Ang Cui, the founder and CEO of Red Balloon Security, gave a presentation titled "Ice Ice Baby: Coppin' RAM With DIY Cryo-Mechanical Robot." The presentation focuses on the Cryo-Mechanical RAM Content Extraction Robot that Cui and his colleagues Grant Skipper and Yuanzhe Wu created to extract decrypted data from DDR3 memory modules. By disabling JTAG debugging interfaces and UART circuitry, as well as by using Ball Grid Array (BGA) packaging and encrypted firmware, hardware manufacturers have made it more difficult to reverse engineer their products. Cui noted that manufacturers are removing many debugging interfaces, which does not necessarily increase product security but makes device introspection and reverse engineering significantly more difficult. Therefore, the researchers decided to pursue a different path. Instead of attempting fault injection, as they have in the past, or performing invasive reverse engineering via laser ablation, they constructed this affordable and accurate robot that freezes one RAM chip on the device at a time. This article continues to discuss the robot that reliably extracts the contents of RAM of modern embedded devices at runtime.

    The Register reports "Robot Can Rip the Data Out of RAM Chips With Chilling Technology"

  • news

    Visible to the public "USTC Achieves Thousand-Kilometer Quantum Key Distribution"

    Scientists from the University of Science and Technology of China (USTC) of the Chinese Academy of Sciences (CAS) and their collaborators from Tsinghua University, Jinan Institute of Quantum Technology, and Shanghai Institute of Microsystem and Information Technology (SIMIT) have achieved point-to-point long-distance Quantum Key Distribution (QKD) over a distance of 1,002 kilometers. This achievement sets a new world record for non-relay QKD and offers a solution for high-speed intercity quantum communication. QKD is based on quantum mechanics principles and enables the secure distribution of keys between two remote parties. It can attain the highest level of security for confidential communication when combined with the "one-time pad" encryption technique. However, QKD's range has been limited by channel loss and system noise. This study's achievement has significant implications for the development of secure quantum communication. This article continues to discuss the achievement of point-to-point long-distance QKD over a distance of 1,002 km.

    SCIENMAG reports "USTC Achieves Thousand-Kilometer Quantum Key Distribution"

  • news

    Visible to the public "Unveiling the Balada Injector: A Malware Epidemic in WordPress"

    A malicious cyber campaign has been silently exploiting popular WordPress plugins to undermine website security, infiltrating over a million websites. In April 2023, technology media outlets began reporting on cybercriminals hacking WordPress websites. A dangerous combination of the popular plugins Elementor Pro Premium (webpage builder) and WooCommerce (online storefront) allowed them to gain access. This recently disclosed vulnerability has a base CVSS score of 8.8, causing significant concern for WordPress administrators and cybersecurity teams. Websites running Elementor Pro 3.11.6 or earlier with an activated WooCommerce plugin should upgrade Elementor Pro to at least 3.11.7 or risk authenticated users (i.e., standard e-commerce customers) gaining total control of websites by exploiting Broken Access Control, the most severe of the Open Worldwide Application Security Project's (OWASP) top 10 vulnerabilities. Although reports of this vulnerability have been widely shared across the Internet, a lesser-known but related set of "hack-tivities" has occurred. The widespread and persistent Balada Injector campaign has infected over a million websites by exploiting vulnerabilities in Elementor Pro, WooCommerce, and a number of other WordPress plugins. This article continues to discuss the history of the Balada Injector campaign, its common objectives, and Indicators of Compromise (IoCs).

    Cybernews reports "Unveiling the Balada Injector: A Malware Epidemic in WordPress"

  • news

    Visible to the public "Business Email Compromise: The $50 Billion Scam"

    According to the FBI's Internet Crime Complaint Center (IC3), Business Email Compromise (BEC) is a sophisticated scam targeting businesses and individuals performing legitimate transfer-of-funds requests. The scam is often perpetrated when someone compromises legitimate business or personal email accounts through social engineering or computer intrusion to conduct unauthorized fund transfers. BEC is not always associated with a request to transfer funds. BEC attack variations often involve compromising legitimate business email accounts and requesting Personally Identifiable Information (PII), Wage and Tax Statement (W-2) forms, and cryptocurrency wallets from employees. The BEC scam continues to evolve, targeting small local businesses, larger companies, and personal transactions. In 2022, the IC3 observed an increase in the reporting of BEC incidents. BEC attacks have been reported in all 50 states and 177 countries. According to the financial data reported to the IC3 for 2022, banks in Hong Kong and China were the primary international destinations of fraudulent funds. The UK, which often serves as an intermediary stop for funds, Mexico, and Singapore followed. This article continues to discuss the concept of BEC attacks, statistical data on these attacks, and suggestions for protecting against BEC attacks.

    HSToday reports "Business Email Compromise: The $50 Billion Scam"

  • news

    Visible to the public "Xplain Data Breach Also Impacted the National Swiss Railway FSS"

    The Play ransomware attack faced by the Information Technology (IT) services provider Xplain is worse than initially anticipated, as the national railway company of Switzerland (FSS) and the canton of Aargau were also affected. The Bernese IT company Xplain provides services to several federal and cantonal government departments, the army, customs, and the Federal Office of Police (Fedpol). In early June, Swiss police launched an investigation into the cyberattack that targeted Xplain. On a Darknet forum, threat actors initially published data allegedly stolen from Fedpol and the Federal Office of Customs and Border Security (FOCBS). This article continues to discuss the Play ransomware attack launched against the IT services provider Xplain.

