News Items

  • news

    Visible to the public "Yet Another Toyota Cloud Data Breach Jeopardizes Thousands of Customers"

    Toyota has announced the discovery of yet another data breach. This time, two misconfigured cloud services were discovered to have leaked the personal information of 260,000 car owners over a seven-year period. This discovery was made after the car maker investigated its cloud features after announcing earlier in the month that the data of 2.15 million customers was accessible to anyone on the Internet for over a decade, which was also due to a misconfigured cloud container. Toyota Connected is a cloud service that enables Toyota car owners to connect to Internet services in their vehicles, such as entertainment features, accident assistance, and location services. This article continues to discuss the Toyota cloud data breach.

    Dark Reading reports "Yet Another Toyota Cloud Data Breach Jeopardizes Thousands of Customers"

  • news

    Visible to the public "Software Supply Chain Security Risks Are Here: Are We Equipped to Act Accordingly? Purdue Tandem Tackles Thorny Cybersecurity Issue"

    Two Purdue University researchers are working to combat the rising number of supply chain attacks, especially those targeting third-party software suppliers and vendors. Sabine Brunswicker, a professor of digital innovation and communication, is collaborating with Santiago Torres-Arias, an assistant professor of electrical and computer engineering, to gain a deeper understanding of the structure of software supply chains in order to develop countermeasures against cyberattacks resulting from the use of open source software. Google donated $200,000 to Brunswicker and Torres-Arias in support of their research in this area. A supply chain attack is the breach of goods, services, or technology supplied by a vendor to a customer, which poses a risk to the customer base. The prevalence of such attacks has prompted the development of methods to improve the security posture of software companies. As open source components are present throughout the software lifecycle, the researchers emphasize the need for organizations to first secure their open source software. Using the funding from Google, one of the key factors the Purdue University researchers are focusing on is developing tools to mine software supply chain data in real-time to create and use models that quantify and predict software supply chain risks. In addition, they will create a platform that is accessible to the public and incorporates tools that can help inform and enable early action to mitigate risks and prevent future software supply chain attacks. This article continues to discuss the Purdue University researchers building on new funding from Google to find solutions to tackle digital supply chain software attacks.

    Purdue University reports "Software Supply Chain Security Risks Are Here: Are We Equipped to Act Accordingly? Purdue Tandem Tackles Thorny Cybersecurity Issue"

  • news

    Visible to the public "Guardrails on AI Tools Like ChatGPT Needed to Protect Secrets, CISOs Say"

    Walmart, Amazon, and Microsoft have warned employees to avoid disclosing corporate secrets or proprietary code when using ChatGPT and other generative Artificial Intelligence (AI) tools. A recent CISO panel at CyberRisk Alliance's Identiverse conference suggests that many businesses have considered the same. When moderator Parham Eftekhari, executive vice president of collaboration at CyberRisk Alliance, asked how many attendees' organizations have implemented AI usage policies, a considerable portion of the audience raised their hands. During the same session, Ed Harris, CISO of Mauser Packaging, disclosed that his company had issued a policy similar to those Walmart and others have established, stating that sensitive company information should not be entered into external AI tools. Harris envisioned a scenario in which an employee asks an AI tool for help in refining the company's marketing strategy and, in doing so, enters corporate information that the AI remembers and then shares with other users, possibly a competitor. Yahoo's vice president and CISO, Sean Zadig, commented that security leaders must act expediently when developing these policies to keep up with the rapid increase in AI adoption and experimentation. This article continues to discuss the need for guardrails on AI tools to protect secrets.

    SC Magazine reports "Guardrails on AI Tools Like ChatGPT Needed to Protect Secrets, CISOs Say"

  • news

    Visible to the public "Hackers Hold City of Augusta Hostage in a Ransomware Attack"

    The BlackByte group has claimed responsibility for a ransomware attack against the city of Augusta in Georgia. The ransomware group posted 10GB of free sample data and claimed access to much more. Researchers discovered that the sample data contained payroll information, contact details, personally identifiable information (PII), home addresses, city budget allocation data, and more. In July 2021, BlackByte, the Russia-based Ransomware-as-a-Service (RaaS) group, began targeting corporate victims worldwide. The group is notorious for using the double extortion tactic to make victims pay. The FBI and US Secret Service have previously issued a joint advisory regarding BlackByte. $400 000 is the ransom demanded for the deletion of the stolen information. The BlackByte ransomware group has also offered to resell the data for $300,000 to interested third parties. This article continues to discuss the BlackByte ransomware group releasing 10GB of sample data from the cyberattack on the US city of Augusta and claiming to have more data.

    CSO Online reports "Hackers Hold City of Augusta Hostage in a Ransomware Attack"

  • news

    Visible to the public "Colombian Government Targeted by Suspected Cyber Partisans"

    According to the threat intelligence analyst FalconFeedsio, SiegedSec, a hacktivist group, is attacking Colombian government websites. The threat actor analyst Dark Owl points out that SiegedSec is a hacktivist group that arose last February, around the time of Russia'sRussia's invasion of Ukraine. The group is said to be under the leadership of YourAnonWolf. However, it is unknown whether SiegedSec is entirely partisan. While it appears to randomly target victims, it does not appear to be motivated by money and is not believed to have demanded ransom from its victims. In February of this year, the cybersecurity analyst SocRadar said that SiegedSec shows no preference for the industries or locations of its victims, adding that it has successfully targeted businesses in a variety of industries around the world, including healthcare, Information Technology (IT), insurance, legal, and finance. In a single year, SiegedSec compromised approximately 30 companies by stealing data and leaking emails. This article continues to discuss findings and observations regarding SiegedSec.

    Cybernews reports "Colombian Government Targeted by Suspected Cyber Partisans"

  • news

    Visible to the public "IDSA: Only 49% of Firms Invest in Identity Protection Before Incidents"

    Researchers at the Identity Defined Security Alliance (IDSA) found that only 49% of leadership teams proactively invest in identity protection solutions before a security incident. Just 29% take action to support and invest in identity and security protection after they have already experienced a security incident. The researchers conducted an online survey of over 500 identity and security professionals and found that 90% of respondents reported at least one security incident in the last 12 months, a 6% increase from last year. The researchers also "identified the top two barriers for security teams as identity frameworks complicated by multiple vendors and different architectures (40%) and complex technology environments (39%)." The researchers stated that the vast majority of respondents (89%) said they were somewhat or very concerned that new privacy regulations would impact identity security. At the same time, 98% of them said artificial intelligence and machine learning (AI/ML) would be beneficial in addressing identity-related challenges.

