News Items

  • news

    Visible to the public "Cybercrooks Scrape OpenAI API Keys to Pirate GPT-4"

    Recently, the moderators of the r/ChatGPT Discord channel banned a script kiddie who shared stolen OpenAI Application Programming Interface (API) keys with hundreds of other users. API keys enable developers to integrate OpenAI's technologies into their own applications, specifically its most recent Large Language Model (LLM), GPT-4. However, developers often forget their keys in their code, making account theft a simple matter of clicking. Since March, the script kiddie by the name "Discodtehe" has been scraping API keys from source code published on the software collaboration platform Replit. The individual provided free access to the keys on r/ChimeraGPT, where over 800 users began racking up usage charges on the compromised accounts. Discodtehe is no longer on Discord or Reddit, but experts emphasize that tens of thousands of exposed API keys are still in the open. This article continues to discuss the script kiddie who was freely sharing stolen OpenAI API keys with hundreds of other users and how developers can protect their API secrets.

    Dark Reading reports "Cybercrooks Scrape OpenAI API Keys to Pirate GPT-4"

  • news

    Visible to the public "Detecting and Grouping Malware Using Section Hashes"

    As technological advancement continues to accelerate, nation-states and unaffiliated individuals are quickly developing new malicious computer viruses to exploit computer system vulnerabilities and achieve their political and personal goals. To protect against these attacks, cybersecurity companies use various methods to prevent malware from entering systems. Current malware detection systems scan elements in a file or evaluate the file as a whole. According to new research, other avenues exist for detecting malware, specifically by dividing the file into sections and comparing the resulting pieces. A team of researchers developed an approach involving taking a set of known malware files and using their section hashes to identify and analyze other candidate files in a malware repository. This article continues to discuss the team's approach to detecting and grouping malware.

    Software Engineering Institute - Carnegie Mellon University reports "Detecting and Grouping Malware Using Section Hashes"

  • news

    Visible to the public "What Businesses Need to Know About the EU IoT Bill"

    The Cyber Resilience Act is Europe's proposed legislation that will establish minimum cybersecurity standards for connected devices and require updates to products throughout their lifespan. This legislation will be a significant victory for consumers and their cybersecurity posture. However, implementing the changes calls for hardware and software makers to take action, and those not in compliance will be subject to severe penalties. The Cyber Resilience Act aims to protect consumers and businesses against insecure connected devices. This legislation requires setting cybersecurity measures for "products with digital elements." It goes far beyond the cybersecurity standards established by not-for-profits, such as the European Telecommunications Standards Institute (ETSI), and it will be enforced throughout Europe. The proposal's main objectives are to improve the security of digital products, create a cohesive cybersecurity framework for hardware and software producers, bring transparency to security features, and more. This article continues to discuss the Cyber Resilience Act, some criticisms of the legislation, and what businesses should do now to prepare for the act's enforcement.

    Security Boulevard reports "What Businesses Need to Know About the EU IoT Bill"

  • news

    Visible to the public "Hacking Group Seen Mixing Cybercrime and Cyber Espionage"

    A hacking group aligned with Belarusian government interests appears to combine cybercrime and cyber espionage. According to a new report by malware researcher Matthieu Faou at the security company ESET, the group known as "Asylum Ambuscade" has been involved in cybercrime and cyber espionage since 2020. Faou noted that it is uncommon to find a cybercriminal group conducting dedicated cyber espionage. In regard to cybercrime, the group primarily targets individual banking consumers, cryptocurrency traders, and small and midsize businesses (SMBs), mainly in North America and Europe. According to ESET, the number of victims exceeds 4,500. While the purpose of targeting cryptocurrency traders is quite apparent, which is the theft of cryptocurrency, ESET says it is unclear how Asylum Ambuscade monetizes its access to SMBs. The group may sell access to other crimeware groups that might, for example, deploy ransomware, but there are no indications that this is occurring. Regarding espionage, ESET reported that the group has primarily focused on European and Central Asian targets. This article continues to discuss observations regarding the Asylum Ambuscade hacking group.

    BankInfoSecurity reports "Hacking Group Seen Mixing Cybercrime and Cyber Espionage"

  • news

    Visible to the public "Zipper Giant YKK Confirms Cyberattack Targeted US Networks"

    The Japanese zipper giant YKK confirmed that hackers recently targeted its US operations but stated that it was able to contain the threat before any harm was done. According to Jessica Kennett Cork, vice president of corporate communications at YKK Corporation of America, the incident had no material impact on the company's operations or capacity to continue serving customers. YKK has over 44,000 employees worldwide and an annual revenue of more than $6 billion. It is the largest manufacturer of zippers in the world, but it also manufactures other fastening products, industrial machinery, and plastic goods. The company did not respond to follow-up questions regarding the nature of the cyberattack and whether a ransom was demanded. However, on June 2, the LockBit ransomware group posted the company on its leak site, threatening to release data stolen from YKK by June 16. The gang posted YKK along with other victim organizations. The group continues to be the most prolific ransomware operation globally, launching over twice as many attacks as its competitors. This article continues to discuss the cyberattack against the Japanese zipper giant YKK and the LockBit ransomware group posting the company on its leak site.

    The Record reports "Zipper Giant YKK Confirms Cyberattack Targeted US Networks"

  • news

    Visible to the public "Researcher Explores Vulnerabilities of AI Systems to Online Misinformation"

    A researcher at the University of Texas at Arlington is working to improve the security of Natural Language Generation (NLG) systems, such as those used by the Artificial Intelligence (AI)-driven chatbot ChatGPT, to prevent misuse and abuse that could lead to the spread of false information online. The National Science Foundation (NSF) awarded Shirin Nilizadeh, an assistant professor in the Department of Computer Science and Engineering, a five-year, $567,609 Faculty Early Career Development Program (CAREER) grant for her research. She emphasized the importance of understanding AI's vulnerability to online misinformation, a pressing issue that must be addressed. Nilizadeh's research will include an in-depth examination of the types of attacks that NLG systems are susceptible to, as well as the development of AI-based optimization techniques to test the systems against various attack models. In addition, she will conduct an analysis and characterization of the vulnerabilities that contribute to attacks and develop protective measures for NLG systems. The focus will be on two common NLG methods: summarization and question-answering. This article continues to discuss Nilizadeh's research aimed at increasing the security of NLG systems.

