News Items

  • news

    Visible to the public "FBI & FCC Warn on 'Juice Jacking' at Public Chargers, but What's the Risk?"

    Government agencies warn that malware planted in public charging stations for phones and other electronic devices can infiltrate devices. The FBI Denver office advised the public on April 6 to avoid using free charging stations in airports, hotels, and shopping malls, as malicious actors have discovered methods to use public USB ports to infect devices with malware and monitoring software. Instead, people are encouraged to bring their own charger and USB cable as well as use an electrical outlet. The sentiment was reiterated in a notice from the FCC regarding the phenomenon known as "juice jacking." In some cases, criminals may have intentionally left cables connected to charging stations, according to the commission. Additionally, there have been reports of infected cables being distributed as promotional items. According to experts, charging stations pose a threat to both individuals and businesses. However, the risk is low, and there are straightforward ways to avoid it entirely. This article continues to discuss hackers compromising public charging hubs to steal data, install malware on phones, and more.

    Dark Reading reports "FBI & FCC Warn on 'Juice Jacking' at Public Chargers, but What's the Risk?"

  • news

    Visible to the public "Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service"

    Various modern network threats involve the exfiltration of data through the misuse of network services. In order to detect such threats, analysts monitor data transfers out of the organization's network, specifically data transfers that occur via network services not primarily intended for bulk transfer services. The Domain Name System (DNS) is one such service essential for many other Internet services. Attackers can manipulate DNS to covertly exfiltrate data. Carnegie Mellon University's (CMU) Software Engineering Institute (SEI) blog post examines how the DNS protocol can be exploited to exfiltrate data by appending bytes of data to DNS queries or repeating queries with encoded data in the query fields. The post also analyzes the general traffic analytics used to identify this abuse and tools to implement the analytics. The aggregate size of DNS packets can serve as a reliable indicator of DNS abuse. However, since the DNS protocol has evolved from a simple address resolution mechanism to distributed database support for network connectivity, it is necessary to understand the context of queries and responses in order to interpret the aggregate size. Analysts can better match outgoing queries and incoming responses if they understand the volume of DNS traffic. This article continues to discuss the role of DNS and the analytics for identifying data exfiltration.

    Carnegie Mellon University reports "Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service"

  • news

    Visible to the public "Russians Hijack Cameras in Ukraine Coffee Shops to Monitor Western Aid, Says Official"

    Rob Joyce, the Director of Cybersecurity at the National Security Agency (NSA), stated that Russian hackers had accessed private security cameras in Ukrainian coffee shops in order to gather information on passing aid convoys. The cybersecurity official added that these attacks were part of the ongoing invasion of Ukraine by the Russian government. He said there are ongoing attacks on Ukrainian interests, whether financial, government, personal, or individual business, in an attempt to cause disruption. Government-backed hackers actively targeted Ukrainian cyberspace, with CCTV cameras as one of the attack vectors. Joyce explained that while the surveillance cameras in the town square are accessible online, hackers are exploiting zero-day and N-day vulnerabilities to gain access to the private cameras of local businesses in order to monitor the roads they need to see. This article continues to discuss Russian hackers targeting Cameras installed in Ukrainian coffee shops.

    Cybernews reports "Russians Hijack Cameras in Ukraine Coffee Shops to Monitor Western Aid, Says Official"

  • news

    Visible to the public "Vulnerable Cloud Attack Surface Grows Almost 600 Percent"

    JupiterOne, a company specializing in cyber asset visibility and management, has released a new report showing that the number of enterprise cyber assets has increased by 133 percent, from an average of 165,000 in 2022 to 393,419 in 2023. The report analyzed more than 291 million assets, findings, and policies to establish the current state of enterprise cloud assets, including cloud and physical environments of devices, networks, apps, data, and users. According to the report, the number of security vulnerabilities, or unresolved findings, has increased by 589 percent among organizations. Security is critical to an organization's overall health and public safety. Large organizations have an average of 2,011 cyber assets per employee, compared to 681 for small businesses and 489 for medium-sized businesses. In 2023, security professionals are responsible for an average of 334 unique Cloud Service Provider (CSP) accounts across all organizational sizes. This article continues to discuss key findings from JupiterOne's 2023 The State of Cyber Assets Report.

    BetaNews reports "Vulnerable Cloud Attack Surface Grows Almost 600 Percent"

  • news

    Visible to the public "DDoS Attacks Shifting to VPS Infrastructure for Increased Power"

    In the first quarter of 2023, hyper-volumetric Distributed Denial-of-Service (DDoS) attacks shifted from relying on compromised Internet of Things (IoT) devices to exploiting compromised Virtual Private Servers (VPS). Cloudflare, an Internet security company, reports that the newer generation of botnets has abandoned the tactic of forming large swarms of individually weak IoT devices and is instead focusing on enslaving vulnerable and misconfigured VPS servers using leaked Application Programming Interface (API) credentials or known exploits. This method enables threat actors to form high-performance botnets with greater ease and speed, which can be up to 5,000 times more powerful than IoT-based botnets. This article continues to discuss findings and observations regarding DDoS attacks shifting to VPS infrastructure.

    Bleeping Computer reports "DDoS Attacks Shifting to VPS Infrastructure for Increased Power"

  • news

    Visible to the public "HashiCorp Vault Vulnerability Could Lead To RCE, Patch Today!"

    Oxeye found a new security flaw, tracked as CVE-2023-0620, in the HashiCorp Vault Project, an identity-based secrets and encryption management system used to control access to Application Programming Interfaced (API) encryption keys, passwords, and certificates. The vulnerability is a SQL injection flaw that could result in Remote Code Execution (RCE). This vulnerability was patched in Vault versions 1.13.1, 1.12.5, and 1.11.9 after being reported by Oxeye. HashiCorp Vault offers encryption services for modern microservices-based applications that typically require many secrets. These secrets are protected by authentication and authorization mechanisms using HashiCorp's UI, CLI, or HTTP API when using Vault. Researchers from Oxeye discovered this new vulnerability during a routine deployment scan. They discovered that it could be used by attackers to access sensitive data, modify or eliminate it, and execute malicious code on the target system.

    Help Net Security reports "HashiCorp Vault Vulnerability Could Lead To RCE, Patch Today!"

  • news

    Visible to the public "German Drug Development Company Says Cyberattack Causing Production Delays"

    Evotec is still recovering from a cyberattack that forced it to shut down its Information Technology (IT) systems. The cyberattack prompted the disconnection of their systems from the Internet to prevent data corruption or breaches. In a recent update, the company stated that cybersecurity experts and others are conducting a forensic examination of its systems. Evotec has also informed German law enforcement agencies of the attack. Evotec has over 4,200 employees and generated nearly $700 million in revenue in 2021 by developing pharmaceuticals to treat Alzheimer's, Huntington's disease, and other diseases. The company has long-term partnerships with Bristol Myers Squibb, Bayer, Sanofi, and other pharmaceutical titans for drug discovery. Evotec has not yet reconnected its network, but all of its global locations have maintained business continuity, according to the company. This article continues to discuss the cyberattack on the German drug development giant Evotec.

