News Items

  • news

    Visible to the public "Ransomware Group Tries and Fails to Extort Security Vendor Dragos"

    A cybercrime group that managed to compromise the cloud-based resources of a cybersecurity vendor tried to extort the company by threatening family members, the company has revealed. Dragos said it was hit on May 8 after threat actors compromised the email account of a new sales employee prior to their start date. The company noted that the cybercrime group used the employee's personal information to impersonate them and complete some basic onboarding. This got them as far as access to the company SharePoint account and contract management system, but no further. However, after failing to deploy a ransomware payload or steal more sensitive information, the group apparently resorted to trying to extort Dragos executives to avoid public disclosure. The company stated that although no Dragos contact responded, the group repeatedly tried to up the pressure, contacting multiple publicly known Dragos employees and trying to use knowledge of family members to force a response. The cybercriminals' texts demonstrated research into family details as they knew the names of family members of Dragos executives. However, they referenced fictitious email addresses for these family members. The company noted that during this time, the cybercriminals also contacted senior Dragos employees via personal email. Dragos stated that once the hackers were identified via the vendor's security information and event management (SIEM) tool, it blocked the compromised account and activated third-party incident response and MDR. Security controls prevented any malicious actor lateral movement, privilege escalation, persistent access, or changes to the firm's infrastructure, Dragos said.

    Infosecurity reports: "Ransomware Group Tries and Fails to Extort Security Vendor Dragos"

  • news

    Visible to the public "Details Disclosed for Exploit Chain That Allows Hacking of Netgear Routers"

    Industrial and IoT cybersecurity firm Claroty recently disclosed the details of five vulnerabilities that can be chained in an exploit, potentially allowing threat actors to hack certain Netgear routers. The vulnerabilities were first presented at the 2022 Pwn2Own Toronto hacking competition, where white hat hackers earned a total of nearly $1 million for exploits targeting smartphones, printers, NAS devices, smart speakers, and routers. Claroty's router exploit, which targeted Netgear's Nighthawk RAX30 SOHO router, earned the company's researchers $2,500 at Pwn2Own. Claroty noted that the flaws used in the exploit chain are tracked as CVE-2023-27357, CVE-2023-27367, CVE-2023-27368, CVE-2023-27369, and CVE-2023-27370. They were all patched by Netgear with the release of firmware version 1.0.10.94 in early April. Claroty stated that three of the vulnerabilities have been rated "high severity," and their exploitation can lead to remote code execution, authentication bypass, and command injection. Chaining all the flaws can have a significant impact. Claroty noted that successful exploits could allow attackers to monitor users' internet activity, hijack internet connections and redirect traffic to malicious websites, or inject malware into network traffic. An attacker could also use these vulnerabilities to access and control networked smart devices (security cameras, thermostats, smart locks), change router settings, including credentials or DNS settings, or use a compromised network to launch attacks against other devices or networks. Claroty stated that one mitigating factor is that executing the exploit requires access to the LAN it's not a WAN attack that can be executed from the internet, which is why it earned a smaller reward at Pwn2Own. Netgear explained in an advisory that these vulnerabilities require an attacker to have your WiFi password or an Ethernet connection to your network to be exploited.

    SecurityWeek reports: "Details Disclosed for Exploit Chain That Allows Hacking of Netgear Routers"

  • news

    Visible to the public "Bad Bots Now Account For 30% of All Internet Traffic"

    Security researchers at Imperva have discovered that the volume of internet traffic stemming from malicious automated software has increased by 2.5% since 2021 to over 30%, the highest figure since Imperva's first Bad Bot Report in 2013. The researchers noted that billions of dollars are lost annually due to bad bot attacks, which can lead to account compromise, data theft, spam, higher infrastructure and support costs, customer churn, and degraded online services. The researchers warned that such traffic is increasingly hard to identify, with "advanced" bad bots now accounting for 51% of all malicious traffic versus 26% two years ago. The researchers noted that more sophisticated software looks to mimic human behavior to evade detection, such as by cycling through random IPs, entering through anonymous proxies, and changing identities. The researchers stated that account takeover (ATO) attacks are among the most common traced back to malicious bots, growing 155% in volume in 2022 as cybercriminals looked to drive credential stuffing and brute force attacks. Some 15% of all login attempts last year were classified as ATO. APIs were also a popular target for bad bots last year, and 17% of all attacks on APIs came from malicious software exploiting flaws in the design and implementation of an API or application to steal sensitive data or access accounts. The researchers noted that more than half of the countries analyzed for the Imperva report had bad bot levels exceeding the global average, with Germany (69%), Ireland (45%), and Singapore (43%) in the top three. In the US, the share was just above the average, at 32%. Travel (25%), retail (21%), and financial services (13%) experienced the highest volume of bad bot attacks, although the gaming (59%) and telecoms (48%) sectors had the highest share of bad bot traffic on their websites and applications.

    Infosecurity reports: "Bad Bots Now Account For 30% of All Internet Traffic"

  • news

    Visible to the public "Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems"

    Threat actors are taking advantage of the leak of Babuk, also known as Babak or Babyk, ransomware code in September 2021 to build different ransomware families that can target VMware ESXi systems. Alex Delamotte, a security researcher at SentinelOne, noted that the emergence of these variants in the second quarter of 2022 and the first quarter of 2023 shows a growing trend of Babuk source code adoption. Leaked source code allows malicious actors to target Linux systems when they may otherwise lack the expertise to develop a working program. As a result, several large and small cybercrime groups have set their sights on ESXi hypervisors. At least three different ransomware strains, including Cylance, Rorschach, and RTM Locker, that have emerged since the start of the year are based on the leaked Babuk source code. The most recent analysis by SentinelOne indicates that this phenomenon is becoming more prevalent, with the cybersecurity company identifying source code overlaps between Babuk and ESXi lockers attributed to Conti and REvil. Other ransomware families that have adopted features from Babuk include LOCK4, DATAF, Mario, and Play ransomware. This article continues to discuss the leaked Babuk ransomware code sparking different ransomware strains that target VMware ESXi systems.

    THN reports "Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems"

  • news

    Visible to the public "RapperBot DDoS Malware Adds Cryptojacking as New Revenue Stream"

    New samples of the RapperBot botnet malware now include cryptojacking capabilities for cryptocurrency mining on compromised Intel x64 machines. Developers added the cryptomining component separately from the botnet malware at first. At the end of January, the botnet and cryptocurrency mining capabilities were merged. Since June 2022, researchers at Fortinet's FortiGuard Labs have been monitoring RapperBot activity and have reported that the Mirai-based botnet focused on brute-forcing Linux SSH servers to recruit them for launching Distributed Denial-of-Service (DDoS) attacks. In November, the researchers discovered an updated version of RapperBot that used a Telnet self-propagation mechanism and contained Denial-of-Service (DoS) commands for attacks against gaming servers. FortiGuard Labs recently reported an updated RapperBot variant that uses the XMRig Monero miner on Intel x64 architectures. According to the cybersecurity company, this campaign has been active since January and primarily targets Internet of Things (IoT) devices. This article continues to discuss the new RapperBot mining campaign.

    Bleeping Computer reports "RapperBot DDoS Malware Adds Cryptojacking as New Revenue Stream"

  • news

    Visible to the public "Automotive Industry Employees Unaware of Data Security Risks"

    According to Salesforce, 30 percent of automotive employees do not check security protocols before attempting to use a new tool, thus putting their company and customer data at risk. As companies store and use exponentially more data to power connected car features, concerns regarding cybersecurity grows in the automotive industry. According to Upstream, the number of automotive Application Programming Interface (API) attacks increased by 380 percent last year alone. In addition, 34 percent of automotive employees who participated in Salesforce's survey reported that their company now faces more security threats than it did two years ago. Salesforce's research explores the impacts of gaps between company security efforts and employee actions, revealing the need for automotive organizations to equip employees with trusted, simple-to-use technologies. This article continues to discuss automotive industry employees being unaware of data security risks, the rise in automotive API attacks, automotive employees taking risks with personal devices at work, and data security in the automotive industry.