    The University of Texas at Arlington reports "Researcher Explores Vulnerabilities of AI Systems to Online Misinformation"

  • news

    Visible to the public "Protecting Against Remote Monitoring and Management Phishing"

    Organizations use Remote Monitoring and Management (RMM) software to closely monitor their cyber environment and maintain security. However, cybercriminals are specifically targeting these applications, making legitimate software vulnerable. This is the latest type of disruptive software supply chain attack in a recent upward trend. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning regarding the malicious use of legitimate RMM software. Last year, cybercriminals launched a phishing campaign to convince companies to download RMM software. While ScreenConnect (now ConnectWise Control) and AnyDesk RMM were used in this particular scheme, organizations should be wary of other tools in the future as criminals adapt to new software vectors. This article continues to discuss cybercriminal schemes involving RMM software and CISA's recommendations for protecting against them.

    Security Intelligence reports "Protecting Against Remote Monitoring and Management Phishing"

  • news

    Visible to the public "Casepoint Attackers: We Have Meta and Google Comms With Special Services"

    The ALPHV/BlackCat ransomware gang claims to have accessed a trove of sensitive data, including the credentials of special agents and how tech giants respond to requests for information from special services. The attackers claim that a recent breach of the legal technology platform Casepoint allowed them access to 2TB of sensitive data, including law enforcement's interactions with tech companies such as Google and Facebook's parent company, Meta. In May, the Russia-linked ALPHV/BlackCat ransomware group allegedly breached Casepoint, which the US Courts, the Security Exchanges Commission (SEC), and the Department of Defense (DOD) use. The ALPHV/BlackCat ransomware gang was first observed in 2021. The group, like many others in the criminal underworld, maintains a Ransomware-as-a-Service (RaaS) business, selling criminals malware subscriptions. The gang's use of the programming language Rust was notable. According to a Microsoft analysis, the threat actors who began deploying it were also associated with other prominent ransomware families, including Conti, LockBit, and REvil. This article continues to discuss the ALPHV/BlackCat ransomware gang claiming to have accessed 2TB of sensitive information through the Casepoint breach as well as the history of this group.

    Cybernews reports "Casepoint Attackers: We Have Meta and Google Comms With Special Services"

  • news

    Visible to the public "Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data"

    A researcher named Eaton Zveare has recently disclosed the details of serious vulnerabilities discovered in a Honda ecommerce platform used for equipment sales. Exploitation of the flaws could have allowed an attacker to gain access to customer and dealer information. Zveare notified Honda about his findings in mid-March. The vendor immediately took steps to address the issues and thanked the white hat hacker for his work but did not reward him as it does not have a bug bounty program. Honda said it did not find any evidence of malicious exploitation. While Honda is best known for its cars, the ecommerce platform analyzed by Zveare is designed for the sales of Honda power equipment (generators, pumps, lawnmowers), boat engines, and accessories. The researcher noted that the platform powers Honda Dealer Sites, a service that dealers can use to create websites where they sell Honda products. Dealers need to create an account and are then provided with all the tools they need to create a website, promote it, and handle product orders. Zveare discovered a password reset API vulnerability in an admin dashboard that allowed him to reset the password of a test account set up by Honda. While that only gave him access to the test account, he discovered an insecure direct object references (IDOR) vulnerability that gave him access to every dealer's data simply by changing the value of an ID in the admin panel's URL. From the dealer admin dashboard, he was also able to elevate privileges to the administrator of the entire platform using a specially crafted request. Zveare noted that this administration panel provided an overview of the dealer network, including the amount of money earned in subscription fees. Zveare said he had gained access to more than 21,000 customer orders ranging from 2016 to 2023, including name, address, phone number, and information on the ordered items. The vulnerabilities also exposed 1,500 dealer sites that could have been modified by the attacker. Zveare also found more than 3,500 dealer accounts for which he could have changed the password, roughly 1,000 dealer email addresses, and 11,000 customer email addresses. He believes it may have also been possible to obtain the private keys provided by some dealers for payment services such as PayPal, Stripe, and Authorize[.]net.

    SecurityWeek reports: "Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data"

  • news

    Visible to the public "Cyber Extortion Activity Jumps to New Record in Q1 2023"

    Orange Cyberdefense's Cy-Xplorer 2023 report analyzed cyber extortion activity during 2022. Data from 6,707 confirmed business victims reveals a fluctuation in the number of victims across different countries and industries, as well as the expansion of attacks into new regions. While the data indicate an 8 percent decrease in cyber extortion victims in 2022, this decrease appears to have been temporary, as the latest data shows the highest volumes to date in the first quarter of 2023. According to the report, 2022 was the year of 'distraction' and rebranding for some of the most noteworthy cyber extortion operations that Orange Cyberdefense monitors. The geographical shift of cyber extortion attacks has greatly impacted Indonesia, Singapore, Thailand, the Philippines, and Malaysia. The number of victims has decreased in regions including North America and Europe. Orange Cyberdefense has previously observed that countries are primarily targeted opportunistically and that the number of victims largely depends on the number of registered organizations in a country. This general trend is, however, shifting as larger Western countries respond actively to the threat and as threat actors are forced to find new hunting grounds. Threat actors are increasingly focusing on regions where they perceive a lower level of risk for them, which may be partly due to local governments' inaction. This article continues to discuss key findings from Orange Cyberdefense's report on cyber extortion activity.

    Continuity Central reports "Cyber Extortion Activity Jumps to New Record in Q1 2023"

  • news

    Visible to the public "Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack"

    Japanese pharmaceutical giant Eisai recently announced that it had fallen victim to a ransomware attack that forced it to take certain systems offline. Headquartered in Tokyo, the company has manufacturing facilities in Asia, Europe, and North America and has subsidiaries on both American continents, in Asia-Pacific, Africa, and Europe. Last year, the company reported more than $5 billion in revenue. The company stated that the incident was identified on June 3rd and resulted in the encryption of multiple servers. Eisai says it immediately implemented its incident response plan, which involved taking systems offline to contain the attack, and launched an investigation. The company stated that the attack impacted servers both in Japan and overseas, including logistics systems, which are yet to be restored. The company's corporate websites and email systems remain operational. Eisai says it has yet to determine whether any data was compromised or stolen during the attack.

    SecurityWeek reports: "Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack"

  • news

    Visible to the public "Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions"

    Cisco recently announced patches for a critical vulnerability in its Expressway series and TelePresence Video Communication Server (VCS) enterprise collaboration and video communication solutions. Tracked as CVE-2023-20105 (CVSS score of 9.6), the vulnerability allows an administrator with "read-only" rights to elevate their privileges to "read-write." The company noted that the issue exists because password change requests are not handled properly, allowing an attacker authenticated as a "read-only" administrator to send a crafted request to change the password for any user account on the system, including that of a "read-write" administrator, and then impersonate them. Cisco noted that its Expressway series and TelePresence VCS deployments that have granted CLI access to a "read-only" administrator are also vulnerable to CVE-2023-20192, a high-severity vulnerability that can lead to privilege escalation. According to Cisco, CLI access is disabled by default for "read-only" users. Cisco noted that this vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a "read-only" CLI administrator and issuing commands normally reserved for administrators with "read-write" capabilities. Cisco stated that an attacker could exploit this flaw to execute commands they would not normally have access to, including modifying system configuration parameters. Expressway series and TelePresence VCS version 14.2.1 contains patches for CVE-2023-20105, while version 14.3.0 addresses CVE-2023-20192.

