News Items

  • news

    Visible to the public "PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted"

    The maintainers of Python Package Index (PyPI), the official third-party software repository for the Python programming language, have disabled, until further notice, the ability for users to register and upload new packages. The volume of malicious users and malicious projects created on the index in the past week has exceeded their ability to respond on time, especially when multiple PyPI administrators are on leave. No additional information was disclosed regarding the nature of the malware or the threat actors responsible for publishing the malicious packages to PyPI. Software registries such as PyPI have repeatedly proved to be a popular target for attackers seeking to infect the software supply chain and compromise developer environments. For example, researchers at Phylum recently discovered an active malware campaign involving OpenAI ChatGPT-themed lures to trick developers into downloading a malicious Python module capable of capturing clipboard content and hijacking cryptocurrency transactions. This article continues to discuss the PyPI maintainers' decision to freeze new user and project registrations.

    THN reports "PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted"

  • news

    Visible to the public "Android Phones Are Vulnerable to Fingerprint Brute-Force Attacks"

    A team of researchers from Tencent Labs and Zhejiang University has presented a new attack dubbed 'BrutePrint,' which brute-forces fingerprints on modern smartphones to circumvent user authentication and seize control of the device. Performing brute-force attacks involves numerous trial-and-error attempts to crack a code, key, or password in order to gain unauthorized access to accounts, systems, or networks. Using what they say are two zero-day vulnerabilities, namely Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), the researchers were able to bypass existing protections on smartphones, such as attempt limits and liveness detection, which protect against brute-force attacks. The authors of the technical paper also discovered that biometric data on the Serial Peripheral Interface (SPI) of fingerprint sensors were inadequately protected, allowing a man-in-the-middle (MITM) attack to steal fingerprint images. Ten popular smartphone models were used to test BrutePrint and SPI MITM attacks, with unlimited attempts on all Android and HarmonyOS (Huawei) devices and ten additional attempts on iOS devices. This article continues to discuss the new BrutePrint attack.

    Bleeping Computer reports "Android Phones Are Vulnerable to Fingerprint Brute-Force Attacks"

  • news

    Visible to the public "Malicious Links and Misaddressed Emails Slip Past Security Controls"

    According to Armorblox, most organizations use six or more communication tools across channels, with email remaining the most vulnerable channel to attacks (38 percent). Multiple-channel attacks are picking up momentum and gaining frequency, according to respondents. Over half of respondents reported weekly (36 percent) or daily (16 percent) incidents of multi-vector, socially engineered attacks. Sixty-nine percent of respondents are concerned about attacks evading security controls by exploiting siloed communication and collaboration tools outside of email. According to the survey, 38 percent of respondents consider email the most vulnerable channel to threat actors. This highlights the high level of risk associated with email communication and the continued inadequacy of legacy security tools in protecting against sophisticated threats. This article continues to discuss key findings from Armorblox's survey of Information Technology (IT) and security professionals, focusing on the challenges organizations face in securing the abundance of communication and collaboration tools used today.

    Help Net Security reports "Malicious Links and Misaddressed Emails Slip Past Security Controls"

  • news

    Visible to the public "3 Common Initial Attack Vectors Account for Most Ransomware Campaigns"

    Most ransomware attackers use one of three primary vectors to infiltrate networks and gain access to organizations' critical systems and data. According to researchers, the most significant vector for successful ransomware attacks in 2022 was the exploitation of public-facing applications, which accounted for 43 percent of all breaches, followed by compromised accounts (24 percent) and malicious email (12 percent). The use of compromised accounts increased from 18 percent in 2021 to 22 percent in 2022. A ransomware attack can be prevented in large part by doubling down on the most common attack vectors. Many businesses are not the initial targets of attackers, but their lax Information Technology (IT) security makes them easy to breach, so cybercriminals seize the opportunity. Taking into account the top three initial vectors, which make up nearly 80 percent of all cases, it is possible to implement defensive measures that will significantly reduce the likelihood of becoming a victim. This article continues to discuss how most cyberattacks start and the basic steps that can help organizations avoid attacks.

    Dark Reading reports "3 Common Initial Attack Vectors Account for Most Ransomware Campaigns"

  • news

    Visible to the public "Ask the Expert: How New Research Can Help Protect Private Data"

    As an associate professor in the Department of Computer Science and Engineering at Michigan State University, Dr. Borzoo Bonakdarpour works to prevent the exposure of private information. Well-publicized instances of individuals being hacked due to phishing schemes or lax security practices likely come to mind when one hears "data breach." However, Bonakdarpour, a recipient of the 2023 Withrow Teaching Award, focuses on a more subtle aspect of data privacy with the same high stakes. Bonakdarpour emphasizes that programmers often make mistakes, which can result in accidental bugs. These bugs have the potential to result in massive security breaches. Bonakdarpour and his team were recently awarded a grant by the National Science Foundation (NSF) to develop what he refers to as "enforcers," or programs that can automatically detect and remedy digital mistakes before they cause damage. Enforcers watch what enters and exits a computing system, and if they detect something wrong, they take action. In addition to raising a red flag, it attempts to correct the issue. It does not fix the code, but it can take actions based on inputs and outputs. Bonakdarpour gave an analogy, where something goes wrong with the traffic light at an intersection. Accidents may occur if both directions have a green light. An enforcer would make one or both of the traffic signals red, so it does not address the underlying issue, but it prevents an accident until someone can. This article continues to discuss Bonakdarpour's insights on cybersecurity and his work to ensure bugs in computer programs do not lead to secret information being leaked.

    Michigan State University reports "Ask the Expert: How New Research Can Help Protect Private Data"

  • news

    Visible to the public "Tech Mandated by Online Safety Bill 'Could Turn Phones Into Surveillance Tools'"

    According to new research from Imperial College London, the technology mandated by the UK's Online Safety Bill could be used to transform millions of phones into facial recognition tools. Client-Side Scanning (CSS) was examined in regard to its potential privacy implications. Under the Online Safety Bill, CSS would be implemented to identify when people are attempting to share images known to be illegal content before they are encrypted and sent. The new research, which will be presented at IEEE Security and Privacy, suggests it would be possible to use CSS to search people's private messages without their knowledge, for example, by conducting facial recognition. The UK parliament is currently reviewing the Online Safety Bill. CSS is also included in a European Union proposal that, if approved, could mandate its installation on hundreds of millions of phones. According to Dr. Yves-Alexandre de Montjoye of Imperial College London's Department of Computing and coauthor of the new paper, the research shows that the software could be built or modified to include other hidden features, such as scanning private content from people's phones using facial recognition, the same technology used at airport gates. This article continues to discuss the potential privacy implications of the CSS tool.

    Imperial College London reports "Tech Mandated by Online Safety Bill 'Could Turn Phones Into Surveillance Tools'"

  • news

    Visible to the public "NATO Member Websites Targeted by Pro-Russian Hackers"

    The pro-Russian hacking group UserSec has announced the start of a new cyber campaign targeting and defacing the websites of North Atlantic Treaty Organization (NATO) member countries. On their official UserSec Telegram channel, the group posted an announcement about the campaign. Since the Russian invasion of Ukraine, numerous pro-Russian hacking groups have targeted Western governments and organizations supporting the war-torn country, particularly those offering weapons and strategic support to the Ukrainian military. According to UserSec's encrypted Telegram channel, the group was founded in January 2023 by a small number of ordinary civilians, most of whom have less than four years of hacking experience. UserSec claims to have supported KillNet attacks alongside Anonymous Sudan. Last month, KillNet, one of the most well-known pro-Russian hacking groups, launched its own campaign against NATO. On April 21, KillNet leaked the personal information of more than 4,000 individuals affiliated with NATO via a Telegram channel created specifically for KillNet's NATO-targeted attacks. This article continues to discuss the pro-Russian hacking group UserSec launching a new cyber campaign targeting and defacing websites belonging to NATO member nations.