    Infosecurity reports: "IDSA: Only 49% of Firms Invest in Identity Protection Before Incidents"

  • news

    Visible to the public "Chrome 114 Released With 18 Security Fixes"

    Google recently announced the release of Chrome 114 to the stable channel with a total of 18 security fixes inside, including 13 that resolve vulnerabilities reported by external researchers. Of the externally reported flaws, eight have a severity rating of "high," with six of them being memory safety bugs. Google noted that the most important of these flaws fixed is CVE-2023-2929, an out-of-bounds write issue in Swiftshader. Security researcher Jaehun Jeong received a $15,000 reward for reporting the flaw. Next in line is CVE-2023-2930, a use-after-free bug in Extensions, for which Google handed out a $10,000 bug bounty. Google noted that security researchers with Viettel Cyber Security reported three use-after-free vulnerabilities in the browser's PDF component, and each of them issued a $9,000 bug bounty reward. The remaining externally reported high-severity issues addressed with this Chrome update include an out-of-bounds memory access flaw in Mojo and two type confusion bugs in the V8 JavaScript and WebAssembly engine. All three issues were reported by Google Project Zero researchers, and per Google's policy, no bug bounty reward will be issued for any of them. Google stated that Chrome 114 also resolves four medium-severity defects reported by external researchers, including three inappropriate implementation flaws in Picture and Downloads and one insufficient data validation bug in Installer. A low-severity inappropriate implementation issue in the Extensions API was also addressed in this browser release. In total, Google handed out more than $65,000 in bug bounty rewards to the security researchers who reported these vulnerabilities. Google noted that the latest Chrome iteration is rolling out as version 114.0.5735.90 for Linux and macOS and as versions 114.0.5735.90/91 for Windows. Google did not mention if these flaws were being exploited in malicious attacks.

    SecurityWeek reports: "Chrome 114 Released With 18 Security Fixes"

  • news

    Visible to the public "'Hot Pixel' Attack Steals Data From Apple, Intel, Nvidia, and AMD Chips via Frequency, Power and Temperature Info"

    By monitoring chip temperature, power, and frequency during normal operation, a team of security researchers, with funding from the Defense Advanced Research Projects Agency (DARPA) and the US Air Force, was able to steal data from Arm CPUs from Apple and Qualcomm, discrete GPUs from Nvidia and AMD, and integrated graphics in Intel and Apple chips. The attack requires data from the PC's internal power, temperature, and frequency sensors. Local user accounts without administrator privileges can access this information. The team's current attack method serves as a proof-of-concept (PoC). Data exfiltration rates are extremely low with the current method, and if a user had direct access to the system, as is required in this instance, they would likely target more straightforward attack surfaces. However, the researchers acknowledge that additional work could accelerate the process. In their paper titled "Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs," the researchers demonstrate the side-channel attack, a form of attack that enables data exfiltration by measuring specific physical emissions of a computer. This article continues to discuss the demonstrated side-channel attack.

    Tom's Hardware reports "'Hot Pixel' Attack Steals Data From Apple, Intel, Nvidia, and AMD Chips via Frequency, Power and Temperature Info"

  • news

    Visible to the public "Dark Pink APT Group Expands Tooling and Targets"

    The scope of a cyberattack campaign from APT group Dark Pink is broader than researchers first thought, with researchers identifying five new victims. The group is linked to the Chinese state and was previously thought to only focus its efforts mainly on Southeast Asian countries. However, security researchers at Group-IB have discovered new victims, including one in Belgium, as well as its first targets in Thailand and Brunei. The researchers stated that the group uses a range of sophisticated custom tools and deploys multiple kill chains relying on spear-phishing emails. Once the attackers gain access to a target's network, they use advanced persistence mechanisms to stay undetected and maintain control over the compromised system. Among the updates to its tactics, techniques, and procedures (TTPs) is a new version of the KamiKakaBot malware, with functionality now split into two parts: one dedicated to controlling devices and the other to stealing data. The researchers also found a new GitHub account that hosts modules that can be installed onto victim machines when directed to do so by malicious code. Payloads are also being distributed through the TextBin[.]net service. The researchers also saw Dark Pink exfiltrate stolen data over HTTP using a service called Webhook.

    Infosecurity reports: "Dark Pink APT Group Expands Tooling and Targets"

  • news

    Visible to the public "WordPress Rushes Out Jetpack Patch to Millions"

    The software company behind the popular blogging platform WordPress is automatically updating over five million installations of its Jetpack plugin after a critical vulnerability was discovered in it. Automattic, which also counts Jetpack as one of its subsidiaries, began the update recently to bring users up to date with the new version, 12.1.1. The company stated that during an internal security audit, they found a vulnerability with the API available in Jetpack since version 2.0, released in 2012. The company noted that this vulnerability could be used by authors on a site to manipulate any files in the WordPress installation. The company stated that they have no evidence the vulnerability has been exploited in the wild. The company noted that now that the update has been released, it is possible that someone will try to take advantage of this vulnerability. The company stated that it worked closely with WordPress's Security Team to release patched versions of every version of Jetpack since 2.0. Most websites have been or will soon be automatically updated to a secured version. Jetpack is designed to offer users a range of security features, including automated backups and one-click restores, a web application firewall, malware scans, and brute-force attack protection.

    Infosecurity reports: "WordPress Rushes Out Jetpack Patch to Millions"

  • news

    Visible to the public "Many Gigabyte PC Models Affected by Major Supply Chain Issue"

    According to researchers at the supply chain security vendor Eclypsium, hundreds of models of Gigabyte PCs are impacted by a backdoor that poses supply chain risks. The researchers revealed that Eclypsium's platform recently detected backdoor-like behavior in Gigabyte Technology's computer systems. The backdoor appears to be a deliberate "insecure implementation" of the Gigabyte App Center, a tool for downloading applications for Gigabyte motherboards. A follow-up analysis revealed that the firmware in Gigabyte systems drops and executes a Windows native executable during the system startup process. This executable then downloads and executes additional payloads from Gigabyte servers. Eclypsium noted that the Gigabyte implementation is concerning because threat actors have previously exploited legitimate "OEM backdoors" to conduct threat campaigns, citing the Russian Advanced Persistent Threat (APT) group Fancy Bear abusing Computrace LoJack using a similar type of flaw as an example. There is concern about the flaw's potential use in supply chain attacks. However, the vendor has not yet observed threat actors exploiting the backdoor. This article continues to discuss the discovery and potential impact of the insecure implementation of Gigabyte's App Center.

    TechTarget reports "Many Gigabyte PC Models Affected by Major Supply Chain Issue"

  • news

    Visible to the public "Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass"

    Microsoft has disclosed information about a now-patched vulnerability in Apple macOS that could be exploited by threat actors with root access to circumvent security protections and execute arbitrary actions on impacted devices. The vulnerability, dubbed Migraine and tracked as CVE-2023-32369, could be exploited to bypass System Integrity Protection (SIP) or "rootless," which limits the actions the root user can perform on protected files and folders. According to Microsoft researchers, the most straightforward implication of a SIP bypass is that an attacker is able to create files protected by SIP and, as a result, cannot be deleted through ordinary means. In addition, it could be exploited to gain arbitrary kernel code execution and access sensitive data by replacing databases managing Transparency, Consent, and Control (TCC) policies. The bypass is possible through the use of a built-in macOS tool called Migration Assistant to activate the migration process via an AppleScript designed to execute an arbitrary payload. This article continues to discuss details shared by Microsoft regarding the now-patched Apple macOS flaw.

