News Items

  • news

    Visible to the public "Verizon 2023 Data Breach Investigations Report: 74% Of Breaches Involve Human Element"

    Verizon Business has released the results of its 16th annual Data Breach Investigations Report (2023 DBIR). The report analyzed 16,312 security incidents and 5,199 breaches, finding that ransomware costs are soaring. According to the report, the median cost per ransomware doubled over the past two years to $26,000, with 95 percent of incidents that experienced a loss costing between $1 and $2.25 million. This cost increase is related to a sharp increase in frequency over the past few years, when the number of ransomware attacks exceeded the total for the previous five years. The human element is still involved in most events and is a factor in 74 percent of all breaches, even as organizations continue to defend critical infrastructure and enhance training on cybersecurity policies. This article continues to discuss key findings from the 2023 DBIR.

    Help Net Security reports "Verizon 2023 Data Breach Investigations Report: 74% Of Breaches Involve Human Element"

  • news

    Visible to the public "ChatGPT Hallucinations Open Developers to Supply Chain Malware Attacks"

    Researchers have found that attackers can exploit ChatGPT's proneness for returning false information to spread malicious code packages. This poses a significant threat to the software supply chain because it can allow malicious code and Trojans to be included in legitimate applications and code repositories such as npm, PyPI, GitHub, and others. Using "AI package hallucinations," threat actors can make ChatGPT-recommended, yet malicious, code packages that a developer could download when using the chatbot, adding them to software that is then widely used, according to researchers from Vulcan Cyber's Voyager18 research team. In Artificial Intelligence (AI), a hallucination is a reasonable response by the AI that is incomplete, biased, or false. This article continues to discuss attackers exploiting false recommendations to spread malicious code via developers that use ChatGPT to create software.

    Dark Reading reports "ChatGPT Hallucinations Open Developers to Supply Chain Malware Attacks"

  • news

    Visible to the public "Quantum Technology for Mobile Phone Encryption Is Coming"

    In a few years, the protection of communication with quantum encryption is expected to become a permanent feature of mobile phones, thus preventing communication hacking. The technology has already been demonstrated in large data transfers in Denmark's financial sector. Now, the Technical University of Denmark (DTU) spin-out company Alea Quantum Technologies has developed a quantum mechanical random number generator that can be produced at a low cost and support the encryption of 4GB per second. A chip variant of the technology can be created. Alea Quantum Technologies' random number generator stems from research conducted by the quantum information group at DTU Physics and the basic research center bigQ. Five years ago, the researchers devised a random number generator based on a laser diode and a detector. Random numbers are formed through measurements of the vacuum fluctuations of laser light. Alea Quantum Technologies has developed a prototype of this technology, which DTU patented. This article continues to discuss the quantum mechanical random number generator that must be reduced to chip size to be included in the electronics of mobile phones.

    The Technical University of Denmark reports "Quantum Technology for Mobile Phone Encryption Is Coming"

  • news

    Visible to the public "AI Clones Made From User Data Pose Uncanny Risks"

    Researchers at the University of British Columbia imagine the possibility of a digital doppelganger or clone created from the depths of Artificial Intelligence (AI) that accurately reflects a person in appearance, speech, and behavior. New research conducted at the University of British Columbia sheds light on this possibility. With advances in deep learning technologies such as interactive deepfake applications, voice conversion, and virtual actors, it is possible to digitally replicate the appearance and behavior of an individual. This duplicate of a person produced by AI is known as an "AI clone." The study explores how these AI clones could impact self-perception, relationships, and society. The researchers identified three categories of risks AI clones pose: doppelganger phobia, identity fragmentation, and living memories. These clones are personal data-based AI technologies. As the amount of personal data people generate increases, so does the fidelity with which these AI clones replicate human behavior. This article continues to discuss the possibility of personal data being used to create an AI clone that can mimic a user's behavior, as well as the potential effects of AI clone technologies.

    The Conversation reports "AI Clones Made From User Data Pose Uncanny Risks"

  • news

    Visible to the public "BlackCat Ransomware Gang Updates Tradecraft With Stealth and Speed"

    New research details how updates to the ransomware group BlackCat, also known as ALPHV, earlier this year have made it even more dangerous. In an analysis of the group and its evolving malware, IBM Security X-Force researchers recently stated that BlackCat has gained a reputation as a challenging and innovative ransomware operation since its introduction in November 2021. Multiple research teams have consistently ranked BlackCat among the top 10 most active ransomware groups, and an April 2022 FBI advisory linked it to the now-defunct BlackMatter/DarkSide ransomware. The Russia-based group and its affiliates have attempted extortion globally and in various industries, placing victims under pressure by publishing sensitive stolen data such as financial and medical information. For example, the group released photos of Lehigh Valley Health Network breast cancer patients in March after the organization refused to pay a $1.5 million ransom following an attack in February. BlackCat has since claimed Western Digital, Sun Pharmaceuticals, and Constellation Software as victims. IBM Security X-Force noted that ransomware groups like BlackCat that can modify their tools and techniques to make their operations quicker and stealthier have a greater chance of extending their lifespan. This article continues to discuss the evolution of the BlackCat ransomware gang.

    SC Media reports "BlackCat Ransomware Gang Updates Tradecraft With Stealth and Speed"

  • news

    Visible to the public "Qakbot Ducks for Cover With New Tactics"

    New research on the Qakbot malware network reveals that the bots in the network have a high rate of turnover over time and that the average lifespan of a bot or command-and-control (C2) server is typically only a few days. Qakbot is considered ancient because it has been active since 2007 and has significantly evolved throughout the years. It evolved from a traditional banking Trojan into a malware delivery platform and ransomware network. In response to the evolution and improvement of defenses over the past few years, Qakbot operators have modified their strategies, delivery methods, and the types of malicious attachments they use in their spam emails. At the beginning of 2023, the most significant change was the transition from macro-laden attachments to Microsoft OneNote files. In recent months, there have been major increases in Qakbot activity, which is typical for a cyclical network. Although the spam runs and intrusions primarily target enterprise users, many C2 nodes are located on consumer devices, which is one of the defining characteristics of the Qakbot network. Qakbot is one of the most resilient and persistent malware networks currently active, and its operators have demonstrated the ability to adapt their tactics as necessary. This article continues to discuss new findings regarding the Qakbot malware network.

    Decipher reports "Qakbot Ducks for Cover With New Tactics"

  • news

    Visible to the public "Criminals Are Using This Stupidly Simple Tactic to Send Malicious Links - And It's Working"

    Hackers would typically compose an elaborate email in an attempt to trick victims into clicking a link included in the message. For example, these emails would inform recipients that they must download an antivirus program, cancel a pending transaction, or something similar. However, security researchers at Check Point Harmony Email have discovered that some hackers replace all of this with an image. Instead of typing out a lengthy email and risking being suspected due to typos or poor grammar, attackers generate a promotional image such as a flyer informing the recipients that they have won a prize or have been invited to participate in a contest. The image would be hyperlinked, leading victims to a phishing page where they would provide sensitive information. According to the researchers, many people click on the image instead of deleting the phishing email. In addition, by not displaying a link at all, hackers are able to circumvent URL filters, one of the most common methods for protecting inboxes. This article continues to discuss hackers bypassing URL filters with images.