    Help Net Security reports "Automotive Industry Employees Unaware of Data Security Risks"

  • news

    Visible to the public "Free Tool Unlocks Some Encrypted Data in Ransomware Attacks"

    Researchers at Cyberark have released a free tool on GitHub that can help victims of intermittent encryption attacks recover data from some types of partially encrypted files, without having to pay a ransom for the decryption key. Intermittent encryption is where a ransomware operator only partially encrypts targeted files, instead of the entire file, to speed up encryption, impact more files, and make detection harder. In recent months, several ransomware groups, including BlackCat and Play, have used the approach in attacks on many organizations, which included hospitals, banks, and universities. According to Cyberark, for such victims, data in some types of partially encrypted files can be decrypted given the right circumstances because many file formats, including PDF and formats that Microsoft Office adhere to, contain certain common parameters, which, even if encrypted, can be reconstructed relatively easily to make data recovery possible. Cyberark created a tool called "White Phoenix" that automates recovering data from intermittently encrypted documents in various file formats. This article continues to discuss the White Phoenix automated tool for recovering data on partially encrypted files hit with ransomware.

    Dark Reading reports "Free Tool Unlocks Some Encrypted Data in Ransomware Attacks"

  • news

    Visible to the public "Wendy’s to Test AI Chatbot at Ohio Drive-Thru"

    Wendy's is teaming up with Google to add artificial intelligence to its menu. Wendy's plans to launch an AI chatbot to automate its restaurants' drive-thrus. Dubbed FreshAI, the AI tech will hold limited conversations with customers, handling their food orders and answering frequently asked questions. The bot will integrate with the store's hardware and cash register systems for processing orders. The burger chain, founded in Columbus in 1969, is using Google to power FreshAI with its existing cloud-based generative AI and large language models. The language models include the restaurant's menu as data and will allow the drive-thru chatbot to understand complex, customized, or indirect orders, as well as discern between a customer's voice and background noise. Wendy's will test FreshAI at one of its corporate-owned Columbus storefronts in June, though it did not specify which one. It also did not mention if the chatbot would ultimately result in fewer workers at restaurant locations. Google had first partnered with Wendy's in 2021 when the two companies announced they would work together to improve customer experiences with analytics and machine learning.

    The Hill reports: "Wendy's to Test AI Chatbot at Ohio Drive-Thru"

  • news

    Visible to the public "Twitter Celebrity Hacker Pleads Guilty in US"

    A British man recently pleaded guilty for his role in schemes to hack the Twitter accounts of celebrities like Barack Obama and Elon Musk and stealing $794,000 in cryptocurrency. Joseph James O'Connor, 23, entered his guilty plea in a New York court after being extradited from Spain on April 26. He was arrested nearly two years ago in Spain for the July 2020 hack of over 130 Twitter accounts, including those of Apple, Uber, Kanye West, Bill Gates, Joe Biden, Obama, and Musk. He and others in his hacking group hijacked the accounts and asked the owners' followers to send them Bitcoin, promising to double their money. In 2019 the group also used a technique known as sim card swaps to break their way into social media accounts of two media stars, not named in court filings but named in press reports as TikTok star Addison Rae and actress Bella Thorne. The group threatened to release their private images and other information. The group also used the same technique to steal $794,000 of virtual currency from a New York cryptocurrency company. O'Connor, who went by the online name of PlugwalkJoe, pleaded guilty to multiple counts of computer intrusion, extortion, stalking, wire fraud, and money laundering. The most serious of the charges brings up to 20 years in prison.

    SecurityWeek reports: "Twitter Celebrity Hacker Pleads Guilty in US"

  • news

    Visible to the public "Capita Says Ransomware Attack Will Cost It Up to $25 Million"

    UK-based business process outsourcing and professional services company Capita recently announced that it expects to incur costs ranging between roughly $19 million and $25 million due to a recent cybersecurity incident, but it has not clarified whether that includes a ransom payment to the hackers. The breach came to light on March 31, when Capita said it was experiencing a major IT incident that had been causing disruptions, but it took until April 3 for the company to confirm that the cause was a cyberattack. Capita initially said there was no evidence of customer or other information getting compromised but confirmed that files were stolen from its systems on April 20, days after a ransomware group named Black Basta started leaking information allegedly stolen from the company. The leaked files stored personal and financial information. In its latest update on the cybersecurity incident, the company said it determined that data was stolen from less than 0.1% of its server estate, it previously said that 4% of its servers were impacted. Capita is one of the largest business outsourcing providers in the UK, and its services are used by the government.

    SecurityWeek reports: "Capita Says Ransomware Attack Will Cost It Up to $25 Million"

  • news

    Visible to the public "Spanish Police Arrest 40 in Phishing Gang Bust"

    Spanish police have recently arrested dozens of individuals on suspicion of their involvement in a serious organized crime gang said to have made over $767,000 from phishing victims. Among the 40 apprehended by law enforcers were two hackers and 15 suspected members of the "Trinitarios" group, who were charged with belonging to a criminal organization, bank fraud, document forgery, identity theft, and money laundering. The group was allegedly funded mainly through phishing and bank fraud, used to buy drugs and weapons, pay lawyers' fees for members in prison, and sent directly to members behind bars. Spanish police stated that the alleged hackers would send SMS phishing messages to victims purporting to come from their bank, alleging a security issue that required them to click on a malicious link. Following the link took the victim to a spoofed banking log-in page where they entered their logins. The hackers monitored these actions in real-time via phishing panels and immediately used the logins to access the real accounts, requesting loans and linking the cards to virtual wallets on their phones. The police noted that the cybercriminals would then purchase cryptocurrency with these card details, which was apparently exchanged with fiat currency and put into a "common box" for later use. The group also monetized the hijacked bank details by directing an extensive money mule network to "cash out" at ATMs or receive funds via bank transfer and additionally made false purchases through fictitious online cosmetics companies via point-of-sale (POS) terminals. The police stated that some of the funds were sent abroad and were even used to purchase real estate in the Dominican Republic. During the operation, 13 house searches were conducted in Madrid, Seville, and Guadalajara, where a list of 300,000 phishing victims was discovered, along with 5000 Euros in cash, computer equipment, and devices for picking locks.


    Infosecurity reports: "Spanish Police Arrest 40 in Phishing Gang Bust"

  • news

    Visible to the public "Ransomware Encryption Rates Reach New Heights"

    According to security researchers at Sophos, the share of ransomware victims whose data was encrypted by their extorters grew to 76% over the past year. In a new study, the researchers conducted interviews with 3000 cybersecurity/IT leaders carried out in the first quarter of 2023. Responding organizations were located in 14 countries and had between 100 and 5000 employees, with revenue ranging from less than $10m to more than $5bn. The researchers noted that the encryption rate in 2022 is the highest since tracking began in 2020 when it was 73%. The researchers claimed this is evidence of an "ever-increasing skill level of adversaries who continue to innovate and refine their approaches." The researchers noted that only the IT, technology, and telecoms sector managed to buck the trend, with an encryption rate of just 47%. In just under a third (30%) of cases where data was encrypted, it was also stolen in double extortion attacks. However, only in 3% of cases were victims held to ransom without data being encrypted. The researchers stated that interestingly, those who choose to pay their extorters double recovery costs: from an average of $375,000 for those who use backups to $750,000. They also run the risk of extending recovery times: 45% of organizations using backups recovered within a week versus 39% of those that paid the ransom. Around half (46%) of victims that had data encrypted elected to pay a ransom, rising to over half for higher-wealth businesses more likely to have standalone cyber-insurance policies.