    THN reports "Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass"

  • news

    Visible to the public "RomCom Malware Spread via Google Ads for ChatGPT, GIMP, More"

    A new campaign spreading the RomCom backdoor malware impersonates the websites of well-known or fictitious software in order to deceive users into downloading and launching malicious installers. Trend Micro researchers, who have tracked RomCom since the summer of 2022, uncovered the latest campaign. According to the researchers, the threat actors behind the campaign have expanded the malware's evasion capabilities by using payload encryption and obfuscation. The threat actors have also expanded the tool's capabilities by introducing new and powerful commands. Most websites used to distribute RomCom to victims involve remote desktop management applications, increasing the likelihood of phishing or social engineering attacks being conducted by the attackers. Trend Micro's report on the most recent RomCom activity provides examples of websites used by the malware operators between December 2022 and April 2023 that impersonate legitimate software, such as GIMP, Go To Meeting, ChatGPT, WinDirStat, AstraChat, System Ninja, and Devolutions' Remote Desktop Manager. This article continues to discuss findings regarding the new RomCom campaign.

    Bleeping Computer reports "RomCom Malware Spread via Google Ads for ChatGPT, GIMP, More"

  • news

    Visible to the public "Organizations Are Placing OT Cybersecurity Responsibility on CISOs"

    According to Fortinet, protecting Operational Technology (OT) systems is more important than ever as more organizations connect their OT environments to the Internet. While the convergence of Information Technology (IT) and OT has numerous advantages, it is presented with challenges by sophisticated and destructive cyber threats. Although the percentage of organizations that did not experience a cybersecurity breach increased significantly year-over-year from 6 percent in 2022 to 25 percent in 2023, there is still space for improvement. Over the past year, three-fourths of OT organizations reported at least one intrusion. Malware intrusions (56 percent) and phishing (49 percent) remained the most commonly reported types of incidents, and nearly one-third of respondents reported being victims of ransomware attacks. In addition, 13 percent of respondents rated their organization's OT security posture as "highly mature" in 2023, down from 21 percent in 2022. This suggests that OT professionals are becoming more aware of their organizations' cybersecurity capabilities and are using more effective self-assessment tools. Thirty-two percent of respondents reported that IT and OT systems were impacted by a cyberattack, up from 21 percent the previous year. In the next 12 months, 95 percent of organizations plan to assign OT cybersecurity responsibility to a CISO rather than an operations executive or team. This article continues to discuss key findings from the Fortinet 2023 State of Operational Technology and Cybersecurity Report.

    Help Net Security reports "Organizations Are Placing OT Cybersecurity Responsibility on CISOs"

  • news

    Visible to the public "421M Spyware Apps Downloaded Through Google Play"

    It has been discovered that spyware masquerading as a marketing Software Development Kit (SDK) has infested 101 Android apps, with over 421 million downloads. Researchers at Doctor Web refer to the malicious SDK as "SpinOk" and report that it is advertised as a package of marketing functions, including mini-games and prize drawings, designed to keep visitors using apps for extended periods of time. Instead, unsuspecting developers helped spread spyware, according to Doctor Web. Researchers explained that upon initialization, this Trojan SDK connects to a command-and-control (C2) server by sending a request containing comprehensive technical information about the infected device. Included are sensor data from the gyroscope, magnetometer, and more, that can be used to detect an emulator environment and modify the module's operational routine to avoid detection by security researchers. This article continues to discuss the Trojan SDK sneaking past Google Play protections to infest 101 Android apps.

    Dark Reading reports "421M Spyware Apps Downloaded Through Google Play"

  • news

    Visible to the public "Safe Aid: Protecting Privacy in Humanitarian Operations"

    EPFL researchers collaborated with the International Committee of the Red Cross (ICRC) to develop a privacy-preserving humanitarian aid distribution system. The system's design uses tokens to decentralize the storage and processing of recipient data, thus reducing the risk of harm. It also involves advanced cryptography to facilitate accountability. Humanitarian organizations help and protect victims of violence, famine, and natural disasters. Distributing supplies such as food is a crucial aspect of their work. Aid distribution has traditionally been supported by paper-based lists, which, while practical, do not scale well and are sometimes easy to bypass. Humanitarian organizations consider digital solutions as a promising means of addressing these issues, but to date, these solutions have relied on collecting large quantities of recipient data. This could endanger the safety of recipients and complicate the relationship between humanitarian organizations and local authorities. Moreover, ethically, it is questionable whether collecting the personal information of vulnerable individuals is acceptable, given the risks it poses to them. Researchers from the EPFL's Security and Privacy Engineering Lab (SPRING) in the School of Computer and Communication Sciences (IC) worked with the ICRC Data Protection Office for over 12 months to further understand the humanitarian context. This article continues to discuss the new privacy-preserving humanitarian aid distribution system.

    EPFL reports "Safe Aid: Protecting Privacy in Humanitarian Operations"

  • news

    Visible to the public "New Go-written GobRAT RAT targets Linux Routers in Japan"

    GobRAT, a new Remote Access Trojan (RAT) written in the Go programming language, targets Linux routers in Japan, according to the JPCERT Coordination Center. To execute malicious scripts and deploy the GobRAT malware, threat actors are targeting Linux routers whose WEBUI is open to the public. Loader Script serves as a loader, supporting multiple functions for downloading and deploying the GobRAT. Researchers found an SSH public key, likely used as a backdoor, which is hard-coded in the script. The Loader Script uses crontab to maintain persistence because GobRAT does not support this function. According to researchers, the Loader Script has multiple functions, including disabling the firewall, downloading GobRAT for the target machine's architecture, creating the Start Script, creating and executing the Daemon Script, and more. The RAT communicates with the command-and-control (C2) server over TLS and can execute various commands. This article continues to discuss findings regarding GobRAT.

    Security Affairs reports "New Go-written GobRAT RAT targets Linux Routers in Japan"

  • news

    Visible to the public "UA Little Rock Receives $1 Million Grant to Protect Against Energy-Focused Cyberattacks"

    The University of Arkansas at Little Rock and its partners have announced the expansion of the Emerging Threat Information Sharing and Analysis Center (ET-ISAC) to bolster the fight against the growing risk of cyberattacks in the energy sector. This new project expands upon the already operational Forge Institute Emerging Threat Center and enables collaborative efforts to expand capabilities and improve regional threat information sharing. The project brings together electric utilities and energy sector partners to advance cybersecurity threat sharing practices in the mid-South region of the US. Increasing workforce development, creating education and training for securing energy sector control systems, and advancing cybersecurity threat intelligence sharing practices are the center's primary objectives. The initiative is supported by a $1 million grant from the Department of Energy's Office of Cyber Security, Energy Security, and Emergency Response (CESER) and is backed by Senator John Boozman. This article continues to discuss the goals and support behind the new project aimed at bolstering the cybersecurity of the energy sector.