    The Record reports "German Drug Development Company Says Cyberattack Causing Production Delays"

  • news

    Visible to the public "Microsoft: NSO Group-Like 'QuaDream' Actor Selling Mobile Spyware to Governments"

    Microsoft has identified another Israel-based threat group that is similar to NSO Group. The newly identified group sells cyber espionage tools and services to international governments for monitoring and eavesdropping on individuals. Microsoft Threat Intelligence researchers have discovered links between a threat group they have been tracking as DEV-0196, which distributes iOS malware, and a private company called QuaDream, which sells a platform for exfiltrating data from mobile devices, according to an April 11 blog post. Without expressing it explicitly, the researchers inferred that DEV-0196 and QuaDream are identical. This article continues to discuss findings regarding the NSO Group-Like QuaDream.

    Dark Reading reports "Microsoft: NSO Group-Like 'QuaDream' Actor Selling Mobile Spyware to Governments"

  • news

    Visible to the public "Hyundai Data Breach Exposes Owner Details in France and Italy"

    Hyundai has recently disclosed a data breach impacting Italian and French car owners and those who booked a test drive, warning that hackers gained access to personal data. HaveIBeenPwned said the incident has exposed: e-mail addresses, physical addresses, telephone numbers, and vehicle chassis numbers. HaveIBeenPwned noted that the hacker who accessed Hyundai's database did not steal financial data or identification numbers. Hyundai says they engaged IT experts in response to the incident, who have taken the impacted systems offline until additional security measures are implemented. Hyundai warns its customers to be cautious with unsolicited e-mails and SMS texts claiming to originate from them, as they could be phishing and social engineering attempts. It is unclear how many Hyundai customers this incident impacts, how long the network intrusion lasted, and what other countries might be affected. Hyundai has suffered from a range of cybersecurity issues recently. In February 2023, the company rolled out emergency software updates on several car models impacted by a simple USB cable hack that enabled thieves to steal them. In December 2022, bugs in the Hyundai app allowed remote attackers to unlock and start various impacted models or expose car owner information.

    BleepingComputer reports: "Hyundai Data Breach Exposes Owner Details in France and Italy"

  • news

    Visible to the public "Kodi Forum Breach: User Data, Encrypted Passwords Grabbed"

    The developers of Kodi, the widely used open-source media player app, have recently revealed a data breach of its user forum. The breach did not happen due to a vulnerability. Instead, an unknown attacker used the account of a legitimate but inactive member of the forum admin team to access the MyBB admin console on two occasions, February 16 and 21, 2023. The company noted that the attacker was able to create backups of databases, which they then downloaded and deleted. Nightly full backups of the database were also downloaded. The company stated that the nightly full backups that were downloaded expose all public forum posts, all team forum posts, all messages sent through the user-to-user messaging system, and user data, including forum username, the email address used for notifications, and an encrypted (hashed and salted) password generated by the MyBB (v1.8.27) software. Currently, the company has found no evidence of unauthorized access to the underlying server that hosts the MyBB software. The Kodi user forum is presently inaccessible. The company stated that although MyBB stores passwords in an encrypted format, it must assume all passwords are compromised. They are keeping the forum offline until they find a way to reset all passwords. Even though no compromise of the underlying system has been detected, the Kodi team is standing up a new forum server to be on the safe side. The new server will run the latest version of MyBB software. The company noted that as part of the redeployment, they will restrict and harden access to the MyBB admin console, revise admin roles to reduce privileges wherever possible, and improve audit logging and backup processes. They've also notified the UK Information Commissioner's Office about the breach and will be sharing the exposed email address data with the haveibeenpwned service, so users can assess if their account has been compromised in this data breach. Once the server is back online, users will be required to choose new passwords (they should also change the password on any other account where they used the same one as on the Kodi forum).

    Help Net Security reports: "Kodi Forum Breach: User Data, Encrypted Passwords Grabbed"

  • news

    Visible to the public "Fortinet Patches Critical Vulnerability in Data Analytics Solution"

    Cybersecurity solutions provider Fortinet recently announced the release of security updates across multiple products, including patches for a critical vulnerability in FortiPresence. Offering analytics, heat maps, and reporting, FortiPresence is a data analytics solution available as a hosted cloud service or as a virtual machine for private installations. Fortinet stated that a critical missing authentication vulnerability in the FortiPresence infrastructure server may be exploited to access Redis and MongoDB instances. Tracked as CVE-2022-41331 (CVSS score of 9.3), the vulnerability can be exploited by a remote, unauthenticated attacker through crafted authentication requests. The company noted that the security defect impacts FortiPresence versions 1.0, 1.1, and 1.2 and was addressed with the release of FortiPresence version 2.0.0. As part of its April 2023 vulnerability advisories published this week, Fortinet also announced patches for multiple high-severity flaws in FortiOS, FortiProxy, FortiSandbox, FortiDeceptor, FortiWeb, FortiClient for Windows and macOS, FortiSOAR, FortiADC, FortiDDoS, FortiDDoS-F, FortiAnalyzer, and FortiManager. The company stated that the addressed issues could lead to cross-site scripting (XSS) attacks, unauthorized API calls, command execution, arbitrary code execution, arbitrary file creation, privilege escalation, information disclosure, arbitrary file retrieval, and man-in-the-middle (MitM) attacks. Additionally, Fortinet released an advisory detailing a vulnerability in the Linux kernel version used in FortiAuthenticator, FortiProxy, and FortiSIEM, which could allow an attacker with low privileges to write to page cache and escalate privileges on the system. Tracked as CVE-2022-0847 and also referred to as Dirty Pipe, the flaw was introduced in Linux kernel version 5.8 and was addressed last year in Linux 5.16.11, 5.15.25, and 5.10.102. Several medium and low-severity vulnerabilities impacting FortiNAC, FortiOS, FortiProxy, FortiADC, FortiGate, and FortiAuthenticator were also addressed. Fortinet is advising customers to update their installations as soon as possible. Although the company does not mention any of these vulnerabilities being exploited in attacks, unpatched Fortinet products are known to have been targeted in malicious attacks, including by nation-state threat actors.

    SecurityWeek reports: "Fortinet Patches Critical Vulnerability in Data Analytics Solution"

  • news

    Visible to the public "ACM Prize in Computing Recognizes Yael Tauman Kalai for Fundamental Contributions to Cryptography"

    Yael Tauman Kalai has been named the recipient of the 2022 ACM Prize in Computing by the Association for Computing Machinery (ACM) for advancements in verifiable delegation of computation and fundamental contributions to cryptography. Kalai's contributions have helped define contemporary cryptographic practices and laid a solid foundation for future progress. Among Kalai's significant contributions is her ground-breaking work on the security of the "Fiat-Shamir paradigm," a general method for eliminating interaction in interactive protocols. This paradigm is widely used in real-world applications, including the digital signature scheme (ECDSA), which is utilized by all iOS and Android mobile devices. Kalai established a firm basis for understanding the security of this paradigm. In addition, she co-pioneered the field of leakage-resilient cryptography. She solved a long-standing open problem in interactive coding theory, demonstrating how to convert any interactive protocol into one resilient to a constant fraction of adversarial errors. This article continues to discuss Kalai's contributions to cryptography.