    Infosecurity reports: "Ransomware Encryption Rates Reach New Heights"

  • news

    Visible to the public "IBM Unveils End-To-End, Quantum-Safe Tools to Secure Business, Government Data"

    IBM has introduced a new set of quantum-safe, end-to-end security tools and capabilities designed to protect organizations and government agencies as we enter the post-quantum computing era. Quantum-Safe technology, as announced at the company's annual Think conference in Orlando, Florida, integrates cryptography and critical infrastructure expertise to address the potential future security risks posed by quantum computing. IBM also introduced the Quantum-Safe Roadmap to help industries transition to post-quantum cryptography. Experts and scientists predict that quantum computers will one day be able to break commonly used encryption methods, exposing email, secure banking, cryptocurrencies, and communications systems to significant cybersecurity threats. Organizations, technology providers, and Internet standards will be required to adopt quantum-safe encryption. The National Institute of Standards and Technology (NIST) has launched a competition to identify and standardize quantum-safe encryption algorithms. NATO has already begun testing quantum-safe solutions to investigate the feasibility and practicality of such technology for real-world applications. In addition, the National Security Agency (NSA) announced new requirements for national security systems to transition to quantum-safe algorithms by 2025, and the White House issued requirements for federal agencies to submit a cryptographic inventory of systems that may be vulnerable to attacks from cryptographically-relevant quantum computers. This article continues to discuss IBM's new set of tools and capabilities designed as an end-to-end, quantum-safe solution as well as the roadmap.

    CSO Online reports "IBM Unveils End-To-End, Quantum-Safe Tools to Secure Business, Government Data"

  • news

    Visible to the public "New 'Greatness' Service Simplifies Microsoft 365 Phishing Attacks"

    The Phishing-as-a-Service (PhaaS) platform called 'Greatness' has increased activity as it targets organizations using Microsoft 365 in the US, Canada, the UK, Australia, and South Africa. Many organizations use the Microsoft 365 cloud-based productivity platform, making it an attractive target for cybercriminals seeking to steal data or credentials for use in network breaches. In a new report by Cisco Talos, researchers detail how the Greatness phishing platform launched in the middle of 2022, with activity spiking in December 2022 and March 2023. Many victims work in manufacturing, healthcare, technology, education, real estate, construction, finance, and business services, with most being located in the US. The Greatness PhaaS includes everything a phisher requires to conduct a successful campaign. To initiate an attack, the user accesses the 'Greatness' administration panel with their Application Programming Interface (API) key and a list of target email addresses. The PhaaS platform provides the server that will host the phishing page and the HTML attachment generator. The affiliate then creates the email's content and provides any additional content or adjustments to the default settings. The service then sends the victims a phishing email with an HTML attachment. When this attachment is opened, the browser executes obfuscated JavaScript code to connect to the Greatness server and retrieve the malicious page to display to the user. The phishing service will inject the target's company logo and background image from the employer's Microsoft 365 login page. This article continues to discuss findings and observations regarding the Greatness PhaaS.

    Bleeping Computer reports "New 'Greatness' Service Simplifies Microsoft 365 Phishing Attacks"

  • news

    Visible to the public "Never Leak Secrets to Your GitHub Repositories Again"

    Push protection, a security feature designed to automatically prevent the leakage of secrets to repositories, is now free for all public repository owners on GitHub. Previously, only private repositories with a GitHub Advanced Security license had access to this feature. This expanded availability is intended to help open-source developers and maintainers in proactively securing their code. Credential leakage is one of the most prevalent causes of data breaches in today's digital landscape, fueled in part by the common developer practice of embedding sensitive information, such as passwords, encryption keys, and Application Programming Interface (API) keys, directly within the source code. Whether this occurs due to oversight, negligence, or a lack of cognizance of security best practices, the outcome is the same as threat actors can discover and exploit the secrets. Push protection prevents the leakage of secrets by scanning code commits before they are pushed. In their Integrated Development Environment (IDE) or Command Line Interface (CLI), developers are notified immediately. This article continues to discuss the prevention of leaking secrets with GitHub push protection.

    Help Net Security reports "Never Leak Secrets to Your GitHub Repositories Again"

  • news

    Visible to the public "Operation ChattyGoblin: Hackers Targeting Gambling Firms via Chat Apps"

    In a campaign that has been ongoing since October 2021, a China-aligned threat actor has targeted a gambling company in the Philippines. The cybersecurity company ESET is tracking the attacks against Southeast Asian gambling companies under the name Operation ChattyGoblin. According to ESET, these attacks target the support agents of victim companies via chat applications, specifically the Comm100 and LiveHelp100 apps. CrowdStrike first documented the use of a Trojanized Comm100 installer to deliver malware in October 2022. The company attributed the supply chain compromise to a potentially China-linked threat actor. The attack chains use the chat applications to deliver a C# dropper, which in turn deploys a second C# executable that ultimately serves as a conduit to drop a Cobalt Strike beacon on compromised workstations. Also highlighted in ESET's APT Activity Report Q4 2022-Q1 2023 are attacks against South Asian government institutions by threat actors Donot Team and SideWinder with ties to India. This article continues to discuss researchers' findings regarding Operation ChattyGoblin.

    THN reports "Operation ChattyGoblin: Hackers Targeting Gambling Firms via Chat Apps"

  • news

    Visible to the public "Npm Packages Vulnerable to Old-School Weapon: the 'Shift' Key"

    Since 2017, hackers have been able to imitate legitimate Node Package Manager (npm) packages by removing the capital letters from their titles. According to Checkmarx, npm did not address this type of typosquatting for years, which could have resulted in enterprises downloading malware inadvertently. The registry recently patched the vulnerability, but organizations should be aware of any malicious packages they may have downloaded prior to the update. Cybercriminals engage in typosquatting when they intentionally but subtly misspell names in copying legitimate Web domains. For example, a hacker might use an uppercase "I" instead of a lowercase "l" in the word "Google," or substitute zeros for the two "o"s. To combat typosquatting in its registry, npm announced a change to its naming system on December 26, 2017. After then, package names could only contain lowercase letters. However, all the thousands of existing packages with capital letters in their titles remained, and no mechanism was implemented to prevent new packages from duplicating them in all but capitalization. This article continues to discuss the typosquatting techniques hackers have used to trick enterprises into downloading malware.

    Dark Reading reports "Npm Packages Vulnerable to Old-School Weapon: the 'Shift' Key"

  • news

    Visible to the public "Cybersecurity Goes Undercover to Protect Electric Grid Data"

    Based on one of the mysteries of human perception known as synesthesia, a researcher at the Oak Ridge National Laboratory (ORNL) developed a new method to hide sensitive electric grid information from malicious actors in a cyberattack. This method involves a palette of colors that is constantly changing. The Grid Communications and Security group leader at ORNL, Peter Fuhr, was intrigued by synesthesia, a condition that causes some people to experience one sense through another, such as perceiving sounds as colors. Fuhr used this idea to encrypt the "language" of grid management software into colors. Utilities use a computer system to gather and analyze real-time data to monitor and control equipment. This system communicates with hardware using strings of letters, which can be translated into color combinations represented as bars, wheels, or swirls. The color patterns are then faded under another image, such as a colorful pointillist painting, or hidden between video feed frames. With each sensor reading, the decoding key rotates. According to Fuhr, this innovative approach has already gained attention from private companies interested in licensing. Using a secure link between ORNL and the public utility EPB of Chattanooga, the concept was tested for six months. The encoded colors are transferred via communication links among video cameras at EPB's electrical substations. This article continues to discuss the new synesthesia-inspired way to hide sensitive electric grid information from cyberattacks.