    SecurityWeek reports: "Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions"

  • news

    Visible to the public "Interpol: Human Trafficking is Fueling Fraud Epidemic"

    Interpol has recently issued a global warning about the growing number of human trafficking victims being forced to work in online fraud "centers" in South-East Asia. The policing organization claimed that trafficking hubs have spread from Cambodia, Laos, and Myanmar to at least four more countries in the region. Interpol noted that victims are typically lured by ads on social media and recruitment sites promising lucrative jobs. However, Interpol stated that "when they arrive in Asia, they are subject to forced labor, debt bondage, beatings, sexual exploitation, torture, rape, and organ harvesting." The trafficked victims are also forced to work on investment fraud, romance scams, and fraud linked to online gambling, all schemes with global victims. Interpol stated that they are particularly concerned about the threat, which first emerged in 2021, as it appears to have spread from a focus on Chinese-speaking victims based in China, Malaysia, Thailand, and Singapore, to individuals as far afield as South America, East Africa, and Western Europe. Language translation software is being used to help target victims in countries that have so far escaped the recruitment drive.

    Infosecurity reports: "Interpol: Human Trafficking is Fueling Fraud Epidemic"

  • news

    Visible to the public "Barracuda Urges Immediate Replacement of Hacked ESG Appliances"

    The enterprise security company Barracuda urges customers affected by a recently disclosed zero-day vulnerability in its Email Security Gateway (ESG) appliances to replace them immediately. Regardless of patch version level, impacted ESG appliances must be replaced, the company emphasized in an update. Barracuda disclosed a critical flaw in the devices, tracked as CVE-2023-2868 with a CVSS score of 9.8. It has been exploited as a zero-day for at least seven months since October 2022 to deliver custom malware and steal data. The vulnerability is a case of remote code injection that affects versions 5.1.3.001 through 9.2.0.006 and is caused by incomplete validation of attachments within incoming emails. Barracuda addressed it on May 20 and May 21, 2023. This article continues to discuss Barracuda urging customers impacted by a recently disclosed zero-day flaw in its ESG appliances to replace them immediately.

    THN reports "Barracuda Urges Immediate Replacement of Hacked ESG Appliances"

  • news

    Visible to the public "Royal Ransomware Gang Adds BlackSuit Encryptor to Their Arsenal"

    The Royal ransomware gang is testing a new encryptor called "BlackSuit," similar to the operation's standard encryptor. Royal started in January 2023, and is suspected to be the direct successor to the Conti operation, which shut down in June 2022. Royal ransomware has become one of the most active operations, responsible for several attacks on businesses. There have been talks since late April that the Royal ransomware operation was preparing to rebrand under a new name. The group began to feel pressure from law enforcement following their attack on the City of Dallas, Texas. In May, researchers found a new BlackSuit ransomware campaign that used its own branded encryptor and Tor negotiation sites. This was thought to be the ransomware operation that the Royal ransomware group would rebrand as. However, no rebranding occurred, and Royal is still operating while using BlackSuit in limited attacks. This article continues to discuss the Royal ransomware gang testing the BlackSuit encryptor.

    Bleeping Computer reports "Royal Ransomware Gang Adds BlackSuit Encryptor to Their Arsenal"

  • news

    Visible to the public "0mega Ransomware Gang Changes Tactics"

    Some ransomware groups have abandoned deploying malware to encrypt targets' files in favor of the data theft/extortion approach. Among them appears to be 0mega, a low-profile and seemingly low-active threat actor. 0mega is a newcomer to the ransomware/extortion business. Evidence of the gang's operations was initially discovered about a year ago, when one victim, a UK-based electronics repair and refurbishment company, refused to pay the demanded ransom, and the group leaked the company's data on its dedicated leak site. The group used ransomware that added the ".0mega" extension to encrypted files, but no sample of the malware has been discovered yet. Since then, the stolen data of two more victims has been exposed. However, the fact that the leak site only reveals a few victims does not mean that there are not many more. Data from one victim organization was disclosed and then removed. This article continues to discuss findings and observations regarding the 0mega ransomware operation.

    Help Net Security reports "0MEGA Ransomware Gang Changes Tactics"

  • news

    Visible to the public "Minecraft Malware Spreading Through Mods, Plug-ins"

    Minecraft players should avoid installing new mods or plug-ins as cybersecurity researchers work to find a solution to the malware wreaking havoc on the game. A worm virus called "fracturizer" has been discovered embedded in popular Minecraft modpacks, which combine multiple game themes and are then used by gamers to change between different mods, providing the player additional experience options but also aiding malware distribution. The malware is described as "incredibly dangerous" in the fracturizer GitHub project, and any infected machine should be assumed to be entirely compromised by the threat actors behind the virus. Contributing GitHub researchers discovered the malicious files dating back to April and some from back to 1999. This article continues to discuss the fracturize worm virus found embedded in popular Minecraft modpacks.

    Dark Reading reports "Minecraft Malware Spreading Through Mods, Plug-ins"

  • news

    Visible to the public "Fitness App Loophole Allows Access to Home Addresses"

    Despite efforts to anonymize user data, the fitness app Strava allows anyone to find personal information, such as the home addresses of some users. The finding, which is detailed in a recent study from North Carolina State University, raises serious privacy concerns. This could be problematic for users concerned about stalkers or have other reasons for wanting to keep their location information private. Strava is a mobile fitness-tracking app that enables users to track their exercise activities and includes features that facilitate user interaction. These capabilities can be used to organize clubs based on common interests, such as hiking or cycling. For example, the app contains a "heatmap" function that aggregates user data. Although all user data is anonymized, the heatmap feature allows users to see how many other Strava users hike, run, or ride bicycles in a particular area. This article continues to discuss key findings from the study "Heat Marks the Spot: De-Anonymizing Users' Geographical Data on the Strava Heatmap."