    ACM reports "ACM Prize in Computing Recognizes Yael Tauman Kalai for Fundamental Contributions to Cryptography"

  • news

    Visible to the public "Ethical Hackers Could Earn up to $20,000 Uncovering ChatGPT Vulnerabilities"

    OpenAI recently announced that it is offering white hat hackers up to $20,000 to find security flaws as part of its bug bounty program launched on April 11, 2023. The ChatGPT developer announced the initiative as part of its commitment to secure artificial intelligence (AI). Security experts have scrutinized the company since the launch of the ChatGPT prototype in November 2022. In its announcement, OpenAI acknowledged that despite its heavy investment in research and engineering to ensure its AI systems are safe and secure, vulnerabilities and flaws can emerge. The company stated that it believes that transparency and collaboration are crucial to addressing this reality. That's why they are inviting the global community of security researchers, ethical hackers, and technology enthusiasts to help them identify and address vulnerabilities in their systems. On March 23, OpenAI announced it had fixed a vulnerability in ChatGPT4, which had allowed users to view the titles of chats by other users for nine hours on March 20. Concerns were raised that the bug in the ChatGPT open-source library could lead to privacy concerns. Recent research by BlackBerry found that 51% of security leaders expect ChatGPT to be at the heart of a successful cyberattack within a year. The biggest security concerns center around how threat actors could leverage the large language model to launch attacks, including malware development and convincing social engineering scams.

    Infosecurity reports: "Ethical Hackers Could Earn up to $20,000 Uncovering ChatGPT Vulnerabilities"

  • news

    Visible to the public "Researchers Uncover 7000 Malicious Open Source Packages"

    Security vendor Sonatype recently detected 6933 malicious open-source packages in the month of March alone, bringing the total discovered since 2019 to 115,165. The company stated that info-stealers comprised a significant number of these malicious components, including copycats of the popular W4SP stealer, such as one called "microsoft-helper" from an author self-described as "idklmao." Sonatype noted that the name of the package, "microsoft-helper," might be the bad actors' attempt to disguise its malicious nature, maybe with the goal of potentially adding it as a dependency of a popular package they've already owned. The malicious package featured a second-stage payload which provides the threat actors with more flexibility, which means they can modify code more easily without needing to start everything from scratch. Sonatype noted that unlike "microsoft-helper," the authors of the "reverse-shell" package they found last month made no attempt to hide their intent. It denoted a malware-as-a-service (MaaS) offering for the Spanish market, hosting malicious files on GitHub. Sonatype noted that even though the package "reverse-shell" doesn't look malicious at first glance, the file that it executes from GitHub, "bypass.py," and consequently, "WindowsDefender.py," are nothing but nefarious. The company stated that hosting malicious files on a public repository provides bad actors more control over them. It gives them the power of deleting, upgrading, or even doing version control of the payload. Sonatype also highlighted two heavily obfuscated packages, "proxier-api" and "nitro-api66," designed to steal Discord tokens. All of the above were discovered on the Python Package Index (PyPI) repository. The company stated that these types of packages are a cause for concern as they pose a serious threat to developers who may inadvertently download and install them. Given the potential danger involved, Sonatype reported them to the PyPI team, and they took them down promptly and proficiently.

    Infosecurity reports: "Researchers Uncover 7000 Malicious Open Source Packages"

  • news

    Visible to the public "CyLab Icon Connects Users With Online Privacy Choices"

    Researchers from the CyLab Security and Privacy Institute at Carnegie Mellon University (CMU), the University of Michigan, and Fordham University have made it easy for users to choose how websites use their personal information, all in a single spot. The privacy experts have conducted user studies for years, searching for the most effective methods to help website visitors make informed decisions regarding their personal data. In 2019, when the California Attorney General's office requested public input on the California Consumer Privacy Act, the group decided to examine the new regulations to determine how they could help. The statute required websites that collect and share the personal information of visitors to include a link labeled "do not sell my personal information," optionally accompanied by an icon to be specified by the Attorney General's office. Therefore, the researchers began developing and evaluating various options. Lorrie Cranor, the director of CyLab, stated that when brainstorming possible icons, they considered attempting to directly convey the "do not sell my personal information" or "opt-out" concept. However, they understood that individuals would likely have multiple privacy options that extend beyond the sale of information in the future. Thus, it is preferable to design an icon that effectively communicates the concept of choices. Numerous websites, including Spotify, Procter & Gamble, Walmart, Ford Motor Company, Verizon, and more, now feature the CyLab icon. This article continues to discuss the CyLab icon that connects users with online privacy choices.

    CyLab reports "CyLab Icon Connects Users With Online Privacy Choices"

  • news

    Visible to the public "Q&A With Danish Saleem: A 'Bottomless Cyber Enthusiast' Works To Secure US Power Grid Against Hackers"

    Danish Saleem is a senior energy systems cybersecurity researcher at the National Renewable Energy Laboratory (NREL) who has focused on distributed energy systems, such as rooftop solar panels, that typically serve local customers. These systems contribute around 740,000 megawatts to the US power grid as of 2021 and are proliferating rapidly. However, there is still no unified cybersecurity certification standard that manufacturers must adhere to. Saleem wants to implement "security by design," or a method for incorporating security into devices during production. Through constant communication with distributed energy stakeholders and federal partners, he is helping develop cybersecurity standards to protect the nation's power grid against the growing threat of cyberattacks. This article continues to discuss Saleem's cybersecurity journey, how a hacker could exploit one vulnerability to cut off power to hundreds of thousands of homes, and how he is helping manufacturers build security into their devices.

    The National Renewable Energy Laboratory reports "Q&A With Danish Saleem: A 'Bottomless Cyber Enthusiast' Works To Secure U.S. Power Grid Against Hackers"

  • news

    Visible to the public "Education Sector Sees 34% Increase in IoT Attacks"

    According to Check Point Research, the education and research sector has experienced a significant increase in attacks against Internet of Things (IoT) devices, with 131 weekly attacks per organization, more than double the global average and a staggering 34 percent increase from the previous year. Check Point observed an increase in IoT-related attacks across all regions and industries. Europe had the most IoT cyberattacks, with an average of nearly 70 per organization each week, followed by the Asia-Pacific region with 64, Latin America with 48, North America with 37, and Africa with 34. Check Point reported that the IoT devices targeted by threat actors include routers, IP cameras, and digital video recorders, as well as network video recorders and printers. This article continues to discuss the rise in IoT attacks in the education sector.

