News Items

  • news

    Visible to the public "Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access"

    MuddyWater, an Iranian threat actor, continues its time-tested practice of using legitimate remote administration tools to seize control of targeted systems. While the nation-state group previously used ScreenConnect, RemoteUtilities, and Syncro, a new Group-IB analysis found the adversary's use of the SimpleHelp remote support software. Since at least 2017, MuddyWater has been believed to be a subordinate element of Iran's Ministry of Intelligence and Security (MOIS). Turkey, Pakistan, the United Arab Emirates, Iraq, Israel, Saudi Arabia, Jordan, the US, Azerbaijan, and Afghanistan are among the main targets. Nikita Rostovtsev, senior threat analyst at Group-IB, stated that MuddyWater uses the legitimate remote device control and management tool SimpleHelp to guarantee persistence on victim devices. SimpleHelp has not been compromised and is used as designed. The threat actors discovered a method for downloading the tool from the official website and deploying it in their attacks. The exact method used to distribute the SimpleHelp samples is currently unknown. However, the group is known to send spear-phishing emails containing malicious links from already compromised corporate email accounts. This article continues to discuss the use of SimpleHelp by MuddyWater.

    THN reports "Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access"

  • news

    Visible to the public "The Attacks That Can Target Your Windows Active Directory"

    Active Directory (AD) remains the predominant source of Identity and Access Management (IAM) in the enterprise, making it the target of numerous attacks. There are multiple attack techniques and attack vectors that hackers use to target AD. Different attacks against AD Domain Services (AD DS) have the potential to compromise the environment. DCSync, DCShadow, password spray, pass-the-hash, pass-the-ticket, and more are examples of modern attacks used against AD DS. For example, the DCShadow attack exploits legitimate AD communications traffic between domain controllers. The DCShadow attack also uses the DCShadow command as part of the Mimikatz lsadump module. It uses Microsoft Directory Replication Service Remote protocol instructions. Attackers can register a malicious domain controller and replicate its modifications to other domain controllers in the background. It may involve adding accounts controlled by hackers to the domain administrators group. This article continues to discuss examples of attacks used against AD DS.

    Bleeping Computer reports "The Attacks That Can Target Your Windows Active Directory"

  • news

    Visible to the public "Pre-Pandemic Techniques Are Fueling Record Fraud Rates"

    According to Pindrop, the rise and adoption of Artificial Intelligence (AI), an impending recession, and the return of pre-pandemic fraud techniques are driving record rates of fraud attacks against consumers and businesses. States with restrictions on biometrics use are twice as likely to experience fraud. During periods of economic instability, fraud increases. In the fourth quarter of 2022, financial institutions experienced a 53 percent year-over-year increase in fraudulent activity. Fraudsters are taking advantage of data from the dark web and testing it in the Interactive Voice Response (IVR) to identify high-value accounts and attack those accounts together with other fraudsters. Retail has become one of the verticals with the highest incidence of fraud, with one in 347 calls to call centers supporting online retailers being fraudulent. This article continues to discuss key findings from Pindrop's Voice Intelligence and Security Report.

    Help Net Security reports "Pre-Pandemic Techniques Are Fueling Record Fraud Rates"

  • news

    Visible to the public "Cyber Intrusion Detection Time at an All-Time Low"

    Security researchers at Google's Mandiant have found that organizations and their cyber defenders are getting better at detecting cyberattacks, but detection time still stands at 16 days. During the study, the researchers found that 2022 saw a decrease in global median dwell time (the time the cyberattack victim takes to detect the intrusion) from 21 days in 2021 to 16 days in 2022. This is the shortest global median dwell time since Mandiant started recording this metric in 2011. The researchers stated that the decrease can be attributed to cyber defenders getting better, coupled with attackers being more brazen than they were in the past. The researchers also found that ransomware attacks decreased in 2022, accounting for 18% of all intrusions recorded on Mandiant's telemetry that year, compared to 23% in 2021. The researchers noted that this drop can partially be attributed to the work of law enforcement. State-sponsored malicious activity, however, spiked in 2022. The researchers identified extensive cyber espionage and information operations leading up to and since Russia's invasion of Ukraine on February 24, 2022, and observed more destructive cyberattacks in Ukraine during the first four months of 2022 than in the previous eight years. In 2022, Mandiant began tracking 588 new malware families, the main ones being backdoors (34%), downloaders (14%), droppers (11%), ransomware (7%), and launchers (5%). As with previous years, the most common malware family identified by Mandiant in investigations was BEACON, a multi-function backdoor identified in 15% of all intrusions.

    Infosecurity reports: "Cyber Intrusion Detection Time at an All-Time Low"

  • news

    Visible to the public "Creative Software Maker Affinity Informs Customers of Forum Breach"

    UK-based photo editing, graphic design, and publishing software developer Affinity recently informed its forum members of a data breach that occurred on April 6. The company said a hacker gained access to forum user data after compromising an administrator's account. The adversary may have accessed information such as username, reputation, join date, post count, email addresses, and the last used IP address. The company noted that while most of the compromised information is already public, the email address and IP are not, and this type of information can be useful to malicious actors for targeted phishing attacks. It is unclear how many users had their data compromised, but the Affinity forum has nearly 175,000 members. The company said it's confident that user passwords were not compromised in the breach. The Affinity forum data breach has been reported to the UK Information Commissioner's Office (ICO), and steps have been taken to prevent such incidents in the future. It's unclear how the administrator account was compromised, but in many of these types of incidents, account hacking is possible because two-factor authentication has not been used.

    SecurityWeek reports: "Creative Software Maker Affinity Informs Customers of Forum Breach"

  • news

    Visible to the public "Student Privacy Is at More Risk Than Ever Before. Can K-12 Schools Keep It Safe?"

    Education technology is now an integral part of the education system. However, there are concerns regarding the readiness of K-12 districts to address the complex privacy and security issues raised by such technology. According to "Uncovering Privacy and Security Challenges in K-12 Schools," a new study from the University of Chicago and New York University, districts are not handling privacy and security issues very well, primarily because of their inadequate preparation. After interviewing several school administrators about privacy issues, researchers scraped 15,573 websites from K-12 public schools and districts in the US to determine which education technology products these schools commonly use or recommend to students, as well as what risks these tools pose and whether schools are prepared to address them. According to the researchers, this is the first quantitative examination of the privacy and security risks concerns raised by education technology products currently used in American public schools. The resulting list includes numerous well-known resources, such as Zoom, Scholastic, College Board, Khan Academy, and Clever. Almost all of the top sites linked to schools "extensively" used tracking software. Additionally, the researchers note that many websites used session recorders known to capture sensitive information such as keystrokes. Prior research on student information policies has revealed that education technology companies often do not disclose their data practices. Human rights groups and regulators have also raised concerns about the vulnerability posed by intrusive surveillance technology and schools' improper data management. The new report adds to a growing body of research advocating for K-12 privacy laws, at a time when experts highlight that education technology companies have placed an undue burden on schools to ensure data security. This article continues to discuss privacy and security challenges faced by K-12 schools.

    EdSurge reports "Student Privacy Is at More Risk Than Ever Before. Can K-12 Schools Keep It Safe?"