    TechRadar reports "Criminals Are Using This Stupidly Simple Tactic to Send Malicious Links - And It's Working"

  • news

    Visible to the public "OpenAI Unveils Million-Dollar Cybersecurity Grant Program"

    Artificial intelligence technology startup OpenAI has recently launched a $1 million cybersecurity grant program aimed at boosting defender-focused research and capabilities and measurements. OpenAI, makers of the popular ChatGPT bot application, plans to shell out grants in increments of $10,000 in the form of API credits or direct funding for projects that empower defensive use cases for generative AI technology. The company stated that its goal is to work with defenders across the globe to change the power dynamics of cybersecurity through the application of AI and the coordination of like-minded individuals working for our collective safety. The company noted that the program is meant to nudge developers into creating cutting-edge AI capabilities that benefit defenders and to develop methods for quantifying the cybersecurity capabilities of AI models. "OpenAI said projects in scope include those that collect and label data from cyber defenders to train defensive cybersecurity agents; detect and mitigate social engineering tactics; automate incident triage, and identify security issues in source code." The company is also looking to fund projects that assist network or device forensics, automatically patch vulnerabilities, and optimize patch management processes to improve prioritization, scheduling, and deployment of security updates. The company noted that it would evaluate and accept applications for funding or other support on a rolling basis, noting that strong preference will be given to practical applications of AI in defensive cybersecurity (tools, methods, processes). Offensive-security projects will not be considered for funding at this time. The company noted that all submissions should be intended to be licensed or distributed for maximal public benefit and sharing.

    SecurityWeek reports: "OpenAI Unveils Million-Dollar Cybersecurity Grant Program"

  • news

    Visible to the public "UR Urges Campus Community to Take Precautions After Data Breach"

    An unknown number of members of the University of Rochester campus community might have had their personal information revealed during a data breach, university officials say. The officials noted that the university's IT staff is working closely with the FBI and an outside data forensic firm to determine what information was compromised and what possible actions need to be taken. The officials stated that they currently believe faculty, staff, and students could be impacted, but they do not yet know the full scope of the impact on University community members or which personal data was accessed, as the investigation is ongoing. The officials revealed that the data breach resulted from a software vulnerability in a product provided by a third-party file transfer company.

    Yahoo News reports: "UR Urges Campus Community to Take Precautions After Data Breach"

  • news

    Visible to the public "Microsoft Says Clop Ransomware Gang Is Behind MOVEit Mass Hacks, as First Victims Come Forward"

    Security researchers have linked new mass hacks, targeting a popular file transfer tool, to the Clop ransomware gang. Hackers are exploiting a newly discovered flaw in MOVEit Transfer, a file transfer tool businesses use to share large files over the Internet. The vulnerability enables hackers to gain unauthorized access to the database of a vulnerable MOVEit server. The developer of the MOVEit software, Progress Software, has already released patches. However, attack victims have begun to come forward. Zellis, a UK-based human resources software developer and payroll service provider, confirmed that its MOVEit system had been compromised, affecting a "small number" of its corporate customers. British Airways, one of these customers, disclosed that the breach compromised the payroll information of its UK-based employees. Initially, it was unclear who was behind this new wave of cyberattacks, but Microsoft security researchers have attributed them to a group dubbed "Lace Tempest." This gang is a known affiliate of the Russia-backed Clop ransomware group, which was previously linked to widespread attacks involving the exploitation of vulnerabilities in Fortra's GoAnywhere file transfer tool and Accellion's file transfer tool. This article continues to discuss the first confirmed victims of the MOVEit mass hacks and the Clop ransomware gang's connection to the hacks.

    TechCrunch reports "Microsoft Says Clop Ransomware Gang Is Behind MOVEit Mass-Hacks, as First Victims Come Forward"

  • news

    Visible to the public "Large Spanish Bank Confirms Ransomware Attack"

    A major bank in Spain has reported falling victim to a ransomware attack that impacted multiple offices. Globalcaja, headquartered in the Spanish city of Albacete, has more than 300 offices throughout Spain and provides banking services to nearly 500,000 customers. It manages over $4.6 billion in consumer loans and has about 1,000 employees. The Play ransomware group has claimed responsibility for the attack on the bank. The group claimed to have stolen private and personal confidential data, client and employee documents, passports, contracts, and more. The bank issued a statement verifying that ransomware was affecting computers at multiple local branches. Spanish financial institutions have long been a target for cybercriminals, but 2023 has seen an increase in ransomware attacks, with one attack disrupting operations at a Barcelona hospital and another bringing down a Spanish amusement park. According to Trend Micro, the Play ransomware group first appeared in July 2022, targeting government entities in Latin America, and recently made headlines for a damaging attack on the City of Oakland, which has spent weeks recovering from the incident. This article continues to discuss the ransomware attack on Globalcaja, the Play ransomware group claiming responsibility for the attack, and the increase ransomware attacks in Spain.

    The Record reports "Large Spanish Bank Confirms Ransomware Attack"

  • news

    Visible to the public "Research Reveals Software Security at Public Sector Organizations Lagging"

    Veracode has released research findings indicating that applications developed by public sector organizations typically contain more security vulnerabilities than those created by private sector organizations. The findings are significant because an increase in the number of application vulnerabilities and flaws correlates with an increase in risk. The research arrives as the federal government increases efforts to strengthen cybersecurity, with initiatives aimed at reducing vulnerabilities in government-critical applications. Researchers discovered that nearly 82 percent of applications developed by public sector organizations contained at least one security vulnerability in their most recent scan over the past 12 months, compared to 74 percent of applications developed by private sector organizations. Public sector applications had a 7-12 percent greater likelihood of introducing a flaw in the last 12 months, depending on the type of flaw tracked. This article continues to discuss key findings from Veracode's State of Software Security report.

    Business Wire reports "Research Reveals Software Security at Public Sector Organizations Lagging"

  • news

    Visible to the public "Massive Free VPN Data Breach Exposes 360M Records"

    Cybersecurity researcher Jeremiah Fowler recently discovered and reported that over 360 million user data records had been leaked in a breach with the free VPN service SuperVPN. These records contained tons of personal information. Fowler noticed that the smartphone app for SuperVPN was listed under different developers depending on the App Store it was downloaded from. The Google Play Store version was credited to SuperSoft Tech, while the Apple App Store version was credited to Qingdao Leyou Hudong Network Technology Co. Both companies seem to have connections to China as the notes for each are written in Mandarin, which serves as the official language of the country. Fowler then discovered a publicly exposed database linked with the SuperVPN app containing 133 GB of data. This data included personal user information such as IP location, servers used, details about online user activities, device models, operating systems, refund requests, email addresses, geolocation records, unique user identifiers, and more. Fowler took it upon himself to reach out to the email addresses listed in this database, however, the database was quickly closed shortly afterward. SuperVPN is still available for Apple and Android devices, however, Fowler stated that he would not recommend using it. This is not the first time the free VPN service has had information leaked as it happened once in 2016 and again in 2020.