    Oak Ridge National Laboratory reports "Cybersecurity Goes Undercover to Protect Electric Grid Data"

  • news

    Visible to the public "Research Shows Mobile Phone Users Do Not Understand What Data They Might Be Sharing"

    New research from the School of Management at the University of Bath reveals that privacy and security features designed to give consumers greater control over the sharing of their data by smartphone apps are widely misunderstood. For example, 43 percent of participants in the study were unclear or confused about the meaning of app tracking. People often misunderstand the purpose of tracking, believing that it is integral to the app's functionality or will enhance the user experience. Companies use app tracking to deliver targeted advertisements to smartphone users. When iPhone users open an app, a pop-up asks their permission to allow the app company to track their activity across other apps, as introduced by Apple's App Tracking Transparency framework in April 2021. Android users access tracking consent through their phone's settings. If people opt out of tracking, the company cannot track their use of apps and websites on their device, nor can the data be used for targeted advertising or shared with data brokers. The most prevalent misunderstanding was that tracking refers to sharing the device's physical location instead of tracking the use of apps and websites. People believed they had to consent to tracking for food delivery and collection services because they thought their location was essential to the app's functionality. While slightly more than half of participants (51 percent) expressed concerns about privacy or security, including the security of their data after it had been collected, the analysis revealed no association between their concern for privacy in their daily lives and a lower rate of tracking acceptance. This article continues to discuss the study on user motivations behind app tracking transparency decisions.

    The University of Bath reports "Research Shows Mobile Phone Users Do Not Understand What Data They Might Be Sharing"

  • news

    Visible to the public "Microsoft Authenticator Mandates Number Matching to Counter MFA Fatigue Attacks"

    In order to make multi-factor authentication (MFA) less susceptible to social engineering attacks, Microsoft Authenticator will now require number matching for all push notifications. The use of MFA fatigue attacks by cybercriminals has proven effective. These attacks involve sending a barrage of MFA push notification requests to employees, usually at unsociable hours, to manipulate them into authenticating a login attempt to clear the notifications. To authorize the login attempt, number matching requires opening a push notification, launching Microsoft Authenticator, and entering a series of numbers that appear in the app. This technique has existed for years and combines MFA and two-factor authentication (2FA). These numbers typically reset after a predetermined amount of time, such as 30 seconds, and add an extra layer of interaction to reduce the risk of successful social engineering attacks. In a typical attack scenario, the recipients of the constant notifications are often asleep and awakened by loud smartphone alerts. The attack is successful if the individual hurries to approve the login attempts. Adding this layer makes the process more manual, giving the recipient more time to recognize that a malicious actor is triggering the event. This article continues to discuss the Microsoft Authenticator adding another layer of complexity to prevent social engineering attacks.

    ITPro reports "Microsoft Authenticator Mandates Number Matching to Counter MFA Fatigue Attacks"

  • news

    Visible to the public "Data Breaches and Exfiltrated Data From Fortune 1000 Companies Rise by 7%"

    According to a new report from the cybercrime analytics company SpyCloud, the amount of data breaches and exfiltrated data from Fortune 1000 companies on the dark web has increased by 7 percent year-over-year. As a result, organizations are at more risk of account takeover, session hijacking, fraud, and ransomware. The 2023 Fortune 1000 Identity Exposure Report examined the dark web exposure of Fortune 1000 employees in 21 industries, including technology, financial services, retail, and media. Researchers at SpyCloud found 27.48 million pairs of credentials containing the email addresses of Fortune 1000 companies and plaintext passwords, with over 223,000 exfiltrated by malware. The discovered passwords facilitated access to over 56,000 cloud-based applications, including leading enterprise email, single sign-on, payroll management, hosting, and collaboration tools. Researchers also found that 62 percent of Fortune 1000 employees who have been exposed multiple times reuse their passwords. In addition, 1.87 billion malware cookie records associated with Fortune 1000 employees were found, most of which are believed to have been exfiltrated by malware. This article continues to discuss key findings from the 2023 Fortune 1000 Identity Exposure Report.

    SiliconANGLE reports "Data Breaches and Exfiltrated Data From Fortune 1000 Companies Rise by 7%"

  • news

    Visible to the public "Business Leaders Don't Understand Cybersecurity"

    Delinea's new survey of over 2,000 Information Technology (IT) security decision-makers reveals that only 39 percent of respondents believe their company's leadership has a solid grasp of cybersecurity's role as a business enabler. In addition, more than one-third of respondents (36 percent) believe that cybersecurity is viewed as important only in regard to compliance and regulatory requirements, while 17 percent say it is not a business priority. This misalignment between business and security goals appears to have resulted in at least one negative consequence for 89 percent of respondents' organizations, with more than a quarter (26 percent) reporting an increase in the number of successful cyberattacks against their organization. Misaligned cybersecurity objectives have caused delays in investments (35 percent), delays in strategic decision-making (34 percent), and unnecessary increases in spending (27 percent). There are also consequences for individuals, with 31 percent of respondents reporting a stress-related impact on security teams. This article continues to discuss key findings from the survey of IT security decision-makers.

    BetaNews reports "Business Leaders Don't Understand Cybersecurity"

  • news

    Visible to the public "Adobe Patches 14 Vulnerabilities in Substance 3D Painter"

    Adobe recently announced security updates for its Substance 3D Painter product to address more than a dozen vulnerabilities. This is the only product for which the software giant released updates this Patch Tuesday. Adobe stated that the 3D painting software, specifically version 8.3.0 and earlier, is impacted by 14 vulnerabilities. A vast majority are high-severity ("critical" based on Adobe's severity ratings) memory-related vulnerabilities that can be exploited for arbitrary code execution in the context of the targeted user. Some of the less severe issues can result in memory leaks. Adobe noted that there is no indication that these flaws have been exploited in the wild. All of the vulnerabilities were reported to Adobe by researcher Mat Powell through Trend Micro's Zero Day Initiative (ZDI). Adobe is running a private, invite-only bug bounty program on HackerOne, but researchers interested in helping the company find vulnerabilities in its products can contact Adobe's security team and provide their HackerOne handle.

    SecurityWeek reports: "Adobe Patches 14 Vulnerabilities in Substance 3D Painter"

  • news

    Visible to the public "CISA, FBI Need Data from Cybercrime Victims to Support Policy"

    Federal entities at the forefront of policing cybercrime and ransomware in the US urge organizations to continue reporting cyber incidents to help fill data gaps. Recent executive actions call for a stricter approach to penalizing ransomware incidents. Leaders from the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and FBI spoke at a recent George Washington University Business and Policy Forum about ongoing government initiatives to continue countering and preventing zero-day cyber incidents. CISA's CSO Valerie M. Cofield and the FBI's Cyber Division Section Chief David Ring discussed a data gap in the larger picture of the current cyber threat landscape and how sharing incident information contributes to the national security goal of strengthening digital networks. Ring reiterated that victim reporting is crucial and that federal agencies overseeing cybercrime in the US still have much work to do to close the gap regarding what is reported, what is actually seen, and what is occurring in the wild. The Cyber Incident Reporting for Critical Infrastructure Act, which became law in 2022, offers promise for CISA and the FBI's efforts. This legislation requires public and private sector entities to report any cyber incident. Cofield commented that while this is a step in the right direction, collecting the necessary data may take several years following the bill's passage. This article continues to discuss the importance of collaboration and data sharing to protect US digital networks.

    NextGov reports "CISA, FBI Need Data from Cybercrime Victims to Support Policy"

  • news

    Visible to the public "$1.1M Paid to Resolve Ransomware Attack on California County"

    Southern California News Group reported that a $1.1 million payment was made to resolve a ransomware attack on a California county's law enforcement computer network. The San Bernardino County Sheriff's Department announced in April that a "network disruption" was being investigated by information technology staff and forensic specialists and that the FBI and Department of Homeland Security were notified. County spokesperson David Wert said the county paid $511,852, and the remainder was covered by insurance. Wert said that the decision to render payment was the subject of careful consideration. Sheriff's Department spokesperson Gloria Huerta said an investigation is continuing to try to determine whether any information was stolen and whether the ransom payment can be traced to identify the hacker.