    Security Affairs reports "Xplain Data Breach Also Impacted the National Swiss Railway FSS"

  • news

    Visible to the public "France Says it Thwarted Attack on Websites From Russian State-Linked Actors"

    France's foreign minister recently announced that France had prevented a hybrid digital attack on the ministry's website, likely carried out by Russian state-linked actors, along with attacks on other government websites and French media sites. Foreign Minister Catherine Colonna also said France believed there was a broader campaign of spreading disinformation in France by Russian protagonists. Colonna noted that this campaign is notably based upon creating fake internet pages to hack into the identity of national media and government websites, as well as by creating fake accounts on social media networks. Moscow has consistently denied that it carries out hacking operations. However, Colonna said Russian embassies and Russian cultural institutes were also involved in this campaign and reaffirmed France's support for Ukraine in its conflict with Russia.

    Reuters reports: "France Says it Thwarted Attack on Websites From Russian State-Linked Actors"

  • news

    Visible to the public "US Charges Russians With Hacking Cryptocurrency Exchange"

    Two Russian nationals have recently been charged in the US with hacking the now-defunct cryptocurrency exchange Mt. Gox and conspiring to launder the proceeds. Alexey Bilyuchenko, 43, and Aleksandr Verner, 29, allegedly attempted to launder 647,000 Bitcoins from their hack of Mt. Gox. According to court documents, the two and other co-conspirators hacked Mt. Gox, the largest Bitcoin exchange at the time, in September 2011. On Friday, the US unsealed an indictment alleging that Bilyuchenko and Verner were among the individuals responsible for the hack and that they laundered at least 300,000 of the stolen Bitcoins. In a second indictment unsealed on Friday, Bilyuchenko and another Russian national, Alexander Vinnik, were charged with operating the illicit cryptocurrency exchange BTC-e from 2011 until 2017, when it was shut down by law enforcement. According to the indictment, BTC-e served more than one million users globally, processing billions of dollars worth of transactions. The exchange allegedly received criminal proceeds from numerous hacks, ransomware attacks, and identity theft schemes.

    SecurityWeek reports: "US Charges Russians With Hacking Cryptocurrency Exchange"

  • news

    Visible to the public "Are Clean Maritime Solutions Resilient to Cyber-Attacks at Sea?"

    Professor Kevin Jones and Dr. Kimberly Tam at the University of Plymouth share their expertise and provide some answers regarding whether clean maritime solutions are resilient to cyberattacks at sea. Companies throughout the UK are benefiting from a funding boost aimed at accelerating the development of clean maritime solutions, which will create a supportive but competitive environment at a time when innovations and new challenges are emerging. However, in order for solutions to be long-lasting, they must be not only effective but also resilient. Many of these solutions rely heavily on cutting-edge technology, which increases their vulnerability to cyberattacks. Therefore, cybersecurity must be considered in the early phases of technological development. Only by combining efficiency and security can we ensure clean technologies' short- and long-term viability. This includes bolstering the security of the data that the technology uses and generates, and reducing the likelihood of cyber-physical effects, such as a Denial-of-Service (DoS) attack, which could prevent clean maritime solutions from functioning. This article continues to discuss insights on the resilience of maritime solutions to cyberattacks at sea.

    The University of Plymouth reports "Are Clean Maritime Solutions Resilient to Cyber-Attacks at Sea?"

  • news

    Visible to the public "Gozi Malware Hacker Sentenced to Three Years in US Prison"

    A Romanian hacker who ran the infrastructure for multiple malware strains has been sentenced to three years in federal prison in the US. According to prosecutors, Mihai Ionut Paunescu, age 39, helped operate the "bulletproof hosting" service PowerHost[.]ro, which helped cybercriminals deliver the Gozi Virus, Zeus Trojan, SpyEye Trojan, and BlackEnergy malware. Cybercriminals used the malware strains to steal financial information and more. Paunescu rented servers and IP addresses from reputable Internet service providers and then provided the tools to cybercriminals, enabling them to remain anonymous and launch attacks. Paunescu was also accused of facilitating Distributed Denial-of-Service (DDoS) attacks and spam campaigns through his platforms. This article continues to discuss the Gozi malware hacker who has been sentenced to three years in US prison.

    The Record reports "Gozi Malware Hacker Sentenced to Three Years in US Prison"

  • news

    Visible to the public "Intellihartx Informs 490k Patients of GoAnywhere-Related Data Breach"

    Intellihartx, a company providing patient balance resolution services to hospitals, is starting to inform roughly 490,000 individuals that their personal information was compromised in the GoAnywhere zero-day attack earlier this year. Disclosed in early February and linked to the infamous Cl0p ransomware gang, the cyberattack exploited a zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software. Tracked as CVE-2023-0669 and leading to remote code execution, the flaw had been exploited starting January 28. Intellihartx says it has concluded its review of the data potentially compromised during the attack and has also identified the impacted individuals. The company stated that the affected information includes names, addresses, insurance data and medical billing, diagnosis and medication information, birth dates, and Social Security numbers. Intellihartx says it is not aware of the compromised information being misused. However, the Cl0p gang has made the data allegedly stolen from the company available on its leak site.

