News Items

  • news

    Visible to the public "UNSW Calls on Government to Protect Bug Bounty Hunters"

    According to the University of New South Wales (UNSW), Australia's current cybersecurity consultations offer an opportunity to protect vulnerability researchers. The university's Allen Lab and its business school's regulatory laboratory argue in a response to the "2023-2030 Australian Cyber Security Strategy Discussion Paper" that there is currently no protection for those acting in good faith in a vulnerability disclosure program. As a result, according to the submission, a crime could be committed even if a person believes they are engaging in a vulnerability disclosure program. Their actions may not be authorized under the terms of that vulnerability disclosure program. It is also possible that someone engaging in a vulnerability disclosure program may accidentally commit a crime due to a misunderstanding of the program's rules. According to the submission, protecting bug hunters would require federal and state laws. This article continues to discuss UNSW's call on the Australian government to protect bug bounty hunters.

    iTNews reports "UNSW Calls on Government to Protect Bug Bounty Hunters"

  • news

    Visible to the public "Zscaler ThreatLabz Finds Alarming Growth in Phishing Attacks"

    A new threat analysis report released by the cloud security provider Zscaler reveals patterns in the growth of phishing attacks in 2022. Based on data including 280 million transactions and an analysis of eight billion attempted attacks, the report found a 47 percent increase in phishing attacks in 2022. Attackers are using newer tools, such as Artificial Intelligence (AI), to strike organizations with inadequate security mechanisms. Phishing scams are a growing problem, and threat actors' methods are becoming more complex, thus making them more difficult to detect and thwart, according to the report. The number of attacks against the education sector has increased more than fivefold. Attackers have also shifted away from exploits associated with the coronavirus pandemic. According to the report, COVID-themed attacks accounted for 7.2 percent of phishing schemes in 2021, but just 3.7 percent in 2022. Additionally, the US remains the most targeted country for phishing attacks, a position it has traditionally held, with more than 65 percent of all phishing attempts occurring in the country. Some of the most commonly used techniques are SMS phishing, which applies voicemail-related phishing (vishing) to trick victims into opening malware attachments. Another commonly encountered approach is the use of sophisticated adversary-in-the-middle (AiTM) attacks that can help hackers circumvent multi-factor authentication (MFA) security. This article continues to discuss key findings from Zscaler's phishing report.

    MeriTalk reports "Zscaler ThreatLabz Finds Alarming Growth in Phishing Attacks"

  • news

    Visible to the public "Report Shows 92% Of Orgs Experienced an API Security Incident Last Year"

    Data Theorem, an application security provider, has announced the release of a new report in collaboration with TechTarget's Enterprise Strategy Group (ESG). ESG surveyed 397 people on cloud-native applications and Application Programming Interface (API) security and discovered that 92 percent of organizations had at least one API-related security incident in the last 12 months. The report also revealed that 57 percent of organizations encountered several API security incidents, suggesting that many organizations still have a long way to go in protecting cloud-native applications and APIs from threat actors. This report comes just months after a hacker used a Twitter API vulnerability to collect and leak 235 million users' account details and email addresses in January 2023. The transient nature of the attack surface was one of the major problems revealed by the research. For example, 75 percent of organizations change or update their APIs on a daily or weekly basis, which introduces new vulnerabilities for security teams. This rapid rate of change creates shadow APIs and zombie APIs. However, many organizations plan to increase their spending on API security tools, Cloud-Native Application Protection Platforms (CNAPPs), and more over the next 12-18 months to bolster API security. This article continues to discuss key findings from the report on securing the API attack surface.

    VB reports "Report Shows 92% Of Orgs Experienced an API Security Incident Last Year"

  • news

    Visible to the public "UK Pension Funds Warned to Check on Clients' Data After Capita Breach"

    Hundreds of pension funds in the UK have been instructed to check whether their clients' data was stolen due to the Capita breach in March. Capita, the country's largest outsourcing firm, has contracts to manage the payment systems for pension funds used by more than 4 million people in the UK. Following the publication of sensitive data referencing home addresses and passport photos by the Black Basta ransomware gang, the company confirmed that it was investigating the release of the data allegedly stolen by the ransomware group. The Pensions Regulator has written to hundreds of pension funds, requesting that trustees contact Capita to find out if their data has been compromised. Capita has verified that there are currently some signs of limited data exfiltration from a small proportion of the impacted server estate, which could include customer, supplier, or colleague data. This article continues to discuss the Capita breach and UK pension funds being told to check on whether their clients' data had been stolen because of the breach.

    The Record reports "UK Pension Funds Warned to Check on Clients' Data After Capita Breach"

  • news

    Visible to the public "Hacking Caused 80% of Healthcare Data Breaches in 2022"

    Healthcare system hacking is a major concern, and healthcare organizations must take proactive measures to protect themselves from such attacks. Following a 250 percent increase in breach numbers between 2011 and 2021, the Fortified Health Security 2023 Horizon Report found that the number of breaches decreased slightly in 2022. However, according to the IBM 2022 Cost of a Data Breach report, the healthcare industry is still the most costly for a breach, with an average cost of $10.1 million for the twelfth year in a row. Despite a declining trend in breaches, hacking remains a major problem. According to Fortified Health, 78 percent of data breaches in 2022 were caused by hacking and Information Technology (IT) incidents, up from 45 percent in 2018. Unauthorized access, the second most common cause, was responsible for 38 percent of incidents in 2018 but now accounts for 16 percent. Theft, loss, and poor data disposal were also cited as causes. This article continues to discuss hacking being the biggest threat to healthcare, why cybercriminals target healthcare, and how healthcare organizations can reduce the risk of hacking.

    Security Intelligence reports "Hacking Caused 80% of Healthcare Data Breaches in 2022"

  • news

    Visible to the public "CISA Asks for Public Opinion on Secure Software Attestation"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has recently announced that proposed guidance for secure software development is now open to public review and opinion. For 60 days, the public can provide feedback on the draft self-attestation form for secure software development, which requires the providers of software for the government to confirm that specific security practices have been implemented. CISA stated that the self-attestation form has been drafted in line with the requirements of Memorandum M-22-18 (Enhancing the Security of the Software Supply Chain through Secure Software Development Practices) that the Office of Management and Budget (OMB) released in September 2022. CISA noted that this self-attestation form identifies the minimum secure software development requirements a software producer must meet and attest to meeting before their software subject to the requirements of M-22-18 may be used by Federal agencies. Per M-22-18's requirements, federal agencies may use specific software only if the developer has attested compliance with government-issued guidance on software supply chain security. The self-attestation requirement applies to software produced after September 14, 2022, to software-as-a-service products and other software receiving continuous code changes and to existing software when major version changes occur. Software developed by the federal agencies and freely available software used by the agencies does not fall in scope for M-22-18 and does not require self-attestation. CISA stated that software producers who utilize freely obtained elements in their software are required to attest that they have taken specific steps to minimize the risks of relying on such software in their products. Suppose a software producer cannot provide a completed self-attestation form. In that case, federal agencies are required to obtain documentation on development practices, to document measures taken to mitigate resulting risks, and to require a plan of actions and milestones (POA&M) from the software producer. Minimum attestation requirements described by the new guidance include secure development environments, efforts to maintain trusted source code supply chains, maintaining provenance data for all code, and automated vulnerability checks.