    SC Magazine reports "Education Sector Sees 34% Increase in IoT Attacks"

  • news

    Visible to the public "Browsing Threats Top List of CISO Concerns"

    When asked about the most serious cyber threats facing their organizations, 43 percent of CISOs placed browsing threats at the top of their list. A new RedAccess report, based on responses from 300 CISOs in the UK and the UK, highlights the impact of hybrid working on security posture and the additional vulnerabilities it poses. Insecure browsing is the top hybrid/remote work security threat, putting enterprises at risk. However, despite the challenges, it is known that hybrid working is here to stay. Sixty-three percent of CISOs expect most company employees to work primarily under a hybrid or remote model. The new RedAccess report also found that when choosing a new security solution, 73 percent of CISOs think it is either 'extremely important' or 'very important' for the solution to provide a seamless end-user experience across all devices. This article continues to discuss key findings from the RedAccess survey report on the state of hybrid work and browsing security.

    BetaNews reports "Browsing Threats Top List of CISO Concerns"

  • news

    Visible to the public "A Practical Framework to Prepare for the Post-Quantum Future"

    The world is becoming aware of the threat posed by adversaries equipped with quantum computers. Andersen Cheng, CEO of Post-Quantum, a cybersecurity company specializing in quantum-safe security and identity solutions, believes the OODA framework, pioneered by US Air Force Colonel John Boyd, could be used to help prepare for the post-quantum future. According to Cheng, the findings of each organization's analysis and the steps taken are likely to differ, but for those wondering where to begin, OODA is well suited to structure the road to quantum safety. The first step is identifying the problem and gaining an awareness of the internal and external environments. The next step is to analyze what has been discovered and what should be done next. The third phase is to make suggestions for a response strategy after you have contextualized your company and identified risk exposure. The final step is to carry out the decision and any relevant changes that are required as a result of the decision. This article continues to discuss the potential use of the OODA framework to prepare for the post-quantum future.

    HSToday reports "A Practical Framework to Prepare for the Post-Quantum Future"

  • news

    Visible to the public "Adobe Plugs Gaping Security Holes in Reader, Acrobat"

    Software maker Adobe recently shipped patches for at least 56 security vulnerabilities in a wide range of products, some severe enough to expose Windows and macOS users to code execution attacks. Adobe called special attention to its APSB23-24 bulletin that covers critical-severity security flaws in the widely deployed Adobe Acrobat and Reader software. Adobe said successful exploitation could lead to arbitrary code execution, privilege escalation, security feature bypass, and memory leak. Adobe documented at least 16 vulnerabilities in the Acrobat and Reader updates and said it was unaware of any in-the-wild exploitation. Adobe also documented critical-severity code execution flaws in Adobe Digital Editions (Windows) and Adobe InCopy (Windows and macOS). The April batch of Patch Tuesday updates also provides cover for 14 documented issues in Adobe Substance 3D Stager (Windows and macOS), some severe enough to lead to arbitrary code execution and memory leak in the context of the current user. Adobe also recently rolled out patches for Adobe Dimension (15 critical and important vulnerabilities) and Adobe Substance 3D Designer (9 critical bugs) that expose Windows and macOS users to arbitrary code execution in the context of the current user.

    SecurityWeek reports: "Adobe Plugs Gaping Security Holes in Reader, Acrobat"

  • news

    Visible to the public "CISA Releases Updated Zero Trust Maturity Model"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has published the second version of the Zero Trust Maturity Model. This version incorporates recommendations from a public comment period and advances the federal government's commitment to a zero trust approach to cybersecurity in support of the National Cybersecurity Strategy. Although the Zero Trust Maturity Model is intended primarily for federal agencies, all organizations are encouraged to consider it and take steps to accelerate their progress toward a zero trust model. Zero trust is a method in which access to data, networks, and infrastructure is limited to what is minimally required, and the validity of that access is constantly verified. Understanding that organizations begin their path toward zero trust architectures differently, the Zero Trust Maturity Model update includes a new maturity stage dubbed "Initial" that can be used as a guide to determine maturity for each pillar. In all four stages of maturity (Traditional, Initial, Advanced, and Optimal), CISA has added several new functions and updated existing functions for organizations to consider when planning and making decisions regarding the implementation of zero trust architecture. This article continues to discuss CISA's release of the updated Zero Trust Maturity Model.

    CISA reports "CISA Releases Updated Zero Trust Maturity Model"

  • news

    Visible to the public "ChatGPT and Google Bard Abused to Steal Passwords"

    Cybercriminals are exploiting the popularity of ChatGPT and Google Bard to spread RedLine Stealer malware and steal sensitive user data. According to Veriti security researchers, one of the most significant concerns associated with generative Artificial Intelligence (AI) platforms is the ability to bundle the AI in a file, enabling malicious actors to trick unsuspecting downloaders. Hackers could steal personal data, take over financial accounts, or disrupt critical infrastructure by tricking a victim into installing a malicious file. Attackers are hijacking high-profile Facebook business or community pages with thousands of followers and using them to push free downloads of fake ChatGPT and Google Bard-related files. After the user downloads and extracts the file, the RedLine Stealer malware is launched, stealing credentials and downloading additional malware onto the user's device. RedLine Stealer is a type of Malware-as-a-Service (MaaS) available for purchase on the dark web for around $100 to $150, either as a one-time purchase or as a monthly subscription. This article continues to discuss cybercriminals using the popularity of ChatGPT and Google Bard to distribute RedLine Stealer malware.

    Cybernews reports "ChatGPT and Google Bard Abused to Steal Passwords"

  • news

    Visible to the public "Eliminating 2% of Exposures Could Protect 90% of Critical Assets"

    According to researchers at XM Cyber, only 2% of all exposures enable attackers with seamless access to critical assets, while 75% of exposures along attack paths lead to "dead ends." The researchers analyzed over 60 million exposures in over 10 million entities on-premise and in the cloud during the study. The researchers discovered that 71% of organizations have exposures in their on-premise networks that put their critical assets in the cloud at risk. Once there, 92% of critical assets become vulnerable. The researchers noted that once attackers infiltrate cloud environments, it's easy for them to compromise assets. The researchers stated that cloud security is not yet mature, and many security teams don't fully understand what security issues they need to look for. The researchers also found that average organizations have 11,000 exploitable security exposures monthly, with techniques targeting credentials and permissions affecting 82% of organizations and exploits accounting for over 70% of all identified security exposures. The researchers stated that instead of focusing on a list of 20,000 vulnerabilities to address, focus on identifying the quickest wins in your external-facing infrastructure, then work to reduce the scope of permissions that your user and service accounts have. By reducing the amount of systems that users can access, you reduce the risk of those credentials being abused in later stages of an attack, and you increase the efficacy of this practice when you stack on multi-factor authentication and device health attestation.

    Infosecurity reports: "Eliminating 2% of Exposures Could Protect 90% of Critical Assets"

  • news

    Visible to the public "Microsoft Exchange Server 2013 Reaches End of Support"

    Microsoft Exchange Server 2013 has reached end of support on April 11, 2023, and will no longer receive security patches. The product will continue to work even after this date, but Microsoft stated that it is no longer providing technical support, bug fixes for usability and stability issues, time zone updates, and, importantly, fixes for vulnerabilities that could expose servers to hacker attacks. Microsoft reminded users in February about Exchange Server 2013 approaching end of support, advising them to migrate to Exchange 2019 or Exchange Online (Microsoft 365 or Office 365). The tech giant has provided detailed instructions for users who have yet to migrate. The company has made no mention about extended support being available. Microsoft stated that it is important that organizations stop using Exchange 2013, considering that the product has often been targeted in attacks, including by profit-driven cybercriminals and state-sponsored threat actors.