    North Carolina State University reports "Fitness App Loophole Allows Access to Home Addresses"

  • news

    Visible to the public "First in Space: SpaceX and NASA Launch Satellite That Hackers Will Attempt to Infiltrate During DEF CON"

    At the Kennedy Space Center in Florida, SpaceX and NASA launched a satellite into low-earth orbit with the hope that it will be hacked. Multiple cubesats, which are small square-shaped satellites, were attached to the SpaceX rocket launched for a resupply mission to the International Space Station. One of these cubesats, called "Moonlighter," will serve as an experimental "hacking sandbox." Later this year, security researchers will use this sandbox as part of a competition at the annual DEF CON hacking conference in Las Vegas. Teams will try to infiltrate it to identify satellite vulnerabilities and improve space cybersecurity. Moonlighter represents the latest iteration of the Hack-A-Sat competition, which has been hosted by the Air Force since 2020 as a multi-year effort to increase collaboration with cybersecurity researchers. However, the last three capture-the-flag competitions were all simulations. They wanted to take the competition to a whole new level this year. This article continues to discuss researchers being able to test the security of a satellite on-orbit at this year's Hack-A-Sat contest at DEF CON for the first time ever, as well as the importance of securing space systems.

    CyberScoop reports "First in Space: SpaceX and NASA Launch Satellite That Hackers Will Attempt to Infiltrate During DEF CON"

  • news

    Visible to the public "Preparing for the Future of CAVs: Cybersecurity, Winter Weather Research"

    Connected and automated vehicles (CAVs) promise to improve transportation operations, but they may also present avenues for malicious actors to undermine vehicle security, according to Rafael Stern, an assistant professor at the University of Minnesota. CAVs open up numerous possibilities for cyberattacks. If a malicious actor is familiar with the software that a CAV uses to make decisions, they can modify the vehicle's driving behavior. In one experiment, researchers demonstrated that a STOP sign could be changed with tape in a way that makes the vehicle read it as 45 MPH. These hacks would be detected and corrected promptly, but more subtle cyberattacks that cause little variations in driving behaviors on any one car, could have far-reaching consequences while remaining practically undetectable. This article continues to discuss the cybersecurity of CAVs.

    The University of Minnesota reports "Preparing for the Future of CAVs: Cybersecurity, Winter Weather Research"

  • news

    Visible to the public "Car Thieves Are Using Increasingly Sophisticated Methods, and Most New Vehicles Are Vulnerable"

    AA Insurance Services reported that car theft is on the rise. Thieves increasingly use high-tech tools to exploit vulnerabilities in sensors and computerized systems designed to make travel safer and more comfortable. Criminals now use sensors, computers, and data aggregation systems to steal cars. Recent reports have shown how criminals can gain access to Electronic Control Units (ECUs). Ian Tabor, a cybersecurity consultant for the engineering services company EDAG Group, experienced what first appeared to be a case of senseless vandalism to his Toyota RAV4. However, when the vehicle disappeared, it became apparent that the damage had been part of a sophisticated car theft scheme. In this instance, the thieves removed the car's front bumper to access the ECU, which in turn, provided access to the Controller Area Network (CAN bus). The CAN bus is the primary interface for ECUs to communicate with one another. In the case of Tabor, gaining access to the CAN bus enabled the criminals to inject their messages into the vehicle's electronic systems. These false messages were designed to fool the car's security systems into believing that a valid key was present. Without the key fob, the car doors unlocked, the engine could be started, and the vehicle was able to be driven away. This article continues to discuss the security vulnerabilities that leave cars susceptible to theft.

    The Conversation reports "Car Thieves Are Using Increasingly Sophisticated Methods, and Most New Vehicles Are Vulnerable"

  • news

    Visible to the public "Microsoft Outlook Hackers Threaten ChatGPT Next"

    The pro-Russian hackers, who claim to have brought down Microsoft Outlook as part of an ongoing campaign against the US, warn that OpenAI's ChatGPT is next on their hit list. Anonymous Sudan has claimed responsibility for a series of intermittent Distributed Denial-of-Service (DDoS) attacks recently launched against the Microsoft 365 information management platform. The group's encrypted Telegram channel has dozens of threat posts identifying Microsoft as their most recent high-profile target. This article continues to discuss Anonymous Sudan claiming to have taken down Microsoft Outlook and its plans to target OpenAI's ChatGPT next, as well as the hacktivist gang's other recent activities.

    Cybernews reports "Microsoft Outlook Hackers Threaten ChatGPT Next"

  • news

    Visible to the public "Ascension Seton Investigating Website Data Breach"

    Ascension Seton recently announced that it was investigating a data breach involving the healthcare system's legacy website that happened on March 1-2, 2023. The company said the website was managed by a third-party vendor, Vertex, who is reviewing how access to the information was obtained. Ascension stated that it does not have details about the affected information but said demographic information such as name, address, email address, phone number, insurance information, Social Security number (or tax identification number), or other clinical information was affected if it was provided on the legacy websites, Seton[.]net and DellChildrens[.]net. The company noted that they do not believe any information was removed from the affected systems or was misused or shared. Ascension networks and medical record systems were not affected. Vertex has notified law enforcement about the breach. Ascension said affected individuals have been notified, and complimentary credit and identity theft protection services have been provided for those who had Social Security numbers, credit card information, and/or insurance numbers impacted. The incident has been reported to the Office for Civil Rights in accordance with obligations under the HIPAA rules.

    KVUE-TV Austin reports: "Ascension Seton Investigating Website Data Breach"

  • news

    Visible to the public "San Diego Schools Hack Worse Than Initially Believed"

    It was recently discovered that a data breach at the San Diego Unified School District last fall affected more people and more types of personal data than previously acknowledged. In addition to students' medical information, the breach in October also affected current and former employees' sensitive personal data, including Social Security numbers, direct deposit account information, medical information, and more, said the district's executive director of risk services, Dennis Monahan. Monahan stated that an additional investigation had revealed those findings in April and that the district had implemented additional security safeguards to help prevent another breach. The district did not immediately respond to questions about how many people have been affected or notified, whether the investigation is ongoing, or what specific security safeguards and controls it has implemented. Families were first informed in early December that a third party had accessed some of the district's systems on Oct. 25. District officials said staff quickly secured the network, launched an investigation, and notified law enforcement.

    Government Technology reports: "San Diego Schools Hack Worse Than Initially Believed"

  • news

    Visible to the public "Over 60,000 Android Apps Infected With Adware-Pushing Malware"

    Bitdefender has discovered a hidden malware campaign on mobile devices worldwide that remained undetected for over six months. The campaign distributes adware to Android devices in order to generate revenue. Bitdefender noted that the threat actors behind the campaign could easily change tactics to redirect users to other types of malware, such as banking Trojans or ransomware. The cybersecurity company has discovered over 60,000 different Android apps infected with adware and believes there are many more. The malware has been active at least since October 2022, targeting users in the US, South Korea, Brazil, Germany, the UK, and France. According to Bitdefender, the operation is probably completely automated due to the large number of unique samples discovered. The malware is unavailable in official stores, so the threat actor distributes it through third-party apps. This article continues to discuss findings regarding the malware campaign designed to push adware to Android devices.