    SecurityWeek reports: "CISA Asks for Public Opinion on Secure Software Attestation"

  • news

    Visible to the public "EVs Rev up Cybersecurity Challenges"

    Even though the Biden administration recently reaffirmed its commitment to Electric Vehicles (EVs), concerns remain about the ability of charging infrastructure and vehicles to withstand a cyberattack. If charging stations are designated as critical infrastructure, the challenge will become significantly more difficult, especially when states add them to public property. Many state and local governments have cybersecurity insurance to cover some of the financial costs of an attack on their Information Technology (IT) systems, but insurance for EVs and charging stations is new territory. Recent research from the IBM Institute for Business Value discussed these emerging cybersecurity risks and their insurance implications. According to IBM's report, "software-heavy" EVs and charging stations are constantly communicating with other vehicles and the world around them, and while software updates may be sent quickly to address security flaws, the enormous attack surface catches cybercriminals' attention. The effects are also affecting the insurance industry, which is struggling to assess an unfamiliar set of risks and losses. Mike Hamilton, CISO of Critical Insight, agreed that the absence of precedent is concerning for the future of insurance. Hamilton emphasized the difficulty of determining how to price this insurance based on risk. This article continues to discuss EV owners, charging stations, and fleet managers being vulnerable to hackers without a meaningful way to secure and insure the EV infrastructure.

    GCN reports "EVs Rev up Cybersecurity Challenges"

  • news

    Visible to the public "Iranian Govt Uses BouldSpy Android Malware for Internal Surveillance Operations"

    Lookout Threat Lab researchers discovered BouldSpy, a new Android surveillance malware used by the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Although the BouldSpy spyware includes ransomware capabilities, Lookout researchers have yet to see the malicious code use them, suggesting that the malware is still in development or that it is a false flag used by its operators. Exfiltrated data from the spyware's command-and-control (C2) servers revealed that BouldSpy was used to spy on over 300 people, including minority groups such as Iranian Kurds, Baluchis, Azeris, and potentially Armenian Christian groups. The malware was most likely used to counter and track illegal trade in weaponry, drugs, and alcohol. According to Lookout, FARAJA uses physical access to devices, likely obtained during detention, to install BouldSpy and further monitor the target after release. Researchers obtained and evaluated a large amount of exfiltrated data, which includes images and device communications such as screenshots of chats, video call recordings, and SMS records. The researchers also found photos of drugs, firearms, and official FARAJA documents, indicating that the spyware may be used by law enforcement. However, much of the victim data points to its broader use, suggesting targeted surveillance efforts against Iranian minorities. This article continues to discuss Iranian authorities using the BouldSpy Android malware to spy on minorities and traffickers.

    Security Affairs reports "Iranian Govt Uses BouldSpy Android Malware for Internal Surveillance Operations"

  • news

    Visible to the public "Companies Increasingly Hit With Data Breach Lawsuits: Law Firm"

    According to US law firm BakerHostetler, lawsuits filed against companies that have suffered a data breach are increasingly common, with action being taken more frequently, even in cases where the number of impacted individuals is smaller. Last week, the company published its 2023 Data Security Incident Response Report based on data collected from more than 1,100 cybersecurity incidents investigated by the company in 2022. The report shows that 45% of incidents were network intrusions, followed by business email compromise (30%) and inadvertent data disclosure (12%). Following initial access, the most common actions were ransomware deployment (28%), data theft (24%), email access (21%), and malware installation (13%). Data collected by BakerHostetler shows that ransomware victims that did pay a ransom in 2022 paid more compared to 2021. The largest ransom demand seen by the firm in 2022 exceeded $90 million (compared to $60 million in 2021), and the largest ransom that was paid in 2022 was more than $8 million (compared to $5.5 million in 2021). The average ransom amount paid last year was roughly $600,000, up from $511,000 in 2021. The cost of forensic investigations has also increased. For the 20 largest network intrusions, the average cost increased by 24%, from $445,000 in 2021 to $550,000 in 2022. In addition to higher ransom demands and increased forensic costs, the company also found that a bigger percentage of incidents where the impacted organization notified individuals of a data breach resulted in at least one lawsuit. Specifically, the numbers have increased from four lawsuits out of 394 incidents in 2018 to 42 lawsuits filed for 494 incidents in 2022. Four of the lawsuits filed last year were in response to incidents where fewer than 1,000 people were impacted, and 14 lawsuits were filed over incidents that hit between 1,000 and 100,000 people. The company noted that another category of lawsuits has also increased: privacy-related class actions. BakerHostetler is aware of more than 50 lawsuits filed since August 2022 against hospital systems that allegedly shared patient identities and online activities via third-party website analytics tools without the user's knowledge and consent.

    SecurityWeek reports: "Companies Increasingly Hit With Data Breach Lawsuits: Law Firm"

  • news

    Visible to the public "NIST's Cybersecurity Framework Gets 'Significant Update'"

    The National Institute of Standards and Technology (NIST) is updating its Cybersecurity Framework (CSF) in order to better incorporate topics such as supply chain risk management and governance. The framework, first released in 2014, is a set of standards aimed at helping organizations assess, understand, manage, and mitigate security risks. While voluntary for the private sector, the framework serves as the foundation for many government policies worldwide, and the 2017 executive order "Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure" made it mandatory for US federal agencies. In addition, certain insurance companies have made the framework mandatory for specific industries, and organizations can also require the framework to be used within their supply chain. Previously, the framework was lightly updated every three to five years, with CSF 1.1 released in 2018. However, with significant changes in the cybersecurity landscape since then, NIST has considered a more significant overhaul for its framework that includes newer security and privacy resources and addresses recent changes in technologies and risks such as supply chain security. This article continues to discuss the update of NIST's CSF.

    Decipher reports "NIST's Cybersecurity Framework Gets 'Significant Update'"

  • news

    Visible to the public "Global Cyberattacks Rise by 7% in Q1 2023"

    According to new research by Check Point, weekly cyberattacks have increased worldwide by 7% in Q1 2023 compared to the same period last year, with each firm facing an average of 1248 attacks per week. The company found that the education and research sector experienced the highest number of attacks, rising to an average of 2507 per organization per week (a 15% increase compared to Q1 2022). While the volume of attacks has only risen marginally, the company noted that they have witnessed several sophisticated campaigns from cyber criminals who are finding ways to weaponize legitimate tools for malicious gains. Check Point stated that geographically, the APAC region experienced the highest year-on-year (YoY) increase in weekly attacks, with an average of 1835 per company (16% more than last year). North America followed with a 9% YoY increase resulting in 950 average weekly attacks per organization. The company noted that in the United States, cybersecurity regulations have recently been revised, and regulators are currently considering proposals aimed at improving incident reporting, information disclosure, oversight, and the modernization of outdated legislation. During the study, the company also found that 1 in 31 organizations worldwide experienced a ransomware attack weekly over the first quarter of 2023. This represents a 1% increase compared to the same period in 2022, when a similar number of organizations fell victim to such attacks. Latin America saw the most significant year-over-year increase of 28% when 1 out of 17 organizations experienced a ransomware attack.

    Infosecurity reports: "Global Cyberattacks Rise by 7% in Q1 2023"

  • news

    Visible to the public "US Air Force Academy Wins NSA Cyber Competition"

    The US Air Force Academy successfully defended its title as champions of the National Security Agency's (NSA) annual NSA Cyber Exercise (NCX). The team won a three-day cyber competition that put US service academies, senior military colleges, and NSA professional development programs to the test in order to train them to defend the nation's cyber networks. The NCX trophy was presented to the Air Force Academy's cyber competition team by GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS. The US Military Academy came in second place, while the US Coast Guard Academy came in third, beating the US Naval Academy and senior military universities such as Norwich, Texas A&M, The Citadel, Virginia Military Institute, Virginia Tech, and the University of North Georgia. The NCX is a year-round program that ends in a three-day unclassified cyber competition. It fosters and tests cybersecurity skills, planning, communication, decision-making, and more. The theme this year was transportation and food infrastructure, including exercises focusing on data analysis, forensics, reverse engineering, and policy, as well as the final attack-and-defend cyber combat exercise. This article continues to discuss the US Air Force Academy winning the NCX as well as the structure and benefits of this competition.

