News Items

  • news

    Visible to the public "Delaware Taps Artificial Intelligence to Evacuate Crowded Beaches When Floods Hit"

    Delaware's transportation department, which controls more than 90% of roads in a state with the lowest average elevation in the country, is tasked with implementing evacuation plans during high water, which is a bureaucratic nightmare considering how quickly conditions can change. Delaware's transportation department is now using machine learning and AI to help. The department stated that for humans to monitor thousands of detectors or data sources is overwhelming. That's where AI comes in. Rather than sending a crew to the scene to block an impassable road, the system uses sensors to detect weather threats and even can predict them. Then, it sends the information directly to drivers through cellphone alerts while broadcasting them simultaneously on electronic highway signs. The department noted that the amount of data keeps growing, with many automated cars now able to not only inform their drivers of the dangers ahead but also feed the system to warn others. Researchers at Missouri University of Science and Technology tested an earlier version of a flood prediction analysis system on the Mississippi River between 2019-22. Steve Corns, an associate professor of engineering management and systems engineering who co-authored the study, said the system was able to detect in minutes what used to take hours. But now, Corns said, the capabilities are even more advanced and useful.

    The Associated Press reports: "Delaware Taps Artificial Intelligence to Evacuate Crowded Beaches When Floods Hit"

  • news

    Visible to the public "API Bug in OAuth Dev Tool Opened Websites, Apps to Account Hijacking"

    A critical Application Programming Interface (API) vulnerability in the Expo open source framework enabled the harvesting of auth credentials via the Open Authorization (OAuth) protocol. According to researchers at Salt Labs, the vulnerability, while affecting a relatively small number of developers, could have impacted many users logging into online services such as Facebook, Twitter, or Spotify via the open source framework. A successful attack could have let an adversary take over accounts and steal credentials on a mobile app or website configured to use the Expo AuthSession Redirect Proxy. A victim could have triggered an attack by clicking on a malicious link. Developers use Expo (auth.expo.io) to create native apps for iOS, Android, and web platforms with a single set of tools, libraries, and services. It is regarded as an efficient method to accelerate the application development process. According to Salt Labs, the vulnerability may affect hundreds of companies using Expo, including Codecademy. However, researchers emphasize the small surface area of auth.expo.io, which reduces the number of social sign-on instances involved. This article continues to discuss the potential manipulation of steps in the OAuth sequences via the Expo API to hijack sessions and take over accounts.

    SC Media reports "API Bug in OAuth Dev Tool Opened Websites, Apps to Account Hijacking"

  • news

    Visible to the public "GitLab Security Update Patches Critical Vulnerability"

    DevOps platform GitLab recently resolved a critical-severity vulnerability impacting both GitLab Community Edition (CE) and Enterprise Edition (EE). An open source end-to-end software development platform, GitLab helps developers and organizations build, secure, and operate software. The platform has approximately 30 million registered users. The vulnerability is tracked as CVE-2023-2825 and can lead to arbitrary file reads. The newly addressed security defect has the maximum CVSS score of 10. The company noted that an unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups. The web-based Git repository will release details on the bug next month after 30 days have passed since the patch was made available. According to GitLab, the issue was introduced in GitLab CE/EE version 16.0.0 and was resolved on Tuesday with the release of version 16.0.1 of the platform. The flaw was reported by a researcher named "pwnie" via GitLab's HackerOne-hosted bug bounty program. Given the severity of the bug, all GitHub users running version 16.0.0 of GitLab CE or EE are strongly advised to upgrade to the latest version of the platform as soon as possible. The patch has already been deployed on GitLab[.]com. GitLab did not mention if this vulnerability was being exploited in malicious attacks.

    SecurityWeek reports: "GitLab Security Update Patches Critical Vulnerability"

  • news

    Visible to the public "CyLab Faculty Earn Two 'Test of Time' Awards at IEEE Symposium on Security and Privacy"

    During the 44th Symposium on Security and Privacy, the Institute of Electrical and Electronics Engineers (IEEE) gave two "Test of Time" awards to papers co-authored by faculty members at Carnegie Mellon University's (CMU) CyLab Security and Privacy Institute. Initiated in 2019, the Test of Time award honors published papers previously presented at the annual symposium that have had a significant and lasting impact on computer security and privacy research and practice. This year, the award committee considered papers presented from 2011 through 2013. The first paper that won the award is titled "Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms." Researchers examined 12,000 passwords collected under seven composition policies and developed an efficient distributed method for calculating the effectiveness of different heuristic password-guessing algorithms. The second award-winning paper is titled "Pinocchio: Nearly Practical Verifiable Computation." In 2013, researchers recognized the need to instill greater confidence in cloud-based computations and enable clients to verify the accuracy of the returned results. A team of Microsoft and IBM researchers, including now CMU Computer Science and Electrical and Computer Engineering Associate Professor Bryan Parno, developed Pinocchio, a system for efficiently verifying general computations while relying solely on cryptographic assumptions. This article continues to discuss the papers that earned CyLab faculty members two Test of Time awards at the IEEE Symposium on Security and Privacy.

    CyLab reports "CyLab faculty earn two 'Test of Time' awards at IEEE Symposium on Security and Privacy"

  • news

    Visible to the public "GUAC 0.1 Beta: Google's Breakthrough Framework for Secure Software Supply Chains"

    Google has announced the 0.1 Beta version of GUAC, which stands for Graph for Understanding Artifact Composition. It will help organizations secure their software supply chains. The search giant is making the open source framework available as an Application Programming Interface (API) for developers to integrate their tools and policy engines. GUAC aims to compile software security metadata from various sources into a graph database that illustrates the relationships between software, thus enabling organizations to determine how one piece of software impacts another. According to Google's documentation, GUAC provides organizations with organized and actionable insights into their software supply chain security position. It should consolidate Software Bill of Materials (SBOM) documents, SLSA attestations, OSV vulnerability feeds, a company's internal private metadata, and more to help create a clearer risk profile and visualize the relationships between artifacts, packages, and repositories. This article continues to discuss the 0.1 Beta version of GUAC.

    THN reports "GUAC 0.1 Beta: Google's Breakthrough Framework for Secure Software Supply Chains"

  • news

    Visible to the public "New Buhti Ransomware Gang Uses Leaked Windows, Linux Encryptors"

    A new ransomware operation, "Buhti," targets Windows and Linux systems using leaked code from the LockBit and Babuk ransomware families. Although the threat actors behind Buhti, now tracked as "Blacktail," have not developed their own ransomware strain, they have created a custom data exfiltration tool to double-extort victims. In February 2023, Palo Alto Networks' Unit 42 team identified Buhti as a Linux-targeting ransomware written in Go. Symantec's Threat Hunter team has published a new report showing that Buhti also targets Windows using a modified LockBit 3.0 variant named "LockBit Black." Blacktail uses the Windows LockBit 3.0 builder leaked by a disgruntled developer on Twitter in September 2022. For Linux attacks, Blacktail uses a payload based on the Babuk source code posted on a Russian-language hacking forum in September 2021. Malware reuse is typically a sign of less sophisticated actors. However, in this case, multiple ransomware groups gravitate towards Babuk due to its demonstrated ability to compromise VMware ESXi and Linux systems. Targeting these systems has been profitable for cybercriminals. This article continues to discuss the use of leaked Windows and Linux encryptors by the Buhti ransomware gang.