    CSO Online reports "Over 60,000 Android Apps Infected With Adware-Pushing Malware"

  • news

    Visible to the public "CISA and FBI Release Advisory on CL0P Ransomware Gang Exploiting MOVEit Vulnerability"

    The Cybersecurity and Infrastructure Security Agency (CISA) and FBI have published a joint Cybersecurity Advisory (CSA) with recommended actions and mitigations to protect against and mitigate the impact of the CL0P Ransomware Gang exploiting the MOVEit vulnerability, which is tracked as CVE-2023-3436. CL0P Ransomware Gang, also known as TA505, started exploiting the previously unknown Structured Query Language (SQL) injection vulnerability in Progress Software's Managed File Transfer (MFT) solution called MOVEit Transfer in May 2023. CL0P infected Internet-facing MOVEit Transfer web applications with malware, which was then used to extract data from the underlying MOVEit Transfer databases. This article continues to discuss the joint advisory on the CL0P Ransomware Gang exploiting the MOVEit vulnerability.

    CISA reports "CISA and FBI Release Advisory on CL0P Ransomware Gang Exploiting MOVEit Vulnerability"

  • news

    Visible to the public "US, South Korean Agencies Warn of State-Sponsored Spearphishing"

    Security agencies recently issued a new cybersecurity advisory, warning of social engineering hacking threats posed by North Korean state-sponsored actors. US and South Korean law enforcement agencies warned that the Democratic People's Republic of Korea (DPRK) cyber group known as Kimsuky is targeting individuals working for research centers, think tanks, academic institutions, and news media organizations. Social engineering, in which deception is used to manipulate and exploit human error, is the primary method Kimsuky hackers apply to gather intelligence from these entities. The advisory identifies spear phishing as one of Kimsuky's most common techniques, particularly in the form of malicious emails that compromise network security. Kimsuky's use of mimicked email addresses to impersonate well-known journalists and news outlets is a notable tactic. From there, malicious actors typically send a link that falsely claims to be an article or news report and contains password-protected documents that help hackers bypass antivirus software. This article continues to discuss the latest advisory regarding the DPRK cyber group Kimsuky.

    NextGov reports "US, South Korean Agencies Warn of State-Sponsored Spearphishing"

  • news

    Visible to the public "Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability"

    Google recently announced security updates for the Android operating system to resolve over 50 vulnerabilities, including an Arm Mali GPU flaw exploited by spyware vendors. Tracked as CVE-2022-22706, the exploited bug is a kernel driver issue that Arm fixed in January 2022 but which had been targeted in attacks before that. Despite known exploitation, however, Google and other Android vendors took more than a year to incorporate the patches for CVE-2022-22706 in their software updates. Last month, Google resolved another Android bug exploited by spyware vendors as a zero-day. Tracked as CVE-2023-0266, the issue is described as a moderate-severity kernel flaw leading to privilege escalation. The June 2023 Android update is split into two. The first part, which arrives on devices as the 2023-06-01 security patch level, resolves 10 vulnerabilities in the Framework component and 13 bugs in the System component. Google noted that three of these issues are critical-severity remote code execution (RCE) flaws. They are tracked as CVE-2023-21127, CVE-2023-21108, and CVE-2023-21130. The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution over Bluetooth if HFP support is enabled, with no additional execution privileges needed. Google stated that user interaction is not needed for exploitation. The remaining 20 fixed vulnerabilities, rated "high severity," lead to escalation of privilege, information disclosure, or denial-of-service (DoS). Arriving on devices as the 2023-06-05 security patch level, the second part of Android's June 2023 update resolves 33 flaws in Arm (3 vulnerabilities), Imagination Technologies (2), Unisoc (4), Widevine DRM (2), and Qualcomm components (22).

    SecurityWeek reports: "Android's June 2023 Security Update Patches Exploited Arm GPU Vulnerability"

  • news

    Visible to the public "Research Finds Greater Societal Awareness Needed to Protect Our Privacy and Data From AI When We Die"

    A study suggests raising society's awareness of "ghostbots" and including a "Do not bot me" clause in wills and other contracts to prevent people from being digitally resurrected without their permission when they die. The term "ghostbots" refers to using Artificial Intelligence (AI) to create digital reincarnations of the deceased. Deepfakes, replicas, holographs, or chatbots that try to recreate the appearance, voice, and/or personality of deceased persons are examples of this. The paper "Governing Ghostbots" was recently published in the Computer Law and Security Review 2023. The research was conducted by Dr. Marisa McVey from Queen's University Belfast's School of Law, Dr. Edina Harbinja from Aston Law School, and Professor Lilian Edwards from Newcastle University Law School. With so much of people's lives being displayed on social media platforms, data collected from these sites could be used to imitate how a person talks, acts, and looks, even after they have passed away. Since deepfake technology aimed at digital reincarnation is becoming more commercialized, the study looked into ways to preserve people's privacy, including post-mortem privacy, property, personal data, and reputation. This article continues to discuss the study on ghostbots and protecting deceased people's privacy and data from AI.

    Queen's University Belfast reports "Research Finds Greater Societal Awareness Needed to Protect Our Privacy and Data From AI When We Die"

  • news

    Visible to the public "Cisco Counterfeiter Pleads Guilty to $100m Scheme"

    A Florida man has recently pleaded guilty to making over $100m from importing and selling counterfeit Cisco networking devices. Onur Aksoy, 39, of Miami, pleaded guilty to conspiring with others to traffic in counterfeit goods, to commit mail fraud, and to commit wire fraud and mail fraud. The Department of Justice (DoJ) stated that he is facing anywhere between four and six-and-a-half years behind bars and must forfeit $15m in illicit gains made from the scheme. The DoJ noted that Aksoy is a dual US/Turkish citizen and ran at least 19 companies in New Jersey and Florida, alongside 15 Amazon storefronts and at least ten eBay storefronts. He imported tens of thousands of knock-off Cisco networking devices from China and Hong Kong, complete with fake labels, stickers, boxes, documentation, and packaging designed to make them appear to be genuine products. The DoJ noted that these devices were older products, often previously sold or discarded, which Chinese forgers modified to make them appear newer, more expensive devices. Often, pirated Cisco software and unreliable and unauthorized components were also added, including components designed to circumvent Cisco anti-piracy checks. According to the DoJ, many of these products suffered from performance issues and, in some cases malfunctioned, causing damage to customers' networks and operations. Some recipients of the counterfeit Cisco networking devices included hospitals, schools, government agencies, and the military.