    NSA reports "US Air Force Academy Wins NSA Cyber Competition"

  • news

    Visible to the public "New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise Networks"

    An analysis of more than 70 billion DNS records resulted in the discovery of Decoy Dog, a new sophisticated malware toolkit aimed at enterprise networks. Decoy Dog is evasive and uses techniques such as strategic domain aging and DNS query dribbling, in which a series of queries are sent to command-and-control (C2) domains in order to avoid detection. According to Infoblox, Decoy Dog is a cohesive toolset with several odd traits that make it distinctly identifiable, particularly when looking at its domains at the DNS level. The cybersecurity company said the malware was discovered due to unusual DNS beaconing activity, and its uncommon properties allowed it to map more domains that are part of the attack infrastructure. Researchers have found that the use of Decoy Dog in the wild is "very rare," with the DNS signature matching less than 0.0000027 percent of the 370 million active domains on the Internet. Pupy RAT, an open-source Trojan delivered using DNS tunneling, in which DNS queries and responses are used as a C2 for dropping payloads, is one of the toolkit's main components. This article continues to discuss researchers' findings and observations regarding the new sophisticated malware toolkit dubbed Decoy Dog.

    THN reports "New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise Networks"

  • news

    Visible to the public "Hackers Use Fake 'Windows Update' Guides to Target Ukrainian Govt"

    According to the Computer Emergency Response Team of Ukraine (CERT-UA), Russian hackers are sending malicious emails to different government bodies with instructions on how to upgrade Windows in order to defend against cyber threats. The Russian state-sponsored hacking group APT28, also known as Fancy Bear, according to CERT-UA, sent these emails and impersonated system administrators of the targeted government entities to fool their targets. The attackers created Outlook email addresses using real employee identities obtained through unknown ways during the attack's preliminary stages. Rather than normal instructions for upgrading Windows systems, the emails direct recipients to run a PowerShell command. This command downloads a PowerShell script to the computer, imitating a Windows update procedure while simultaneously downloading a second PowerShell payload. The second-stage payload is an information-harvesting tool that uses the 'tasklist' and 'systeminfo' commands to capture data and send it through an HTTP request to a Mocky service Application Programming Interface (API). Mocky is a legitimate tool that allows users to produce custom HTTP responses, which APT28 used for data exfiltration in this case. System administrators should restrict the ability to launch PowerShell on critical workstations and monitor network traffic for connections to the Mocky service API. This article continues to discuss APT28 using fake Windows Update guides to target various Ukrainian government bodies.

    Bleeping Computer reports "Hackers Use Fake 'Windows Update' Guides to Target Ukrainian Govt"

  • news

    Visible to the public "Cybercriminals Use Proxies to Legitimize Fraudulent Requests"

    According to HUMAN, a global leader in protecting enterprises by disrupting digital fraud and abuse with modern defense, bot attacks were viewed as a relatively insignificant type of online fraud, and that thinking has remained even as threat actors can now inflict major damage to revenue and brand reputation. Even as people spent less time online, bad bot traffic grew overall. Legitimate human traffic decreased by 28 percent, but bad bot traffic surged by 102 percent, meaning that the percentage of bad bots in total traffic has climbed even faster. The number of automated attacks has increased. Three common types of bot attacks on web applications increased year over year. Carding attacks increased 134 percent, account takeover attacks increased 108 percent, and scraping increased 107 percent. Certain industries were more vulnerable to bot attacks than others. Bad bots accounted for 57 percent of traffic to online businesses in the Media and Streaming industry. Just under half of traffic to organizations in the Travel and Hospitality (49 percent) and Ticketing and Entertainment (46 percent) industries were automated. This article continues to discuss key findings from HUMAN's 2023 Enterprise Bot Fraud Benchmark Report

    Help Net Security reports "Cybercriminals Use Proxies to Legitimize Fraudulent Requests"

  • news

    Visible to the public "Firmware Looms as the Next Frontier for Cybersecurity"

    Researchers found five vulnerabilities in servers run by over a dozen major companies, including Huawei, Qualcomm, Nvidia, AMD, Dell, and HP, in December. The flaws had CVSS scores ranging from 5.3 (medium severity) to 9.8 (critical). The flaws reside in firmware developed by American Megatrends International (AMI) for Baseboard Management Controllers (BMCs), which are processors manufactured by AMI. BMCs are chips that sit on motherboards and allow administrators to monitor and change almost everything on a machine, from applications and data down to low-level hardware. Nate Warfield, Eclypsium's director of threat research and intelligence, and Vlad Babkin, Eclypsium's security researcher, will argue that AMI's BMC flaws were symptomatic of something larger, and more structurally flawed, in firmware security. This article continues to discuss firmware security.

    Dark Reading reports "Firmware Looms as the Next Frontier for Cybersecurity"

  • news

    Visible to the public "Generative AI Helps Spot Malicious Open-Source Code"

    One company is helping developers research open-source software packages to discover code components that are secure from attacks. Endor Labs, a startup that helps governments and businesses secure open-source software, has released its DroidGPT tool in private beta, with plans to make it fully available in the next two months. Developers can log into the company's platform and use a conversational style to ask different questions, such as which packages have the fewest vulnerabilities. DroidGPT then generates results based on Endor Labs' massive and frequently updated database of open-source software. The results overlap with the company's data on the quality, popularity, trustworthiness, and security of each package. Developers in both the public and private sectors are increasingly reliant on open-source software, which has become the foundation of numerous technologies and applications. The Biden administration's 2021 executive order called for open-source software's "integrity and provenance" to be checked, as well as a Software Bill of Materials (SBOMs) to keep a formal record of the software supply chain used in building applications. Varun Badhwar, CEO of Endor Labs, stated that about 80 percent of the code that makes up applications is open-source, making it easier for developers but raising concerns about where it originates from, especially since there is no support structure in place to identify faulty code. This article continues to discuss Endor Labs' DroidGPT tool aimed at helping developers spot malicious open-source code.

    GCN reports "Generative AI Helps Spot Malicious Open-Source Code"

  • news

    Visible to the public "Are Meta and Twitter Making Cybersecurity Less Accessible?"

    Experts are concerned about the overall impact that new fees for security features on social media accounts will have on overall cybersecurity. Many are questioning whether basic security should be available to all users, regardless of whether they pay for it. For example, as of March 20, 2023, only subscribers to Twitter Blue, an upgraded account that starts at $8 a month, can use two-factor authentication (2FA) through text messages. In the past, all users could set their accounts to send a text code for new logins to prevent unauthorized access. In addition, Meta recently announced that its new subscription package, Meta Verified, includes impersonation protection for Facebook and Instagram users as part of its paid features. Experts are concerned about the consequences of this change because social media is the source of many cybercrimes. Although all accounts will have basic protection, only users with the financial means to pay will have access to the additional protections. Other users who do not understand the advantages of premium accounts may not choose to subscribe. Therefore, limiting security features to premium accounts, according to experts, will increase the overall cybersecurity risk. This article continues to discuss the potential impact of paid social media account security features on cybersecurity.

    Security Intelligence reports "Are Meta and Twitter Making Cybersecurity Less Accessible?"

  • news

    Visible to the public "CMU Hacking Team Defends Title at MITRE Cybersecurity Competition"

    Carnegie Mellon University's competitive hacking team, the Plaid Parliament of Pwning (PPP), won the top prize at the MITRE Embedded Capture-the-Flag (eCTF) cybersecurity competition for the second year in a row. PPP and 79 other collegiate-level teams worked for three months to design and implement a key fob system for a car door lock, securing the car from unauthorized entry and preventing attacks such as replays and key fob cloning. The yearly competition drew teams from around the world, with a record-breaking 546 student participants. The competition was divided into two parts: design and attack. Each phase provided chances to earn points by collecting flags and sending them to the live eCTF scoreboard. Hackers acted as a team of engineers at a car manufacturer throughout the design process, designing and building the embedded software that would be provisioned on the next line of cars and key fobs sold to customers. During the attack phase, teams had the opportunity to assess the designs of other groups, uncovering security holes as they attempted to unlock and start the vehicles without the vehicle owners' authorization. This article continues to discuss CMU's competitive hacking team PPP winning at the MITRE eCTF cybersecurity competition as well as the structure and benefits of eCTF competitions.

