News Items

  • news

    Visible to the public "DHS Announces AI Task Force, Security Sprint on China-Related Threats"

    The US Department of Homeland Security (DHS) announced two initiatives that will directly contribute to US strategies for defending critical infrastructure and essential services against cyberattacks, physical attacks, Artificial Intelligence (AI), and other threats. Secretary of Homeland Security Alejandro Mayorkas announced that the department will establish a new task force to guide the incorporation of AI technologies into departmental operations and assess how defenders and adversaries may use these technologies. It will also assess the Chinese government's defensive capabilities and threats to the nation's supply chains and critical infrastructure. The AI task force will help DHS in addressing the various offensive and defensive security implications of the rapidly growing and evolving technology, as Large Language Models (LLMs) such as ChatGPT have caught the public's attention and the attention of security researchers, who say the tools can potentially lower the barrier to entry for malicious actors in cyberspace and create custom phishing, social engineering, and mis-and-disinformation products. This article continues to discuss the DHS' efforts to better handle threats to the nation from AI and the Chinese government.

    SC Magazine reports "DHS Announces AI Task Force, Security Sprint on China-Related Threats"

  • news

    Visible to the public "Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job"

    The Lazarus Group, a notorious state-sponsored threat actor with ties to North Korea, has been linked to a new campaign targeting Linux users. According to a new report by ESET, the attacks are part of a persistent and long-running activity known as Operation Dream Job. The findings mark the first instance of the group using Linux malware as part of this social engineering scheme. Operation Dream Job, also known as DeathNote or NukeSped, refers to multiple attack waves in which the group uses fraudulent employment offers as an enticement to convince unsuspecting targets to download malware. In addition, there are overlaps with two other Lazarus clusters called Operation In(ter)ception and Operation North Star. Similarly, the attack chain discovered by ESET delivers a fake HSBC job offer as a decoy within a ZIP archive file, which is then used to initiate a Linux backdoor named SimplexTea distributed via an OpenDrive cloud storage account. This article continues to discuss the Lazarus Group's new campaign against Linux users.

    THN reports "Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job"

  • news

    Visible to the public "Outdated Cybersecurity Practices Leave Door Open for Criminals"

    According to ExtraHop, organizations experienced a considerable increase in ransomware, from an average of four attacks over five years in 2021 to four attacks over one year in 2022. Eighty-three percent of victims confessed to having paid the ransom at least once. As organizations find themselves increasingly under attack, it has been discovered that they are overwhelmed with unpatched software, unmanaged devices, shadow Information Technology (IT), and insecure network protocols that serve as entry points for malicious actors. In addition, 77 percent of IT decision-makers believe out-of-date cybersecurity practices have contributed to at least 50 percent of the security incidents their organizations have encountered. Despite these alarming statistics, fewer than one-third of them indicated they have immediate plans to resolve any of their organizations' outdated security practices. This article continues to discuss key findings from ExtraHop's report "2023 Global Cyber Confidence Index: Cybersecurity Debt Drives Up Costs and Ransomware Risk."

    Help Net Security reports "Outdated Cybersecurity Practices Leave Door Open for Criminals"

  • news

    Visible to the public "Attackers Use Abandoned WordPress Plugin to Backdoor Websites"

    Attackers are injecting stealthy backdoors into websites using Eval PHP, an outdated WordPress plugin. Eval PHP is an outdated WordPress plugin that enables site administrators to embed PHP code on WordPress pages and posts, which is then executed when the page is loaded in the browser. The plugin has not been updated in a decade and is generally regarded as abandonware, but it is still accessible via the WordPress plugins repository. According to the website security company Sucuri, the use of Eval PHP to embed malicious code on seemingly harmless WordPress pages increased in April 2023, with an average of 4,000 malicious installations per day of the WordPress plugin. The primary advantage of this method over traditional backdoor injections is that Eval PHP can be used to reinfect cleaned sites while the point of compromise remains relatively hidden. This article continues to discuss attackers' use of the old Eval PHP WordPress plugin to compromise websites.

    Bleeping Computer reports "Attackers Use Abandoned WordPress Plugin to Backdoor Websites"

  • news

    Visible to the public "'GhostToken' Opens Google Accounts to Permanent Infection"

    A security flaw in Google's Cloud Platform (GCP) could have allowed cybercriminals to hide an unremovable, malicious app within a victim's Google account, rendering the account permanently infected. The "GhostToken" vulnerability was identified and reported by Astrix Security researchers. According to an analysis, the malicious app could have enabled a wide range of malicious actions, such as reading the victim's Gmail account, accessing files in Google Drive and Google Photos, viewing the Google calendar, and monitoring the victim's location using Google Maps. Armed with this information, attackers could create highly convincing impersonation and phishing attacks. The GCP is designed to host any of thousands of end-user apps, which, like other app ecosystems, have an official store from which they can be readily downloaded. In this case, it is the Google Marketplace and third-party markets. Once the user authorizes a download, the app receives a token that grants access to the installer's Google account based on the permissions requested by the app. Using the GhostToken vulnerability, cybercriminals are able to create malicious apps that they can plant in app stores under the guise of a legitimate utility or service. However, once downloaded, the app will hide from the victim's Google account app management page. This article continues to discuss findings regarding the potential exploitation and impact of the GhostToken vulnerability.

    Dark Reading reports "'GhostToken' Opens Google Accounts to Permanent Infection"

  • news

    Visible to the public "North Korean Hacker Suspected in 3CX Software Supply Chain Attack"

    The 3CX Desktop App software has been reportedly compromised via a prior software supply chain breach, with a North Korean actor suspected to be responsible. Security researchers at Mandiant stated the initial compromise was traced back to malware from financial software firm Trading Technologies' website. The researchers noted that the first attack saw hackers place a backdoor into an application available on the website known as X_Trader 1. That infected app, later installed on the computer of a 3CX employee, allowed the hackers to spread their access through 3CX's network. Mandiant said this would be the first observed instance of one software supply chain attack leading to another. The researchers noted that in late March 2023, a software supply chain compromise spread malware via a trojanized version of 3CX's legitimate software that was available to download from their website. The researchers stated that the attack shows the potential reach of this type of compromise, particularly when a threat actor can chain intrusions, as demonstrated in this investigation. The security experts said the affected versions of 3CX were DesktopApp 18.12.416 and earlier, which contained malicious code. The code ran a downloader, Suddenicon, which in turn received additional command and control (C2) servers from encrypted icon files hosted on GitHub. The decrypted C2 server was then used to download a third-stage payload called Iconicstealer, a data miner that steals browser information. Mandiant said the researchers are currently tracking this malicious activity as UNC4736, a suspected North Korean nexus cluster of activity.

    Infosecurity reports: "North Korean Hacker Suspected in 3CX Software Supply Chain Attack"

  • news

    Visible to the public "VCU Researchers Fight Cybercrime With New Digital Tools and Techniques"

    Irfan Ahmed, Ph.D., provides defenders with digital forensic tools and the knowledge to use them in cybersecurity. Ahmed is an associate professor of computer science and the director of the Virginia Commonwealth University (VCU) Engineering Department of Computer Science's Security and Forensics Engineering (SAFE) Lab. In the SAFE Lab, he leads two projects funded by the US Department of Homeland Security (DHS) that aim to keep industrial systems secure from criminals and demonstrate how the same tools developed for investigating cyberattacks can be used to investigate other crimes. Cyberattacks on physical infrastructure could be launched to disrupt systems or hold them for ransom. The focus of Ahmed's SAFE Lab is the protection of Industrial Control Systems (ICS) used in the operation of nuclear plants, dams, electricity systems, and more. Cyberattacks often target the control logic of software architecture, which receives instructions from the user and passes them to a Programmable Logic Controller (PLC) for execution. For example, the control logic monitoring a natural gas pipeline could be programmed to open a valve if the system detects high pressure. Programmers and attackers can modify the control logic. One of Ahmed's DHS-funded projects, titled "Digital Forensic Tools and Techniques for Investigating Control Logic Attacks in Industrial Control Systems," supports the development of devices and techniques that cyber detectives can use to conduct investigations. This article continues to discuss Ahmed's work to protect nuclear plants and other critical infrastructure from cybercrime.