  • news

    Visible to the public "New Domino Backdoor Malware Linked to Ex-Conti, FIN7 Criminals"

    Domino Backdoor is a new malware linked by security researchers to former members of the prolific Conti and FIN7 groups. It has been used to launch information-stealing malware, which involves the same techniques and source code as the infamous groups, indicating the formation of a new and dangerous alliance. IBM Security X-Force found Domino in the fall of 2022 and raised the alarm when an attack in February 2023 linked the new malware to former members of the Conti. Domino Backdoor is a 64-bit Dynamic-Link Library (DLL) with an undiscovered backdoor capable of delivering additional malicious payloads to infected systems. Once executed on a system, the malware determines the victim's username and hostname, uses this information to generate a hash, and then adds its own process ID. It then decrypts its configuration block, which contains two IP addresses for its command-and-control (C2) server and an RSA public key. The program then generates a random 32-byte key that is encrypted using the RSA key. Then it contacts its C2 using one IP address if the infected system is connected to a domain and the other IP address if it is not, and begins to harvest and encrypt core system data. It was observed decrypting and deploying its own payload using AES-256-CBC in a lab environment. Domino Backdoor and Domino Loader were discovered sharing code with Lizar, a malware with ties to the FIN7 cybercrime group, and using C2 addresses similar to those employed by FIN7 for its SSH-key-based backdoors. In addition, Domino Backdoor samples from December 2022 were discovered using the NewWorldOrder Loader, which FIN7 previously employed to install the Carbanak Backdoor malware. This article continues to discuss the new Domino Backdoor malware.

    ITPro reports "New Domino Backdoor Malware Linked to Ex-Conti, FIN7 Criminals"

  • news

    Visible to the public  "HHS Launches New Cybersecurity Awareness Resources"

    The Department of Health and Human Services (HHS) has released three new cybersecurity resources, each of which focuses on educating medical institutions on how to better protect their digital infrastructures. Two websites and an online report provide free access to cybersecurity best practices for healthcare organizations. Some of the resources include cybersecurity training in the context of public health, overviews of key cybersecurity threats and how to combat them, and an analysis of the cybersecurity preparedness of US hospitals. Healthcare-specific guidance is issued as the US digital infrastructure continues to be targeted by foreign and domestic adversaries. The training will be an asset to any organization seeking to train staff in basic cybersecurity awareness and is provided at no cost, ensuring that hospitals and healthcare organizations that are most vulnerable to attack can take measures to strengthen their resilience. According to the websites, the top five digital threats to healthcare organizations are ransomware, social engineering, device theft, data loss, and network attacks. This article continues to discuss HHS' release of three new online resources for healthcare entities to strengthen their digital networks.

    NextGov reports "HHS Launches New Cybersecurity Awareness Resources"

  • news

    Visible to the public "Vice Society Gang Is Using a Custom PowerShell Tool for Data Exfiltration"

    Palo Alto Networks Unit 42 found the Vice Society ransomware group exfiltrating data from a victim network using a custom-built Microsoft PowerShell script. Using this PowerShell tool, the threat actors are circumventing software and/or human-based security detection mechanisms. PowerShell scripting is commonly used in a typical Windows environment. A PowerShell-based tool can enable threat actors to hide in plain sight and execute their code while avoiding detection. Early in 2023, the researchers observed the gang exfiltrating data from a victim network using a script named w1.ps1. They were able to retrieve the script from the Windows Event Log (WEL). The PowerShell data exfiltration script created by Vice Society is a simple data exfiltration tool, with multi-processing and queuing used to prevent the script from consuming an excessive amount of system resources. The script focuses on files over 10 KB with file extensions and on directories on its "include list." According to researchers, the nature of PowerShell scripting in the Windows environment makes it difficult to completely prevent this type of threat. This article continues to discuss the Vice Society ransomware operators using a PowerShell tool to exfiltrate data from compromised networks.

    Security Affairs reports "Vice Society Gang Is Using a Custom PowerShell Tool for Data Exfiltration"

  • news

    Visible to the public "UK Education Sector Suffered Most from Ransomware in 2022"

    Security researchers at Malwarebytes have discovered that the education sector in the UK was hit far more by ransomware than in other countries last year, thanks to targeting by the Vice Society group. The security vendor's latest findings from April 2022 to March 2023 are based on known attacks where victims opted not to pay a ransom, so the real figures could be even higher. The researchers stated that the education vertical accounted for 16% of attacks in the UK compared to 4% in France and Germany and 7% in the US. The researchers claimed the primary reason for this disparity was down to Vice Society. The researchers noted that the UK is one of Vice Society's favorite targets, accounting for 21% of the group's known attacks in the past 12 months, a close second to the US which accounted for 23%, and vastly more than the following country, Spain, which accounted for 8%. The researchers stated that, sadly, Vice Society's disproportionate interest in the UK lands squarely on the education sector. Some 76% of Vice Society's known attacks in the UK over the past 12 months hit the education sector, and Vice Society was responsible for 70% of known attacks on UK education institutions.

    Infosecurity reports: "UK Education Sector Suffered Most from Ransomware in 2022"

  • news

    Visible to the public "Machine Learning Can Help to Flag Risky Messages on Instagram While Preserving Users' Privacy"

    It is important to protect social media users from harassment and bullying while also taking steps to protect their privacy. A team of researchers from four leading universities has proposed using Machine Learning (ML) technology to identify potentially risky conversations on Instagram without eavesdropping on them. The discovery could provide platforms and parents with the ability to protect vulnerable, younger users while maintaining their privacy. The team led by researchers from Drexel University, Boston University, Georgia Institute of Technology, and Vanderbilt University recently published their work on investigating what type of data input, such as metadata, text, and image features, could be most useful for ML models to identify risky conversations. Their findings suggest that risky conversations can be identified based on metadata characteristics, such as conversation length and participant engagement. Afsaneh Razi, Ph.D., an assistant professor in Drexel's College of Computing and Informatics and co-author of the study, stated that the prevalence of harassment, abuse, and bullying by malicious users is very concerning, considering Instagram's popularity among young people. Instagram makes its users feel safe enough to connect with others very openly. After the Cambridge Analytica scandal and the European Union's precedent-setting privacy protection regulations, platforms are under increasing pressure to protect their users' privacy. Therefore, Meta, the company behind Facebook and Instagram, is implementing end-to-end encryption for all platform messages, indicating that the message content is technologically protected and can only be accessed by those involved in the conversation. However, this increased degree of security makes it more difficult for platforms to use automated technology to detect and prevent online threats, which is why the team's system could play a crucial role in protecting users. This article continues to discuss the system developed to use ML to help flag risky messages on Instagram while preserving users' privacy.

    Drexel University reports "Machine Learning Can Help to Flag Risky Messages on Instagram While Preserving Users' Privacy"

  • news

    Visible to the public "Montana Becomes 1st State to Approve a Full Ban of TikTok"

    Montana has recently become the first state to approve a bill that would ban TikTok. On Friday, the GOP-controlled Montana House of Representatives sent the bill to Republican Gov. Greg Gianforte, who can now sign the measure into law. If signed into law, it would be illegal to download TikTok in the state, with penalties of up to $10,000 a day for any entity, such as Apple and Google's app stores or TikTok itself, that makes the popular video-streaming app available. If enacted, the ban in the state would start in January 2024. Since ByteDance owns TikTok, the fear is that the Chinese Communist Party could request access to the 150 million TikTok accounts in America and potentially spy on U.S. citizens or use the personal data to mount disinformation campaigns on the app.'