    Cybernews reports "NATO Member Websites Targeted by Pro-Russian Hackers"

  • news

    Visible to the public HotSoS 2023 Summary

    Hot Topics in the Science of Security (HotSoS) 2023

  • news

    Visible to the public "Congress Looks to Expand CISA’s Role, Adding Responsibilities For Satellites And Open Source Software"

    Lawmakers recently passed a series of bills to give the Cybersecurity and Infrastructure Security Agency (CISA) new responsibilities when it comes to safeguarding open source software, protecting U.S. critical infrastructure, and expanding the cybersecurity workforce. The House Homeland Security Committee advanced a bill that would require CISA to maintain a commercial public satellite system clearinghouse and create voluntary cybersecurity recommendations for the space sector. Additionally, the committee advanced legislation requiring CISA to create a pilot civilian cyber reserve program to respond to incidents. The House Homeland Security Committee also advanced legislation requiring CISA to work with the open source community to better secure it and create a framework to assess the general risks of open source components for federal agencies. The House also advanced another bill that would give CISA the authority to train employees at DHS that aren't currently in cybersecurity positions to move to such a role.

    CyberScoop reports: "Congress Looks to Expand CISA's Role, Adding Responsibilities For Satellites And Open Source Software"

  • news

    Visible to the public "Dark Web ChatGPT Unleashed: Meet DarkBERT"

    The snowball effect caused by Large Language Models (LLMs) such as ChatGPT is still in the early stages. Combined with the open-sourcing of other Generative Pre-Trained Transformer (GPT) models, the number of Artificial Intelligence (AI)-based applications is exploding, and ChatGPT can be used to create highly sophisticated malware. As time passes, applied LLMs will only increase, with each one specializing in its own domain and trained on carefully curated data for a particular purpose. One such application, trained on data from the dark web itself, has just emerged. DarkBERT, as its South Korean creators named it, has arrived and provides an introduction to the dark web. DarkBERT is based on the RoBERTa AI architecture, which was created in 2019. Researchers have discovered it has more performance to offer. To train the model, the researchers crawled the dark web through the Tor network's anonymizing firewall and then filtered the raw data to create a database of the dark web. DarkBERT stems from this database being used to feed the RoBERTa LLM, a model that can analyze and extract useful information from new dark web content. Researchers demonstrated that DarkBERT outperformed other LLMs, which should enable security researchers and law enforcement to delve deeper into the web's darkest corners. This article continues to discuss DarkBERT.

    Tom's Hardware reports "Dark Web ChatGPT Unleashed: Meet DarkBERT"

  • news

    Visible to the public "KeePass 2.X Master Password Dumper Allows Retrieving the KeePass Master Password"

    KeePass 2.X Master Password Dumper is a proof-of-concept (PoC) tool developed by the security researcher Vdohney that retrieves the master password for KeePass. The tool exploits the unpatched vulnerability in KeePass, tracked as CVE-2023-32784, to retrieve the master password from the memory of KeePass 2.X versions. KeePass is a free and open-source password management application. It serves as a digital "safe" where users can store and organize sensitive information, such as passwords, credit card numbers, and notes. KeePass encrypts the data using a master key or master password, which you must provide to access the stored data. The flaw should be addressed in KeePass 2.54, which is scheduled for release at the start of June 2023. The issue arises from the fact that KeePass 2.X uses a custom-built text box ('SecureTextBoxEx') for password entry. This text box is not only used for entering the master password, but also in other areas of KeePass, such as password edit fields, allowing an attacker to recover their contents. This article continues to discuss the PoC tool that retrieves the master password from KeePass by exploiting the CVE-2023-32784 vulnerability.

    Security Affairs reports "KeePass 2.X Master Password Dumper Allows Retrieving the KeePass Master Password"

  • news

    Visible to the public "FTC to Crack Down on Biometric Tech, Health App Data Privacy Violations"

    The Federal Trade Commission (FTC) plans to update its Health Breach Notification Rule (HBNR) to clarify language regarding security breaches, user consent, and other functions, which will result in stricter enforcement for developers of consumer-driven health apps and technology. The FTC voted unanimously on May 18 to update the HBNR. A policy statement was also issued regarding its intent to combat unjust or deceptive practices associated with the collection, use, and marketing of biometric information and technologies. The risk of biometric technology breaches is directly related to the exposure of consumers' digital identities and their privacy. The FTC vote followed a second enforcement action taken under the HBNR against the developers of Premom on May 17 to resolve numerous privacy allegations, including that the fertility app and its parent company, Easy Healthcare, deceived users by sharing their personal and health information with third parties. In addition to a monetary penalty, the app developer must implement a number of adjustments to its privacy and security program and notify its users of the FTC settlement. This article continues to discuss the FTC unanimously agreeing to combat consumer privacy violations regarding biometric information and technology.

    SC Media reports "FTC to Crack Down on Biometric Tech, Health App Data Privacy Violations"

  • news

    Visible to the public "Google Debuts Quality Ratings for Security Bug Disclosures"

    Google and Android announced recently that they will now assess device vulnerability disclosure reports based on the level of information that bug hunters provide in order to encourage more comprehensive submissions. According to Google, vulnerability reports submitted to the Android and Google Vulnerability Reward Program (VRP) will be rated as "High," "Medium," or "Low" quality based on these elements: the accuracy and detail of the vulnerability description, analysis of its root cause, proof of concept, reproducibility, and evidence of reachability. Google and Android have also upped the top bug bounty prize to $15,000. Additionally, as of March 15th, 2023, Android is no longer assigning Common Vulnerabilities and Exposures (CVEs) to moderate severity issues. The CVEs are still being assigned to critical and high severity vulnerabilities. In 2022 alone, Google's VRPs paid out a record-setting $12 million in bug bounties.

    Dark Reading reports: "Google Debuts Quality Ratings for Security Bug Disclosures"

  • news

    Visible to the public "Apple Patches 3 Exploited WebKit Zero-Day Vulnerabilities"

    Apple recently released security updates for its operating systems to patch dozens of vulnerabilities that could expose iPhones and Macs to hacker attacks, including three zero-days affecting the WebKit browser engine. Two of the actively exploited vulnerabilities, CVE-2023-28204 and CVE-2023-32373, have been reported to the tech giant by an anonymous researcher. Apple noted that their exploitation can lead to sensitive information disclosure and arbitrary code execution if the attacker can trick the targeted user into processing specially crafted web content, this includes luring them to a malicious site. No information is available on the attacks exploiting these zero-day flaws. Apple revealed in its advisories that these were the vulnerabilities that it patched with its first Rapid Security Response updates, specifically iOS 16.4.1(a), iPadOS 16.4.1(a), and macOS 13.3.1(a). Now, iOS 16.5 and iPadOS 16.5 fix CVE-2023-28204 and CVE-2023-32373, as well as CVE-2023-32409, a WebKit zero-day that can be exploited to escape the Web Content sandbox. Apple noted that CVE-2023-32409 was reported to them by Google's Threat Analysis Group and Amnesty International, which indicates that it has likely been exploited by the products of a commercial spyware vendor. The latest iOS and iPadOS updates patch over 30 other vulnerabilities, including ones that can lead to a security bypass, sandbox escape, arbitrary code execution, exposure of location and other user data, privilege escalation, termination of an app, recovery of deleted photos, retaining access to system configuration files, contact information exposure from the lock screen, and modifications of protected parts of the file system. CVE-2023-28204 and CVE-2023-32373 have also been fixed with the release of iOS and iPadOS 15.7.6. The exploited WebKit vulnerabilities have also been resolved in Apple TV, Apple Watch, and Safari. Apple stated that the latest macOS Ventura update fixes the three zero-days and nearly 50 other vulnerabilities that can lead to sensitive information disclosure, arbitrary code execution, DoS attacks, a security feature bypass, and privilege escalation. Apple has also updated macOS Monterey to version 12.6.6 and Big Sur to version 11.7.7 to patch more than two dozen vulnerabilities, but none of the zero-days.