    The University of Arkansas at Little Rock reports "UA Little Rock Receives $1 Million Grant to Protect Against Energy-Focused Cyberattacks"

  • news

    Visible to the public "New 'Bandit Stealer' Malware Siphons Data From Browsers, Crypto Wallets"

    Cybersecurity researchers at Trend Micro have discovered a new information-stealing malware targeting browsers and cryptocurrency wallets. The malware called Bandit Stealer has only targeted Windows systems so far, but it can potentially spread to other platforms such as Linux. According to Trend Micro researchers, Bandit Stealer is particularly dangerous because it is difficult for victims to detect. For example, it can circumvent Windows Defender, a Microsoft-developed security utility that protects users from various threats, including viruses, malware, and spyware. Advertisements circulating in the malware community indicate that Bandit Stealer developers are constantly updating the malware's features. Researchers have not yet identified any active hacking group associated with the malware, nor have they determined how the group may use the stolen data. However, Trend Micro reports that the group and its consumers could use the malware for identity theft, data breaches, credential stuffing attacks, and Account Takeover (ATO) attacks. This article continues to discuss the capabilities of the Bandit Stealer information-stealing malware.

    The Record reports "New 'Bandit Stealer' Malware Siphons Data From Browsers, Crypto Wallets"

  • news

    Visible to the public "CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security"

    Cybersecurity researchers at Trend Micro have warned about CAPTCHA-breaking services being offered for sale to circumvent systems designed to differentiate between legitimate users and bot traffic. CAPTCHA, which stands for Completely Automated Public Turing test to tell Computers and Humans Apart, is a tool for distinguishing human users from automated users to combat spam and restrict fake account creation. According to Trend Micro, since cybercriminals are interested in accurately breaking CAPTCHAs, a number of services that cater to this market demand have been developed. These CAPTCHA-solving services do not use optical character recognition or sophisticated Machine Learning (ML) techniques. Instead, they outsource CAPTCHA-breaking duties to actual human solvers. This article continues to discuss the CAPTCHA-breaking services being offered to cybercriminals.

    THN reports "CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security"

  • news

    Visible to the public "Clever 'File Archiver in the Browser' Phishing Trick Uses ZIP Domains"

    A new 'File Archivers in the Browser' phishing kit exploits ZIP domains by displaying fake WinRAR or Windows File Explorer windows in the browser in order to trick users into launching malicious files. Google recently began allowing the registration of ZIP Top-Level Domains (TLDs) for hosting websites and email addresses. Since the release of the ZIP TLD, there has been a major debate regarding whether they pose a cybersecurity risk to users. While some experts believe the fears are exaggerated, the primary concern is that some websites will automatically convert a string ending in '.zip,' such as setup.zip, into a clickable link that could be used for malware distribution or phishing attacks. For example, sending someone instructions on downloading a file named setup.zip, Twitter will automatically turn setup.zip into a link, leading them to believe they should click it to download the file. This article continues to discuss the phishing toolkit developed by a security researcher involving ZIP domains.

    Bleeping Computer reports "Clever 'File Archiver in the Browser' Phishing Trick Uses ZIP Domains"

  • news

    Visible to the public "Penetration Tester Develops AWS-Based Automated Cracking Rig"

    Max Ahartz, a penetration tester, realized that building a custom cracking rig for research would be costly, so he built one on Amazon Web Services (AWS). In an interview with Help Net Security, he discussed the process and the specifics of his creation. The heart of the automated cracking rig is a bash script that imports settings from a configuration file. Using the aws-cli tool via SSH, the rig remotely builds an Ubuntu server, installs CUDA drivers and Hashcat, and downloads a 66-million-word Seclist password dictionary from an S3 bucket within AWS's cloud network. Hashcat's results are downloaded to the local machine, and the instance is terminated upon completion. The roundtrip time for a sha512crypt hash was consistently less than 8 minutes, demonstrating how efficient the process is from start to finish. Ahartz also pointed out how affordable this cutting-edge technology is. He plans to have the cracking rig available for upcoming Capture The Flag (CTF) competitions and penetration testing projects that may require its capabilities. This article continues to discuss the AWS-based automated cracking rig developed by the penetration tester Ahartz.

    Help Net Security reports "Penetration Tester Develops AWS-Based Automated Cracking Rig"

  • news

    Visible to the public "Travel-Themed Phishing, BEC Campaigns Get Smarter as Summer Season Arrives"

    As the summer holiday season approaches, travel-themed phishing scams are gathering momentum, posing a significant threat to individuals and organizations. According to a recent McAfee survey, 30 percent of adults have fallen victim to or know someone who has fallen victim to an online travel fraud, with two-thirds of victims losing up to $1,000. The Phishing Defense Center (PDC) published a report highlighting a phishing campaign in which threat actors impersonated an HR department to exploit users' trust in their employers. By sending deceptive emails, the perpetrators wanted to trick unsuspecting victims into clicking on a link claiming to be for submitting annual vacation requests. According to the company, this version of a Business Email Compromise (BEC) threat represents the evolution of travel-centric phishing campaigns. Clicking the link in the fake HR communication leads to a login prompt overlaying the victim's company homepage, which was detected and generated automatically based on their email address in the URL. This article continues to discuss the evolution of phishing campaigns targeting travelers.

    Dark Reading reports "Travel-Themed Phishing, BEC Campaigns Get Smarter as Summer Season Arrives"

  • news

    Visible to the public "Major Massachusetts Health Insurer Hit by Ransomware Attack, Member Data May Be Compromised"

    The second-largest health insurer in Massachusetts was recently the victim of a ransomware attack in which sensitive personal information and health information of current and past members may have been compromised. Point32Health stated that a "cybersecurity ransomware incident" affecting its Harvard Pilgrim Health Care program was detected on April 17. An ongoing investigation indicated that from March 28 until April 17, members' addresses, phone numbers, birthdates, Social Security numbers, medical history, treatment, dates of service, provider names, and other information may have been compromised. The company did not mention how many people might be affected. The company noted that they are currently working with third-party cybersecurity experts to conduct a thorough investigation into this incident and remediate the situation. Harvard Pilgrim Health Care provides services to more than 1.1 million members in Massachusetts, New Hampshire, Maine, and Connecticut. Point32Health did not mention if they paid the ransom. Other Point32Health companies, such as Tufts Health Plan and CarePartners of Connecticut, were unaffected.