    Fox News reports: "Massive Free VPN Data Breach Exposes 360M Records"

  • news

    Visible to the public "British Airways, Boots Staff Data Compromised by Payroll Cyber Hack"

    British Airways and retailer Boots recently discovered that their staff was amongst those hit by a cyberattack on Zellis, a payroll provider used by hundreds of companies in Britain. British Airways, owned by IAG, said it had notified affected employees and was providing them with support. The company stated that they had been informed that they are one of the companies impacted by Zellis' cybersecurity incident, which occurred via one of their third-party suppliers called MOVEit. Part of the Walgreens Boots Alliance, Boots said the attack had included some of its employees' personal details. Boots employs over 50,000 people in Britain, while British Airways has about 30,000 staff. U.S. security researchers warned last Thursday that hackers had stolen data from the systems of a number of users of file transfer tool MOVEit Transferone one day after the software maker disclosed that a security flaw had been discovered. The compromised data the researchers saw included names, addresses, and national insurance numbers.

    U.S. News reports: "British Airways, Boots Staff Data Compromised by Payroll Cyber Hack"

  • news

    Visible to the public "KillNet Hacktivists Say They're Disbanding"

    The KillNet pro-Russian hacktivist group that became a military corporation announced that it had "completely disbanded." The announcement was made after a supposed group member resigned from KillNet-related activities. The group's administrators announced the disbanding on KillNet's Telegram channel. The announcement prompted a storm of furious messages directed at the individual who resigned. Others asked KillNet's leader "Killmilk" if they could unsubscribe from the channel, to which the group leader replied, "Yes." KillNet first made headlines following Russia's full-scale invasion of Ukraine. The hacktivist group publicly supported the Kremlin's political agenda, particularly regarding the Ukraine war. For example, in February of this year, the gang attacked over a dozen hospitals and healthcare organizations in the US after President Biden promised to send Abrams military tanks to the war-torn nation. This article continues to discuss the history and disbanding of the KillNet hacktivist group.

    Cybernews reports "KillNet Hacktivists Say They're Disbanding"

  • news

    Visible to the public "Atomic Wallet Customers Lose Over $35m in Crypto Attacks"

    A popular provider of cryptocurrency wallets has recently revealed that some of its customers have been compromised in a campaign that has already cost them an estimated tens of millions of dollars. Atomic Wallet, which offers a decentralized wallet that supports over 500 coins and tokens, says its mission is to "provide a convenient way of managing cryptocurrencies." However, reports recently started coming in of customer wallets being compromised. The company noted that, at the moment, less than 1% of their monthly active users have been affected/reported. A security investigation is ongoing. The company noted that they report victim addresses to major exchanges and blockchain analytics to trace and block the stolen funds. One blockchain investigator claimed as of Sunday that at least $35m had been stolen, with the biggest victim losing nearly $8m and the five biggest losses amounting to nearly half of the total ($17m). More than 100 customer wallets have been listed as impacted by the attacks, and any additional users that have been compromised are urged to share their addresses and transaction hashes to help determine the scope and scale of the incident.

    Infosecurity reports: "Atomic Wallet Customers Lose Over $35m in Crypto Attacks"

  • news

    Visible to the public "North Korea Makes 50% of Income from Cyberattacks: Report"

    The US has recently claimed that the North Korean regime makes around half of its foreign-currency income from cyberattacks on cryptocurrency and other targets. It was noted that the amount of cyberattacks directed by the hermit nation had risen sharply since 2018, in lockstep with its nuclear and missile programs. The US is working closely with South Korean allies and other partners and allies worldwide to try to combat the cyberattacks. South Korea claims the Kim Jong-un regime employs around 10,000 operatives to support an expansive campaign of financially motivated cyberattacks. Thousands more IT workers are sent abroad with false documentation to work as freelancers in developed economies. North Korean hackers have been blamed for some of the biggest ever heists of cryptocurrency, including the $620m stolen from Sky Mavis' Ronin Network last year and the $281m taken from KuCoin in 2020. They are using increasingly sophisticated techniques to get what they want. A 2019 UN estimate claimed North Korea had amassed as much as $2bn through historic attacks on crypto firms and traditional banks.

    Infosecurity reports: "North Korea Makes 50% of Income from Cyberattacks: Report"

  • news

    Visible to the public "Brazilian Cybercriminals Using LOLBaS and CMD Scripts to Drain Bank Accounts"

    An unknown threat actor has been observed targeting Spanish- and Portuguese-speaking victims in Mexico, Peru, and Portugal to compromise online banking accounts. According to the BlackBerry Research and Intelligence Team, this threat actor uses techniques such as LOLBaS (living-off-the-land binaries and scripts) and CMD-based scripts to perform malicious activities. Based on an analysis of the artifacts, the cybersecurity company attributed the campaign, called "Operation CMDStealer," to a Brazilian threat actor. The attack chain relies primarily on social engineering, sending Portuguese and Spanish emails containing tax- or traffic violation-related lures to initiate infections and get unauthorized access to victims' systems. The emails include an HTML attachment containing obfuscated code to fetch the next-stage payload as a RAR archive file from a remote server. The files, which are geofenced to a particular country, include a .CMD file. The .CMD file has an AutoIt script aimed at downloading a Visual Basic Script to steal Microsoft Outlook and browser password data. This article continues to discuss cybercriminals using LOLBaS and CMD-based scripts to compromise online banking accounts.

    THN reports "Brazilian Cybercriminals Using LOLBaS and CMD Scripts to Drain Bank Accounts"

  • news

    Visible to the public "Hackers Hijack Legitimate Sites to Host Credit Card Stealer Scripts"

    A new Magecart credit card theft campaign uses legitimate websites as "makeshift" command-and-control (C2) servers in order to inject and hide skimmers on targeted eCommerce sites. A Magecart attack occurs when hackers infiltrate online stores and inject malicious scripts that steal customers' credit cards and personal information during checkout. According to researchers at Akamai who are monitoring this campaign, organizations in the US, UK, Australia, Brazil, Peru, and Estonia have been compromised. Many of the victims did not realize they had been compromised for over a month, demonstrating the stealthiness of these attacks. The first stage of the attack is to identify vulnerable legitimate sites, hack them to host malicious code, and use them as C2 servers. By distributing credit card skimmers through legitimate websites with a good reputation, threat actors can evade detection and blocks, as well as avoid the need to establish their own infrastructure. The attackers then inject a small JavaScript snippet into the websites that retrieves malicious code from previously compromised websites. To increase the stealthiness of the attack, the threat actors obfuscated the skimmer with Base64 encoding, which also hides the host's URL. The structure is built to resemble that of Google Tag Manager or Facebook Pixel. This article continues to discuss the new Magecart credit card stealing campaign.