    SecurityWeek reports: "$1.1M Paid to Resolve Ransomware Attack on California County"

  • news

    Visible to the public "Kremlin-Linked 'Snake' Espionage Malware Eliminated, Justice Department Says"

    US and international law enforcement agencies have announced the successful dismantling of a malware implant used by a Kremlin-sponsored hacking group. The US Justice Department (DOJ) obtained court authorization that permitted US law enforcement to wipe out the malicious code used by Turla called "Snake." Turla has a long history of ties to the Russian Federal Security Service (FSB). Snake has been assessed to be their premier espionage weapon, according to a senior FBI official, who added that it had been deployed against NATO countries and others to steal sensitive US information. According to the official, the initiative, dubbed "Operation Medusa," has denied the Moscow-backed group of a resource upon which it has relied for 20 years. In an affidavit released alongside the announcement, the bureau determined that the FSB compromised hundreds of computers in at least 50 countries using the Snake malware package. This article continues to discuss the elimination of the Kremlin-linked Snake espionage malware.

    The Record reports "Kremlin-Linked 'Snake' Espionage Malware Eliminated, Justice Department Says"

  • news

    Visible to the public "AndoryuBot DDoS Botnet Exploiting Ruckus AP Vulnerability"

    Owners of Ruckus access points (APs) have been warned by Fortinet that a DDoS botnet named AndoryuBot has been exploiting a recently patched vulnerability to hack devices. The vulnerability in question is tracked as CVE-2023-25717, and it was patched by Ruckus in February in many of its wireless APs. The vulnerability allows a remote, unauthenticated attacker to execute arbitrary code and take complete control of a targeted Ruckus device. Technical details have been available since February, and cybersecurity firm Fortinet started seeing attacks exploiting the vulnerability in late April. The company issued a warning on April 28 about CVE-2023-25717 being exploited, and on Monday, it revealed that a spike in exploitation is driven by the AndoryuBot botnet. The company stated that AndoryuBot emerged in February 2023, and it's designed to abuse compromised devices to launch various types of DDoS attacks. The vulnerability is exploited to gain access to Ruckus APs. A script is then downloaded to the compromised device for propagation to other devices. Fortinet noted that once a target device is compromised, AndoryuBot quickly spreads and begins communicating with its C2 server via the SOCKS protocol. In a very short time, it is updated with additional DDoS methods and awaits attack commands. The company noted that prices for DDoS attacks using the AndoryuBot botnet are listed on a Telegram channel, and threat actors can cause disruption even with limited financial resources. Fortinet has made available indicators of compromise (IoCs) and other technical details that can be useful to defenders.

    SecurityWeek reports: "AndoryuBot DDoS Botnet Exploiting Ruckus AP Vulnerability"

  • news

    Visible to the public "Royal Ransomware Gang Quickly Expands Reign"

    The Royal ransomware group has become more active this year, targeting critical infrastructure organizations with various tools. Based on the group's leak site, Palo Alto Networks' Unit 42 reports that it has affected 157 organizations since its inception last year. Royal ransomware has affected different industries, including both small and large businesses. According to information from their leak site and public reporting agencies, the Royal ransomware has impacted manufacturing and more. The group has been observed using multiple initial access vectors, including callback phishing, Search Engine Optimization (SEO) poisoning, exposed Remote Desktop Protocol (RDP) accounts, and compromised credentials, to gain access to vulnerable systems. After securing access, the group uses multiple tools to support the intrusion operation, such as the TCP/UDP tunnel Chisel and the Active Directory query tool AdFind. Royal has compromised victims via a BATLOADER infection. BATLOADER will download additional payloads, such as VidarStealer, Ursnif/ISFB, and Redline Stealer, as well as legitimate system management and Remote Monitoring and Management (RMM) tools. Researchers have observed Royal operators using PowerTool, a piece of software with access to the kernel that is ideal for removing endpoint security software. This article continues to discuss researchers' findings and observations regarding the Royal ransomware gang.

    SC Media reports "Royal Ransomware Gang Quickly Expands Reign"

  • news

    Visible to the public "85K+ MS Exchange Servers Remain Vulnerable to Severe RCE Bugs"

    According to researchers at Cybernews, months after Microsoft urged organizations to update their software to address Exchange server vulnerabilities, over 85,000 servers remain vulnerable to attack. Russia-linked malicious actors have exploited similar vulnerabilities to conduct large-scale attacks against government agencies. Microsoft discovered new vulnerabilities in Microsoft Exchange on February 14 and called on software users to patch them by installing the most recent security updates. The Remote Code Execution (RCE) vulnerabilities, tracked as CVE-2023-21529, CVE-2023-21706, and CVE-2023-21707, can allow attackers to execute malicious code and access other users' private emails and inboxes. The only requirement for an adversary to access the server is to have a Microsoft Exchange account, which is not difficult, as it can be done by malicious employees, students, or other users. Threat actors could also attempt to conduct a phishing attack on a single user and, if successful, gain access to the organization's email system. Although gaining access to confidential and private information is the primary concern, the vulnerabilities could also be exploited for initial network access to launch ransomware or extract sensitive data from other servers on the same network. This article continues to discuss over 85,000 Microsoft Exchange servers still being vulnerable to RCE flaws.

    Cybernews reports "85K+ MS Exchange Servers Remain Vulnerable to Severe RCE Bugs"

  • news

    Visible to the public "Microsoft: Iranian APTs Exploiting Recent PaperCut Vulnerability"

    Microsoft recently warned that more threat actors have started targeting a recently patched vulnerability in PaperCut MF/NG print management solutions, including Iranian state-sponsored groups. The critical flaw tracked as CVE-2023-27350 (CVSS score of 9.8) and patched in March 2023 could allow remote, unauthenticated attackers to bypass authentication and execute arbitrary code with the privileges of the System user. In late April, PaperCut urged customers to update their installations as soon as possible. A few days later, Microsoft reported that it had seen a Cl0p ransomware operator affiliated with the FIN11 and TA505 Russian groups exploiting the vulnerability for weeks. Now, Microsoft warns that Iranian state-sponsored threat actors Mint Sandstorm and Mango Sandstorm have adopted publicly available proof-of-concept (PoC) code exploiting the bug and are targeting unpatched PaperCut installations in attacks. For now, Microsoft stated that Mint Sandstorm activity targeting CVE-2023-27350 appears opportunistic, while Mango Sandstorm's exploitation of the flaw remains low. Microsoft noted that as more threat actors begin to use this vulnerability in their attacks, organizations are strongly urged to prioritize applying the updates provided by PaperCut to reduce their attack surface. Also tracked as Ajax Security Team, Charming Kitten, APT35, Magic Hound, NewsBeef, Newscaster, Phosphorus, and TA453, Mint Sandstorm has been active since at least 2011, targeting governments, critical infrastructure, activists, journalists, and other entities.

    SecurityWeek reports: "Microsoft: Iranian APTs Exploiting Recent PaperCut Vulnerability"

  • news

    Visible to the public "CISOs Worried About Personal Liability For Breaches"

    According to security researchers at Proofpoint, over three-fifths (62%) of global CISOs are concerned about being held personally liable for successful cyberattacks that occur on their watch, and a similar share would not join an organization that fails to offer insurance to protect them. The researchers polled 1600 CISOs from organizations of 200 employees or more across different industries in 16 countries. The researchers found that CISOs in sectors with high volumes of sensitive data and/or heavy regulation, such as retail (69%), financial services (65%), and manufacturing (65%), are most likely to demand insurance coverage. The researchers noted that a combination of high-stress working environments, shrinking budgets, and personal liability could be harming CISOs' quality of life. Some 60% told the researchers that they've experienced burnout in the past 12 months. CISOs are most likely to experience burnout in the retail (72%) and IT, technology, and telecoms (66%) industries. The researchers stated that nearly two-thirds (63%) of respondents said they have had to deal with the loss of sensitive information in the past year, with a similar number (61%) claiming their organization would not be able to cope with a targeted attack. Email fraud (33%), insider threats (30%), cloud account compromise (29%), and DDoS attacks (29%) topped the list of concerns.