    SecurityWeek reports: "Microsoft Exchange Server 2013 Reaches End of Support"

  • news

    Visible to the public "Latitude Financial Refuses to Pay Ransom"

    A leading Australian lender has refused to pay online extorters demanding a ransom for the personal data they stole on an estimated 14 million customers. Latitude Financial CEO, Bob Belan, stated that paying the threat actors would bring no guarantees that they would destroy the data as promised. He noted that it would only encourage further extortion attempts on Australian and New Zealand businesses in the future. A recent study from Trend Micro found that firms like Latitude Financial are now in the majority. Only an estimated 10% of victim organizations actually pay their extorters today, and because of the relatively small share, they're usually forced to pay more per compromise than in years past. Trend Micro calculated using AI tools that those companies who pay are effectively subsidizing between six and 10 new cyberattacks. Latitude Financial initially claimed that a March breach had only resulted in the loss of around 100,000 identification documents and 225,000 customer records. However, it was soon forced to recalculate these figures, admitting that the hackers had taken 7.9 million Australian and New Zealand driver's license numbers, plus 6.1 million records dating back to 2005, including names, addresses, telephone numbers, and dates of birth. It is still unclear which ransomware group was behind the attack, although a compromised employee credential is thought to have provided initial access to the network. Latitude Financial is Australia's largest non-bank lender, providing buy now, pay later (BNPL) services to many domestic retailers.

    Infosecurity reports: "Latitude Financial Refuses to Pay Ransom"

  • news

    Visible to the public "Azure Admins Warned to Disable Shared Key Access as Backdoor Attack Detailed"

    According to Orca Security researchers, a design flaw in Microsoft Azure could allow attackers to gain full access to a user's environment. This design flaw is that shared key authorization is enabled by default when creating storage accounts. Attackers can hunt for and use Azure access keys as a backdoor into an organization, similar to how public AWS S3 buckets have been abused in recent years, according to Orca's Roi Nisimi. These permissions have the potential to be exploited in order to get access to additional resources within a customer's tenant. It has been announced that shared key and shared access signature authorization would be disabled by default for new storage accounts at a later date. This article continues to discuss the potential exploitation and impact of the design flaw in Microsoft Azure.

    The Register reports "Azure Admins Warned to Disable Shared Key Access as Backdoor Attack Detailed"

  • news

    Visible to the public "German Superyacht Maker Targeted by Ransomware Cyberattack"

    German shipbuilder Lurssen, which makes military vessels and luxury yachts, has recently become the target of a ransomware cyberattack. The Bremen-based company was attacked over the Easter holiday period. The company stated that in coordination with internal and external experts, they immediately initiated all necessary protective measures and informed the responsible authorities. According to a local news outlet, "the cyberattack has brought large parts of Luerssen's shipyard operations to a standstill." Lurssen has built several superyachts, including the world's largest by volume, the 156-meter (512-foot) Dilbar, owned by a trust linked to Russian billionaire Alisher Usmanov. The company traces its origins back almost 150 years.

    Bloomberg reports: "German Superyacht Maker Targeted by Ransomware Cyberattack"

  • news

    Visible to the public "A Cyber Attack Hit the Water Controllers for Irrigating Fields in the Jordan Valley"

    A cyberattack impacted several controllers for irrigating fields in the Jordan Valley. The Galil Sewage Corporation's systems monitor the irrigation process and wastewater treatment in the Jordan Valley. Local officials were aware of the risk of a cyberattack and notified farmers in the area. Some farmers disconnected their irrigation systems from the Internet and converted them to manual operation. The National Cyber Organization issued a warning about the potential for anti-Israeli hackers to launch cyberattacks against critical national infrastructure during the month of Ramadan. Countries such as Russia, Iran, North Korea, and China are capable of wreaking havoc on the water sector. This article continues to discuss the cyberattack that paralyzed the water controllers for irrigating fields in the Jordan Valley as well as private and government organizations in Israel recently getting hit by massive cyberattacks.

    Security Affairs reports "A Cyber Attack Hit the Water Controllers for Irrigating Fields in the Jordan Valley"

  • news

    Visible to the public "Criminal Businesses Adopt Corporate Behavior as They Grow"

    According to Trend Micro, as cybercriminal groups grow, they adopt corporate-like behavior, which presents its own set of challenges and costs. The cybercriminal world is rapidly professionalizing, with groups imitating legitimate businesses that are growing in complexity and revenue. However, larger cybercrime groups can be more difficult to manage and contain more 'office politics,' underachievers, and trust issues. Trend Micro's report emphasizes to investigators the significance of understanding the size of the such groups with which they are dealing. According to the report, a typical large cybercriminal group allocates 80 percent of its operating expenses to wages, while small groups allocate 78 percent. Infrastructure such as servers, routers, Virtual Private Networks (VPNs), virtual machines, and software are also major expenses. This article continues to discuss key findings from Trend Micro's analysis of three types of cybercriminal groups.

    Help Net Security reports "Criminal Businesses Adopt Corporate Behavior as They Grow"

  • news

    Visible to the public "KFC, Pizza Hut Owner Discloses Data Breach After Ransomware Attack"

    Yum! Brands, the owner of KFC, Pizza Hut, and Taco Bell, is sending data breach notification letters to an unspecified number of individuals whose personal information was stolen in a ransomware attack that occurred on January 13. In the breach notification letters, Yum! Brands disclosed that it has learned that the attackers had stolen some personal information, including names, driver's license numbers, and other ID card numbers. Due to the ransomware attack in January, Yum! Brands had to close about 300 restaurants in the UK. Yum! Brands and its subsidiaries operate or franchise over 55,000 restaurants in 155 countries and territories with the assistance of around 36,000 employees globally. This article continues to discuss the impact of the ransomware attack faced by Yum! Brands.

    Bleeping Computer reports "KFC, Pizza Hut Owner Discloses Data Breach After Ransomware Attack"

  • news

    Visible to the public "Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages"

    Researchers have described the inner workings of the cryptocurrency-stealing malware that was spread via 13 malicious NuGet packages as part of a supply chain attack aimed at .NET developers. The typosquatting campaign, detailed by JFrog late last month, impersonated legitimate packages in order to execute PowerShell code designed to retrieve a following binary from a hard-coded server. The two-stage attack leads to the deployment of Impala Stealer, a .NET-based persistent backdoor capable of gaining unauthorized access to cryptocurrency accounts. The payload used a rare obfuscation technique known as '.NET AoT compilation,' which is significantly more covert than using off-the-shelf obfuscators while still making the binary difficult to reverse engineer, according to JFrog. .NET AoT compilation is an optimization technique that enables apps to be compiled to native code in advance. This article continues to discuss the distribution of cryptocurrency stealer malware via 13 malicious NuGet packages.