    NPR reports: "Montana Becomes 1st State to Approve a Full Ban of TikTok"

  • news

    Visible to the public "Making a Smaller Target for Hackers: Technology Keeps Industrial Control Systems Safer by Limiting Online Access"

    OpDefender, a technology created at Idaho National Laboratory (INL) for the US Department of Homeland Security (DHS), is founded on the principle of minimizing the attack surface as much as possible. Operational control technology exists at all levels of the nation's critical infrastructure, switching breakers at substations, opening floodgates at dams, and opening and closing valves in oil refineries and water treatment facilities. If left unprotected, Industrial Control Systems (ICS) are so vulnerable that anyone with basic programming skills can shut down a substation, leaving thousands of people in the dark. OpDefender operates on the premise that no device on a network of control systems can be trusted. It includes network switches that analyze and filter network packets in real-time, enabling operators to implement "whitelisting" rules. Its human-machine interface prevents any device from communicating with a network until an administrator has configured it. By default, an alarm sounds when a network receives data from a device that has not been whitelisted. OpDefender's proprietary software enables it to function as a "smart" switch, differentiating between routine and suspicious communications. When suspicious communication is detected, the system quarantines the packet and notifies a human operator. The operator then controls which commands reach the ICS via a simple interface. OpDefender, unlike detection systems that require span ports and big data analysis, analyzes packets in real-time and only flags violations. This article continues to discuss the capabilities, development, testing, and support of the OpDefender technology.

    Idaho National Laboratory reports "Making a Smaller Target for Hackers: Technology Keeps Industrial Control Systems Safer by Limiting Online Access"

  • news

    Visible to the public "Police Crack Comms to Bust Money Laundering Group"

    Police have recently claimed to have busted a criminal network believed to have laundered over $198m in drug trafficking profits after analyzing decrypted messages. Europol said it supported a joint investigation by the Belgian Federal Judicial Police Leuven and the Spanish Guardia Civil. Europol noted that the organized crime group of Moroccan, Spanish, and Belgian nationals apparently operated in Belgium, the Netherlands, Spain, South America, and Dubai. An action day in March 2023 led to five arrests in Belgium and another in Spain, and the seizure of $1.3m in cryptocurrency, three properties, $55,000 in cash, one luxury car, several luxury watches, jewelry, 23 phones, three safe boxes and a money counting machine. Europol noted that the investigation began in October 2021 when police analyzed messages sent via the popular criminal communications network Sky ECC, after cracking the service's encryption. That uncovered a major cocaine trafficking operation that ferried the drug in large quantities from South America to ports and airports in Europe, using insiders at various locations to wave several tonnes of shipments through. According to Europol, the group had managed to stay hidden by using a string of cover companies until police got hold of the decrypted Sky ECC messages. The money laundering was achieved mainly through investments in cryptocurrency and luxury property in the EU and Morocco and via an underground banking system.

    Infosecurity reports: "Police Crack Comms to Bust Money Laundering Group"

  • news

    Visible to the public "CISA: Patch Bug Exploited by Chinese E-commerce App"

    The US Cybersecurity and Infrastructure Security Agency (CISA) recently added CVE-2023-20963 to its Known Exploited Vulnerabilities Catalog. CISA has given the government until May 4 to patch the zero-day vulnerability, which was allegedly exploited by an e-commerce app to eavesdrop on users. The high severity vulnerability was patched by Google last month after the firm said it may be under "limited, targeted exploitation." CISA stated that Android Framework contains an unspecified vulnerability that allows for privilege escalation after updating an app to a higher Target SDK with no additional execution privileges needed. Mobile security company Lookout confirmed late last month that the vulnerability, which has a CVSS score of 7.8, was being exploited by malicious versions of the Pinduoduo Android app. At least two versions of the popular Chinese e-commerce app available from third-party app stores were to blame. With over 750 million monthly active users, Pinduoduo is one of the world's most popular destinations for online shopping. The firm has denied its software is malicious, even though the two apps analyzed by researchers were apparently signed with an official key. The Pinduoduo app has been temporarily pulled from the official Play store, but most Chinese consumers rely on third-party app stores to source their Android downloads. Although the CISA catalog of known vulnerabilities is designed to force federal government agencies to improve patching processes, it is also strongly recommended that private enterprises use the same tool to help prioritize their efforts in this area.

    Infosecurity reports: "CISA: Patch Bug Exploited by Chinese E-commerce App"

  • news

    Visible to the public "LockBit Ransomware Is Targeting Macs for the First Time"

    LockBit, one of the most notorious ransomware strains, reportedly infected Apple Mac devices for the first time. MalwareHunterTeam cybersecurity researchers reported discovering "locker_Apple_M1_64," which is said to be the first LockBit ransomware sample seen targeting Mac devices. In addition, the researchers suspect that this may be the first time a "big name" criminal group has targeted a Mac. While targeting M1-powered devices may garner more attention, 9To5Mac reports that a LockBit ransomware version is also appearing for PowerPC Macs. LockBit is one of the most prevalent ransomware variants in use today. Its creators offer it as a Ransomware-as-a-Service (RaaS), allowing various hacking groups to pay to use the tool. Among its most recent victims is SpaceX, a space exploration company. The hackers allegedly breached one of the company's suppliers and gained access to sensitive information, including thousands of drawings certified by SpaceX engineers. This article continues to discuss researchers spotting a LockBit variant for Apple M1 chips and the history of the LockBit group.

    TechRadar reports "LockBit Ransomware Is Targeting Macs for the First Time"

  • news

    Visible to the public "Genius Hackers Help Russia's Neighbors Thwart Cyber Incursions"

    Russia's cyber capabilities are not to be underestimated, but NATO neighbors are more than capable of defending themselves against the Kremlin, according to the Lithuanian cyber chief. Constant cyberattacks from Russia are launched against the nations that border Moscow's empire. Everything is on the agenda, from ransomware attacks to attack attempts against critical infrastructure. As demonstrated by the war in Ukraine, military operations are often accompanied by cyber operations, prompting NATO and EU members such as Lithuania to develop tools and methods to defend against numerous and better-resourced adversaries. Liudas Alisauskas, the head of Lithuania's National Cyber Security Centre (NCSC), believes that one way to meet the challenge is by fostering local talent and forming partnerships with the most skilled hackers. Cybernews sat down with Alisauskas to discuss how the frontline NATO member defends against Moscow's hackers, whether Russia can still be considered a significant power after a year of disastrous warfare, and the impact of attacks launched by pro-Russian hacktivists such as Killnet. This article continues to discuss NATO members' defense against Moscow's hackers.

    Cybernews reports "Genius Hackers Help Russia's Neighbors Thwart Cyber Incursions"

  • news

    Visible to the public "Payments Giant NCR Hit by Ransomware"

    US payments giant NCR recently confirmed that a recent data center outage resulted from a ransomware attack. A well-known ransomware group has taken credit for the attack. NCR first reported investigating an "issue" related to its Aloha restaurant point-of-sale (PoS) product on April 12. On April 15, the company said a limited number of ancillary Aloha applications for a subset of its hospitality customers had been impacted by an outage at a single data center. The company stated that on April 13, they confirmed that the outage was the result of a ransomware incident. The company noted that immediately upon discovering this development, they began contacting customers, engaged third-party cybersecurity experts, and launched an investigation. Law enforcement has also been notified. The company has been working to restore affected services but said that impacted restaurants should still be able to serve customers, with only specific functionality being impacted. Cybersecurity researcher Dominic Alvieri noticed on April 15 that the ransomware group known as BlackCat, Alphv, and Noberus took credit for the attack on its Tor-based leak website, but the post was quickly removed by the hackers. The researchers stated that in the now-removed post, the cybercriminals said they were contacted by NCR representatives who wanted to find out what type of data had been stolen from their systems. The hackers claimed they did not steal any actual NCR data, but they did obtain "a lot of credentials" that can be used to access NCR customer networks. The researchers noted that the removal of the post naming NCR from BlackCat's leak website suggests that negotiations have started and the cyber criminals are hoping to get paid. The BlackCat ransomware has been around since at least November 2021, and its leak website currently lists more than 300 victims. The group has been known to target industrial companies.