    Virginia Commonwealth University reports "VCU Researchers Fight Cybercrime With New Digital Tools and Techniques"

  • news

    Visible to the public "Turning AI to Crime"

    The Artificial Intelligence (AI) chatbot ChatGPT has been generating a great deal of buzz in the news and on social media regarding its ability to write blogs, software source code, and frameworks. People are sharing what they have done with the Large Language Model (LLM)-based bot and what they plan to do in the future. Their applications include product prototyping, virtual assistants, and nearly limitless duties. Cybercriminals have experimented with ChatGPT. Based on dark web forums, cybercriminals are using ChatGPT to generate malicious code. According to Nicole Sette, associate managing director of the cyber risk business at Kroll, a corporate investigation and risk consultancy, most researchers agree that chatbots are not yet optimized for code creation, as they lack the creativity to develop new code. However, in March 2023, Kroll observed hacking forum users discussing methods for bypassing ChatGPT restrictions and using the program to generate code. Sette explains that other forum users shared code for circumventing ChatGPT's Terms of Service, also known as 'jailbreaking ChatGPT,' in various dark web forums. Threat actors have discovered methods to use chatbots to write malware, including information stealers. Check Point Research reported that someone on an underground hacker forum used ChatGPT to recreate a Python-based information stealer using published analyses of prevalent malware. This article continues to discuss how cybercriminals are using ChatGPT.

    CACM reports "Turning AI to Crime"

  • news

    Visible to the public "OpenAI's Hunger for Data Is Coming Back to Bite It"

    Following a temporary suspension in Italy and several investigations in other European Union countries, OpenAI has just over a week to comply with European data protection laws. Failure to comply could result in costly fines, data deletion requirements, or even a ban. However, experts say that OpenAI's compliance with the rules will be nearly impossible. This is because the data used to train its Artificial Intelligence (AI) models was collected by scraping the Internet for content. The dominant principle in AI development is that more training data is preferable. The data set for OpenAI's GPT-2 model consisted of 40 GB of text. ChatGPT is based on GPT-3, which was trained on 570 GB of data. OpenAI has not disclosed the size of the data set for its most recent model, GPT-4, but the company's desire for larger models is now coming back to haunt it. Several Western data protection authorities have launched investigations into how OpenAI collects and processes the data that powers ChatGPT in recent weeks. They believe it has extracted and used the personal information of individuals without permission, such as their names and email addresses. This article continues to discuss OpenAI's AI services potentially breaking data protection laws and why it could be impossible for the company to comply with data protection rules.

    MIT Technology Review reports "OpenAI's Hunger for Data Is Coming Back to Bite It"

  • news

    Visible to the public "Cisco Patches Critical Vulnerabilities in Industrial Network Director, Modeling Labs"

    Cisco recently announced patches for critical vulnerabilities impacting its Industrial Network Director and Modeling Labs solutions. Designed for industrial network management, Industrial Network Director (IND) provides visibility into network and automation devices. Cisco released fixes for a critical-severity flaw in the web interface of IND that could be exploited remotely to execute commands on the underlying operating system. Tracked as CVE-2023-20036 (CVSS score of 9.9), the issue exists because input was not properly validated when uploading a device pack. An authenticated attacker could alter the upload request and execute commands with administrative privileges. Cisco IND version 1.11.3 resolves this vulnerability along with a medium-severity bug that could allow an attacker to read application data. This week, Cisco also released patches for a critical-severity flaw in the external authentication mechanism of Modeling Labs, an on-premises network simulation tool. Tracked as CVE-2023-20154 (CVSS score of 9.1), the issue is the result of improper handling of certain messages returned by the external authentication server. The security defect was patched with the release of Modeling Labs version 2.5.1. Cisco noted that an attacker could exploit this vulnerability by logging in to the web interface of an affected server. Under certain conditions, the authentication mechanism would be bypassed, and the attacker would be logged in as an administrator. Successful exploitation of the vulnerability would allow the attacker to access and modify simulations and user-created data. Cisco stated that to exploit this vulnerability, the attacker would need valid user credentials that are stored on the associated external authentication server. Recently the company also announced patches for high-severity vulnerabilities in StarOS software and the BroadWorks network server that could lead to privilege escalation and denial-of-service (DoS), respectively. Cisco warned that proof-of-concept (PoC) exploitation code targeting the StarOS software bug (which is tracked as CVE-2023-20046) has been publicly released. The tech giant says it is unaware of these vulnerabilities being exploited in attacks. However, customers are advised to apply the available fixes as soon as possible, as unpatched Cisco products are known to have been exploited in the wild.

    SecurityWeek reports: "Cisco Patches Critical Vulnerabilities in Industrial Network Director, Modeling Labs"

  • news

    Visible to the public "Secure and Reliable Long-Term Storage to Outlast Humans"

    People should be able to securely store their digital information without fear of quantum or faster computers threatening safety. With funding from the National Science Foundation (NSF), computer science professors will use their innovative collaborative research project titled "Secure, Reliable, and Efficient Long-Term Storage" to address this issue. Dr. Erez Zadok and Dr. Omkant Pandey of Stony Brook University, along with Dr. Ethan L. Miller of the University of California-Santa Clara, have been awarded $1.2 million to study techniques and develop a secure and efficient long-term storage system for digital information that can outlive a human. Using information theoretic security and combinatorial security, Zadok and his collaborators have created a model of long-term security that can withstand the power of faster computers and even quantum computers. In addition, the security model defends against malicious "insiders" who abuse their access to steal data over a long period of time. The prototype system is empirically evaluated to gain insight into the challenges of implementing these techniques in the real world, while a simulator is used to project the long-term effectiveness of these techniques. This research facilitates collaborations between systems, theory, and security researchers in order to develop techniques for securing data for many years while ensuring its integrity. This article continues to discuss the team's work on secure and reliable long-term storage.

    Stony Brook University reports "Secure and Reliable Long-Term Storage to Outlast Humans"

  • news

    Visible to the public "Developing Cybersecurity Solutions for Industrial Infrastructures"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) reports that there are about 153,000 public drinking water systems and over 16,000 publicly owned wastewater treatment systems in the US. Therefore, a cyberattack on these systems could result in service interruptions, damage to critical infrastructure, and even illness and death. The Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, has developed and implemented a cost-effective cyber-physical security situational awareness capability for Industrial Control Systems (ICS) at the Cranberry Water Treatment plant in Westminster, Maryland. The technology is designed to detect and notify operators of malicious activity, including unauthorized access, malicious code, and data exfiltration. In addition, it provides a comprehensive view of the system's health and performance, enabling operators to quickly identify and resolve any problems. This solution integrates network fingerprinting, host-based monitoring, digital twin technology, and advanced event correlation and alerting to provide system operators with a comprehensive understanding of their systems. This article continues to discuss the development of the cost-effective cyber-physical security situational awareness capability for ICS and its testing at the Cranberry Water Treatment plant in Westminster, Maryland.