    Bleeping Computer reports "New Buhti Ransomware Gang Uses Leaked Windows, Linux Encryptors"

  • news

    Visible to the public "Phishing Campaign Targets ChatGPT Users"

    Researchers at Inky have discovered a phishing campaign designed to steal business email account credentials by impersonating OpenAI, the company behind the ChatGPT Artificial Intelligence (AI)-driven chatbot. ChatGPT has rapidly gained popularity and is now widely used by individuals and businesses, which is why cybercriminals are increasingly trying to impersonate the brand. In the initial phase of the attack, the victim receives a seemingly legitimate email purportedly sent by OpenAI. To continue using their ChatGPT account setup, the email requests that the recipient verifies their email address. To further deceive the victim, the threat actors manipulate the sender's domain to make it appear as though the email came from their company's Information Technology (IT) support. This article continues to discuss the new phishing campaign targeting ChatGPT users.

    Help Net Security reports "Phishing Campaign Targets ChatGPT Users"

  • news

    Visible to the public "'Volt Typhoon' China-Backed APT Infiltrates US Critical Infrastructure Orgs"

    An investigation conducted by Microsoft reveals that China-backed threat actors have established persistent access to telecommunications networks and other critical infrastructure targets in the US for espionage and, potentially, to disrupt communications in the event of military conflict in the South China Sea and broader Pacific. Microsoft calls the Advanced Persistent Threat (APT) "Volt Typhoon." Researchers from Microsoft, Mandiant, and other organizations have previously observed this state-sponsored group conducting cyber espionage. According to the analysis, Microsoft has moderate confidence that the Volt Typhoon campaign is pursuing the development of capabilities that could disrupt critical communications infrastructure between the US and Asia during future crises. This article continues to discuss findings regarding the Volt Typhoon China-backed APT.

    Dark Reading reports "'Volt Typhoon' China-Backed APT Infiltrates US Critical Infrastructure Orgs"

  • news

    Visible to the public "UC Santa Cruz Engineers Join Major Transportation Cybersecurity Project"

    As part of a new national center, UC Santa Cruz (UCSC) researchers will play an important role in protecting US transportation systems from cyber threats. Researchers at UCSC will focus on enhancing the Artificial Intelligence (AI) systems powering autonomous vehicles such as driverless cars. Nine universities will collaborate on the new National Center for Transportation Cybersecurity and Resilience (TraCR) with the support of a five-year, $20 million grant from the US Department of Transportation. The center will develop hardware and software to defend Internet-connected transportation systems against cyberattacks. Associate Professor Alvaro Cardenas, who will serve as the center's associate director at UCSC, emphasizes that as AI agents become more pervasive in transportation infrastructures, we will need expertise in various areas to operate these systems securely. This article continues to discuss the major transportation cybersecurity project and the UCSC engineers participating in it.

    UC Santa Cruz reports "UC Santa Cruz Engineers Join Major Transportation Cybersecurity Project"

  • news

    Visible to the public "SAS Airlines Breached by Pro-Russian Hackers – Again"

    The pro-Russian hacking group Anonymous Sudan compromised Scandinavian Airlines (SAS) for the second time this year, knocking the SAS website and app offline for hours. The group tried to extort SAS with a $3,500 ransom to stop the attack. According to the SAS corporate website, the airline carrier for Denmark, Norway, and Sweden typically offers more than 800 scheduled flights per day to over 130 destinations worldwide. In February, Anonymous Sudan claimed the airlines as part of a Valentine's Day attack against Sweden, rendering the SAS website inaccessible for hours and compromising sensitive passenger data. Several Swedish media agencies were also targeted during the Valentine's Day attacks. The group claimed to have attacked Swedish companies in retaliation for the burning of a Koran by a well-known Swedish/Danish activist during a January protest in Stockholm supporting Sweden's bid to join NATO. This article continues to discuss the recent attack on the SAS company by the pro-Russian hacking group Anonymous Sudan.

    Cybernews reports "SAS Airlines Breached by Pro-Russian Hackers - Again"

  • news

    Visible to the public "NSA and Partners Identify China State-Sponsored Cyber Actor Using Built-in Network Tools When Targeting US Critical Infrastructure Sectors"

    The National Security Agency (NSA) and its partners have identified indicators of compromise (IOCs) related to a People's Republic of China (PRC) state-sponsored cyber actor using living off the land (LOTL) techniques to target networks across the critical infrastructure of the US. NSA is leading US and Five Eyes partner agencies in releasing the "People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection" Cybersecurity Advisory (CSA) to help network defenders in hunting and detecting this type of malicious activity by PRC actors on their systems. The partner agencies include the US Cybersecurity and Infrastructure Security Agency (CISA), FBI, Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NCSC-NZ), and UK National Cyber Security Centre (NCSC-UK). The CSA provides an overview of hunting tips and recommended practices. It contains examples of the actor's commands and signatures for detection. The authoring agencies also provide a summary of IOC values, such as unique command-line strings, hashes, file paths, exploitation of CVE-2021-40539 and CVE-2021-27860 vulnerabilities, and file names commonly used by this actor. This article continues to discuss the release of guidance regarding a PRC state-sponsored cyber actor targeting US critical infrastructure.

    NSA reports "NSA and Partners Identify China State-Sponsored Cyber Actor Using Built-in Network Tools When Targeting US Critical Infrastructure Sectors"

  • news

    Visible to the public "The Real Risks in Google's New .Zip and .Mov Domains"

    Google released eight new Top-Level Domains (TLDs) at the beginning of May. These are the suffixes at the end of URLs, such as ".com" or ".uk." The new TLDs include ".zip" and ".mov," which are expected to invite phishing and other forms of online fraud. Since both of them are also common file extension names, they stand out. The former, ".zip," is used for data compression, whereas ".mov" is an Apple-developed video format. The concern is that URLs resembling file names will increase opportunities for digital scams such as phishing, which deceive web users into clicking on malicious links disguised as legitimate. In addition, the two domains may exacerbate the issue of programs mistaking file names for URLs and automatically adding links to the file names. Scammers could purchase ".zip" and ".mov" URLs that are also common file names, so online references to files with those names could automatically link to a malicious website. This article continues to discuss the new top-level domains that could be used in phishing attacks.