    SecurityWeek reports: "Intellihartx Informs 490k Patients of GoAnywhere-Related Data Breach"

  • news

    Visible to the public "CISA Directs Federal Agencies to Secure Internet-Exposed Management Interfaces"

    The Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 23-02, "Mitigating the Risk from Internet-Exposed Management Interfaces," requiring federal civilian agencies to remove specific networked management interfaces from the public-facing Internet or implement Zero Trust Architecture (ZTA) capabilities that enforce access control to the interface within 14 days of discovery. Recent threat campaigns highlight the risk posed by improperly configured network devices to the federal enterprise. As part of CISA and the broad US government's effort to move the federal civilian enterprise to a more secure posture, this Directive will further reduce the attack surface of the federal government networks. According to Jen Easterly, director of CISA, threat actors too often can use network devices to get unrestricted access to organizational networks, resulting in widespread compromise. An important step in reducing risk to the federal civilian enterprise is requiring the controls and mitigations outlined in this Directive. This article continues to discuss the BOD issued by CISA on mitigating the risk posed by Internet-exposed management interfaces.

    CISA reports "CISA Directs Federal Agencies to Secure Internet-Exposed Management Interfaces"

  • news

    Visible to the public "CosmicEnergy's Threat to Critical Infrastructure in Dispute"

    There are disagreements among security researchers regarding the danger posed by the recently discovered malware "CosmicEnergy" to critical infrastructure. Last month, the threat intelligence company Mandiant identified CosmicEnergy as a "plausible threat" to electric grid operators. Mandiant first identified the malware after the code was uploaded to a public malware scanning tool in December 2021. In an analysis report released last month, the company noted that there was evidence indicating that it had been designed as a red teaming tool for simulated power disruption exercises. According to the report, given that threat actors use red team tools and public exploitation frameworks for targeted threat activity, CosmicEnergy is believed to pose a plausible threat to impacted electric grid assets. In a report published last week, however, researchers from the industrial cybersecurity company Dragos noted that the malware is not yet mature enough to endanger Operational Technology (OT) networks. Dragos also mentioned CosmicEnergy's probable origins as a training tool for detection development, figuring that while its discovery should prompt organizations to reevaluate OT security, there was no immediate threat to OT environments. Jimmy Wylie, technical lead malware analyst and lead author, commented that there are no indications that an adversary is actively deploying CosmicEnergy. This article continues to discuss disputes regarding the CosmicEnergy malware.

    SC Magazine reports "CosmicEnergy's Threat to Critical Infrastructure in Dispute"

  • news

    Visible to the public "Ransomware Attack Played Major Role in Shutdown of Illinois Hospital"

    St. Margaret's Health is shutting down hospitals and other facilities in Peru and Spring Valley, Illinois, and says a 2021 ransomware attack is partly to blame. The cyberattack occurred in late February 2021 and forced the shutdown of the Spring Valley hospital's computer network, impacting all web-based operations, including its patient portal. The Peru branch was not affected, as it operated on a separate system. The hospital said that the incident impacted its ability to bill patients and get paid in a timely manner for the provided services. The systems were down for more than three months. The hospital noted that compounded with the impact from the Covid-19 pandemic, a staff shortage, and rising costs of goods and services, the cyberattack forced the hospital to suspend some of its services in January this year. On June 16, St. Margaret's Health will shut down both the Peru and Spring Valley facilities. In a video message on social media, St. Margaret's chairwoman Suzanne Stahl announced that OSF HealthCare will acquire the hospital in Peru, which will help pay some of the Spring Valley location's debts. St. Margaret's Health will also close clinics in Henry, LaSalle, and Streator and will sell other assets not included in the OSF HealthCare transaction. St. Margaret's Health is the first healthcare facility to link its closure to a ransomware attack.

    SecurityWeek reports: "Ransomware Attack Played Major Role in Shutdown of Illinois Hospital"

  • news

    Visible to the public "Historic Zacks Breach Impacts Nearly Nine Million"

    Security researchers have recently discovered a breach at Zacks Investment Research dating back to 2020, which appears to have impacted millions of customers. So far, the stock research and analysis firm has made no public disclosure about the incident. However, a post on the breach site HaveIBeenPwned revealed that a trove of data numbering nearly nine million customers are being widely shared on a popular hacking forum. Security researchers noted that the most recent data was dated May 2020 and included names, usernames, email and physical addresses, phone numbers, and passwords stored as unsalted SHA-256 hashes. The publication of the data means that customers should expect follow-on phishing and other attacks. In January, the firm revealed a data breach that affected an estimated 820,000 customers, which it said occurred "sometime between November 2021 and August 2022." This particular incident involved a legacy database of customers who signed up for the Zacks Elite product between November 1999 and February 2005.