    Johns Hopkins Applied Physics Laboratory reports "Developing Cybersecurity Solutions for Industrial Infrastructures"

  • news

    Visible to the public "CISA Announces Plans to Establish Logging Made Easy Service"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has announced plans to develop and establish the Logging Made Easy (LME) tool, a service that was initially created and maintained by the National Cyber Security Centre of the UK (NCSC-UK). LME is an open-source log management solution for Windows-based devices that reduces a user's log management burden by integrating capabilities that produce greater visibility into the operating system and network security across deployed devices. Those who manage their organization's catalog of Windows-based equipment but lack the resources for a more robust commercial solution will find LME particularly useful. CISA plans to expand LME's centralized logging capabilities and make them available to public and private sector stakeholders this summer, building on the work of the NCSC. Until CISA relaunches LME, neither CISA nor NCSC will support the legacy LME tool, and organizations using the unsupported version are encouraged to exercise caution. This article continues to discuss the LME tool.

    CISA reports "CISA Announces Plans to Establish Logging Made Easy Service"

  • news

    Visible to the public "UK Warns of Russian Hackers Targeting Critical Infrastructure"

    The UK government's intelligence and security arm recently issued an alert on Russian state-aligned threat actors aiming to conduct disruptive and destructive attacks against critical infrastructure in Western countries. The National Cyber Security Centre (NCSC) stated that recently these threat groups have focused on distributed denial-of-service (DDoS) attacks, defacements, and misinformation attacks. The NCSC warns that some have stated a desire to achieve a more disruptive and destructive impact against Western critical national infrastructure (CNI), including in the UK. The agency believes these groups will focus on identifying poorly protected critical infrastructure systems to cause disruptions. The NCSC noted that threat actors that pose a threat include not only groups that are actually sponsored by the Russian government but also hacktivists that are sympathetic to Russia. Aligned with Moscow's interests, these threat actors support Russia's invasion of Ukraine, are ideologically motivated, and may not be subject to formal state control, which makes them less predictable, as their targeting is broader compared to that of cybercriminal groups. The NCSC believes these groups are not sophisticated enough and lack the resources to launch destructive attacks on their own. The agency says that without external assistance, they consider it unlikely that these groups have the capability to deliberately cause a destructive, rather than disruptive, impact in the short term. Nonetheless, the NCSC notes that these groups may become more effective over time and recommends that organizations take the necessary precautions to prepare themselves for potential attacks.

    SecurityWeek reports: "UK Warns of Russian Hackers Targeting Critical Infrastructure"

  • news

    Visible to the public "Critical Infrastructure Firms Concerned Over Insider Threat"

    Security researchers at Bridewell Consulting have discovered that over a third (35%) of critical national infrastructure (CNI) security leaders believe the economic downturn is forcing employees to turn to data theft and sabotage. The researchers polled 1025 individuals with responsibility for cybersecurity in UK and US CNI firms across the communications, utilities, finance, government, transport, and aviation sectors. The researchers stated that many believe the cost-of-living crisis may be driving insiders at these firms to do the bidding of cybercrime groups in return for a big pay-off. Their suspicions are backed by hard evidence: the financial services sector was hit worse than any other industry sector studied. The researchers noted that organizations in the vertical suffered, on average, 28 security incidents caused by employee sabotage over the previous 12 months, as well as 28 instances of data theft or misuse. Overall, the number of employee sabotage incidents at CNI firms surged by 62% year-on-year. The researchers stated that challenging economic conditions are also putting pressure on CNI firms in other ways. Almost two-thirds (65%) of UK respondents said they had seen "some reduction" or a "significant reduction" in their cybersecurity budget, rising to 73% of US respondents. The communications sector has been impacted the least by these cuts, with almost half (48%) claiming to have seen no change in security budgets. At the other end of the spectrum, the transport and aviation (73%) and utilities sectors (69%) experienced the greatest falls. The researchers noted that the utilities sectors also include energy, oil, and gas companies.

    Infosecurity reports: "Critical Infrastructure Firms Concerned Over Insider Threat"

  • news

    Visible to the public "Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks"

    Fortra, the company developer of Cobalt Strike, is bringing further attention to the zero-day Remote Code Execution (RCE) flaw in its GoAnywhere MFT tool that ransomware actors are actively exploiting to steal sensitive data. The critical flaw, tracked as CVE-2023-0669, with a CVSS score: of 7.2, is a pre-authenticated command injection vulnerability that could be exploited for code execution. The company patched the vulnerability in version 7.1.2 of the software in February 2023, but not before it had been weaponized as a zero-day exploit since January 18. On January 30, 2023, Fortra, which collaborated with Palo Alto Networks Unit 42, was made aware of suspicious activity associated with some file transfer instances. According to the company, the unauthorized entity used the flaw to create unauthorized user accounts in certain MFTaaS customer environments. The unauthorized party leveraged user accounts for a subset of these customers to download files from their hosted MFTaaS environments. Cl0p, a Ransomware-as-a-Service (RaaS) provider, exploited the GoAnywhere vulnerability and was the most active threat actor observed, with a total of 129 victims, according to NCC Group. Cl0p's exploitation spree is the second time since September 2021 that LockBit has been dethroned from the top spot. Royal, BlackCat, Play, Black Basta, and BianLian were other prevalent ransomware strains. This article continues to discuss the zero-day RCE vulnerability in Fortra's GoAnywhere MFT tool that ransomware actors have actively exploited to steal sensitive data.

    THN reports "Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks"

  • news

    Visible to the public "CISOs Struggling to Protect Sensitive Data Records"

    According to Rubrik, nearly all Information Technology (IT) and security leaders are concerned that their organization will be unable to maintain business continuity following a cyberattack. The complexity of data security is growing, and the number of datasets requiring protection is expanding significantly. According to Rubrik's internal data, the average growth of secured data in 2022 was 25 percent. In addition, 56 percent of organizations currently have at least one zero trust initiative. However, in 2022, only 56 percent of IT and security leaders developed or reviewed an incident response plan, and 54 percent tested backup and recovery options. Ninety-nine percent of external organizations reported having data backup and recovery technology, with 93 percent reporting significant problems with their solution. Nine out of ten external organizations reported that during a cyberattack, malicious actors attempted to impact data backups, and 73 percent of these attempts were at least partially successful. This article continues to discuss key findings from Rubrik's report on the state of data security.

    Help Net Security reports "CISOs Struggling to Protect Sensitive Data Records"

  • news

    Visible to the public "Microsoft SQL Servers Hacked to Deploy Trigona Ransomware"

    Hackers are infiltrating inadequately protected and Internet-exposed Microsoft SQL (MS-SQL) servers in order to deploy Trigona ransomware and encrypt all files. The MS-SQL servers are being compromised by brute-force or dictionary attacks that exploit account credentials that are easy to guess. After connecting to a server, the threat actors deploy malware called CLR Shell by researchers from the South Korean cybersecurity company AhnLab who discovered the attacks. This malware collects system information, modifies the compromised account's configuration, and escalates privileges to LocalSystem by exploiting a flaw in the Windows Secondary Logon Service, which is required to initiate the ransomware as a service. This article continues to discuss the hacking of MS-SQL servers to deploy Trigona ransomware payloads.

    Bleeping Computer reports "Microsoft SQL Servers Hacked to Deploy Trigona Ransomware"

  • news

    Visible to the public "Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones"

    Researchers discovered that fitness apps such as Strava leak sensitive location information of users, even when they have used in-app features to specifically set up privacy zones to conceal their activity within specified areas. Two Ph.D. students from KU Leuven in Belgium discovered that if a person begins an activity at home, an attacker with limited skills can use high-precision Application Programming Interface (API) metadata revealed in the app to pinpoint their home location, even if they have set up an Endpoint Privacy Zone (EPZ) for that area. In addition, the researchers reported that, despite contacting the companies whose apps leaked this information, the issue remains largely unresolved. They will present their findings at Black Hat Asia in a session titled "A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks." This article continues to discuss attackers pinpointing where a person lives by lifting metadata from Strava and other apps, even if they're using a feature for protecting their location information.