    Wired reports "The Real Risks in Google's New .Zip and .Mov Domains"

  • news

    Visible to the public "AT&T Resolves Issue That Would Allow Account Takeover Through ZIP Code and Phone Number"

    AT&T recently patched a vulnerability that would have allowed anyone to hijack someone's account on the telecommunications company's official website by using the account holder's phone number and ZIP code. Joseph Harris, a cybersecurity researcher, uncovered the flaw earlier this year, discovering a way to exploit an account merging feature for malicious purposes. The vulnerability enabled him to effectively merge his account with that of anyone else, granting him the ability to change the password and assume control of that account. There is no evidence that the vulnerability was exploited beyond the researcher, according to an AT&T spokesperson who verified the issue and stated that it was promptly resolved through the company's bug bounty program. AT&T has approximately 81.5 million postpaid customers and 19 million prepaid customers. According to Harris, the vulnerability was relatively easy to exploit. After creating a free profile on the company's website, an attacker could navigate to the "combine accounts" tab and select "already registered accounts." After inputting the victim's phone number and ZIP code, the masked user ID and password prompt would appear. Harris explained that hackers could intercept the request of the password being entered and use the website's backend to forward the password request to accounts the hacker controls. Harris successfully tested the attack technique using his own accounts. This article continues to discuss the issue that would have enabled AT&T website account takeover.

    The Record reports "AT&T Resolves Issue That Would Allow Account Takeover Through ZIP Code and Phone Number"

  • news

    Visible to the public "Backup Repositories Targeted in 93% of Ransomware Attacks"

    Security researchers at Veeam discovered that 85% of organizations have suffered at least one ransomware attack over the past 12 months. The researchers warned that if this trend continues, "more organizations will suffer a ransomware attack than turn a profit." The researchers also found that in 93% of ransomware incidents, the threat actors target the backup repositories, resulting in 75% of victims losing at least some of their backups during the attack and more than one-third (39%) of backup repositories being completely lost. Organizations are still ill-prepared to face this threat. The researchers noted that most (80%) continue to pay the ransom despite multiple advisories against it. They primarily do that to get their data back, yet 21% don't, even after paying the ransom. Additionally, many respondents to the researcher's survey acknowledge that progress needs to be made in incident response. For example, despite 87% claiming they have a risk management program that drives their security roadmap, only 35% believe their program is working well, and 52% are seeking to improve their situation. Moreover, while respondents cited "clean backup copies" and "recurring verification that the backups are recoverable" as the most common elements of the incident response playbook in preparation against a cyberattack, 60% of organizations say there is insufficient alignment between their backup and cyber teams.

    Infosecurity reports: "Backup Repositories Targeted in 93% of Ransomware Attacks"

  • news

    Visible to the public "Team Develops New 'Attacker' Device to Improve Autonomous Car Safety"

    Today's cars and autonomous vehicles use millimeter wave (mmWave) radio frequencies to facilitate self-driving or assisted driving functions that protect passengers and pedestrians. However, this connectivity can also leave them vulnerable to cyberattacks. To improve the safety and security of autonomous vehicles, researchers from the lab of Dinesh Bharadia, an affiliate of the UC San Diego Qualcomm Institute (QI), and faculty member in the university's Jacobs School of Engineering Department of Electrical and Computer Engineering, along with colleagues from Northeastern University developed a novel algorithm designed to simulate an attacking device. The algorithm, which is described in the paper titled "mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array," enables researchers to identify areas where autonomous vehicle security can be improved. The team developed an algorithm that mimics a spoofing attack. Previous attempts to develop an attacking device for testing cars' resistance had limited feasibility, assuming that the attacker can synchronize with the victim's radar signal to initiate an attack, or that both cars are physically connected via a cable. This article continues to discuss the attacker device developed to improve autonomous vehicle security.

    University of California San Diego reports "Team Develops New 'Attacker' Device to Improve Autonomous Car Safety"

  • news

    Visible to the public Cyber Scene #80 - Digitization: Making Money Makes the World Go Round

    Cyber Scene #80 -

    Digitization: Making Money Makes the World Go Round

  • news

    Visible to the public SoS Musings #73 - Insider Threats Are Still on the Rise

    SoS Musings #73 -

    Insider Threats Are Still on the Rise

  • news

    Visible to the public Cybersecurity Snapshots #42 - New Ransomware Gang Discovered: The RA Group

    Cybersecurity Snapshots #42 -

    New Ransomware Gang Discovered: The RA Group

  • news

    Visible to the public "Apps for Older Adults Contain Security Vulnerabilities"

    Technology and mobile devices are most commonly associated with younger users, but older individuals are not far behind. Pew Research Center estimates that approximately 61 percent of older people in the US own a smartphone. This market is expected to expand as the population ages, and a constellation of mobile apps designed for this demographic is also expanding. These apps may help older users remain in touch with loved ones, assist with health-related tasks, and enhance their social lives, but they are not risk-free. According to a new paper by Concordia researchers, some of the most popular apps designed for older adults pose significant privacy and data risks. The researchers examined 146 popular Android apps and discovered that 95 of them, or roughly two-thirds, do not adequately protect users in one or more ways. According to them, it is a significant risk for a population that may be unaware of the inherent perils of an increasingly interconnected world. The paper's main author, Pranay Kapoor, pointed out that many of these apps contain essential health or medication information. An attacker could potentially exploit the vulnerabilities in these apps to alter the medication or the reminders to take it. Even minor alterations can have profound consequences. This article continues to discuss apps designed for older adults containing multiple security vulnerabilities.

    Concordia University reports "Apps for Older Adults Contain Security Vulnerabilities"

  • news

    Visible to the public "Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own"

    Latvian network equipment manufacturer MikroTik has recently released a patch for a major security defect in its RouterOS product and confirmed the vulnerability was exploited five months ago at the Pwn2Own Toronto hacking contest. The flaw, CVE-2023-32154, affects devices running MikroTik RouterOS versions v6.xx and v7.xx with enabled IPv6 advertisement receiver functionality. According to ZDI, organizers of the Pwn2Own software exploitation event, the vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Mikrotik RouterOS. ZDI warned that authentication is not required to exploit this vulnerability. MikroTik stated that the specific flaw exists within the Router Advertisement Daemon. "The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root." The Pwn2Own organizers decided to go public with an advisory prior to the availability of patches after waiting five months for MikroTik to acknowledge and fix the already-exploited security flaw. ZDI noted that it reported the issue to MikroTik during the event last December and asked again for an update in May this year, five months later. On May 10, ZDI said it "re-disclosed the report at the vendor's request" and gave the company an extra week to provide fixes. In its response, MikroTik said it could not find a record of the December disclosure from ZDI and that it was not present at the Toronto event in December to discuss the exploit.