    SecurityWeek reports: "Payments Giant NCR Hit by Ransomware"

  • news

    Visible to the public "Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job Sites"

    A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver Google Command and Control (GC2), an open-source red teaming tool, as part of a broader exploitation of Google's infrastructure for malicious purposes. Google's Threat Analysis Group (TAG) attributed the campaign to a threat actor it monitors as HOODOO, also known as APT41, Barium, Bronze Atlas, Wicked Panda, and Winnti. The attack begins with a phishing email containing links to a password-protected file hosted on Google Drive, which incorporates the GC2 tool to read commands from Google Sheets and exfiltrate data via the cloud storage service. After installation on a victim's computer, the malware queries Google Sheets for commands. In addition to exfiltration via Drive, GC2 allows the download of other files from Drive onto the victim system. Google reported that the same malware was previously used to target an Italian job search website in July 2022. The development is noteworthy because it suggests that Chinese threat actors are increasingly relying on publicly accessible tools, such as Cobalt Strike and GC2, to obfuscate attribution efforts. It also indicates that malware and tools written in the Go programming language are gaining popularity due to its cross-platform compatibility and modularity. This article continues to discuss APT41's use of GC2 and other findings surrounding the threat actor.

    THN reports "Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job Sites"

  • news

    Visible to the public "New Chameleon Android Malware Mimics Bank, Govt, and Crypto Apps"

    Since the start of the year, a new Android Trojan called Chameleon has been targeting users in Australia and Poland by imitating the CoinSpot cryptocurrency exchange, an Australian government agency, and the IKO bank. The cybersecurity company Cyble discovered the mobile malware and reported its distribution, which is through compromised websites, Discord attachments, and Bitbucket hosting services. Chameleon includes various malicious capabilities, such as stealing user credentials via overlay injections and keylogging, cookies, and SMS texts from an infected device. Chameleon is an emerging threat, with future variants expected to include additional features and capabilities. Therefore, Android users are advised to exercise caution when installing apps on their devices, to only download software from official stores, and to keep Google Play Protect enabled at all times. This article continues to discuss researchers' findings and observations regarding the new Chameleon Android Trojan.

    Bleeping Computer reports "New Chameleon Android Malware Mimics Bank, Govt, and Crypto Apps"

  • news

    Visible to the public "Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement"

    Extended Internet of Things devices (xIoT) are attractive to cyberattackers aiming to move laterally within enterprise networks and establish persistence. Such devices have everything the bad guys need to gain a foothold as xIoT devices are significantly under-secured, present in large numbers, present in sensitive network areas, and are typically not well monitored. Brian Contos, a security researcher and strategist, explains that xIoT devices typically fall into three device categories that have all proliferated in business environments. The first category consists of enterprise IoT devices, such as cameras, printers, IP phones, and door locks. The second category consists of Operational Technology (OT) devices, such as industrial robots, valve controllers, and other digital equipment used to regulate physics in industrial settings. General network devices, such as switches, network-attached storage, and gateway routers, are the third and often the least-remembered category. Contos has explored how these devices can be used to launch massive attacks against enterprise resources, as well as what security strategists should do to mitigate the threat. This article continues to discuss the use of xIoT devices by attackers to establish persistence across networks and what enterprises should start doing about the risk.

    Dark Reading reports "Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement"

  • news

    Visible to the public "AI Tools Like ChatGPT Expected to Fuel BEC Attacks"

    Armorblox reports that 57 percent of all Business Email Compromise (BEC) attacks observed in the past year used language as the primary attack vector to reach unsuspecting employees. In addition, vendor compromise and fraud are increasing as a new attack vector, and graymail wastes 27 hours per week of security teams' time. The report is based on data collected from over 58,000 customer tenants, analyzing over 4 billion emails and preventing 800,000 threats each month. Small and midsize businesses (SMBs) are especially vulnerable to vendor fraud and email supply chain attacks. Fifty-three percent of vendor compromise attacks were directed at technology organizations. Malicious actors continue to infiltrate legitimate business workflows in order to gain access to sensitive business data. The most compromised business workflows involved email notifications, a significant increase from 2021. Fifty-two percent of all attacks target sensitive user information, such as login credentials. This article continues to discuss key findings shared by Armorblox regarding BEC attacks.

    Help Net Security reports "AI Tools Like ChatGPT Expected to Fuel BEC Attacks"

  • news

    Visible to the public "ODU Researchers Receive Grants to Address Maritime Cybersecurity Needs"

    The Coastal Virginia Center for Cybersecurity Innovation (COVA CCI), the Commonwealth Cyber Initiative (CCI) node for southeastern Virginia, has awarded $581,100 to seven maritime industry-focused cybersecurity research projects. Old Dominion University, Christopher Newport University, and the College of William and Mary submitted proposals in response to the COVA CCI request for proposals titled "Addressing Cybersecurity Compliance Challenges to Technology Adoption for the Maritime Industry." Researchers were asked to collaborate with maritime industry partners to resolve barriers to technology adoption resulting from or related to cybersecurity compliance issues. The projects seek to eliminate or mitigate cybersecurity obstacles to adopting new technologies such as cloud computing, 5G connectivity, and Machine Learning (ML). The projects include "Applying Risk Assessment Methodology to Produce Cyber-Hardened 5G Communication Capabilities for Autonomous Maritime Platforms," "Machine Learning-Enabled Dependency Network Analysis for Quantifying Risks and Ripple Effects Stemming from Cybersecurity Non-Compliance Issues," "Spotlighting and Mitigating Cyber Attacks in Artificial-Intelligence-of-Things (AIoT)-Enabled Maritime Transportation Systems," and more. This article continues to discuss the awarded projects aimed at addressing maritime cybersecurity needs.

    Old Dominion University reports "ODU Researchers Receive Grants to Address Maritime Cybersecurity Needs"

  • news

    Visible to the public "The Quantum Security Era Is Coming – Here's How Leaders Can Prepare for It"

    Quantum computers promise transformative power for certain types of complex computational problems, such as advanced statical modeling in the financial sector, accelerated research and development for pharmaceutical companies, and a more efficient supply chain in the automotive industry. However, quantum computers must manage a specific risk for maximum transformative gains. The risk is that the cryptography used to secure many digital activities, such as Internet browsing and online banking, will be broken by sufficiently powerful quantum computers. Concerns ignited in the security community over reports that researchers may already be able to break a common type of cryptography on an existing quantum computer underscores the gravity of this threat and how unprepared we are if these reports are real. In addition, attackers may already be performing Harvest Now, Decrypt Later (HNDL) attacks. These attacks involve capturing sensitive data, such as personal health information or military secrets, today and storing it until a sufficiently powerful quantum computer emerges to decrypt it. If this happens while the data remains sensitive, the repercussions could be severe. Therefore, organizations must act immediately to learn and prepare to mitigate the threat posed by quantum computers. This article continues to discuss quantum computers potentially becoming a threat without better quantum security, as well as how organizations could prepare for the quantum security era.