    Infosecurity reports: "Cisco Counterfeiter Pleads Guilty to $100m Scheme"

  • news

    Visible to the public "Malicious Actors Manipulating Photos and Videos to Create Explicit 'Deepfake' Content and Sextortion Schemes"

    The FBI is warning the public about malicious actors creating synthetic content, commonly known as "deepfakes," through the manipulation of harmless photographs or videos in order to target victims. Artificial Intelligence (AI)-enabled content creation continues to improve in terms of quality, customizability, and accessibility due to technological advancements. The FBI continues to receive reports from victims, including minors and non-consenting adults, whose photos or videos were modified to contain explicit content. The photos or videos are then shared publicly on social media or other websites to harass or extort victims. One of the practices the FBI recommends to the public when considering sharing content or engaging with individuals online is to apply privacy settings on social media accounts, including setting profiles and your friends lists as private, to limit the public exposure of photos, videos, and other personal information. This article continues to discuss the surge in sextortion victims reporting the use of fake images or videos created from content posted on their social media sites or web postings, as well as what the FBI recommends the public do when sharing content online.

    HSToday reports "Malicious Actors Manipulating Photos and Videos to Create Explicit 'Deepfake' Content and Sextortion Schemes"

  • news

    Visible to the public "New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency"

    A new malware campaign uses the Satacom downloader as a channel for distributing stealthy malware that can steal cryptocurrency via a malicious browser extension for Chromium-based browsers. The malware dropped by the Satacom downloader primarily aims to steal BTC from the victim's account through web injections into cryptocurrency-specific websites. The campaign's primary targets are Coinbase, Bybit, KuCoin, Huobi, and Binance users, mainly located in Brazil, Algeria, Turkey, Vietnam, Indonesia, India, Egypt, and Mexico. The Satacom downloader, also known as Legion Loader, emerged for the first time in 2019 as a dropper for next-stage payloads, such as information stealers and cryptocurrency miners. The infection chains involve users searching for cracked software and being redirected to fraudulent websites hosting ZIP archives containing the malware. According to researchers, different types of websites are used to spread the malware. Some of the malicious websites have a hardcoded download link, whereas others inject the 'Download' button via a legitimate advertising plugin. This article continues to discuss the malware campaign found to be leveraging the Satacom downloader to steal cryptocurrency.

    THN reports "New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency"

  • news

    Visible to the public "Dissecting the Dark Web Supply Chain: Stealer Logs in Context"

    Stealer logs are one of the main threat vectors for today's companies, but many security teams continue to focus on leaked credentials and are unaware of the significant threat posed by devices infected with infostealer malware. There are numerous variants of infostealer malware, but Redline, Raccoon, Vidar, and Titan are the most commonly encountered groups. This malware infects computers and exports passwords stored in the browser, as well as host data such as operating system version, IP address, clipboard data, browser history, saved credit cards, and cryptocurrency wallet data. The malware then sends this information back to the threat actor's command-and-control (C2) infrastructure. It is then distributed through specialized cybercrime Telegram channels or sold as individual listings on dark web marketplaces. This article continues to discuss stealer logs.

    Bleeping Computer reports "Dissecting the Dark Web Supply Chain: Stealer Logs in Context"

  • news

    Visible to the public "High-Risk Vulnerabilities Patched in ABB Aspect Building Management System"

    Prism Infosec discovered two high-risk vulnerabilities in ABB's Aspect Control Engine Building Management System (BMS). Users can monitor a building's performance with ABB's Aspect BMS, which combines real-time integrated control, supervision, data logging, alarms, scheduling, and network management features with Internet connectivity and web serving capabilities. Therefore, users can examine system status, change setpoints and schedules, and more through their desktop, laptop, or mobile phone devices. The two vulnerabilities impact versions before 3.07.01. They could lead to Remote Code Execution (RCE) and privilege escalation within the Aspect Control Engine software, potentially granting an attacker complete control over the BMS. This article continues to discuss the discovery and potential impact of the two high-risk vulnerabilities in the Aspect Control Engine BMS developed by ABB.

    Help Net Security reports "High-Risk Vulnerabilities Patched in ABB Aspect Building Management System"

  • news

    Visible to the public "US Aerospace Contractor Hacked With 'PowerDrop' Backdoor"

    Hackers using native Windows tools infected at least one US defense contractor with a novel backdoor, potentially paving the way for further malware implantation or worse. In a June 6 report, Adlumin researchers dubbed the backdoor "PowerDrop," after a "DRP" string used in the code and because it is based in PowerShell, a dual command shell-plus-scripting language. PowerDrop has full access to the computer because it is run through Windows PowerShell, says Kevin O'Connor, Adlumin's director of threat research. It operates with administrative privileges, allowing attackers to execute any remote command they want. This article continues to discuss hackers using native Windows tools to infect at least one US defense contractor with a novel backdoor.

    Dark Reading reports "US Aerospace Contractor Hacked With 'PowerDrop' Backdoor"

  • news

    Visible to the public "Amid Volumes of Mobile Location Data, New Framework Reduces Consumers' Privacy Risk, Preserves Advertisers' Utility"

    The use of mobile technologies to collect and analyze location information on individuals has generated large amounts of consumer location data, further supporting a complex multibillion-dollar system in which consumers can exchange personal data for economic benefits. However, consumers continue to face privacy risks. In a recent study, Machine Learning (ML) was used to develop and test a framework that quantifies personalized privacy risks, performs personalized data obfuscation, and accommodates various risks, utilities, and acceptable levels of risk-utility tradeoff. The framework outperformed previous models, significantly reducing privacy risks for consumers while preserving advertisers' utility. Researchers from Carnegie Mellon University (CMU), the University of Virginia, and New York University conducted the study. This article continues to discuss the new framework that balances privacy risks and data utilities.

    Carnegie Mellon University's Heinz College reports "Amid Volumes of Mobile Location Data, New Framework Reduces Consumers' Privacy Risk, Preserves Advertisers' Utility"

  • news

    Visible to the public "OWASP Lists 10 Most Critical Large Language Model Vulnerabilities"

    The Open Worldwide Application Security Project (OWASP) has released a list of the top 10 most critical vulnerabilities commonly found in Large Language Model (LLM) applications, emphasizing their potential impact, exploitability, and prevalence. The vulnerabilities include prompt injections, data leakage, poor sandboxing, and unauthorized code execution. This list aims to educate developers, designers, architects, managers, and organizations about the potential security risks associated with deploying and managing LLMs. The emergence of generative Artificial Intelligence (AI) chat interfaces based on LLMs and how they impact cybersecurity is an important topic of discussion. Concerns about these new technologies' risks range from the possibility of sharing sensitive corporate information with advanced self-learning algorithms to threat actors exploiting them in order to make their attacks more effective. This article continues to discuss the 10 most critical vulnerabilities found in AI applications built on LLMs.