    SecurityWeek reports: "Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own"

  • news

    Visible to the public "UCLA Computer Grad Constructs 'Crown Jewel of Cryptography'"

    Aayush Jain received the 2022 ACM Doctoral Dissertation Award for his dissertation entitled "Indistinguishability Obfuscation From Well-Studied Assumptions." From well-studied hardness conjectures, Jain's dissertation established the feasibility of mathematically rigorous software obfuscation. The primary objective of software obfuscation is to render source code unintelligible without altering its functionality. Additional conditions can be added, such as requiring the transformed code to perform similarly to the original or even the same. As a mechanism for software security, software obfuscation must have a solid mathematical foundation. The mathematical object that Jain's thesis creates, indistinguishability obfuscation, is regarded as a "master tool" in the context of cryptography, not only for achieving long-desired cryptographic goals such as functional encryption but also for broadening the field of cryptography itself. For example, indistinguishability obfuscation helps achieve software security objectives that were previously only in software engineering. This article continues to discuss Jain's dissertation "Indistinguishability Obfuscation From Well-Studied Assumptions."

    ACM reports "UCLA Computer Grad Constructs 'Crown Jewel of Cryptography'"

  • news

    Visible to the public "Could These Bills Endanger Encrypted Messaging?"

    Billions of people worldwide use end-to-end encrypted messaging apps such as WhatsApp, Telegram, and Signal. In theory, end-to-end encryption ensures that only the sender and recipient possess the keys necessary to decrypt their message. Not even an app's owners can look in. According to some encryption advocates, this privacy tool now faces its greatest challenge: legislation enacted in the name of a safer Internet. The UK's Online Safety Bill, expected to become law later this year, is the most recent example. Similar laws are proposed in other democratic countries. According to their opponents, these laws would undermine the foundation of end-to-end encryption for protecting privacy. Clause 110 of the Online Safety Bill, which authorizes the Brig broadcasting and telecommunications regulator, Ofcom, to issue takedown orders for messages "whether communicated publicly or privately by means of the service," worries encryption advocates. To accomplish this, the law requires services to monitor messages using "accredited technology" that has been approved by Ofcom. Observers believe service providers cannot comply with Clause 110 takedown orders without jeopardizing encryption. This article continues to discuss the bills raising concerns among privacy advocates.

    IEEE Spectrum reports "Could These Bills Endanger Encrypted Messaging?"

  • news

    Visible to the public "Legion Malware Upgraded to Target SSH Servers and AWS Credentials"

    An updated version of the commodity malware known as Legion includes enhanced capabilities to compromise SSH servers and Amazon Web Services (AWS) credentials linked to DynamoDB and CloudWatch. Cado Labs researcher Matt Muir said the recent update demonstrates a broadening of scope, with new capabilities such as compromising SSH servers and retrieving additional AWS-specific credentials from Laravel web applications. The developer's targeting of cloud services improves with each release. Legion, a Python-based hacking tool, was first documented by the cloud security company in April, describing its ability to breach vulnerable SMTP servers and extract credentials. It is also known to exploit web servers operating Content Management Systems (CMS), use Telegram as a data exfiltration point, and use stolen SMTP credentials to send spam SMS messages to a list of dynamically-generated US mobile numbers. Legion's capability to exploit SSH servers using the Paramiko module is also a notable addition. It includes functionality to retrieve additional AWS-specific credentials for DynamoDB, CloudWatch, and AWS Owl from Laravel web applications. This article continues to discuss the updated Legion malware.

    THN reports "Legion Malware Upgraded to Target SSH Servers and AWS Credentials"

  • news

    Visible to the public "GoldenJackal State Hackers Silently Attacking Govts Since 2019"

    Since 2019, a relatively unknown Advanced Persistent Threat (APT) group called GoldenJackal has been conducting espionage against government and diplomatic entities in Asia. The threat actors have maintained a low profile for hiding, carefully selecting their victims, and limiting the number of attacks to reduce the likelihood of being discovered. Since 2020, researchers have been monitoring GoldenJackal, now reporting that the threat actors have been active in Afghanistan, Azerbaijan, Iran, Iraq, Pakistan, and Turkey. GoldenJackal uses a collection of custom .NET malware tools for various functions, including credential dumping, data theft, malware loading, lateral movement, file exfiltration, and more. The primary payload used to infect a system is JackalControl, which grants the perpetrators remote control of the infected computer. The malware can establish persistence by adding Registry keys, Windows scheduled tasks, or Windows services. This article continues to discuss the GoldenJackal APT group.

    Bleeping Computer reports "GoldenJackal State Hackers Silently Attacking Govts Since 2019"

  • news

    Visible to the public "Less Is Not More; Mapping a Better Route to User Ad Settings"

    For users seeking to modify their privacy settings on websites such as Facebook and Google, the process often feels like a scavenger hunt. In many cases, these settings are spread across multiple pages, requiring at least five clicks to locate the desired option. In a new study titled "Less is Not More: Improving Findability and Actionability of Privacy Controls for Online Behavioral Advertising," researchers from Carnegie Mellon University's (CMU) CyLab Security and Privacy Institute and the University of Michigan explore design options for making settings related to advertising preferences on Facebook more discoverable. The researchers also try to understand how design changes would affect users' behaviors and sentiments towards settings and the platform. The study focuses on two variables: the entry points a user would click on to locate the correct ad settings and the level of actionability within the ad control interface. This article continues to discuss the study on improving the findability and actionability of privacy controls.

    CyLab reports "Less Is Not More; Mapping a Better Route to User Ad Settings"

  • news

    Visible to the public "Legitimate Android App Transforms Into Data-Snooping Malware"

    iRecorder - Screen Recorder is a trojanized Android app discovered by ESET researchers. It was available as a legitimate app on Google Play in September 2021, and malicious functionality was likely introduced in August 2022. During its existence, more than 50,000 devices installed the app. The malicious code that was introduced to the clean version of iRecorder is based on the open-source AhMyth Android Remote Access Trojan (RAT) and has been changed into what ESET researchers call AhRat. The malicious app's ability to record audio using the device's microphone and steal files suggests it may be part of an espionage operation. Other than the Google Play Store, ESET Research has not found AhRat in the wild. However, this is not the first time AhMyth-based Android malware has been available on the official store. In 2019, ESET published research on a similar trojanized app. In the past, the spyware, which was based on AhMyth, circumvented Google's app-vetting process twice as a malicious app that provided radio streaming. However, the iRecorder app is also available on unofficial and alternative Android markets, and the developer offers other apps on Google Play that do not contain malicious code. This article continues to discuss findings regarding the trojanized Android app iRecorder - Screen Recorder.