    World Economic Forum reports "The Quantum Security Era Is Coming - Here's How Leaders Can Prepare for It"

  • news

    Visible to the public "What Are Passkeys? A Cybersecurity Researcher Explains How You Can Use Your Phone to Make Passwords a Thing of the Past"

    Passwords may soon become obsolete. However, the need for authentication and secure website access remains as strong as ever. Passkeys are digital credentials that are stored on a user's mobile device or computer. They are similar to actual keys. Access to a passkey is gained by logging into a device with a Personal Identification Number (PIN), a swipe pattern, or biometrics such as fingerprint or facial recognition. A user configures their online accounts to trust their computer or phone. In order to access accounts, a hacker would need physical access to the user's device and the ability to login in. Sayonnha Mandal, lecturer in interdisciplinary informatics and cybersecurity researcher at the University of Nebraska, believes that passkeys provide quicker, simpler, and more secure sign-ins and reduce human error in password security and authorization procedures. Passkeys eliminate the need to remember passwords and eliminate the need for two-factor authentication (2FA). Passkeys are created through public-key cryptography. They use a public-private key pair to guarantee a mathematically protected private relationship between the user's device and the online account being accessed. Since it would be almost impossible for a hacker to guess the passkey, the device from which the passkey is accessed must be physically at hand. This article continues to discuss Mandal's insights on how passkeys work and why they matter.

    The Conversation reports "What Are Passkeys? A Cybersecurity Researcher Explains How You Can Use Your Phone to Make Passwords a Thing of the Past"

  • news

    Visible to the public "LVHN: Sensitive Photos of Almost 2,800 Patients Potentially Stolen in Data Breach"

    Lehigh Valley Health Network (LVHN) has recently revealed that cybercriminals potentially stole sensitive photographs of as many as 2,760 patients during a data breach. LVHN announced in February that a cyberattack carried out by the Russian ransomware gang BlackCat had compromised the confidential records and "clinically appropriate" photographs of an unknown number of its patients. The attack targeted a network supporting Delta Medix, the Lackawanna County-based medical practice LVHN acquired in 2021. According to the company, when they refused to pay the ransom sought by the hackers, BlackCat began making the stolen patient images and information available for download on the dark web. The company is now being served with a class-action lawsuit. LVHN stated that its investigation also showed some patients whose photos were possibly accessed by hackers are residents of other states, including New York, New Jersey, Virginia, Georgia, and California.

    Yahoo News reports: "LVHN: Sensitive Photos of Almost 2,800 Patients Potentially Stolen in Data Breach"

  • news

    Visible to the public "LSU and US Secret Service Partner to Address Cyber Challenges for Louisiana, Nation"

    Louisiana State University (LSU) and the US Secret Service (USSS) have a formal agreement for the development of cyber technology and cyber talent, as well as for state and national security. The Memorandum of Understanding (MOU) strengthens interactions and collaborations between the agency and the university in research, talent, and outreach. LSU and the USSS have agreed to advance cyber-physical system security and forensics knowledge, operational processes, and tools through collaboration. The partnership will provide LSU faculty and students with the opportunity to gain insight into and work on pertinent, real-world law enforcement and protective services challenges, as well as increase the Secret Service's access to LSU's talented students and nationally renowned cybersecurity expertise. The partnership will drive agency-specific research projects, connect students with agents directly, defend vulnerable Louisiana residents from cyberattacks, and more. This article continues to discuss the partnership between LSU and the USSS aimed at addressing cyber challenges.

    Louisiana State University reports "LSU and US Secret Service Partner to Address Cyber Challenges for Louisiana, Nation"

  • news

    Visible to the public "Hackers Claim Vast Access to Western Digital Systems"

    The hackers who breached the data storage company Western Digital claim to have stolen about 10 terabytes of data, including large amounts of customer information. The extortionists are pressuring the company to negotiate a minimum eight-figure ransom in exchange for not releasing the stolen data. On April 3, Western Digital disclosed a network security incident in which hackers accessed a number of the company's systems and stole data. One of the hackers spoke with TechCrunch and provided additional information in an effort to verify their claims. The hacker shared a file digitally signed with Western Digital's code-signing certificate, demonstrating that they could now digitally sign files to impersonate Western Digital. Two security researchers examined the file and found that it was signed with the company's certificate. In addition, the hackers shared the phone numbers of several company executives. The hacker shared screenshots of a folder from a Box account that appears to belong to Western Digital, an internal email, files stored in a PrivateArk instance, and a group call in which one of the participants is Western Digital's CISO. They claimed to have stolen information from the company's SAP Backoffice, a back-end interface that helps companies manage e-commerce data. This article continues to discuss the hackers claiming to have accessed Western Digital's systems.

    TechCrunch reports "Hackers Claim Vast Access to Western Digital Systems"

  • news

    Visible to the public "Volume of Opaque Breach Notices Surges in Q1"

    According to the Identity Theft Resource Center (ITRC), the volume of US data breaches fell in Q1 2023, but the number of notices with no actionable information contained within grew by 20% from the previous quarter. The ITRC is a non-profit that tracks publicly reported data breaches and leaks in the US and has been dismayed by the growing reluctance of breached firms to share important information about incidents. The ITRC argued that this means that those impacted can't make accurate assessments about the risk of data compromise and what actions they should take following a breach involving their data. The number of data breaches with no actionable information about the root cause of the compromise grew from just five in Q1 2021 to 155 a year later and 187 in Q1 2023. Eva Velasquez, president, and CEO of the ITRC stated that it is troubling to see the trend of a lack of actionable information in data breaches continue from 2022. Velasquez said that among the top ten breaches they saw in Q1, 60% did not include information about the root cause of the event, compared to 40% in Q4 2022. This means individuals and businesses remain at a higher risk of cyberattacks and data compromises. Last year, the ITRC claimed that only a third (34%) of breach notices included both victim and attack details, the lowest figure in five years and a 50% decline from 2019. The total number of reported breaches declined 13% from the previous quarter to 445 for the first three months of 2023. The number of victims decreased by 65% to 89 million. The ITRC noted that healthcare topped the list of most breached sectors for the third consecutive quarter, followed close behind by financial services. Incidents in the manufacturing and utilities, technology, healthcare, and transportation sectors impacted the most people. Velasquez claimed that the number of victims and compromises usually falls in Q1 each year.

    Infosecurity reports: "Volume of Opaque Breach Notices Surges in Q1"

  • news

    Visible to the public "US-Based Company Debuts 'World's First Smart Gun' With Fingerprint Unlocking System"

    A US-based technology company has developed the first biometric smart gun. Biofire Technologies announced the handgun that is fingerprint and 3D infrared facial recognition-secured. It functions under various conditions, including when the user is wearing gloves or a face mask. For gun owners concerned about privacy, the gun uses biometric information that never leaves the firearm, which lacks onboard Wi-Fi, Bluetooth, and GPS. Furthermore, integrated IR sensors in the grip keep the firearm armed while an authorized user is holding the gun, eliminating the need to continuously authenticate their biometrics. This article continues to discuss the biometric smart gun and how it addresses the privacy of users.

