News Items

  • news

    Visible to the public "Unpatched Wemo Smart Plug Bug Opens Countless Networks to Cyberattacks"

    The Wemo Mini Smart Plug V2, which enables users to remotely control anything connected to it via a mobile app, contains a security flaw that cyberattackers can exploit to trigger a variety of undesirable outcomes. These include the ability to turn electronic devices on and off remotely, and the potential to move deeper into an internal network or jump to additional devices. The Smart Plug goes into an existing outlet, connecting to an internal Wi-Fi network and the Internet via Universal Plug-n-Play (UPNP) ports. Users can then control the device via a mobile app, providing a method to smarten traditional lamps, fans, and other utility items. In addition to integrating with Alexa, Google Assistant, and Apple Home Kit, the app provides features such as scheduling. According to researchers at Sternum, the flaw, tracked as CVE-2023-27217, is a buffer-overflow vulnerability that affects the device model F7C063 and allows remote command injection. However, when they contacted the device manufacturer, Belkin, for a patch, they were informed that no firmware update would be released because the device is now an end-of-life product. This article continues to discuss the command injection bug in the popular device that Belkin has no plans to address.

    Dark Reading reports "Unpatched Wemo Smart Plug Bug Opens Countless Networks to Cyberattacks"

  • news

    Visible to the public "Herman's Study Furthering Cybersecurity Curriculum Assessment Earns Best Paper Award"

    Geoffrey Herman is a Professor in the Department of Computer Science at the University of Illinois at Urbana-Champaign, whose most recent work came through a multi-institutional research project that resulted in a Best Paper Award from the 2023 Technical Symposium on Computer Science Education, organized by the ACM Special Interest Group on Computer Science Education (SIGCSE). Herman's paper, "Psychometric Evaluation of the Cybersecurity Curriculum Assessment," built upon collaborative research with the University of Maryland, Baltimore County (UMBC) and the University of Minnesota, Duluth. This paper explores effective cybersecurity teaching and learning among students. According to the paper, the project was inspired by a shortage of cybersecurity professionals, which cannot be addressed without an understanding of which cybersecurity curricula and teaching strategies provide students with a solid foundation. The group first worked on the Cybersecurity Assessment Tools project, which entailed the development of tools that accurately measure how well courses and curricula are forming students' conceptual knowledge. This effort advanced through the group's focus on a Cybersecurity Concept Inventory, which they use to assess students' conceptual knowledge of cybersecurity following a first course in the subject. The newest paper describes the Cybersecurity Curriculum Assessment used to evaluate students' cybersecurity knowledge after they have completed a multi-course curriculum. The main takeaway is that there are tools validated by research to evaluate how well cybersecurity courses and curricula prepare students to think broadly about cybersecurity. This article continues to discuss the "Psychometric Evaluation of the Cybersecurity Curriculum Assessment" paper that won the Best Paper Award from the 2023 Technical Symposium on Computer Science Education.

    The Grainger College of Engineering - University of Illinois reports "Herman's Study Furthering Cybersecurity Curriculum Assessment Earns Best Paper Award"

  • news

    Visible to the public "Illinois Tech's CARNATIONS Receives $10M Federal Grant as New Tier 1 Transportation Center to Bolster Cybersecurity in Navigation Systems"

    The US Department of Transportation has designated the Center for Assured and Resilient Navigation in Advanced Transportation Systems (CARNATIONS) at the Illinois Institute of Technology (Illinois Tech) as a Tier 1 University Transportation Center (UTC). As a Tier 1 UTC, CARNATIONS will receive a $10 million grant for increasing the resilience of transportation navigation systems against cyberattacks such as spoofing and jamming. CARNATIONS, a consortium of universities led by Professor of Mechanical and Aerospace Engineering Boris Pervan, conducts transformative research in resilient transportation systems, facilitates technology transfer to public agencies and industry, and advances workforce and educational development. Interference, such as jamming and spoofing, that targets critical infrastructure can cause delays and cascading failures across multiple modes of transportation. For example, a major aircraft manufacturer reported over 10,000 Global Navigation Satellite System (GNSS) interference events in 2021 alone, and repeated spoofing attacks have negatively impacted various military operations. Pervan and his team plan to approach the problem from different angles, including developing sophisticated algorithms that can distinguish between authentic and spoofed GPS signals and improving GPS receivers by combining them with other types of sensors resistant to jamming and spoofing. CARNATIONS will consider the possibility of a fully connected system in the future, in which self-driving cars exchange information with each other and with smart infrastructure such as traffic signals. This article continues to discuss CARNATIONS and its goal to enhance the resilience of transportation infrastructure against cyber threats.

    Illinois Institute of Technology reports "Illinois Tech's CARNATIONS Receives $10M Federal Grant as New Tier 1 Transportation Center to Bolster Cybersecurity in Navigation Systems"

  • news

    Visible to the public "Infiltration of Qilin Reveals Customizable Nature of RaaS Marketplace"

    The Russia-aligned Ransomware-as-a-Service (RaaS) group Qilin offers its affiliates sophisticated, user-friendly tools to trap their victims, as well as a significant portion of the proceeds they steal. Qilin, also known as Agenda ransomware, was first identified by Trend Micro in August 2022. The group has been targeting companies in the healthcare and education sectors. After infiltrating Qilin's operations, Group-IB recently revealed previously unknown information about the group's inner workings, including their claim to have compromised at least 12 victims since July 2022. The group provides affiliates with highly flexible tools to manage attacks on organizations. According to threat intelligence analyst Nikolay Kichatov, the RaaS provider recently switched from a solution written in the Go programming language to Rust-based ransomware that makes it easier to tailor attacks to Windows, Linux, and other operating system environments. Many Qilin ransomware attacks are customized in order to optimize their impact on each victim. Kichatov added that this customization and optimization involves modifying filename extensions of encrypted files and terminating specific processes and services. Group-IB threat intelligence researchers analyzed the affiliate program and found a six-section admin interface. This article continues to discuss researchers' findings and observations regarding the Qilin RaaS group.

    SC Media reports "Infiltration of Qilin Reveals Customizable Nature of RaaS Marketplace"

  • news

    Visible to the public "Is the New .zip Top-Level Domain a Cyber Security Risk?"

    According to security experts, the new '.zip' top-level domain (TLD) could drive an increase in the spread of malware and undermine legitimate sources. TLDs are the letters that follow the final period in a URL, such as '.com.' At the beginning of May, Google announced the release of eight new options, including .dad, .phd, .prof, .esq, .foo, .zip, .mov, and .nexus. Although most of the new TLDs were created to correspond with specific job titles, there are concerns that the two that resemble file extensions, which are '.zip' and '.mov,' could be used by hackers to deceive users into entering malicious domains. Zipped archives are widely used in business because they enable the sharing of large amounts of data in a compressed format and are compatible with macOS, Windows, and Linux. Using the '.zip' TLD to disguise illegitimate links as downloadable files could lead to increased phishing attacks or the delivery of malicious .zip files, such as those used in recent Emotet botnet campaigns through domains resembling innocent files. This article continues to discuss the cybersecurity risk posed by the new .zip TLD.