    Infosecurity reports: "CISOs Worried About Personal Liability For Breaches"

  • news

    Visible to the public "Researchers Uncover SideWinder's Latest Server-Based Polymorphism Technique"

    As part of a campaign that began in late November 2022, the Advanced Persistent Threat (APT) actor known as SideWinder has been using a backdoor in attacks against Pakistani government organizations. According to the BlackBerry Research and Intelligence Team, the SideWinder APT group used a server-based polymorphism method to deliver the next stage payload. Another campaign discovered by the company in March 2023 shows that Turkey has also become a priority for the threat actor. SideWinder has been on the radar since at least 2012, and it is primarily known to target Southeast Asian organizations in Pakistan, Afghanistan, Bhutan, China, Myanmar, Nepal, and Sri Lanka. The group is also tracked under the names APT-C-17, APT-Q-39, Hardcore Nationalist (HN2), Rattlesnake, Razor Tiger, and T-APT4. It is believed to be an Indian state-sponsored group. In the past year, SideWinder has been linked to a cyberattack against the Pakistan Navy War College (PNWC) and an Android malware campaign that harvested sensitive information using rogue phone cleaner and Virtual Private Network (VPN) apps uploaded to the Google Play Store. What distinguishes this campaign is the threat actor's use of server-based polymorphism to circumvent traditional signature-based antivirus detection and spread additional payloads by responding with two variants of an intermediate RTF file. This article continues to discuss findings regarding SideWinder's attacks, techniques, and targets.

    THN reports "Researchers Uncover SideWinder's Latest Server-Based Polymorphism Technique"

  • news

    Visible to the public "FBI Seizes 13 More Domains Linked to DDoS-For-Hire Services"

    The US Justice Department (DOJ) has announced the court-ordered seizure of 13 Internet domains associated with Distributed Denial-of-Service (DDoS)-for-hire services, as part of an ongoing initiative against computer attack booter services. This set of seizures represents the third wave of US law enforcement actions against major booter services that allow paying users to launch powerful DDoS attacks in which computers are flooded with information and prevented from accessing the Internet. In December 2022, the FBI also targeted leading stresser services by seizing an additional 48 domains. Ten previously disrupted platforms registered new domains, allowing them to remain online. The DOJ stated that ten of the thirteen domains recently seized are reincarnations of services that were taken down in December during an earlier search that targeted leading booter services. The FBI tested the seized booter services domains by opening or renewing accounts with each of them and launching DDoS attacks against agency-controlled computers to determine the effects on target computers. These tests confirmed the functionality of the booters, with the FBI stating that certain attacks took the targeted devices offline despite their high-capacity Internet connections. This article continues to discuss the DOJ's seizure of 13 more domains linked to DDoS-for-hire platforms.

    Bleeping Computer reports "FBI Seizes 13 More Domains Linked to DDoS-For-Hire Services"

  • news

    Visible to the public "Finding Bugs in AI Models at DEF CON 31"

    DEF CON's AI Village will host the first public assessment of Large Language Models (LLMs) to discover bugs and the potential for AI model misuse. There are numerous ways in which LLMs can help users' creativity, but there are also challenges, particularly regarding security and privacy. This event aims to bring further attention to the implications of using generative Artificial Intelligence (AI), a technology with many potential applications and unclear repercussions. Red teams will evaluate LLMs from leading vendors, including Anthropic, Google, Hugging Face, NVIDIA, OpenAI, Stability, and Microsoft. They will do so on a Scale AI-developed evaluation platform. This exercise is intended to reveal both the potential and limitations of LLMs. Red teams hope that testing these models will reveal any potential vulnerabilities and evaluate the extent to which LLMs are vulnerable to manipulation. The White House, the National Science Foundation's (NSF) Computer and Information Science and Engineering (CISE) Directorate, and the Congressional AI Caucus' support for the red teaming exercise indicate the importance of the use of LLMs. It also emphasizes the possible risks associated with this technology. This article continues to discuss the first public assessment of LLMs.

    Help Net Security reports "Finding Bugs in AI Models at DEF CON 31"

  • news

    Visible to the public "BEC Campaign via Israel Spotted Targeting Large Multinational Companies"

    An Israel-based threat group is conducting a Business Email Compromise (BEC) campaign primarily against large and multinational companies with an average annual revenue of over $10 billion. According to researchers at Abnormal Security who discovered the attacks, the group has carried out 350 BEC campaigns targeting employees in 61 countries across six continents since February 2021. The attackers masquerade as the CEO and then pass the communication to a second external persona, typically a mergers and acquisitions attorney, who is responsible for overseeing the payment process. In some cases, once the second stage of an attack has been reached, the attackers request that the conversation transition from email to a WhatsApp voice call in order to accelerate the attack and reduce the likelihood of leaving a trail of evidence. This article continues to discuss the Israel-based group's BEC campaign targeting large and multinational companies.

    Dark Reading reports "BEC Campaign via Israel Spotted Targeting Large Multinational Companies"

  • news

    Visible to the public "Applying Blockchain to Digital Advertising"

    According to a new study from researchers at the University of Georgia, the same blockchain technology that secures cryptocurrency systems could also shield users from intrusive and predatory advertising. Many consumers do not understand how their personal data is used in digital advertising. Which devices collect what data, how companies use that data, and how to block certain ads can be puzzling. Advertisers and publishers can experience the negative effects of ad fraud, such as unauthorized ads and bots that hijack ad traffic and divert profits. According to the researchers, blockchain can combat both of these challenges. Jooyoung Kim, the study's lead author, explained that there will always be malicious actors due to the size and complexity of the advertising ecosystem. Advertisers and publishers cannot effectively track them, and consumers are concerned about the security and privacy of their personal information. With the automated nature of blockchain, consumers have greater control over their exposure to ads. This could increase consumer trust in advertising by placing control in their hands. People can track how their data is used and opt out of certain ad categories. In addition to placing fake ads, fraudsters can use bots to defraud ads. These bots can click on ads, depleting the budgets of advertisers. Such fraud schemes have caused 15 to 50 percent of ads to be wasted, contributing to an estimated $100 billion in losses in 2022. Digital advertising fraud schemes have wasted consumers' attention and increased the number of potential threats to them. Although blockchain may not completely prevent fraud from the start, it does pave the way to do so. When a fraudulent ad is identified, it can be traced back to its source via the blockchain. This article continues to discuss the new study on the anti-fraud possibilities of blockchain.

    The University of Georgia reports "Applying Blockchain to Digital Advertising"

  • news

    Visible to the public "How the ZeuS Trojan Info Stealer Changed Cybersecurity"

    After infecting a computer or device, information-stealing malware is highly adept at exfiltrating login credentials, financial information, and other confidential data. Typically, information stealers operate by capturing keystrokes, screenshots, and network traffic. They may also search a hard drive for certain data types. The data is then sent to the attacker's command-and-control (C2) server for further exploitation. On underground criminal networks, information-stealing malware has thrived. Information stealer services for financial fraud attacks are available for as little as $200 per month on the dark web. Although this category of malware has existed in some form for more than two decades, the ZeuS Trojan has been the most influential as an information stealer. ZeuS was the first true information stealer used in an attack with the intent to harvest data. ZeuS became one of the most prevalent information stealers ever. The malware's primary objective was to steal online banking credentials. To steal sensitive information from infected computers, ZeuS used various methods, including keylogging and form grabbing. The information was then used to conduct unauthorized transfers from the victims' bank accounts to the attackers' accounts. In addition, the malware could identify when a user visited certain websites, especially those related to banking. ZeuS affected Android, Symbian, and Blackberry mobile devices. It is considered the first malware to steal Mobile Transaction Authentication Numbers (mTANs), a form of two-factor authentication (2FA) banks use during transactions. This article continues to discuss the ZeuS Trojan and other information stealers.