    CBS reports "US-Based Company Debuts 'World's First Smart Gun' With Fingerprint Unlocking System"

  • news

    Visible to the public "The Hacking of ChatGPT Is Just Getting Started"

    Alex Polyakov, CEO of the security company Adversa, only needed a couple of hours to break GPT-4. In March, when OpenAI released the latest version of its text-generating Artificial Intelligence (AI)-driven chatbot, Polyakov started entering prompts into the chatbot designed to circumvent OpenAI's safety systems. He eventually had GPT-4 making inappropriate remarks, writing phishing emails, and supporting violence. Polyakov is among a handful of security researchers, technologists, and computer scientists who are devising jailbreaks and prompt injection attacks against ChatGPT and other generative AI systems. The jailbreaking process seeks to create prompts that enable the chatbots to bypass restrictions on producing hateful content or writing about illegal acts. Prompt injection attacks can covertly insert malicious data or instructions into AI models. The attacks are a form of hacking that exploits system vulnerabilities with carefully crafted and refined sentences rather than code. Although the attack types are primarily used to circumvent content filters, security researchers warn that the rush to deploy generative AI systems increases the risk of cybercriminals stealing data and wreaking havoc on the web. Polyakov has developed a "universal" jailbreak that is effective against multiple Large Language Models (LLMs), such as GPT-4, Microsoft's Bing chat system, Google's Bard, and Anthropic's Claude. This article continues to discuss security researchers' work on jailbreaking LLMs to demonstrate the avoidance of safety rules.

    Wired reports "The Hacking of ChatGPT Is Just Getting Started"

  • news

    Visible to the public "Siemens Metaverse Exposes Sensitive Corporate Data"

    Siemens Metaverse, a virtual space designed to replicate actual machines, factories, and other highly complex systems, has exposed sensitive information, including the company's office layouts and Internet of Things (IoT) devices. Siemens, a German multinational company with over $71 trillion in revenue and 300,000 employees, has also joined the metaverse movement. In 2022, it partnered with the American multinational technology company NVidia to create the industrial metaverse. The Cybernews research team discovered that the Siemens Metaverse platform, which seeks to create digital 'twins' of its factories and offices, was leaking sensitive data, which could have had catastrophic repercussions for the company and other large corporations using its services, such as ransomware attacks. The research team found an environment file hosted on the company's domain, containing ComfyApp credentials and endpoints. Siemens was also found to have exposed four sets of WordPress users and three sets of backend and authentication endpoint URLs across multiple endpoints of the impacted systems. This article continues to discuss the Siemens Metaverse data leak and other security problems facing the metaverse.

    Cybernews reports "Siemens Metaverse Exposes Sensitive Corporate Data"

  • news

    Visible to the public "Darktrace Denies Getting Hacked After Ransomware Group Names Company on Leak Site"

    Cybersecurity company Darktrace issued a statement recently after it was named on the leak website of the LockBit ransomware group. In the statement, the company noted that the cybercriminal gang was claiming that they had compromised Darktrace's internal security systems and had accessed their data. The company stated that its security teams had run a full review of their internal systems and could see no evidence of compromise. Darktrace noted that they would continue to monitor the situation extremely closely, but based on their current investigations, they are confident that their systems remain secure and all customer data is fully protected. On LockBit's leak website, the post suggested that data was stolen from Darktrace and that the cybercriminals were asking for a $1 million ransom. The fake data on the LockBit site was apparently test data posted by the hackers while doing maintenance. A recent Twitter post from Singapore-based threat intelligence firm DarkTracer, which is unrelated to Darktrace, read, "The reliability of the RaaS service operated by LockBit ransomware gang seems to have declined." The cybercriminals were not happy with DarkTracer's allegations but confused it with UK-based Darktrace and published a post suggesting that they had hacked Darktrace. These types of mistakes are not uncommon for ransomware groups. It's worth noting that there is also no evidence that LockBit targeted DarkTracer either. LockBit has also been known to make false claims when it comes to cybersecurity companies.

    SecurityWeek reports: "Darktrace Denies Getting Hacked After Ransomware Group Names Company on Leak Site"

  • news

    Visible to the public "Russian Hackers Linked to Widespread Attacks Targeting NATO and EU"

    Poland's Military Counterintelligence Service and Computer Emergency Response Team have linked APT29 state-sponsored hackers, who are part of the Russian government's Foreign Intelligence Service (SVR), to attacks against NATO and European Union countries. The cyber espionage group, also known as Cozy Bear and Nobelium, sought to steal information from diplomatic entities and foreign ministries as part of this campaign. The attackers targeted diplomatic personnel with spear phishing emails that impersonated embassies of European nations and contained links to malicious websites or attachments designed to launch malware via ISO, IMG, and ZIP files. APT29-controlled websites infected victims with the EnvyScout dropper via HTML smuggling, which helped in the deployment of downloaders referred to as SNOWYAMBER and QUARTERRIG. The downloaders are designed to deliver additional malware and a CobaltStrike Beacon stager named HALFRIG. APT29 is the hacking division of the SVR that was linked to the SolarWinds supply-chain attack that compromised multiple US federal agencies three years ago. This article continues to discuss APT29 state-sponsored hackers being linked to attacks targeting NATO and European Union countries.

    Bleeping Computer reports "Russian Hackers Linked to Widespread Attacks Targeting NATO and EU"

  • news

    Visible to the public "Five Arrests in Crackdown on $98m Investment Fraud Gang"

    European police have recently arrested five individuals in an attempt to bust a criminal network believed to have made $98m from tens of thousands of victims through investment fraud. According to Europol, some 33 German law enforcers teamed up with their peers in Bulgaria, Romania, Georgia, and Israel to search 15 locations, including five illegal call centers. Europol noted that the two action days in March were a follow-up to operations undertaken against the same criminal gang in 2021 and enabled police to glean new evidence that revealed a much larger cost to victims than the 15m euros first estimated. Europol stated that the fraudsters lured potential victims through legitimate-looking website advertising and social media, encouraging them to make small initial investments of between 200-250 euros. Contact center workers then called the individuals, tricking them with fake "graphics" showing the purportedly large profits they'd already made and promising even bigger returns if they invested more. Europol claimed that persistently low interest rates at the time of the scheme (2019-21) made the high-risk investments more attractive to the victims. In reality, their funds went straight to the gang members' bank accounts. In the latest crackdown, police seized high-value assets, including luxury watches, electronic equipment, cash, bitcoins, bank cards, and various documents. An estimated 33,000 victims lost money to the gang. Investment fraud cost victims an estimated $3.3bn in 2022, making it the highest-grossing cybercrime category that year.

    Infosecurity reports: "Five Arrests in Crackdown on $98m Investment Fraud Gang"

  • news

    Visible to the public "Zelle Users Targeted With Social Engineering Tricks"

    Avanan reports that cybercriminals have been using social engineering to impersonate the popular US-based digital payments network Zelle and steal money from unsuspecting victims. The phishing email is crafted to appear as authentic as possible, containing the Zelle logo, grammatically correct text, and a real link to the company's website in the "security and privacy" footer. However, it also contains a maliciously shortened link. In order to approve a pending money transfer, users are instructed to click the link. If they do so, they are redirected to a page designed to gain the trust of Zelle users. Instead of receiving funds, they may send funds to the cybercriminals behind the scam. This article continues to discuss the phishing campaign targeting Zelle users.