    ITPro reports "Is the New .zip Top-Level Domain a Cyber Security Risk?"

  • news

    Visible to the public "Lacroix Shuts Three Factories For a Week After Cyberattack"

    International electronics manufacturer Lacroix has recently intercepted a targeted cyberattack on its activity sites in France (Beaupreau), Germany (Willich), and Tunisia (Zriba). To assess the damages caused by the attack, the company said it temporarily shut down several online systems. The company stated that prior to restarting the systems of these sites, investigations are underway to ensure that the attack is completely contained. The company noted that some local infrastructures have been encrypted, and an analysis is also being carried out to identify any exfiltrated data. These operations, combined with the need to use backups to restore systems, are expected to require a few days, leading to the closure of the three sites for the week. The company stated that
    they are aiming for a reopening on Monday, May 22nd.

    Infosecurity reports: "Lacroix Shuts Three Factories For a Week After Cyberattack"

  • news

    Visible to the public "Millions of Deleted Files Recovered in Hard Drives Purchased Online"

    Secure Data Recovery shared the results of a data recovery project aimed at determining how many files could be recovered from hard drives purchased online. The company purchased 100 hard drives at random and used reasonable means to attempt data recovery. Secure Data Recovery was able to recover data from 35 drives, 34 of which were sanitized, 30 were damaged, and only one was encrypted. Over 5.7 million files were recovered, although that number was skewed by a single hard drive containing more than 3.1 million files. The findings emphasize a major problem among most users. After replacing damaged or obsolete hard drives, most users lack a thorough destruction or disposal plan. This article continues to discuss the recovery of millions of files from hard drives purchased online, users not properly destroying or disposing of damaged or obsolete hard drives, and how to securely dispose of a hard drive.

    TechRadar reports "Millions of Deleted Files Recovered in Hard Drives Purchased Online"

  • news

    Visible to the public "Bipartisan Bill Aims to Shut Rural Hospital Cyber Skill Gaps"

    New bipartisan legislation introduced in the US Senate seeks to address the cybersecurity skills shortage in rural hospitals, which hackers and ransomware operators increasingly target. The Rural Hospital Cybersecurity Enhancement Act would require the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) to develop a comprehensive cybersecurity workforce development strategy for healthcare facilities in "non-urbanized" areas that offer primary care, emergency care, and diagnostic services. Small and rural institutions often lack the means to invest in cybersecurity defenses and professionals in order to prevent breaches. For example, Uintah Basin Healthcare, a 42-bed hospital in rural eastern Utah, has recently begun notifying 103,974 patients whose health information may have been compromised due to a hacking breach. This article continues to discuss the Rural Hospital Cybersecurity Enhancement Act.

    DataBreachToday reports "Bipartisan Bill Aims to Shut Rural Hospital Cyber Skill Gaps"

  • news

    Visible to the public "WordPress Plugin Vulnerability Exposed Ferrari Website to Hackers"

    Security researchers at Char49 have discovered that a vulnerability in the official website of luxury sports car maker Ferrari could have exposed potentially sensitive information. The issue was discovered in March. Ferrari addressed the weakness within a week. The researchers noticed that the "media.ferrari[.]com" domain is powered by WordPress, and it was running a very old version of W3 Total Cache, a plugin installed on more than a million websites. The plugin was affected by CVE-2019-6715, a flaw that can be exploited by an unauthenticated attacker to read arbitrary files. Exploitation of the vulnerability allowed the researchers to obtain the "wp-config.php" file, which stores WordPress database credentials in clear text. The researchers stated that the exposed database stored information associated with the media[.]ferrari.com domain. While the researchers did not dig too deep in order to avoid breaking responsible disclosure rules, the vulnerability could have been exploited to access other files on the web server, including ones that could contain information that is of value for threat actors. After being notified, Ferrari patched the vulnerability by updating the WordPress plugin. The researchers stated that while in this case there is no indication that the security hole directly exposed customer or other sensitive information, it's important for high-profile companies such as Ferrari to ensure that none of their systems are vulnerable. In March, Ferrari admitted to being targeted in a ransomware attack in which hackers stole customer information.

    SecurityWeek reports: "WordPress Plugin Vulnerability Exposed Ferrari Website to Hackers"

  • news

    Visible to the public  "Lancefly APT Uses Powerful Merdoor Backdoor in Attacks on Asian Orgs"

    Symantec researchers have reported that the Lancefly Advanced Persistent Threat (APT) group is now using a custom-written backdoor called Merdoor in ongoing attacks against South and Southeast Asian organizations. The attacks are aimed at government, aviation, education, and telecommunications organizations. The intelligence-gathering campaign emerged in mid-2022 and is still ongoing. Merdoor is a fully-featured backdoor that supports multiple capabilities, such as installing itself as a service and keylogging. In addition, it has various ways to communicate with its command-and-control (C2) server (i.e., HTTP, HTTPS, DNS, UDP, TCP), and the ability to listen for commands on a local port. The only difference between the instances of Merdoor examined by the researchers is the embedded and encrypted configuration, which includes the C2 communication mechanism, service details, and installation directory. This article continues to discuss the Lancefly APT group's use of the powerful custom backdoor Merdoor in attacks against organizations.

    Security Affairs reports "Lancefly APT Uses Powerful Merdoor Backdoor in Attacks on Asian Orgs"

  • news

    Visible to the public "Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks"

    Multiple security flaws have been discovered in the cloud management platforms of three industrial cellular router vendors, which could expose Operational Technology (OT) networks to attacks. The industrial cybersecurity company OTORIO presented its findings at the Black Hat Asia 2023 conference. The 11 vulnerabilities enable Remote Code Execution and complete control over hundreds of thousands of devices and OT networks. Specifically, the cloud-based management solutions provided by Sierra Wireless, Teltonika Networks, and InHand Networks for remotely managing and operating devices contain the vulnerabilities. Successful exploitation of the vulnerabilities could pose significant risks to industrial environments, allowing adversaries to bypass security layers, exfiltrate sensitive data, and remotely execute code on internal networks. The vulnerabilities could also be weaponized to gain unauthorized access to devices on the network and carry out malicious operations such as a shutdown with elevated permissions. This article continues to discuss the potential exploitation and impact of the vulnerabilities found in cloud-based management solutions offered by Sierra Wireless, Teltonika Networks, and InHand Networks.

    THN reports "Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks"

  • news

    Visible to the public "Open-Source Cobalt Strike Port 'Geacon' Used in macOS Attacks"

    Geacon, a Go-based implementation of the beacon from the widely exploited penetration testing suite Cobalt Strike, is increasingly being used to target macOS devices. Geacon and Cobalt Strike are both utilities that legitimate organizations use to simulate attacks against their networks and strengthen their defenses, but threat actors have also used them to conduct attacks. In regard to Cobalt Strike, threat actors have been exploiting it to compromise Windows systems for years, and the information security industry has been fighting it. SentinelOne researchers monitoring Geacon activity in the wild have recently observed an increase in payloads on VirusTotal. While some exhibited signs of red team operations, others displayed traits of malicious attacks. This article continues to discuss the use of Geacon in attacks against macOS devices.