    SecurityWeek reports: "Major Massachusetts Health Insurer Hit by Ransomware Attack, Member Data May Be Compromised"

  • news

    Visible to the public "Dark Web Data Leak Exposes RaidForums Members"

    Nearly half a million members of a notorious cybercrime forum have recently had their details publicly exposed after a key database was published on another hacking site. Cybersecurity researchers at VX-Underground confirmed the news that over 478,000 users of RaidForums had their data leaked on the up-and-coming forum Exposed. The database includes members' usernames, email addresses, and hashed passwords. The researchers noted that while police likely already have this information following the site's takedown in April 2022, it could be useful to security researchers looking to build up more information on threat actors. The researchers noted that some users' details appear to have been removed from the leak, although it is unclear how many or why. Launched in 2015, RaidForums was one of the world's largest hacking forums, enabling members to trade and publish compromised data. Multiple high-profile database breaches ended up on the site. After coordinated law enforcement action on both sides of the Atlantic, the RaidForums domain was seized, and its alleged administrator and two accomplices were arrested. According to the Department of Justice (DoJ), RaidForums members offered hundreds of databases of stolen data containing more than 10 billion unique records for sale over the years, impacting countless US and global victims.

    Infosecurity reports: "Dark Web Data Leak Exposes RaidForums Members"

  • news

    Visible to the public "Retailer Database Error Leaks Over One Million Customer Records"

    According to WebsitePlanet, a database configuration error at a popular automotive retailer led to the exposure of 1TB of records, including customers' personal information. Security researcher Jeremiah Fowler reported the incident to the web-builder site, having traced the records to Philadelphia-based business SimpleTire. The online tire retailer claims to have a network of over 10,000 installers and over 3000 independent supply points. The researcher noted that although he sent "multiple email notices" to SimpleTire to responsibly disclose his findings, Fowler claimed the non-password protected database was publicly accessible to anyone with an internet connection for over three weeks before finally being locked down. It is unclear how long the database had been publicly exposed before Fowler's discovery. The SimpleTire database contained over 2.8 million records, including nearly 1.2 million order confirmation PDFs that featured personally identifiable information (PII), such as customer names, phone numbers, and billing addresses. Also contained on the order records were partial credit card numbers and expiry dates. Details of orders, including authorized installers, receipt numbers, product information, and payment amounts, were also clearly visible. The researcher warned of the risk of follow-on social engineering attacks if hackers had managed to access the exposed database.

    Infosecurity reports: "Retailer Database Error Leaks Over One Million Customer Records"

  • news

    Visible to the public "Nine Million MCNA Dental Customers Hit by Breach"

    Millions of customers of one of America's largest dental health insurers have had their personal information compromised after a ransomware breach. MCNA Dental stated that it became aware of unauthorized network activity on March 6. During the investigation, the company learned that a cybercriminal was able to see and take copies of some information in their computer system between February 26, 2023, and March 7, 2023. The information taken included: first and last names, home and email addresses, dates of birth, phone numbers, Social Security numbers, driver's license/government-issued ID numbers, health insurance information, and bills and insurance claims. The company noted that some of this information was not from customers but from parents, guardians, or bill-payers. According to a breach notice on the website of the Office of the Maine Attorney General, more than 8.9 million individuals were impacted, although MCNA claimed that "information which was seen and taken was not the same for everyone." The infamous ransomware group LockBit appears to have been behind the attack. It claimed to have published all the files it exfiltrated via its leak site back in early April after MCNA refused to pay a multimillion-dollar ransom demand.

    Infosecurity reports: "Nine Million MCNA Dental Customers Hit by Breach"

  • news

    Visible to the public "MC2 Researchers Present Nine Papers at IEEE Symposium on Security and Privacy"

    Researchers affiliated with the Maryland Cybersecurity Center (MC2) had nine papers accepted to the 44th IEEE Symposium on Security and Privacy, one of which received a distinguished paper award. The annual conference provides a forum for presenting advances in computer security and electronic privacy, bringing together researchers and practitioners. According to Michelle Mazurek, an associate professor in the Department of Computer Science at the University of Maryland (UMD) and the director of MC2, this year's MC2 papers presented at the symposium cover exciting, timely topics such as dangerous data leaks that occur when phones are resold in police auctions, enabling anonymous credentials that could prove someone is over 18 without revealing their identity, and analyzing the experiences of marginalized people in vulnerability analysis careers. Mazurek adds that the research has significant real-world implications for strengthening security and privacy in various scenarios. For example, one of the MC2-affiliated papers presented at the symposium, titled "IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation" presents a privacy attack that enables a remote and unprivileged adversary to physically geolocate many residential IPv6 hosts and networks with street-level precision. This article continues to discuss the MC2-affiliated papers presented at this year's IEEE Symposium on Security and Privacy.

    The University of Maryland reports "MC2 Researchers Present Nine Papers at IEEE Symposium on Security and Privacy"

  • news

    Visible to the public "Digital Age Creates Challenges for Public Libraries in Providing Patron Privacy"

    The American Library Association's Bill of Rights explicitly addresses library patrons' right to privacy while using library facilities, which librarians have long held sacred. However, the digital age has challenged libraries' efforts to secure and defend privacy, according to Masooda Bashir, an associate professor at the University of Illinois Urbana-Champaign. Public libraries are essential, especially for people in lower socio-economic and underrepresented groups. They visit libraries to complete job applications, school assignments, and other day-to-day things, so libraries handle a great deal of sensitive and important information. Bashir and her research team collected data from over 800 different public libraries throughout the US for the first study to discover how public libraries protect such information. They surveyed library administrators, librarians, Information Technology (IT) professionals, and more who work in libraries. The project, which ran from September 2020 to February 2023, was supported by a $150,000 grant from the Institute of Museum and Library Services. Although all survey respondents recognized the need for privacy protection, the approaches to address that need differed greatly. According to survey responses, most public libraries recognized technical expertise as their main area of weakness. In addition, respondents noted that, while privacy safeguards were adopted in the libraries' daily operations, they were concerned about a lack of control in the digital realm. This article continues to discuss the study on how public libraries protect information and future research to enhance their patron privacy protections.

    The University of Illinois Urbana-Champaign reports "Digital Age Creates Challenges for Public Libraries in Providing Patron Privacy"

  • news

    Visible to the public Pub Crawl #74


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "FBI and CIA Combat Cyber Talent Shortage With New Hiring Methods"

    When trying to employ the next generation of cyber professionals, intelligence and law enforcement agencies such as the CIA and FBI are "feeling the strain." Therefore, officials announced that they are using new talent acquisition programs to combat the cyber talent shortage. According to Cynthia Kaiser, deputy assistant director of the FBI's cyber division, inconsistent standards for science, technology, engineering, and mathematics hiring and incentives across the federal government can result in cascading or roundabout vacancies among agencies competing with the private sector to hire and retain top cybersecurity talent. Some agencies have established workforce expansion and cultivation efforts to address the cyber talent gap, such as training programs and new approaches to onboard a diverse candidate pool. According to Cindy Susko, director of the CIA's talent acquisition office, the agency switched from an open-application hiring model to an invitation-to-apply method this year, allowing applicants to submit resumes expressing interest in up to four jobs. The Office of the National Cyber Director is developing a cyber workforce strategy to address the nation's lack of proper cyber education and training, particularly in underserved communities. This article continues to discuss the different recruiting strategies being used to tackle the talent dearth in the cyber workforce.