    Infosecurity reports: "Historic Zacks Breach Impacts Nearly Nine Million"

  • news

    Visible to the public "Google, Cornell to Partner in Online Security Initiative"

    Cornell is one of four higher-education institutions in a new partnership with Google that aims to make New York City the global leader in cybersecurity. Google announced the Google Cyber NYC Institutional Research Program on June 12 to kick-start the cybersecurity ecosystem, distributing $12 million to four institutions. According to Greg Morrisett, the Jack and Rilla Neafsey Dean and Vice Provost of Cornell Tech and Principal Investigator (PI) for Cornell, making systems safe, secure, and trustworthy is immensely difficult, and it will only become more difficult in the Artificial Intelligence (AI) era. Cornell, along with the City University of New York, Columbia University's Fu Foundation School of Engineering and Applied Science, and New York University's Tandon School of Engineering, will each receive annual funding of $1 million through 2024, with the option to continue through 2025. The funding will support about 90 collaborative research projects across the four institutions in areas where additional research could foster the creation of more secure digital ecosystems and inspire innovation. Although most security-related research focuses on technical challenges, many of the most significant security failings involve humans and are often attributable to a lack of human-centered design. This partnership will use an interdisciplinary approach to improve the foundations of secure systems and ensure that their deployment will not exacerbate societal issues. This article continues to discuss the new online security initiative.

    Cornell University reports "Google, Cornell to Partner in Online Security Initiative"

  • news

    Visible to the public "RDP Honeypot Targeted 3.5 Million Times in Brute-Force Attacks"

    A study involving high-interaction honeypots with a Remote Desktop Protocol (RDP) connection accessible from the public web demonstrates that attackers are relentless and follow a daily schedule that closely resembles office hours. Researchers at GoSecure, a threat detection and response company with headquarters in the US and Canada, logged close to 3.5 million login attempts to their RDP honeypot system over the course of three months. At the NorthSec cybersecurity conference in Montreal, Canada, Andreanne Bergeron, a GoSecure cybersecurity researcher, explained that the honeypots are tied to a research program aimed at understanding attacker strategies, which could then be translated into prevention advice. The honeypot has operated intermittently for more than three years and continuously for over a year, but the data compiled for the presentation only represents three months, from July 1 to September 30, 2022. During this time period, the honeypot was hit 3,427,611 times by more than 1,500 unique IP addresses. However, the total number of login attempts for the entire year reached 13 million. This article continues to discuss the GoSecure researchers' experiment involving its RDP honeypot system.

    Bleeping Computer reports "RDP Honeypot Targeted 3.5 Million Times in Brute-Force Attacks"

  • news

    Visible to the public "Researchers Uncover Publisher Spoofing Bug in Microsoft Visual Studio Installer"

    According to security researchers, an "easily exploitable" vulnerability in the Microsoft Visual Studio installer could be exploited by an attacker to impersonate a legitimate publisher and distribute malicious extensions. Dolev Taler, a researcher at Varonis, noted that a threat actor could impersonate a well-known publisher and distribute a malicious extension to compromise a targeted system. Malicious extensions have been used to steal sensitive data, access and modify code, and take complete control of a system. Microsoft addressed the spoofing flaw, tracked as CVE-2023-28299 with a CVSS score of 5.5, as part of its Patch Tuesday updates for April 2023. Varonis discovered that the flaw stems from the Visual Studio user interface that enables the spoofing of publisher digital signatures. This article continues to discuss the potential exploitation and impact of the flaw found in the Microsoft Visual Studio installer.

    THN reports "Researchers Uncover Publisher Spoofing Bug in Microsoft Visual Studio Installer"

  • news

    Visible to the public "Incorporating Cloud Security Teams Into the SOC Enhances Operational Efficiencies"

    According to Trend Micro, security leaders recognize that the cloud and how cloud security teams operate today are becoming increasingly critical to business and Information Technology (IT) operations. Therefore, cloud security and the foundational practices of their teams will be integrated into the Security Operations Center (SOC) in the coming years to increase efficiencies. Leaders who have navigated cloud security successfully are well-equipped to navigate a similar transition to the modern SOC landscape. Software consumes everything, creating system infrastructure increasingly defined as code and dependent on large volumes of data, with automation serving as the foundation for delivering value at accelerating rates. These concepts are foundational to teams building and securing in the cloud, but SOC and IT infrastructure teams' tooling, such as cross-detection and response (XDR), also use them and can benefit from absorbing the scale, skills, and expertise of cloud teams. Trend Micro predicts that viable SOC tools will increasingly incorporate cloud protection capabilities. This article continues to discuss Trend Micro's predictions regarding cloud security.

    Help Net Security reports "Incorporating Cloud Security Teams Into the SOC Enhances Operational Efficiencies"

  • news

    Visible to the public "Researchers Report First Instance of Automated SaaS Ransomware Extortion"

    The 0mega ransomware group has effectively executed an extortion attack against the SharePoint Online environment of a company without using a compromised endpoint, as is typically the case with these types of attacks. Instead, the threat group appears to have exploited a poorly protected administrator account to infiltrate the environment of the unnamed company, elevate permissions, and ultimately exfiltrate sensitive data from the victim's SharePoint libraries. The stolen information was used to demand a ransom from the victim. According to Glenn Chisholm, cofounder and CPO of Obsidian, the security company that discovered the attack, most enterprise efforts to combat ransomware tend to focus on endpoint protection mechanisms. The attack observed by Obsidian began with a member of the 0mega group obtaining a service account credential for one of the victim organization's Microsoft Global administrators. Not only was the compromised account accessible from the public Internet, but it also lacked multi-factor authentication (MFA). This article continues to discuss the attack that highlights the growing interest among threat actors to target data from Software-as-a-Service (SaaS) providers.