    Bleeping Computer reports "Open-Source Cobalt Strike Port 'Geacon' Used in macOS Attacks"

  • news

    Visible to the public "Attack Automation Becomes a Prevalent Threat Against APIs"

    According to Cequence Security, Application Programming Interfaces (APIs) have emerged as a primary attack vector in several high-profile incidents, posing a significant threat to the security posture of organizations. Numerous high-profile organizations have suffered API attacks in recent months, increasing the need for CISOs to prioritize API security. According to Ameya Talwalkar, CEO of Cequence Security, traditional prevention methods are no longer sufficient as attackers become more inventive. Talwalkar added that as attack automation becomes an increasingly prevalent threat against APIs, organizations must have the tools, knowledge, and expertise to defend in real-time. About 45 billion search attempts were made for shadow APIs in the second half of 2022, a 900 percent increase from the 5 billion attempts made in the first half of 2022. From June to October 2022, attackers favored traditional application security techniques, but as the holidays approached, API security tactics experienced a 220 increase. This article continues to discuss key findings from Cequence Security's "API Protection Report: Holiday Build-up Shows 550% Jump in Unique Threats."

    Help Net Security reports "Attack Automation Becomes a Prevalent Threat Against APIs"

  • news

    Visible to the public "Microsoft Follina Bug Is Back in Meme-Themed Cyberattacks Against Travel Orgs"

    A threat actor is exploiting the Follina Remote Code Execution (RCE) vulnerability discovered last year to deploy the XWORM Remote Access Trojan (RAT) and data-stealer against hospitality industry targets. Follina, tracked as CVE-2022-30190, is an RCE flaw with a "high" CVSS score of 7.8. It enables attackers to create specially crafted Microsoft Word files that trick Microsoft's Diagnostic Support Tool into downloading and executing malicious code from a server controlled by the attacker. On May 12, researchers from Securonix detailed the campaign, which uses Follina to drop Powershell code onto target machines and is packed with 4Chan references and memes. The researchers dubbed the campaign "MEME#4CHAN," because it blurs the line between stealth and Internet humor. MEME#4CHAN attacks start with a phishing email containing a hospitality-themed subject line, such as "Reservation for Room." This article continues to discuss the MEME#4CHAN campaign exploiting a patched Microsoft vulnerability to attack the hospitality industry.

    Dark Reading reports "Microsoft Follina Bug Is Back in Meme-Themed Cyberattacks Against Travel Orgs"

  • news

    Visible to the public "Transportation Dept Cyber Breach Exposes Data of Federal Employees"

    The Department of Transportation (DOT) has recently been hit with a data breach that may have exposed personally identifiable information of federal government employees. The DOT said it was working to notify affected individuals whose personally identifiable information may have been compromised due to the breach and to help mitigate potential risks. The data breach impacts individuals that are enrolled in the US Department of Transportation's transit benefit program (TRANServe). TRANServe manages the transit benefit program for DOT and other federal agencies. The breach occurred within the system that supports TRANServe. TRANServe is a commuting benefits system that reimburses staff across the federal government for certain transportation costs. According to the DOT, the information compromised as a result of the breach may include details such as the name of TRANServe transit benefit recipients, their agency, work email address, work phone number, work address, home address, SmarTrip card number, and/or TRANServe Card number. The breach is expected to affect 114,000 current DOT employees and 123,000 former DOT employees.

    FedScoop reports: "Transportation Dept Cyber Breach Exposes Data of Federal Employees"

  • news

    Visible to the public "Ransomware Group Claims 2.5 Terabytes of Stolen Data Less Than a Month After Emerging Online"

    Security researchers at Cisco Talos have discovered a ransomware group that has emerged recently and has already listed four victims, including three in the U.S., on its leak site. The "RA GROUP" is just the latest entity to use the Babuk ransomware source code, which a developer leaked in September 2021 on a Russian-language forum. The researchers noted that despite having emerged online on April 22, RA GROUP has already claimed to have stolen nearly 2.5 terabytes of data across just four victims, three in the U.S. and one in South Korea. Three of the victims were posted on April 27, and the next on April 28. The American targets include a smaller company in the insurance industry and two larger companies in financial services, and an electronics supplier servicing the computer, communication, aerospace, marine, and military industries. The researchers noted that the RA GROUP website has undergone cosmetic changes since it was first published, "confirming they are in the early stages of their operation." The researchers stated that the group uses custom ransom notes for each victim that informs them they have three days to pay before a sample is published and seven days before the full set is published. Victim entity names are also hardcoded into the executable files, a characteristic the researchers describe as "unusual" for ransomware groups.

    CyberScoop reports: "Ransomware Group Claims 2.5 Terabytes of Stolen Data Less Than a Month After Emerging Online"

  • news

    Visible to the public "US Says VoIP Firm Delivered Billions of Scam Robocalls"

    A Californian VoIP provider has recently been accused of breaking telemarketing rules by providing services that sent billions of illegal robocalls to US consumers. The Department of Justice (DoJ) and Federal Trade Commission (FTC) on Friday announced a civil enforcement action against Los Angeles-headquartered XCast Labs. The DoJ alleges that XCast Labs services delivered pre-recorded marketing messages to recipients, many of whom are listed on the National Do Not Call Registry. These included scam calls impersonating government agencies and "other false or misleading statements to induce purchases." The DoJ claimed that some calls also used spoofed caller ID information to hide the true origin of the caller and/or failed to identify the seller of the services being marketed. XCast Labs, which describes itself as "the nation's leading supplier of business enterprise solutions," is accused of continuing to allow its services to be used in this way, even after being told that the calls were illegal. The newly filed complaint seeks monetary civil penalties and a permanent injunction to prevent XCast Labs from future violations.

    Infosecurity reports: "US Says VoIP Firm Delivered Billions of Scam Robocalls"

  • news

    Visible to the public "PharMerica Discloses Data Breach Impacting 5.8 Million Individuals"

    National pharmacy network PharMerica recently started sending out notification letters to more than 5.8 million individuals to disclose a data breach that occurred in March. Owned by BrightSpring Health, a provider of home and community-based health services, PharMerica operates over 2,500 facilities across the US and offers more than 3,100 pharmacy and healthcare programs. The company stated that the data breach occurred between March 12 and March 13. Personal information compromised during the incident includes names, addresses, birth dates, Social Security numbers, health insurance, and medication information. The company noted that in some cases, the compromised information belongs to deceased individuals, and the company encourages executors or surviving spouses to contact the national credit reporting agencies to notify them of the situation. PharMerica's letter does not provide details on the type of cyberattack that it suffered, but it appears that the Money Message ransomware group is responsible for the incident. In April, the group started leaking personally identifiable information (PII) and protected health information (PHI) allegedly stolen from PharMerica.

    SecurityWeek reports: "PharMerica Discloses Data Breach Impacting 5.8 Million Individuals"

  • news

    Visible to the public "Discord Breached After Service Agent Targeted"

    Discord has recently notified users of a data breach that occurred when a threat actor gained unauthorized access to the support ticket queue of a third-party customer service agent. The company noted that due to the nature of the incident, "it is possible that user email addresses, the contents of customer service messages, and any attachments sent between users and Discord may have been exposed to a third party." The popular messaging platform said that when it discovered the issue, it deactivated the compromised account and completed malware checks on the machine. The company stated that while they believe the risk is limited, it is recommended that users be vigilant for any suspicious messages or activity, such as fraud or phishing attempts. It is expected that Discord's user base will reach nearly 200 million monthly active users by the end of 2023, making it an increasingly attractive target for attackers.