    Bleeping Computer reports "Hackers Hijack Legitimate Sites to Host Credit Card Stealer Scripts"

  • news

    Visible to the public "Virtual Claims Raise Alarms Among Insurance Carriers and Customers"

    According to LexisNexis Risk Solutions, carriers and customers are becoming increasingly concerned about data privacy as the digital revolution changes the claims process. Over 60 percent of customers are concerned about the security of their personally identifiable information (PII) when submitting virtual claims. Carriers are concerned about the actual cost of fraud, which can cost four times the value of a fraudulent transaction and damage a carrier's reputation. Ninety-three percent of respondents say that identity-related fraud harms their business, and 80 percent report that it occurs at least monthly. However, 73 percent of respondents say it is difficult to know how identity-related fraud occurs, and 47 percent say it is extremely difficult to detect. Only 33 percent say they have an effective method to detect and prevent identity-related fraud. This article continues to discuss key findings from LexisNexis Risk Solutions' report regarding identity-related fraud among insurance carriers, balancing customer experience with fraud mitigation, and mitigating identity-related fraud.

    Help Net Security reports "Virtual Claims Raise Alarms Among Insurance Carriers and Customers"

  • news

    Visible to the public "'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft"

    SMS campaigns targeting residents of the United Arab Emirates (UAE) seek to steal payment and personal information. Previously aimed at Asia-Pacific users, the campaign has been named "PostalFurious" because it impersonates postal services. Group-IB's investigations linked both campaigns to a Chinese-speaking PostalFurious phishing group. This group has been active since at least 2021. They can rapidly establish large network infrastructures, which they frequently alter to avoid detection by security tools, and use access-control methods to prevent automated detection and blocking. Evidence shows they operate beyond the boundaries of this Middle Eastern initiative and on a global scale. This campaign collects payment information via fraudulent SMS messages requesting toll and delivery payments. The URLs in the texts lead to fake payment pages that request personal information such as name, address, and credit card number. The phishing pages also display the official name and logo of the impersonated postal service provider and can only be accessed by UAE-based IP addresses. This article continues to discuss the SMS campaigns targeting UAE citizens.

    Dark Reading reports "'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft"

  • news

    Visible to the public "Developing An Unbreakable Cybersecurity System"

    Researchers are exploring approaches to truly unbreakable security. Cyberattacks are becoming more frequent and sophisticated, and as the amount and value of data continue to increase, the impact of these attacks is growing almost exponentially. Cybersecurity Ventures predicts that the annual cost of cybercrime will increase from $8 trillion in 2023 to $210.5 trillion in 2025. Industrial and commercial sectors, including healthcare, finance, education, and more, are on the list of targets. Even the most secure systems can be compromised with enough time and computing resources. According to Steve Hanna, an engineer at Infineon Technologies, any system can be infiltrated with the right resources, but there are many ways to make a system highly resistant to attacks. Cybersecurity is an evolving process. As hackers become more sophisticated, a defense mechanism must be able to respond dynamically to future threats. Researchers point out that no set formula exists for designing a practically unbreakable system. However, essential design principles can help designers in achieving this objective. These principles include being proactive, implementing well-known and tested security standards, deploying security effectively, securing memory, improving the security of chip architecture, and properly applying Artificial Intelligence (AI). This article continues to discuss the pursuit of unbreakable cybersecurity systems and the progress made by experts in developing practically unbreakable systems.

    Semiconductor Engineering reports "Developing An Unbreakable Cybersecurity System"

  • news

    Visible to the public "Taking the Time to Implement Trust in AI"

    Researchers who value security and privacy have been paying close attention to the rapid development of new Machine Learning (ML) technology. The vulnerabilities of these technological advances and their Artificial Intelligence (AI) applications make users susceptible to attack. Therefore, Bo Li, a computer science professor at the University of Illinois Urbana-Champaign, has positioned her research career at the intersection of trustworthy ML, focusing on robustness, privacy, generalization, and the underlying interconnections between these elements. Li noted that ML is currently applied everywhere in the world of technology through various domains such as autonomous driving, Large Language Models (LLMs), and more, adding that it is also a benefit found in numerous applications, such as facial recognition technology. However, we have also learned that these technological advances are vulnerable to attack. Li earned $1 million to align her Secure Learning Lab with the Defense Advanced Research Projects Agency's (DARPA) Guaranteeing AI Robustness Against Deception (GARD) program. This article continues to discuss Li's work with her students on the concept of trustworthy AI.

    The University of Illinois Urbana-Champaign reports "Taking the Time to Implement Trust in AI"

  • news

    Visible to the public "UCCS Student Research Wins Award at USCYBERCOM Research Competition"

    The US Cyber Command (USCYBERCOM) hosted the inaugural USCYBERCOM Cyber Recon 2023 conference in Maryland from April 19-20, 2023. The Analyst Award was won by a team from UCCS composed of Ph.D. student Mark Maldonado and academic advisor Shouhuai Xu, Gallogly Endowed Engineering Chair in Cybersecurity and professor of computer science, along with USCYBERCOM Mentors CDR Stephanie Pendino and LTC Dr. Robert James Ross. Their project, titled "Towards Detecting Log4j Attacks via Machine Learning," seeks to detect high-profile attacks such as Log4j using Machine Learning (ML) methods. This article continues to discuss the UCCS student research that won the Analyst Award at the USCYBERCOM research competition and the structure of this competition.

    UCCS reports "UCCS Student Research Wins Award at the USCYBERCOM Research Competition"

  • news

    Visible to the public "MOVEit Transfer Zero-Day Attacks: The Latest Info"

    There is new information about the zero-day vulnerability exploited by attackers in Progress Software's MOVEit Transfer solution, as well as patches and helpful instructions for customers. Progress Software has updated the security advisory and confirmed that the vulnerability is a SQL injection flaw in the MOVEit Transfer web application that could enable an unauthenticated attacker to gain unauthorized database access. The vulnerability compromises all versions of MOVEit Transfer. Researchers from Huntress, TrustedSec, and Rapid7 have analyzed the webshell/backdoor. They released YARA signatures and SIGMA rules that defenders can use to detect indicators of compromise (IoCs) and look for suspicious files. The researchers also shared additional technical information about the attacks. This article continues to discuss the MOVEit Transfer zero-day attacks.