    Security Intelligence reports "How the ZeuS Trojan Info Stealer Changed Cybersecurity"

  • news

    Visible to the public "CERT-UA Warns of an Ongoing SmokeLoader Campaign"

    The Computer Emergency Response Team of Ukraine (CERT-UA) warns of an ongoing phishing campaign aimed at distributing the SmokeLoader malware in the form of a polyglot file. Threat actors are sending emails with the subject line "bill/payment" and a ZIP archive attachment from compromised accounts. The JavaScript involved in the attack uses PowerShell to download and run an executable that launches the SmokeLoader malware. SmokeLoader serves as a loader for other malware. Upon execution, it injects malicious code into the running explorer process (explorer.exe) and downloads another payload. CERT-UA linked the campaign to the financially motivated threat actor UAC-0006 who has been active since at least 2013. The threat actors focus on compromising accountants' computers, which are used to support financial activities such as remote banking system access. They also steal credentials and initiate unauthorized fund transfers. This article continues to discuss researchers' findings regarding the phishing campaign distributing the SmokeLoader malware.

    Security Affairs reports "CERT-UA Warns of an Ongoing SmokeLoader Campaign"

  • news

    Visible to the public "Western Digital Confirms Ransomware Group Stole Customer Information"

    Western Digital recently confirmed that cybercriminals have stolen customer and other information after breaching its systems. According to the digital storage giant, a security breach was discovered on March 26. The company noted that it shut down some services in early April as part of its incident response activities and informed customers about a cyberattack. However, it did not share any updates until May 5. Western Digital's second public statement comes just days after a ransomware group known as Alphv/BlackCat started publishing screenshots showing the extent of their access. The screenshots appear to show video calls, emails, and internal documents discussing the cyberattack, as well as internal tools, invoices, and confidential communications. The adversaries have threatened to make public customers' personal information, firmware, code signing certificates, and intellectual property if they do not pay up. In the statement issued on Friday, WD confirmed that the hackers accessed a database associated with its online store that contained customers' personal information, including names, billing and shipping addresses, phone numbers, email addresses, hashed and salted passwords, and partial credit card numbers. The impacted online store is expected to be restored in the week of May 15. The My Cloud service, which was also shut down following the hack, was restored in mid-April. The company said it's still investigating the validity of the other data made public by the ransomware group.

    SecurityWeek reports: "Western Digital Confirms Ransomware Group Stole Customer Information"

  • news

    Visible to the public "Cryptocurrencies: Shared Irresponsibility"

    Information Technology security is of utmost importance when using cryptocurrencies. Ultimately, money, like other data, is susceptible to cyberattacks. Professor Ghassan Karame, head of the Chair for Information Security at Ruhr University Bochum, is exploring the security of various cryptocurrencies. He advocates for decentralized platforms, such as those on which cryptocurrencies are based. Karame explains that in decentralized platforms, unlike a bank, power is not centralized in a single entity. Instead, decisions are made by the majority of users. According to Karame, the two advantages of decentralized platforms are that it is difficult for a central body to impose censorship, and they are resilient against faults and misbehavior because a large community of developers monitors the technology. However, cryptocurrencies are vulnerable to security breaches like every other IT technology. As early as 2012, Karame and his team identified a critical flaw in the Bitcoin system that allowed people to spend the same Bitcoins many times to pay for different transactions. In 2015, Karame and his collaborators identified another critical vulnerability after Bitcoin's system was modified to accommodate more users. They demonstrated that if they controlled as few as tens of laptops in the system, they could halt the flow of information throughout the entire Bitcoin system. Bitcoin has long since resolved both of these security issues. This article continues to discuss security vulnerabilities associated with cryptocurrencies.

    Ruhr University Bochum reports "Cryptocurrencies: Shared Irresponsibility"

  • news

    Visible to the public "Ransomware Group Claims Attack on Constellation Software"

    The Alphv/BlackCat ransomware group has recently claimed responsibility for a cyberattack that Canadian software company Constellation Software disclosed last week. Toronto-based Constellation Software is a company specializing in the acquisition of vertical market software firms. On May 4, Constellation Software revealed that it fell victim to a cyberattack that impacted "a limited number of its IT infrastructure systems." The attack occurred on April 3, 2023. According to the company, the compromised systems were "related to internal financial reporting and related data storage by the operating groups and businesses of Constellation." The company noted that the attack did not impact the IT systems of its operating groups and businesses and did not affect its business operations. The company says that a limited amount of personal information was compromised during the incident, along with a limited amount of business partner data. The Alphv/BlackCat ransomware gang last week posted on its leak site an entry about the incident, claiming to have stolen over one terabyte of data from the company. The company has not shared information on the number of potentially impacted individuals.

    SecurityWeek reports: "Ransomware Group Claims Attack on Constellation Software"

  • news

    Visible to the public "Cookie Consent Banners Need Improvement, May Not Be the Answer"

    Cookie consent banners appear, in some form, on nearly every website, but concerns remain as to whether users understand what they agree to when they select one of the available options or click the x button to close the banner. In order to comply with regulatory requirements, websites have implemented cookie consent banners, allowing users to choose how their personal information is collected and shared. However, according to researchers at the CyLab Security and Privacy Institute at Carnegie Mellon University (CMU), many of these banners miss the mark. They may not be the best method to provide users with privacy options. Hana Habib, special faculty instructor and associate director of the CMU Software and Societal Systems Department's Masters in Privacy Engineering program, explains that the primary problem with cookie consent interfaces has been the proliferation of dark patterns. Individuals were steered towards less privacy-protective options. In a new study titled "A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile," CyLab researchers explored how US and UK users interact with and perceive cookie interfaces, how these interactions and perceptions vary on desktop and mobile devices, as well as how banner prominence, location of cookie category definitions, and initial cookie options influence users' attitudes and behaviors. This article continues to discuss findings from CyLab's US-UK usability evaluation of consent management platform cookie consent interface design.

    CyLab reports "Cookie Consent Banners Need Improvement, May Not Be the Answer"

  • news

    Visible to the public "CyberGhost VPN Patches Command Injection Vulnerability"

    CyberGhost VPN, a popular provider of Virtual Private Network (VPN) solutions, has patched a recently discovered command injection vulnerability that left Windows users' systems exposed to potential compromise. The difficulty with which the researcher who discovered the vulnerability disclosed it also adds intrigue to the bug's discovery. Ceri Coburn of the UK-based security research company Pen Test Partners found that the CyberGhost VPN client is vulnerable to an elevation of privilege flaw, stating the vulnerability affects roughly 3 million CyberGhost customers. The latest 8.3.10.10015 version of CyberGhost, released on February 24, 2023, addresses this issue. It is unknown if the patch was pushed to endpoints operating previous versions of the software or if customers must manually update instances of the software. According to Coburn, a specially crafted JSON payload sent to the CyberGhost Remote Procedure Call (RPC) service can lead to command line injection when the OpenVPN process is launched, resulting in full system compromise. This article continues to discuss the command injection vulnerability patched by CyberGhost VPN.

    SC Magazine reports "CyberGhost VPN Patches Command Injection Vulnerability"

  • news

    Visible to the public "Eurovision 2023: A Goldmine for Cybercriminals"

    The return of Eurovision 2023 will occur on May 9, hosted by Liverpool on behalf of Ukraine. However, the excitement about this year's acts is accompanied by cybercriminals' eagerness to make money. This year's song contest again raises concerns about malware, phishing, and data management. In May 2022, a pro-Russian hacker group was observed discussing a cyberattack against Eurovision in order to hinder Ukraine's chances of winning the song contest, but Italy had effectively blocked Distributed Denial-of-Service (DDoS) attacks during the event. Italy's successful blocking of the attacks prompted the Russia-affiliated group called Killnet to declare "war on ten countries and the Italian police." This year, hackers are attempting to infiltrate the Eurovision space through every conceivable entry point and using multiple attack vectors. Ahead of the musical event in Liverpool, the North West Cyber Resilience Centre (NWCRC) advised organizations to remain vigilant. Numerous businesses engaging with new suppliers and customers throughout the supply chain have been warned to be alert for fraud attempts. In the run-up to the Eurovision Song Contest in May, the head of Cyber and Innovation at the NWCRC, DI Dan Giannasi, advised all businesses in the North West to be vigilant against potential cybercrime, including phishing schemes in which fraudsters impersonating businesses attempt to steal personal information and money. This article continues to discuss the cybercrime accompanying Eurovision 2023.