    THN reports "Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages"

  • news

    Visible to the public "Apps for Sale: Cybercriminals Sell Android Hacks for Up to $20K a Pop"

    Cybercriminals bypass the official Google Play app store's security, develop tools for trojanizing existing Android applications, and sell their malicious wares for up to $20,000 a piece on cybercrime markets. The results of a comprehensive study of nine of the most prominent dark web forums were published by researchers. Observing activity between 2019 and 2023, they discovered a thriving marketplace where buyers and sellers traded access to app developer accounts, botnets, and malicious Android apps for thousands of dollars. Source code that can burrow you into an existing cryptocurrency or a dating app on Google Play can go for multiple thousands of dollars in certain cases. Organizations with inadequate enterprise security should be especially concerned about the Google Play threats. Many businesses continue to use lax bring-your-own-device (BYOD) policies, which extend the security perimeter beyond corporate networks and into the hands of employees. This article continues to discuss the marketplace for malicious Google Play apps and app-takeover tools.

    Dark Reading reports "Apps for Sale: Cybercriminals Sell Android Hacks for Up to $20K a Pop"

  • news

    Visible to the public "Cybersecurity of Quantum Computing: A New Frontier"

    Quantum computer research and development continues to expand at an accelerated rate. In 2022, the US government spent over $800 million on Quantum Information Science (QIS) research. Quantum computers hold great promise because they will be able to solve certain classically intractable problems, meaning that a conventional computer cannot perform the calculations in a practical timeframe for humans. Given this computational capability, there are growing concerns about the future cyber threats quantum computers could pose. For example, Secretary of Homeland Security Alejandro Mayorkas has identified the transition to post-quantum encryption as a priority for ensuring cyber resilience. There needs to be more discussion about how to protect quantum computers in the future. If quantum computers become valuable, it is reasonable to assume that they will ultimately be the target of cybercriminal activity. Understanding how quantum computers will be incorporated with classical computers is crucial for exploring cyber threats against quantum computers. The interface between classical and quantum computers in the hybrid computing environments typical of the Noisy Intermediate-Scale Quantum (NISQ) era is ideal for cyberattacks. This interface is the gateway between the classical and quantum environments, allowing known classical computer exploits to traverse into quantum domains. A hybrid system can be compromised by using various known cyberattack techniques against traditional computers. This article continues to discuss the concept of quantum computing, cyber threats to quantum computers, and six key areas of future research in quantum cybersecurity.

    Carnegie Mellon University reports "Cybersecurity of Quantum Computing: A New Frontier"

  • news

    Visible to the public "Tasmania Officials: 16,000 Student Documents Leaked by Clop Ransomware Group"

    Following a recent data theft incident, Tasmania government officials confirmed that the Clop ransomware group leaked more than 16,000 sensitive documents. During a press conference, Science and Technology Minister Madeleine Ogilvie informed reporters that the leaked information includes financial invoices, statements, and information regarding student assistance applications. Multiple security researchers have confirmed that the Clop ransomware group posted the documents on its leak site. Ogilvie stated that, like most of Clop's victims in this campaign, they used Fortra's GoAnywhere managed file transfer solution. The breach involved names, addresses, invoices, and bank account numbers. Clop is the only hacking group confirmed to have exploited the vulnerability impacting Fortra's GoAnywhere software. This article continues to discuss Tasmanian government officials confirming that over 16,000 sensitive documents were leaked by the Clop ransomware group following a recent data theft incident.

    The Record reports "Tasmania Officials: 16,000 Student Documents Leaked by Clop Ransomware Group"

  • news

    Visible to the public "AI Can Crack Most Passwords in Less Than a Minute"

    Researchers have discovered that Artificial Intelligence (AI) systems can easily crack nearly all passwords. Researchers from Home Security Heroes fed millions of passwords from RockYou to the PassGAN AI platform to observe how quickly it could crack them. In the early days of social media, the widget RockYou was immensely popular on MySpace and, later, Facebook. However, it was compromised by hackers in 2009, and 32 million plaintext passwords were released to the dark web. The researchers extracted 15.6 million passwords from the data set and fed them into PassGAN, in which the passwords are now often used to train AI tools. PassGAN is a password generator based on Generative Adversarial Network (GAN) that creates fake passwords mimicking real ones discovered in the wild. After excluding passwords shorter than four characters and longer than 18, researchers discovered that 51 percent of "common" passwords could be cracked in less than one minute. It required less than an hour to crack 65 percent, less than a day to crack 71 percent, and less than a month to identify 81 percent. This article continues to discuss the researchers' findings from running 15.6 million common passwords through an AI password cracker.

    TechRadar reports "AI Can Crack Most Passwords in Less Than a Minute"

  • news

    Visible to the public "Data Breach at Elmbrook School District Exposes Personal Information About Former And Current Employees"

    It has recently been discovered that a data breach affecting current and former Elmbrook School District employees continued even after the district was aware of the problem. The district learned its system had been compromised on Aug. 23, 2022. An investigation revealed that files were removed from Aug. 23-27, 2022. According to district officials, names and Social Security numbers of current and former employees of the Elmbrook School District were exposed in a data breach last year. The total number of people affected by the breach is unknown. Elmbrook School Chief Strategy Officer Chris Thompson stated that once the district learned of the breach, they investigated with the help of cybersecurity professionals. The initial group of employees affected was informed in late September and October 2022. Thompson noted that the breach also targeted other K-12 school districts nationwide. He said the district was never locked out of its files, nor was there a ransom request for those files. To improve the district's data security, Thompson said the district has partnered with a security service firm to provide 24/7 managed services of its network. Some employees are just learning that their information was affected by the breach. Former Elmbrook employee Luna Cieslak was among those whose information was compromised. She didn't learn of the breach until late March.

    Yahoo News reports: "Data Breach at Elmbrook School District Exposes Personal Information About Former And Current Employees"

  • news

    Visible to the public "How LockBit Changed Cybersecurity Forever"

    In addition to maintaining a high profile, the LockBit group has turned ransom monetization on its head. Forty-four percent of all ransomware attacks launched in 2022 have been attributed to this group due to its innovative approach. The LockBit ransomware gang has become one of the most infamous cybercriminal groups in history. LockBit, formerly known as "ABCD ransomware," debuted in late 2019 and experienced a rapid rise in popularity. As a Ransomware-as-a-Service (RaaS), the group includes a central team that creates the malware and administers its website. In the meantime, the group provides access to its code to affiliates who help in the execution of cyberattacks. Affiliates have been found to be experts in various areas, including vulnerability search and network breaching. This article continues to discuss the evolution of LockBit.

    Security Intelligence reports "How LockBit Changed Cybersecurity Forever"

  • news

    Visible to the public "Advisory Issued on Industrial Control Links ScadaFlex II SCADA Controllers"

    Unauthenticated remote attackers could overwrite, delete, or create files on Industrial Control Links (ICL) ScadaFlex II SCADA Controller SC-1 and SC-2 devices. This enables an attacker to perform critical CREATE, READ, UPDATE and DELETE (CRUD) file operations on the device, which could allow system access and impact availability. US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) advises users to take precautions to reduce the risk of exploitation of this vulnerability. Specifically, users should minimize network exposure for all control system devices and/or systems, ensuring that they are inaccessible from the Internet. They should also place remote devices behind firewalls, isolate them from business networks, and more. Before deploying defensive measures, CISA advises organizations to conduct a thorough impact analysis and risk assessment. This article continues to discuss CISA's warning regarding the potential exploitation of a vulnerability impacting ICL ScadaFlex II SCADA Controller SC-1 and SC-2 devices.