    Help Net Security reports "MOVEit Transfer Zero-Day Attacks: The Latest Info"

  • news

    Visible to the public "TLA+ Helps Programmers Squash Bugs Before Coding"

    Design is an integral component of the development process for most software engineers. A programmer devises algorithms to support their code and constructs models to visualize how the various parts of their systems will function together, similar to an architect drawing blueprints. Programmers should be able to test these algorithms and models in order to identify design flaws before they become bugs in the written code. This is the goal of TLA+, an open source, high-level language for modeling software programs and hardware systems. The logic behind it is based on the Temporal Logic of Actions (TLA), a mathematical technique for reasoning about the correctness of concurrent algorithms. Leslie Lamport, a distinguished scientist at Microsoft Research who is best known for inventing LaTeX, a document-preparation system for scientific papers, created both TLA and TLA+. Lamport notes that TLA+ is a specification language, not a programming language. He explains that it describes the program at a higher level of abstraction--what it is intended to do and how it is supposed to do it. Therefore, TLA+ is useful for verifying the validity of a program's design or supporting algorithm, a capability made possible by the TLA+ model checker. After developing specifications and writing models on TLA+, engineers can use the model checker to detect and correct design errors prior to implementing code. This article continues to discuss TLA+ helping programmers address bugs before coding.

    IEEE Spectrum reports "TLA+ Helps Programmers Squash Bugs Before Coding"

  • news

    Visible to the public "National Internet Safety Month: Together, We Can Make Our K-12 Schools Cybersecure. It's Fundamental."

    The largest school district in Iowa canceled a day of classes in January due to a cyberattack on their network. The same month, Tucson Unified School District, the largest pre-K-12 school district in southern Arizona, experienced a ransomware attack, leaving some educators unable to access their lessons, grading, or attendance records. In the months since then, there have been many other K-12 cyberattacks, each of which has affected children, communities, and schools. Since schools hold valuable information such as staff and student personal data, they are an attractive target for cyberattacks. Yet, they often lack the resources to implement a comprehensive cybersecurity program. The recent expansion of school networks, which was necessary for remote learning during the pandemic, has left many K-12 schools "target rich, cyber poor." The situation threatens the nation's ability to educate children. June is National Internet Safety Month, which is dedicated to increasing Americans' awareness of cyber threats and empowering them to be more secure and safe online. In addition to promoting best security practices, this is an opportune time to highlight the free resources the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) offers to enhance cybersecurity in K-12 education. This article continues to discuss the importance of making K-12 schools cybersecure and the free resources provided by CISA to build K-12 cybersecurity.

    CISA reports "National Internet Safety Month: Together, We Can Make Our K-12 Schools Cybersecure. It's Fundamental."

  • news

    Visible to the public "Google Temporarily Offering $180,000 for Full Chain Chrome Exploit"

    Google recently announced significantly higher bug bounty rewards for vulnerability reports containing full chain exploits leading to a sandbox escape in Chrome. Until December 1, 2023, the first report to contain a full chain exploit leading to a Chrome sandbox escape, Google says, may receive up to $180,000, or even more if cumulated with other bonuses, which is triple the current reward amount. Google noted that subsequent full chain exploits that are submitted during the timeframe may receive up to $120,000, which is double the current reward amount. All reports should be submitted through the Chrome vulnerability rewards program. According to Google, interested researchers may submit the vulnerability report in advance but need to provide a functional exploit by December 1 to be eligible for the increased rewards. The first functional full chain exploit submitted during the timeframe, which demonstrates attacker control or code execution outside the Chrome sandbox, is eligible for the triple reward amount. Google noted that the exploit chain should be performed remotely and require no or very limited user interaction. Furthermore, it should target an active Chrome release channel at the time of the initial reports of the bugs in that chain. Exploits targeting publicly disclosed bugs in past versions of Chrome are not eligible for the reward.

    SecurityWeek reports: "Google Temporarily Offering $180,000 for Full Chain Chrome Exploit"

  • news

    Visible to the public "Phishing Defense, One Simulated Email at a Time"

    San Francisco uses an automated solution to train its 30,000 employees to recognize and report phishing attacks. According to Michael Makstman, the city and county's CISO, all employees receive at least one simulation per month. If the platform detects that the user fell for the simulation, it automatically sends more simulated emails to that individual. When an employee clicks the link in the training email, a webpage containing a training video on how to avoid falling victim to phishing attempts in the future opens. Since 2020, San Francisco has been using the CybeReady solution. In the first 18 months, the simulations' click rate decreased by 50 percent, according to Makstman. CybeReady updates the simulations as the fraudsters' methods evolve. For example, they may invite employees to click a Zoom link to attend a meeting, even if the department typically uses Microsoft Teams. The platform prepares ten simulations every quarter, but not all employees receive the same one. High-risk employees receive extra training on top of the phishing simulations from CybeReady. This article continues to discuss the structure, goals, and results of the automated platform San Francisco uses to train its employees to avoid phishing attacks.

    GCN reports "Phishing Defense, One Simulated Email at a Time"

  • news

    Visible to the public "High-Severity Vulnerabilities Patched in Splunk Enterprise"

    Splunk recently announced Splunk Enterprise security updates that resolve multiple high-severity vulnerabilities, including some impacting third-party packages used by the product. The most severe of these is CVE-2023-32707, a privilege escalation issue that allows low-privileged users with the "edit_user" capability to escalate privileges to administrator via a specially crafted web request. Splunk explained that this can happen because the "edit_user" capability does not honor the "grantableRoles" setting in the authorize.conf configuration file, which prevents this scenario from happening. The next most severe vulnerability patched is CVE-2023-32706, a denial-of-service (DoS) flaw in the Splunk daemon, which occurs when an incorrectly configured XML parser receives specially-crafted messages within SAML authentication. Splunk explained that the input contains a reference to an entity expansion, and recursive references may cause the XML parser to use all available memory on the machine, leading to the daemon's crash or to process termination. Another high-severity vulnerability addressed in Splunk Enterprise is CVE-2023-32708, an HTTP response splitting issue that allows a low-privileged user to access other REST endpoints on the system and view restricted content. Splunk also resolved multiple severe issues in third-party packages used in Splunk Enterprise, such as Libxml2, OpenSSL, Curl, Libarchive, SQLite, Go, and many others. Some of these vulnerabilities have been public for more than four years. Splunk noted that all these flaws were addressed with the release of Splunk Enterprise versions 8.1.14, 8.2.11, and 9.0.5. The updates resolve multiple medium-severity vulnerabilities as well.

    SecurityWeek reports: "High-Severity Vulnerabilities Patched in Splunk Enterprise"

  • news

    Visible to the public "Idaho Hospitals Working to Resume Full Operations After Cyberattack"

    Two eastern Idaho hospitals and their clinics are working to resume full operations after a cyberattack on their computer systems. Officials with Idaho Falls Community Hospital stated that the cyberattack happened Monday, causing some clinics to close, some ambulances to be diverted to nearby hospitals, and their cafes to only accept cash. Mountain View Hospital, also located in Idaho Falls, was similarly affected by the computer virus, officials said. The officials stated that both hospitals remain open and are safely caring for all their patients, and the vast majority of clinics are seeing patients as usual. The investigation into the incident is ongoing.