    CyLab reports "CMU Hacking Team Defends Title at MITRE Cybersecurity Competition"

  • news

    Visible to the public "MIT and Stanford Researchers Develop Operating System With One Major Promise: Resisting Ransomware"

    A team of researchers from the Massachusetts Institute of Technology (MIT) and Stanford University are working on an operating system that includes built-in cybersecurity protection. This new operating system will be resilient against common cyberattacks and recover from ransomware infections in minutes. Michael Stonebraker, a serial technology entrepreneur and computer scientist at MIT, is one of the individuals behind the project, with his work on database systems having earned him the Turing Award in 2015. Matei Zaharia, an associate professor at Stanford University and the creator of the Apache Spark project, and Jeremy Kepnew, the head of the MIT Lincoln Laboratory Supercomputing Center, are collaborating with Stonebraker on the operating system. The system is based on databases that save and track all events and changes within the operating system. This article continues to discuss the new operating system with built-in cybersecurity defenses developed by MIT and Stanford researchers.

    CyberScoop reports "MIT and Stanford Researchers Develop Operating System With One Major Promise: Resisting Ransomware"

  • news

    Visible to the public "U.S. Senator Introduces Bill Targeting AI's Shortfalls"

    On Thursday, Senator Michael Bennet introduced a bill that would create a task force to look at U.S. policies on artificial intelligence and identify how best to reduce threats to privacy, civil liberties, and due process. The widespread use of ChatGPT and other AI, which have been used for years to create text, imagery, and other content, has sparked a rush around the globe to figure out if and how it should be regulated. The job of the AI Task Force, which could include cabinet members, will be to identify shortfalls in regulatory oversight of AI and recommend reforms if needed. Bennet stated that there's going to have to be a lot of education around this set of issues because they're not well understood. He noted that there is going to be a lot of improvisation and iterative approaches to try to wrestle with this because AI is so new to everyone in the government. Under the bill, the task force would include an official from the Office of Management and Budget, the National Institute of Standards and Technology, and the Office of Science and Technology Policy as well as privacy and civil liberties officers from the Departments of Justice, State, Treasury, Defense, and other executive branch agencies. Under the terms of the bill, the task force would work for 18 months, issue a final report, and then shut down.

    Reuters reports: "U.S. Senator Introduces Bill Targeting AI's Shortfalls"

  • news

    Visible to the public "DHS S&T Forms New Startup Cohort to Strengthen Software Supply Chain Visibility Tools"

    The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has announced seven awardees for the "Software Supply Chain Visibility Tools" topic call, which pursued innovative technologies to provide Software Bill of Materials (SBOMs)-based capabilities for enterprise, system administrator, and software development community stakeholders. S&T's Silicon Valley Innovation Program (SVIP) issued the solicitation, looking for open-source-based technical solutions to provide the transparency that forms the foundation of a high-assurance software supply chain, and to enable visibility into software supply chains and new risk assessment capabilities. Melissa Oh, managing director of the SVIP, stated that it is essential to use innovative tools to create a more transparent software supply chain in order to defend against the growing number of software attacks. The seven awardees will collaborate to develop two key software modules: a multi-format SBOM translator and a software component identifier translator, which will be distributed as open-source libraries and integrated into their SBOM-enabled commercial products. Software vulnerabilities are a major cybersecurity risk, with known exploits serving as the primary route for malicious actors to perpetrate a variety of harms. Allan Friedman, the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) senior advisor and strategist, noted that leveraging SBOMs as critical elements of software security could mitigate the risk to the software supply chain and improve the response to new threats more quickly and effectively. This article continues to discuss the new startup cohort formed by DHS S&T to bolster software supply chain visibility tools.

    DHS reports "DHS S&T Forms New Startup Cohort to Strengthen Software Supply Chain Visibility Tools"

  • news

    Visible to the public "Ransomware Attack Disrupts IT Network at Hardenhuish School"

    A UK secondary school has recently revealed that it was hit by a cyberattack affecting its IT network. Hardenhuish School in Chippenham, Wiltshire, confirmed the attack on Thursday, saying hackers gained access to network infrastructure and then demanded a ransom for restoring access. It is currently unclear whether the school paid the ransom, but the school said its pupils' learning was their absolute focus, so they were doing their best to restore access to the affected systems. Rob Bolton, VP of EMEA at Versa Networks, stated that to protect against cyber threats, schools must implement advanced security controls to detect and resolve security issues quickly. Bolton noted that network segmentation is also a critical security control that limits malware movement and minimizes the impact of breaches. By prioritizing cybersecurity measures and investing in the necessary resources, schools can reduce the risk of falling victim to a cyberattack and ensure a safe and secure learning environment for their students. The Hardenhuish school cyberattack comes a few months after an audit by the National Cyber Security Centre (NCSC) showed that three-quarters (78%) of UK schools had experienced at least one type of cyber-incident.

    Infosecurity reports: "Ransomware Attack Disrupts IT Network at Hardenhuish School"

  • news

    Visible to the public "Texas Bank Breach Exposed Thousands of Social Security Numbers"

    HSB, a Texas-based financial institution, alerted customers about a Business Email Compromise (BEC) attack that compromised the personal data of thousands of customers. The company notified the Maine Attorney General's Office that threat actors may have gained access to customer names or other personal identifiers with Social Security numbers (SSNs), potentially exposing more than 17,000 customers. Malicious actors can use stolen SSNs in conjunction with names and driver's license numbers to commit fraud. The bank claims to have observed "unusual activity" on a former company employee's email account. The investigation revealed that the former employee was the victim of a phishing attack. Between July 28 to July 29, 2022, the threat actors had unauthorized access to the individual's HSB email account. The unauthorized activity only involved this email account. The letter of notice attached to the HSB breach notification states that all essential banking systems were unaffected and remain secure. The sensitive customer data was contained by attachments in the former employee's emails. This article continues to discuss the exposure of over 17,000 HSB customers' SSNs due to a suspected cyberattack.

    Cybernews reports "Texas Bank Breach Exposed Thousands of Social Security Numbers"

  • news

    Visible to the public "Cybersecurity Teams Are Overconfident of Their Ability to Deal With Threats"

    Immersive Labs' research found that while businesses are confident in their overall resilience against cyberattacks, security teams are inadequately prepared for cyber threats. The study surveyed 316 global cybersecurity training strategy decision-makers in the UK, the US, Canada, Germany, and Sweden. Eighty-two percent agree that if they had been better prepared, they could have mitigated some to all of the damage caused by their most significant cyber incident over the past year. Over 80 percent of respondents do not believe or are uncertain that their teams have the capability to respond to future attacks. Only 17 percent of respondents believe their cybersecurity team is fully staffed, and nearly half confess they are unable to measure their cyber capabilities, further undermining confidence in their organization's readiness. This article continues to discuss the need for cyber leaders to have a more effective approach to building resilience.