    Cybernews reports "Eurovision 2023: A Goldmine for Cybercriminals"

  • news

    Visible to the public "1 Million Impacted by Data Breach at NextGen Healthcare"

    Healthcare solutions provider NextGen Healthcare has recently started informing roughly one million individuals that their personal information was compromised in a data breach. The company makes and sells electronic health records software and provides doctors and medical professionals with practice management services. NextGen Healthcare first identified suspicious activity on its systems on March 30, 2023. The investigation launched into the matter revealed that an unauthorized party had access to those systems between March 29 and April 14, 2023. The company noted that during that time, the attackers accessed personal information such as names, addresses, birth dates, and Social Security numbers. The company says it has no evidence that the unauthorized party had access to health or medical records and data. NextGen Healthcare noted that the attackers accessed its database using "client credentials that appear to have been stolen from other sources or incidents unrelated to NextGen." The company stated that it reset passwords to contain the incident and informed law enforcement of the breach, and has been working with them throughout the investigation.

    SecurityWeek reports: "1 Million Impacted by Data Breach at NextGen Healthcare"

  • news

    Visible to the public "ChatGPT and the New AI Are Wreaking Havoc on Cybersecurity in Exciting and Frightening Ways"

    Christopher Ahlberg, CEO of Recorded Future, emphasizes that cybercriminals are racing to discover powerful new hacks using Artificial Intelligence (AI). While defenders benefit from generative AI in bolstering cybersecurity, attackers also see the benefits of using AI technology. Cybercriminals are using AI to launch novel and sophisticated attacks on a massive scale. According to Ahlberg, defenders are using the same technology to protect critical infrastructure, government organizations, and corporate networks. Generative AI capabilities have helped malicious actors improve and develop new attack tactics, allowing them to remain one step ahead of cybersecurity defenses. AI helps cybercriminals automate attacks, scan attack surfaces, and generate content that resonates with different geographic regions and demographics, thus enabling them to target a broader range of potential victims. Cybercriminals have adopted the technology to create legitimate-looking phishing emails. AI-generated text facilitates the creation of highly personalized emails and text messages that are more likely to deceive targets. As AI becomes more pervasive in society, lawmakers, judges, and other decision-makers must understand the technology and its potential consequences. In order to navigate the future of AI in threat hunting and beyond, it is essential to develop stronger alliances between technical experts and policymakers. The opportunities, challenges, and ethical considerations of AI are complex and evolving in cybersecurity. This article continues to discuss how AI is impacting cybercrime and cybersecurity operations.

    ZDNet reports "ChatGPT and the New AI Are Wreaking Havoc on Cybersecurity in Exciting and Frightening Ways"

  • news

    Visible to the public "The Attack on Colonial Pipeline: What We've Learned & What We've Done Over the Past Two Years"

    In 2021, a ransomware attack on Colonial Pipeline made news worldwide. Since then, the Biden-Harris Administration has taken significant steps in US cyber defense, leveraging the strength of the US government to address the full spectrum of the threat. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has made efforts to improve resilience across the nation's critical infrastructure. Recognizing the need for organizations to have easy access to actionable and timely cybersecurity information, CISA created a website resource to serve as a hub for warnings and guidance for businesses and individuals. As only cohesive cross-government collaboration can scale to meet the threat, CISA formed the Joint Ransomware Task Force (JRTF) with its FBI partners to coordinate the federal government's response to the ransomware outbreak. Due to the need to bring industry, government, and internal partners together and break down siloes that create gaps for the adversary, CISA established the Joint Cyber Defense Collaborative (JCDC). This concept stemmed from the US Cyberspace Solarium Commission, catalyzing a community of experts on the front lines of cyber defense, from across the public and private sectors, to share insights and information in real-time. This article continues to discuss lessons learned from the cyberattack on Colonial Pipeline and what CISA has done to help combat the ransomware threat.

    CISA reports "The Attack on Colonial Pipeline: What We've Learned & What We've Done Over the Past Two Years"

  • news

    Visible to the public "New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks"

    Users of the Advanced Custom Fields plugin for WordPress are urged to update to version 6.1.6. The plugin has been discovered to contain a vulnerability, tracked as CVE-2023-30777, which relates to reflected cross-site scripting (XSS). It could be exploited to inject arbitrary executable scripts into websites. The plugin has over two million active installations and is available in both free and paid versions. On May 2, 2023, the problem was detected and reported to the maintainers. According to Patchstack researcher Rafie Muhammad, this vulnerability allows any unauthenticated user to steal sensitive information and gain escalated privileges on the WordPress site by tricking a privileged user into visiting a crafted URL path. Reflected XSS attacks typically occur when victims are lured into clicking on a fraudulent link received via email or another method, enabling the malicious code to be transferred to the vulnerable website, where it is reflected back to the user's browser. Since reflected XSS attacks do not have the same reach and scale as stored XSS attacks, threat actors will spread the malicious link to as many victims as possible. This article continues to discuss the potential exploitation and impact of the vulnerability found in the Advanced Custom Fields plugin for WordPress.

    THN reports "New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks"

  • news

    Visible to the public "New Cactus Ransomware Encrypts Itself to Evade Antivirus"

    Cactus, a new ransomware operation, has been exploiting Virtual Private Network (VPN) appliance vulnerabilities to gain initial access to the networks of "large commercial entities." The Cactus ransomware operation has been active since at least March and seeks significant payments from its victims. Although the new threat actor used the standard ransomware techniques of file-encrypting and data theft, it added a unique twist to avoid detection. Researchers at the corporate investigation and risk consulting company Kroll suspect that Cactus exploits known vulnerabilities in Fortinet VPN appliances to gain initial access to victim networks. The assessment is based on the observation that the hacker pivoted inside from a VPN server using a VPN service account in all incidents observed. Cactus is different from other operations because of its use of encryption to protect the ransomware binary. The threat actor behind Cactus uses a batch script to get the encryptor binary using 7-Zip. The original ZIP archive is removed, and the binary is launched with a specific execution flag. This article continues to discuss researchers' findings regarding the new Cactus ransomware operation.

    Bleeping Computer reports "New Cactus Ransomware Encrypts Itself to Evade Antivirus"

  • news

    Visible to the public "Your Voice Could Be Your Biggest Vulnerability"

    Security researchers from McAfee Labs have revealed their findings and analysis from an in-depth study of Artificial Intelligence (AI) voice-cloning technology and cybercriminal use. According to McAfee, only three seconds of audio are required to clone a person's voice using AI technology. McAfee surveyed 7,054 people from seven countries and found that a quarter of adults have faced an AI voice scam, with one in ten experiencing it personally and 15 percent reporting that it had happened to someone they know. Furthermore, 77 percent of victims reported financial losses as a consequence. Voice is the spoken equivalent of a biometric fingerprint, which explains why hearing someone's voice is a widely accepted method of establishing trust. With 53 percent of adults sharing their voice data online at least once per week via social media, voice notes, and more, and 49 percent doing so up to ten times per week, replicating a person's voice has become a cybercriminal weapon. It is now easier than ever to manipulate images, videos, and perhaps the voices of friends and family. McAfee's research reveals scammers are using AI technology to clone voices and then send a fake voicemail or call the victim's contacts pretending to be in distress. With 70 percent of adults lacking confidence in their ability to distinguish the cloned version from the real thing, this technique is gaining traction. This article continues to discuss key findings from McAfee on AI technology fueling a rise in online voice scams.

    Help Net Security reports "Your Voice Could Be Your Biggest Vulnerability"