    Dark Reading reports "Researchers Report First Instance of Automated SaaS Ransomware Extortion"

  • news

    Visible to the public "How Analytics Tools, Third-Party Tracking Tech Pose Threats to Patient Privacy"

    Transferring sensitive data to non-Health Insurance Portability and Accountability Act (HIPAA)-covered entities may result in compliance complications, data breaches, lawsuits, and patient privacy risks. Third-party tracking tools promise functionality but may transmit sensitive data back to technology companies, potentially threatening the privacy of patients. Multiple high-profile healthcare data breaches and lawsuits against hospitals and technology companies over the use of third-party tracking tools prompted researchers to further examine the trend. Matthew McCoy, assistant professor of medical ethics and health policy at the University of Pennsylvania and one of the study's authors, noted that prior to the study, there had been some investigative reporting on the use of tracking technologies on the websites of small groups of hospitals. McCoy, together with Ari B. Friedman, assistant professor of emergency medicine at the University of Pennsylvania, and their colleagues set out to explore the prevalence of tracking technologies on hospital websites. The researchers discovered third-party tracking technologies on 98.6 percent of all US nonfederal acute care hospital websites. This article continues to discuss analytics tools and third-party tracking technologies posing threats to patients' privacy.

    HealthCareExecIntelligence reports "How Analytics Tools, Third-Party Tracking Tech Pose Threats to Patient Privacy"

  • news

    Visible to the public "Microsoft Warns of Multi-Stage AiITM Phishing and BEC Attacks"

    Microsoft discovered multi-stage adversary-in-the-middle (AiTM) phishing and Business Email Compromise (BEC) attacks targeting financial service organizations. In AiTM phishing, threat actors set a proxy server between a target user and the website the user wants to access, which is the phishing website under the attackers' control. The proxy server enables attackers to access traffic in order to steal passwords and session cookies. Microsoft found that the attackers initially compromised a trusted vendor before launching AiTM attacks and follow-on BEC activities against multiple organizations. This campaign is notable for its use of an indirect proxy, which gave perpetrators control and flexibility in tailoring phishing pages to their intended victims. Microsoft attributes the attacks to the "Storm-1167" emerging cluster. This article continues to discuss Microsoft researchers' warning of banking AitM phishing and BEC attacks targeting banking and financial organizations.

    Security Affairs reports "Microsoft Warns of Multi-Stage AiITM Phishing and BEC Attacks"

  • news

    Visible to the public "Log4J Exploits May Rise Further as Microsoft Continues War on Phishing"

    Researchers expect a rise in Log4J exploits as cybercriminals continue to find new methods to circumvent the ongoing implementation of Microsoft's anti-phishing measures. Microsoft blocked the enablement of VBA macros in Office documents by default in 2022, after the Information Technology (IT) community had demanded it for years. Therefore, one of the leading methods for delivering malware via Office documents and phishing emails was nullified. Since then, ESET researchers have observed a global increase in exploits targeting the Log4J vulnerability. Researchers are uncertain as to the cause of the increase in attempts, but cybercriminals may be seeking new attack methods now that phishing with malicious documents has become more difficult. This article continues to discuss the expected rise in Log4J exploits, the latest Log4J numbers, and the effectiveness of blocking VBA macros.

    ITPro reports "Log4J Exploits May Rise Further as Microsoft Continues War on Phishing"

  • news

    Visible to the public "New Entrants to Ransomware Unleash Frankenstein Malware"

    Ransomware hackers are pushing the concept of code reuse to its limits. In their rush to make money, some new cybercriminals are turning to previous ransomware groups' discarded remnants, piecing together ransomware rather than developing their own malware. "Frankenstein" ransomware is created by attackers using stolen or leaked code. The ESXiArgs malware, which began targeting VMware systems in February, is one such monster, using a ransom note from one ransomware and the encryption scheme from another to create a new ransomware. Other newcomers adopting this strategy include Rapture, which appears to have used leaked Paradise crypto-locker source code. This article continues to discuss hackers testing the limits of the concept of code reuse.

    DataBreachToday reports "New Entrants to Ransomware Unleash Frankenstein Malware"

  • news

    Visible to the public "Nvidia's AI Software Tricked Into Leaking Data"

    According to researchers at the San Francisco-based company Robust Intelligence, a feature in Nvidia's Artificial Intelligence (AI) software can be manipulated to disregard safety restrictions and reveal private information. The "NeMo Framework" developed by Nvidia enables developers to work with various Large Language Models (LLMs), the underlying technology that drives generative AI products such as chatbots. The chipmaker designed the framework to be adopted by businesses. Researchers at Robust Intelligence discovered they could easily circumvent so-called guardrails intended to ensure the AI system's safe use. After using the Nvidia system on its own data sets, it took Robust Intelligence analysts hours to get LLMs to overcome restrictions. In one test scenario, the researchers instructed the Nvidia system to replace the letter 'I' with the letter 'J.' This action triggered the release of Personally Identifiable Information (PII) from a database. This article continues to discuss researchers manipulating a feature in Nvidia's AI software to reveal sensitive information.