    HSToday reports "Advisory Issued on Industrial Control Links ScadaFlex II SCADA Controllers"

  • news

    Visible to the public "UH Maui College Warns of Data Breach"

    On Thursday, April 6, the University of Hawai`i Maui College said they learned of a data breach that affected their system. According to UH, the breach occurred in mid-February. The university learned that an unauthorized third party had gained access to the university's computer network. The university stated they took immediate action once the breach was discovered and reported to law enforcement. The university engaged with experts to investigate and determine the scope and nature of the breach. According to UH, the breach was isolated to UH Maui College's network. They said that prior to the intrusion from the breach, the network was protected by a firewall and other safeguards. UH made a point to indicate that the breach did not impact the larger UH System network. Current employees and staff were notified of the breach, and UH also sent out notification letters to 10,500 people who may have been impacted by the breach. The letter included an offer for free credit monitoring and identity theft protection services through Experian.

    KHON2 reports: "UH Maui College Warns of Data Breach"

  • news

    Visible to the public "Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days"

    Apple recently pushed out a major iOS security update to fix a pair of zero-day vulnerabilities already being exploited in the wild. The newest iOS 16.4.1 and iPadOS 16.4.1 updates cover code execution software flaws in IOSurfaceAccelerator and WebKit. Apple is aware of a report that this issue may have been actively exploited. In an advisory document, Apple summarized two issues, CVE-2023-28205 and CVE-2023-28206, that expose iPhones and iPads to arbitrary code execution attacks. Apple described the IOSurfaceAccelerator flaw as an out-of-bounds write issue that was addressed with improved input validation. The WebKit bug, which has already been exploited via web content to execute arbitrary code with kernel privileges, has been fixed with improved memory management. Apple did not say if the newly discovered exploits are capable of bypassing the Lockdown Mode feature which they shipped to deter these types of attacks.

    SecurityWeek reports: "Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days"

  • news

    Visible to the public "Microsoft: Iranian Gov Hackers Caught in Azure Wiper Attacks"

    Microsoft recently warned that Iranian advanced persistent threat (APT) actors MuddyWater and DEV-1084 had been observed launching destructive cyberattacks disguised as ransomware. Also tracked as Mercury, Seedworm, and Static Kitten and known to be launching espionage campaigns against targets in the Middle East since at least 2017, MuddyWater was officially linked by the U.S. government to Iran's Ministry of Intelligence and Security. DEV-1084, which claims to be a financially motivated cybercriminal group operating under the DarkBit persona, is connected to MuddyWater, if not a subgroup of the APT. Microsoft stated that DEV-1084 was seen using an IP address and a VPN provider historically associated with MuddyWater, using tools previously used by the APT and using a domain believed to be controlled by MuddyWater. Microsoft found that Mercury gains access to the targets through remote exploitation of an unpatched internet-facing device. Mercury then hands off access to DEV-1084. It is unclear if DEV-1084 operates independently of Mercury and works with other Iranian actors or if DEV-1084 is an "effects based" sub-team of Mercury that only surfaces when Mercury operators are instructed to carry out a destructive attack. Microsoft noted that following the initial compromise, the adversary deploys web shells, creates administrative user accounts, installs legitimate tools for remote access (including eHorus, Ligolo, and RPort), installs a PowerShell script backdoor, and steals credentials. After establishing persistence, the threat actor performs reconnaissance and lateral movement, using remote scheduled tasks to launch the backdoor, Windows Management Instrumentation (WMI) to execute commands, and remote services to run PowerShell commands. The attackers were also caught abusing compromised Azure Active Directory (Azure AD) accounts that had "global administrator" privileges to perform destructive actions, deleting within a few hours server farms, virtual machines, storage accounts, and virtual networks. Microsoft stated that the attacker's goal was to cause data loss and a denial of service (DoS) of the target's services. In some cases, the hackers were seen deploying tunneling tools such as Ligolo and OpenSSH to hide command-and-control (C&C) communication. Microsoft also observed the attackers using high-privileged credentials and domain controller access to carry out on-premises destructive operations and prepare for large-scale encryption.

    SecurityWeek reports: "Microsoft: Iranian Gov Hackers Caught in Azure Wiper Attacks"

  • news

    Visible to the public "An Easier Way to Get Bugs Out of Programming Languages"

    D2X is a new tool developed at MIT that makes it simple to debug any domain-specific programming language. D2X is classified as a library, a reusable piece of computer code that multiple applications can operate. It is intended to interact with existing debuggers, acting as a bridge between these tools and a particular Domain-Specific Language (DSL). A debugger requires information regarding the program or programming language to be debugged. Each debugger requires this information in its own format, which can be a 400-page document. However, if you use D2X, you do not need to worry about this. With D2X operating as the interface, popular debuggers can be used to debug your program without requiring any modifications to the debuggers themselves. This article continues to discuss D2X.

    MIT News reports "An Easier Way to Get Bugs Out of Programming Languages"

  • news

    Visible to the public "Samsung Employees Unwittingly Leaked Company Secret Data by Using ChatGPT"

    Internal documents, including meeting notes and source code, were shared by Samsung employees with the popular Artificial Intelligence (AI)-driven chatbot ChatGPT. ChatGPT trains itself and build its experience based on user-provided data, with the risk of this data becoming accessible to other users who query the popular chatbot. Engineers at Samsung used ChatGPT to examine the company's source code, and they asked the chatbot to optimize test sequences for detecting flaws in the chips they were designing. In less than a month, the company experienced three data breaches due to employees leaking sensitive information through ChatGPT. This article continues to discuss Samsung employees leaking secret data through the use of the popular chatbot service ChatGPT.

    Security Affairs reports "Samsung Employees Unwittingly Leaked Company Secret Data by Using ChatGPT"

  • news

    Visible to the public "Sophos Patches Critical Code Execution Vulnerability in Web Security Appliance"

    Sophos recently announced security updates that resolve several vulnerabilities in Sophos Web Appliance, including a critical bug leading to code execution. A web security solution, the Sophos Web Appliance allows administrators to set web access policies, define them by users or groups, and enforce them as necessary from a single interface. The company stated that the critical issue, tracked as CVE-2023-1671 (CVSS score of 9.8), was identified in the warning page handler of the appliance, and it could be exploited without authentication. Sophos describes the bug as "a pre-auth command injection vulnerability in the warn-proceed handler allowing execution of arbitrary code." Sophos resolved the flaw with the release of Sophos Web Appliance 4.3.10.4, which addresses two other bugs as well. The first is a high-severity code execution issue in the exception wizard. Tracked as CVE-2022-4934 (CVSS score of 7.2) and described as a command injection vulnerability, the flaw requires authentication for successful exploitation. The second is CVE-2020-36692, a medium-severity cross-site scripting (XSS) flaw in the report scheduler. An attacker could exploit the vulnerability to execute JavaScript code in the victim's browser. The company explained that the victim must be tricked into submitting a malicious form on an attacker-controlled website while logged in to Sophos Web Appliance for the attack to succeed. Patches for all vulnerabilities are delivered to Sophos Web Appliance users via automatic updates. Sophos recommends placing the appliance behind a firewall and blocking internet access to it. Sophos Web Appliance is set to reach end-of-life (EoL) status on July 20, 2023. Sophos recommends that Web Appliance customers migrate to Sophos Firewall.