    Help Net Security reports "Legitimate Android App Transforms Into Data-Snooping Malware"

  • news

    Visible to the public "US Sanctions North Korean University for Training Hackers"

    The US Department of the Treasury recently announced sanctions against four entities and one individual for engaging in malicious cyber activities on behalf of the North Korean government. The US Department of the Treasury stated that North Korean threat actors, such as the infamous Lazarus group, launch malicious campaigns targeting organizations and individuals worldwide to generate illicit revenue to support the Pyongyang regime and its priorities. According to the Treasury's Office of Foreign Assets Control (OFAC), North Korean threat actors are trained at the Pyongyang University of Automation, with many of them landing jobs within units of the Reconnaissance General Bureau (RGB), the country's primary intelligence bureau. RGB, which was designated by OFAC in 2015 as being subordinated to the North Korean government, also controls the Technical Reconnaissance Bureau and its cyber unit, the 110th Research Center. The US says that the 110th Research Center is responsible for numerous cyberattacks, including the devastating DarkSeoul campaign, and for the theft of sensitive government information from South Korea related to military defense and response planning. The US announced that Pyongyang University of Automation, the Technical Reconnaissance Bureau, and the 110th Research Center are being designated pursuant to EO 13687 for being agencies, instrumentalities, or controlled entities of the Government of North Korea or the Workers' Party of Korea.

    SecurityWeek reports: "US Sanctions North Korean University for Training Hackers"

  • news

    Visible to the public "SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft"

    A massive credential-harvesting campaign uses the legitimate email newsletter program SuperMailer to send out a large number of phishing emails designed to circumvent Secure Email Gateway (SEG) protections. Cofense reported on May 23 that SuperMailer-created emails account for a significant 5 percent of all credential phishing attempts within the company's telemetry for the month of May. The monthly volume of the activity has more than doubled in three of the past four months, which is notable even in a time when credential phishing is on the rise. Combining SuperMailer's customization features and sending capabilities with evasion techniques, threat actors behind the campaign sent customized, legitimate-looking emails to inboxes across all industries, according to Brad Haas, cyber threat intelligence analyst at Cofense and author of the study. According to Cofense, the threat actors behind the activity are casting a wide net, hoping to catch victims in a variety of industries, including construction, consumer goods, energy, financial services, food service, government, healthcare, information and analytics, insurance, manufacturing, media, mining, professional services, retail, transportation, and utilities. This article continues to discuss the credential-harvesting SuperMailer campaign.

    Dark Reading reports "SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft"

  • news

    Visible to the public "Surprise: A Small Change Leads to Big Results for Computer Security"

    A team of researchers from UC San Diego and Purdue University has discovered a hidden feature of Intel processors that can enhance security, including shutting down an entire class of Spectre attacks capable of providing an attacker with sensitive information such as passwords or encryption keys. In their 2023 IEEE Security and Privacy paper titled "Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution," the researchers have completely reverse-engineered the conditional branch predictor for all of Intel's flagship processors. No prior work had fully deciphered these predictors, even those introduced over 12 years ago. The researchers successfully reverse-engineered the structure, sizes, and lookup functions of these predictors. This article continues to discuss computer scientists discovering, for the first time, that the popular Intel processor already has a key security feature that protects against attacks, including Spectre.

    UC San Diego reports "Surprise: A Small Change Leads to Big Results for Computer Security"

  • news

    Visible to the public "#StopRansomware Guide Released by NSA and Partners"

    The National Security Agency (NSA) and several partners have released the "#StopRansomware Guide" Cybersecurity Information Sheet (CSI) to help network defenders protect against malicious cyber actors' evolving ransomware tactics. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and Multi-State Information Sharing and Analysis Center (MS-ISAC) originally released the guidance in 2020, but the new update incorporates additional best practices and recommendations based on operational insight from CISA, MS-ISAC, NSA, and the FBI. Additional recommendations address the prevention of common initial infection vectors, cloud backups, and Zero Trust Architecture (ZTA). CISA and the National Institute of Standards and Technology (NIST) devised the Cross-Sector Cybersecurity Performance Goals (CPGs), which these recommended practices align with. The CSI expands the ransomware response checklist to include recommendations for threat hunting and analysis. This article continues to discuss the #StopRansomware Guide.

    NSA reports "#StopRansomware Guide Released by NSA and Partners"

  • news

    Visible to the public "Hackers Attack Medical Equipment Provider, Almost 2M People Affected"

    In an attack on Apria Healthcare, cybercriminals stole the credit card information of nearly two million customers. Apria is a leading provider of home medical equipment delivery and clinical support in the US. The attackers reportedly stole financial information, including account numbers and credit/debit card numbers. The attackers also accessed account security codes, access codes, passwords, and PINs. From April 5 to May 7, 2019, an unauthorized third party allegedly accessed Apria's systems. The malicious actors then re-entered the systems between August 27 and October 10, 2021. The company claims to have found no evidence of funds being removed, and there have been no reports of misuse of disclosed personal data. This article continues to discuss the attack on the medical equipment provider.

    Cybernews reports "Hackers Attack Medical Equipment Provider, Almost 2M People Affected"

  • news

    Visible to the public "Fata Morgana Watering Hole Attack Targets Shipping, Logistics Firms"

    Security researchers at ClearSky have discovered a sophisticated watering hole attack targeting multiple Israeli websites. The malicious attempt, believed to be conducted by a nation-state actor from Iran, has raised concerns about the security of shipping and logistics companies operating in the region. The researchers stated that in watering hole attacks, the attacker compromises a website that is frequently visited by a specific group of people, such as government officials, journalists, or corporate executives. Once compromised, the attacker can inject malicious code into the website, which will be executed when users visit it. The researchers noted that currently, the campaign focuses on shipping and logistics companies, aligning with Iran's focus on the sector for the past three years. The researchers attributed the attack with low confidence to Tortoiseshell, also known as TA456 or Imperial Kitten, a hacking group traditionally linked to Iranian cyber operations.

    Infosecurity reports: "Fata Morgana Watering Hole Attack Targets Shipping, Logistics Firms"

  • news

    Visible to the public "A Deeper Insight Into the CloudWizard APT's Activity Revealed a Long-Running Activity"

    In March 2023, researchers detected a previously unknown Advanced Persistent Threat (APT) group, Bad Magic, also known as Red Stinger, which targeted organizations in the region of the Russo-Ukrainian conflict. The attackers were seen using PowerMagic and CommonMagic implants. On the lookout for other implants with similarities to PowerMagic and CommonMagic, the researchers discovered a different cluster of even more sophisticated malicious activities associated with the same threat actor. In addition to Donetsk, Lugansk, and Crimea, victims of this cluster were also located in central and western Ukraine. The APT group targeted individuals as well as diplomatic and research organizations in the conflict zone. In the most recent campaign discovered by researchers, the APT group used a modular framework dubbed CloudWizard that supports spyware capabilities, such as capturing screenshots, recording microphones, harvesting Gmail inboxes, and keylogging. This article continues to discuss the CloudWizard APT targeting organizations involved in the region of the Russo-Ukrainian conflict.