    Dark Reading reports "Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones"

  • news

    Visible to the public "Not All Encryption Is Created Equal"

    E2EE was proposed as an additional layer of encryption for the Global System for Mobile Communication and Terrestrial Trunked Radio mobile communications standards when the need and value of private and secure communications came of age. Nearly all consumer-oriented information-sharing services provide data encryption today, but not all are E2EE, and there is still confusion regarding what true E2EE entails. E2EE is a secure communication method that encrypts data at the sender's device and decrypts it only at the recipient's device, preventing anyone in between from reading or modifying the data. True E2EE offers a very high level of security because it prevents unauthorized parties from intercepting communications. In addition, unlike simpler encryption techniques, E2EE can provide mathematical proof of security through public/private key cryptography, algorithms that factor large prime numbers, and digital signatures that guarantee the sender's authenticity. This definition articulates the security functions and requirements necessary for government agencies to deploy E2EE services securely. True E2EE services are robust and fortified to help organizations meet the complex and stringent security and privacy requirements that most enterprises require. They enable agencies to minimize risk and maximize compliance, while providing the ability to communicate quickly and securely. Adopting best practices allows organizations in the public and private sectors to integrate E2EE successfully into their communications and file-sharing platforms. This article continues to discuss key attributes of secure communications that enterprises should consider when designing their E2EE models.

    GCN reports "Not All Encryption Is Created Equal"

  • news

    Visible to the public "GitHub Launches Private Bug Reporting, Package Provenance Features"

    GitHub is launching a new feature that enables the collaboration between security researchers and developers in quickly and privately resolving vulnerability reports. The private vulnerability reporting channel makes it easier for researchers to submit bug reports to developers and provides developers with a single, clear communication channel with researchers. Researchers who wanted to report a bug to a GitHub repository's maintainer previously had limited options. They could either open an issue for the specific repository or email the repository's maintainer, both of which were burdensome and lacked security. The new feature provides a secure channel for the parties to communicate about vulnerability reports without doing so publicly or through email correspondence. Since GitHub announced the public beta of the program in November 2022, over 30,000 organizations have enabled the feature for more than 180,000 repositories. With one setting, organizations can enable private vulnerability reporting across all of their projects, and the capability allows maintainers to automatically send new findings to third-party vulnerability management applications. Researchers can also use an Application Programming Interface (API) to initiate new bug reports on multiple repositories simultaneously. In addition to the private vulnerability reporting tool, GitHub is releasing a feature enabling developers to provide provenance information about their projects on npm, the repository managed by GitHub. This article continues to discuss the private bug reporting and package provenance features launched by GitHub.

    Decipher reports "GitHub Launches Private Bug Reporting, Package Provenance Features"

  • news

    Visible to the public "TAMU-CC Researchers Part of Cybersecurity Research Team Funded by $10M Department of Transportation Grant"

    Researchers continue to work toward realizing a future populated by autonomous vehicles, but the threat of cyberattacks is one of the most pressing issues to resolve. To address this critical issue, a new research team is exploring methods to mitigate the effects of cyberattacks on transportation infrastructure and Connected Autonomous Vehicle (CAV) systems on road traffic safety. As part of its University Transportation Centers (UTC) program, the Department of Transportation (DOT) has awarded a $10 million, five-year grant in support of the work. Dr. Yunpeng (Jack) Zhang will lead the Transportation Cybersecurity Center for Advanced Research and Education (CYBER-CARE) at the University of Houston (UH). Texas A&M University-Corpus Christi, Embry-Riddle Aeronautical University, Rice University, the University of Cincinnati, and the University of Hawaii at Honolulu are members of the CYBER-CARE consortium. The work will include researching, developing, and testing various technologies to specify, evaluate, and enforce cybersecurity and safety policies for CAV accident management policies. This article continues to discuss the research effort to bolster transportation cybersecurity.

    Texas A&M University-Corpus Christi reports "TAMU-CC Researchers Part of Cybersecurity Research Team Funded by $10M Department of Transportation Grant"

  • news

    Visible to the public "ChatGPT Helps or Hurts our Cybersecurity?"

    Professor of Electrical and Computer Engineering and Computer Science at Purdue University, Saurabh Bagchi, has provided insights into ChatGPT's implications for online security and privacy. ChatGPT is already being used to launch security attacks, such as phishing schemes. There are concerns that when this technology reaches full maturity, it will be capable of generating undetectable attacks, and defenders will constantly be fighting these fires. The fear is that it will generate sophisticated attacks automatically, but within this specialized field of automatic attack generation, the dark forces have had access to sophisticated tools for at least a decade. It is possible that ChatGPT will become a highly sophisticated weapon, but it will not represent a completely new threat vector. According to Bagchi, security researchers and practitioners in computer security have devised sophisticated defenses that have thwarted most of these attacks. ChatGPT is also a classic example of dual-use technology, as defenders are expected to use it to expand their defense arsenal. This article continues to discuss Bagchi's insights on ChatGPT's implications for security and privacy in the online world.

    CACM reports "ChatGPT Helps or Hurts our Cybersecurity?"

  • news

    Visible to the public "NSA Part of Coalition Highlighting Cybersecurity Best Practices for Smart Cities"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the FBI are collaborating with international partners' cybersecurity agencies to publish cybersecurity best practices for smart cities. Smart cities incorporate public services into a connected environment to increase efficiencies and improve the quality of life in different communities. Seven agencies from five countries have published the Cybersecurity Information Sheet, "Cybersecurity Best Practices for Smart Cities," highlighting how the integration of Operational Technology (OT) in a connected environment has many benefits but can also be an attractive target for malicious cyber actors seeking to steal data from critical infrastructure and proprietary information, perform ransomware operations, or execute destructive cyberattacks. The report explores risks stemming from three areas, including a large interconnected attack surface, the Information and Communications Technology (ICT) supply chain and vendors, and infrastructure operations automation. This article continues to discuss the agencies' release of a report aimed at strengthening cybersecurity for smart cities.

    NSA reports "NSA Part of Coalition Highlighting Cybersecurity Best Practices for Smart Cities"

  • news

    Visible to the public "Russian Man Who Laundered Money for Ryuk Ransomware Gang Sentenced"

    Denis Mihaqlovic Dubnikov, the Russian national who recently pleaded guilty to charges related to laundering money for the Ryuk ransomware group, has been sentenced to time served. The Department of Justice (DoJ) stated that Dubnikov laundered money for the cybercrime gang between 2018 and August 2021. He was arrested in the Netherlands in November 2021 and extradited to the United States in August 2022. In February 2023, he pleaded guilty to one count of conspiracy to commit money laundering. According to the DoJ, Dubnikov, on one occasion, laundered $400,000 worth of cryptocurrency obtained by the ransomware group from a victim in the United States. The 30-year-old Russian national and other members of the conspiracy allegedly laundered a total of at least $70 million in ransom proceeds. For the charges brought against him, the man faced 20 years in federal prison, three years of supervised release, and a fine of up to $500,000. However, he has been sentenced to time served and ordered to pay $2,000 in restitution.

    SecurityWeek reports: "Russian Man Who Laundered Money for Ryuk Ransomware Gang Sentenced"

  • news

    Visible to the public "'Denim Tsunami' and 'Mulberry Typhoon': Microsoft Alters the Way It Names Hacking Groups"

    Cybersecurity professionals need help remembering all the various names companies use to refer to threat actors. For example, some use a number system, while others use colors, animals, and adjectives such as "fancy" and "charming." Microsoft has announced that it is moving away from a taxonomy based on chemical elements to one that uses weather-themed names to classify hacking groups, adding yet another naming scheme. The tech giant outlined its new naming scheme, explaining that countries will be assigned weather conditions such as blizzard for Russia, sleet for North Korea, typhoon for China, and sandstorm for Iran, while specific groups within nations will be categorized by an adjective such as a color. An Iranian nation-state group will be renamed "Mint Sandstorm" after previously being referred to as "Phosphorus." Microsoft's John Lambert stated that the increasing complexity, scale, and volume of threats calls for reimagining not only how Microsoft communicates threats but also how the company enables customers to understand these threats quickly and with clarity. With the new taxonomy, consumers and security researchers who are already overwhelmed by threat intelligence data will be provided with more context. Lambert explained that the new system would enable them to better organize the threat groups they are tasked with monitoring and provide easier classification methods. Simply by reading the name, researchers and security teams will immediately have an idea about the type of threat actor they are facing. He added that Microsoft is currently tracking over 300 threat actors, including 160 nation-state groups, 50 ransomware gangs, and hundreds of other types of attackers. Using its new naming taxonomy, Microsoft has reclassified every actor it tracks. This article continues to discuss Microsoft's new naming scheme for threat actors.