    SecurityWeek reports: "Idaho Hospitals Working to Resume Full Operations After Cyberattack"

  • news

    Visible to the public "US, ROK Agencies Alert: DPRK Cyber Actors Impersonating Targets to Collect Intelligence"

    The National Security Agency (NSA) is collaborating with several organizations to draw attention to the Democratic People's Republic of Korea's (DPRK) use of social engineering and malware to target think tanks, academic institutions, and the news media. In order to help in protecting against these DPRK attacks, the NSA and its partners are publishing a Cybersecurity Advisory (CSA) titled "North Korea Using Social Engineering to Enable Hacking of Think Tanks, Academia, and Media." Rob Joyce, director of Cybersecurity at the NSA, stated that DPRK-sponsored cyber actors continue to impersonate trusted sources in order to collect sensitive information, adding that education and awareness are the first line of defense against these social engineering attacks. The FBI, US Department of State, and more have observed sustained information-gathering efforts by a group of DPRK cyber actors known as Kimsuky, THALLIUM, or VELVETCHOLLIMA. This article continues to discuss the alert about the DPRK's use of social engineering and malware to target victims.

    NSA reports "US, ROK Agencies Alert: DPRK Cyber Actors Impersonating Targets to Collect Intelligence"

  • news

    Visible to the public "Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering"

    Camaro Dragon, a Chinese nation-state group, has been linked to another backdoor designed for its intelligence-gathering. Check Point researchers named the Go-based malware "TinyNote," stating that it is a first-stage payload capable of "basic machine enumeration and command execution via PowerShell or Goroutines." The malware compensates for its lack of sophistication by establishing redundant methods to maintain access to the compromised host through multiple persistence tasks and various methods of communicating with different servers. Camaro Dragon overlaps with the Chinese state-sponsored group Mustang Panda, which has been active at least since 2012. This article continues to discuss the Camaro Dragon nation-state group being linked to the Go-based malware TinyNote.

    THN reports "Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering"

  • news

    Visible to the public "New Horabot Campaign Takes Over Victim's Gmail, Outlook Accounts"

    Since at least November 2020, a previously unknown campaign involving the Horabot botnet malware has been targeting Spanish-speaking users in Latin America, infecting them with a banking Trojan and spam tool. The malware allows the operators to seize control of the victim's Gmail, Outlook, Hotmail, or Yahoo email accounts. They could steal incoming email data and two-factor authentication (2FA) codes, and send phishing emails from the compromised account. The new Horabot operation was discovered by Cisco Talos analysts, who report that the threat actor responsible for it likely resides in Brazil. This article continues to discuss findings regarding the new Horabot campaign.

    Bleeping Computer reports "New Horabot Campaign Takes Over Victim's Gmail, Outlook Accounts"

  • news

    Visible to the public "Sustained 'Red Deer' Phishing Attacks Impersonate Israel Post, Drop RATs"

    A sustained phishing campaign impersonating Israel's postal service has targeted Israeli engineering and telecommunications companies. According to research conducted by Perception Point, the phishing emails typically appear to be delivery notices containing HTML links. When clicked, an HTML file attachment is downloaded and opened in the user's browser. This HTML file then opens an ISO image containing a Visual Basic script that downloads a modified version of the AsyncRAT malware. Named "Operation Red Deer" because the logo for the Israel Postal Company, also known as Israel Post, is a red deer, this technique was first spotted being used in a campaign in April 2022. However, a similar campaign with the same malware version and SSL certificate was discovered last month. This article continues to discuss the Red Deer phishing attacks.

    Dark Reading reports "Sustained 'Red Deer' Phishing Attacks Impersonate Israel Post, Drop RATs"

  • news

    Visible to the public "Will Federated Learning Revolutionize AI Training?"

    Jiaming Xu, an associate professor at Duke University's Fuqua School of Business, and his coauthors explored how to keep data safe and private when using a new decentralized, collaborative way of training Artificial Intelligence (AI) models. Xu says federated learning is a new approach that can revolutionize AI systems training. He explains that traditional Machine Learning (ML) requires all data to be centralized in a single data center, while federated learning, also known as collaborative learning, trains the algorithm of a central model using data from decentralized sources. Edge devices are crucial in federated learning. These data-collecting tools, including smartphones, climate sensors, semi-autonomous vehicles, satellites, bank fraud detection systems, and medical wearables, could remotely share their data to train the central learning model in a repeatable cycle. According to Xu, federated learning is appealing to scientists, doctors, and companies because the data itself never leaves the edge devices. Due to privacy laws such as the Health Insurance Portability and Accountability Act (HIPAA), and the threat of hacking, federated learning is attractive to various industries. However, according to Xu, federated learning is not a perfect solution since the possibility of hacking still exists when the server and edge devices communicate. It is still possible for an eavesdropper to infer the private data based on the sent parameters. Therefore, Xu has developed querying strategies and analytical techniques that can be incorporated into theft-proof frameworks for federated learning in order to help find privacy solutions. His findings are presented in two papers titled "Learner-Private Convex Optimization" and "Optimal Query Complexity for Private Sequential Learning Against Eavesdropping." This article continues to discuss the concept of federated learning and the research on privacy solutions for this approach.

    Duke University's Fuqua School of Business reports "Will Federated Learning Revolutionize AI Training?"

  • news

    Visible to the public "PyPI Enforces 2FA Authentication to Prevent Maintainers' Account Takeover"

    The Python Package Index (PyPI), the official repository of third-party open source Python projects, will require two-factor authentication (2FA) for all project maintainers by the end of 2023. Supply chain attacks against the Python software repository have increased in the past few years. Threat actors have updated multiple packages with malware-containing versions. The repository's maintainers urge developers to enable 2FA on their accounts as soon as possible using a security device or an authentication app, and to transition to using either Trusted Publishers or Application Programming Interface (API) tokens to upload to PyPI. The maintainers emphasize the risks of supply chain attacks for both popular and compromised projects in someone's dependency. This article continues to discuss PyPI enforcing 2FA for all project maintainers by the end of the year due to security concerns.

    Security Affairs reports "PyPI Enforces 2FA Authentication to Prevent Maintainers' Account Takeover"

  • news

    Visible to the public "CESER Announces New Funding Recipient to Fortify Energy Delivery Systems"

    The US Department of Energy (DOE) has announced the seventh selection for the Office of Cybersecurity, Energy Security, and Emergency Response's (CESER) University-Based Scalable Cyber-Physical Solutions Funding Opportunity Announcement (FOA). The seventh selection is Florida State University's Concurrent Learning Cyber-Physical Framework for Resilient Electric Power System (CyberPREPS) project. The project will allow transmission systems to withstand a cyberattack while maintaining critical functions. This project and other CESER-funded research, development, and deployment (RD&D) efforts contribute to the Biden-Harris Administration's ongoing efforts to protect US critical infrastructure and advance the energy sector's cybersecurity capabilities. This article continues to discuss the seventh selection for the CESER University-Based Scalable Cyber-Physical Solutions FOA.