    NextGov reports "FBI and CIA Combat Cyber Talent Shortage With New Hiring Methods"

  • news

    Visible to the public "Threat of Cyber Attacks on Physical Security Systems Highlighted by NPSA"

    The UK National Protective Security Authority (NPSA) has issued guidance regarding the threat of cyberattacks targeting security systems with the intent of altering data, opening a portal, or silencing alarms. In response to the issue, the NPSA established the "Cyber Assurance of Physical Security Systems (CAPSS)" scheme. This scheme aims to help Critical National Infrastructure (CNI) providers and other organizations gain confidence in the cyber components of electronic security products that, while robust in the realm of physical security, could potentially be compromised by a hacker. The CAPSS is compromised of the CAPSS Standard and the CAPSS Guidance. The CAPSS Standard is the core document of the assurance program, in which a security product's cyberattack mitigations are independently assured against a set of "Security Characteristics" covering various potential cyberattack threats. This article continues to discuss the guidance published by the UK NPSA on the threat of cyberattacks on physical security systems.

    Continuity Central reports "Threat of Cyber Attacks on Physical Security Systems Highlighted by NPSA"

  • news

    Visible to the public "AI Used to Create Malware, WithSecure Observes"

    Cybersecurity experts around the world are concerned about the potential threats of AI in the hands of threat actors. In particular, malware being created through ChatGPT appears to be a reality. WithSecure's CEO stated that the company has observed malware samples that have been generated by ChatGPT. The CEO noted that since ChatGPT has the ability to provide different answers to the same question, you can also use it to generate many different variations, a mutation of the malware sample. This makes it harder for defenders to detect. Tim West, head of threat intelligence at WithSecure, added that the fact that malware created using ChatGPT is polymorphic will make it challenging for defenders. West noted that traditionally AI has been used by the defenders in the cybersecurity industry, and the attackers have done the offense manually, but now that will probably change." West stated that ChatGPT will support software engineering for good and bad, and it is an enabler and lowers the barrier for entry for the threat actors to develop malware.

    Infosecurity reports: "AI Used to Create Malware, WithSecure Observes"

  • news

    Visible to the public "Inactive Accounts Pose Significant Account Takeover Security Risks"

    Okta's first Customer Identity Trends Report shares findings from a survey of over 20,000 consumers in 14 countries concerning their online experiences as well as their attitudes regarding digital security and identity. According to the report, inactive and non-maintained accounts pose significant security threats to users and businesses, as cybercriminals could exploit active accounts using information stolen from forgotten or otherwise abandoned accounts. Increasing identity sprawl could ignite major Account Takeover (ATO) security risks because of accounts that have not been used in years, especially if customers reuse passwords, only slightly alter passwords, or do not conduct security reviews. A breach of any service may provide a threat actor with many user credentials and associated personal data. Attackers are adept at using this information on a large scale to compromise active accounts, including essential business accounts and networks. This report follows Google's announcement that it has updated its inactivity policy for Google Accounts to two years, which means that if a personal account has not been used or logged into for at least two years, Google may deactivate the account and its contents. This article continues to discuss inactive accounts getting compromised due to password reuse and lack of multi-factor authentication (MFA).

    CSO Online reports "Inactive Accounts Pose Significant Account Takeover Security Risks"

  • news

    Visible to the public "Half of Organizations Fell Victim to Spear Phishing in 2022"

    Barracuda Networks' new spear phishing trends report shows that 50 percent of organizations analyzed were victims of spear phishing in 2022, with 24 percent having at least one email account compromised by Account Takeover (ATO). The report is based on the analysis of a data set consisting of 50 billion emails across 3.5 million mailboxes, including nearly 30 million spear phishing emails, as well as a survey conducted by Vanson Bourne of Information Technology (IT) professionals at 1,350 companies. While spear phishing attacks account for only 0.1 percent of all email-based attacks, according to data from Barracuda, they account for 66 percent of all breaches. Additionally, 55 percent of respondents who experienced a spear phishing attack reported the infection of machines with malware or viruses. As a result of a spear phishing attack, 49 percent had sensitive data stolen, 48 percent had login credentials stolen, and 39 percent suffered direct financial loss. This article continues to discuss key findings from Barracuda Networks' spear phishing trends report.

    BetaNews reports "Half of Organizations Fell Victim to Spear Phishing in 2022"

  • news

    Visible to the public "Zyxel Firewalls Hacked by Mirai Botnet"

    A Mirai botnet variant has been exploiting a recently patched vulnerability tracked as CVE-2023-28771 to hack many Zyxel firewalls. The Taiwan-based networking device manufacturer informed customers about the security hole on April 25, when it announced the availability of patches for impacted ATP, VPN, USG Flex, and ZyWALL/USG firewalls. Trapa Security found the OS command injection vulnerability, which is caused by improper error message handling in some firewalls, and it could allow an unauthenticated attacker to remotely execute OS commands by sending specially crafted packets to the targeted device. By mid-May, security experts reported reproducing the exploit, and Rapid7 warned a few days later that it would likely end up being exploited in the wild. Rapid7 said it had seen 42,000 instances of internet-exposed Zyxel device web interfaces but noted that the actual number of exploitable devices was likely much higher. Researcher Kevin Beaumont revealed recently that CVE-2023-28771 has been "mass exploited" by a Mirai botnet variant, with many SMB appliances being impacted. Mirai botnets typically abuse compromised devices to launch DDoS attacks, which can be massive.

    SecurityWeek reports: "Zyxel Firewalls Hacked by Mirai Botnet"

  • news

    Visible to the public "Iranian Hackers Deploy New Ransomware Against Israeli Firms"

    Researchers found the Iran-linked Agrius Advanced Persistent Threat (APT) group launching a wave of ransomware attacks against Israeli organizations using a new strain of malware. Researchers at Check Point discovered a ransomware strain named Moneybird with similarities to that of the Agrius group's previous campaigns. Agrius is known for targeting Israel-based organizations with variants of wiper malware, disguising the intrusions as ransomware attacks to confuse defenders. According to Check Point investigators, the new Moneybird strain is an upgrade to previous Agrius attacks involving its custom-built Apostle wiper malware. The use of new ransomware written in C++ is significant because it indicates the group's expanding capabilities and ongoing effort to develop new tools. This article continues to discuss the new Moneybird malware strain being used by the Iran-linked APT group.