    The Record reports "'Denim Tsunami' and 'Mulberry Typhoon': Microsoft Alters the Way It Names Hacking Groups"

  • news

    Visible to the public "NCSC: 'New Class' of Russian Cyber Attackers Seek to Destroy Critical Infrastructure"

    The National Cyber Security Centre (NCSC) is warning organizations operating Critical National Infrastructure (CNI) to be prepared for destructive cyberattacks launched by Russia-aligned adversaries armed with sophisticated technology. In the past 18 months, a "new class" of Russia-aligned cyberattackers has emerged, which has not been identified by name, but has been referred to as "Wagner-like groups" by Chancellor Oliver Dowden. They are less operationally constrained by diplomacy and are, therefore, regarded as "less predictable." Therefore, they can also target a significantly broader range of organizations. These groups will seek opportunities to create an impact, especially if systems are inadequately protected. The new groups are not deemed powerful enough to execute a destructive attack successfully and deliberately in the near future, but there is speculation that more damaging attacks could be launched if they were given assistance, perhaps by Russian state-sponsored hackers. The NCSC warned that these groups could become stronger over time, and it is not inconceivable that their capabilities could evolve from disruptive to destructive. This article continues to discuss the new class of Russia-aligned cyberattackers.

    ITPro reports "NCSC: 'New Class' of Russian Cyber Attackers Seek to Destroy Critical Infrastructure"

  • news

    Visible to the public "New Report Calls on EU to Develop Cohesive Cybersecurity Skills Plan for All"

    Researchers from Finland's Aalto University published a report titled "Cyber Citizen Skills and Their Development in the European Union," urging EU member states to develop a unified, people-centered approach to cyber skills and cybersecurity. It was discovered that there are significant differences in the quality of cybersecurity education and other digital skills across the EU. The researchers' study was conducted as part of the Cyber Citizen Initiative. Its primary objective is to create a "cybersecurity civic skills learning model and a learning portal for all Europeans," according to the report's authors. According to the report, the online learning portal will contain content aimed at various audiences. It will include a cybersecurity game that facilitates practical and entertaining cybersecurity education. The researchers found that a unified learning model would help the EU in focusing its efforts to ensure that all citizens have at least a moderate level of cybersecurity competence based on their analysis of the various methodologies EU countries use to develop citizens' cybersecurity skills. This article continues to discuss the new EU cyber citizen report calling on EU member states to develop a cohesive cybersecurity skills plan for all citizens.

    Silicon Republic reports "New Report Calls on EU to Develop Cohesive Cybersecurity Skills Plan for All"

  • news

    Visible to the public "Nurse Call Systems, Infusion Pumps Riskiest Connected Medical Devices"

    Security researchers at Armis have discovered that nurse call systems and infusion pumps are the riskiest connected medical devices. The researchers found that 39% of all nurse calling systems, devices used by patients to alert caregivers when they need assistance, have critical severity unpatched Common Vulnerabilities and Exposures (CVEs). Almost half (48%) of them have unpatched CVEs. The researchers stated that the numbers are somehow lower for infusion pumps, medical devices used by healthcare professionals to deliver fluids such as nutrients or medications into a patient's body in a controlled manner. According to the researchers, 27% of them have critical severity unpatched CVEs, and 30% have unpatched CVEs. In the third spot are dedication dispensing systems used to organize, prepare, prescribe, and deliver prescription drugs to patients. Roughly 4% have critical severity unpatched CVEs, but the number is much larger for those with unpatched CVEs (86%). Moreover, 32% of them run on unsupported Windows versions. The researchers stated that unsupported software issues extend to other devices as well. The researchers suggested that 19% of all connected medical devices are running unsupported OS versions. During the study, the researchers also found that IP cameras were the riskiest IoT device in clinical environments, with over half of them having critical severity unpatched CVEs (56%) and unpatched CVEs (59%). Printers were the second riskiest IoT device in clinical environments, with 37% of them having unpatched CVEs and 30% having critical severity unpatched CVEs. VoIP was third in the IoT list, with more than half of them (53%) having unpatched CVEs. Interestingly, only 2% of them have critical severity unpatched CVEs.

    Infosecurity reports: "Nurse Call Systems, Infusion Pumps Riskiest Connected Medical Devices"

  • news

    Visible to the public "DC Health Link Data Breach Blamed on Human Error"

    According to Mila Kofman, Executive Director of the District of Columbia Health Benefit Exchange Authority, the recent data breach of personal information for thousands of users of Washington D.C.'s health insurance exchange, including members of Congress, was caused by basic human error. The data breach was first discovered in early March and included basic personal information, including date of birth, Social Security numbers, and contact information for "56,415 current and past customers including members of Congress, their families, and staff." Kofman stated that her office immediately brought in the FBI Cyber Security Task Force, and the security flaw was quickly tracked down to a particular computer server that was "misconfigured to allow access to the reports on the server without proper authentication. Based on their investigation to date, they believe the misconfiguration was not an intentional but human mistake." Kofman noted that this security flaw enabled an unidentified hacker to steal two reports that contained the client information, some of which were later offered up for sale in an online forum. Kofman stated that the stolen data "included that of 17 Members of the House and 43 of their dependents, and 585 House staff members and of their 231 dependents."

    NBC Washington reports: "DC Health Link Data Breach Blamed on Human Error"

  • news

    Visible to the public "Cloud Security Alerts Take Six Days to Resolve"

    Security researchers at Palo Alto Networks are warning that cloud security teams are exposing their organization to potential days of elevated cyber risk by failing to deal promptly with alerts. During the study, the researchers found that security teams take 145 hours, or around six days, on average, to resolve a security alert, with 60% of organizations taking longer than four days. Previous Palo Alto research revealed that threat actors often begin exploiting a newly disclosed vulnerability within hours, leaving a potentially lengthy window of exposure for many firms. The researchers stated that although unpatched vulnerabilities are by no means the only source of such alerts, they are a popular target for threat actors. The researchers noted that almost two-thirds (63%) of codebases in production have unpatched vulnerabilities rated high or critical, and more than one in 10 (11%) hosts exposed in public clouds feature high severity or critical bugs. The researchers stated that in a cloud environment, a single vulnerability in the source code can be replicated to multiple workloads, posing risks to the entire cloud infrastructure. The researchers noted that many of these vulnerabilities appear in open-source packages, with the complexity of code dependencies making it challenging to find and patch them. Around half (51%) of codebases depend on more than 100 open-source packages, but just a quarter (23%) of packages are directly imported by developers. The rest (77%) of the required packages, which often contain bugs, are introduced by "non-root packages" or dependencies. During the study, the researchers also found that cloud users make the same mistakes repeatedly. Just 5% of security rules trigger 80% of the alerts, meaning that if organizations can prioritize remediating things like unrestricted firewall policies, exposed databases, and unenforced multi-factor authentication (MFA), they could drive security ROI.