    Security Affairs reports "A Deeper Insight Into the CloudWizard APT's Activity Revealed a Long-Running Activity"

  • news

    Visible to the public "Infostealers Distributed via Fraudulent CapCut Websites"

    Different information-stealing malware strains have been distributed using websites posing as the TikTok video editor CapCut in different campaigns. A Cyble report revealed that the threat actors behind the first campaign used fraudulent CapCut websites to facilitate the distribution of the Offx Stealer with a PyInstaller-compiled binary on Windows 8, 10, and 11 devices. Offx Stealer's execution would enable the exfiltration of web browser passwords, cookies, and certain file types, as well as information from cryptocurrency wallet apps, messaging apps, and remote access software. The second campaign involved the delivery of a batch script-containing file that triggered a PowerShell script facilitating the delivery of the RedLine stealer and a .NET executable. RedLine would enable data theft, whereas the other payload would ensure the data thief remains undetected on the compromised systems. This article continues to discuss the distribution of information-stealing malware strains through fraudulent CapCut websites.

    SC Media reports "Infostealers Distributed via Fraudulent CapCut Websites"

  • news

    Visible to the public "FBI Warns About Fake Job Ads From Cyber Traffickers"

    The FBI warns people to be aware of fake employment advertisements that are used to lure applicants into Southeast Asian scam operations. In recent years, such schemes, perpetrated primarily by Chinese organized crime groups, have expanded in size, with Cambodia as the industry's epicenter and Myanmar increasingly becoming a hub. Workers are trafficked into "pig butchering" operations, in which a cybercriminal forges a relationship with a victim from a distance before stealing their money. Historically, labor trafficking has involved precarious manual jobs, but cyber trafficking in Southeast Asia requires a well-educated population with technology and language skills, so syndicates cast a wide net in the quest for workers. In employment fraud schemes, criminal actors primarily target victims in Asia by publishing false job advertisements on social media and online employment sites, according to the FBI's notice, adding that advertised positions include tech support and offer high salaries and benefits. The FBI alert is intended for US travelers, but victims are from all over the world, mostly from Asia. This article continues to discuss the FBI's warning about fake job advertisements from cyber traffickers.

    The Record reports "FBI Warns About Fake Job Ads From Cyber Traffickers"

  • news

    Visible to the public "Google Launches Bug Bounty Program for Mobile Applications"

    Google recently introduced Mobile VRP (vulnerability rewards program), a new bug bounty program for reporting vulnerabilities found in the company's mobile applications. The Mobile VRP runs alongside the Android and Google Devices security reward program, which rewards security researchers for issues identified in the Android OS, Pixel phones, and Google Nest and Fitbit devices. Google noted that the new program is specifically designed for first-party Android applications, which fall into three categories. Tier 1 apps include Google's own Play Services, AGSA (Android Google Search app), Chrome, Cloud, Gmail, and Chrome Remote Desktop software. Applications published by Developed with Google, Research at Google, Red Hot Labs, Google Samples, Fitbit LLC, Nest Labs Inc., Waymo LLC, and Waze are also within scope. Google stated that as part of Mobile VRP, it is looking for reports describing flaws leading to arbitrary code execution and theft of sensitive data (credentials and personal information) but may also accept submissions of other types of bugs with a security impact, such as path traversal, intent redirections, unsafe usage of pending intents, and orphaned permissions. The internet giant is willing to pay up to $30,000 for vulnerabilities in Tier 1 apps that can be exploited remotely without user interaction to achieve arbitrary code execution. The lowest reward for this type of bug is $2,250. Researchers reporting issues in Tier 2 and Tier 3 apps may earn up to $25,000 and $20,000, respectively, for similar vulnerabilities. Flaws leading to sensitive data theft and other types of issues will be awarded between $750 and $7,500 for Tier 1 apps, between $625 and $6,250 for Tier 2 software, and between $500 and $5,000 for Tier 3 applications. Google notes it may also award $1,000 bonuses for surprising vulnerabilities or exceptional writeups. Google stated that researchers are encouraged to present their findings in a succinct manner, adding a short proof-of-concept (PoC) if possible. It was noted that researchers interested in participating in the Mobile VRP should only target their own accounts and should submit their findings through Google's report page. Additional information on the program can be found on the new Mobile VRP page.

    SecurityWeek reports: "Google Launches Bug Bounty Program for Mobile Applications"

  • news

    Visible to the public "China Issues Ban on US Chipmaker Products"

    China has recently banned products sold by US chipmaker giant Micron, citing cybersecurity concerns. The Cyberspace Administration of China announced the decision on May 21, 2023, following a cybersecurity review of Micron products sold in China that was initiated in March 2023. The Chinese government stated that the review had flagged "serious cybersecurity problems" with Micron products, "which posed major risks to China's critical information infrastructure supply chain and affected China's national security." The Chinese government noted that, as a result, "operators of critical information infrastructure in China should stop purchasing Micron products." The specific cybersecurity concerns were not explained, although the Cyberspace Administration of China cited the country's cyber and information security laws as the reason. The US Commerce Department quickly condemned the decision, stating: "We have seen the announcement by the People's Republic of China (PRC) regarding Micron. We firmly oppose restrictions that have no basis in fact. This action, along with recent raids and targeting of other American firms, is inconsistent with the PRC's assertions that it is opening its markets and committed to a transparent regulatory framework." The announcement has come amid growing geopolitical tensions between the US and China, spilling over into fields such as semiconductor chip manufacturing and cybersecurity.

    Infosecurity reports: "China Issues Ban on US Chipmaker Products"

  • news

    Visible to the public "New AI Model Aims to Plug Key Gap in Cybersecurity Readiness"

    A team of scientists from the Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL), Purdue University, Carnegie Mellon University (CMU), and Boise State University has turned to Artificial Intelligence (AI), threading together three large databases of information regarding computer vulnerabilities, weaknesses, and likely attack patterns. The AI-based model automatically links vulnerabilities with specific attack vectors that adversaries may use to compromise computer systems. The work should help defenders detect and prevent attacks more frequently and promptly. A portion of the work is now available on GitHub as open source. The team will release the remaining code soon. The new AI model uses Natural Language Processing (NLP) and supervised learning to connect information in three different cybersecurity databases. The team's model automatically links vulnerabilities to the corresponding weaknesses with an accuracy of up to 87 percent, and links weaknesses to the appropriate attack patterns with an accuracy of up to 80 percent. According to the researchers, these numbers are significantly better than what current tools provide, but they warn that their new methods still need to be tested more widely. This article continues to discuss the new AI model developed to improve threat prioritization and spot attacks more quickly.