    SecurityWeek reports: "Apple Patches 3 Exploited WebKit Zero-Day Vulnerabilities"

  • news

    Visible to the public "Satellite Signal Jamming Reaches New Lows: Starlink and Other LEO Constellations Face a New Set of Security Risks"

    Before Russia invaded Ukraine, Russian hackers knocked out Viasat satellite ground receivers across Europe. Elon Musk then offered access to Starlink, SpaceX's network of low Earth orbit (LEO) communications satellites. However, Musk reported shortly thereafter that Starlink was experiencing jamming attacks and software countermeasures. Regardless of their altitude or size, communications satellites transmit more power, requiring more power to jam than navigational satellites. However, compared to large geostationary satellites, LEO satellites have frequent handovers that introduce delays and more surface area for interference, according to Mark Manulis, a professor of privacy and applied cryptography at the University of the Federal Armed Forces' Cyber Defense Research Institute (CODE) in Munich, Germany. It is possible to infer from a handful of publications and open-source research how unprepared many LEO satellites are for direct attacks and which defenses future LEO satellites may require. Private companies and government agencies have been planning LEO constellations, with each numbering thousands of satellites. For example, the Department of Defense (DOD) has been designing its own LEO satellite network to supplement its more traditional geostationary constellations, and has already started issuing contracts for the constellation's construction. For research and demonstration purposes, university research groups are also launching small, standardized cube satellites (CubeSats) into LEO. This growth of satellite constellations coincides with the rise of off-the-shelf components and software-defined radio, both of which make satellites less expensive but less secure. This article continues to discuss the new security risks LEO satellites face and the need for more focus on cryptography for these satellites.

    IEEE Spectrum reports "Satellite Signal Jamming Reaches New Lows: Starlink and Other LEO Constellations Face a New Set of Security Risks"

  • news

    Visible to the public "Experts Warn of Voice Cloning-as-a-Service"

    Security researchers at Recorded Future warn that threat actors are gaining significant interest in voice cloning-as-a-service (VCaaS) offerings on the dark web, designed to streamline deepfake-based fraud. The researchers noted that deepfake audio technology can mimic the voice of a target to bypass multi-factor authentication, spread disinformation, and enhance the effectiveness of social engineering in business email compromise (BEC)-style attacks, among other things. The researchers warned that, increasingly, out-of-the-box voice cloning platforms are available on the dark web, lowering the bar to entry for cybercriminals. Some are free to use with a registered account, while others cost little more than $5 per month. The researchers noted that in some cases, cybercriminals are abusing legitimate tools such as those intended for use in audio book voiceovers, film and television dubbing, voice acting, and advertising. One popular option is ElevenLabs' Prime Voice AI software, a browser-based text-to-speech tool that allows users to upload custom voice samples for a premium charge. The researchers noted that the company had restricted the use of the tool to paid customers, which has led to an increase in references to threat actors selling paid accounts to ElevenLabs as well as advertising VCaaS offerings. The researchers stated that, fortunately, many current deepfake voice technologies are limited in generating only one-time samples that cannot be used in real-time extended conversations. However, the researchers argued that an industry-wide approach is needed to tackle the threat before it escalates.

    Infosecurity reports: "Experts Warn of Voice Cloning-as-a-Service"

  • news

    Visible to the public "Teen Hacker Charged in Scheme to Siphon Funds From Sports Betting Accounts"

    An 18-year-old has been charged for allegedly hacking and selling access to thousands of online sports betting accounts. Joseph Garrison of Madison, Wisconsin, who is accused of masterminding the credential stuffing scheme, is facing criminal charges. According to a criminal complaint, beginning in November 2022, Garrison purchased stolen username and password credentials on the dark web. Using the credentials, he allegedly attempted to systematically access accounts on the sports betting platform. The site is not specified in the complaint, but CNBC identified it as DraftKings. According to the complaint, this access was then sold on various websites along with instructions on how to transfer funds from the accounts. As alleged, Garrison used a sophisticated cyber-breach attack to gain unauthorized access to victim accounts and steal hundreds of thousands of dollars, according to FBI Assistant Director in Charge Michael J. Driscoll, who added that cyber intrusions aimed at stealing private individuals' funds pose a serious threat to economic security. Approximately 60,000 accounts were accessed, and $600,000 was stolen from 1,600 accounts that Garrison and his co-conspirators allegedly sold. On February 23, law enforcement agents executed a search warrant, seizing his computer and mobile phone. They found OpenBullet and SilverBullet, two programs used in credential stuffing attacks, which run customizable scripts on websites using a list of username and password combinations. This article continues to discuss the teen hacker facing criminal charges for allegedly hacking into and selling access to online sports betting accounts.

    The Record reports "Teen Hacker Charged in Scheme to Siphon Funds From Sports Betting Accounts"

  • news

    Visible to the public "Popular Android TV Boxes Sold on Amazon Are Laced With Malware"

    AllWinner and RockChip are China-based companies that power several popular Android TV boxes sold on Amazon. These Android-powered TV set-top boxes are typically inexpensive and highly customizable, incorporating multiple streaming services into a single device. Their listings on Amazon have collectively accumulated thousands of positive reviews. However, security researchers say the devices are sold with malware capable of initiating coordinated cyberattacks. Daniel Milisic purchased an AllWinner T95 set-top box last year and found that the chip's firmware was infected with malware. Milisic discovered that the set-top box was communicating with command-and-control (C2) servers and awaiting further instructions. His ongoing investigation, which he published on GitHub, revealed that his T95 model connected to a botnet composed of thousands of malware-infected Android TV boxes. According to Milisic, the default payload of the malware is a clickbot, which is code that generates ad revenue by secretly tapping on advertisements in the background. When the infected Android TV boxes are powered on, the preloaded malware contacts a C2 server, obtains instructions on finding the malware it needs, and pulls additional payloads to the device that carry out ad-click fraud. Milisic explained that due to the malware's design, its creators can distribute any payload they want. Bill Budington, an EFF security researcher, independently validated Milisic's findings after purchasing an affected device from Amazon. Several other AllWinner and RockChip Android TV models, including the AllWinner T95Max, RockChip X12 Plus, and RockChip X88 Pro 10, are also preloaded with the malware. This article continues to discuss the popular Android TV boxes being sold infected with malware.