    BetaNews reports "Cybersecurity Teams Are Overconfident of Their Ability to Deal With Threats"

  • news

    Visible to the public "Vietnamese Hackers Linked to 'Malverposting' Campaign"

    According to security researchers at Guardio Labs, a recent "malverposting" campaign linked to a Vietnamese threat actor has been ongoing for months and is estimated to have infected over 500,000 devices worldwide in the past three months alone. The researchers stated that malverposting is the use of promoted social media posts and tweets to propagate malicious software and other security threats, and in this case, the abuse of Facebook's Ads service to deliver malware. The researchers noted that the initial enabler for those numbers is the abuse of Facebook's Ads service as the first stage delivery mechanism responsible for this mass propagation. The researchers observed that the Vietnamese campaign relied on malverposting while it evolved various evasion techniques. It particularly focused on the USA, Canada, England, and Australia. The researchers noted that this threat actor is creating new business profiles as well as hijacking real, reputable profiles with even millions of followers. They also repeatedly posted malicious clickbait on Facebook feeds promising adult-rated photo album downloads for free. Once victims click on those posts/links, a malicious ZIP file is downloaded to their computers. Inside are photo files (that are actually masqueraded executable files) that, when clicked, will initiate the infection process. The executable then opens a browser window popup with a decoy website showing related content. The researchers noted that while in the background, the stealer will silently deploy, execute and gain persistence to periodically exfiltrate one's sessions cookies, accounts, crypto-wallets, and more. The researchers clarified that they observed several variations of the latest payload, yet all shared a benign executable file to start the infection flow.

    Infosecurity reports: "Vietnamese Hackers Linked to 'Malverposting' Campaign"

  • news

    Visible to the public "Transparent Labeling of Training Data May Boost Trust in Artificial Intelligence"

    According to researchers at Pennsylvania State University, showing users that visual data input into Artificial Intelligence (AI) systems was correctly labeled could increase people's trust in AI. The team added that the findings could pave the way for scientists to better measure the relationship between labeling credibility, AI performance, and trust. In the study, the researchers discovered that high-quality image labeling increased people's perception of the credibility of the training data and their trust in the AI system. However, when the system displays additional signs of bias, some aspects of their trust decrease while others remain high. In order for AI systems to learn, they must first be trained using data that humans often label. According to S. Shyam Sundar James P. Jimirro Professor of Media Effects at the Donald P. Bellisario College of Communications and co-director of the Media Effects Research Laboratory at Penn State, the majority of users never see how the data is labeled, which raises questions about the accuracy and bias of those labels. Sundar explained that trusting AI systems involves having trust in AI's performance and its ability to accurately reflect reality and truth. This is only possible if the AI has been trained on a good data set. Ultimately, concerns regarding AI trust should be directed toward the training data upon which the AI is built. However, it has been difficult to convey the quality of training data to the general public. This article continues to discuss the research on boosting trust in AI through transparent labeling.

    Pennsylvania State University reports "Transparent Labeling of Training Data May Boost Trust in Artificial Intelligence"

  • news

    Visible to the public "Counting Photons for Quantum Computing"

    Engineers at Jefferson Lab contributed to the design and construction of a photon detection system that is essential to photonics-based quantum computing and unbreakable encryption. Nuclear physicists and quantum information experts have demonstrated the capability of a photon-number-resolving system to resolve more than 100 photons accurately. This accomplishment represents a significant stride forward in the development of quantum computing capabilities. It may also facilitate the quantum generation of truly random numbers, a long-sought objective in the development of unbreakable encryption techniques for applications such as military communications and financial transactions. Recently, the detector was disclosed in Nature Photonics. This article continues to discuss the research on the resolution of 100 photons and quantum generation of unbiased random numbers.

    Jefferson Lab reports "Counting Photons for Quantum Computing"

  • news

    Visible to the public "Google Bans 173,000 Bad Developers in 2022"

    Google recently claimed that it is making it harder for malicious developers to get their software published on its Play Store while removing large volumes of bad accounts. Google has revealed that it removed 173,000 bad accounts in 2022 and raised the bar for new developers by adding phone, email, and "other identity verification methods." This helped the firm to reduce the number of accounts used to publish apps that violate its policies. Google said it prevented 1.43 million of these apps from being published on the Play marketplace. All told, Google estimated that it prevented $2bn in "fraudulent and abusive" transactions. Google noted that they continued to partner with SDK providers to limit sensitive data access and sharing, enhancing the privacy posture for over one million apps on Google Play. Google said thanks to stronger Android platform protections and policies, and developer outreach and education, it also prevented around 500,000 submitted apps from unnecessarily accessing sensitive permissions over the past three years. Last year Google launched an App Security Improvements program which it claimed helped developers fix 500,000 security weaknesses impacting 300,000 apps with around 250 billion installs.

    Infosecurity reports: "Google Bans 173,000 Bad Developers in 2022"

  • news

    Visible to the public "Man Gets Four Years for Stealing Bitcoins Seized by Feds"

    An Ohio man has recently been sentenced to four years and three months behind bars after stealing 712 bitcoin ($21m), which were seized by investigators following the arrest of his brother. According to the Department of Justice (DoJ), Gary James Harmon, 31, of Cleveland, stole the cryptocurrency, which was the subject of "pending criminal forfeiture proceedings" in the case of his sibling, Larry Dean Harmon. Larry Harmon was arrested in February 2020 for operating a dark web cryptocurrency mixer known as Helix. It was used to launder over 350,000 Bitcoin, valued at the time of the transactions at over $300m, but which are now worth $10.3bn. The DoJ noted that the funds came from customers operating on dark web markets. During Harmon's arrest, law enforcers seized a cryptocurrency storage device containing funds generated by Helix, which were subject to forfeiture, meaning they were confiscated by the state. However, investigators were unable to recover the Bitcoin stored on the device due to built-in security features. The DoJ stated that Gary Harmon used his brother's logins to recreate and access the wallets stored on the device, transferring over 712 bitcoin to his own wallet. The digital currency was worth $4.8m at the time but is worth many times more today. Gary Harmon then laundered these funds through two online Bitcoin mixers before using the digital currency to finance some large purchases. Following his arrest, he subsequently agreed to forfeit to the state the crypto he stole, including over 647 Bitcoin, 2 Ethereum, and 17.4 million Dogecoin, which have a combined value in excess of $20m. Larry Harmon pleaded guilty to money laundering conspiracy in his case in August 2021.

    Infosecurity reports: "Man Gets Four Years for Stealing Bitcoins Seized by Feds"

  • news

    Visible to the public "Ukrainian Man Arrested for Selling Data on 300 Million People to Russians"

    A 36-year-old Ukrainian citizen was recently arrested for allegedly selling personal information belonging to over 300 million people to Russia, according to a statement from the Ukrainian cyber police. The individual used the messaging platform Telegram to sell the stolen information, which included passport data, taxpayer numbers, birth certificates, driver's licenses, and bank account data belonging to Ukrainian citizens and citizens of other European countries. Depending on the amount and nature of the information sought, he would sell access to the data for a price between $500 and $2,000. According to the cyber police, the individual sold the data to Russian citizens for rubles, a currency that is banned in Ukraine. When police arrived to search the suspect's home in Netishyn, a town of 36,000 people in western Ukraine, they seized several mobile phones, about 30 hard drives, SIM cards, computer equipment, and server equipment. The police stated that they are also investigating databases with restricted access that the suspect operated. The individual is facing charges for creating malicious software, illegally accessing information stored on computer networks, and more. The arrest brings further attention to how Telegram has become a popular but flawed cybercriminal tool. This article continues to discuss the arrest of a Ukrainian man for selling personal data on 300 million people to Russia and the increase in hacker-related posts on Telegram.

    The Record reports "Ukrainian Man Arrested for Selling Data on 300 Million People to Russians"

  • news

    Visible to the public "FDA, CISA Advise on Genomic Device Software Vulnerabilities"

    A software patch has been made available to prevent cybersecurity threats to patient care, genomic data, and provider networks posed by software vulnerabilities in benchtop and production-scale genomic sequencing instruments manufactured by Illumina. According to a letter to healthcare providers from the US Food and Drug Administration (FDA), malicious actors could take control of the devices, alter the software and patient test results, or compromise a provider's network and exfiltrate protected data. The FDA issued a statement to healthcare providers and laboratory personnel regarding the necessary steps to mitigate cybersecurity risks in Illumina's sequencing instruments. According to a medical advisory from the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the vulnerability affects the universal copy service in various versions of device control and operating software. The FDA noted that some laboratories may be using Illumina genomic sequencing devices for clinical diagnostic applications. In addition to the FDA and CISA, the FBI urges healthcare organizations to remain vigilant regarding medical device cybersecurity. The agency reports that risks associated with out-of-date software and a lack of security features in older hardware in unpatched, active medical devices are being increasingly targeted. In the event of a data compromise, genomic data is especially concerning. This article continues to discuss genomic device software vulnerabilities.