    Pacific Northwest National Laboratory reports "New AI Model Aims to Plug Key Gap in Cybersecurity Readiness"

  • news

    Visible to the public "Malicious Windows Kernel Drivers Used in BlackCat Ransomware Attacks"

    The ALPHV ransomware group, also known as BlackCat, was observed using signed malicious Windows kernel drivers to avoid detection by security software. The driver seen by Trend Micro is an updated version of the malware called 'POORTRY' that Microsoft, Mandiant, Sophos, and SentinelOne saw in ransomware attacks last year. The POORTRY malware is a Windows kernel driver that was signed with stolen keys belonging to legitimate Microsoft Windows Hardware Developer Program accounts. This malicious driver was used by the UNC3944 hacking group, also known as 0ktapus and Scattered Spider, to disable security software on a Windows device in order to bypass detection. According to Trend Micro, the ransomware operators tried to use the Microsoft-signed POORTRY driver, but its detection rates were high due to the publicity it received and after the code-signing keys were revoked. Therefore, the hackers deployed an updated version of the POORTRY kernel driver signed with a stolen or leaked cross-signing certificate. The new driver used by the BlackCat ransomware operation allows for the elevation of privileges on compromised machines and the termination of security-related processes. This article continues to discuss the ALPHV ransomware employing signed malicious Windows kernel drivers to evade detection by security software.

    Bleeping Computer reports "Malicious Windows Kernel Drivers Used in BlackCat Ransomware Attacks"

  • news

    Visible to the public "New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East"

    Since at least May 2020, an unknown threat actor has been observed using a malicious Windows kernel driver in attacks likely targeting the Middle East. Fortinet Fortiguard Labs, which labeled the artifact WINTAPIX (WinTapix.sys), links the malware, with low confidence, to an Iranian threat actor. According to security researchers, WinTapix.sys is a loader, so its primary objective is to produce and execute the next phase of the attack, which is achieved using a shellcode. Samples and telemetry data analyzed by Fortinet indicate that Saudi Arabia, Jordan, Qatar, and the United Arab Emirates are the primary targets of the campaign. The activity has not been attributed to a previously identified threat actor or group. Using a malicious kernel mode driver aims to subvert or disable security mechanisms and gain access to the targeted host. This article continues to discuss researchers' observations and findings regarding the new WinTapix.sys malware.

    THN reports "New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East"

  • news

    Visible to the public "Vulnerability in Zyxel Firewalls May Soon Be Widely Exploited"

    Rapid7 researchers have warned that a recently patched command injection vulnerability, tracked as CVE-2023-28771, affecting various Zyxel firewalls may soon be exploited in the wild. This warning comes after publishing a technical analysis and proof-of-concept (PoC) script that triggers the vulnerability and achieves a reverse root shell. The vulnerability impacts Zyxel APT, USG FLEX, and VPN firewalls running versions v4.60 to v5.35 of the ZDL firmware, and Zyxel ZyWALL/USG gateways/firewalls running ZLD v4.60 to v4.73. These firewall devices monitor and control network traffic, have Virtual Private Network (VPN) and Secure Sockets Layer (SSL) inspection capabilities, and provide extra protection against malware and other threats. The vulnerability stems from improper error message handling. It can be triggered by sending a specially crafted User Datagram Protocol (UDP) packet to port 500 on the WAN interface of vulnerable devices, allowing an attacker to execute OS commands as the root user. This article continues to discuss the potential exploitation and impact of the command injection vulnerability.

    Help Net Security reports "Vulnerability in Zyxel Firewalls May Soon Be Widely Exploited"

  • news

    Visible to the public "Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations"

    Meta, the owner of Facebook and Instagram, was fined $1.3 billion by the Irish Data Protection Commission for violating the European Union's (EU) General Data Protection Regulation (GDPR). Meta violated the GDPR by transferring the personal data of EU users to US servers. This is the largest penalty imposed since the EU's strict data privacy policies went into effect in 2016. It exceeds Amazon's previously record-breaking $808 million fine in 2021 for data protection violations. As a result of the European Court of Justice's nullification of the Privacy Shield, the EU and the US continue to explore alternatives on a new data flow. Originally, Privacy Shield served as a data transfer mechanism under the GDPR, allowing participating companies to comply with EU requirements regarding transferring personal data to third countries. Although a replacement is expected later in the year, a number of multinational corporations, including Meta, continue to unlawfully rely on the previous agreement, specifically the use of standard contractual clauses. This article continues to discuss Meta being fined for GDPR violations.

    Dark Reading reports "Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations

  • news

    Visible to the public "Inside the Platform Propping up the Next Generation of Email Crime"

    Cybercriminals are launching "industrial-scale" email attacks against businesses at an increasing rate, using a malicious platform that has been around for years. Microsoft has brought further attention to the rapid adoption of platforms such as BulletProftLink, highlighting that the tools are widely used to conduct highly sophisticated Business Email Compromise (BEC) attacks. These platforms provide cybercriminals with a toolkit for performing BEC attacks, including email templates that appear legitimate, hosting, and automated attack launch services. According to Microsoft's report, Cybercrime-as-a-Service (CaaS) platforms like BulletProftLink and others in this class provide new avenues for the underground industry to effectively monetize cybercrime. Between 2019 and 2020, the company's Digital Crimes Unit observed a 38 percent increase in CaaS attacks targeting business email. This article continues to discuss how BulletProftLink works, why BEC attacks are a significant threat, and the rise in CaaS attacks.

    ITPro reports "Inside the Platform Propping up the Next Generation of Email Crime"

  • news

    Visible to the public "Swiss Army Knife Malware Slices Through Systems In so Many Ways"

    The Picus Red Report 2023, based on the analysis of over 550,000 active malware strains, uncovered more than 5 million malicious activities. In the report, researchers identified the top cybercriminal tactics used in 2022. The findings also highlighted the increasing prevalence of "Swiss Army knife" malware, which can execute various destructive actions throughout the whole cyber kill chain while evading security measures. The analysis conducted by Picus Labs brings further attention to the adaptability of modern malware. According to the research, one-third of the entire sample uses more than 20 different tactics, techniques, and procedures (TTPs). Modern malware can exploit legitimate software, move laterally within systems, and encrypt files, which is considered exceptionally sophisticated. Picus notes that the advanced level of malware development is likely attributable to the vast resources of well-funded ransomware groups. The findings emphasize the need for security defenders to develop innovative behavior-based detection methods. This article continues to discuss the concept of multi-purpose malware, the growing versatility of malware, and how to improve anti-malware security efforts.