    TechCrunch reports "Popular Android TV Boxes Sold on Amazon Are Laced With Malware"

  • news

    Visible to the public "Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware"

    As part of a BATLOADER campaign designed to distribute the RedLine Stealer malware, malicious Google Search ads for generative Artificial Intelligence (AI) services such as OpenAI ChatGPT and Midjourney are being used to direct users to questionable websites. In an analysis, security researchers at eSentire noted that both AI services are popular but lack first-party standalone applications. Users interact with ChatGPT via their web interface, while Midjourney uses Discord. Threat actors have exploited this gap to direct AI app-seekers to malicious websites promoting fake apps. BATLOADER is a loader malware that is spread via drive-by downloads, in which users searching for specific keywords on search engines are shown fraudulent ads that, when clicked, redirect them to landing pages where malware is hosted. This article continues to discuss the use of malicious Google Search ads for generative AI services to direct users to sketchy websites as part of a BATLOADER campaign aimed at delivering RedLine Stealer malware.

    THN reports "Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware"

  • news

    Visible to the public "Once Again, Malware Discovered in npm"

    Two code packages named "nodejs-encrypt-agent" were recently discovered to contain the open-source information-stealing malware TurkoRat in the popular npm JavaScript library and registry. The malware-containing packages were discovered by ReversingLabs researchers, who report that the perpetrators behind them attempted to have the packages impersonate another legitimate package, agent-base version 6.0.2, which has been downloaded over 20 million times. Checkmarx recently published a report highlighting an emerging trend of threat actors exploiting npm's failure to account for certain types of typosquatting for years, potentially leading enterprises to inadvertently download malware. ReversingLabs researchers stated that the discovery of the most recent malicious packages, along with version number irregularities, was a red flag. In this case, a "strangely high version number" was used to attempt to trick developers into downloading what appeared to be a new release of the package. This article continues to discuss the discovery of TurkoRat-poisoned packages in the npm development library.

    Dark Reading reports "Once Again, Malware Discovered in npm"

  • news

    Visible to the public "Inadequate Tools Leave Appsec Fighting an Uphill Battle for Cloud Security"

    According to Backslash Security, AppSec teams are struggling to keep up with the increasingly rapid and agile development pace, and playing security defense through a continuous and unproductive vulnerability hunt. Fifty-eight percent of respondents spend over 50 percent of their time hunting vulnerabilities, with 89 percent spending at least 25 percent of their time in this defensive mode. The annual cost of employing AppSec engineers who hunt for vulnerabilities rather than manage a comprehensive cloud-native AppSec program is estimated to be about $1.2 million. Given the accelerated pace of digital innovation across all enterprise sizes and the blurred lines between AppSec and CloudSec, enterprise AppSec teams are burdened with solutions that have yet to catch up to the cloud's speed. Therefore, AppSec professionals are losing confidence in the prevalent AppSec tools. The lack of cloud-native AppSec tools has a wide-ranging impact on nearly all organizations, including increasing friction between AppSec and development teams (39 percent), putting the ability to generate revenue at risk (39 percent), and an inability to retain high-value development talent (38 percent) and AppSec talent (35 percent). This article continues to discuss key findings from Backslash Security's report on AppSec teams being stuck in a catch-up cycle.

    Help Net Security reports "Inadequate Tools Leave Appsec Fighting an Uphill Battle for Cloud Security"

  • news

    Visible to the public "Hackers Target Vulnerable WordPress Elementor Plugin After PoC Released"

    In massive Internet scans, hackers are actively searching for vulnerable Essential Addons for Elementor plugin versions on thousands of WordPress websites in an attempt to exploit a recently disclosed critical account password reset vulnerability. The critical vulnerability, tracked as CVE-2023-32243, affects Essential Addons for Elementor versions 5.4.0 to 5.7.1, allowing unauthenticated attackers to reset the passwords of administrator accounts and take control of the impacted websites. The vulnerability that affected over one million websites was discovered by PatchStack on May 8, 2023, and fixed by the vendor on May 11, with the release of version 5.7.2 of the plugin. However, researchers published a proof-of-concept (PoC) exploit on GitHub on May 14, making it widely accessible to attackers. Wordfence reported observing millions of probes for the plugin's presence on websites and blocking at least 6,900 exploitation attempts. This article continues to discuss hackers actively probing for vulnerable Essential Addons for Elementor plugin versions on thousands of WordPress websites.

    Bleeping Computer reports "Hackers Target Vulnerable WordPress Elementor Plugin After PoC Released"

  • news

    Visible to the public "They Shall Not Pass: Keeping an Eye on Middleboxes"

    When users access a website or send an email, they trust that their information will not be altered and read by third parties. However, maintaining the flow of information on global networks requires numerous intermediary processes, which may pose security risks. Ilies Benhabbour, a Ph.D. student working with Professor Marc Dacier at King Abdullah University of Science and Technology (KAUST), explains that, in terms of security, the more complex a system is, the more vulnerabilities it has. He added that the Internet was designed to operate as a modular system, with each data transmission component designated a specific function and contained in a protective layer known as encapsulation. The data packets are concealed and should not be altered during transmission. When a piece of information, such as an email, traverses the Internet, it encounters several third-party software components typically hidden from users. These network middleboxes, which Benhabbour and Dacier refer to as "semi-active components," improve efficiency and security by compressing large data packets or checking for viruses. Despite these benefits, some semi-active components may contain code that does not conform to international standards, is overly complex, or has been improperly configured. It is also possible for malicious hackers to pose as middleboxes in order to steal or change data. Existing tools for detecting semi-active components are often found to be cumbersome and limited to a few specific Internet protocols, so Benhabbour and Dacier designed a new tool called NoPASARAN that is simple, modular, and scalable to various situations. This article continues to discuss NoPASARAN.

    KAUST reports "They Shall Not Pass: Keeping an Eye on Middleboxes"

  • news

    Visible to the public "Securing APIs Is a Top Priority, Yet Many Don't Have Dedicated Security Solutions"

    According to a new study, the security of Application Programming Interfaces (APIs) remains a top cybersecurity concern in 2023, but many businesses still lack dedicated API security. Traceable AI research conducted at this year's RSA conference reveals that while 69 percent of organizations claim to incorporate APIs into their cybersecurity strategy, 40 percent of businesses lack dedicated professionals or teams for API security. Twenty-three percent of respondents do not know if their organization has dedicated API security. Although most organizations (61 percent) do not believe they have been the target of an API attack in the past 12 months, an alarming 36 percent of respondents are unsure. In addition, 25 percent of those who have adopted API security tools are unable to baseline API behavior and identify anomalous activity that may be indicative of an API attack. Fifty percent of respondents are uncertain whether their API security solution possesses these capabilities. This article continues to discuss key findings from Traceable AI's 2023 State of API Security report.

    BetaNews reports "Securing APIs Is a Top Priority, Yet Many Don't Have Dedicated Security Solutions"

  • news

    Visible to the public "Quantum Cryptography Market to Exceed $3B by 2028"

    According to a forecast by MarketsandMarkets, the global quantum cryptography market will be worth an estimated $500 million in 2023. However, like the rapidly evolving technology, the market is expected to expand significantly over the next five years. The forecast predicts that the market for quantum cryptography will grow at a compound annual growth rate of more than 40 percent over the next five years, surpassing $3 billion by 2028. Quantum cryptography applies the principles of quantum mechanics to secure communication channels and data. Although the market for quantum cryptography products is expected to grow immensely over the next few years, it is already a highly competitive market, partly because of the technical complexity required to commercialize the technology. The market includes quantum standards, quantum random number generators, and Quantum Key Distribution (QKD) systems. The market expansion parallels the government's interest in quantum cryptography and quantum computing in general. In preparation for the commercialization of quantum computers, the Office of Management and Budget (OMB) issued a memo outlining the need for federal agencies to migrate to post-quantum cryptography. This article continues to discuss the growing global quantum cryptography market.