    DataBreachToday reports "Iranian Hackers Deploy New Ransomware Against Israeli Firms"

  • news

    Visible to the public "The Race to Make Hospitals Cybersecure"

    The European Union Agency for Cybersecurity (ENISA) detected 623 ransomware incidents in member states between May 2021 and June 2022. Healthcare was the fifth most targeted industry, which has resulted in increased investment and technological innovation to secure the sector. Sabina Magalini, a surgery professor at the Catholic University of the Sacred Heart in Rome, Italy, coordinated the EU-funded PANACEA project to enhance hospital cybersecurity. The project lasted 38 months through February 2022. Research conducted during PANACEA revealed that nurses frequently had to log in to computer systems over 80 times a day. This is time-consuming and leads to shortcuts, such as a group of individuals using the same password or passwords being written down on paper next to the computer. The study showed that hospital staff inadequately followed cybersecurity practices, exposing systems to exploitation by attackers. PANACEA developed methods to facilitate hospital staff compliance with cybersecurity precautions. For example, one of the contributions was software designed to make login systems more secure. Magalini noted that the software enables facial recognition of healthcare employees, reducing password issues. The project also experimented with low-tech substitutes, such as posting stickers and posters in hospitals to encourage healthcare employees to adhere to basic cybersecurity practices. This article continues to discuss EU-funded research aimed at improving the cybersecurity of hospitals.

    The European Commission reports "The Race to Make Hospitals Cybersecure"

  • news

    Visible to the public "Advanced Phishing Attacks Surge 356% in 2022"

    Security researchers at Perception Point have observed a 356% growth in the number of advanced phishing attacks attempted by threat actors in 2022. The total number of cyberattacks increased by 87%. The researchers noted that among the reasons behind this growth is the fact that malicious actors continue to gain widespread access to new tools, including artificial intelligence (AI) and machine learning (ML)-powered tools. These have automated the process of generating sophisticated attacks, including those characterized by social engineering as well as evasion techniques. The researchers stated that the changing threat landscape has resulted from the swift adoption of new cloud collaboration apps, cloud storage, and productivity services for external collaboration. Threat actors have adapted to this shift, with 2022 experiencing a 161% surge in attacks on cloud storage and collaboration apps, though email and the browser remained the leading attack vectors. Overall, phishing was the most pervasive threat, accounting for 67.4% of all attacks. The researchers noted that last year also experienced a significant increase in business email compromise (BEC) attacks, which grew by 83%. Microsoft was the brand most impersonated in malicious emails, 3.3x more than the next most copied brand, LinkedIn.

    Infosecurity reports: "Advanced Phishing Attacks Surge 356% in 2022"

  • news

    Visible to the public "Group-IB: Qilin Affiliates Receive Up to 85% Of Each Ransomware Payout"

    In March 2023, Group-IB researchers infiltrated the Qilin ransomware group and discovered that affiliates received 80 to 85 percent of each ransomware payout. The researchers infiltrated Tox, an encrypted messaging app used by members of the Qilin ransomware group. They listened in on private conversations with a Qilin recruiter named Haise, who was identified as a member of another dark web group called RAMP. Qilin is a cyber extortion gang that operates a Ransomware-as-a-Service (RaaS) program. The group practices double extortion, demanding a ransom in exchange for a decryptor to access files on encrypted devices, and threatening to publish sensitive information on their data leak website unless the ransom is paid. Between July 2022 and May 2023, Qilin listed 12 organizations on its data leak website. The ransomware group uses Rust-based malware, which is difficult to detect due to the programming language's robust cryptographic properties. Before transitioning to Rust, the group initially developed the malware in the Go programming language. Many Qilin ransomware attacks are customized to maximize their impact on each victim. The group claims it does not target the Commonwealth of Independent States (CIS), which includes Russia and former Soviet states, thus leading Group-IB to believe the Qilin ransomware is pro-Russian. This article continues to discuss Group-IB researchers' findings regarding the Qilin ransomware group.

    CPO Magazine reports "Group-IB: Qilin Affiliates Receive Up to 85% Of Each Ransomware Payout"

  • news

    Visible to the public "How the ILOVEYOU Worm Exposed Human Beings as the Achilles Heel of Cybersecurity"

    The CTO of CTERA, Aron Brand, discusses how the ILOVEYOU virus ushered in the era of social engineering in the digital world. The digital world experienced a cyberattack in 2000 that altered the approach to cybersecurity. The ILOVEYOU worm, also known as the Love Bug or Love Letter For You, infected over 10 million Windows personal computers within days of its emergence on May 5, 2000. Major companies, including Ford Motor Company, AT&T, and Microsoft, as well as government organizations, were forced to shut down their email services in order to contain the damage. Since an estimated 10 percent of the world's computers connected to the Internet were compromised, the total damage could have exceeded $10 billion. Many people were drawn in by the seemingly innocent "love letter" email attachment, demonstrating how vulnerable humans are to social engineering tactics. Although there have been technological advancements throughout the years, the human brain remains the most difficult vulnerability to fix. In the digital era, technological aspects of cybersecurity are often the focus of discussion, but the human factor remains the chain's weakest link. As we observe the emergence of Large Language Models (LLMs) such as ChatGPT and deepfake technologies, the potential for social engineering attacks on a large scale becomes a more alarming concern. This article continues to discuss the ILOVEYOU worm and the human aspect of security.

    SC Magazine reports "How the ILOVEYOU Worm Exposed Human Beings as the Achilles Heel of Cybersecurity"

  • news

    Visible to the public "Chip-Based QKD Achieves Higher Transmission Speeds"

    Researchers have developed a Quantum Key Distribution (QKD) system based on integrated photonics that is capable of transmitting secure keys at unprecedented speeds. The proof-of-principle experiments are a significant step toward implementing this highly secure communication method in the real world. QKD is a method for supplying distant parties with secret keys for secure communication. By using the quantum properties of light to generate secure random keys for encrypting and decrypting data, the security is based on the laws of physics, as opposed to the computational complexity of current communication protocols. This article continues to discuss the QKD system based on integrated photonics that lays the groundwork for network implementation.

    Optica reports "Chip-Based QKD Achieves Higher Transmission Speeds"

  • news

    Visible to the public "Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry"

    Dark Frost is a new botnet launching Distributed Denial-of-Service (DDoS) attacks against the gaming industry. According to a new technical analysis by Akamai security researcher Allen West, the Dark Frost botnet, modeled after Gafgyt, QBot, Mirai, and other malware strains, has grown to include hundreds of compromised devices. The botnet's targets include gaming companies, game server hosting providers, online streamers, and other gaming community members with whom the threat actor has had direct interactions. As of February 2023, the botnet consists of 414 machines with instruction set architectures, such as ARMv4, x86, MIPSEL, MIPS, and ARM7. Dark Frost appears to have been assembled using source code stolen from multiple botnet malware strains, including Mirai, Gafgyt, and QBot. After flagging the botnet on February 28, 2023, Akamai reverse-engineered it and estimated its attack potential to be approximately 629.28 Gbps via a UDP flood attack. Researchers believe the threat actor has been active since at least May 2022. This article continues to discuss findings and observations regarding the Dark Frost botnet.

    THN reports "Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry"

  • news

    Visible to the public "Predator: Looking Under the Hood of Intellexa's Android Spyware"

    Security researchers at Cisco Talos and the Citizen Lab conducted a technical analysis of the commercial Android spyware named "Predator" and its loader called "Alien," detailing its data-theft capabilities and other operations. Predator is a commercial spyware for the mobile platforms, OS and Android, that was developed and sold by the Israeli company Intellexa. The spyware family has been associated with surveillance operations that target journalists, high-profile European politicians, and Meta executives. On infected Android devices, the spyware can record phone calls, gather information from messaging apps, hide apps, and prevent the execution of certain apps. This article continues to discuss findings regarding the commercial Android spyware Predator and its loader Alien.