    Ars Technica reports "Nvidia's AI Software Tricked Into Leaking Data"

  • news

    Visible to the public "Confidential Data Downloaded From UK Regulator Ofcom in Cyberattack"

    Ofcom, Britain's communications regulator, has disclosed that hackers exploiting a flaw in Progress Software's MOVEit Transfer file transfer app downloaded confidential information on companies it regulates. A spokesperson for Ofcom revealed that the organization was among the many impacted by the MOVEit cyberattack, which has potentially affected hundreds of organizations worldwide. Microsoft had initially warned that the Cl0p ransomware group was behind attempts to exploit MOVEit. Recently, Cl0p published an extortion note claiming to have used the vulnerability to attack "hundreds" of businesses. The gang threatened to publish victims' names on its extortion website by June 14 if they did not contact the group to negotiate a ransom. The actual number of companies worldwide that the hacking campaign has compromised is unknown. Over 2,000 instances of the MOVEit Transfer tool were discovered exposed to the public Internet, most of which were in the US. There were 128 instances of MOVEit Transfer exposed to the Internet from the UK, but the number of affected companies could be significantly higher. This article continues to discuss hackers downloading confidential data from Britain's communications regulator Ofcom through the exploitation of the vulnerability in the MOVEit Transfer file transfer app.

    The Record reports "Confidential Data Downloaded From UK Regulator Ofcom in Cyberattack"

  • news

    Visible to the public "Barracuda ESG Zero-Day Exploit Hits Australia's ACT Government"

    The Australian Capital Territory (ACT) Government is among an estimated 5 percent of Barracuda Networks' Email Security Gateway (ESG) customers who have been instructed to remove and replace their appliances due to a zero-day flaw compromise. Barracuda Networks disclosed the critical vulnerability on May 19 and patched impacted ESG appliances the next day, but the vendor recently warned those whose appliances had been compromised by the remote command injection vulnerability to replace their compromised appliances immediately. The ACT government rebuilt its Barracuda system after discovering the vulnerability and determining that malicious hackers had exploited it. According to Chris Steel, the Digital and Data Special Minister of State for the ACT Government, there was a "strong likelihood" that data had been stolen. However, they are currently unaware of any information that may have been accessed on ACT Government systems and made available on the dark web. The ACT Government administers the federal territory of Australia, which is home to the country's capital city, Canberra. Its ESG service was linked to the government's main citizen-facing transaction portal, health services, and more. This article continues to discuss the impact of the Barracuda ESG zero-day bug on the ACT Government.

    SC Media reports "Barracuda ESG Zero-Day Exploit Hits Australia's ACT Government"

  • news

    Visible to the public "Cybercriminals Using Powerful BatCloak Engine to Make Malware Fully Undetectable"

    Since September 2022, a fully undetectable (FUD) malware obfuscation engine named BatCloak has been used to launch different malware strains while persistently bypassing antivirus detection. According to Trend Micro researchers, the samples enable threat actors to easily load multiple malware families and exploits via highly obfuscated batch files. The cybersecurity firm noted that about 79.6 percent of the total 784 unearthed artifacts were undetected by all security solutions, highlighting BatCloak's ability to evade traditional detection mechanisms. The BatCloak engine is at the core of the batch file builder tool Jlaive, which can bypass Antimalware Scan Interface (AMSI) as well as compress and encrypt the primary payload to achieve heightened security evasion. This article continues to discuss the FUD malware obfuscation engine BatCloak.

    THN reports "Cybercriminals Using Powerful BatCloak Engine to Make Malware Fully Undetectable"

  • news

    Visible to the public "Hackers Steal $3 Million by Impersonating Crypto News Journalists"

    A hacking group identified as "Pink Drainer" impersonates journalists in phishing attacks to compromise Discord and Twitter accounts in order to steal cryptocurrency. According to ScamSniffer analysts, Pink Drainer effectively compromised the accounts of 1,932 victims to steal approximately $2,997,307 worth of digital assets on the Mainnet and Arbitrum. The on-chain monitoring bots used by ScamSniffer found the threat actor when they stole $327,000 worth of NFTs from a single victim. The CTO of OpenAI Mirai Murati, Steve Aoki, Evmos, Pika Protocol, Orbiter Finance, LiFi, Flare Network, Cherry Network, and Starknet are believed to be recent targets. Pink Drainer hijacks accounts through social engineering, in which the threat actors spend a few days impersonating journalists from major media outlets such as Cointelegraph and Decrypt in order to conduct fake interviews with the victims. This article continues to discuss the Pink Drainer hacking group impersonating journalists in phishing attacks to compromise Discord and Twitter accounts for cryptocurrency-stealing attacks.

    Bleeping Computer reports "Hackers Steal $3 Million by Impersonating Crypto News Journalists"

  • news

    Visible to the public "Fortinet Patches Pre-auth RCE, Update Your Fortigate Firewalls ASAP!"