    Infosecurity reports: "Discord Breached After Service Agent Targeted"

  • news

    Visible to the public "The Philadelphia Inquirer Suffers Cyberattack, Newspaper's Largest Disruption in Nearly 30 Years"

    The Philadelphia Inquirer recently reported a cyberattack that disrupted newspaper operations, the biggest disruption to its publications since a massive blizzard in 1996. The cyberattack prevented the newspaper from being able to print the Sunday edition of the newspaper. The company stated that its website remained functional for posting and updating articles, although it was slower than normal. Publisher Lisa Hughes said they could not provide an exact timeline for the full restoration of newspaper operations. The cyberattack came just days before Tuesday's mayoral election. Hughes said employees will not be allowed to use offices through at least Tuesday because of the disruptions, meaning the newsroom would not be available to reporters on election night. Hughes said the FBI was notified of the cyberattack. The FBI's Philadelphia office said it was aware of the attack but declined to comment further. It is unclear when the cyberattack began, but Hughes said the news organization was "first alerted to the anomalous activity" on Thursday by Cynet, a vendor that manages the outlet's network security. Publication continued without disruption on Thursday and Friday. Employees first detected disruptions Saturday morning when they discovered that the newspaper's content-management system was not working.

    Fox Business reports: "The Philadelphia Inquirer Suffers Cyberattack, Newspaper's Largest Disruption in Nearly 30 Years"

  • news

    Visible to the public "New Technology Developed for Quantum Cryptography Applications"

    Quantum computing threatens to render the use of classic cryptography for secure communications obsolete. Quantum cryptography applies the laws of quantum mechanics to ensure security. Quantum Key Distribution (QKD) enables two parties to secure a message using a random secret key, which is generated by quantum particles known as photons. In order to accomplish this, scientists are increasingly using an alphabet based on specific properties of light particles (i.e., photons), namely their color composition. However, no equipment had been created to decode the information again. Therefore, researchers at Paderborn University have created such a decoder. They made a multi-output quantum pulse gate (mQPG) that separates incoming letters into various colors, which physicists can identify with a spectrometer. In addition, they have demonstrated a complete, high-dimensional mQPG-based decoder that enables encryption protocols based on individual photons. This article continues to discuss the new technology developed by researchers at Paderborn University for quantum cryptography applications.

    Paderborn University reports "New Technology Developed for Quantum Cryptography Applications"

  • news

    Visible to the public "Millions of Mobile Phones Come Pre-infected With Malware, Say Researchers"

    According to Trend Micro researchers at Black Hat Asia, millions of Android phones were infected with malicious firmware before they were ever shipped from their factories. Most of the devices affected are Android mobile devices, although smartwatches, TVs, and other devices are also involved. The manufacturing of the devices is outsourced to an Original Equipment Manufacturer (OEM). The researchers emphasized that this outsourcing allows someone in the manufacturing process, such as a firmware provider, to infect products with malicious code before they are shipped. The team examined dozens of firmware images in search of malware and discovered over 80 different plugins, many of which were not widely distributed. The most impactful plugins were those that had a business strategy built around them, were sold on the underground, and were openly marketed on sites such as Facebook and YouTube. The malware aims to steal information or make money from information obtained or provided. Trend Micro researchers noted that the malware makes the devices serve as proxies, which are then used to steal and sell SMS messages, hijack social media accounts, take control of online messaging accounts, and more. This article continues to discuss millions of mobile phones being infected with malware prior to being shipped.

    The Register reports "Millions of Mobile Phones Come Pre-infected With Malware, Say Researchers"

  • news

    Visible to the public "Feds Warn of Rise in Attacks Involving Veeam Software Flaw"

    Federal authorities have warned the healthcare industry about a rise in cyberattacks against Veeam's backup application. The attacks appear to be linked to the March disclosure of a high-severity vulnerability in the vendor's software. The vulnerability, tracked as CVE-2023-27532, exposes Veeam Backup and Replication (VBR)-stored encrypted credentials. According to a recent alert from the Department of Health and Human Services' Health Sector Cybersecurity Coordination Center (HHS HC3), its exploitation could lead to unauthorized access to backup infrastructure hosts. These intrusions may result in data theft or ransomware deployment. The issue affects all versions of the Veeam software, which backs up, replicates, and restores data on Virtual Machines (VMs). The software supports transaction-level restores of Oracle and Microsoft SQL databases, according to HHS HC3. In addition to backing up and recovering VMs, VBR is also used to protect and restore individual files and applications for environments such as Microsoft Exchange and SharePoint, which are used in the healthcare and public health sector, making the threat significant. This article continues to discuss the healthcare sector facing a rise in cyberattacks on VBR.

    DataBreachToday reports "Feds Warn of Rise in Attacks Involving Veeam Software Flaw"

  • news

    Visible to the public "Lessons From 'Star Trek: Picard' – A Cybersecurity Expert Explains How a Sci-Fi Series Illuminates Today's Threats"

    Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering at the University of Maryland, Baltimore County, emphasizes that the general public's understanding of technology and cybersecurity is often founded on simple stereotypes and sensationalized media portrayals. Forno has written about entertaining but misleading scenarios, such as black-clad teenage hackers navigating megacities and challenging corporate villains. However, Forno says that Hollywood sometimes depicts reality in entertaining and educational ways, which is important because everyone shares many of the same cybersecurity threats and vulnerabilities. As a former practitioner in the cybersecurity industry and current researcher in the field, Forno considers the final season of "Star Trek: Picard" to be the most recent example of entertainment media imparting valuable lessons about cybersecurity. This article continues to discuss Forno's views on how "Star Trek: Picard" relates to cybersecurity.

    The Conversation reports "Lessons From 'Star Trek: Picard' - A Cybersecurity Expert Explains How a Sci-Fi Series Illuminates Today's Threats"

  • news

    Visible to the public "Voting Machines Must Be Test Hacked for Certification, Under Proposed Bill"

    Lawmakers recently introduced bipartisan legislation to strengthen the cybersecurity of US election infrastructure and boost voter confidence by requiring penetration testing as part of voting machine certification. Senators. Mark Warner and Susan Collins introduced the "Strengthening Election Cybersecurity to Uphold Respect for Elections through Independent Testing" (SECURE IT) Act, which requires the Election Assistance Commission (EAC) to mandate that systems seeking certification undergo penetration testing, allowing researchers to search for vulnerabilities and simulate cyberattacks. Warner noted that the SECURE IT Act would enable researchers to assume the role of cybercriminals in order to identify vulnerabilities and flaws that might not otherwise be discovered. Under the SECURE IT Act, EAC and the National Institute of Standards and Technology (NIST) would accredit entities to conduct penetration testing. EAC must also establish a voluntary Coordinated Vulnerability Disclosure Program for election systems, in which researchers gain access to voting systems to identify and disclose vulnerabilities to the manufacturer and EAC. Discovered vulnerabilities will be submitted to the Common Vulnerabilities and Exposures database after 180 days. This article continues to discuss the SECURE IT Act.