    NextGov reports "Quantum Cryptography Market to Exceed $3B by 2028"

  • news

    Visible to the public "Small Utilities, Hospitals Struggle With Newer Cyber Threats"

    According to government officials, small electric utilities, wastewater facilities, and hospitals struggle to defend their organizations against new cyber threats due to limited resources. David Travers, head of the Environmental Protection Agency's (EPA) Water Infrastructure and Cyber Resilience Division, emphasized that about 100,000 drinking water systems and 16,000 wastewater systems serve the US and its territories, with customer bases ranging from over 8 million to less than 500 people. The most significant cyber risk in the water industry is the failure of many utilities to adopt best practices. Travers added that this critical vulnerability is evident from a recent industry survey, which revealed that most utilities had not taken key steps to protect their operations. Cyber incidents at water systems have also exploited the failure to implement cybersecurity best practices. Hundreds of smaller water and wastewater systems have received individualized technical assistance from the EPA, and subject matter experts have identified gaps in cybersecurity best practices and implemented remediation actions tailored to the utility entities' resources and objectives. The agency announced in March that it will incorporate cybersecurity into periodic safety assessments. According to Brian Mazanec of the Department of Health and Human Services (HHS), the department has developed different sets of industry best practices for small, medium, and large hospital systems, with resources that small hospitals can use as-is. This article continues to discuss cybersecurity challenges faced by small utilities and hospitals as well as efforts to help them.

    GovInfoSecurity reports "Small Utilities, Hospitals Struggle With Newer Cyber Threats"

  • news

    Visible to the public "Five Cyberattacks in One Day Expose 150K US Residents to Data Risk"

    Five organizations reported data breaches to the Maine Attorney General's Office in one day. Village Bank, Sysco, Collins Electrical Construction, Kline & Specter, and Puma Biotechnology were the five entities that disclosed data breaches on May 17. The five cyberattacks impacted nearly 150,000 people in the US. However, there could be some overlap in cases where victims suffer from two or more separate breaches. Sysco was by far the worst affected, as it reported 126,243 victims whose names and other Personally Identifying Information (PII), including Social Security numbers, were exposed in a cybersecurity incident carried out by a threat actor on January 14, 2023. As is often the case with system infiltrations, the target organization did not discover this until March 5. Kline & Specter, the second-worst affected company, had the same type of client information exposed to cybercriminals in what it described as a ransomware attack on March 13 in which some personal data may have been copied. In regard to the number of victims, Village Bank (3,324), Puma Biotechnology (1,933), and Collins Electrical (567) fared relatively well, although they, along with Sysco and Kline, all emphasized that they are treating the attacks seriously. This article continues to discuss the five cyberattacks recently disclosed to the Maine Attorney General's Office.

    Cybernews reports "Five Cyberattacks in One Day Expose 150K US Residents to Data Risk"

  • news

    Visible to the public "Cyber Warfare Escalates Amid China-Taiwan Tensions"

    According to security researchers at Trellix, China-Taiwan tensions have led to a significant increase in cyberattacks targeting Taiwan. The researchers spotted a surge in cyberattacks aimed at Taiwanese industries, with the primary goal of deploying malware and stealing sensitive information. The researchers stated that they observed a surge in malicious emails targeted toward Taiwan, starting April 7 and continuing until April 10. The number of malicious emails during this time increased to over four times the usual amount. The researchers noted that although various industries were targeted during the surge, the most impacted industries in the respective time frame were networking/IT, manufacturing, and logistics. Moreover, the researchers observed a significant rise in extortion emails targeting Taiwan government officials. The researchers stated that though it's unclear if this activity is from China-backed threat actors, it speaks to a continued increase in attacks specifically targeting Taiwan. The researchers identified different types of malicious email campaigns, including false payment overdue notifications, fake shipment notifications from reputable companies like DHL, and fraudulent quotation request emails that contain malware-laden attachments. Additionally, attackers have employed phishing pages and harmful URLs to trick users into revealing their login details. One notable malware observed during these attacks is PlugX, a Remote Access Trojan (RAT) commonly associated with Chinese Advanced Persistent Threat (APT) groups. The researchers also saw other malware families being used, such as Kryptik, Zmutzy, and Formbook.

    Infosecurity reports: "Cyber Warfare Escalates Amid China-Taiwan Tensions"

  • news

    Visible to the public "Montana Signs Ban on TikTok Usage on Personal Devices"

    Montana's Governor Greg Gianforte has officially signed into law a ban on TikTok usage from personal devices. The legislation will take effect on January 1, 2024, and prohibits individuals in the state from accessing the popular video-sharing platform. A TikTok Spokesperson said the ban violates the First Amendment rights of Montana residents. Because of this, the company plans to challenge the legislation in court. Governor Gianforte claims the "ban aligns with efforts to safeguard Montanans from Chinese Communist Party surveillance." While the law prohibits app stores from offering TikTok, it does not restrict existing users from utilizing the app, which currently has around 150 million users in the United States. In March, a congressional committee interrogated TikTok CEO Shou Zi Chew about the possibility of Chinese government influence and data access. Chew denied the spying allegations but confessed to employee misuse of TikTok accounts.

    Infosecurity reports: "Montana Signs Ban on TikTok Usage on Personal Devices"

  • news

    Visible to the public "CISA and ONCD Award Champions of the Fourth Annual  President's Cup Cybersecurity Competition"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and Office of the National Cyber Director (ONCD) recently awarded the winners of the fourth annual President's Cup Cybersecurity Competition in a private ceremony at the White House. The individual winners are Ben Marks of the National Security Agency (NSA) and US Army Chief Warrant Officer 1 Andrew Fricke of the 781st Military Intelligence Battalion. The President's Cup, led and hosted by CISA, presents competitors with challenges based on the National Initiative for Cybersecurity Education (NICE) Framework Work Roles to identify, recognize, and reward the best cybersecurity talent in the federal workforce. Nearly 240 teams and over 1,100 individuals competed for the top rewards. The competition featured two individual tracks: one tested offensive skills, such as those required for the exploitation analyst and cyber operator NICE work roles, and the other tested defensive skills, such as those required for the incident response and forensics analyst work roles. This article continues to discuss the President's Cup Cybersecurity Competition.

    CISA reports "CISA and ONCD Award Champions of the Fourth Annual President's Cup Cybersecurity Competition"

  • news

    Visible to the public "Infostealer Malware Surges: Stolen Logs Up 670% on Russian Market"

    The Secureworks Counter Threat Unit (CTU) recently revealed that there had been a significant surge (670%) in stolen logs on online marketplace Russian Market. Infostealers are a natural choice for cybercriminals. Secureworks stated that they are readily available for purchase and, within as little as 60 seconds, generate an immediate result in the form of stolen credentials and other sensitive information. Secureworks noted that cybercriminals employ increasingly sophisticated methods to deceive users, and detecting and removing these threats is becoming even more daunting for victims. The Secureworks' report also shows that in less than nine months, the logs for sale on Russian Market surged by 150%, reaching more than five million in late February 2023 from two million in June 2022. This represents a growth rate of 670% within approximately two years. Secureworks noted that they are seeing an entire underground economy and supporting infrastructure built around infostealers, making it not only possible but also potentially lucrative for relatively low-skilled threat actors to get involved.