    Infosecurity reports: "Cloud Security Alerts Take Six Days to Resolve"

  • news

    Visible to the public "GPT Tricked by Analysts Into Believing Malware Is Benign"

    Researchers have emphasized that Large Language Model (LLM)-driven malware assessments should not be used in place of human analysis because the Artificial Intelligence (AI) technology underlying them can be deceived and manipulated. They have warned that the prevalence of malicious packages in repositories such as PyPI and npm continues to rise. Researchers from Endor Labs stated that the creation of fake accounts and the distribution of malicious packages can be automated to such an extent that the marginal costs of creating and spreading a malicious package are close to zero. Therefore, the company conducted an experiment and helped identify malicious packages by using a combination of AI techniques and examining the source code and metadata of packages. Researchers explained that the source code is examined for the presence of typical malware behaviors such as droppers, reverse shells, and information exfiltration. GPT-3.5 was queried for 1,874 artifacts. Although LLMs can be beneficial in day-to-day operations, Endor Labs has determined that they cannot replace human review. This article continues to discuss GPT being tricked into believing malware is benign.

    Cybernews reports "GPT Tricked by Analysts Into Believing Malware Is Benign"

  • news

    Visible to the public "Iranian Government-Backed Hackers Targeting US Energy and Transit Systems"

    Mint Sandstorm, an Iranian government-backed actor, has been attributed to attacks on US critical infrastructure between late 2021 and mid-2022. The Mint Sandstorm subgroup is said to be technically and operationally mature as it can develop custom tools and weaponize N-day vulnerabilities. It appears to align with Iran's national priorities, according to an analysis by the Microsoft Threat Intelligence team. Seaports, energy companies, transit systems, and a major US utility and gas company have been targeted. The activity is believed to be retaliatory and a response to attacks on its maritime, railway, and gas station payment systems between May 2020 and late 2021. Microsoft has renamed the threat actor previously known as Phosphorus, APT35, Charming Kitten, ITG18, TA453, and Yellow Garuda to Mint Sandstorm. This article continues to discuss the new findings surrounding the Iranian government-backed actor Mint Sandstorm.

    THN reports "Iranian Government-Backed Hackers Targeting US Energy and Transit Systems"

  • news

    Visible to the public "Triple-digit Increase in API and App Attacks on Tech and Retail"

    Security researchers at Akamai have discovered that last year was a record-breaker in terms of API and application-based attacks on the EMEA retail sector, with detected threats surging 189%. During the study, Akamai analyzed intelligence gathered from 340,000 servers in 4000 locations on 1300 networks in 134 countries. The researchers saw a significant spike in attacks last year across the high-tech (176%) and social media (404%) sectors in EMEA. Globally, the financial services sector also saw an increase in attacks based on 2021 figures. However, in the UK, recorded threats declined by 4%, making this the only region to experience a decrease in this vertical. The researchers suggested that this could be down to threat actors targeting individual account holders rather than large banking institutions. Retail, high tech, and financial services remained by far the most popular targets for web attacks in 2022, accounting for over 70% of total detected threats during the year. The researchers noted that elsewhere, attacks on the healthcare industry globally surged 55% from 2021 to 2022, driven by greater adoption of IoT equipment, which has expanded organizations' attack surfaces. The researchers also found that Local File Inclusion (LFI) remained the top attack vector in EMEA, with attacks growing 115% from 2021 to 2022. Globally they surged by even more (193% year-on-year).

    Infosecurity reports: "Triple-digit Increase in API and App Attacks on Tech and Retail"

  • news

    Visible to the public "Play Ransomware Gang Uses Custom Shadow Volume Copy Data-Theft Tool"

    According to Symantec's security researchers, the Play ransomware group has developed two custom tools called Grixba and VSS Copying Tool in .NET to strengthen its cyberattacks. The two tools allow the attackers to enumerate users and computers in compromised networks, collect information about security, backup, and remote administration software, and copy files from Volume Shadow Copy Service (VSS) to circumvent locked files. Grixba is a network-scanning and information-stealing application used to enumerate users and computers in a domain. In addition, it supports a 'scan' mode that uses WMI, WinRM, Remote Registry, and Remote Services to determine what software is installed on network devices. This article continues to discuss the Play ransomware gang's new custom tools.

    Bleeping Computer reports "Play Ransomware Gang Uses Custom Shadow Volume Copy Data-Theft Tool"

  • news

    Visible to the public "'Goldoson' Malware Sneaks into Google Play Apps, Racks Up 100M Downloads"

    Through an infected third-party library, malware capable of stealing data and committing click fraud has infiltrated 60 mobile apps. Researchers discovered that the infected apps have been downloaded more than 100 million times from the official Google Play store and are available in other app stores in South Korea. Goldoson, discovered and named by researchers at McAfee Labs, is capable of various malicious activities on Android-based devices. The malware can compile lists of installed apps and determine the location of nearby devices via Wi-Fi and Bluetooth. In addition, it can commit ad fraud by clicking on advertisements in the background without the user's consent or knowledge. L.POINT with L.PAY, Swipe Brick Breaker, Money Manager Expense & Budget, Lotte Cinema, Live Score, and GOM are among the popular apps affected by Goldoson. This article continues to discuss the Goldoson malware.

    Dark Reading reports "'Goldoson' Malware Sneaks into Google Play Apps, Racks Up 100M Downloads"

  • news

    Visible to the public "Researchers Discover Sensitive Corporate Data on Decommissioned Routers"

    Fifty-six percent of decommissioned routers sold on the secondary market contained confidential corporate data, according to ESET's analysis of configuration data. Of the networks for which complete configuration information was available, 22 percent contained customer data and 33 percent exposed data that enabled third-party network access. In addition, 44 percent had credentials for connecting as a trusted party to other networks. Eighty-nine percent specified application-specific connection information, while 89 percent of routers contained authentication credentials. One hundred percent contained either IPsec or VPN credentials, or hashed root passwords. Finally, 100 percent had sufficient information to identify the previous owner/operator with confidence. This article continues to discuss ESET's findings from the analysis of configuration data.

    Help Net Security reports "Researchers Discover Sensitive Corporate Data on Decommissioned Routers"

  • news

    Visible to the public "Engineering Cybersecurity into US Critical Infrastructure"

    The Biden administration's National Cybersecurity Strategy recommends a security-by-design approach, which includes holding software vendors accountable for upholding a "duty of care" to consumers and designing systems to "fail safely and recover quickly." The strategy identifies the need to implement a "national cyber-informed engineering strategy" for energy infrastructure in order to achieve significantly more effective cybersecurity protections. To ensure high levels of safety and reliability, the engineers who build complex infrastructure systems adhere to standards and procedures. However, most of these procedures were developed before the start of modern cybersecurity and, therefore, do not make engineers consider cyber threats and design cybersecurity defenses. Through its cyber-informed engineering initiative, the Office of Cybersecurity, Energy Security, and Emergency Response (CESER) of the Department of Energy (DOE) aims to address this issue. CESER is working with National Laboratories to educate engineers on designing systems to eliminate cyberattack entry points and mitigate their effects. Early in the system design process, engineers can identify the system's critical functions and determine how to engineer them to mitigate the effects of digital disruption or misuse. This cyber-informed engineering, when coupled with a robust Information Technology (IT) security strategy, provides the opportunity to defend systems much more effectively than IT security alone can. The Idaho National Laboratory pioneered cyber-informed engineering concepts and is collaborating with CESER to educate industry, academia, and government on how to apply these concepts to real-world problems. This article continues to discuss cyber-informed engineering.