    SecurityWeek reports: "Sophos Patches Critical Code Execution Vulnerability in Web Security Appliance"

  • news

    Visible to the public "MSI Hit in Cyberattack, Warns Against Installing Knock-off Firmware"

    After MSI disclosed a recent cyberattack, owners of MSI motherboards, GPUs, notebooks, PCs, and other devices should exercise caution when updating the firmware or BIOS of their devices. MSI urged users to obtain firmware/BIOS updates exclusively from its official website and to refrain from using files from other sources. Although this may seem obvious, it's not uncommon to discover custom BIOS firmware for PC hardware, especially for GPUs, on enthusiast forums. However, MSI's warning may have been prompted by the types of data stolen during the attack. A group of malicious actors known as Money Message posted screenshots of MSI's CTMS and ERP databases, as well as source code, private keys, and BIOS firmware, on their dark website. This information should not fall into the wrong hands, as it could be used to create malicious firmware clones that people could be tricked into installing. This article continues to discuss the cyberattack faced by MSI and the potential impact of this attack.

    The Register reports "MSI Hit in Cyberattack, Warns Against Installing Knock-off Firmware"

  • news

    Visible to the public "Cybercriminals Use Simple Trick to Obtain Personal Data"

    According to new research conducted by the University of East Anglia, individuals disclose more personal information when asked the same questions twice. A new study demonstrates how straightforward repetition can lead to excessive disclosure, putting individuals at risk for identity theft and cybercrime. The research team suggests that understanding why individuals disclose confidential information could help develop effective solutions. For consumers who disclose their confidential information, there are potential costs and security risks. The research team asked for a variety of personal information from 27 study participants, including their height, weight, and phone number, as well as their views on immigration, abortion, and politics. The participants then ranked the queries from least intrusive to most intrusive and were asked how much of their personal information they would "sell" for a purpose-built website to be accessible for two weeks. Then, they inquired once more as to how much information they would sell, which would appear for an additional two weeks for the possibility of earning even more cash. In a second, larger online study, 132 participants were asked how much information they would sell at two different points in time, in addition to various personality questions. The pattern of progressively asking for more user information is reminiscent of the classic compliance technique known as the "foot-in-the-door" effect. This article continues to discuss the study on how people over-disclose personal data.

    Help Net Security reports "Cybercriminals Use Simple Trick to Obtain Personal Data"

  • news

    Visible to the public "All Dutch Govt Networks to Use RPKI to Prevent BGP Hijacking"

    The Dutch government will enhance the security of its Internet routing by using the Resource Public Key Infrastructure (RPKI) standard before the end of 2024. RPKI, or Resource Certification, protects against malicious or accidental rerouting of Internet traffic through cryptographic verification of the routes. The standard uses digital certificates to secure the Border Gateway Protocol (BGP) used to exchange routing information and to ensure that traffic is routed through the legitimate network operator controlling the IP addresses along the destination path. Standardization Forum in the Netherlands, a research and advisory organization serving the public sector on the use of open standards, has announced that by 2024, all communication devices (ICT) managed by the Dutch government must comply with the RPKI standard. This article continues to discuss the Dutch government upgrading the security of its Internet routing by adopting the RPKI standard.

    Bleeping Computer reports "All Dutch Govt Networks to Use RPKI to Prevent BGP Hijacking"

  • news

    Visible to the public "Over 1 Million WordPress Sites Infected by Balada Injector Malware Campaign"

    Since 2017, it is estimated that over one million WordPress websites have been infected by an ongoing campaign to deploy malware known as Balada Injector. According to GoDaddy's Sucuri, the campaign exploits all known and recently discovered theme and plugin vulnerabilities to compromise WordPress sites. The attacks are known to occur every few weeks in waves. Denis Sinegubko, a security researcher, stated that this campaign is readily identifiable due to its preference for String.fromCharCode obfuscation, the use of newly registered domain names hosting malicious scripts on random subdomains, and redirects to various scam sites. The websites contain fake tech support, fraudulent lottery wins, and rogue CAPTCHA pages urging users to enable notifications to 'Please Allow to verify, that you are not a robot,' allowing the actors to deliver spam advertisements. This article continues to discuss the Balada Injector malware campaign.

    THN reports "Over 1 Million WordPress Sites Infected by Balada Injector Malware Campaign"

  • news

    Visible to the public "Cybercriminals 'CAN' Steal Your Car, Using Novel IoT Hack"

    Experts in automotive security have discovered a novel method for hijacking automobiles by hacking into their control systems via the headlight. The controller area network (CAN) bus, the Internet of Things (IoT) protocol by which devices and microcontrollers in a vehicle communicate with one another, is the determining factor. Cyberattackers can essentially subvert the vehicle's onboard, local communications network in order to potentially halt and start the vehicle, open doors and windows, and manipulate the radio. While car hacking is nothing new, Ken Tindell, CTO of Canis Automotive Labs, described how attackers exploited an electronic control unit (ECU) in the headlight of a Toyota RAV4 to get access to the vehicle's CAN bus and ultimately steal it. This is an approach that has never been observed before. Once connected via the headlamp, they hacked their way into the CAN bus, which controls functions such as the parking brakes, headlights, and smart key, and then into the powertrain panel, where the engine control is located. This article continues to discuss the IoT hack.

    Dark Reading reports "Cybercriminals 'CAN' Steal Your Car, Using Novel IoT Hack"

  • news

    Visible to the public "Reimagining Cryptography in a Post-Quantum World"

    Researchers at the University of Maryland (UMD), with support from the National Science Foundation (NSF), are developing a framework for cryptographic systems that can withstand increasingly powerful quantum computers. In addition, they are working on changing how cryptography is taught, developed, and practiced. Jonathan Katz, a computer science professor, explained that the study's goal is to contribute to developing the foundational theory of cryptography in a post-quantum future. He emphasized that many aspects of classical cryptography will be different in a world where everyone has access to quantum computers, including honest parties and attackers. Therefore, the researchers will explore cryptosystem constructions that can be demonstrated to be secure against quantum computers. Initial emphasis will be placed on the private-key setting. Current public-key cryptosystems are known to be at risk due to quantum computers, but the security of private-key systems against such computers is less well understood. This article continues to discuss UMD researchers' work to develop a framework for cryptographic systems that can weather increasingly powerful quantum computers.

    The University of Maryland reports "Reimagining Cryptography in a Post-Quantum World"