    Infosecurity reports: "Infostealer Malware Surges: Stolen Logs Up 670% on Russian Market"

  • news

    Visible to the public "Researchers Show Ways to Abuse Microsoft Teams Accounts for Lateral Movement"

    Proofpoint researchers explored how attackers could abuse access to a Microsoft Teams account and discovered attack vectors that could allow hackers to move laterally by launching additional phishing attacks or tricking users into downloading malicious files. According to Proofpoint, about 40 percent of Microsoft 365 cloud tenant companies have seen at least one unauthorized login attempt to gain access to a user account via Microsoft Teams in the second half of 2022 using either the web or desktop clients. Although this is less than the percentage of organizations that saw malicious login attempts on their Azure Portal or Office 365 accounts, it is significant enough to indicate that attackers are particularly interested in Microsoft Teams. Access to a Teams account can be gained via an Application Programming Interface (API) token, stolen credentials, or an active session cookie. Once inside, attackers will likely access other services or target other users. This article continues to discuss the researchers' findings regarding how attackers can enable lateral movement within a network via a compromised Teams account.

    CSO Online reports "Researchers Show Ways to Abuse Microsoft Teams Accounts for Lateral Movement"

  • news

    Visible to the public "MalasLocker Ransomware Targets Zimbra Servers, Demands Charity Donation"

    A new ransomware operation is attempting to infiltrate Zimbra servers in order to steal emails and encrypt files. Instead of a ransom payment, the threat actors demand a charity donation to provide an encryptor and not leak data. The MalasLocker ransomware attack began encrypting Zimbra servers near the end of March 2023, with victims reporting in forums that their emails were encrypted. MalasLocker's data leak site is currently distributing stolen data belonging to three companies as well as the Zimbra configuration for 169 other victims. The operation's ransom demand is quite unusual, putting it more in the realm of hacktivism. However, researchers have yet to confirm whether the threat actors keep their word when a victim donates money to a charity to get a decryptor. This article continues to discuss the MalasLocker ransomware operation and its unusual ransom demand.

    Bleeping Computer reports "MalasLocker Ransomware Targets Zimbra Servers, Demands Charity Donation"

  • news

    Visible to the public "8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency"

    The 8220 Gang, a cryptojacking group, has been observed weaponizing a six-year-old security vulnerability in Oracle WebLogic servers to pull vulnerable instances into a botnet and spread cryptocurrency mining malware. The flaw, tracked as CVE-2017-3506 with a CVSS score of 7.4, could allow an unauthenticated attacker to remotely execute arbitrary commands. According to Trend Micro researcher Sunil Bharti, this will enable attackers to gain unauthorized access to sensitive data or compromise the entire system. The group, first documented by Cisco Talos in 2018, is named for its original use of port 8220 for command-and-control (C2) network communications. SentinelOne reported last year that the 8220 Gang identifies targets by scanning the public Internet for misconfigured or vulnerable hosts. The 8220 Gang uses SSH brute force attacks post-infection to move laterally within a compromised network. Earlier this year, Sydig reported attacks carried out by the "low-skill" crimeware gang between November 2022 and January 2023 to breach vulnerable Oracle WebLogic and Apache web servers and deploy a cryptocurrency miner. This article continues to discuss the 8220 Gang exploiting a six-year-old security flaw in Oracle WebLogic servers.

    THN reports "8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency"

  • news

    Visible to the public "Organizations' Cyber Resilience Efforts Fail to Keep Up With Evolving Threats"

    According to Immersive Labs, a continuous increase in cyberattacks and changing threat landscape are causing more organizations to focus on creating long-term cyber resilience, but many of these programs fail to demonstrate teams' real-world cyber capabilities. Although 86 percent of organizations have a cyber resilience program, 52 percent of respondents say their organization lacks a comprehensive strategy for assessing cyber resilience. Increasing the cyber resilience of cybersecurity team members (83 percent) and the general workforce (75 percent) are cited as the two highest overall focus areas for organizations in 2023. Organizations have taken measures to deploy cyber resilience programs. However, 53 percent of respondents believe that the organization's workforce is unprepared for the next cyberattack. While cyber resilience is a priority and programs exist, these statistics indicate that their current structure and training are ineffective. This article continues to discuss key findings from the Cyber Workforce Resilience Trend Report.

    Help Net Security reports "Organizations' Cyber Resilience Efforts Fail to Keep Up With Evolving Threats"

  • news

    Visible to the public "Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise"

    Millions of Android phone owners worldwide unknowingly contribute to the financial upkeep of the Lemon Group. The Lemon Group operators infected their devices before they purchased them. Now, they steal and sell SMS messages and one-time passwords (OTPs), serve unwanted advertisements, create online messaging and social media accounts, and more using their mobile devices. Lemon Group has claimed that its clients have access to nearly 9 million Android devices infected with the Guerrilla malware. However, Trend Micro believes that the actual number may be larger. In recent years, a number of cybercriminal groups have developed lucrative business models around pre-infected Android devices. Trend Micro researchers performed forensic analysis on the ROM image of an Android device infected with the Guerrilla malware. Their investigation revealed that the group has infected Android devices in 180 countries. Over 55 percent of the victims are located in Asia, 17 percent in North America, and about 10 percent in Africa. Trend Micro was able to identify over 50 brands of mobile devices, the majority of which were inexpensive. This article continues to discuss Lemon Group's Guerrilla malware model.

    Dark Reading reports "Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise"

  • news

    Visible to the public "Quantum Random Number Generator Operates Securely and Independently of Source Devices"

    Quantum Random Number Generators (QRNGs) produce true randomization using the inherent unpredictability of quantum mechanics. Therefore, they have important applications in tasks involving quantum information processing and computation. In practice, any imperfection or inaccuracy in the characterization of quantum source devices in a real implementation has a significant impact on the security and generation rate of QRNGs, and may even result in the loss of quantum randomness. To effectively resolve these problems, source-device-independent (source-DI) QRNGs operate with untrusted but well-characterized measurement devices. Researchers from Nanjing University have recently proposed and demonstrated a simple and efficient source-DI QRNG protocol that is both secure and fast. In this work, the source-DI QRNG is realized through single-photon detection technology with help from entangled photons. The extraction of random numbers occurs through a process that measures the arrival time of a photon from a pair of time-energy entangled photons. The Spontaneous Parametric Down Conversion (SPDC) process produces the time-energy entangled photon pairs. According to Yan-Xiao Gong, Professor at Nanjing University, this study strikes an excellent balance between security, speed, and practicality compared to several existing semi-DI QRNGs. He adds that this research paves the way for practical applications of secure quantum information tasks and supports the creation of high-performance and high-security QRNGs. This article continues to discuss the QRNG that operates securely and independently of source devices.

    SPIE reports "Quantum Random Number Generator Operates Securely and Independently of Source Devices"

  • news

    Visible to the public "Oil and Gas Sector Lags Behind Other Industries in Gathering Dark Web Intel"

    According to new research by Searchlight Cyber, 27 percent of CISOs at oil and gas companies believe that dark web activity has no impact on their business, even though it is common for threat actors to hold auctions on the dark web to sell access to compromised Virtual Private Networks (VPNs) at energy companies. Seventy-two percent of oil and gas companies are already gathering dark web intelligence to defend their organizations from cyberattacks, according to Searchlight Cyber researchers. However, they are still behind many other leading industries, such as financial services (85 percent), manufacturing (83 percent), and transportation (81 percent). Energy companies may not have viewed themselves as the primary target of financially-motivated attacks from the dark web in the past, but the cybersecurity landscape has changed dramatically. Cybercriminals are increasingly targeting enterprises in industries such as healthcare, oil and gas, and manufacturing. This article continues to discuss key findings from Searchlight Cyber regarding dark web threats.