    Bleeping Computer reports "Predator: Looking Under the Hood of Intellexa's Android Spyware"

  • news

    Visible to the public "Phishers Use Encrypted File Attachments to Steal Microsoft 365 Account Credentials"

    Attackers are using encrypted restricted-permission messages (.rpmsg) attached to phishing emails in order to steal Microsoft 365 account credentials. According to researchers from Trustwave, the campaigns are low-volume, targeted, and use trusted cloud services, such as Microsoft and Adobe, to deliver emails and host content. The initial emails are sent from compromised Microsoft 365 accounts and appear to target recipient addresses where the sender may be familiar. The phishing emails are sent from a compromised Microsoft 365 account to employees working in the billing department of the recipient company. This article continues to discuss phishers' use of encrypted restricted-permission messages to steal Microsoft 365 account credentials.

    Help Net Security reports "Phishers Use Encrypted File Attachments to Steal Microsoft 365 Account Credentials"

  • news

    Visible to the public "Lazarus Group Striking Vulnerable Windows IIS Web Servers"

    The North Korea-backed threat actor Lazarus Group has made changes to its ongoing espionage campaign by exploiting known vulnerabilities in unpatched Windows IIS Web servers to launch its reconnaissance malware. AhnLab Security Response Center (ASEC) researchers reported that the most recent wave of espionage attacks involved the Lazarus Group signature DLL side-loading technique during the initial compromise. The AhnLab Smart Defense (ASD) log revealed that Windows server systems are the target of attacks, and that malicious activity is carried out via w3wp.exe, an IIS Web server process. Therefore, the threat actor uses poorly managed or vulnerable Web servers as initial entry points before executing their malicious commands. The ASEC team highlighted that the intelligence-gathering campaign's initial attack vectors include unpatched machines with known vulnerabilities such as Log4Shell, public certificate vulnerabilities, and the 3CX supply chain attack. This article continues to discuss the North Korean Advanced Persistent Threat (APT) group using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.

    Dark Reading reports "Lazarus Group Striking Vulnerable Windows IIS Web Servers"

  • news

    Visible to the public "The Challenge of Adversarial Machine Learning"

    Researchers at Carnegie Mellon University's (CMU) Software Engineering Institute (SEI) have published a blog post explaining the concept of adversarial Machine Learning (ML) as well as examining the motivations of adversaries and what researchers are doing to mitigate their attacks. They also provided a taxonomy of what an adversary can accomplish or what a defender needs to defend against. Due to the significant growth of ML and Artificial Intelligence (AI), adversarial tactics, techniques, and procedures (TTPs) have generated a great deal of interest and expanded. When ML algorithms are used for a prediction model and then incorporated into AI systems, the focus is typically on making performance as high as possible and ensuring that the model can make accurate predictions. This emphasis on capability often places security as a secondary concern to other priorities, such as using properly curated datasets for training models, applying domain-appropriate ML algorithms, and tuning parameters and configurations for optimal results and probabilities. However, research has demonstrated that an adversary can influence an ML system by manipulating the model, the data, or both. By doing so, an adversary can force an ML system to learn, do, or reveal the wrong information. This article continues to discuss the concept of adversarial ML, how adversaries seek to influence models, and defending against adversarial AI.

    Carnegie Mellon University reports "The Challenge of Adversarial Machine Learning"

  • news

    Visible to the public "Researchers Uncover Russia-Linked Malware That Could Immobilize Electric Grids"

    Researchers have discovered new malware for Industrial Control Systems (ICS), dubbed "CosmicEnergy," which could be used to disrupt critical infrastructure systems and electric grids. CosmicEnergy was discovered by researchers at Mandiant, who compared its capabilities to those of the destructive Industroyer malware that the Russia-backed "Sandworm" hacking group used in 2016 to cut power in Ukraine. In a rare occurrence, Mandiant discovered CosmicEnergy through threat hunting rather than a cyberattack on critical infrastructure. According to Mandiant, the malware was uploaded to VirusTotal, a Google-owned malware and virus scanner, in December 2021 by a Russian submitter. An analysis indicates that the malware may have been created by Rostelecom-Solar, the cybersecurity division of Russia's national telecommunications operator Rostelecom, to support exercises such as those held in 2021 in collaboration with the Russian Ministry of Energy. This article continues to discuss the malware that could disrupt critical infrastructure systems and electric grids.

    TechCrunch reports "Researchers Uncover Russia-Linked Malware That Could Immobilize Electric Grids"

  • news

    Visible to the public "More APTs Eye Managed Service Providers in Supply Chain Attacks"

    Sophisticated threat groups are increasingly compromising Managed Service Providers (MSPs) and launching supply chain attacks against their small and medium-sized downstream customers. The analysis of data from more than 200,000 small and medium-sized businesses (SMBs), including regional MSPs, between the first quarters of 2022 and 2023 revealed the increased interest of APTs in this segment as a means to launch attacks against a large number of companies in a single geographic region. MSPs, in conjunction with solution providers and resellers, help end users with the deployment, customization, and management of cloud services and other technologies. Regional MSPs serve customers in concentrated geographic areas. Compromising these organizations could enable attackers to target "trusted relationships" between MSPs and their customers. According to Proofpoint, regional MSPs protect hundreds of SMBs local to their geography, many of which have inadequate and often non-enterprise-grade cybersecurity defenses. APT actors have observed this disparity between the levels of protection offered and the potential for gaining access to desirable end-user environments. This article continues to discuss APT groups increasingly targeting MSPs.

    Decipher reports "More APTs Eye Managed Service Providers in Supply Chain Attacks"

  • news

    Visible to the public "Telegram Emerges as Criminals' Top Choice for Handling Stolen Information"

    In 2022, the cybersecurity firm Group-IB identified nearly 3,700 different phishing kits, a 25 percent increase from 2021. A phishing kit is a collection of tools used to execute widespread phishing campaigns. Typically, threat actors manage stolen data via email. Gmail remained the most popular service, with 45 percent of phishers preferring Google as a data processing tool. However, according to Group-IB's Computer Emergency Response Team (CERT-GIB), the number of phishing kits that rely on Telegram to collect stolen data has nearly doubled. In 2022, 9.4 percent of phishers used Telegram for information management. The flexibility and convenience of the messenger enable cybercriminals to manage and process compromised information in near real-time, according to the company. Many encrypted messaging services, such as Signal and WhatsApp, are used by criminals because they provide users with a great deal of anonymity. This article continues to discuss Telegram becoming a top choice among cybercriminals for handling stolen information.

    Cybernews reports "Telegram Emerges as Criminals' Top Choice for Handling Stolen Information"