    The US Department of Energy reports "CESER Announces New Funding Recipient to Fortify Energy Delivery Systems"

  • news

    Visible to the public "Unmonitored Networks Put US Nuclear Arsenal at Risk, GAO Finds"

    A new report from the Government Accountability Office (GAO) calls on the US Department of Energy (DOE) to take additional steps to prevent insider threats to the nation's nuclear arsenal, including identifying the total number of classified networks across the department in order to fully monitor users' activity. DOE's Insider Threat Program is one of the department's risk mitigation initiatives designed to further protect against insider threats posed by employees, contractors, and trusted visitors. The GAO's report assessed the program's effectiveness. Even though the program was established in 2014, multiple independent assessments conducted throughout the years revealed that DOE had not implemented seven required measures for its Insider Threat Program. Nearly 50 findings and recommendations were made by independent reviewers to help DOE fully implement its program. This article continues to discuss key points from the GAO report on the DOE monitoring potential insider threats to US nuclear security.

    NextGov reports "Unmonitored Networks Put US Nuclear Arsenal at Risk, GAO Finds"

  • news

    Visible to the public "Over 1,000 Patients of UL Hospitals Group Affected by Data Breach Involving Unknown Party"

    The UL Hospitals Group (ULHG), which runs six hospitals in the mid-west region, has recently announced that it is writing to more than 1,000 patients whose personal and medical information was inadvertently shared with an unknown third party in a data breach. The data breach occurred last January when a staff member mistakenly sent the information to an "unknown party." The company noted that efforts to recall the information about the 1,066 patients attending gastroenterology services at three hospitals have proved unsuccessful. The company stated that they are writing to over 1,000 patients in relation to a data breach within the gastroenterology services at University Hospital Limerick, Ennis Hospital, and Nenagh Hospital. The data breach concerns patients who attended these services between 2018 and January 2023. The company noted that a file attached to the email included patient names, dates of birth, medical chart numbers, and limited medical information. The company stated that no personal contact details, such as patient phone numbers or email addresses, have been disclosed in this breach.

    Journal.ie reports: "Over 1,000 Patients of UL Hospitals Group Affected by Data Breach Involving Unknown Party"

  • news

    Visible to the public "Gouda Hacker: Charges Tie to Ransomware Hit Affecting Cheese"

    Mikhail Matveev is a Russian national whom prosecutors accused of wielding three ransomware strains. In addition to hacking hospitals and schools, Matveev allegedly caused a shortage of cheese in the Netherlands through a ransomware attack. Matveev is accused of being an affiliate of the LockBit, Babuk, and Hive ransomware gangs. Security experts emphasize that the indictments are notable because they target a foot soldier directly responsible for hacking into victims' networks and using ransomware to extort them instead of the Ransomware-as-a-Service (RaaS) group leaders. According to New Jersey US Attorney Philip R. Sellinger, Matveev allegedly used the ransomware strains to encrypt and hold for ransom the data of numerous victims, including hospitals, schools, nonprofits, and law enforcement agencies such as the Metropolitan Police Department in Washington, DC. Matveev also allegedly caused a cheese shortage in the Netherlands in April 2021, when Babuk hit one of the country's largest logistics providers, Bakker Logistiek, which supplies hundreds of supermarkets, wholesalers, and retailers. The company reported that critical Information Technology (IT) systems were crypto-locked, possibly after attackers had gained access by exploiting Microsoft Exchange ProxyLogon vulnerabilities. This led to the disruption of Dutch supply chains and empty cheese counters. This article continues to discuss the hacker Mikhail Matveev and the indictments he faces.

    DataBreachToday reports "Gouda Hacker: Charges Tie to Ransomware Hit Affecting Cheese"

  • news

    Visible to the public "Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks"

    Organizations using Moxa's MXsecurity product have been informed about two potentially serious vulnerabilities that could be exploited by malicious hackers targeting operational technology (OT) networks. MXsecurity is an industrial network security management software designed for OT environments. Simon Janz, a security researcher, discovered recently that the product is impacted by a critical vulnerability that can be exploited remotely to bypass authentication (CVE-2023-33235) and a high-severity flaw in the SSH command-line interface that can lead to remote command execution (CVE-2023-33236). Moxa patched the security holes with the release of version 1.0.1. Advisories for the two bugs have been published by the US Cybersecurity and Infrastructure Security Agency (CISA), which noted that the impacted product is used worldwide in multiple sectors.

    SecurityWeek reports: "Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks"

  • news

    Visible to the public "Illegal Data Breach Affects About 58,000 Voters in Hillsborough, Supervisor of Elections Says"

    The Hillsborough County Supervisor of Elections office recently sent notification letters to thousands of voters impacted by a data breach. This county is located in Florida. According to the office, a cybercriminal stole the personal information of roughly 58,000 people. The office noted that it is working with federal, state, and local law enforcement to investigate the breach. During the investigation, it was discovered that the hacker accessed and copied files that contained personally identifiable information, including social security or driver's license numbers. The office noted that the voter registration system and the ballot tabulation system, which have additional layers of security, were not accessed.

    ABC News reports: "Illegal Data Breach Affects About 58,000 Voters in Hillsborough, Supervisor of Elections Says"

  • news

    Visible to the public "Cybersecurity Gaps Could Put Astronauts at Grave Risk"

    As NASA's Artemis program, China's Tiangong Space Station, and a growing number of space-tourism companies prepare to usher in a new era of human spaceflight, more attention is needed for cybersecurity in space. Cyber threats to crewed spacecraft may focus on proximity methods, such as the installation of malware or ransomware on a spacecraft's internal computer. In a paper titled "Cybersecurity and Human Spaceflight Safety," Gregory Falco, an assistant professor of civil and systems engineering at Johns Hopkins University, and co-author Nathaniel Gordon outline four ways in which crew members, including space tourists, may be used as part of these threats: crew as the attacker, crew as an attack vector, crew as collateral damage, and crew as the target. Private and national proprietary secrets could be stolen, the crew could be placed at risk by ransomware, and crew members could be targeted through an attack on safety-critical systems such as air filters. This article continues to discuss the cybersecurity problems that could put astronauts at risk.