    SC Magazine reports "Oil and Gas Sector Lags Behind Other Industries in Gathering Dark Web Intel"

  • news

    Visible to the public "Rutgers Researchers Find Flaws in Using Source Reputation for Training Automatic Misinformation Detection Algorithms"

    Researchers from Rutgers University have discovered a significant flaw in how algorithms designed to detect "fake news" assess the credibility of online news stories. According to the researchers, most of these algorithms rely on a credibility score for the article's "source" rather than assessing the credibility of each individual article. Vivek K. Singh, an associate professor at the Rutgers School of Communication and Information and coauthor of the study "Misinformation Detection Algorithms and Fairness Across Political Ideologies: The Impact of Article Level Labeling," stated that not all news articles published by "credible" sources are accurate, nor are all articles published by "noncredible" sources "fake news." With article-level labels matching 51 percent of the time, the researchers concluded that using source-level labels to determine credibility is not a reliable method. This labeling procedure has significant implications for tasks such as the development of robust fake news detectors and audits of fairness across the political spectrum. To address this issue, the study provides a new dataset of individually labeled articles of journalistic quality, as well as a method for misinformation detection and fairness audits. This study's findings emphasize the need for more nuanced and trustworthy methods to detect misinformation in online news and provide valuable resources for future research. This article continues to discuss the flaws discovered in using source reputation for training automatic misinformation detection algorithms.

    Rutgers University reports "Rutgers Researchers Find Flaws in Using Source Reputation for Training Automatic Misinformation Detection Algorithms"

  • news

    Visible to the public "Carpet Bomb DDoS Attacks Rise 300 Percent"

    According to a new report from Corero Network Security, 'carpet bomb' Distributed Denial-of-Service (DDoS) attacks increased by 300 percent in 2022 compared to 2021. Carpet bomb attacks, also referred to as spread-spectrum or spray attacks, distribute traffic across wide IP address spaces. Legacy technology, such as standard victim-oriented detection and mitigation techniques, often fails to accurately identify these attacks, resulting in insufficient mitigation or false positives. Legacy solutions may also be overwhelmed by the number of IP addresses involved. Corero Network Security's DDoS Threat Intelligence Report reveals that there were over seven times as many Mirai-like DDoS attacks in 2022 compared to 2021. These botnet attacks are difficult to defend against and can cause significant harm to companies. In addition, there were double the number of DDoS attacks against Domain Name System (DNS) services in 2022 compared to 2020. This attack vector has become an easy method for attackers to disrupt communications between websites, Internet-connected devices, and applications. The analysis reveals a 600 percent increase in the share of malicious DDoS traffic carried by the IPv6 protocol and a 70 percent increase in TCP-based attack vectors. This article continues to discuss key findings from the DDoS Threat Intelligence Report.

    BetaNews reports "Carpet Bomb DDoS Attacks Rise 300 Percent"

  • news

    Visible to the public "4 Countries Join NATO Cyber Defense Center"

    The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) recently announced that four countries have joined as members: Ukraine, Ireland, Japan, and Iceland. The announcement was made on the cybersecurity center's 15th anniversary. The organization, based in Tallinn, Estonia, now has 39 members. The NATO cyber defense hub conducts cyber defense research, training, and exercises, focusing on areas such as technology, strategy, operations, and law. The CCDCOE recently conducted the annual Locked Shields cyber defense exercise, in which the representatives of 38 countries took part. In the exercise, Red Teams compete against Blue Teams, which are tasked with defending a country's information systems and critical infrastructure from large-scale attacks.

    SecurityWeek reports: "4 Countries Join NATO Cyber Defense Center"

  • news

    Visible to the public "Report Finds Just One Unpatched Vulnerability Increases the Risk of a Cyber Insurance Claim by 33%"

    The cybersecurity and cyber insurance company Coalition has discovered that policyholders with even one unresolved critical vulnerability are more likely to experience a claim. According to Coalition's 2023 Cyber Claims Report, having even a single unpatched vulnerability increased the risk of cyber insurance claims by 33 percent. The report also found that organizations that continued to use end-of-life software were three times more likely to face an incident. In addition to "human inaction" (not patching software), human error is also a primary risk factor for companies with cyber insurance. Seventy-six percent of reported incidents involved phishing, which is more than six times more prevalent than the next most common attack technique. Nearly all cyber insurance claims related to phishing were the direct consequence of employees falling for phishing tricks. Since the beginning of 2022, phishing-related claims have increased by 29 percent among insured Coalition members. With its insured members, successful phishing often results in funds transfer fraud or Business Email Compromise (BEC), but the report notes that phishing was also the most common method used to gain access to an organization's system for any reason. This article continues to discuss key findings from Coalition's 2023 Cyber Claims Report.

    SiliconANGLE reports "Report Finds Just One Unpatched Vulnerability Increases the Risk of a Cyber Insurance Claim by 33%"

  • news

    Visible to the public "US Offers $10m Reward For Alleged Prolific Ransomware Actor"

    A Russian national has recently been unmasked as a key player in the "development and deployment" of the Hive, LockBit, and Babuk ransomware strains. Mikhail Pavlovich Matveev (aka Wazawaka/m1x/Boriselcin/Uhodiransomwar) was recently charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers. If convicted, he faces over 20 years behind bars. However, that's not likely, as the suspect is thought to reside in Russia. The State Department has issued a $10m reward for information that leads to the arrest and/or conviction of Matveev, under its Transnational Organized Crime Rewards Program. The Department of Justice (DoJ) highlighted several alleged victims of Matveev, including a law enforcement agency and non-profit behavioral healthcare organization in New Jersey and the Washington DC Metropolitan Police Department. The DoJ estimated the combined ransom haul for the three variants at $200m, adding that the affiliates behind them demanded twice that. In addition to the indictments, the US Treasury's Office of Foreign Assets Control (OFAC) announced sanctions against Matveev.

    Infosecurity reports: "US Offers $10m Reward For Alleged Prolific Ransomware Actor"

  • news

    Visible to the public "University Admission Platform Exposed Student Passports"

    The popular university admissions platform called Leverage EDU leaked nearly 240,000 sensitive files, including passports, financial documents, certificates, and exam results. The Cybernews research team discovered that Leverage EDU's misconfiguration of systems led to the leak of sensitive information. Since no authentication was required, anyone could access an impacted student's information required for university applications. Leverage EDU is an admission platform for students who wish to study abroad. It claims to have a global network of over 650 educational institutions and 80 million users. Cybernews researchers discovered a misconfigured, publicly accessible Amazon S3 bucket on January 31. The bucket had numerous zip folders containing nearly 240,000 files with sensitive data and Personally Identifiable Information (PII) belonging to prospective students. A malicious actor could have used the exposed information to commit identity theft and fraud. A data breach of this magnitude allows criminals to craft spear-phishing attacks and target individuals with greater specificity, placing their financial and other accounts at risk. This article continues to discuss the exposure of sensitive information by the university admission platform Leverage EDU.