    NextGov reports "Voting Machines Must Be Test Hacked for Certification, Under Proposed Bill"

  • news

    Visible to the public "Russia-Affiliated CheckMate Ransomware Quietly Targets Popular File-Sharing Protocol"

    The CheckMate ransomware group has targeted the Server Message Block (SMB) communication protocol to compromise their victims' networks. Cybernews researchers report that the group does not operate a data breach site, which is unusual for a ransomware campaign, given that many prominent gangs boast about targets and list them as victims on their data leak sites. This is done to increase the pressure on the victim to pay the demanded ransom. Recent research conducted by Cybernews has uncovered new CheckMate activity, revealing that the group has been actively targeting SMB shares with insufficient security. After gaining access to SMB shares, the malicious actors encrypt all files and demand payment in exchange for the decryption key. The ransomware group operates Kupidon, Mars, and CheckMate ransomware, all of which were discovered between 2021 and 2022. This article continues to discuss the CheckMate ransomware operators targeting the SMB communication protocol.

    Cybernews reports "Russia-Affiliated Checkmate Ransomware Quietly Targets Popular File-Sharing Protocol"

  • news

    Visible to the public "Brightly Says SchoolDude Data Breach Spilled 3 Million User Accounts"

    Software maker Brightly has recently confirmed that hackers stole close to three million SchoolDude user accounts in an April data breach. SchoolDude is a cloud-based work order management system used primarily by schools and universities to submit and track maintenance orders. Its users are school employees, like principals, executives, and maintenance workers, as well as students and other staff submitting repair requests. The company said it was notifying both past and present customers that the hackers took their names, email addresses, account passwords, and phone numbers if added to the account. The data also includes the names of school districts. Brightly said it reset customer passwords. The company warned users to change passwords on other online accounts that use the same credentials as they used on SchoolDude. This refers to credential stuffing, where hackers use passwords from previous data breaches to break into other user accounts with the same passwords. Brightly said it discovered the breach on April 28, more than a week after the mass data theft.

    TechCrunch reports: "Brightly Says SchoolDude Data Breach Spilled 3 Million User Accounts"

  • news

    Visible to the public "Sysco Data Breach Exposes Customer, Employee Data"

    In an internal memo sent recently, global food distribution company Sysco revealed that it had suffered a data breach earlier in the year when sensitive data on customers, employees, and the business, was stolen by hackers. The company said that it believes the network breach began on January 14, and they became aware of the breach on March 5. The company noted that the threat actor gained access to their systems without authorization and claimed to have acquired certain data. Though the investigation is ongoing, Sysco said customer and supplier data in the US and Canada and personal information of US employees such as names, Social Security numbers, and account numbers are likely to have been impacted or stolen due to this breach. Sysco operates with around 71,000 employees and 333 distribution facilities globally.

    Dark Reading reports: "Sysco Data Breach Exposes Customer, Employee Data"

  • news

    Visible to the public "New DownEx Malware Campaign Targets Central Asia"

    According to a report by Bitdefender, a previously undocumented malware campaign called DownEx has been targeting government institutions in Central Asia for cyber espionage. The first instance of the malware was discovered in 2022 during a highly targeted attack aimed at exfiltrating data from Kazakhstan's foreign government institutions. Another attack was observed by researchers in Afghanistan. Bitdefender noted that the involved domain and IP addresses do not appear in any previously documented incidents, and the malware does not share code similarities with previously identified malware. Researchers believe that a state-sponsored group is responsible for these incidents based on the specific targets of the attacks, the document metadata that impersonates a real diplomat, and the primary focus on data exfiltration. Although the attacks have not been attributed to any specific threat actor, a Russian group is likely responsible for the attacks. Bitdefender said that the use of a cracked version of Microsoft Office 2016 prevalent in Russian-speaking countries is an indication of the attack's origin, adding that it is unusual to see the same backdoor written in two languages. This was previously observed with the Russian-based group APT28 and their backdoor Zebrocy. This article continues to discuss the new DownEx malware campaign.

    CSO Online reports "New DownEx Malware Campaign Targets Central Asia"

  • news

    Visible to the public "Toyota: Data on More Than 2 Million Vehicles in Japan Were at Risk in Decade-Long Breach"

    A decade-long data breach in Toyota's online service put information on more than 2 million vehicles at risk, the Japanese automaker announced. The problem with Toyota's cloud-based Connected service is limited to vehicles in Japan. According to Toyota, the problem spans from January 2012 to April 2023. The Connected service notifies owners to schedule maintenance checks, provides connections to streaming entertainment, and offers assistance in the event of an emergency. For example, it can call for help after an accident and locate a stolen vehicle. There is no evidence that any information was leaked, copied, or misused as a result of the breach. However, the vehicle identification number, which is different from the license plate, the location of the vehicle and the time it was there, as well as video footage captured by the vehicle, are at risk. This article continues to discuss the decade-long Toyota breach.

    AP reports "Toyota: Data on More Than 2 Million Vehicles in Japan Were at Risk in Decade-Long Breach"

  • news

    Visible to the public "Virginia Tech, George Mason University Partner to Develop Networking Infrastructure for Satellite Constellations"

    The National Science Foundation (NSF) has awarded $2 million to Virginia Tech and George Mason University to develop distributed, mobile space and terrestrial networking infrastructure for multi-constellation coexistence. This work will be done through the agency's Computer and Information Science and Engineering Community Research Infrastructure (CCRI) program. Through developing the fundamental infrastructure and implementing cybersecurity protocols, the researchers hope to demonstrate the value and practicality of an open-source inter-constellation network with global benefits. The team will investigate software vulnerabilities and the physical security of satellites, ground stations, and more in order to ensure that future space communications remain secure from hacking or cyber threats. This article continues to discuss Virginia Tech and George Mason University teaming up to develop an open-source cyber-infrastructure and new space-based networking technology, and what they will do to bolster cybersecurity.

    Virginia Tech reports "Virginia Tech, George Mason University Partner to Develop Networking Infrastructure for Satellite Constellations"

  • news

    Visible to the public "A Massive Data Breach Has Left Intel Scrambling For Solutions"

    A security breach in March robbed MSI of up to 1.5TB of sensitive data. However, MSI is not the only company impacted. As a result of the breach, Intel is now investigating a major leak of Intel Boot Guard keys. The extent of the damage is still unclear, but the worst-case scenario is that the security feature is now useless on compromised devices. This whole fiasco seems to have begun with the MSI data breach that took place earlier this year. Intel Boot Guard prevents the loading of malicious firmware on Intel hardware. The fact that it's now compromised makes this as much Intel's problem as it is MSI's. According to Alex Matrosov, the CEO of Binarly, a security platform, if threat actors gain access to these keys, they might be able to create powerful malware that's capable of bypassing Intel's security measures. Matrosov claims that Intel Boot Guard may now be ineffective on some of Intel's best processors, including Tiger Lake, Alder Lake, and Raptor Lake chips running on MSI-based devices. In a statement to Bleeping Computer, Intel said: "Intel is aware of these reports and actively investigating. There have been researcher claims that private signing keys are included in the data, including MSI OEM Signing Keys for Intel BootGuard. It should be noted that Intel BootGuard OEM keys are generated by the system manufacturer, and these are not Intel signing keys." We'll have to wait for Intel and MSI to share more information on the data breach in order to know what happens next.