    Harvard Business Review reports "Engineering Cybersecurity into US Critical Infrastructure"

  • news

    Visible to the public "UCD Network Researcher Combatting 'Ecosystem of Connected Threats'"

    Dr. Madhusanka Liyanage of University College Dublin (UCD) is the coordinator of the UCD School of Computer Science's Network Softwarization and Security Labs (Netslab) research group. This group is primarily focused on the security and privacy of future mobile networks, such as 5G and 6G. Netslab is a relatively new research group comprised of nine individuals, including three postdoctoral researchers and six Ph.D. students. At Netslab, research is conducted on various network softwarization and security aspects, including network slicing, software-defined networking, and edge computing. The team is particularly interested in how blockchain and Artificial Intelligence (AI) could be used to improve the security of future mobile networks. Netslab is establishing itself as a leading research group in network security by exploring and developing these technologies. Dr. Liyanage is also the leader of two significant EU Horizon 2020 projects, SPATIAL and CONFIDENTIAL6G. SPATIAL aims to move toward a trustworthy cybersecurity sector in Europe, enabling trustworthy governance and a regulatory framework for AI-driven security. The CONFIDENTIAL6G project will design quantum-resistant cryptographic protocols as well as security proof tools, libraries, mechanisms, and architectural blueprints for 6G confidentiality. This article continues to discuss Dr. Liyanage's research on novel security and privacy solutions.

    Silicon Republic reports "UCD Network Researcher Combatting 'Ecosystem of Connected Threats'"

  • news

    Visible to the public "55% of Surveyed Healthcare Workers Believe Security Policies Keep Up With New Tech"

    Salesforce surveyed over 400 healthcare employees to explore perceived weaknesses in healthcare security programs. As generative Artificial Intelligence (AI) and other new technologies gain popularity, security experts face the challenge of keeping up with the security risks these new tools bring. Almost a quarter of Salesforce survey respondents believe generative AI tools such as ChatGPT or DALL-E are safe to use at work. Furthermore, 15 percent of respondents said they have already tested these technologies. However, despite increased interest in these developments, only 55 percent of respondents felt their organization's security policies were keeping up with emerging tools and technology. Cybersecurity risks will continue to evolve as more patient data is stored and transmitted online. Healthcare workers are essential to the security of patient data. Organizations could empower their workforce by cultivating a strong security-first culture that highlights the importance of security at all levels and provides secure digital tools. Most healthcare employees appear to grasp their duty to protect patient data, with 76 percent agreeing that patient data protection is their responsibility. Yet, about a third of respondents said they did not know what to do in the case of a breach, indicating a need for more security training and awareness. Over two-thirds of respondents stated their organization had a security-first culture, but only 31 percent were familiar with internal security practices. This article continues to discuss key findings from Salesforce's survey of healthcare workers regarding gaps in healthcare security programs.

    HealthITSecurity reports "55% of Surveyed Healthcare Workers Believe Security Policies Keep Up With New Tech"

  • news

    Visible to the public "Chrome, Edge Browsers Targeted in Zaraza Bot Malware Attacks"

    A new variant of the credential-stealing Zaraza malware has been collecting web browser login credentials from Google Chrome, Microsoft Edge, Opera, and Brave. Researchers warn that the threat actors behind the malware are using Telegram servers as their command-and-control (C2) platform to shuffle through stolen bank login information and cryptocurrency. According to Uptycs, Telegram is also used to distribute and promote the Zaraza malware. Researchers suspect that the campaign's operators are tied to Russia. Adversaries using the Zaraza bot have targeted almost 40 web browsers. Apple's Safari and Mozilla Foundation's Firefox browsers are absent from the list of browsers. The initial path or approach used by adversaries to infect targeted systems was not included in Uptycs' analysis. The Zaraza bot seems to be part of a larger criminal organization, with threat actors being able to purchase access to it through a centralized malware distributor. The adoption of Telegram as a C2 by threat actors is a continuing trend. According to Uptycs, attackers are attracted to Telegram because it allows them to deliver malware and move data while avoiding detection. This article continues to discuss researchers' findings regarding the new variant of the Zaraza malware.

    SC Media reports "Chrome, Edge Browsers Targeted in Zaraza Bot Malware Attacks"

  • news

    Visible to the public "Emerging Cyberpros Tried to Conquer The Hill in Argonne's Latest CyberForce Program Challenge"

    The latest individual CyberForce Program competition led by Argonne National Laboratory, a US Department of Energy (DOE) national laboratory, challenged college-aged students to solve anomalies in a seven-hour cyber sprint. Cameron Whitehead of the University of Central Florida was named the winner of the 2023 CyberForce Conquer the Hill: Adventurer Edition competition by Argonne National Laboratory. Whitehead was one of 213 students from 95 accredited US colleges and universities that competed digitally over a seven-hour energy sector-related adventure to resolve over 57 anomalies, which are work-based cybersecurity tasks and challenges. The goals of the DOE's Conquer the Hill competitions and the overall CyberForce Program, which Argonne leads, are to provide college students with hands-on education, raise awareness about the critical infrastructure and cybersecurity nexus, and promote basic understanding of cybersecurity in real-world scenarios. According to a 2022 study, the US lacks 410,695 cybersecurity professionals. With the volume of information on the Internet rising, enhancing security and establishing a cybersecurity workforce is a top issue. The National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education framework was used to map all of the anomalies in this year's Conquer the Hill: Adventurer competition. DOE and Argonne believe that by developing the challenges within this framework, students will be able to better understand where they are proficient in cybersecurity abilities and where they may need to improve. This article continues to discuss the 2023 CyberForce Conquer the Hill: Adventurer Edition competition.

    Argonne National Laboratory reports "Emerging Cyberpros Tried to Conquer The Hill in Argonne's Latest CyberForce Program Challenge"

  • news

    Visible to the public "NIST Wants to Mitigate Smart Home Telehealth Cybersecurity Risks"

    The COVID-19 pandemic increased the use of Internet of Things (IoT) devices for telehealth purposes. However, using smart speakers to share sensitive personal health information for telehealth purposes may pose a cybersecurity and privacy risk, which the government is attempting to address, according to a notice recently filed in the Federal Register. As part of the National Cybersecurity Center of Excellence (NCCoE) project addressing this issue, the National Institute of Standards and Technology (NIST) is seeking comments and solutions to help them in mitigating cybersecurity risks in telehealth smart home integration. Since consumers are using their own commercial devices and integrating them into a health delivery organization's telehealth solution, these organizations may struggle to identify and address cybersecurity risks because they do not have control over these products. While the user experience may be improved, practitioners could face challenges in deploying mitigating controls that limit cybersecurity and privacy risk because devices may use proprietary or purpose-built operating systems that do not allow engineers to add protective software, according to the NCCoE project. The NCCoE project plans to provide a reference architecture that uses the NIST Risk Management Framework, NIST Cybersecurity Framework, and NIST Privacy Framework to identify cybersecurity and privacy risks and solutions. The project will create a model that mimics patients using smart speakers for telehealth purposes to detect and mitigate the associated cybersecurity and privacy issues. This article continues to discuss NIST looking for providers to help address the cybersecurity and privacy vulnerabilities in the telehealth ecosystem.

    GCN reports "NIST Wants to Mitigate Smart Home Telehealth Cybersecurity Risks"

  • news

    Visible to the public "Takedown of GitHub Repositories Disrupts RedLine Malware Operations"

    Cybersecurity researchers at ESET have discovered that the RedLine information stealer's operations have recently been disrupted after the takedown of GitHub repositories used by the malware's control panels. A piece of commodity malware active since at least early 2020, the RedLine stealer is written in .NET and packs broad data exfiltration capabilities. The researchers noted that the malware targets system information, cookies and other browser data, login credentials for various applications and services, credit card information, and crypto wallets. Available under the stealer-as-a-service business model, RedLine was seen being offered by 23 of 34 Russian-speaking groups that were distributing infostealers last year. Each of the groups had an average of 200 members. The researchers stated that RedLine is sold on underground forums and Telegram channels. Affiliates purchase access to an all-in-one control panel that acts as a command-and-control (C&C) server, allowing them to generate new samples and to manage stolen information. The researchers noted that the removal of these repositories should break authentication for panels currently in use. While this doesn't affect the actual back-end servers, it will force the RedLine operators to distribute new panels to their customers. Stealer-as-a-service is one of the top three crime-as-a-service categories likely to be prevalent in 2023, along with ransomware-as-a-service and victims-as-a-service.