    CSO Online reports "OWASP Lists 10 Most Critical Large Language Model Vulnerabilities"

  • news

    Visible to the public ​​​​​​​"Informing and Inspiring the Next Generation of Cyber Talent Through Competition"

    US Cyber Games kicked off the competition to identify and select the Season III US Cyber Team last week. Over the next few months, athletes aged 18 to 24 will participate in events that will culminate with the selection of the top cyber athletes in October for the Season III team to compete at the 2024 International Cybersecurity Challenge (ICC). The US Cyber Games, founded by Katzcy in collaboration with the National Initiative for Cybersecurity Education (NICE) program at the National Institute of Standards and Technology (NIST), is one of the Cybersecurity and Infrastructure Security Agency's (CISA) key partnerships aimed at inspiring and educating the next generation about pursuing careers in cybersecurity. This initiative identifies and cultivates the nation's top cyber talent, as well as emphasizes the significance of cybersecurity in the evolving digital landscape. This article continues to discuss the US Cyber Games.

    CISA reports "Informing and Inspiring the Next Generation of Cyber Talent Through Competition"

  • news

    Visible to the public "NASA Website Flaw Jeopardizes Astrobiology Fans"

    A vulnerability in NASA's astrobiology website could have led users to malicious websites by masking a dangerous URL with NASA's name. The Cybernews research team independently found an open redirect vulnerability impacting NASA's astrobiology website. Attackers could have exploited the vulnerability to redirect users to malicious websites that prompt them to enter their login credentials, credit card numbers, and other sensitive information. Open redirect vulnerabilities are critical because they enable malicious actors to conduct phishing attacks, steal credentials, and distribute malware. To prevent such incidents, the team advises website owners to validate all user input, including URLs, to ensure that only valid values are entered. This article continues to discuss the open redirect vulnerability discovered in NASA's astrobiology website, why open redirect flaws are dangerous, and how to mitigate these vulnerabilities.

    Cybernews reports "NASA Website Flaw Jeopardizes Astrobiology Fans"

  • news

    Visible to the public "Exploitation of Vulnerabilities Have Soared, Unit 42 Report Finds"

    Security researchers at Palo Alto Networks' Unit 42 discovered that the number of vulnerabilities exploited in 2022 has grown by 55% compared to 2021. The researchers noted that Linux malware emerged as a growing concern last year, particularly since 90% of public cloud instances are running on Linux. The researchers stated that botnets as the most prevalent type of Linux threat, accounting for 47% of attacks, followed by coin miners at 21% and backdoors at 11%. ChatGPT scams saw a 910% increase in monthly domain registrations, pointing to an exponential growth in fraudulent activities taking advantage of the widespread usage and popularity of AI-powered chatbots. The researchers noted that cryptominer traffic has also experienced a doubling in 2022, indicating a growing financial motive behind cybercriminal activities. The researchers also discovered that manufacturing, utilities, and energy industries witnessed a significant surge in malware attacks, particularly those targeting operational technology (OT). There was a staggering 238% increase in malware attacks experienced by organizations within these sectors between 2021 and 2022.

    Infosecurity reports: "Exploitation of Vulnerabilities Have Soared, Unit 42 Report Finds"

  • news

    Visible to the public "$10.3 Billion in Cyber Crime Losses Shatters Previous Totals"

    The most recent FBI Internet Crime Report details over 800,000 cybercrime-related complaints filed in 2022. According to the report, total losses exceeded $10 billion, surpassing the $6.9 billion total for 2021, as reported by the FBI's Internet Crime Complaint Center (IC3). During the past five years, the IC3 received a total of 3.26 million complaints involving $27.6 billion in losses. In 2022, the top five cybercrime types were phishing (300,497 complaints), personal data breach (58,859 complaints), non-payment/non-delivery (51,679 complaints), extortion (39,416 complaints), and tech support (32,538 complaints). The FBI also provided overviews of threats, including Business Email Compromise (BEC), investment scams, ransomware, and call center fraud. For example, the IC3 received 21,832 BEC-related complaints in 2022, resulting in over $2.7 billion in losses. In BEC scams, fraudsters gain access to legitimate business email accounts through social engineering or hacking to facilitate unauthorized transfers of funds. This article continues to discuss key findings from the new FBI Internet Crime Report.

    Security Intelligence reports "$10.3 Billion in Cyber Crime Losses Shatters Previous Totals"

  • news

    Visible to the public "NSA and Co-Authors Recommend Best Practices to Secure Remote Access Software"

    Cybercriminals are using legitimate remote access software to gain access to victims' systems, blend in with regular network activity, and bypass detection. The National Security Agency (NSA), together with co-authors, released the "Guide to Securing Remote Access Software" Cybersecurity Information Sheet (CSI) in order to help network administrators and defenders follow best practices and provide recommendations on how to mitigate malicious activity. Eric Chudow, NSA's System Threats and Vulnerability Analysis Subject Matter Expert, commented that remote access may be a beneficial option for many organizations, but it could also be a threat vector into their systems. It could enable cyber actors to use or even control systems and resources if not properly secured. NSA, the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Israel National Cyber Directorate (INCD) are among the co-authoring agencies. This article continues to discuss the new guide on securing remote access software.

    NSA reports "NSA and Co-Authors Recommend Best Practices to Secure Remote Access Software"

  • news

    Visible to the public "Three Vulnerabilities Discovered in Game Dev Tool RenderDoc"

    Three critical vulnerabilities have recently been discovered in RenderDoc, a graphics debugger that supports multiple operating systems, including Windows, Linux, Android, and Nintendo Switch. The software holds a prominent position within the gaming development software arena, as it seamlessly integrates with leading gaming software engines such as Unity and Unreal. Security researchers from Qualys Threat Research Unit (TRU) discovered the vulnerabilities. The first of these flaws (tracked CVE-2023-33865) is a symlink vulnerability that can be exploited by a local attacker with no privilege requirement, potentially granting them the privileges of the RenderDoc user. The second (tracked CVE-2023-33864) involves an integer underflow that leads to a heap-based buffer overflow. The researchers noted that an attacker can remotely exploit this vulnerability to execute arbitrary code on the host machine. The third vulnerability (tracked CVE-2023-33863) is an integer overflow that results in a heap-based buffer overflow. While the researchers said no exploitation attempts had been made so far, the flaw could be exploited by a remote attacker to run arbitrary code on the target machine.