    Cybernews reports "University Admission Platform Exposed Student Passports"

  • news

    Visible to the public "Chrome 113 Security Update Patches Critical Vulnerability"

    Google recently announced the release of a Chrome 113 security update that resolves a total of 12 vulnerabilities, including one rated "critical." Six of the flaws were reported by external researchers. The "critical" vulnerability, tracked as CVE-2023-2721 and reported by Qihoo 360 researcher Guang Gong, is described as a use-after-free flaw in Navigation. Google noted that a remote attacker could craft an HTML page to trigger a heap corruption when a user accesses the page. The attacker would have to convince the user to visit the page. Google stated that use-after-free vulnerabilities are memory corruption bugs that occur when the pointer is not cleared after memory allocation is freed, which could lead to arbitrary code execution, denial-of-service, or data corruption. In Chrome, use-after-free issues can be exploited to escape the browser sandbox, which also requires the attacker to target a vulnerability in the underlying system or in Chrome's browser process. Google noted that the latest Chrome update addressed three other externally reported use-after-free flaws, all rated "high" severity. The vulnerabilities impact the browser's Autofill UI, DevTools, and Guest View components. The new browser release also resolves a "high" severity type confusion bug in the V8 JavaScript engine and a "medium" severity inappropriate implementation issue in WebApp Installs. Google stated that it paid $11,500 in bug bounties to the reporting researchers. However, the company has yet to determine the amounts to be paid for two of the vulnerabilities, including the "critical" severity one, so the final amount could be higher. The latest Chrome iteration is now rolling out as version 113.0.5672.126 for macOS and Linux, and as versions 113.0.5672.126/.127 for Windows.

    SecurityWeek reports: "Chrome 113 Security Update Patches Critical Vulnerability"

  • news

    Visible to the public "Want to Keep AI From Sharing Secrets? Train It Yourself"

    Artificial Intelligence (AI) is subject to the same privacy regulations as other technologies. In March 2023, there was a security incident in which ChatGPT users were able to view the chat histories of other users, prompting Italy to temporarily ban ChatGPT. This problem could impact any system that stores user data. Italy lifted its ban after OpenAI added features that give users greater control over their data storage and use. However, there are other unique challenges faced by AI. Generative AI models are not designed to reproduce training data and generally cannot do so in any given instance, but it is not impossible. A paper titled "Extracting Training Data from Diffusion Models," which was published in January 2023, describes how Stable Diffusion can generate images that are similar to those in the training data. The Doe v. GitHub lawsuit has examples of code generated by GitHub Copilot, a tool powered by a Large Language Model (LLM) from OpenAI, that matches code in training data. This raises concerns that generative AI controlled by a third-party may inadvertently expose sensitive data. Some generative AI tools, such as ChatGPT, exacerbate this concern by incorporating user data into their training set. Companies concerned with data privacy have little choice but to prohibit its use. This article continues to discuss the privacy issues associated with AI and private AI as a potential solution.

    IEEE Spectrum reports "Want to Keep AI From Sharing Secrets? Train It Yourself"

  • news

    Visible to the public "Apple Blocked 1.7 Million Applications From App Store in 2022"

    Apple recently announced that it blocked 1.7 million applications from being published in the App Store in 2022. The rejected apps did not meet the required privacy, security, and content standards. The App Store has more than 650 million average weekly visitors globally, who can access content from more than 36 million registered Apple developers. Apple noted that last year, they terminated 428,000 developer accounts for fraudulent activity and rejected 105,000 Developer Program enrollments. The tech giant says it blocked 57,000 untrustworthy apps distributed through illegitimate storefronts and roughly 3.9 million attempts to deploy or launch applications distributed illicitly via the Developer Enterprise Program. In 2022, Apple revealed that they disabled more than 282 million customer accounts that engaged in fraudulent activities and prevented 198 million fraudulent new accounts from being created. According to Apple, its team reviews, on average more than 100,000 app submissions per week. Last year, the team reviewed over 6.1 million app submissions and rejected 1.7 million of them on various fraud and privacy concerns. Some of the rejected apps, Apple says, contained malicious code designed to steal user credentials, while others were disguised as financial management platforms but could morph into other applications. Other applications were spam, copycats, or misleading, contained undocumented features, or attempted to obtain users' data without their consent. According to Apple, over 147 million ratings and reviews were blocked and removed from the App Store last year out of a total of more than a billion that were processed. Apple also says it blocked roughly 3.9 million stolen credit cards from being used in its store and banned 714,000 accounts, thus blocking fraudulent transactions worth more than $2 billion.

    SecurityWeek reports: "Apple Blocked 1.7 Million Applications From App Store in 2022"

  • news

    Visible to the public "Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover"

    Mandiant has observed a financially-motivated cyber actor abusing Microsoft Azure Serial Console on Virtual Machines (VMs) in order to install third-party remote management tools in compromised environments. The activity was attributed to a threat group tracked by Mandiant as UNC3944, also known as Roasted 0ktapus and Scattered Spider. According to Mandiant researchers, this attack method is unique because it circumvented many of the traditional Azure detection methods and granted the attacker full administrative access to the VM. Since at least May 2022, the adversary, which first emerged late last year, has been known to use SIM-swapping attacks to breach telecommunications and Business Process Outsourcing (BPO) companies. Mandiant later discovered UNC3944 using a loader named STONESTOP to install a malicious signed driver called POORTRY that is designed to terminate processes associated with security software and delete files as part of a Bring Your Own Vulnerable Driver (BYOVD) attack. This article continues to discuss the abuse of Microsoft Azure Serial Console on VMs by the threat group UNC3944.

    THN reports "Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover"

  • news

    Visible to the public "FBI Warns Organizations of the New BianLian Ransomware Tactics"

    A joint Cybersecurity Advisory (CSA) issued by US and Australia government agencies and published by the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) warns organizations of the most recent tactics, techniques, and procedures (TTPs) used by the BianLian ransomware group. Since June 2022, the BianLian ransomware and data extortion group has been targeting entities within US and Australian critical infrastructure organizations. As part of the #StopRansomware initiative, the advisory is based on investigations conducted by the FBI and the Australian Cyber Security Centre (ACSC). It seeks to provide defenders with information that enables them to adjust protections and strengthen their security posture against BianLian ransomware and other threats of a similar nature. BianLian used a double-extortion model at first, encrypting systems after stealing sensitive data from victim networks and then threatening to publish the data. However, since Avast released a decryptor for the ransomware in January 2023, the group has shifted to extortion based on data theft without encrypting systems. This article continues to discuss the BianLian group's TTPs.

    Bleeping Computer reports "FBI Warns Organizations of the New BianLian Ransomware Tactics"

  • news

    Visible to the public "TP-Link Routers Implanted With Malicious Firmware in State-Sponsored Attacks"

    According to Check Point researchers, a Chinese state-sponsored Advanced Persistent Threat (APT) group implanted malicious firmware into TP-Link routers as part of attack campaigns targeting European foreign affairs entities. The malicious firmware was developed exclusively for TP-Link routers. Among its numerous harmful components is a custom-made backdoor called "Horse Shell." Horse Shell enables attackers to take complete control of a compromised device and remain hidden while accessing impacted networks. The researchers are uncertain as to how the attackers infected the routers, but they believe they likely obtained access by exploiting known vulnerabilities or using default, weak, or easily guessable passwords. Although the campaigns targeted European foreign affairs entities, researchers do not know who the router implant victims are. This article continues to discuss the infection of TP-Link routers by malicious firmware for state-sponsored attacks.

    Help Net Security reports "TP-Link Routers Implanted With Malicious Firmware in State-Sponsored Attacks"