    Security Intelligence reports "Swiss Army Knife Malware Slices Through Systems In so Many Ways"

  • news

    Visible to the public "Exposed: Understanding the Threat of Digital Spying & Stalkerware"

    The global market for commercial spyware is estimated to be worth about $12 billion, with 80 countries having purchased the technology over the last decade. Spyware is used for various purposes, enabling remote access to devices from anywhere in the world. Once a device has been infected, the perpetrator gains complete control over it, granting them unrestricted access to messages, audio calls, and photos, along with remote access to cameras and microphones. Spyware is becoming increasingly accessible to people, including those lacking advanced technical skills. There are more inexpensive, rudimentary forms of spyware. Stalkerware can be especially invasive and abusive since it must be physically installed, requiring direct access to the target device. As with any technology, the market for commercial spyware has expanded at an unprecedented rate. Commercial products and services now possess capabilities similar to those of some state-affiliated Advanced Persistent Threat (APT) groups. Therefore, military-grade spyware technology is becoming increasingly accessible to the ordinary person. This article continues to discuss the threat posed by digital spying and stalking, as well as how to maximize protection.

    BetaNews reports "Exposed: Understanding the Threat of Digital Spying & Stalkerware"

  • news

    Visible to the public "Researchers Tie FIN7 Cybercrime Family to Clop Ransomware"

    The cybercrime group FIN7, which has previously used ransomware strains created by groups such as REvil and Maze, has added a new strain to its arsenal. Researchers from Microsoft's security team observed the group deploying the Clop ransomware in April. This was the group's first ransomware campaign since late 2021. Microsoft noted that FIN7, which it now refers to as Sangria Tempest, was observed deploying multiple tools to gain a foothold on victim systems before moving laterally within a network and launching the Clop ransomware. Prior to managing the now-retired DarkSide and BlackMatter ransomware operations, the group deployed REvil and Maze. In November, SentinelOne researchers linked the cybercrime group to the Black Basta ransomware operation, which was responsible for high-profile attacks against the American Dental Association and the German wind farm operator Deutsche Windtechnik. Since 2012, FIN7, formerly known as Carbanak, has conducted dozens of cybercriminal operations. Around 2020, the group went from using point-of-sale malware to ransomware. Between 2015 and 2018, FIN7 was accused of attacking over 100 US companies and orchestrating breaches of many US retailers. This article continues to discuss the FIN7 cybercrime family being tied to Clop ransomware.

    The Record reports "Researchers Tie FIN7 Cybercrime Family to Clop Ransomware"

  • news

    Visible to the public "Rheinmetall Listed on Ransomware Victim Blog"

    Black Basta, a cybercrime group with ties to Russia, allegedly infiltrated the systems of the German automotive and weapons manufacturer Rheinmetall. The cybercriminals have added Rheinmetall, one of the world's leading weapons manufacturers, to a blog on the dark web that features victims. The post included several screenshots of allegedly stolen data, including what appears to be a blueprint for manufacturing equipment. Black Basta first appeared in 2022, impacting dozens of businesses within the first weeks of its emergence. According to the monitoring platform for the dark web, DarkFeed, Black Basta has hit 153 organizations since its discovery. Using double extortion, the gang coerces victims into paying a ransom. Cybercriminals who use this model often release stolen data in increments, anticipating that victims will succumb to internal and external pressure. This article continues to discuss Rheinmetall allegedly being breached by the Russia-linked cybercriminal cartel Black Basta.

    Cybernews reports "Rheinmetall Listed on Ransomware Victim Blog"

  • news

    Visible to the public "UK Man Sentenced to 13 Years for Running Multi-Million Fraud Website"

    A man has recently been sentenced to 13 years and four months for running a multi-million-dollar fraud website that led to at least $124.2m being stolen globally. Of this, $53.4m was taken from UK victims. Law enforcement believes the actual losses to be far higher because fraud is a heavily underreported crime. Tejay Fletcher, 35, from London, UK, was handed the jail term after pleading guilty to charges of making or supplying articles for use in fraud, encouraging or assisting the commission of an offense, possessing criminal property, and transferring criminal property. The crimes took place between November 30, 2020, and November 8, 2022. The sentence followed a large international law enforcement operation led by London's Metropolitan Police in coordination with the City of London Police, the National Crime Agency, Europol, Eurojust, Dutch authorities, and the FBI. The police noted that while Fletcher was not directly responsible for the scams, his website offered tools for hire that enabled its users to launch sophisticated financial scams. Criminals used the service's technology to pose as representatives of banks, including Barclays, Santander, HSBC, Lloyds, and Halifax. They would call members of the public to warn of suspicious activity on their accounts, and ask them to disclose sensitive security information, such as one-time passcodes, to access their money. The police stated that the software allowed users to mask their phone numbers to trick victims into believing they were calling from their bank. iSpoof users could choose from a number of packages, allowing them to purchase the number of minutes they wanted to use the software for in Bitcoin. The police said that at its peak, the site had 59,000 registered users. Before it was shut down in November 2022, iSpoof was growing at a rate of 700 new users every week. In the 12 months until August 2022, around 10 million fraudulent calls were made globally via iSpoof, with roughly 3.5 million of those made in the UK.

    Infosecurity reports: "UK Man Sentenced to 13 Years for Running Multi-Million Fraud Website"

  • news

    Visible to the public "Samsung Smartphone Users Warned of Actively Exploited Vulnerability"

    The US Cybersecurity and Infrastructure Security Agency (CISA) recently warned Samsung smartphone users about a recently patched vulnerability being exploited in attacks. The flaw is CVE-2023-21492, described as a kernel pointer exposure issue related to log files. The security hole can allow a privileged local attacker to bypass the ASLR exploit mitigation technique. CISA noted that this indicates that it has likely been chained with other bugs. Samsung patched the vulnerability with its May 2023 security updates and said it learned about the flaw in mid-January. The company said certain Android 11, 12, and 13 devices are impacted. CISA added the bug to its Known Exploited Vulnerabilities (KEV) catalog on Friday, instructing government agencies to patch it by June 9. The vulnerability was discovered by Google's Threat Analysis Group, which suggests that it has likely been exploited by a commercial spyware vendor.

    SecurityWeek reports: "Samsung Smartphone Users Warned of Actively Exploited Vulnerability"

  • news

    Visible to the public "Coventry University Researchers Shocked by Excessive Data Harvesting by Apps"

    Researchers at Coventry University are helping people protect their privacy after finding excessive data collection by websites and apps. Citizen Scientists Investigating Cookies and App General Data Protection Regulation (GDPR) compliance (CSI-COP) is an award-winning privacy project led by the Centre for Computational Science and Mathematical Modelling (CSM) at Coventry University in partnership with nine other organizations. Its purpose is to investigate what personal data websites and apps automatically track when a user visits a web page or uses an app, and which have been designed to be more privacy-friendly. As part of the project, members of the public were recruited and trained as 'citizen scientists' to investigate the cookie notices and privacy policies used by websites and mobile apps. The CSI-COP collaborators and privacy champions will present their findings, unveiling a repository of cookies and online trackers containing the project's findings on over 1,000 websites and apps. The repository will allow people to determine if CSI-COP featured an app they use or a website they visited. This article continues to discuss the CSI-COP project and repository.

    Coventry University reports "Coventry University Researchers Shocked by Excessive Data Harvesting by Apps"