    Digital Trends reports: "A Massive Data Breach Has Left Intel Scrambling For Solutions"

  • news

    Visible to the public "The Internet of Things: Fire Sleuth, Fire Starter"

    A new study identifies multiple challenges associated with relying on Internet of Things (IoT) devices during investigations. Many IoT devices, for example, lack security controls. A determined adversary can configure IoT devices to generate a false narrative that can conceal their activities and complicate forensic investigations. Instead of considering IoT data as the gold standard, it is essential to corroborate them with physical evidence from fire or crime scenes and to promote stronger security controls in IoT smart home devices. Overall, research should not only concentrate on ensuring the security and reliability of IoT devices but also on preventing the misuse of data. This article continues to discuss the use of IoT devices in investigations and the associated privacy and security challenges.

    IEEE Spectrum reports "The Internet of Things: Fire Sleuth, Fire Starter"

  • news

    Visible to the public "Manufacturers Targeted as Ransomware Victim Numbers Spike 27%"

    Security researchers at GuidePoint Security have discovered that the number of ransomware victims appearing on data leak sites surged by 27% year-on-year (YoY) in April to 354, with manufacturing the most impacted industry. The researchers noted that the data was compiled from an analysis of 24 ransomware leak sites, so the real figure for victims could be many times greater, considering many victims choose to pay and, therefore, will not be featured on such sites. However, on those analyzed sites, a fifth (19%) of victims were manufacturing companies. The researchers stated that while victim volumes declined 22% between March and April this year, they increased 46% in the manufacturing sector. LockBit was once again the most prolific group, accounting for 31% of victims on leak sites in April, followed by Alphv (14%). Overall, however, the ransomware industry is increasingly characterized by a large number of smaller groups. The researchers stated that they observed a diverse slate of active threat groups in April 2023, with 27 unique groups.

    Infosecurity reports: "Manufacturers Targeted as Ransomware Victim Numbers Spike 27%"

  • news

    Visible to the public "Software Supply Chain Attacks Hit 61% of Firms"

    Security researchers at Capterra have discovered that more than three-fifths (61%) of US businesses have been directly impacted by a software supply chain threat over the past year. The researchers polled 271 IT and IT security professionals to better understand the risk exposure of US companies to vulnerabilities in third-party software. Half of the respondents rated the software supply chain threat as "high" or "extreme," with another 41% claiming the risk is moderate. The researchers pointed to open source software as a key source of supply chain risk. It is now used by 94% of US companies in some form, with over half (57%) using multiple open source platforms. The researchers claimed that app sprawl is contributing to cyber risk, revealing that retailers that have experienced a cyberattack in the past two years are more than twice as likely to report being impacted by app sprawl as those that did not experience an attack (53% versus 22%). Alongside reducing app sprawl, the researchers recommended organizations request a software bill of materials (SBOM) from vendors and open source providers so that they can better track individual components. Yet only half (49%) of respondents are doing so currently.

    Infosecurity reports: "Software Supply Chain Attacks Hit 61% of Firms"

  • news

    Visible to the public "A Flaw in the Essential 'Addons for Elementor' WordPress Plugin Poses 1M Sites at Risk of Hacking"

    The Essential Addons for Elementor WordPress plugin is a compilation of more than 90 creative elements and extensions that enable administrators to enhance the Elementor page-building experience. There are over one million active installations of the plugin. PatchStack researchers discovered that the plugin has an unauthenticated privilege escalation flaw, tracked as CVE-2023-32243, that could enable remote attackers to gain administrator privileges on a website. The vulnerability exists in the password reset functionality of the plugin and affects versions 5.4.0 to 5.7.1. By exploiting this vulnerability, it is possible to reset the password of any user as long as they know their username, thus allowing them to reset the administrator's password and log in to their account. This vulnerability exists because this password reset function does not validate a password reset key before changing the given user's password. Attackers can use the vulnerability to seize control of a website and use it for malicious purposes, such as malware distribution or traffic redirection. This article continues to discuss the unauthenticated privilege escalation flaw in the popular Essential Addons for Elementor WordPress plugin impacting over one million websites.

    Security Affairs reports "A Flaw in the Essential 'Addons for Elementor' WordPress Plugin Poses 1M Sites at Risk of Hacking"

  • news

    Visible to the public "New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe"

    An Advanced Persistent Threat (APT) actor called Red Stinger has been targeting Eastern Europe. Malwarebytes disclosed that the APT's targets included military, transportation, and critical infrastructure entities, as well as those involved in the September East Ukraine referendums. The attackers have been able to exfiltrate snapshots, USB drives, keyboard strokes, and microphone recordings, depending on the campaign. Red Stinger overlaps with a threat cluster known as Bad Magic that targeted Donetsk, Lugansk, and Crimea-based government, agriculture, and transportation organizations in April. Although there were signs that the APT group may have been active since at least September 2021, the most recent findings from Malwarebytes put the group's first operation in December 2020. Throughout the years, the attack chain has used malicious installer files to install the DBoxShell, also known as PowerMagic, implant on compromised systems. The MSI file is downloaded using a Windows shortcut file that is contained within a ZIP archive. It has been observed that subsequent waves detected in April and September 2021 use similar attack sequences, with slight variations in the MSI file names. According to security researchers, DBoxShell is malware that uses cloud storage services as a command-and-control (C2) mechanism. This article continues to discuss researchers' findings regarding the Red Stinger APT group.

    THN reports "New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe"

  • news

    Visible to the public "Stealthier Version of Linux BPFDoor Malware Spotted in the Wild"

    Researchers have discovered a new, stealthier variant of the Linux malware called BPFDoor. It now has more robust encryption and reverse shell communications. BPFDoor is a backdoor malware that has been active since at least 2017 but was not discovered by security researchers until about 12 months ago. The malware derives its name from its use of the Berkley Packet Filter (BPF) to receive instructions while circumventing incoming traffic firewall restrictions. BPFDoor is designed to enable threat actors to maintain prolonged persistence on compromised Linux systems and remain undetected for extended periods of time. Prior to 2022, the malware used RC4 encryption, bind shell, and iptables for communication, and commands and filenames were hardcoded. The new variant analyzed by Deep Instinct uses static library encryption, reverse shell communication, and the command-and-control (C2) server sends all commands. The malware developers achieve improved stealth and obfuscation by including encryption within a static library, as they no longer need to rely on external libraries, such as those featuring the RC4 cipher algorithm. This article continues to discuss the new version of the Linux BPFDoor malware.