    SecurityWeek reports: "Takedown of GitHub Repositories Disrupts RedLine Malware Operations"

  • news

    Visible to the public "Business Emails Hijacked by New QBot Banking Trojan Campaign For Distributing Malware"

    Researchers have discovered a new QBot malware campaign using compromised business communications to trick victims into installing the malware. Since April 4, 2023, the most recent activity has primarily targeted users in Germany, Argentina, Italy, Algeria, Spain, the US, Russia, France, the UK, and Morocco. Since at least 2007, the banking Trojan known as QBot, also known as Qakbot or Pinkslipbot, has been in operation. In addition to stealing credentials and cookies from web browsers, it serves as a backdoor for introducing ransomware or other next-stage payloads such as Cobalt Strike. Anti-VM, anti-debugging, and anti-sandbox techniques have been added to the malware to evade detection. According to Check Point, it was also the most pervasive malware in March 2023. According to researchers, early distribution methods for QBot included infected websites and pirated software. The banker is now distributed to potential victims via pre-installed malware, social engineering, and phishing emails. This article continues to discuss the new QBot malware campaign.

    CyberIntelMag reports "Business Emails Hijacked by New QBot Banking Trojan Campaign For Distributing Malware"

  • news

    Visible to the public "Apple's High Security Mode Blocked NSO Spyware, Researchers Say"

    A year ago, Apple introduced a new feature called Lockdown Mode for iPhone users who feared being targeted by sophisticated spyware, such as journalists and human rights activists. Researchers have now discovered evidence that Lockdown Mode helped thwart an attack by hackers involving spyware developed by the infamous mercenary hacking provider NSO Group. Citizen Lab, a cybersecurity and human rights research organization, published a report analyzing three new zero-day exploits in iOS 15 and iOS 16, indicating that Apple was unaware of the vulnerabilities when at least two Mexican human rights defenders were targeted. The researchers discovered that one of these exploits was blocked by Lockdown Mode. This is the first known instance in which Lockdown Mode effectively prevented a targeted attack. In the recent cases, Citizen Lab researchers reported that the iPhones belonging to the targets blocked hacking attempts and displayed a notification stating that Lockdown Mode prevented access to the Home app. However, the researchers emphasized that NSO's exploit developers may have figured out a solution to the notification issue at some point, such as by fingerprinting Lockdown Mode. This article continues to discuss Apple's Lockdown Mode blocking NSO spyware.

    TechCrunch reports "Apple's High Security Mode Blocked NSO Spyware, Researchers Say"

  • news

    Visible to the public "Conversational Attacks Fastest Growing Mobile Threat"

    Security researchers at Proofpoint have warned of a 12-fold increase in reporting of so-called "conversational scams" like pig butchering last year, making them the fastest growing threat to mobile users in 2022. The researchers stated that such scams typically require a much longer lead time than phishing or malware delivery. The threat actor may initially approach their target on social media or a dating site and then look to build rapport over the weeks that follow, exchanging harmless-seeming messages. However, the real goal for the fraudster is to make off with their victim's information, money, or credentials. The researchers noted that often the victim will be lured into investing in a fake cryptocurrency scheme. According to the FBI, this kind of pig butchering scam was responsible for driving a surge in investment fraud last year that exceeded $3.3bn in losses. The researchers noted in addition to financial losses, these attacks also extract a significant human cost. Pig butchering and romance scams both involve an emotional investment on the part of the victim. Trust is earned and then abused, which can prompt feelings of shame and embarrassment alongside the real-world consequence of losing money. The researchers stated that the release of tools like ChatGPT, Bing Chat, and Google Bard heralds the arrival of a new kind of chatbot capable of understanding context, displaying reasoning, and even attempting persuasion. Looking further ahead, AI bots trained to understand complex tax codes and investment vehicles could be used to defraud even the most sophisticated victims. The researchers noted that if "coupled with image generation models capable of creating unique photos of real-seeming people, conversational threat actors could soon be using AI as a full-stack criminal accomplice, creating all the assets they need to ensnare and defraud victims."

    Infosecurity reports: "Conversational Attacks Fastest Growing Mobile Threat"

  • news

    Visible to the public "NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers"

    The National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), the FBI, and the Cybersecurity and Infrastructure Security Agency (CISA) have collaborated to publish a joint Cybersecurity Advisory (CSA) report on the tactics, techniques, and procedures (TTPs) related to APT28's exploitation of Cisco routers. APT28 is also known as Russian General Staff Main Intelligence Directorate (GRU) 85th Special Service Center (GTsSS) military intelligence unit 26165, Fancy Bear, STRONTIUM, Pawn Storm, the Sednit Gang, and Sofacy. The coalition disclosed the vulnerability that APT28 exploits to conduct reconnaissance and distribute malware on Cisco routers. APT28 cyber actors masqueraded Simple Network Management Protocol (SNMP) to exploit the vulnerability, tracked as CVE-2017-6742, and gain access to vulnerable Cisco routers worldwide. This included government institutions in the US, about 250 Ukrainian victims, and a small number of European victims. This article continues to discuss the joint CSA on APT28 exploiting a known vulnerability to carry out reconnaissance and deploy malware on Cisco routers.

    NSA reports "NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers"

  • news

    Visible to the public "Final Version of TIC Use Cases Covering Cloud Services"

    Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Email-as-a-Service (EaaS) have unique security considerations. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has published the Trusted Internet Connections (TIC) 3.0 Cloud Use Case, which provides network and multi-boundary security guidance for agencies operating in cloud environments. The feedback garnered during the 2022 public comment period has been incorporated into the new version. The Cloud Use Case describes specific security patterns, applicable security capabilities, and telemetry requirements. This guidance also contains cloud-specific factors, including the shared services model and cloud security posture management principles defined in the Cloud Security Technical Reference Architecture. In addition, this use case is written from the perspective of cloud-hosted services as opposed to the consumer accessing these services. This article continues to discuss CISA's release of TIC 3.0 guidance documents.

    CISA reports "Final Version of TIC Use Cases Covering Cloud Services"

  • news

    Visible to the public "Pen Testers Need to Hack AI, but Also Question Its Existence"

    Samsung has prohibited some uses of ChatGPT, while Ford and Volkswagen have shut down their self-driving car company, and a letter calling for a halt to the training of more powerful Artificial Intelligence (AI) systems has received over 25,000 signatures. Davi Ottenheimer, vice president of trust and digital ethics at Inrupt, a startup that develops digital identity and security solutions, says this is not an overreaction. According to Ottenheimer, the security and safety of Machine Learning (ML) and AI models need improved testing strategies. These models include ChatGPT, autonomous vehicles, and autonomous drones. Ottenheimer, who has prepared a presentation on the topic for the RSA Conference in San Francisco, emphasizes that society needs to have broader discussions about how to test and improve safety, as a steady stream of security researchers and technologists have already found ways to circumvent AI system protections. With the release of ChatGPT in November, interest in AI and ML, which was already on the rise due to data science applications, exploded. The ability of the Large Language Model (LLM) to appear to understand human language and generate coherent responses has led to an increase in proposed applications based on the technology and other forms of AI. ChatGPT has been used to triage security incidents, and a more advanced LLM serves as the foundation of Microsoft's Security Copilot. This article continues to discuss the need for security researchers to further explore whether there are sufficient protections to prevent the misuse of AI models.

    Dark Reading reports "Pen Testers Need to Hack AI, but Also Question Its Existence"