    Infosecurity reports: "Three Vulnerabilities Discovered in Game Dev Tool RenderDoc"

  • news

    Visible to the public "Researchers Demonstrate Secure Information Transfer Using Spatial Correlations in Quantum Entangled Beams of Light"

    University of Oklahoma researchers led a study recently published in Science Advances that demonstrates using spatial correlations in quantum entangled light beams to encode information and enable its secure transmission. Light can be used to encode information for high-speed data transmission, long-distance communication, and other purposes. For secure communication, encoding large amounts of information in light presents additional challenges for ensuring the privacy and integrity of the transferred data. The idea of the project is to encode large amounts of information using the spatial properties of light, similar to how an image contains information. However, this should be done in a way compatible with quantum networks for secure information transfer. This article continues to discuss the demonstration of secure information transfer using spatial correlations in quantum entangled beams of light.

    The University of Oklahoma reports "Researchers Demonstrate Secure Information Transfer Using Spatial Correlations in Quantum Entangled Beams of Light"

  • news

    Visible to the public "North Korean Hackers Spoof Venture Capital Firms in Japan, Vietnam and US"

    According to new research, hackers based in North Korea are impersonating financial institutions and venture capital firms in the US, Vietnam, and Japan. Recorded Future's Insikt Group linked the campaign to APT38, a North Korea-sponsored group known for launching many high-profile attacks against cryptocurrency firms and other organizations. In the most recent cluster of activity from September 2022 to March 2023, researchers found 74 domains resolving to five IP addresses and six malicious files. Previous Insikt Group reporting on overlapping activity attributed to TAG-71 highlighted the group's spoofing of domains belonging to financial institutions in Japan, Taiwan, and the US, and popular cloud services used by many companies. According to the report, North Korean hacking groups have a lengthy history of launching financially-motivated attacks and intrusion campaigns against cryptocurrency exchanges, commercial banks, and e-commerce systems. These campaigns aim to bolster the North Korean government's ongoing efforts to generate funds for the regime, which remains subject to significant international sanctions. This article continues to discuss APT38 spoofing financial institutions and venture capital firms in the US, Vietnam, and Japan.

    The Record reports "North Korean Hackers Spoof Venture Capital Firms in Japan, Vietnam and US"

  • news

    Visible to the public "KeePass Update Patches Vulnerability Exposing Master Password"

    Open source password manager KeePass has recently released an update to patch a vulnerability allowing attackers to retrieve the cleartext master password from a memory dump. Tracked as CVE-2023-32784 and impacting KeePass 2.x versions, the issue is related to the custom-developed textbox used for password entry, which creates a leftover string in memory for each character that the user types. The company noted that an attacker can use a KeePass process dump, a hibernation file, a swap file, or even a RAM dump of the entire system to retrieve the strings and reconstruct the typed password. Because the strings are ordered in memory, even multiple typed-in passwords can be retrieved. Several weeks ago, a security researcher published a proof-of-concept (PoC) tool that can exploit the vulnerability to retrieve passwords from memory dumps. The researcher also pointed out that the risks associated with the flaw were minimal, as remote exploitation was not possible. KeePass announced that a patch for the bug had been included in the test version of KeePass 2.54, with the stable release scheduled for July. The software update brings several other changes as well, including user interface and integration enhancements, new features, and other improvements and bug fixes.

    SecurityWeek reports: "KeePass Update Patches Vulnerability Exposing Master Password"

  • news

    Visible to the public "Google Patches Third Chrome Zero-Day of 2023"

    Google recently released a Chrome 114 security update that patches the third zero-day vulnerability found in the web browser in 2023. Google said the latest version of Chrome patches two flaws, including CVE-2023-3079, a type confusion issue affecting the V8 JavaScript engine. The vulnerability, discovered on June 1, has been exploited in the wild, but Google has not shared any information on the attacks. In 2022, the company patched nine Chrome zero-days.

    Security Week reports: "Google Patches Third Chrome Zero-Day of 2023"

  • news

    Visible to the public "UAlbany Research Looking for Cybersecurity Vulnerabilities"

    State University of New York (SUNY) at Albany (UAlbany) researchers have opened two new campus labs to explore the future of social media monitoring, digital forensics, and geospatial analysis, as well as the cybersecurity vulnerabilities of toys and household items. According to a recent press release, the Open Source Intelligence (OSI) and Hack-IoT (Internet of Things) labs within the university's College of Emergency Preparedness, Homeland Security and Cybersecurity (CEHC) are now operational. The OSI Lab conducts research involving the collection and analysis of publicly accessible open source intelligence (OSINT) data, which is often used in criminal and civil investigations, legal disputes, and threat assessment. This type of sensitive data is also vulnerable to malicious use. The Hack-IoT Lab focuses on privacy flaws in various smart devices, such as toys and kitchen appliances. Students have already begun testing Zenbo robot toys and will report any discovered vulnerabilities to the manufacturers. This article continues to discuss the two new labs at SUNY's Albany campus aimed at searching for cybersecurity vulnerabilities in OSINT and IoT devices.

    GovTech reports "UAlbany Research Looking for Cybersecurity Vulnerabilities"

  • news

    Visible to the public "Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals"

    Cyclops ransomware-affiliated threat actors have been observed offering information stealer malware designed to extract sensitive data from infected hosts. According to Uptycs, the threat actor behind this Ransomware-as-a-Service (RaaS) promotes its offering on forums where they request a share of profits from those engaging in malicious activities through the use of the Cyclops malware. Cyclops ransomware is known for targeting all main desktop operating systems, including Windows, macOS, and Linux. It also terminates any processes that could interfere with encryption. The macOS and Linux variants of Cyclops ransomware are written in Golang. The ransomware further uses a complex encryption scheme involving asymmetric and symmetric encryption. The Go-based stealer targets Windows and Linux systems, grabbing details such as operating system information, computer name, number of processes, and files of interest that match certain extensions. This article continues to discuss the Go-based information stealer malware being offered by threat actors associated with the Cyclops ransomware.

    THN reports "Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals"

  • news

    Visible to the public "GIGABYTE Releases New Firmware to Fix Recently Disclosed Security Flaws"

    GIGABYTE has issued firmware updates to address security vulnerabilities in more than 270 motherboards that could be used to install malware. The firmware updates were released in response to a report by the hardware security company Eclypsium, which discovered flaws in a legitimate GIGABYTE feature used to install a software auto-update application in Windows. Windows has a feature called Windows Platform Binary Table (WPBT) that enables firmware developers to automatically extract an executable from the firmware image and execute it in the operating system. However, Eclypsium researchers found security flaws in the WPBT process that attackers could exploit to deliver malware in man-in-the-middle (MiTM) attacks. This article continues to discuss GIGABYTE's release of firmware updates to fix security vulnerabilities in over 270 motherboards.

    Bleeping Computer reports "GIGABYTE Releases New Firmware to Fix Recently Disclosed Security Flaws"