    HealthITNews reports "FDA, CISA Advise on Genomic Device Software Vulnerabilities"

  • news

    Visible to the public "ViperSoftX InfoStealer Adopts Sophisticated Techniques to Avoid Detection"

    Many consumers and businesses in Australia, Japan, the US, and India have been infected with the evasive information-stealing malware ViperSoftX. ViperSoftX was first discovered in 2020, and in November 2022, the cybersecurity company Avast described a campaign that involved the malware in distributing a malicious Google Chrome extension capable of stealing cryptocurrencies from wallet applications. A new analysis by Trend Micro reveals that the malware now uses more sophisticated encryption and basic anti-analysis techniques, such as byte remapping and web browser communication blocking. The vector of entry for ViperSoftX is typically a software crack or a key generator (keygen), but it also uses non-malicious applications such as multimedia editors and system cleaners as "carriers." Before downloading the first-stage PowerShell loader, the malware performs a series of anti-virtual machine, anti-monitoring, and anti-malware checks. The loader then decrypts and initiates a second-stage PowerShell script retrieved from a remote server, which launches the primary routine responsible for installing malicious browser extensions to exfiltrate passwords and cryptocurrency wallet data. This article continues to discuss researchers' findings and observations regarding the ViperSoftX information-stealing malware.

    THN reports "ViperSoftX InfoStealer Adopts Sophisticated Techniques to Avoid Detection"

  • news

    Visible to the public "Android Minecraft Clones With 35M Downloads Infect Users With Adware"

    A collection of 38 Minecraft clones on Google Play infected devices with the Android adware HiddenAds in order to secretly load advertisements in the background to generate revenue for the operators. Numerous game publishers have attempted to replicate the success of Minecraft, a sandbox game with 140 million monthly active users. About 35 million Android users downloaded games resembling Minecraft that hid the adware, primarily from the US, Canada, South Korea, and Brazil. These users did not notice the adware activity taking place in the background because they were able to play the games as advertised. Additionally, any potential overheating, increased network data usage, or battery consumption caused by loading advertisements may be attributed to the game. The adware set was discovered by McAfee's Mobile Research Team, which was formed to defend Google Play against all forms of threats. All of the apps have been removed from the store following their reporting. This article continues to discuss Minecraft copycat games on Google Play infecting devices with the Android adware HiddenAds.

    Bleeping Computer reports "Android Minecraft Clones With 35M Downloads Infect Users With Adware"

  • news

    Visible to the public "Phishing-Resistant MFA Shapes the Future of Authentication Forms"

    According to Yubico, organizations have continued to rely on the least secure forms of authentication, such as traditional usernames and passwords and one-time passwords (OTPs), over the past two years, based on a survey of over 500 Information Technology (IT) leaders in the US and Canada. Fifty-nine percent of respondents reported a security breach in the past year, an increase of 6 percent over the past two years. In addition, there has been a significant increase in MFA deployment among customers, which increased from 45 percent to 57 percent. Ronnie Manning, CMO of Yubico, noted that not all MFA tools are created equal, and despite the fact that businesses are aware that legacy MFA tools are ineffective for maintaining security, they continue to rely on them as their primary line of defense. Manning added that education regarding the significance of phishing-resistant MFA is more important to move away from legacy MFA tools that leave thousands of businesses vulnerable to attacks. This article continues to discuss key findings from research on the top MFA trends among businesses today and the critical forces shaping authentication.

    Help Net Security reports "Phishing-Resistant MFA Shapes the Future of Authentication Forms"

  • news

    Visible to the public "Malware-Free Cyberattacks Are on the Rise; Here's How to Detect Them"

    According to George Kurtz, CEO of CrowdStrike, and Michael Sentonas, president of the company, 71 percent of enterprise cyberattacks in 2022 were conducted without malware. At this year's RSA Conference, Kurtz and Sentonas walked the audience through a case study of how easily a threat actor can not only penetrate a network but also move laterally and remain undetected, showing the difficulty cybersecurity teams face when attempting to detect malwareless compromises. They detailed the "Spider" cybercrime group as a prime example of the phenomenon. Endpoint Detection and Response (EDR) and other malware detection technologies are not particularly useful for defending the enterprise against malware-free cyberattacks as there is no malicious code to detect. Instead, organizations are advised to focus on collecting as much telemetry as possible from the endpoint to the cloud and managing identity to the smallest details. However, after collecting all of this telemetry and identity data, teams are left with enormous amounts of information that are not particularly useful for threat hunting. This is where Artificial Intelligence (AI) and Machine Learning (ML) can be applied effectively to search for anomalous activity, such as newly created user accounts, to detect malicious activity without malicious code. This article continues to discuss the rise in malware-free cyberattacks and how to detect them.

    Dark Reading reports "Malware-Free Cyberattacks Are on the Rise; Here's How to Detect Them"

  • news

    Visible to the public Pub Crawl #73


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Johns Hopkins APL's Out-of-Band Communications Technology Receives Boost From Department of Homeland Security"

    Out-of-Band over Existing Communication (OBEC) is a novel communications technology developed at the Johns Hopkins University Applied Physics Laboratory (APL) to provide secure access to networks experiencing disruptions or cyberattacks. APL is one of seven federal laboratories to receive funding from the Science and Technology Directorate (S&T) of the Department of Homeland Security (DHS) in the latest round of the Commercialization Accelerator Program (CAP). The OBEC technology enables the creation of a new, physically isolated Out-of-Band (OOB) network on an existing Ethernet infrastructure, without the need for additional networking equipment or wireless connections. OOB communications occur outside of the normal systems, allowing users to communicate privately and securely, even on a compromised network. Alexander Beall, an electrical engineer at APL and project manager in the Asymmetric Operations Sector's Cyber Operations Mission Area, emphasizes that Industrial Control System (ICS) network connectivity is essential to operating and managing facilities and their processes. Cyberattacks on the network can have wide-reaching and severe effects, potentially endangering operators' safety, disrupting critical operations, and causing costly downtime. Beall and OBEC co-inventor Joseph Moore say that OOB communication supports network resilience, situational awareness, and secure management of networked devices by establishing alternative communication paths to manage network infrastructure devices. These alternative paths separate non-essential traffic from operational traffic, preventing hackers from compromising network infrastructure or interfering with network operations. This article continues to discuss APL's OBEC technology and its boost from DHS.

    The Johns Hopkins University Applied Physics Laboratory reports "Johns Hopkins APL's Out-of-Band Communications Technology Receives Boost From Department of Homeland Security"

  • news

    Visible to the public "CESER Supports DOE's $38 Million Funding Opportunity to Secure the Grid of the Future"

    The US Department of Energy (DOE) recently announced a $38 million funding opportunity for National Laboratories in support of critical research and development priorities regarding developing an electricity grid that provides secure, resilient, flexible, sustainable, affordable, and equitable electricity. This Grid Modernization Initiative (GMI) funding will be used to develop and support the deployment of concepts, tools, and technologies to improve national cybersecurity, better integrate all sources of electricity and energy storage, and more. GMI expects to make awards for projects on Cybersecurity for Architectures, Standards, and Practices (CASP), Quantum Facilities for Computing, Sensing, and Security (qFACSS), and other topics. The CASP project focuses on assessing and developing cybersecurity technical architectures, standards, and guidelines to protect the electric utility infrastructure during the transition to and operation on a decarbonized grid. The qFACSS project focuses on using existing and near-term quantum computing, sensing, and security technologies to address the grid's vulnerabilities and growing complexity. This article continues to discuss the initiative to secure the power grid.