    Help Net Security reports "Zelle Users Targeted With Social Engineering Tricks"

  • news

    Visible to the public "RTM Locker: Emerging Cybercrime Group Targeting Businesses with Ransomware"

    Read The Manual (RTM) Locker is a developing cybercriminal group that operates as a private Ransomware-as-a-Service (RaaS) provider and conducts opportunistic attacks to generate illicit profit. According to a report by the cybersecurity company Trellix, the RTM Locker gang uses affiliates to extort victims, all of whom must adhere to the gang's strict rules. The group's business-like structure, in which members are required to remain active or notify the gang of their departure, demonstrates its organizational maturity, as has been observed with other groups, such as Conti. RTM Locker, first identified by ESET in February 2017 as a banking malware targeting Russian companies via drive-by downloads, spam, and phishing emails, started in 2015. Since then, the group's attack chains have evolved to deliver ransomware to compromised hosts. This article continues to discuss the RTM Locker cybercrime group.

    THN reports "RTM Locker: Emerging Cybercrime Group Targeting Businesses with Ransomware"

  • news

    Visible to the public "New Mirai Variant Employs Uncommon Tactics to Distribute Malware"

    RapperBot, a new variant of Mirai, is another example of malware that uses relatively uncommon or previously unknown infection vectors in an attempt to spread more widely. RapperBot first appeared as Internet of Things (IoT) malware containing parts of Mirai source code but with significantly different functionality than other Mirai variants. The differences included using a new protocol for command-and-control (C2) communications and incorporating a feature for brute-forcing SSH servers instead of Telnet services, as is common in Mirai variants. Last year, Fortinet researchers tracking the malware observed its authors regularly modifying it, first by adding code to maintain persistence on infected machines even after a reboot, and then by adding code for self-propagation via a remote binary downloader. Later, the malware authors removed the self-propagation feature and added a feature that granted them persistent remote access to SSH servers that had been brute-forced. This article continues to discuss researchers' findings and observations regarding RapperBot.

    Dark Reading reports "New Mirai Variant Employs Uncommon Tactics to Distribute Malware"

  • news

    Visible to the public "IARPA's Plan to Hack the Brains of Hackers"

    The leading research agency of the Intelligence Community is moving forward with a plan to create new cybersecurity defenses by exploiting the decision-making biases and cognitive weaknesses of would-be hackers. Reimagining Security with Cyberpsychology-Informed Network Defenses (ReSCIND) is a program for which the Intelligence Advanced Research Projects Activity (IARPA) has issued a broad agency announcement soliciting contract bids. The solicitation describes a 45-month, three-phase program with the objective of identifying cognitive vulnerabilities relevant to cyberattackers and cognitive models to predict attacker behavior. The ultimate goal is to develop Adaptive Psychology-informed defenses involving specific defenses based on attacker behavior. Cyberpsychology has developed into the study of human interactions with Internet-connected devices, often focusing on domains in which web-based tools have the potential to impact mental health, such as social media, or also influence decision-making, such as e-commerce. This article continues to discuss the ReSCIND program that looks to exploit psychological biases among hackers for cyber defense.

    FCW reports "IARPA's Plan to Hack the Brains of Hackers"

  • news

    Visible to the public "Rage Against the Intelligent Machines"

    A multifaceted fight against Artificial Intelligence (AI) has been ignited. Several prominent organizations questioned the risks inherent in the largely unregulated manner in which emerging Large Language Models (LLMs) such as OpenAI's ChatGPT and GPT-4, Microsoft's Bing Chat, and Google's Bard systems are being deployed. At issue is how LLMs are being deployed without a prior, transparent, and auditable assessment of their risks, such as facilitating cybercrime, their propensity for fabricating facts that people could rely on, reinforcing dangerous disinformation, and displaying overt and offensive societal biases. Some have called for a suspension of LLM development while measures to ensure their safety are created. This article continues to discuss concerns regarding the risks posed by LLMs.

    CACM reports "Rage Against the Intelligent Machines"

  • news

    Visible to the public "Hacking Policy Council Launched to Support Security Research and Disclosures"

    Google and other companies will develop and launch new initiatives aimed at providing policy guidance to governments and legal protection to security researchers engaged in "good faith" vulnerability research and disclosure. The tech giant also announced that it would formalize an internal policy to be transparent when vulnerabilities in Google products are exploited in the wild. The moves include establishing an industry-led Hacking Policy Council and a nonprofit that would fund the legal fees of security researchers who are sued or prosecuted for conducting vulnerability research. The council will consist of representatives from bug bounty companies HackerOne, BugCrowd, and Luta Security, as well as the cybersecurity law firm Venable. It will bring together like-minded organizations and leaders who will advocate for new policies and regulations that support best practices for vulnerability management and disclosure without jeopardizing the security of users. This article continues to discuss the new initiatives that will provide policy guidance to governments and legal protection to security researchers.

    SC Media reports "Hacking Policy Council Launched to Support Security Research and Disclosures"

  • news

    Visible to the public "Emotet Climbs March 2023's Most Wanted Malware List With OneNote Campaign"

    According to security researchers at Check Point, the Emotet malware has continued to climb the rankings of Check Point's Most Wanted Malware List in March thanks to a new campaign relying on spam emails containing a malicious OneNote file. The threat is now second on the list, one spot up from February's report. The campaign responsible for its growth in adoption lures victims to open a malicious OneNote file that installs the malware. The researchers noted that once installed, Emotet can gather login credentials and contact information to expand the campaign's reach and facilitate future attacks. The new technique, according to the researchers, is a result of Microsoft announcing that they were blocking macros from Office files. The researchers stated that they know that Emotet is a sophisticated Trojan, and it is no surprise to see it has managed to navigate Microsoft's latest defenses. The researchers noted that the most important thing people can do is make sure they have appropriate email security in place, avoid downloading any unexpected files, and adopt healthy skepticism about the origins of an email and its contents.

    Infosecurity reports: "Emotet Climbs March 2023's Most Wanted Malware List With OneNote Campaign"

  • news

    Visible to the public "SAFECOM and NCSWIC Develop Considerations for Cyber Disruptions in an Evolving 911 Environment"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has announced the release of the "Considerations for Cyber Disruptions in an Evolving 911 Environment" document. Nationwide, Emergency Communications Centers (ECCs) are transitioning from older, legacy systems to NG911. NG911's enhanced connectivity introduces new vectors for threats that can disrupt ECC operations. For example, ECCs may experience cyber incidents due to malicious actors or a faulty software update to a managed service provider's network. Therefore, ECCs should ensure that their Continuity of Operations (COOP) plans define processes and procedures for responding to cyber incidents. The document was developed by CISA, SAFECOM, and the National Council of Statewide Interoperability Coordinators (NCSWIC) to help ECCs create or update their COOP plans to better respond to cyber incidents as they transition to NG911. The document discusses the threat vectors for NG911 systems and provides considerations for updating COOP plans, such as identifying alternate ECCs, maintaining data, and engaging partners. This article continues to discuss the release of the "Considerations for Cyber Disruptions in an Evolving 911 Environment" document.

    CISA reports "SAFECOM and NCSWIC Develop Considerations for Cyber Disruptions in an Evolving 911 Environment"

  • news

    Visible to the public "20,800 Iowans impacted by National Data Breach That Exposed Medicaid Data"

    A cyberattack has exposed personal data for thousands of Iowans who receive Medicaid. The Iowa Department of Health and Human Services recently revealed that the breach that occurred last summer was part of an attack on a contractor's computer system. It was noted that the Iowa Medicaid system itself was not hacked. The department says approximately 20,800 Iowans may have had their names, Medicaid details, and other sensitive information exposed. Those who have been impacted will be notified by a letter in the mail this week. The letter will say what was exposed and what steps one should take to stay safe.