    IEEE Spectrum reports "Cybersecurity Gaps Could Put Astronauts at Grave Risk"

  • news

    Visible to the public "Amazon to Pay $31m After FTC's Security and Privacy Allegations"

    Amazon will pay close to $31m to the Federal Trade Commission (FTC) to settle allegations relating to Alexa and its Ring home security business. The larger of the two civil penalties ($25m) will settle charges that Amazon violated the US Children's Online Privacy Protection Act Rule (COPPA Rule) and deceived Alexa customers about the smart voice assistant's data deletion practices. According to the complaint which was filed by the Department of Justice (DoJ) on behalf of the FTC, Amazon "prominently and repeatedly" assured its users, including parents, that they could delete Alexa voice recordings and geolocation information. However, Amazon actually kept some of this information for years and used it unlawfully to improve the Alexa algorithm. The complaint continued by saying Amazon's history of misleading parents, keeping children's recordings indefinitely, and flouting parents' deletion requests violated COPPA and sacrificed privacy for profits. The FTC noted that COPPA does not allow companies to keep children's data forever for any reason and certainly not to train their algorithms. Separately, Amazon's Ring business, which it bought in 2018, will pay $5.8m to settle charges that it compromised consumer privacy and failed to implement security best practices. The FTC complaint alleged the firm deceived customers by failing to restrict employees and contractor access to customers' videos and that it used customer videos to train algorithms without consent. The complaint also alleged that Ring was slow in improving customer account security to mitigate the threat from brute-force attacks despite users suffering multiple credential stuffing attacks in 2017 and 2018. As well as the fines, Amazon will be required to delete inactive child accounts and some Alexa voice recordings and geolocation information and will be banned from using this data to train its algorithms. Ring will be required to delete data, models, and algorithms derived from videos it unlawfully reviewed and to implement a privacy and security program featuring safeguards on human review of videos, multi-factor authentication for employee and customer accounts, and other measures. An Amazon statement noted that the firm disagrees with the FTC's claims on Ring and Alexa and denies breaking the law.

    Infosecurity reports: "Amazon to Pay $31m After FTC's Security and Privacy Allegations"

  • news

    Visible to the public "Zyxel Customers Urged to Patch Exploited Bug"

    Security researchers at Rapid7 are urging Zyxel networking device users to update their firewalls and VPNs after it was discovered that hackers are actively exploiting a vulnerability in the wild to enable remote code execution. The Taiwanese vendor fixed CVE-2023-28771 on April 25, revealing that the flaw affects its ATP, USG Flex, VPN, and ZyWall/USG products, from versions ZLD V4.60 to V5.35. In the case of the ZyWall/USG product, it impacts versions ZLD V4.60 to V4.73. Zyxel warned that improper error message handling in some firewall versions could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device. The researchers at Rapid7 noted that the bug is present in the default configuration of vulnerable devices and is exploitable in the Wide Area Network (WAN) interface, which is designed to be exposed to the internet. The researchers stated that successful exploitation of CVE-2023-28771 allows an unauthenticated attacker to execute code remotely on the target system by sending a specially crafted IKEv2 packet to UDP port 500 on the device. The researchers warned that the CVE is being "widely exploited" to compromise devices and conscript them into a Mirai-based botnet, most likely for DDoS attacks.

    Infosecurity reports: "Zyxel Customers Urged to Patch Exploited Bug"

  • news

    Visible to the public "Clinical Test Data of 2.5 Million People Stolen From Biotech Company Enzo Biochem"

    According to regulatory filings, an April ransomware attack on the biotech company Enzo Biochem compromised the test information and personal data of nearly 2.5 million individuals. Enzo Biochem, a biosciences and diagnostics company based in New York, disclosed on April 6 that it was the victim of a ransomware attack involving "unauthorized access to or acquisition of clinical test information for approximately 2,470,000 individuals." Names, test information, and around 600,000 Social Security numbers were accessed and, in some cases, exfiltrated from the company's Information Technology (IT) systems. No ransomware group has claimed responsibility for the incident. Enzo Biochem is the latest medical sciences company to experience a data breach due to a ransomware attack in recent months. In March regulatory filings, Sun Pharmaceuticals, the largest pharmaceutical company in India, confirmed that it faced a ransomware attack, revealing that company data and confidential information were stolen. This article continues to discuss the ransomware attack on the biotech company Enzo Biochem that resulted in the theft of sensitive data of nearly 2.5 million people.

    The Record reports "Clinical Test Data of 2.5 Million People Stolen From Biotech Company Enzo Biochem"

  • news

    Visible to the public "Malicious PyPI Packages Using Compiled Python Code to Bypass Detection"

    Researchers have uncovered a novel attack on the Python Package Index (PyPI), the official repository of third-party open-source Python projects. The attack uses compiled Python code to evade detection by application security tools. ReversingLabs analyst Karlo Zank noted that it may be the first supply chain attack to exploit the fact that Python bytecode (PYC) files can be directly executed. PYC files are compiled bytecode files generated by the Python interpreter when executing a Python program. The malicious fshec2 package was removed from the package registry on April 17, 2023, following responsible disclosure on the same date. This article continues to discuss the discovery of a novel attack on PyPI.

    THN reports "Malicious PyPI Packages Using Compiled Python Code to Bypass Detection"

  • news

    Visible to the public "Stealthy SeroXen RAT Malware Increasingly Used to Target Gamers"

    The stealthy Remote Access Trojan (RAT) called "SeroXen" is gaining popularity among cybercriminals due to its low detection rates and effectiveness. AT&T reports that the malware is marketed as a legitimate remote access tool for Windows 11 and 10. It is being sold for $15 per month or a $60 "lifetime" license fee. While marketed as a legitimate program, the cyber intelligence platform Flare Systems has revealed that SeroXen is promoted as a RAT on hacker forums. It is unclear whether the forum promoters are the developers or resellers. However, the low cost of the remote access program makes it highly accessible to threat actors as AT&T has observed hundreds of samples since the program's emergence in September 2022, with the activity increasing recently. Most SeroXen victims are members of the gaming community, but as the tool's popularity grows, the scope of potential targets could expand to include large companies. This article continues to discuss findings regarding the SeroXen RAT.

    Bleeping Computer reports "Stealthy SeroXen RAT Malware Increasingly Used to Target Gamers"

  • news

    Visible to the public "Threat Actors Can Exfiltrate Data From Google Drive Without Leaving a Trace"

    According to Mitiga researchers, Google Workspace has a vulnerability that prevents the discovery of data exfiltration from Google Drive. Using 'Drive log events,' Google Workspace provides visibility into an organization's Google Drive resources, logging actions such as copying, deleting, downloading, and viewing files. Events involving external domains, such as sharing an object with an external user, are also recorded. By default, Google Drive users begin with a 'Cloud Identity Free' license, and their organization's Information Technology (IT) administrator assigns them a paid license. Researchers discovered that when this paid license is not assigned, there are no log records of actions in the user's private drive, leaving organizations in the dark about data manipulation and exfiltration actions performed by users or external attackers. This article continues to discuss the possibility of threat actors exfiltrating data from Google Drive without leaving a trace.

    Help Net Security reports "Threat Actors Can Exfiltrate Data From Google Drive Without Leaving a Trace"