    The US Department of Energy reports "CESER Supports DOE's $38 Million Funding Opportunity to Secure the Grid of the Future"

  • news

    Visible to the public "Thermal Cameras and Machine Learning Combine to Snoop Out Passwords"

    A team of researchers at the University of Glasgow published a paper describing their method, ThermoSecure, which discovers passwords and PINs. ThermoSecure involves using a combination of thermal imaging technology and Artificial Intelligence (AI) to expose passwords on input devices such as keyboards, touchpads, and touch screens. According to the researchers, during testing, ThermoSecure effectively attacked 6-symbol, 8-symbol, 12-symbol, and 16-symbol passwords with an average accuracy of 92 percent, 80 percent, 71 percent, and 55 percent, respectively. Furthermore, these results were based on relatively 'cold' evidence, and the paper adds that thermal images captured within 30 seconds provide even greater accuracy. The system requires a thermal camera, which has become significantly less expensive in recent years. According to the research paper, a useful device may only cost $150. In regard to AI, the system uses a Mask RCNN-based object detection technique that essentially maps the thermal image to keys. In three phases, variables such as keyboard localization are considered, followed by key entry and multi-press detection, and then algorithms determine the order of key presses. This article continues to discuss the research on thermal attacks against passwords.

    Tom's Hardware reports "Thermal Cameras and Machine Learning Combine to Snoop Out Passwords"

  • news

    Visible to the public "KillNet: We Are Now a Private Military Corporation"

    KillNet, the pro-Russian hacker group notorious for launching Distributed Denial-of-Service (DDoS) attacks, will offer its services to private and state sponsors, according to Killmilk, the group's leader. "KillNet's altruism has come to an end," the group's leader announced on the Telegram channel the gang uses to publicize its latest attacks. Since Russia invaded Ukraine on February 24, KillNet has primarily targeted Ukraine-supporting organizations with DDoS attacks. However, recently, the group appears to have surpassed its usual boundaries, leaking stolen data allegedly belonging to thousands of individuals with connections to NATO. The recent statement by Killmilk on Telegram suggests that the gang's hacktivism has turned to profiteering. According to the gang's leader, KillNet will now be known as a "private military hacker company." Nevertheless, Killmilk has promised that KillNet will continue its destructive activities in support of Russia's interests despite going private. Experts have cautioned against underestimating threat actors who primarily launch DDoS attacks, but their effectiveness remains in question as most of KillNet's targets experience a few hours of downtime before resuming normal operations. This article continues to discuss the KillNet gang becoming a private military hacker company and experts' thoughts on this announced change.

    Cybernews reports "KillNet: We Are Now a Private Military Corporation"

  • news

    Visible to the public "(ISC)2 Urges Countries to Strengthen Collaboration on Cybersecurity Regulation"

    According to (ISC)2, as cybersecurity policies and regulations evolve rapidly worldwide, greater collaboration is necessary to ensure more robust and resilient frameworks to support shared learning and best practices. The international cybersecurity non-profit has led new research in collaboration with the Royal United Services Institute (RUSI), a British think tank, examining cybersecurity legislation and regulation within the UK, the US, Canada, the EU, Japan, and Singapore. The RUSI and (ISC)2 researchers identified various challenges shaping cyber policy across all six jurisdictions, including the need to tackle the shortage of skilled cybersecurity professionals and the growing importance of protecting the critical national infrastructure (CNI). While these two priorities are shared by all six jurisdictions analyzed, the study provides valuable insights on the different approaches these countries take to solve them. The researchers stated that by bringing together insights from different jurisdictions and stakeholders, the study also shows the importance of cooperation between private and public stakeholders and that policymakers increasingly seek harmonization of cyber policy. The researchers stated that it is important to understand which policies are effective in increasing cyber resilience and how they impact businesses and the cyber workforce implementing them. The researchers noted that "ally countries should adopt "a proactive, rather than reactive, approach toward cybersecurity policy and collaborate across borders, industries, and sectors to establish common standards, protocols, and best practices." The research was conducted from December 2022 to March 2023 and was primarily based on a review of existing literature about policies enacted or proposed within the six jurisdictions between 2019 and 2023.

    Infosecurity reports: "(ISC)2 Urges Countries to Strengthen Collaboration on Cybersecurity Regulation"

  • news

    Visible to the public "New ‘Atomic macOS Stealer’ Malware Offered for $1,000 Per Month"

    Security researchers at Cyble have revealed that a new piece of macOS malware named Atomic macOS Stealer, or AMOS, appears to provide a wide range of data theft capabilities, targeting passwords, files, and other types of information. The researchers analyzed a sample of the AMOS malware that was uploaded recently to VirusTotal and which had zero detections on the malware analysis platform at the time of its discovery. It has currently only been detected by one antimalware engine. According to the researchers, the malware, advertised on a Telegram channel, has been offered for $1,000 per month. Its author claims it can steal all passwords from the Keychain, full system information, and files from the compromised computer. It can also allegedly steal passwords, cookies, cryptocurrency wallets, and payment card data from browsers such as Chrome, Firefox, Brave, Edge, Vivaldi, Yandex, and Opera. It can also steal cryptocurrency wallets outside the web browser and from browser extensions. The researchers stated that users of the malware are provided a web-based management interface hosted on a .ru domain, and exfiltrated data can also be sent to specified Telegram channels. The malware is delivered as a .dmg file, and when first executed, it displays a fake prompt to trick the victim into handing over their macOS system password. A researcher from Trellix has also analyzed the malware and noticed that an IP address used by AMOS might be linked to Raccoon Stealer, a piece of malware previously tied to Russian and Ukrainian threat actors. The researchers noted that it is unclear if the malware is signed and how much effort it takes to get it to bypass macOS security features and get it to execute on a system. The researchers stated that in many cases, malware designed to run on macOS may appear to have numerous capabilities, but actually getting it to execute on targeted systems is not an easy task.

    SecurityWeek reports: "New 'Atomic macOS Stealer' Malware Offered for $1,000 Per Month"

  • news

    Visible to the public "Google Goes After CryptBot Distributors"

    Google has recently revealed details of a new legal campaign to pursue the operators of prolific information-stealing malware, which has so far infected an estimated 670,000 computers. Google launched a civil case against several of CryptBot's major distributors, which it said are likely based in Pakistan. Google stated that to hamper the spread of CryptBot, the court has granted a temporary restraining order to bolster their ongoing technical disruption efforts against the distributors and their infrastructure. The court order allows Google to take down current and future domains that are tied to the distribution of CryptBot. Google noted that this will slow new infections from occurring and decelerate the growth of CryptBot. Google stated that lawsuits have the effect of establishing both legal precedents and putting those profiting and others who are in the same criminal ecosystem under scrutiny. CryptBot is typically hidden in legitimate-seeming but maliciously modified software like Google Earth Pro and Google Chrome. Google stated that if consumers unwittingly download the software, the CryptBot malware will get to work stealing authentication credentials, social media account logins, cryptocurrency wallets, and more from their machines.