    Fortinet has released multiple versions of FortiOS, the operating system/firmware powering its Fortigate firewalls and other devices. They contain a fix for CVE-2023-27997, a Remote Code Execution (RCE) vulnerability that an unauthenticated attacker can exploit. The vulnerability has been patched in FortiOS versions 7.2.5, 7.0.12, 6.4.13, and 6.2.15, and also in v6.0.17. Enterprise administrators are urged to upgrade Fortigate devices as soon as possible. If attackers are not already abusing the flaw, it is likely that it will be exploited soon. This article continues to discuss the RCE flaw and the importance of patching quickly.

    Help Net Security reports "Fortinet Patches Pre-auth RCE, Update Your Fortigate Firewalls ASAP!"

  • news

    Visible to the public "Cl0P Gang Sat on Exploit for MOVEit Flaw for Nearly 2 Years"

    The Cl0p ransomware group lingered on a zero-day vulnerability it discovered in Progress Software's MOVEit Transfer file transfer application for nearly two years before beginning to exploit it. During this holding period, group members launched periodic waves of malicious activity against vulnerable systems to test their access to organizations and determine which ones to target. Kroll Threat Intelligence researchers who investigated the recent attacks discovered evidence that Cl0P actors were experimenting with exploiting the MOVEit Transfer vulnerability as early as July 2021. Kroll's examination of Microsoft Internet Information Services (IIS) logs belonging to clients impacted by the attacks uncovered evidence of the threat actors undertaking similar activity in April 2022 and twice last month. This article continues to discuss the Cl0p ransomware group sitting on a zero-day vulnerability discovered in Progress Software's MOVEit Transfer file transfer app for nearly two years.

    Dark Reading reports "Cl0P Gang Sat on Exploit for MOVEit Flaw for Nearly 2 Years"

  • news

    Visible to the public "Unmasking AI with a Single Question"

    CAPTCHA, which stands for "Completely Automated Public Turing test to tell Computers and Humans Apart," does what its name suggests: distinguishing between humans and robots. However, Artificial Intelligence (AI) technology is advancing rapidly, with modern AI systems, such as ChatGPT, making headlines for their capability to convincingly mimic human-generated content. It becomes increasingly difficult to design questions that are simple for humans to answer but challenging for machines as AI becomes more sophisticated. Researchers at the University of California, Santa Barbara, are participating in this cybersecurity arms race by formulating questions designed to unmask AI. They are exploiting the differences between how humans and machines process data. In a recent study, the researchers asked humans and AIs various types of questions, scoring both groups based on the accuracy of their answers. One question type, noise injection, had a 100 percent success rate for humans and a 0 percent success rate for AIs, including ChatGPT. This article continues to discuss the study "Bot or Human? Detecting ChatGPT Imposters with A Single Question."

    Harvard University reports "Unmasking AI with a Single Question"

  • news

    Visible to the public "Researchers Work to Fulfill Promise of Resilient Autonomous Control Systems"

    The primary objective of the Resilient, Autonomous, Networked Control Systems (RANCS) Research Group at the University of South Florida is to make the world smarter by investing in the autonomy of Networked Control Systems (NCSs). However, while autonomy provides significant benefits, it also introduces potential system safety and security risks. Therefore, the lab emphasizes the resilience of NCSs, ensuring that these systems can effectively withstand and recover from disruptions. RANCS are a new type of control system designed to be more reliable and adaptable than traditional control systems. They consist of features, such as autonomous decision-making, networked communication, and resilient design that enable them to operate in complex and quickly changing environments. For example, a RANCS could be used to safely navigate a self-driving car's route. In this situation, the RANCS would be required to make autonomous navigational judgments, such as when to change lanes or stop at a red light. To prevent accidents, the autonomous vehicle would also need to communicate with other vehicles and infrastructure. In addition, the system would need to be resilient against failures, including sensor malfunctions, software bugs, and cyberattacks. This article continues to discuss the RANCS Research Group at the University of South Florida and the lab's emphasis on making autonomous control systems resilient to cyberattacks and other failures.

    The University of South Florida reports "Researchers Work to Fulfill Promise of Resilient Autonomous Control Systems"

  • news

    Visible to the public "The Rise of the Traffers Ecosystem and Why You Need to Know About It"

    Traffers stem from the ecosystem of credential theft, posing a threat to businesses. The theft of credentials is a significant problem for companies. According to a recent IBM report on data breaches, compromised credentials were the primary vector of attack for the breaches examined. Although efforts have been made to secure sensitive information, data breaches are all too common, with threat actors selling much of the stolen data for profit. This has resulted in an increase in Initial Access Brokers (IABs), the growth of ransomware groups, a rise in malware prices, and an evolution in the credential theft ecosystem influenced by the recent formation and advancement of traffers. Traffers are more specialized than your typical hacker. They are organized groups of threat actors operating in a pyramid-like structure. Traffers usually use malware stealers to conduct their attacks. The information they steal is sold or used for other malicious activities. This article continues to discuss what traffers are, how they steal sensitive information, and what makes them unique.

    Continuity Central reports "The Rise of the Traffers Ecosystem and Why You Need to Know About It"

  • news

    Visible to the public "MIT Researchers Make Language Models Scalable Self-Learners"

    A group of researchers at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) devised an approach to the long-standing issues of privacy and inefficiency associated with Large Language Models (LLMs). They came up with a logic-aware model that outperforms its 500-times-larger counterparts on some language-understanding tasks without human-generated annotations, while maintaining privacy and robustness. LLMs, which have demonstrated some promising capabilities in generating language, art, and code, are computationally costly, and their data requirements pose privacy risks when using Application Programming Interfaces (APIs) to upload data. This article continues to discuss the MIT researchers' work that paves the way for more sustainable and privacy-preserving Artificial Intelligence (AI) technologies.