    KCCI Des Moines reports: "20,800 Iowans impacted by National Data Breach That Exposed Medicaid Data"

  • news

    Visible to the public "Critical Vulnerability in Hikvision Storage Solutions Exposes Video Security Data"

    Video surveillance giant Hikvision recently informed customers that it has patched a critical vulnerability affecting its Hybrid SAN and cluster storage products. The vulnerability tracked as CVE-2023-28808 has been described by the vendor as an access control issue that can be exploited to obtain administrator permissions by sending specially crafted messages to the targeted device. The impacted products are used by organizations to store video security data, and an attacker exploiting the vulnerability could gain access to that data. The company stated that while they are not aware of this vulnerability being exploited in the field, they recognize that some of their partners may have installed Hikvision equipment that is affected by this vulnerability, and they strongly encourage them to work with their customers to install the patch and ensure proper cyber hygiene. Hikvision noted in its advisory that an attacker needs to have network access to the targeted device in order to exploit CVE-2023-28808. Hikvision announced on April 10 that patches are included in version 2.3.8-8 for Hybrid SAN and version 1.1.4 for cluster storage devices. The vendor has provided detailed instructions for installing the updates.

    SecurityWeek reports: "Critical Vulnerability in Hikvision Storage Solutions Exposes Video Security Data"

  • news

    Visible to the public "Stolen Card Volumes Plummet 94% Globally"

    According to security researchers at Cybersixgill, the volume of compromised credit cards offered for sale on cybercrime markets has dropped sharply over the past few years, although UK figures rose. The security firm collects 10 million "intelligence items" daily from the deep, dark, and clear web to better understand the cybercrime economy. During the study, the researchers found that there was a 94% drop in compromised cards offered for sale on underground markets between 2019 and 2022, from over 140 million four years ago to just nine million last year. Over that time, the market has declined sharply, with the number of cards available to fraudsters falling 28% from 2019 to 2020 and then by 60% a year later. There was a final 78% drop in volume between 2021 and 2022. The researchers noted that it's not only the supply of cards that has been affected but also the platforms dedicated to selling them. Since 2019, the deep and dark web marketplaces catering to the transaction of stolen credit cards have suffered significant blows both in size and scope. The researchers stated that a large part of this is down to law enforcement action, which has helped to take down large carding markets and led to several arrests of high-profile cybercriminals. The researchers also pointed to improved user authentication mechanisms and behind-the-scenes real-time fraud detection from banks and card companies, as well as e-commerce firms, as helping to depress the market for stolen cards. That said, the average monthly price of card details, including CVV numbers stayed relatively consistent during 2022. Interestingly, while the share of compromised US cards on dark markets dropped from 58% to 49% between 2021 and 2022, the UK's share increased from 5% to 13%. The researchers stated that the United Kingdom has the most compromised cards per capita in the world, with one compromised card for every 68 residents. In contrast, the US has one compromised card for every 88.

    Infosecurity reports: "Stolen Card Volumes Plummet 94% Globally"

  • news

    Visible to the public "KYOCERA Android App With 1M Installs Can Be Abused to Drop Malware"

    A KYOCERA Android printing app has been found to be vulnerable to improper intent handling, which enables malicious apps to exploit the vulnerability to download and potentially install malware on affected devices. According to a security advisory published by JVN, a state-supported portal dedicated to promoting security awareness, the flaw, tracked as CVE-2023-25954, affects KYOCERA Mobile Print, UTAX/TA Mobile Print, and Olivetti Mobile Print. Although the apps have different publishers, they are all based on the same code, so the flaw affects all three. The application class of KYOCERA Mobile Print allows data transmission from malicious third-party mobile apps, which could result in the download of malicious files. Furthermore, by using the KYOCERA Mobile Print web browser function, malicious sites can be accessed, and malicious files can be downloaded and executed, leading to the theft of sensitive information on mobile devices. This article continues to discuss the potential exploitation of CVE-2023-25954 impacting KYOCERA Mobile Print, UTAX/TA Mobile Print, and Olivetti Mobile Print apps.

    Bleeping Computer reports "KYOCERA Android App With 1M Installs Can Be Abused to Drop Malware"

  • news

    Visible to the public "NSA, US and International Partners Issue Guidance on Securing Technology by Design and Default"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the FBI are collaborating with the cybersecurity agencies of international partners to encourage the development of secure-by-design and secure-by-default technology products. The group of nine agencies has published the Cybersecurity Information Sheet, "Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Default," to raise awareness and promote international conversations about the key priorities, investments, and decisions required to produce safe, secure, and resilient technology. In their new report, the agencies emphasize the need to prioritize security throughout the lifecycle of a product in order to reduce the likelihood of security incidents. The principles ensure that technology products are designed and configured to prevent access to devices, data, and connected infrastructure by malicious cyber actors. This article continues to discuss the guidance released on securing technology by design and default.

    NSA reports "NSA, US and International Partners Issue Guidance on Securing Technology by Design and Default"

  • news

    Visible to the public "DDoS Alert Traffic Reaches Record-Breaking Level of 436 Petabits in One Day"

    According to NETSCOUT, HTTP/HTTPS application-layer attacks have increased by 487 percent since 2019, with the most significant increase occurring in the second half of 2022. Much of the increase stems from the pro-Russian group Killnet and other groups targeting websites. This type of attack preceded the invasion of Ukraine, bringing down critical financial, government, and media sites. In the second half of 2022, the greatest volume of Distributed Denial-of-Service (DDoS) alert traffic in one day reached 436 petabits and over 75 trillion packets. Service providers scrubbed a substantial portion of this traffic, while enterprises stopped an additional daily average of 345 terabytes of unwanted traffic. In the past three years, direct-path attacks have increased by 18 percent, while traditional reflection/amplification attacks have decreased by nearly the same percentage, highlighting the need for a hybrid defense strategy to withstand fluctuating attack methods. This article continues to discuss the dynamic nature of the DDoS threat landscape, DDoS attacks reaching record highs in the second half of 2022, and the rise in carpet-bombing attacks targeting ISP networks.

    Help Net Security reports "DDoS Alert Traffic Reaches Record-Breaking Level of 436 Petabits in One Day"

  • news

    Visible to the public "New Python-Based 'Legion' Hacking Tool Emerges on Telegram"

    Legion, a new Python-based credential harvester and hacking tool, is being marketed via Telegram as a means for threat actors to infiltrate different online services for further abuse. Cado Labs reports that Legion includes modules for enumerating vulnerable SMTP servers, conducting Remote Code Execution (RCE) attacks, exploiting unpatched versions of Apache, and brute-forcing cPanel and WebHost Manager (WHM) accounts. The malware resembles another malware family named AndroxGh0st, which the cloud security services provider Lacework first documented in December 2022. In an analysis published late last month, the cybersecurity firm SentinelOne revealed that AndroxGh0st is part of a comprehensive toolset known as AlienFox that threat actors can use to steal Application Programming Interface (API) keys and secrets from cloud services. This article continues to discuss the new Legion Python-based credential harvester and hacking tool.

    THN reports "New Python-Based 'Legion' Hacking Tool Emerges on Telegram"