    Infosecurity reports: "Google Goes After CryptBot Distributors"

  • news

    Visible to the public "Using Quantum Physics to Secure Wireless Devices"

    The security of communication between wireless devices, such as access cards, key fobs, Bluetooth speakers, and more, is essential to maintaining privacy and preventing theft. However, these tools are not foolproof, and it is becoming easier to find information on how to hack, clone, and circumvent these systems. Therefore, computer engineers at the University of Illinois Chicago (UIC) have been researching methods for developing more secure devices. In a new paper, UIC researchers describe a quantum physics-inspired method for improving wireless device identification and securing device-to-device communication. It uses a truly random and unique digital fingerprint to create a nearly unbreakable hardware encryption system. The scientists used a quantum physics theory with mathematical experiments to identify a "divergent exceptional point." Quantum physics describes systems that are difficult or impossible to measure precisely, and a quantum state describes a parameter space or range of possible measurements. There are exceptional points within these states where the system's uncertainty is at its maximum. These points present promise for cryptography because the more uncertain the system is, the more secure it is. This article continues to discuss the research on spectral sensitivity near exceptional points as a resource for hardware encryption.

    The University of Illinois Chicago reports "Using Quantum Physics to Secure Wireless Devices"

  • news

    Visible to the public "Microsoft Blames Clop Affiliate for PaperCut Attacks"

    Microsoft has recently claimed that recent attacks exploiting two vulnerabilities in the PaperCut print management software are likely the result of a Clop ransomware affiliate. The two bugs in question are CVE-2023-27350, a critical unauthenticated remote code execution flaw, and CVE-2023-27351, a high severity unauthenticated information disclosure flaw. The former has a CVSS score of 9.8. Microsoft Threat Intelligence attributed recent attacks exploiting the bugs to "Lace Tempest," a threat actor it says overlaps with FIN11 and TA505. FIN11 is linked to the infamous Clop ransomware gang and the Accellion FTA extortion campaign, while TA505 is reportedly behind the Dridex banking Trojan and Locky ransomware. Microsoft stated that also known as DEV-0950, Lace Tempest is a Clop ransomware affiliate that has previously been detected using GoAnywhere exploits and Raspberry Robin malware in ransomware campaigns. Microsoft said the threat group exploited the PaperCut bugs in attacks as early as April 13. Microsoft stated that in observed attacks, Lace Tempest ran multiple PowerShell commands to deliver a TrueBot DLL, which connected to a C2 server, attempted to steal LSASS credentials, and injected the TrueBot payload into the conhost.exe service. Next, Lace Tempest delivered a Cobalt Strike Beacon implant, conducted reconnaissance on connected systems, and moved laterally using WMI. The actor then identified and exfiltrated files of interest using the file-sharing app MegaSync. Microsoft noted that other groups might also be exploiting the two PaperCut vulnerabilities in the wild, noting that some intrusions had led to the deployment of the prolific LockBit ransomware.

    Infosecurity reports: "Microsoft Blames Clop Affiliate for PaperCut Attacks"

  • news

    Visible to the public "RTM Locker's First Linux Ransomware Strain Targeting NAS and ESXi Hosts"

    The threat actors behind RTM Locker have a new ransomware strain capable of infecting Linux systems. Uptycs stated in a new report that the locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by the leaked source code of the Babuk ransomware. Files are encrypted using a combination of ECDH on Curve25519 (asymmetric encryption) and Chacha20 (symmetric encryption). Trellix first documented RTM Locker earlier this month, citing the adversary as a private Ransomware-as-a-Service (RaaS) provider. Read The Manual (RTM), a cybercriminal group active at least since 2015, is its source. The group is known for avoiding high-profile targets, such as critical infrastructure, law enforcement, and hospitals, in order to attract the least amount of attention possible. In addition to using affiliates to extort victims, it leaks stolen information if they refuse to pay. Before starting the encryption process, the Linux variant terminates all virtual machines operating on a compromised host, singling out ESXi hosts. The initial infector used to distribute ransomware is currently unknown. This article continues to discuss researchers' findings and observations regarding RTM Locker's first Linux ransomware strain.

    THN reports "RTM Locker's First Linux Ransomware Strain Targeting NAS and ESXi Hosts"

  • news

    Visible to the public "CISOs Struggle to Manage Risk Due to DevSecOps Inefficiencies"

    According to Dynatrace, as hybrid and multi-cloud environments become more complex and teams continue to rely on manual processes that make it easier for vulnerabilities to enter production environments, it becomes more difficult for CISOs to keep software secure. DevSecOps adoption is hindered by the continued use of siloed tools for development, delivery, and security tasks. This emphasizes the increasing need for observability and security to converge in order to fuel data-driven automation that enables development, security, and Information Technology (IT) operations teams to deliver faster, more secure innovation. Sixty-eight percent of CISOs report that vulnerability management has become more difficult due to the increased complexity of their software supply chain and cloud ecosystem. Before deployment in production environments, only 50 percent of CISOs are confident that the software delivered by development teams has been thoroughly tested for vulnerabilities. Additionally, 77 percent of CISOs say it is difficult to prioritize vulnerabilities due to a lack of information about the risk they pose to their environment. Fifty-eight percent of vulnerability alerts that security scanners alone flag as "critical" are not significant in production, wasting development time pursuing false positives. On average, members of development and application security teams dedicate 28 percent of their time, or 11 hours per week, on vulnerability management tasks, which could be automated. This article continues to discuss key findings from Dynatrace's report on CISOs struggling to manage risk due to DevSecOps inefficiencies.

    Help Net Security reports "CISOs Struggle to Manage Risk Due to DevSecOps Inefficiencies"

  • news

    Visible to the public "Tencent QQ Users Hacked in Mysterious Malware Attack, Says ESET"

    The Chinese Advanced Persistent Threat (APT) hacking group known as Evasive Panda is linked to an attack that distributed the MsgBot malware as part of an automatic update for the Tencent QQ messaging app. Since 2012, the cyberespionage group Evasive Panda has targeted organizations and individuals in China, Hong Kong, Macao, Nigeria, and numerous Southeast and East Asian countries. In January 2022, security researchers at ESET discovered the threat actor's most recent campaign, citing evidence that the operation began in 2020. Most of the campaign's victims are members of an international Non-Governmental Organization (NGO) and reside in the provinces of Gansu, Guangdong, and Jiangsu, indicating a highly targeted approach. According to ESET, the malicious MsgBot malware payload was delivered to victims as a Tencent QQ software update from developer-connected URLs and IP addresses. This indicates two possible attack scenarios: a supply chain attack and an adversary-in-the-middle (AITM) attack. This article continues to discuss the Evasive Panda APT group compromising the Tencent QQ messaging app.

    Bleeping Computer reports "Tencent QQ Users Hacked in Mysterious Malware Attack, Says ESET"

  • news

    Visible to the public "Metaverse Version of the Dark Web Could Be Nearly Impenetrable"

    In the coming years, as the metaverse takes shape, many security issues plaguing cyberspace will also begin to affect virtual space. One of the threats will be the emergence of a new "darkverse," where criminals will be able to operate with greater impunity and danger than they can on the Dark Web today, according to two Trend Micro researchers speaking at an RSA Conference 2023 session on April 26 in San Francisco. The metaverse is a term used to describe a virtual space where individuals and organizations can interact in a computer-generated version of the physical world. A full-fledged metaverse will enable users to shop, work, socialize, and engage in other activities in a virtual replica of the physical world, similar to how multiplayer online games allow users to create digital avatars of themselves and interact with other gamers in fantasy worlds. According to the researchers, the same phenomenon will occur in the cybercriminal underworld. They noted that, just as the Dark Web exists on an unindexed deep web, the darkverse will operate within an unindexed "deepverse" that will be difficult for law enforcement to penetrate. Senior threat researchers at Trend Micro released a report last year detailing how security and privacy threats will likely emerge and evolve in the metaverse as its use increases. Among the threats identified in the report were amplified versions of some existing issues, such as social engineering, financial fraud, and privacy risks, as well as some novel threats, such as risks associated with NFTs, and cyber-physical threats. This article continues to discuss why it will be difficult for law enforcement to take down criminal activities on the deepverse.

    Dark Reading reports "Metaverse Version of the Dark Web Could Be Nearly Impenetrable"