    Bleeping Computer reports "Stealthier Version of Linux BPFDoor Malware Spotted in the Wild"

  • news

    Visible to the public "Fraud Victims Risk More Than Money"

    According to Telesign, digital fraud has significant financial and psychological consequences for victims. In addition, digital fraud can significantly impact a company's brand perception and bottom. In the digital realm, trust is of paramount importance. For businesses to establish and maintain long-lasting relationships with their customers, it is essential to understand consumer sentiment regarding this topic. Telesign researchers emphasize the responsibility of companies to ensure privacy protections and trust in every digital interaction, as well as what can occur when companies fail to meet this obligation. Data breaches, which accounted for 44 percent of fraud incidents in this study, have a profoundly negative effect on brand perception, with 44 percent of data breach victims discouraging others from associating with the brand. Forty-three percent of data breach victims ceased all personal association with the brand. Thirty percent of data breach victims posted about the fraud incident on social media, amplifying negative brand perceptions. Furthermore, 59 percent of victims who were initially exposed to fraud on social media indicate that they are less likely to use social media again in the future. Others report that their fraud experiences make them less likely to use online banking and payment services applications. This article continues to discuss key findings from Telesign's 2023 Trust Index report.

    Help Net Security reports "Fraud Victims Risk More Than Money"

  • news

    Visible to the public "CISA Addresses 'Cyber Poor' Small Biz, Local Government"

    Jen Easterly, director of the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), told attendees at the sixth annual Hack the Capitol event in McLean, Virginia, on May 10 that CISA aims to help "cyber poor" places such as US small businesses, election offices, local government agencies, hospitals, and K-12 schools strengthen their defenses and responses to cyberattacks. Although the agency continues to work with the government, large companies, and technology vendors to improve security, CISA wants to determine how much it can help smaller organizations defend against cyber threats. Easterly noted that the objective is to understand their requirements, what they need to invest in security, and where CISA can help them protect their capabilities. The emphasis on smaller organizations recognizes that small and midsize businesses (SMBs), local government agencies, and schools have often been overlooked and excluded from efforts to create more resilient organizations. The government's efforts to create public-private partnerships have typically centered on large companies and critical industries, but attackers, particularly ransomware gangs, have targeted smaller organizations with limited cybersecurity resources. According to US Census data, 99. percent of all companies in the US have 250 employees or less. CISA has introduced Cybersecurity Performance Goals (CPGs), which aim to be low-cost and low-effort goals organizations can pursue to enhance their cybersecurity posture. This article continues to discuss CISA's efforts to help cyber poor organizations.

    Dark Reading reports "CISA Addresses 'Cyber Poor' Small Biz, Local Government"

  • news

    Visible to the public "Spyware Lurks in Android Smartphones"

    According to researchers from the University of California, San Diego, New York University, and Cornell, Google has made installing spyware apps on Android smartphones easy. The researchers demonstrated how these Android spyware apps are built and use relatively simple Android Application Programming Interfaces (APIs) for invasive spying capabilities. Although many of these APIs are required and provide beneficial functionality, researchers call on the Google/Android team to further explore how to prevent their misuse for spying on others. As a result of Google's decision to enable its Android operating system to install third-party apps from any online service, spyware apps can easily be installed on Android smartphones. The spyware installation process is as easy as it is for apps vetted as "safe" by the Google Play Store. Before being accepted by Apple's App Store, iOS apps are screened for safety on the iPhone. Android allows downloads from third-party websites, whereas Apple has chosen to restrict downloads to its own store. GitHub references hundreds of spyware apps, which often have similar names, such as Stalkerware and Watchware, as well as spyware services hidden in 3,988 dual-use apps. Criminals use spyware for illegal surveillance, profit, political leverage, blackmail, and other malicious purposes. This article continues to discuss spyware and how it can easily be installed on Android smartphones.

    CACM reports "Spyware Lurks in Android Smartphones"

  • news

    Visible to the public "NINJIO Releases Report Focused On Increasing Necessity for Human-Based Cybersecurity in Higher Education"

    The cybersecurity awareness training company NINJIO has published a comprehensive report on cyber threats faced by higher education institutions and the sector's unique vulnerabilities. Universities are high-value targets for cybercriminals because they handle massive amounts of sensitive data, including research data and student records. Moreover, university networks' size, complexity, and openness exacerbate the cybersecurity challenges they confront. According to the report, faculty, students, and all university stakeholders must be trained to recognize cyber threats and take appropriate action against them. Cyberattacks in higher education are rising, and the report examines how universities can combat them by implementing behavior-based, end-to-end cyber awareness solutions. In addition, the report describes how university administrators and Information Technology (IT) teams struggle to keep up with the evolution of cybercriminal tactics. Since millions of students, professors, and researchers use interconnected digital systems for online instruction, record-keeping, and more daily, cybercriminals have numerous opportunities to exploit user errors. More than a third of the errors that led to breaches in the education sector in 2022 were caused by emails sent to the wrong individuals or with the wrong attachments, while ransomware accounted for more than 30 percent of breaches. This article continues to discuss NINJIO's recommendations on how universities can build a culture of cybersecurity awareness at every level.

    Higher Ed Dive reports "NINJIO Releases Report Focused On Increasing Necessity for Human-Based Cybersecurity in Higher Education"

  • news

    Visible to the public "State-Sponsored Actors Leading Cause of Cyber Concern in Public Sector"

    Foreign state actors are now regarded as the greatest threat to digital networks in the US. A recent survey of public sector organizations on the current cybersecurity landscape reveals that 60 percent of respondents are concerned about attacks from foreign actors. The report, commissioned by the software company SolarWinds, which suffered a significant cyberattack in 2020 that resulted in data breaches at multiple government agencies, analyzed survey responses from 400 public sector Information Technology (IT) leaders from federal, state, and local governments. State-sponsored cyberattacks have been a concern for years, but the report's finding of a significant increase demonstrates that government organizations, notably among federal respondents, view it as a leading threat. Fifty-eight percent of respondents cited careless or untrained insiders as the second-greatest threat to their digital networks, while 52 percent cited the general hacking community as the third-greatest concern. Ransomware, trojans, and spam ranked first, second, and third, respectively, among the different types of cyber threats. The complexity of IT, closely followed by budgetary constraints, was cited as the leading obstacle to network security. This article continues to discuss key findings from the new report surveying public sector organizations on the current cybersecurity landscape.

    NextGov reports "State-Sponsored Actors Leading Cause of Cyber Concern in Public Sector"

  • news

    Visible to the public "NIST Revises SP 800-171 Guidelines for Protecting Sensitive Information"

    The National Institute of Standards and Technology (NIST) has updated its draft guidelines for protecting sensitive unclassified information to help federal agencies and government contractors implement cybersecurity requirements more consistently. "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations" (NIST Special Publication [SP] 800-171 Revision 3) will be of particular interest to businesses with federal contracts. The SP 800-171 security requirements are referenced in federal rules governing the protection of Controlled Unclassified Information (CUI), which includes sensitive data such as health information, critical energy infrastructure information, and intellectual property. Systems that store CUI typically support government programs containing critical assets. The changes are intended to help organizations understand how to implement the specific cybersecurity safeguards outlined in a closely related NIST publication, SP 800-53 Rev. 5. The authors have aligned the terminology of the two documents so that organizations can more easily use SP 800-53's catalog of technical tools, or "controls," to achieve SP 800-171's cybersecurity outcomes. According to Ron Ross of NIST, the update is intended to help maintain consistent defenses against high-level information security threats. This article continues to discuss NIST's update of its draft guidelines for protecting sensitive unclassified information.