    MIT News reports "MIT Researchers Make Language Models Scalable Self-Learners"

  • news

    Visible to the public "Google Launches Secure AI Framework to Help Secure AI Technology"

    Google has announced the launch of the Secure AI Framework (SAIF), which is a conceptual framework for securing Artificial Intelligence (AI) systems. Google, the owner of the generative AI chatbot Bard and parent company of the AI research lab DeepMind, emphasized the importance of having a framework across the public and private sectors to ensure that responsible actors protect the technology supporting AI advancements. When AI models are implemented, they should be secure by default. The tech giant noted that its new framework concept is an essential step in this direction. The SAIF aims to help mitigate risks unique to AI systems, such as model theft, poisoning of training data, malicious inputs via prompt injection, and the extraction of confidential information from training data. Google stated that adhering to a bold and responsible framework will be even more important as AI capabilities become increasingly integrated into products. This article continues to discuss the launch and goals of the SAIF.

    CSO Online reports "Google Launches Secure AI Framework to Help Secure AI Technology"

  • news

    Visible to the public "Top Vulnerabilities So Far of 2023: Apache Superset, Papercut, MOVEit and, Yes, ChatGPT"

    It is no longer possible to patch everything because security teams are significantly overwhelmed with managing vulnerabilities. Due to the current skills gap, security teams with inadequate staffing must prioritize the most necessary patches for their organization. Therefore, Rezilion published a blog describing the top seven vulnerabilities of the first half of 2023. The research emphasized that it is challenging to determine which vulnerability to address first because so much depends on the type of business and technology being handled and how employees use applications. Rezilion noted that, as a general rule, security teams should focus on the recent Apache Superset, Papercut, MOVEit, and ChatGPT vulnerabilities. This article continues to discuss the top six or seven vulnerabilities of the first half of 2023.

    SC Media reports "Top Vulnerabilities So Far of 2023: Apache Superset, Papercut, MOVEit and, Yes, ChatGPT"

  • news

    Visible to the public "Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks"

    A new backdoor called "Stealth Soldier" has been used in a series of highly-targeted espionage attacks in North Africa. According to researchers at Check Point, Stealth Soldier malware is a custom backdoor that mainly carries out surveillance processes such as file exfiltration, screen and microphone recording, keystroke logging, and browser information theft. The ongoing operation involves command-and-control (C2) servers that impersonate sites belonging to the Libyan Ministry of Foreign Affairs. October 2022 is when the earliest artifacts associated with the campaign were discovered. The attacks begin with potential targets downloading fraudulent downloader binaries that are delivered via social engineering attacks and serve as a conduit for retrieving Stealth Soldier. In addition, the Stealth Soldier infrastructure overlaps with infrastructure associated with the Eye on the Nile phishing campaign, which targeted Egyptian journalists and human rights activists in 2019. This article continues to discuss findings regarding Stealth Soldier malware.

    THN reports "Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks"

  • news

    Visible to the public "PoC Released for Windows Win32k Bug Exploited in Attacks"

    Researchers have published a proof-of-concept (PoC) exploit for an actively exploited Windows local privilege escalation flaw. The Win32k subsystem manages the operating system's window manager, screen output, input, and graphics, as well as functions as an interface between various types of input hardware. Therefore, exploiting vulnerabilities of this type typically results in elevated privileges or code execution. Avast discovered the vulnerability, tracked as CVE-2023-29336, with a CVSS score of 7.8. It allows low-privileged users to gain Windows SYSTEM privileges. Avast reported that they noticed the vulnerability after it had been actively exploited in zero-day attacks. The Cybersecurity and Infrastructure Security Agency (CISA) published an alert and added the vulnerability to its "Known Exploited Vulnerabilities" catalog. A month after a patch became available for the flaw, security analysts at the Web3 cybersecurity company Numen released complete technical details of the vulnerability and a PoC exploit for Windows Server 2016. This article continues to discuss the release of a PoC exploit for the Windows Win32k bug.

    Bleeping Computer "PoC Released for Windows Win32k Bug Exploited in Attacks"

  • news

    Visible to the public "Factors Influencing IT Security Spending"

    According to Netrix Global, security executives want more Artificial Intelligence (AI) solutions in 2023 to help them combat the expanding cybersecurity threat landscape. Twenty-two percent of respondents want to see AI increasingly used in cybersecurity this year, nearly five times more than automation, which came in second (5 percent), followed by threat detection (4 percent), enhanced cloud security (4 percent), and authentication methods (4 percent). When examining other findings regarding spending decisions, security executives believe supply chain issues and a growing distributed workforce will have a greater impact on Information Technology (IT) security spending in 2023 than the looming recession. The study found that only 38 percent of executives believe the recession will significantly impact their IT security spending this year. This article continues to discuss key findings from the Netrix Global 2023 Cybersecurity Outlook Research Report.

    Help Net Security reports "Factors Influencing IT Security Spending"