    NIST reports "NIST Revises SP 800-171 Guidelines for Protecting Sensitive Information"

  • news

    Visible to the public "CISA Releases White Paper Highlighting R&D Needs and Strategic Actions for Enhancing the Resilience of Critical Infrastructure"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has announced the release of the white paper titled "Research, Development, and Innovation for Enhancing Resilience of Cyber-physical Critical Infrastructure: Needs and Strategic Actions," which was developed by the Resilient Investment Planning and Development Working Group (RIPDWG). As stated in the paper, federal research is often sector-specific or interdisciplinary fragmented, making it difficult to effectively mitigate cross-cutting and systemic infrastructure risks. The paper aims to help the federal research enterprise capitalize on the opportunity to make congressionally-funded research more relevant, equitable, accessible, and useful to decision-makers who must address critical infrastructure challenges at the local and regional levels. The paper identifies three significant gaps that call for a more unified, empirical, and user-centered approach to federal Research, Development, and Innovation (RD&I). First, critical services that depend on cyber-physical infrastructure systems require an integrated analysis of the consequences and risk reduction decision factors. There needs to be an understanding of the societal dimensions of enhancing the resilience of cyber-physical infrastructure systems as well as user-engagement in cyber-physical infrastructure research to translate resilience knowledge into effective action. In order to fill the identified RD&I gaps, the paper proposes a dozen strategic actions for implementation by research partners across the federal interagency in collaboration with stakeholders. This article continues to discuss CISA's release of a white paper that highlights RD&I needs and strategic actions for making critical infrastructure more resilient.

    CISA reports "CISA Releases White Paper Highlighting R&D Needs and Strategic Actions for Enhancing the Resilience of Critical Infrastructure"

  • news

    Visible to the public "US Agencies and Allies Partner to Identify Russian Snake Malware Infrastructure Worldwide"

    In over 50 countries, the National Security Agency (NSA) and several partner agencies have identified infrastructure for the sophisticated Russian cyber espionage tool known as Snake malware. The agencies are publishing the joint Cybersecurity Advisory (CSA) "Hunting Russian Intelligence 'Snake' Malware" in order to help network defenders in detecting Snake and any associated activity. The agencies link Snake operations to a known unit within Russia's Federal Security Service (FSB) Center 16. Snake malware infrastructure has been discovered in North America, South America, Europe, Africa, Asia, and Australia, including the US and Russia. Rob Joyce, the NSA's Director of Cybersecurity, stated that Russian government actors have used this intelligence-gathering tool for years. The technical details will help many organizations in locating and eliminating malware worldwide. In the US, the FSB has targeted education institutions, small companies, and media organizations. The Snake malware is typically deployed on external-facing infrastructure nodes on a network. From there, it applies more techniques, tactics, and procedures (TTPs) to conduct additional exploitation operations on the internal network. This article continues to discuss the release of the CSA on the Snake malware.

    NSA reports "US Agencies and Allies Partner to Identify Russian Snake Malware Infrastructure Worldwide"

  • news

    Visible to the public "Mass Event Will Let Hackers Test Limits of AI Technology"

    As soon as ChatGPT was released, hackers began "jailbreaking" the Artificial Intelligence (AI) chatbot in an attempt to circumvent its safeguards so that it presents something irrational or offensive. Its creator, OpenAI, and other major AI providers, including Google and Microsoft, are collaborating with the Biden administration to allow thousands of hackers to test the limits of their technology. They are looking into how chatbots can be manipulated to cause harm, whether they share private information provided by users, and more. Anyone who has interacted with ChatGPT, Microsoft's Bing chatbot, or Google's Bard will soon discover that they have a propensity to fabricate information and confidently present it as fact. These systems, which are based on what are known as Large Language Models (LLMs), also imitate the cultural biases they have learned by being trained on vast troves of online text. US government officials were drawn to the concept of mass hacking in March at the South by Southwest festival in Austin, Texas, where Sven Cattell, founder of DEF CON's long-running AI Village, and Austin Carson, president of the responsible AI nonprofit SeedAI, led a workshop inviting community college students to hack an AI model. This article continues to discuss hackers testing the limits of AI technology.

    AP reports "Mass Event Will Let Hackers Test Limits of AI Technology"

  • news

    Visible to the public "CryptNet: Russian Ransom Gang Makes Its Debut"

    Cybersecurity researchers at ZeroFox have discovered a new ransomware gang on the dark web called CryptNet. They made the discovery on the dark web forum RAMP, where a threat actor advertised the new Ransomware-as-a-Service (RaaS) group. ZeroFox noted that CryptNet is advertised as quick and undetectable with various capabilities and features, including deleting shadow copies and disabling backup services. The group also offers offline encryption and a negotiation chat panel. ZeroFox suspects that CryptNet has already racked up some ransomware victims, with two victims having been identified at the end of April. CryptNet offers a 90 percent cut to anyone using its newly developed illegal software in a successful attack. This is one of the highest percentages seen on the RaaS market, with most affiliates receiving between 60 and 80 percent, according to ZeroFox, which added that CryptNet claimed it would also provide support during ransom negotiations. This article continues to discuss the new ransomware gang CryptNet.

    Cybernews reports "CryptNet: Russian Ransom Gang Makes Its Debut"

  • news

    Visible to the public "Department of Health Notification Regarding Decedent Information"

    The New Mexico Department of Health (DOH) recently started notifying the public, out of an abundance of caution, about an incident that could have compromised some information regarding decedent health information. On March 6, 2023, DOH discovered a spreadsheet containing information about individual deaths in New Mexico had been sent to a journalist requesting such information subject to the Inspection of Public Records Act. The spreadsheet contained some protected health information about every death in New Mexico from January 2020 through December 2021. The DOH noted that the information released did not include the names, birthdates, addresses, or contact information of anyone. As a result of this incident, DOH urges individuals to be alert for any financial or other activity done in the name of a recently deceased person in their family. The DOH noted that they are working to enhance policies and practices to elevate the protection of patient information in the future.

    New Mexico Department of Health reports: "Department of Health Notification Regarding Decedent Information"

  • news

    Visible to the public "Evil Digital Twins and Other Risks: The Use of Twins Opens up a Host of New Security Concerns"

    Digital twins, which are virtual representations of actual real-world objects, are becoming increasingly popular. Providing real-time models of physical assets, people, or biological systems that can help identify problems as they occur or in advance is just one of their many applications. However, experts warn that cybersecurity exposure increases as organizations expand their use of digital twins and others create new ones. Digital twins are vulnerable because they rely on data to accurately represent whatever they model. There are concerns that the data may be corrupted or stolen and used for malicious purposes rather than their intended function. According to technology experts and security leaders, digital twins are exposed to the same threats as conventional Information Technology (IT) and Operational Technology (OT) environments. Some emphasize that digital twins could create not only new entry points for these types of attacks but also present opportunities for new attack types, including what one security expert termed the "evil digital twin." This article continues to discuss concerns regarding the vulnerability of digital twins to threats.

    CSO Online reports "Evil Digital Twins and Other Risks: The Use of Twins Opens up a Host of New Security Concerns"